23
23
tv
eye 23
favorite 0
quote 0
i.t. security regulation that at some point you're running out of warnings and you just have to make government mandated regulations because the companies just don't want to listen what do you think needs to be done concretely i think in addition to the huge regulation that we have here in germany which only targets critical infrastructure that we have to go far beyond that and have to be working want to second i do security regulation and have is thank you very much for coming in today . the news just in a white house adviser says washington is considering additional sanctions against russia the u.s. had only just announced new ones that are already hitting some companies hod as well as affecting others that what even target. the u.s. sanctions announced on april sixth affect fourteen russian businesses and seven oligarchs among them oleg thierry pascoe who's been accused of interfering in the twenty sixteen u.s. election his company rules sol is the world's second largest producer of aluminum within a week of the announcement its stock fell by forty percent. but in that's not a one off market
i.t. security regulation that at some point you're running out of warnings and you just have to make government mandated regulations because the companies just don't want to listen what do you think needs to be done concretely i think in addition to the huge regulation that we have here in germany which only targets critical infrastructure that we have to go far beyond that and have to be working want to second i do security regulation and have is thank you very much for coming in today . the...
22
22
tv
eye 22
favorite 0
quote 0
i.t. security regulation that at some point you're running out of warnings and you just have to make government mandated regulations because the companies just don't want to listen what do you think needs to be done concretely i think in addition to the huge regulation that we have here in germany which only targets critical infrastructure that we have to go far beyond that and have to be working on a second i do security regulation and have is thank you very much for coming in today. well china and the u.s. in a trade war and while the chinese economy is looking resilient officials in beijing appear to be scrambling behind the scenes to appease washington with more promises this week of economic openness. the trade dispute with the u.s. may be grabbing the headlines but chinese consumers don't seem to be reading the papers they just keep on shopping. and real estate buyers keep on buying china's efforts to boost its domestic economy are bearing fruit world bank figures suggest exports now account for only twenty percent of economic output. to china is well positioned to respond to whatever cha
i.t. security regulation that at some point you're running out of warnings and you just have to make government mandated regulations because the companies just don't want to listen what do you think needs to be done concretely i think in addition to the huge regulation that we have here in germany which only targets critical infrastructure that we have to go far beyond that and have to be working on a second i do security regulation and have is thank you very much for coming in today. well...
70
70
Apr 15, 2018
04/18
by
KNTV
tv
eye 70
favorite 0
quote 0
the first start up i did secure i.t. i put my life savings on the line. >> you literally did it at your kitchen table with your wife. >> absolutely. it was a risk. i put most the money, a lot of must be in -- money in this company it was a good risk. i have a long way to go. finding the right opportunity at the right time and buildingsoming that solves the problem with disruptive technology. it's a disruptive nature that is really getting big customers to protect their internet and cloud access. we're proud to have all these big companies depend on us to enable their e commerce. >> you've had over start ups in the past. >> yeah. you had to face it by yourself. what was different this time for you? you decided to go public and not sell. it was the market opportunity or something different about yourself and you wanted to try to go public? >> a combination of both. at that time, the decision was different. so when they did the first start of secure i.t. it became pretty successful. wow. it was wonderful. can i do a start u
the first start up i did secure i.t. i put my life savings on the line. >> you literally did it at your kitchen table with your wife. >> absolutely. it was a risk. i put most the money, a lot of must be in -- money in this company it was a good risk. i have a long way to go. finding the right opportunity at the right time and buildingsoming that solves the problem with disruptive technology. it's a disruptive nature that is really getting big customers to protect their internet and...
42
42
tv
eye 42
favorite 0
quote 0
i.t. security regulation that at some point you're running out of warnings and you just have to make government mandated regulations because the companies just don't want to listen what do you think needs to be done concretely i think in addition to the huge regulation that we have here in germany which only targets critical infrastructure that we have to go far beyond that and have to be working on the second i did security regulation and have is thank you very much for coming in today. beijing is promising to open its auto industry to full foreign ownership in five years something that strange ties with washington and other trading partners for years electric vehicle ownership restrictions had to be eliminated this year followed by commercial vehicles and twenty twenty m. passenger vehicles two years later the current rules require foreign automakers in china to work through joint ventures with state owned companies that forces them to share technology with potential rivals. russian officials are making further moves to block people in the country from using the popular messenger app telegram
i.t. security regulation that at some point you're running out of warnings and you just have to make government mandated regulations because the companies just don't want to listen what do you think needs to be done concretely i think in addition to the huge regulation that we have here in germany which only targets critical infrastructure that we have to go far beyond that and have to be working on the second i did security regulation and have is thank you very much for coming in today....
137
137
Apr 12, 2018
04/18
by
CNBC
tv
eye 137
favorite 0
quote 0
enterprise and government agencies are having a difficult time secures their i.t. infrastructure their security defense is the sign around the perimeter being build around their infrastructure and that simply doesn't work today the vast majority of those have today what is called a high rip infrastructure part of their workload is in their own datacenters, the other part is a location facility and the other part is in a public cloud. to further complicate users are accessing infrastructure from everywhere, from an airplane, from starbucks, from home. having a perimeter does not work anymore because where is the perimeter? the perimeter doesn't exist anymore, right >> so what can you offer that is more sophisticated than a lot of the other companies that owe text that perimeter? >> so what happens today, in order for you to have it you have to do software define perimeter around that infrastructure what cyxtera, we have a number of services to help you. we are big believers in the physical datacenter and believe a robust cybersecurity defense really starts with a phy
enterprise and government agencies are having a difficult time secures their i.t. infrastructure their security defense is the sign around the perimeter being build around their infrastructure and that simply doesn't work today the vast majority of those have today what is called a high rip infrastructure part of their workload is in their own datacenters, the other part is a location facility and the other part is in a public cloud. to further complicate users are accessing infrastructure from...
287
287
Apr 2, 2018
04/18
by
KPIX
tv
eye 287
favorite 0
quote 0
i.t. security is very difficult. whether it's online shopping or in store shopping like happened here. every company, no matter what your business is, you have to think of yourself as a security company and a lot of people don't do that. >> people used to think online shopping was the thing you have to worry about. now it's clearly if you're in the store, that's just as dangerous. >> oh, yeah, people say i'm afraid to shop online, i'm just going to go to the store myself. this affects customers in the stores physically and we've seen this a couple times before, big breaches like the target one a few years ago. >> if you've been affected by this breach or let's just assume you're going to be affected some day what do you do? >> if you're using your credit card and you're worried about that, you want to keep an eye on statements. to give them a little bit of credit, the banks and the credit card companies are usually pretty upfront about watching out for weird and fraudulent charges on your credit cards and they'll let you know before you even notice most of the time. because they're the
i.t. security is very difficult. whether it's online shopping or in store shopping like happened here. every company, no matter what your business is, you have to think of yourself as a security company and a lot of people don't do that. >> people used to think online shopping was the thing you have to worry about. now it's clearly if you're in the store, that's just as dangerous. >> oh, yeah, people say i'm afraid to shop online, i'm just going to go to the store myself. this...
71
71
Apr 27, 2018
04/18
by
CSPAN3
tv
eye 71
favorite 0
quote 0
into the future, including providing adequate staffing to serve taxpayers and ensuring modern security i.t. systems to support our work for the nation. in my previous testimony to this committee, i noted the irs would need additional resources for fiscal '18 and '19 to ensure information with the tax system. we appreciate the additional millions of dollars approved by the omnibus bill which ensures we can move forward with critical activities in a timely manner and will be able to test our processing systems in the first quarter of fiscal '19 shortly before the filing season. finally, i should mention that yesterday treasury and omb reached agreement on a new framework for omb review of certain tax regulations which we believe meets the twin objectives of increasing economic analysis and review of tax rules while preserving timely tax guidance for taxpayers. mr. chairman and members of the committee, i look -- i'd be happy to take your questions. thank you. >> well, thank you. we appreciate your report and appreciate the hard work that you're doing. let me begin with last december congress
into the future, including providing adequate staffing to serve taxpayers and ensuring modern security i.t. systems to support our work for the nation. in my previous testimony to this committee, i noted the irs would need additional resources for fiscal '18 and '19 to ensure information with the tax system. we appreciate the additional millions of dollars approved by the omnibus bill which ensures we can move forward with critical activities in a timely manner and will be able to test our...
73
73
tv
eye 73
favorite 0
quote 0
i.t. this is a national security issue of the highest order.ave the biggest military. if things continue on the path we are currently on, we'll lose that position, and we'll lose it very fast, won't we. >> we already are losing it. if you look at purchasing power parity, guess what in the chinese economy overtook us two years ago. we slept through the sputnik moment. america woke one morning and there was a beep beep coming out of the stratosphere because the russians entered outer space. we had pour sputnik moment and they have already overtaken us in terms of purchasing parity. and the problem is, we are a democracy based upon three markets. what they want to happen in the politburo happens across all chinese industries. they are planning way out into the future. >> if you go to capitol hill or the white house we have increments of 15 minutes on the day planners. they are flange centuries. the next stop is 2049, the 100th anniversary of the communist revolution, and they say they will have taken us down. that's just around the corner, trish.
i.t. this is a national security issue of the highest order.ave the biggest military. if things continue on the path we are currently on, we'll lose that position, and we'll lose it very fast, won't we. >> we already are losing it. if you look at purchasing power parity, guess what in the chinese economy overtook us two years ago. we slept through the sputnik moment. america woke one morning and there was a beep beep coming out of the stratosphere because the russians entered outer space....
33
33
Apr 24, 2018
04/18
by
CSPAN3
tv
eye 33
favorite 0
quote 0
place over unclassified communication networks and you said in your written statement establishing security i.t. infrastructure for commercial industry must be a priority. can you walk me through the complex exposures and vulnerabilities you have when 90% of it happens in the commercial environment? >> senator, what i have been learning over time is many companies understand how vulnerable they are in the cyberspace. because i bridge the gap between the authorities that are invested in u.s. cyber command and the authorities inherent in the department of homeland security to protect representatively the dot-com and different domains, because i live in that space, we've had a series of cyber round table s where we've invited in academics and hackers to help us understand the problem better. in one of those round tables are a series of security officers in corporate america said that they cannot get into see the board or can they get in to see the ceo to talk about the problem. that's noter company but it's at least a few that don't understand the severity of the problem and even if they understan
place over unclassified communication networks and you said in your written statement establishing security i.t. infrastructure for commercial industry must be a priority. can you walk me through the complex exposures and vulnerabilities you have when 90% of it happens in the commercial environment? >> senator, what i have been learning over time is many companies understand how vulnerable they are in the cyberspace. because i bridge the gap between the authorities that are invested in...
434
434
Apr 9, 2018
04/18
by
KPIX
tv
eye 434
favorite 0
quote 0
steve sandvoss showed us the voter registration website where the hackers exploited a security flaw to get in. his i.tam determined the attackers had been in their system, unseen, for three weeks. they only noticed when the hackers suddenly ramped up their attack and, in just a couple of hours, scooped up bits of information on up to 90,000 voters; complete records of 3,500. his engineers upgraded the firewall and plugged the website holes. that stopped the data heist, but not the attack. >> sandvoss: the hits continued, even though they weren't penetrating. the logs revealed that about a million and a half hits were coming in. >> whitaker: a million and a half? >> sandvoss: yes. yeah, five queries per second for a period of approximately 30 days. >> whitaker: this almost seems like they wanted to be noticed? >> sandvoss: the only thing they didn't do is identify themselves as "the russians." >> whitaker: sandvoss says he suspected the hackers wanted to sow doubt about the integrity of the vote. illinois notified the f.b.i. >> anthony ferrante: what illinois discovered set off a chain of events that t
steve sandvoss showed us the voter registration website where the hackers exploited a security flaw to get in. his i.tam determined the attackers had been in their system, unseen, for three weeks. they only noticed when the hackers suddenly ramped up their attack and, in just a couple of hours, scooped up bits of information on up to 90,000 voters; complete records of 3,500. his engineers upgraded the firewall and plugged the website holes. that stopped the data heist, but not the attack....
99
99
Apr 22, 2018
04/18
by
KNTV
tv
eye 99
favorite 0
quote 1
security professionals. >> all veterans enrolled had to have some computer science or i.t. background. goal is now to get the graduates into the workforce. >>> we're also following a developing story out of sonoma county. police are still searching for a teenager who allegedly stabbed another teen to death. here's a photo of the suspect, anthony eibok, accused of stabbing a 19-year-old man after noon yesterday. the suspect and victim got into a fight after a party. police say the suspect got away in a maroon bmw and should be considered armed and dangerous. >>> no, that wasn't fog hanging over golden gate park friday. thousands gathered to take a puff in celebration of april 20th, better known as 4/20. this is also the first year recreational pot is legal in california. as you might imagine, the day was pretty mellow but we're learning of some problems on the roads, san francisco police department says officers arrested three people for driving under the influence. the california highway patrol is releasing its arrest numbers tomorrow. many people omted to take public transportation, b
security professionals. >> all veterans enrolled had to have some computer science or i.t. background. goal is now to get the graduates into the workforce. >>> we're also following a developing story out of sonoma county. police are still searching for a teenager who allegedly stabbed another teen to death. here's a photo of the suspect, anthony eibok, accused of stabbing a 19-year-old man after noon yesterday. the suspect and victim got into a fight after a party. police say the...
453
453
Apr 25, 2018
04/18
by
KGO
tv
eye 453
favorite 0
quote 0
i.t. guy." who else do we have there? oh, "the uncle." "casual batman" is here. "the securityian of the galaxy" is here, guillermo. >> guillermo: yeah! >> jimmy: we're surrounded by heroism everywhere. tonight black widow, drax, loci, general akoye and the hulk are with us. this movie "infinity war" is part one of the two-part culmination of 18 films in the marvel cinematic universe which makes it the longest committed relationship most comic book fans have ever had. [ laughter ] it's meaningful. the premiere of the movie was held last night across the street from us. it was a big hit. a huge hit. people in the theater were crying during the movie. you know, war is an emotional thing. even when the soldiers are wearing leotards, you can be overcome by emotion. the president and the first lady tonight are busy. they're playing host to the president of france, emmanuel macron, and his wife, bridget. they are here for an official three-day state visit. this is the first official state visit since donald trump took office and the trumps welcome the macrons on the the white house t
i.t. guy." who else do we have there? oh, "the uncle." "casual batman" is here. "the securityian of the galaxy" is here, guillermo. >> guillermo: yeah! >> jimmy: we're surrounded by heroism everywhere. tonight black widow, drax, loci, general akoye and the hulk are with us. this movie "infinity war" is part one of the two-part culmination of 18 films in the marvel cinematic universe which makes it the longest committed relationship most...
177
177
Apr 30, 2018
04/18
by
KQED
tv
eye 177
favorite 0
quote 0
i.te card and pin code to cr what amounts to a digital signature. it's a series of numbers with a timestamp. erious about cyber security. a main way it protects digital information is with technology called blockchain. it's a way of decentralizing and authenticating data to prevent hacking. it's most famously used by theyp currency, bitcoin. estonia is the first country to use it on a national level. it just sounds like so many things could go wrong. an potentially it could but when the data is correcyou only have correct data in one place and everyone is responsible for keeping their data correct then it's much easier. >> rorter: and making life easier is exactly the goal of this e-society. esynians we talked to say t like and trust it. >> i don't need to remem lr to remember of numbers or anything so it's easy to use. >> for me i think it's safe to use this. >> reporter: you have faith in thsystem. >> yes. >> reporter: at lift 99, where entrepreneurs can rent office space and network, we met american yuriy mikitchenko. he moved from oregon to estonia for love, his fiance is estonian, but he's also quite smitten with h
i.te card and pin code to cr what amounts to a digital signature. it's a series of numbers with a timestamp. erious about cyber security. a main way it protects digital information is with technology called blockchain. it's a way of decentralizing and authenticating data to prevent hacking. it's most famously used by theyp currency, bitcoin. estonia is the first country to use it on a national level. it just sounds like so many things could go wrong. an potentially it could but when the data is...
35
35
Apr 21, 2018
04/18
by
BLOOMBERG
tv
eye 35
favorite 0
quote 0
security vendors selling the basic systems will thrive. cybersecurity is one of the most interesting spend areas in i.t.ive to other sectors because the threat landscape constantly changes. in the old pockets so alongside the hot, new, bus products -- buzz products. caroline: i know cyber i.t. departments -- and what about the hot area of ai helping fight cybersecurity? where d.c. interesting companies coming from and are you looking to invest in them? -- where do you see interesting companies coming from? max: data is an ingredient for ai to work. yet people that are under threat. you have people are in need, therefore they will rely on machines to take over some of that workers is being defensive about it. and yet the willingness to work with things that are not get 100%. the threat is so real that a lot of times customers are willing to work with products that are not in the startup phase. there is a former cybersecurity team that is working on an ai-based part as the frontline in response. that idea is the ai helps handle the first level of defense. caroline: response software for example, does it e
security vendors selling the basic systems will thrive. cybersecurity is one of the most interesting spend areas in i.t.ive to other sectors because the threat landscape constantly changes. in the old pockets so alongside the hot, new, bus products -- buzz products. caroline: i know cyber i.t. departments -- and what about the hot area of ai helping fight cybersecurity? where d.c. interesting companies coming from and are you looking to invest in them? -- where do you see interesting companies...
73
73
Apr 13, 2018
04/18
by
CSPAN
tv
eye 73
favorite 0
quote 0
act, sponsored by representative mike bishop this bill would boost cyber security and other i.t. systems in the i.r.s. to ensure the agency serves all taxpayers effectively and efficiently. mr. speaker, i look forward to the house passing all these critical bills without delay. with that, i thank my friend and i yield back. mr. hoyer: i thank the gentleman for that information. i am constrained to observe that from my perspective, it will be the last year that we will not start creating extraordinarily more debt for our country but that aside, let me ask the gentleman a couple of questions. first of all, there has been discussion in the press, certainly, and system discussion in the congress about a possibility of a rescission package. as the gentleman knows, both he and i, the speaker, leader pelosi, mr. mcconnell and the white house work very, very hard on reaching agreements so that some ld pass an omnibus weeks ago. that omnibus was the result of some very hard bargaining and negotiations. and tradeoffs. certainly not -- i don't think anybody was pleased with everything that
act, sponsored by representative mike bishop this bill would boost cyber security and other i.t. systems in the i.r.s. to ensure the agency serves all taxpayers effectively and efficiently. mr. speaker, i look forward to the house passing all these critical bills without delay. with that, i thank my friend and i yield back. mr. hoyer: i thank the gentleman for that information. i am constrained to observe that from my perspective, it will be the last year that we will not start creating...
123
123
Apr 18, 2018
04/18
by
CSPAN
tv
eye 123
favorite 0
quote 1
security threats. --the nse to committee committee developed a bipartisan bill that will --the committee developed a bipartisan bill that will improve the i.r.s. i.t. system. the 21st century i.r.s. act will of the engthen the role i.r.s. chief information officer. willimportantly, h.r. 5445 protect taxpayers' information and fight identity theft and tax refund fraud. the 21st century i.r.s. act addresses some of the most commonsense taxpayer service in i.t. challenges. it also continued to work of the former i.r.s. commissioner, who took steps to bring government and industry together to address some of these issues. mr. speaker, make no mistake, much more is needed. as we all know, identity theft and tax fraud continue to challenge tax administration. congress cut the agency budget by nearly $1 billion over the past eight years has not helped. we all understand the i.r.s. is in desperate need of more funding, and more staff. these reductions harm both taxpayer service and tax administration. unfortunately, the chickens are coming home to roost. i know something about chickens coming home to roost. i used to raise chickens. and showing the nation
security threats. --the nse to committee committee developed a bipartisan bill that will --the committee developed a bipartisan bill that will improve the i.r.s. i.t. system. the 21st century i.r.s. act will of the engthen the role i.r.s. chief information officer. willimportantly, h.r. 5445 protect taxpayers' information and fight identity theft and tax refund fraud. the 21st century i.r.s. act addresses some of the most commonsense taxpayer service in i.t. challenges. it also continued to...
99
99
Apr 10, 2018
04/18
by
CSPAN
tv
eye 99
favorite 0
quote 0
security. afr a concerning report from the department of transportatios specto genal thashowed inefficiencies, it appeared rapidly.nges needo be made they gained full rponsibility and coro of the i.t. system and it lacks any cybersecurity. the imovents needed include basic building ocks such a changes to policand procedures. the s.t.b. is incurvered by a number of -- encumbered by a number of wknesse summaryf the bill is, it requires the s.t.b., the surface transportation board, to cate a timeline and plan to implement rmendatio made by the d.o.t., office of inspector geral, in their report. this requires the surace transportation board to annuallypdate congress on its progress until completion, until it has effectively compleed updating. this bill ensures tht the surfactransportation boa adesses these deficiencies so the agency can reduce the risk of compromise to this ritical informationystem. i believe thibill will improve the reserve the balance of my time. the speaker pro tempore: the gentleman reserves. the gentleman from massachusetts is recognized. mr. capuano: thank you, mr. speaker. i yield myself such time as i may consume. the speaker pro tempore: the gentleman is reco
security. afr a concerning report from the department of transportatios specto genal thashowed inefficiencies, it appeared rapidly.nges needo be made they gained full rponsibility and coro of the i.t. system and it lacks any cybersecurity. the imovents needed include basic building ocks such a changes to policand procedures. the s.t.b. is incurvered by a number of -- encumbered by a number of wknesse summaryf the bill is, it requires the s.t.b., the surface transportation board, to cate a...
200
200
Apr 3, 2018
04/18
by
FOXNEWSW
tv
eye 200
favorite 0
quote 0
i.t. aide and his family accused hacking. that includes former dnc chair debbie wasserman schultz. she chose not to vet imran awan and several of his family members using a loophole in the house securitywrote the story. hears been following live from our nation's capitol. luke, remind folks what this guy and his family did. >> steve the democrats have no room to talk about cyber meddling and russia without addressing the deeply disturbing relationship with this guy. after he started working for wasserman schultz, a number of democrats hired his whole family. a house inspector general determined shortly before the 2016 election he had unauthorized access to data. he was impersonating congressman and funneling data off the house network and members who previously fired him or never worked for him at all this is huge deal. this is a hack on congress. steve: it is. members of congress up on the board right there, who knew of the problems and they still hired the guy! >> you would do more vetting when you hire a babysitter than the democrats did when they decided to hire pakistani citizens and give them access to all their data and emails for one in five house democrats including three mem
i.t. aide and his family accused hacking. that includes former dnc chair debbie wasserman schultz. she chose not to vet imran awan and several of his family members using a loophole in the house securitywrote the story. hears been following live from our nation's capitol. luke, remind folks what this guy and his family did. >> steve the democrats have no room to talk about cyber meddling and russia without addressing the deeply disturbing relationship with this guy. after he started...