InvestorsHub Logo
Followers 5
Posts 2782
Boards Moderated 0
Alias Born 09/06/2006

Re: None

Sunday, 04/26/2020 9:29:33 AM

Sunday, April 26, 2020 9:29:33 AM

Post# of 249143
Cybersecurity snubbed in stimulus package

https://www.scmagazine.com/home/security-news/cybersecurity-snubbed-in-stimulus-package/

Aid for states is not the only thing that didn’t make it into the $480 billion stimulus package President Trump signed today – funding for cybersecurity also was notably missing, something that security experts, policymakers and security experts hope Congress will rectify in future stimulus bills, particularly around election security.

In a letter to House Speaker Nancy Pelosi, D-Calif., and Minority Leader Kevin McCarthy, R-Calif., the Cybersecurity Coalition, Alliance for Digital Innovation, BSA, The Software Alliance, The Computing Technology Industry Association (CompTIA), Cyber Threat Alliance, Global Cyber Alliance and Information Technology Industry Council (ITI) pressed for funding for states and local governments to secure their systems, some of which provide “critical services, particularly as residents increasingly telework, access state resources online, and depend on” critical infrastructure owned and operated by those governments.

“State and local entities, however, have long lacked the resources to adequately secure and maintain their digital infrastructure,” the group wrote. “The rise in malicious cyberattacks targeting state and local entities, combined with the chronic lack of workforce, patchwork legacy systems, under-resourced cybersecurity and IT services, and uneven federal assistance creates a greater risk of system failure that interrupts services on which state and local populations depend.”

Of particular importance is securing elections, which has taken on greater urgency with the presidential contest well under way during the pandemic.

Pointing to the findings in the penultimate volume of the Senate Intelligence Committee’s five-part report on Russian election interference in the 2016 election, Mike Hamilton, former CISO for Seattle and CISO of cybersecurity firm CI Security, said, “the failure to include adequate funding to secure upcoming elections leads to a number of interesting possibilities, none of which are good news for election management.”

Among the issues, breakdowns of equipment on Election Day coupled with inadequate support could dilate the time it takes to cast a vote and keep people at home.

“The integrity of the upcoming election may now be called into question, leading to chaos and another election outcome that is decided in the courts – which are now more partisan, and stacked in favor of the Republican party,” he said.

Vote by mail efforts are probably too little, too late. “Preparation for mail in voting should have begun in earnest as one of the actions taken by State Emergency Operations Centers, in order to provide continuity of operations in government,” Hamilton said. Likewise, virtual elections would be difficult to execute “without significant development and testing time,” otherwise “a fast method developed for online voting would only exacerbate the narrative that the election outcome cannot be trusted.”
=================================================================
Wave could be SAVING these states/cities money when times really require that states/cities do this as well as provide BETTER SECURITY!!! Below is the Wave Alternative and Wave Solutions, cybersecurity that is a must have for these states/cities!!!
==================================================================
https://www.wavesys.com/

https://www.wavesys.com/wave-alternative

The IT perimeter is gone

With tablets, smartphones, and cloud applications, your employees can access sensitive data anytime, from anywhere. Indeed, around 70 percent of security breaches and data thefts are inside jobs. Meanwhile, the hackers only get better: advanced persistent threats (APTs) appear as normal traffic, and malware can go unnoticed for weeks.

It’s a new world, one without borders. Yet most organizations are still trying to protect their data with the same old firewalls and antivirus software. It’s not working. We refer you to the headline-making breach of the week.

You have to start with the device

Wave has an alternative: security that’s built into each and every device.

We’re talking about hardware: self-encrypting drives (SEDs), which protect data when a device is stolen or lost, and trusted platform modules (TPMs), or embedded security chips. Both go in at the factory, and increasingly, both are standard. They make it possible for you to monitor and control each individual device and its data, no matter where it is. But you need software to turn on and manage your SEDs and TPMs. Wave makes that software.

We’ve been refining comprehensive, centralized management of hardware-based security longer than anyone else. More than that, we’ve shaped the field as a founding member of the Trusted Computing Group, the not-for-profit that develops and promotes industry standards for the hardware.

Security that’s confirmed, not assumed

With Wave, you’ll know that you’re secure. Because we start with the individual devices, you get a broad, deep view of your network. You can see exactly who’s on it, with what devices and what apps, at any given time. Just for example, if Bob goes home and tries to log onto Facebook with the company laptop, Wave can stop him.

A big piece of this heightened security is device authentication. Traditional two-factor authentication requires what amounts to two user IDs. But by using the TPMs inside your devices, Wave can confirm the identity of not only users, but also the devices they’re on. Combine that with fast, enforced encryption of sensitive data via your SEDs—all easily managed with Wave software—and your data is protected from the full range of modern risks: device theft, missent emails, flash drives, portable hot spots … even (and no one else can say this) hardware keyloggers. Not to mention Bob.

Do we need to say that with Wave, compliance is no problem?

Start closing your security gaps today, with what you’ve got

You might be surprised to hear that 90 percent or more of your computers probably already have TPMs. Mobile devices are catching up fast. SEDs are newer, but you probably have a bunch of those too. Machines that don’t have them can often be outfitted at little to no extra cost. So you’ve got some or all of the hardware. All you need to do is turn it on with Wave.

It’s almost as easy as it sounds. TPMs and SEDs are built to open, vendor-neutral industry standards, and so are Wave solutions. That means Wave works on your existing mix of hardware, across platforms, and will evolve with you. It’s part of what makes the Wave alternative not only more secure, but also simpler and cheaper. Total cost of ownership for Wave data protection can be almost half that of a traditional software-based system.

Questions? Read on, or contact our sales department.





















Join the InvestorsHub Community

Register for free to join our community of investors and share your ideas. You will also get access to streaming quotes, interactive charts, trades, portfolio, live options flow and more tools.