Feeds

White House 'wants Feds to draw up cyber-defences' for power plants

Crack council to oversee water and electricity supplies

Top 5 reasons to deploy VMware with Tegile

The White House is reportedly getting all federal agencies together to develop voluntary cybersecurity guidelines for power, water and other critical infrastructure companies.

The Feds will get 90 days to propose the regulations and put together a new cybersecurity council at the Department of Homeland Security with agents from the Defence, Justice and Commerce Departments and the Director of National Intelligence, a former cybersecurity official let on to Reuters.

The draft executive order from the Obama-led administration apparently includes bits out of The US Cybersecurity Act 2012, which was defeated in the Senate over the summer after opposition from industry and Republicans. Despite the bill's defeat, some government officials are still worried about the security of critical infrastructures.

Senate Homeland Security Committee Chairman Joe Lieberman urged President Barack Obama yesterday to use the "full extent of his executive powers" to help cybersecurity.

"I urge you to explore any means at your disposal that would encourage regulators to make mandatory the standards developed by the Department of Homeland Security pursuant to your Executive Order so we can guarantee that our most critical infrastructure will be defended against attacks from our adversaries," the senator wrote.

"In addition, I urge you to consider using your authority to strengthen information sharing mechanisms to the extent possible under current law. The Cybersecurity Act of 2012 contained important provisions that would have allowed companies and the Government to share cybersecurity threat information while protecting and preserving the rights and liberties we hold dear."

A spokeswoman for the administration's National Security Council confirmed that a draft order was being considered but didn't give any details. ®

Beginner's guide to SSL certificates

Whitepapers

Designing and building an open ITOA architecture
Learn about a new IT data taxonomy defined by the four data sources of IT visibility: wire, machine, agent, and synthetic data sets.
Why CIOs should rethink endpoint data protection in the age of mobility
Assessing trends in data protection, specifically with respect to mobile devices, BYOD, and remote employees.
Getting started with customer-focused identity management
Learn why identity is a fundamental requirement to digital growth, and how without it there is no way to identify and engage customers in a meaningful way.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Security and trust: The backbone of doing business over the internet
Explores the current state of website security and the contributions Symantec is making to help organizations protect critical data and build trust with customers.