article thumbnail

Former US CISO on New US Cybersecurity Strategy: 'It's Bold'

Data Breach Today

National Cybersecurity Strategy. His top takeaway: the shift of cybersecurity responsibility from consumers to manufacturers of vulnerable products. Gregory Touhill, the very first U.S. federal CISO back in the Obama administration, says he's encouraged by the new U.S.

article thumbnail

US Cybersecurity Strategy Shifts Liability Issues to Vendors

Data Breach Today

Holding Vendors Liable for Insecure Apps Fuels Safe Harbor, Transparency Questions A new federal strategy to make commercial manufacturers liable for insecure software requires an attainable safe harbor policy and could be a disincentive for software manufacturers in sharing important vulnerability information with the U.S.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Biden Cybersecurity Strategy: Big Ambitions, Big Obstacles

eSecurity Planet

The White House’s National Cybersecurity Strategy unveiled yesterday is an ambitious blueprint for improving U.S. cybersecurity and threat response, but some of the more ambitious items will take time to implement, and could face opposition from Congress. ” Those fundamental shifts are focused on two core priorities.

article thumbnail

GUEST ESSAY: In pursuit of smarter cybersecurity — to overcome complex risks and grow revenue

The Last Watchdog

A security strategy should clear obstacles and enable every part of a business operation to run smoothly. Departments such as support, manufacturing, design, services, and delivery are enhanced by smart security measures, which allay distracting setbacks and increase the overall inertia. What constitutes “smarter security?”

Risk 214
article thumbnail

Manufacturing needs to adopt a Zero Trust approach to mitigate increased cyber threats

Thales Cloud Protection & Licensing

Manufacturing needs to adopt a Zero Trust approach to mitigate increased cyber threats. Long gone is the time when manufacturing systems and operations were siloed from the Internet and, therefore, were not a cybersecurity target. The most important key findings are: Humans, the alpha and the omega of cybersecurity.

article thumbnail

Autonomous Vehicles – Canada’s Current Legal Framework: Cybersecurity Considerations (Part 2)

Data Protection Report

The emergence of autonomous vehicles (AVs) in Canada will present a number of cybersecurity challenges and risks. AV manufacturers will need to consider these risks and address them early in the design and development process of their products. Cybersecurity Risks. Cyberattack Liability.

article thumbnail

The DHS Cybersecurity Strategy: Five Pillars of Cybersecurity Goals

Thales Cloud Protection & Licensing

The recent DHS Cybersecurity Strategy was released at a crucial time when today’s cyberspace has become a new frontier for warfare for both nation states and criminal hackers. The next three pillars in the cybersecurity strategy focus on threat reduction, consequence mitigation and enabling cybersecurity outcomes.