42
42
May 28, 2015
05/15
by
CSPAN3
tv
eye 42
favorite 0
quote 0
breach or what to do to prevent a cybersecurity breach. and we, as a result of direct result of the session we've arranged to make a presentation to a group of in-house counsel from our particular sector of the economy. we also learned from that session which defensive measures cybersecurity experts think actually are most effective and actually work. and we're assessing now whether we can have a role in assisting companies in the implementation of some of those measures. we also recently held a roundtable with leading private seconder data breach response experts, many of whom were outside counsel representing various companies and it was mobbed and we had to turn people away because there's such a hunger for the issue and such a hunger to understand. we see a lot of in the case of data breaches we see a lot of in-house counsel who are bewilders and don't know what to do. so there's a real demand for that. we had a very robust discussion at the roundtable about various issues including the benefits of prompt reporting of data breaches to
breach or what to do to prevent a cybersecurity breach. and we, as a result of direct result of the session we've arranged to make a presentation to a group of in-house counsel from our particular sector of the economy. we also learned from that session which defensive measures cybersecurity experts think actually are most effective and actually work. and we're assessing now whether we can have a role in assisting companies in the implementation of some of those measures. we also recently held...
23
23
May 22, 2015
05/15
by
CSPAN2
tv
eye 23
favorite 0
quote 0
but to use prosecuting cyber crime to set of cybersecurity is hard fought in not easily won. the same is true of the prosecution of cybercrimes we have been in the business more than 20 years. the criminal division sunset that intellectual property division so now i will call it ccip to investigate espionage to work with the national security division, network of 270 prosecutors across the country hand in hand in ccip is the linchpin with their effort against cybercrime they have been involved lung capacity or another in almost every cybercrime case since the nineties. over the years we have developed strategies to combat such -- cybercrime and we try to combine those. one of the things we have done is to collaborate a lot with the private sector as well as international law-enforcement partners all over the world. cybercrime is the most international so we have to develop relationships and rehab great relationships with law-enforcement all over the world also with the private sector and frankly every could not do it without foreign law enforcement. because of collaboration w
but to use prosecuting cyber crime to set of cybersecurity is hard fought in not easily won. the same is true of the prosecution of cybercrimes we have been in the business more than 20 years. the criminal division sunset that intellectual property division so now i will call it ccip to investigate espionage to work with the national security division, network of 270 prosecutors across the country hand in hand in ccip is the linchpin with their effort against cybercrime they have been involved...
63
63
May 22, 2015
05/15
by
CSPAN2
tv
eye 63
favorite 0
quote 0
fbi director james comey on cybersecurity. the director of efpa james cumis is one of the most urgent threats facing the u.s. is isis recruitment via social media. his remarks are part of georgetown law schools third annual cybersecurity law lot institute. this is 45 minutes. >> thank you. we are now coming up on two years as director of the fbi. if you could talk a little bit about the biggest threat facing the fbi today. >> i think the biggest threat and the most urgent threat the one that takes my time every day is the one that isil presents especially coming at us through social media trying to motivate trouble people in the united states to engage in acts of violence. the so-called caliphate or killed where they are. this is actually a place where cyber and counterterrorism merge because they are preaching this, pushing this poison through twitter and other vehicles trying to motivate people and then moving them to encrypted platforms to communicate with them to try and give them instructions. so the threat we face has mo
fbi director james comey on cybersecurity. the director of efpa james cumis is one of the most urgent threats facing the u.s. is isis recruitment via social media. his remarks are part of georgetown law schools third annual cybersecurity law lot institute. this is 45 minutes. >> thank you. we are now coming up on two years as director of the fbi. if you could talk a little bit about the biggest threat facing the fbi today. >> i think the biggest threat and the most urgent threat the...
44
44
May 15, 2015
05/15
by
CSPAN3
tv
eye 44
favorite 0
quote 0
it found that last year there were 2,100 data loss cybersecurity intrusions. of that, 277 financial institutions and 167 were retail businesses. there are 1,000 times more retailers operating in the u.s. i don't think we should have the philosophically that a single regulation can guide us to successful cybersecurity -- >> mr. dodge, let me build on that. building on the chairman luetkemeyer's statement earlier and reference to legislation, it does to develop and implement a program that ensures security and confidentiality of sensitive information, it is appropriate to the size, scope, and sensitivity of this information. this is written to create some measure of flexibility so the standards are modified. do you think this is a good approach in terms of creating these flexibilities of standards? >> so, you know, we applaud congress for looking at lots of ways to address this issue. i think what's important is that we look at the regulatory environment as it exists today and recognize that the graham-leach-bliley act was written specifically for the financial
it found that last year there were 2,100 data loss cybersecurity intrusions. of that, 277 financial institutions and 167 were retail businesses. there are 1,000 times more retailers operating in the u.s. i don't think we should have the philosophically that a single regulation can guide us to successful cybersecurity -- >> mr. dodge, let me build on that. building on the chairman luetkemeyer's statement earlier and reference to legislation, it does to develop and implement a program that...
29
29
May 14, 2015
05/15
by
CSPAN3
tv
eye 29
favorite 0
quote 0
it found last year there were 2,100 data loss cybersecurity intrusions. of that 277 financial institutions and 167 were retail businesses. there are 1,000 times more retailer operating in the u.s. i don't think we should have the philosophically that a single regulation can guide us to successful cybersecurity -- >> mr. dodge, let me build on that. building on the chairman's statement earlier and reference to legislation, it does to develop and implement a program that ensures security and confidentiality of sensitive information, it is appropriate to the size, scope and sensitivity of this information. this is written to create some measure of flexibility so the standards are modified. do you think this is a good approach in terms of creating flexibilities of standards? >> so, you know, we applaud congress for looking at lot of ways to address this issue. i think what's important is that we look at the regulatory environment as it exists today and recognize that the graham-leach-bliley act was written specifically for the financial services community, an
it found last year there were 2,100 data loss cybersecurity intrusions. of that 277 financial institutions and 167 were retail businesses. there are 1,000 times more retailer operating in the u.s. i don't think we should have the philosophically that a single regulation can guide us to successful cybersecurity -- >> mr. dodge, let me build on that. building on the chairman's statement earlier and reference to legislation, it does to develop and implement a program that ensures security...
48
48
May 12, 2015
05/15
by
CSPAN3
tv
eye 48
favorite 0
quote 0
i also want to applaud those in congress who were active in cybersecurity legislation. i am largely very supportive of the bill that passed the house last week, sponsored by chairman mccall and others. i think that frankly some legislation is better than no legislation. and i think that information sharing between the private sector and the government is crucial. any efforts by the congress to promote and endorse that is crucial. i also believe that a form of immunity limitations from civil and criminal liability for those who share cyberthreat indicators with the department is crucial and i believe that a national data breach notification requirement is also very important. and i'm pleased that we are active legislatively in those areas. >> that leaves us with critical infrastructure. >> in terms of your precise question, i haven't thought about it the way you asked it. i want to -- i think it is a thoughtful question worth -- worthy of a thoughtful answer. let me consult -- i'd like to consult my mppd community. and get to a thoughtful answer to that. >> okay. i do th
i also want to applaud those in congress who were active in cybersecurity legislation. i am largely very supportive of the bill that passed the house last week, sponsored by chairman mccall and others. i think that frankly some legislation is better than no legislation. and i think that information sharing between the private sector and the government is crucial. any efforts by the congress to promote and endorse that is crucial. i also believe that a form of immunity limitations from civil and...
122
122
May 19, 2015
05/15
by
CSPAN3
tv
eye 122
favorite 0
quote 0
the public and private sector in combatting cybersecurity. and in that we also have to therefore create liability protection for the private sector when they're being good citizens to help the government in dealing with the attacks that we're under constantly, right? every business here is under constant attack, as is the federal government. so that's why we propose the administration proposed legislation, cybersecurity legislation enabling us to work more closely together and providing that kind of liability protection. it's my understanding the bill sought of the house. with actually greater protections than originally we had proposed, which is terrific. and now the senate needs to act on this. it's really, really important that we work together on this. and as a result, ntia which is the national telecommunications and information agency has a new cyberinitiative to try and tap private sector expertise. and we're looking for input by may 18th. so if you go to our website at i think it's ntia.doc.gov we would love your input as to what are
the public and private sector in combatting cybersecurity. and in that we also have to therefore create liability protection for the private sector when they're being good citizens to help the government in dealing with the attacks that we're under constantly, right? every business here is under constant attack, as is the federal government. so that's why we propose the administration proposed legislation, cybersecurity legislation enabling us to work more closely together and providing that...
77
77
May 1, 2015
05/15
by
CSPAN2
tv
eye 77
favorite 0
quote 0
i would like to talk with you about cybersecurity. the majority leader has announced he will try to have cyberweek on the senate floor. a lot of activity in the house. we have bipartisan bills that are pending on information sharing and debate communications providers on agency public reporting of the cyberthreat to increase public awareness of coordinating national notification with companies data breaches and updates of criminal penalties. when we first were working on comprehensive cybersecurity legislation, another main piece of the effort was on the critical infrastructure piece. now what i hear quite widely is that the dhs led framework oddness that is pulled together a great number of critical infrastructure industry sectors is going very well and as a result of that there is no immediate pressure for legislation in the area. now there may not be an immediate need for legislation in that area, but of all the different areas i mentioned where there will be legislation protecting our privately owned critical infrastructure is pro
i would like to talk with you about cybersecurity. the majority leader has announced he will try to have cyberweek on the senate floor. a lot of activity in the house. we have bipartisan bills that are pending on information sharing and debate communications providers on agency public reporting of the cyberthreat to increase public awareness of coordinating national notification with companies data breaches and updates of criminal penalties. when we first were working on comprehensive...
91
91
May 28, 2015
05/15
by
FBC
tv
eye 91
favorite 0
quote 0
when we look at the cybersecurity budget vs.t budget less than 5% is spent on cybersecurity. stuart: that is yesterday and again today. russia behind the attack on the 100000 taxpayers. >> i don't think the irs should be having internet services to get your tax returns at all their lack of cybersecurity. stuart: that was an apps on your phone you go to that apps and it tells you, gives back your tax records and put some up immediately. the russians hacked into the apps. liz: the irs does it it was a barrage of fishing e-mails into the irs system. the irs handles 240 million tax returns a year. to have such a thing cybersecurity budget that is questionable. i would say it is congress's fault for killing with the tax code every year with a barbwire pile of fishing tackle, they have a tax code. the joke is it makes more liars out of people than golf. congress is to blame too. always distracting the irs away from its position as tax collector. stuart: we haven't even talked about a tax refund checks that went to one address in lithu
when we look at the cybersecurity budget vs.t budget less than 5% is spent on cybersecurity. stuart: that is yesterday and again today. russia behind the attack on the 100000 taxpayers. >> i don't think the irs should be having internet services to get your tax returns at all their lack of cybersecurity. stuart: that was an apps on your phone you go to that apps and it tells you, gives back your tax records and put some up immediately. the russians hacked into the apps. liz: the irs does...
41
41
May 22, 2015
05/15
by
CSPAN2
tv
eye 41
favorite 0
quote 0
are you concerned about trends in terms of cybersecurity threats are liberating down that layer cake to people like isil or other organizations that had distracted the tax at aramco in saudi arabia. now we have had the sony attack coming ashore as the united states. are you concerned about sophisticated malware proliferating through that layer cake and are you seeing evidence of that? >> i'm definitely concerned about it. can terrorists want mom's and again logic tells me that terrorists are a would have said two years ago are going to wake up to and now i have seen them starting to wake up to the idea that as hard as we have made it to get into the country physically they can get in as a photon at the speed up light and so yes i am concerned. i don't see it yet constructive malware in the hands of these terrorists but it makes too much sense that it is a tool that they will eventually turn to. i see them already as starting to explore things that are concerning credit oil infrastructure in things like that but the logic of it tells me it's coming so of course i'm worried about it. >
are you concerned about trends in terms of cybersecurity threats are liberating down that layer cake to people like isil or other organizations that had distracted the tax at aramco in saudi arabia. now we have had the sony attack coming ashore as the united states. are you concerned about sophisticated malware proliferating through that layer cake and are you seeing evidence of that? >> i'm definitely concerned about it. can terrorists want mom's and again logic tells me that terrorists...
205
205
May 4, 2015
05/15
by
CNBC
tv
eye 205
favorite 0
quote 0
maybe add it to the arsenal of cybersecurity strikes we like so much. let's go to martha in florida, martha? >> caller: hi, jim, i'm martha i'm in palm beach gardens, the hidden gem of palm beach county. life can be meaningful purposeful and beautiful if one has the right guidance and solutions to make it so. so would you please give me your opinion of a possible takeover of pfizer? >> okay. i think we all agree that there is more life to pfizer. i like that description how life can be kind of find that myself. i do not think fiezpfizer is a takeover target. it can be an acquirer. thank you for the kind words. patrick in illinois. >> caller: boo-yah, what is going on? >> not much how about you? >> caller: living the dream. i bought linkdein for $180. buy, sell? >> the reaction is over reaction. i don't think linkedin is as bad. i had to read it multiple times and didn't understand it but i know it wasn't as bad as the stock acted. i think it can be bought here. not crazy about a it, but it is not a short. what do you get when you combine a buffet halo t
maybe add it to the arsenal of cybersecurity strikes we like so much. let's go to martha in florida, martha? >> caller: hi, jim, i'm martha i'm in palm beach gardens, the hidden gem of palm beach county. life can be meaningful purposeful and beautiful if one has the right guidance and solutions to make it so. so would you please give me your opinion of a possible takeover of pfizer? >> okay. i think we all agree that there is more life to pfizer. i like that description how life can...
50
50
May 15, 2015
05/15
by
CSPAN2
tv
eye 50
favorite 0
quote 0
they found last year 2100.allow cybersecurity intrusions.f that 277 international in to shin said 167 retail businesses are a thousand times by retailers in the u.s. i don't think we should have the philosophy that a single regulation can guide us to a successful -- >> let me build on that. building on mr. neugebauer statement earlier reference to legislation says to develop and maintain a comprehensive information security program that ensures security and confidentiality it is appropriate. this is written to create some measure of flexibility so the standards are modified. do you think this is a good approach in terms of creating flexibilities? >> we applaud congress look in a lot of ways to address this issue. what is important as we look at the regulatory environment doesn't exist today and recognize the graham leach bliley act is written for the financial services community and there's a very strong regulatory regime that applies to most of the business community and that is of course the ftc. the ftc has moved aggressively over the las
they found last year 2100.allow cybersecurity intrusions.f that 277 international in to shin said 167 retail businesses are a thousand times by retailers in the u.s. i don't think we should have the philosophy that a single regulation can guide us to a successful -- >> let me build on that. building on mr. neugebauer statement earlier reference to legislation says to develop and maintain a comprehensive information security program that ensures security and confidentiality it is...
136
136
May 29, 2015
05/15
by
FBC
tv
eye 136
favorite 0
quote 0
how do you turn everything around and play cybersecurity offense? >> i'm not saying that you have to rip your computer network down and rebuild. liz: i just heard you say that. >> when you build a network, that's the way you're supposed to do it. now that it's done and we got holes through this thing because there's got to be, people are getting through, what we have to do is assess the network. nationwide we do, this when we assess networks, we trace out every wire, without the i.t. director knowing it, networks are growing. they could be on a three-month to a-week vacation. 90% of the places don't have policies and procedures in place. they don't have a network diagram. that network diagram is a living document up to date on a daily basis, as the network changes, the diagram changes, they're not doing that. >> some companies say change the password every two weeks, couple of crazy characters, no word that actually -- >> not the problem, that's not the problem, they're going to come right through the door without using a password. they'll get someo
how do you turn everything around and play cybersecurity offense? >> i'm not saying that you have to rip your computer network down and rebuild. liz: i just heard you say that. >> when you build a network, that's the way you're supposed to do it. now that it's done and we got holes through this thing because there's got to be, people are getting through, what we have to do is assess the network. nationwide we do, this when we assess networks, we trace out every wire, without the...
172
172
May 18, 2015
05/15
by
CNNW
tv
eye 172
favorite 0
quote 0
chris roberts is the name of this cybersecurity researcher.says modern airplanes have a huge vulnerability from hackers. he says a security hole aboard three types of boeing aircraft and one model made by airbus. he says hackers could take control of aircraft and the fbi now says they're investigating him for potential computer crimes aboard flights. now this is according to a search warrant application filed in court. roberts told the fbi in february and march that he hacked into planes up to 20 times including at least once making a plane do a lateral move. no one has verified whether roberts actually did any of this. he's not been arrested. boeing says there's actually no danger to passengers. a statement from them says in-flight entertainment systems on commercial airplanes are isolated from flight and navigation systems and roberts himself has gone back on twitter this weekend saying the fbi has it wrong and over the last five years my only interest has been to improve aircraft security given the current situation i've been advised agains
chris roberts is the name of this cybersecurity researcher.says modern airplanes have a huge vulnerability from hackers. he says a security hole aboard three types of boeing aircraft and one model made by airbus. he says hackers could take control of aircraft and the fbi now says they're investigating him for potential computer crimes aboard flights. now this is according to a search warrant application filed in court. roberts told the fbi in february and march that he hacked into planes up to...
31
31
May 20, 2015
05/15
by
CSPAN2
tv
eye 31
favorite 0
quote 0
we have heard recent reports about cybersecurity threats there are travelers face. one security researcher claims to have hacked into the airline's control systems to the entertainment system changing the direction of the plane. i'm concerned about recent claims that the wi-fi on plains lacks basic security that make it easy for hackers to spy on customers using the network so let me first ask about hacking into airplane control. i know that chairman thune earlier asked administrator huerta about the faa separates and let me turn to you again mr. smisek. what is american airlines doing to prevent hacking into the vital controls of the airline's? >> sir . once the architecture so it's that kind of management of process and design and money there's no question i would say it's 50/50. >> is interesting i don't know how we ensure we get better at management by just changing the structure. unit look at the u.s. postal service. look at amtrak babies pay these are all examples of things we have done better structures were we have tried to do something other than the tradit
we have heard recent reports about cybersecurity threats there are travelers face. one security researcher claims to have hacked into the airline's control systems to the entertainment system changing the direction of the plane. i'm concerned about recent claims that the wi-fi on plains lacks basic security that make it easy for hackers to spy on customers using the network so let me first ask about hacking into airplane control. i know that chairman thune earlier asked administrator huerta...
41
41
May 3, 2015
05/15
by
CSPAN2
tv
eye 41
favorite 0
quote 0
-- over cybersecurity with the debates over biosecurity with the debates over drones and robotics. and what we found was that, you know, there are these -- there's a cybersecurity debate with which a lot of you are i'm sure, very familiar. in which people talk about the uniqueness of the cyber environment and the things they say that make it unique make it different from anything else that's ever come before is that, you know, you can attack remotely with great, over great distances with limited capacity to attribute the attacks. attribution is very difficult. you know technology has, you know disseminated down to the level of individuals and equalized kind of, you know, in a tom friedman sort of way. the earth has gotten much flatter in an attacking framework. and then you talk to people who do biosecurity for a living, and they say wow this environment is so unusual because you can attack over great distances and with limited attribution and you know, almost anybody with a you know, reasonable grad school level proficiency and lab techniques can do some pretty awful things. and y
-- over cybersecurity with the debates over biosecurity with the debates over drones and robotics. and what we found was that, you know, there are these -- there's a cybersecurity debate with which a lot of you are i'm sure, very familiar. in which people talk about the uniqueness of the cyber environment and the things they say that make it unique make it different from anything else that's ever come before is that, you know, you can attack remotely with great, over great distances with...
84
84
May 21, 2015
05/15
by
WTXF
tv
eye 84
favorite 0
quote 0
i am in hamilton outside of the homeland security office where the governor announced a cybersecurityand his goal is to protect new jersey's landscape. >> honeybees, more than 40% across the u.s., died off last year. what is worse is that many happen during the warm summertime days. >> that is bad news for me anew.. >> more than a third of our crop comes from bees that are pollinating the crops. >> if you are spraying pesticides there can be complications. but not everyone is feeling the pinch. some people are installing beehives even in places that you may not expect. here's a look at beehives. >> then it's ready for the winter. >> they are still surviving and it's because they got love even on the coldest days of the year. >> would you create a beehive in your backyard? sent us a tweet at "chasing news". bill: you are chasing fleet week and you have really cool pictures to share from new york. >> these are not my pictures these are the photos of robert johnson come a professional photographer. he took some amazing photos and when i look at them i felt inspired. can you tell us about
i am in hamilton outside of the homeland security office where the governor announced a cybersecurityand his goal is to protect new jersey's landscape. >> honeybees, more than 40% across the u.s., died off last year. what is worse is that many happen during the warm summertime days. >> that is bad news for me anew.. >> more than a third of our crop comes from bees that are pollinating the crops. >> if you are spraying pesticides there can be complications. but not...
55
55
May 24, 2015
05/15
by
CSPAN
tv
eye 55
favorite 0
quote 0
we have heard recent reports about cybersecurity threats there are travelers face. one security researcher claims to have hacked into the airline's control systems to the entertainment system changing the direction of the plane. i'm concerned about recent claims that the wi-fi on plains lacks basic security that make it easy for hackers to spy on customers using the network so let me first ask about hacking into airplane control. i know that chairman thune earlier asked administrator huerta about the faa separates and let me turn to you again mr. smisek. what is american airlines doing to prevent hacking into the vital controls of the airline's? >> sir and the data protection. >> as best as we can. >> thank you. does anyone want to put a percentage of which is which? the lack of stable funding and 10% management? what do you think? >> i will take a shot. i do not think it is knowable. go to the court that is an objective of smart people and the congress mandate looked at it. they raise a lot of management questions. there strategic thought the leadership. where are
we have heard recent reports about cybersecurity threats there are travelers face. one security researcher claims to have hacked into the airline's control systems to the entertainment system changing the direction of the plane. i'm concerned about recent claims that the wi-fi on plains lacks basic security that make it easy for hackers to spy on customers using the network so let me first ask about hacking into airplane control. i know that chairman thune earlier asked administrator huerta...
131
131
May 29, 2015
05/15
by
FBC
tv
eye 131
favorite 0
quote 0
cybersecurity. so we have the basket that has done tremendously well that will continue to grow. second we added that a little while ago to the portfolio. great numbers. great acquisitions the merger and acquisition has added a lot of cash flow they will be on the lookout for more companies. on top of that i will add one more thing we're not market timers we think the nervousness is good that people cannot time whole cycles of the market but a two-time that we think it is tough. >> but looking at technology you have a very weak approach where the first person is not always the winner? >> that's right you don't want to be the first person to create back in 1998 nobody remembers cosmos. but look at grubb of -- hub. but will that the sport -- destroy competitors. we had restaurant delivery services over 20 years but grubhub will take it to the next level. they are treating all entreprenuers to create food then distribute those meals through the electronic platform just like apple gave scoters the abili
cybersecurity. so we have the basket that has done tremendously well that will continue to grow. second we added that a little while ago to the portfolio. great numbers. great acquisitions the merger and acquisition has added a lot of cash flow they will be on the lookout for more companies. on top of that i will add one more thing we're not market timers we think the nervousness is good that people cannot time whole cycles of the market but a two-time that we think it is tough. >> but...
113
113
May 3, 2015
05/15
by
CSPAN
tv
eye 113
favorite 0
quote 0
i would like to talk to you about cybersecurity. the majority leader has announced that he's going to try to have cyberweek here on the senate floor at some point. there's a lot of activity in the house. we have bipartisan bills that are pending on information sharing between federal agencies and the big communications providers. on agency public reporting of the cyberthreat to increase public awareness, of coordinating national notification when companies have data breaches. and updating some of the criminal penalties. when we first were working on comprehensive cybersecurity legislation, another main piece of this effort was on the critical infrastructure piece. now what i hear quite widely is that the d.h.s.led framework process that has pulled together a great number of critical infrastructure industry sectors is going very well and that as a result of that there is no immediate pressure for legislation in that area. now, there may not be an immediate need for legislation in that area, but of all the different areas that i menti
i would like to talk to you about cybersecurity. the majority leader has announced that he's going to try to have cyberweek here on the senate floor at some point. there's a lot of activity in the house. we have bipartisan bills that are pending on information sharing between federal agencies and the big communications providers. on agency public reporting of the cyberthreat to increase public awareness, of coordinating national notification when companies have data breaches. and updating some...
72
72
tv
eye 72
favorite 0
quote 0
i think the cybersecurity names are the way to go. cybersecurity? >> the industry is going to grow exponentially. you got to watch out the hype in particular stocks. make sure your research is grounded. >> we mentioned it, oil prices continue to surge. we can thank the weak dollar, but the houthi rebels, not the average gal often regular gas shot up 25 cents in the past month, probably near-term goes a lot higher. what that means for the american economy and your wallet in three minutes. stick around. [ male announcer ] whether it takes 200,000 parts, ♪ 800,000 hours of supercomputing time, 3 million lines of code, 40,000 sets of eyes, or a million sleepless nights. whether it's building the world's most advanced satellite, the space station, or the next leap in unmanned systems. at boeing, one thing never changes. our passion to make it real. ♪ gerri: all right., guys, we've got to blow the whistle here and open from investor playbook, don't look now, but crude oil continues to surge and there's a chance that it will derail or probably has derailed
i think the cybersecurity names are the way to go. cybersecurity? >> the industry is going to grow exponentially. you got to watch out the hype in particular stocks. make sure your research is grounded. >> we mentioned it, oil prices continue to surge. we can thank the weak dollar, but the houthi rebels, not the average gal often regular gas shot up 25 cents in the past month, probably near-term goes a lot higher. what that means for the american economy and your wallet in three...
125
125
May 20, 2015
05/15
by
WCAU
tv
eye 125
favorite 0
quote 0
the bad news is heard from a local cybersecurity expert, this site was a prime target. hacked, the morning after the pools closed probably not a coincidence. >> because of the election. >> reporter: rob davideo says the hackers who took the website down weren't after money or information. >> this is a very low disruption type of activity. >> reporter: in fact they even passed on some advice. >> your security is very low. patch your security. >> reporter: the international hacking group cybercommandos claimed responsibility for replacing the council's web page with this a reference to islam, but there is no way to know if they're muslim. >> we call this hacktivism. >> reporter: council says they have no idea who the hackers are, but insist all sensitive information is safe. the video says the group targets government school and tech companies. they probably use a web scanner to pick up a vulnerability. one missed software update can open up a hole. he says the use of an outside provider to manage the site may have also played a role. >> if you're not vigilant not on it o
the bad news is heard from a local cybersecurity expert, this site was a prime target. hacked, the morning after the pools closed probably not a coincidence. >> because of the election. >> reporter: rob davideo says the hackers who took the website down weren't after money or information. >> this is a very low disruption type of activity. >> reporter: in fact they even passed on some advice. >> your security is very low. patch your security. >> reporter: the...
233
233
May 18, 2015
05/15
by
FBC
tv
eye 233
favorite 0
quote 0
cybersecurity took control of a plane to show how vulnerable the system is. now the fbi wants answers. >>> putting down their guns and running. iraqi forces flee as isis seizes the key city of ramadi 80 miles from baghdad. >>> all in a day's work. hillary and bill raking in more than $25 million for speeches just since 2014. so much for dead broke. >>> the key to success as fewer women start new businesses. we find out what it takes from fashion designer leila rose. she joins us exclusively. even when they say it's not it is always about money. you're making money today. it is a record day on wall street. dow and s&p 500 hitting new lifetime highs. both currently on track for record closes. uncle carl writing an open letter to tim cook. icahn holding strong that apple remains undervalued saying the stock is worth $240 a share. that is almost double the current price. the letter also calling for apple to increase its share buyback program. oil prices dipping as crude exports, from saudi arabia hit a nine-year high. traders worried about a glut of supplies floo
cybersecurity took control of a plane to show how vulnerable the system is. now the fbi wants answers. >>> putting down their guns and running. iraqi forces flee as isis seizes the key city of ramadi 80 miles from baghdad. >>> all in a day's work. hillary and bill raking in more than $25 million for speeches just since 2014. so much for dead broke. >>> the key to success as fewer women start new businesses. we find out what it takes from fashion designer leila rose....
78
78
May 14, 2015
05/15
by
FBC
tv
eye 78
favorite 0
quote 0
. >>> cybersecurity summit like no other. we'll take you to the u.s.y academy at west point where top military and cyber leaders are charting strategies to stop the emerging threat. you don't want to miss this coming right up. the pursuit of healthier.ut) it begins from the second we're born. after all, healthier doesn't happen all by itself. it needs to be earned... every day... from the smallest detail to the boldest leap. healthier means using wellness to keep away illness... knowing a prescription is way more than the pills... and believing that a single life can be made better by millions of others. ♪ healthier takes somebody who can power modern health care... by connecting every single part of it. realizing cold hard data can inspire warmth and compassion... and that when technology meets expertise... everything is possible. for as long as the world keeps on searching for healthier... we're here to make healthier happen. optum. healthier is here. i've got a nice long life ahead. big plans. so when i found out medicare doesn't pay all my medical
. >>> cybersecurity summit like no other. we'll take you to the u.s.y academy at west point where top military and cyber leaders are charting strategies to stop the emerging threat. you don't want to miss this coming right up. the pursuit of healthier.ut) it begins from the second we're born. after all, healthier doesn't happen all by itself. it needs to be earned... every day... from the smallest detail to the boldest leap. healthier means using wellness to keep away illness......
56
56
May 24, 2015
05/15
by
FBC
tv
eye 56
favorite 0
quote 0
. >> get out the of basement with cybersecurity and fire eye. >> adam. >> vanguard total stock market. global exposure very inextensively. >> ben. >> adam has learned a lot from me. dvy, dividendeaeaeaeaeaeaeaeaeaeaeaeaeavy index funds. >> we continue now on fox. >>> the very same week we're seeing isis soldiers blitzing through iraq and security and a dozen people on our continent arrested for allegedly trying to join isis and terrorists overseas our president saying the immediate risk to our national security is this -- >> climate change constitutes a serious threat to global security. an immediate risk to our national security. and make no mistake, it will impact how our military defends our country. >> is he right? hi everybody. welcome to forbes on fox on this memorial day weekend. let's go in focus to find out. rich w
. >> get out the of basement with cybersecurity and fire eye. >> adam. >> vanguard total stock market. global exposure very inextensively. >> ben. >> adam has learned a lot from me. dvy, dividendeaeaeaeaeaeaeaeaeaeaeaeaeavy index funds. >> we continue now on fox. >>> the very same week we're seeing isis soldiers blitzing through iraq and security and a dozen people on our continent arrested for allegedly trying to join isis and terrorists overseas...
48
48
May 3, 2015
05/15
by
CSPAN2
tv
eye 48
favorite 0
quote 0
if it is of global company to mention in cybersecurity to say two words about that i spend a lot of time on that in the book many places it is completed -- completed there is room for cyberwarfare because nobody wants a cyberwarfare. but then there is cyberespionage that is something the chinese to aggressively so there is something you're pointing but we all do it. but then you deal with the internet and censorship with procurement of technology that gets into national security area with certain systems we will not buy from china because we want to protect hours but then cybertheft of intellectual property when i say this is the most divisive dangerous destabilizing economic issue it is hard to make economic system work and there are not easy answers i basically make two points we need to do a better job to protect our systems bin in addition we need a multilateral approach to design and the rules of the road with the enforcement mechanisms that are made more difficult the has been inflated so now would is understand -- harder to hold the high ground but i would say intellectual propert
if it is of global company to mention in cybersecurity to say two words about that i spend a lot of time on that in the book many places it is completed -- completed there is room for cyberwarfare because nobody wants a cyberwarfare. but then there is cyberespionage that is something the chinese to aggressively so there is something you're pointing but we all do it. but then you deal with the internet and censorship with procurement of technology that gets into national security area with...
86
86
May 21, 2015
05/15
by
WCAU
tv
eye 86
favorite 0
quote 0
. >>> speaking of cybersecurity, new jersey governor chris christie has signed an executive order totect the state from online threat. the order establishes what's calling integration style it's designed to improve information sharing, analyze and coordinate with federal law enforcement. >> i'm hoping the steps taken today will allow us to get in front of that problem and try to deal with it in a way that's not only creative but effective. >> and while christie has the threat of national security to federal government he said that local governments should be prepared. >>> two men accused of killing a philadelphia police officer. they presented some potential evidence in court but they did not show a graphic video of the shoot-out that happened in the gamestop store. ramon williams and carlton hipp waived their preliminary hearing. prosecutors say they both fired a hot that could have been a fatal one that's why they're both charged with attempted murder. >>> decision 2015 and two candidates for mayor of philadelphia are already off and running, jim kelly and melissa bailey. talked to
. >>> speaking of cybersecurity, new jersey governor chris christie has signed an executive order totect the state from online threat. the order establishes what's calling integration style it's designed to improve information sharing, analyze and coordinate with federal law enforcement. >> i'm hoping the steps taken today will allow us to get in front of that problem and try to deal with it in a way that's not only creative but effective. >> and while christie has the...
141
141
May 31, 2015
05/15
by
WJLA
tv
eye 141
favorite 0
quote 0
harry: a creative ececonomy that includes cybersecurity. we have great tent. were ting to do a shift t from national security work and realizg the same talented profesonals can move ovever and provide work on projects like how to secure mobile phone payment systems.s. d.c. should d be leading on that. one e of the challenge is weave this great city ere talentan work o things ke cycybersecurity y and medical technologygy. but we also ed to make s sure our transporortation system is working. we have an eyeye on metro. we need everyo to lelean in to ke sure we keep the barriers low and the good thingsbout the city on the up. recca: wingo the diplomat. i i know you want to say we have to collaborate andave in in the game. harry: we have to do that. rebecca: d dr. lawawrence, congratulations. haharry wingo, y you have your work cucut out for you. congratulations onour success so f far. when we return, a a company but on passion is the swee spot -- hits the sweet spot. there are a lot of channels on your tv but only so many you want to watch what if you could pay fo
harry: a creative ececonomy that includes cybersecurity. we have great tent. were ting to do a shift t from national security work and realizg the same talented profesonals can move ovever and provide work on projects like how to secure mobile phone payment systems.s. d.c. should d be leading on that. one e of the challenge is weave this great city ere talentan work o things ke cycybersecurity y and medical technologygy. but we also ed to make s sure our transporortation system is working. we...
45
45
May 7, 2015
05/15
by
CSPAN2
tv
eye 45
favorite 0
quote 0
secretary i've been interested in cybersecurity. i appreciate your emphasis and know you are out recruiting. one of the things that seems clear to me is the opportunity you mentioned that the response to the chairman's question the national guard to one of the things those components provide in regard to cybersecurity is personnel that have outside experience, that has the latest technologies and advanced and is available in their day jobs and bring that to protecting our country through the work they do then in the guard and reserve. i think you confirmed that in response to the chairman's question about the value of the relationship and what the guard and reserve can provide in cybersecurity. would you explain why that is important to you? >> it is important because cyberpervades everything we do. none of our equipment or our plan operates properly, just like much the rest of society without the web. and so having the best technology embedded in our military, defending it so others can disrupt it were exploits it using cyber, offe
secretary i've been interested in cybersecurity. i appreciate your emphasis and know you are out recruiting. one of the things that seems clear to me is the opportunity you mentioned that the response to the chairman's question the national guard to one of the things those components provide in regard to cybersecurity is personnel that have outside experience, that has the latest technologies and advanced and is available in their day jobs and bring that to protecting our country through the...
78
78
May 20, 2015
05/15
by
WCAU
tv
eye 78
favorite 0
quote 0
. >>> an order is in place to protect new jersey from cybersecurity threats. new jersey governor christie signed the order today. it is a new organization designed to improve information sharing and analyze threats and coordinate with federal law enforcement. >>> from our delaware bureau leaders in wilmington say the city is making progress in the crackdown on crime. last night mayor dennis williams announced the latest numbers. he said crime was down 14% from 2012 to 2014. williams also praised the new police foot patrols in high crime areas. critics are calling on the mayor to implement the recommendations, but williams has not committed to that. >>> millions of defective air bags now have to be fixed. tonight, we see how local repair shops are handling a very heavy load and what drivers need to do to make sure their car is safe. >>> plus bird flu worries. the steps pennsylvania is taking to keep the destructive disease out of the state. >>> and traffic trouble at the jersey shore. why this bridge to cause problems for people hitting the road this memorial d
. >>> an order is in place to protect new jersey from cybersecurity threats. new jersey governor christie signed the order today. it is a new organization designed to improve information sharing and analyze threats and coordinate with federal law enforcement. >>> from our delaware bureau leaders in wilmington say the city is making progress in the crackdown on crime. last night mayor dennis williams announced the latest numbers. he said crime was down 14% from 2012 to 2014....
213
213
May 18, 2015
05/15
by
WPVI
tv
eye 213
favorite 0
quote 0
. >>> to an alarming claim from a cybersecurity expert.says he took control of a passenger plane from his seat by hacking into the in-flight entertainment system. some experts questioning if that's even possible. and abc's gio benitez is covering the story from jfk airport in new york. gio, good morning. >> reporter: amy, good morning to you. the fbi is looking into this right now searching through all of its devices but even with doubt, officials are taking this very seriously. it's the scary claim making headlines this morning. a researcher for a cybersecurity firm chris roberts telling the fbi he pulled off a midair hack into a plane's in-flight entertainment system. now in a newly released affidavit fbi investigators say roberts told them he infiltrated the entertainment systems approximately 15 to 20 times from 2011 to 2014 and he claims he then overrode code on a plane's thrust management computer essentially the autopilot system causing one of the airplane engines to climb resulting in a lateral or sideways movement. >> if the infor
. >>> to an alarming claim from a cybersecurity expert.says he took control of a passenger plane from his seat by hacking into the in-flight entertainment system. some experts questioning if that's even possible. and abc's gio benitez is covering the story from jfk airport in new york. gio, good morning. >> reporter: amy, good morning to you. the fbi is looking into this right now searching through all of its devices but even with doubt, officials are taking this very seriously....
32
32
May 18, 2015
05/15
by
CSPAN2
tv
eye 32
favorite 0
quote 0
and we are going to put the numbers up as we talk about privacy, cybersecurity, those types of issues. you understand what is going on and what we are talking about. so the first line in your book democracy and privacy. >> yes, this is why we have a fourth amendment. our whole government is based on the idea of individual sovereignty. and after 9/11 we have this crazy idea that somehow government should have all of the power and we should beg for crumbs off the table. and that freedom is not a low tree that we have in the best of times, but that you need freedom in the worst of times. it was george washington warned us about this. it was the founders of our government they gave us checks and balances and a vest the different parts of the bill of rights. they said even though we are going to be the government and you have to watch as absolute power corrupts absolutely. and you have to have your zone of privacy and individual space and last year they say if you have a smart phone on you they cannot crack the code and use that information. that is a violation of the fourth amendment and
and we are going to put the numbers up as we talk about privacy, cybersecurity, those types of issues. you understand what is going on and what we are talking about. so the first line in your book democracy and privacy. >> yes, this is why we have a fourth amendment. our whole government is based on the idea of individual sovereignty. and after 9/11 we have this crazy idea that somehow government should have all of the power and we should beg for crumbs off the table. and that freedom is...
115
115
May 3, 2015
05/15
by
KNTV
tv
eye 115
favorite 0
quote 0
interesting, this is not an investment of ours but there's a female entrepreneur she is actually a cybersecurity expert but she's building a company with a recruiting platform to help remove unconscious bias around things like how does your job description read it turns out if you call a work environment collaborative versus competitive, way more women are going to apply. i wouldn't have -- as a woman, i wouldn't have known that. it's important to start taking these learnings and applying it. and, you know, using technology and wouldn't it be great if women entrepreneurs were the one to bring those to market? >> is there a little bit of an ecosystem among female ceos of startups where they might be investing in some of their employees that leave to start their own companies? i think at a higher level you have sandburg and marissa mayer, but i'm thinking it is gradual, change takes time but is there an encouraging sign in that front, women only investing in other women's startups? >> well, there have been a number of micro vcs, less than $100 million funds that has been started by women venture c
interesting, this is not an investment of ours but there's a female entrepreneur she is actually a cybersecurity expert but she's building a company with a recruiting platform to help remove unconscious bias around things like how does your job description read it turns out if you call a work environment collaborative versus competitive, way more women are going to apply. i wouldn't have -- as a woman, i wouldn't have known that. it's important to start taking these learnings and applying it....
35
35
May 27, 2015
05/15
by
CSPAN2
tv
eye 35
favorite 0
quote 0
you mentioned cybersecurity. i spent a lot of time on that in the book. there's there is a potential for cyber warfare which is very alarming. no country will is going to want cyber warfare. then there is cyber espionage and that's something the chinese do aggressively this finger-pointing there but we all do it. then you deal with the internet and censorship. there is cyber in terms of procurement of technology which gets into the national security area. there are certain systems we won't buy from china because we want to protect ours and then the last issue is cyber theft of intellectual property and i say i think that this is the most destabilizing economic issue because it gets at the theaters to people in the u.s. u.s. have and if china doesn't play fair. it's hard to make an economic system works with beth and i basically make to oversimplify two points. we need to do a better job and a the second, in addition to continuing to really push them hard, we need a multilateral approach where we work with other nations to design the rules of the road in t
you mentioned cybersecurity. i spent a lot of time on that in the book. there's there is a potential for cyber warfare which is very alarming. no country will is going to want cyber warfare. then there is cyber espionage and that's something the chinese do aggressively this finger-pointing there but we all do it. then you deal with the internet and censorship. there is cyber in terms of procurement of technology which gets into the national security area. there are certain systems we won't buy...
52
52
May 27, 2015
05/15
by
CSPAN2
tv
eye 52
favorite 0
quote 0
you mentioned cybersecurity and just to say a few words about that i spent a lot of time on that in the buck and a number of things completed the cyber area. the country whether it big it is destabilizing. then there's cyber espionage and that's something the chinese do too aggressively, we do it aggressively and other major companies, so there is finger-pointing but y'all do it. then you deal with the internet and censorship, that's an issue. there's cyber in terms of procurement of technology which gets into the national security area. there are certain systems we won't buy from china because we want to protect ours. then the last issue which is cyber theft of intellectual property and i would say in dealing with china i think that this is the most divisive dangerously destabilizing economic issue because it gets at the theaters that china doesn't play fair. it's hard to make an economic system work with and their are not easy answers. i basically make two points. first we need to do a better job of protecting our systems and second, i think in addition to continue to really push the
you mentioned cybersecurity and just to say a few words about that i spent a lot of time on that in the buck and a number of things completed the cyber area. the country whether it big it is destabilizing. then there's cyber espionage and that's something the chinese do too aggressively, we do it aggressively and other major companies, so there is finger-pointing but y'all do it. then you deal with the internet and censorship, that's an issue. there's cyber in terms of procurement of technology...
39
39
May 3, 2015
05/15
by
CSPAN2
tv
eye 39
favorite 0
quote 0
but, now you mentioned cybersecurity. i'll just a few words about that. i spent a lot of time on that in the book. a number of things get conflated in the cyber area. there's this cyber there's the potential for cyber warfare which is very alarming, okay and no country, whether it's big, the big establish country is going to want cyber warfare. it's destabilizing. then there is cyber espionage and that's something the chinese do aggressively. we do aggressively and there are other major countries, something appointing their but we all do it. then when you get, there's a cyber as they do with the internet and censorship. that's an issue. their cyber in terms of procurement of technology which gets into the national security area. there's a certain systems we won't buy from china because we want to write rightly protect ours and their systems they want. in the last issue which is cyber theft, intellectual property. and icy india with china that i think this is the most divisive, dangerous, destabilizing economic issue because it gets at the fierce the peopl
but, now you mentioned cybersecurity. i'll just a few words about that. i spent a lot of time on that in the book. a number of things get conflated in the cyber area. there's this cyber there's the potential for cyber warfare which is very alarming, okay and no country, whether it's big, the big establish country is going to want cyber warfare. it's destabilizing. then there is cyber espionage and that's something the chinese do aggressively. we do aggressively and there are other major...
128
128
May 22, 2015
05/15
by
FBC
tv
eye 128
favorite 0
quote 0
not even going to address this because typically health care does not approve the sophisticated cybersecurityocols. they are looking for baseline security approaches and then i can make a bunch of money out of stealing it then why not steal it. >> this is why feel that someone else is going to get hit. >> coming back to this last december you are right on point. in the last five years one third of the american population has had their health care information hacked. >> is that right? >> that is absolutely correct. >> it must be a sign of the times because your career is booming. >> that is absolutely right i have to thank you publicly for that because it were not for the opportunities of working with you that would not have come up. it will be airing on june 29 and it's about protecting america's women and families. neil: we knew that you are doing great. we thank you very much. in the meantime you may groan about having to answer e-mails about leaving the office, but some are actually doing over the coming up next. good. very good. you see something moving off the shelves and your first thou
not even going to address this because typically health care does not approve the sophisticated cybersecurityocols. they are looking for baseline security approaches and then i can make a bunch of money out of stealing it then why not steal it. >> this is why feel that someone else is going to get hit. >> coming back to this last december you are right on point. in the last five years one third of the american population has had their health care information hacked. >> is that...
259
259
May 15, 2015
05/15
by
CSPAN2
tv
eye 259
favorite 0
quote 0
two years ago they were designated to be the center of cybersecurity, an academic program. not have over 100 students seeking masters in this particular arena. my question is is there a great deal of cooperation between the private sector and academic sector in trying to innovate ways to continue to fight cybersecurity cracks anybody can address that. >> i would just be depends on other retailers who have sought such partnerships have found welcome partnerships. actually established in the cold the retail cyber intelligence sharing center and at the core that wrapped around it is an opportunity for educational opportunity. i know that group has some great partners already in the academic community looking for ways to identify ways to bring future chief intelligence security, information security officers up to the ranks and also to share information. >> it seems that would be a good partnership even though that's what over 80% of our commerce in cyber is in the cyber world is through the private sector. mr. dodge, let me ask you to speak to this question because as mr. brah
two years ago they were designated to be the center of cybersecurity, an academic program. not have over 100 students seeking masters in this particular arena. my question is is there a great deal of cooperation between the private sector and academic sector in trying to innovate ways to continue to fight cybersecurity cracks anybody can address that. >> i would just be depends on other retailers who have sought such partnerships have found welcome partnerships. actually established in...
172
172
tv
eye 172
favorite 0
quote 0
cybersecurity stocks are doing very well, of course take a look at fires boost the whole year revenueabout 8% at the moment, and the rest of the group is doing sole barracuda and cybersoftware, and don't forget cybersecurity is such a big target with target and home depot the company missed expectations and is down abouty s 13%. more of that. and why stop what you're doing to find a bathroom? with cialis for daily use, you don't have to plan around either. it's the only daily tablet approved to treat erectile dysfunction so you can be ready anytime the moment is right. plus cialis treats the frustrating urinary symptoms of bph, like needing to go frequently, day or night. tell your doctor about all your medical conditions and medicines, and ask if your heart is healthy enough for sex. do not take cialis if you take nitrates for chest pain as it may cause an unsafe drop in blood pressure. do not drink alcohol in excess. side effects may include headache, upset stomach, delayed backache or muscle ache. to avoid long-term injury, get medical help right away for an erection lasting more t
cybersecurity stocks are doing very well, of course take a look at fires boost the whole year revenueabout 8% at the moment, and the rest of the group is doing sole barracuda and cybersoftware, and don't forget cybersecurity is such a big target with target and home depot the company missed expectations and is down abouty s 13%. more of that. and why stop what you're doing to find a bathroom? with cialis for daily use, you don't have to plan around either. it's the only daily tablet approved to...
44
44
May 29, 2015
05/15
by
CSPAN2
tv
eye 44
favorite 0
quote 0
what we found is there is a cybersecurity debate that i am sure a lot if you are familiar with which people talk about the uniqueness of that environment and the things they say that make it different from anything else before is that you can attack remotely with great distance with limited capacity to rich tribute the attack. it is difficult as one said has disseminated down to the level of individuals in the thomas friedman sort of way that the world is flatter then you talk to people who do buy a security for a living to save is so unusual to attack over great distances with limited attribution and almost anybody with a reasonable grounds school couple proficiency then you realize they are describing the same set of the fax -- defects. so we tried to do is break through to a higher ground to describe the effect of technologies of mass empowerment to distribute the ability and and also disturbing their responsibility for defense and the more we work with us the more we ended up with a puzzle that i have to say having co-written the book i am still not completely sure i know the ans
what we found is there is a cybersecurity debate that i am sure a lot if you are familiar with which people talk about the uniqueness of that environment and the things they say that make it different from anything else before is that you can attack remotely with great distance with limited capacity to rich tribute the attack. it is difficult as one said has disseminated down to the level of individuals in the thomas friedman sort of way that the world is flatter then you talk to people who do...
542
542
May 28, 2015
05/15
by
FBC
tv
eye 542
favorite 0
quote 0
in march, a report from the government accountability officer said the irs made improvements to cybersecurity but were not good enough. here's the, quote -- certainly not the warning you want to hear there, melissa. melissa: no absolutely not. blake, thank you so much for the update. >>> president obama using visit to the national hurricane center today to warn that climate change will make storms more intense. but the ceo of exxonmobil isn't on the same page. rex tillerson telling shareholders the jury is still out on climate change pushed back calls for exxon to invest in renewable energy saying we choose not to lose money on purpose. my panel is back to discuss this one. jack people say attack him for not believing in climate change but he chooses not to lose money on purpose that's his legal duty. that's his fiduciary responsibility is to make money for shareholders. >> it is a fiduciary responsibility, and exxon is really an anomaly. if you look back over the past half century or more in the u.s. stock market, there's a curse when the company is the biggest company in america it suffers
in march, a report from the government accountability officer said the irs made improvements to cybersecurity but were not good enough. here's the, quote -- certainly not the warning you want to hear there, melissa. melissa: no absolutely not. blake, thank you so much for the update. >>> president obama using visit to the national hurricane center today to warn that climate change will make storms more intense. but the ceo of exxonmobil isn't on the same page. rex tillerson telling...