You are here

cybersecurity

Date: 05.02.2016
The technological landscape has shifted over the past decade, with corporate policies striving to keep pace and embrace the modern digital workplace. The days of the company-issued Blackberry or laptop is increasingly being supplanted by the “bring your own device” (BYOD) trend, enabling employees to use their personal smartphones and...
Date: 04.27.2016
As experts analyze methods of tightening security, biometric technologies show promise – but are not without risk and also raise privacy concerns. In the face of these challenges, researchers and companies continue to innovate and test biometric applications that have important implications from national security to enhanced patient care to...
Posted In: cybersecurity, privacy
Date: 04.18.2016
When security experts advise consumers on steps to strengthen their online presence, creating and regularly updating complex passwords ranks among their top recommendations. For the majority of Americans who admit their password habits are lacking, password managers and apps could be a game-changing development and an important shift that protects...
Date: 04.12.2016
For businesses of all sizes, security threats carry a high cost, from financial losses to compromised intellectual property to disrupted productivity. While companies plan to invest more in cybersecurity protections over the next year, there are simple steps businesses and their employees can take to prevent threats. These tips are the focus of...
Date: 03.08.2016
President Obama has likened cyber space to the “wild West,” a new frontier connecting vast troves of data sought by bad actors. The story of this volatile landscape is illustrated through 18 case studies in Verizon’s Data Breach Digest, a complement to the company’s forthcoming annual Data Breach Investigations Report (DBIR...
Date: 02.18.2016
This year promises to bring significant activity in cybersecurity policy, given the increasing awareness of cyber vulnerabilities and potential impact on the nation’s infrastructure. To address these concerns, USTelecom convenes the seventh of a series of cyber policy discussions featuring high-level government and industry officials. Top...
Date: 02.17.2016
(USTelecom is pleased to submit these comments to the National Institute of Standards and Technology (NIST) in response to a Request for Information (RFI) seeking information on the “Framework for Improving Critical Infrastructure Security” (the Framework). In its RFI, NIST inquires about various aspects of the Framework since its...
Date: 10.27.2015
Background: The Senate passed S. 754, the Cybersecurity Information Sharing Act of 2015 (CISA) 74-21, which will enable government and industry to better respond to cyberthreat indicators, while protecting privacy and civil liberties.   The following statement is from USTelecom President Walter McCormick: “USTelecom commends the...
Posted In: cybersecurity
Date: 10.20.2015
Remember that great stage and screen production The Music Man? The Tony- and Grammy-winning hit tells the story of a fast-talking con artist who tries to fool an entire town into believing that if they’ll just buy his uniforms and instruments, he’ll teach the townspeople to read music and turn them into a great marching band. 76...
Posted In: cybersecurity
Date: 10.19.2015
Companies and government agencies need to work together to make sure that commerce can thrive in the Internet ecosystem, said Alan Davidson, director of digital economy at the Commerce Department who gave the keynote address at USTelecom’s  sixth National Cybersecurity Policy Forum.  Davidson’s address at the National...

Pages