40
40
May 3, 2016
05/16
by
CSPAN2
tv
eye 40
favorite 0
quote 0
rick weber, inside the cybersecurity. you mentioned critical document you're working on within the administration in the near future you will be publishing them. our day on sharing within the government or the private sector, and how they relate to liability relief under the cybersecurity law? >> with respect to the question of liability, we already and the department of homeland security published a number of documents, and we, of course, i think '02 the public -- we owe to the public educational materials. i think that the documents that we're working on him and not to get too far out in front of the administration and the probably already have achieved that, but i think it really speaks to how we are organized within the government and how we will use our resources in the best service of the public interest. we have heard from the private sector who are we supposed to call if, in fact, we suffer a cyber event? we, of course, want to provide clarity in response to that question. and in an ever increasing arena of change,
rick weber, inside the cybersecurity. you mentioned critical document you're working on within the administration in the near future you will be publishing them. our day on sharing within the government or the private sector, and how they relate to liability relief under the cybersecurity law? >> with respect to the question of liability, we already and the department of homeland security published a number of documents, and we, of course, i think '02 the public -- we owe to the public...
184
184
May 10, 2016
05/16
by
CSPAN3
tv
eye 184
favorite 0
quote 1
reductions in the cybersecurity risk. we're focusing in the private sector for increasing our capacity in these two key areas. how do we demonstrate to the private sector the value of automated cybersecurity threat information sharing and how do we actually promulgate and measure the effectiveness of best practices being adopted across the private sector and in particular across the nation's critical infrastructure. >> general hoover, when you think of the national guard, they embody the citizen soldier. we can all look back to major crises and recognize that the role that the guard plays in mitigating the consequences of these sorts of attacks. where do you see the national guard fitting into our overall cybersecurity equation? and what more can or should companies and state and local authorities know about the guard's role here? >> sure. so i think there is a couple of things. first, the days of putting a lot of money into cyber to build a wall are over. we all have to kind of get our arms around the -- >> you mean we ca
reductions in the cybersecurity risk. we're focusing in the private sector for increasing our capacity in these two key areas. how do we demonstrate to the private sector the value of automated cybersecurity threat information sharing and how do we actually promulgate and measure the effectiveness of best practices being adopted across the private sector and in particular across the nation's critical infrastructure. >> general hoover, when you think of the national guard, they embody the...
99
99
May 9, 2016
05/16
by
CSPAN3
tv
eye 99
favorite 0
quote 0
the sector as a whole has really raised its game in terms of cybersecurity. given the recent cyber attacks in the ukraine, think there could be some very valuable lessons in terms of the implications here in the united states. last and certainly not least is scott kaine, at delta risk. he is a newly appointed ceo there, so congratulations on that. and thank you for helping sponsor our event. >> sure. >> what i thought i would do is jump right into questions. we want to save time for the audience to engage in a q & a as well. kiersten, i thought we'd start with you. since the president recently concluded there was a need for a commission to examine cybersecurity issues, obviously the scale and scope is quite broad, but what are the priorities that you guys are looking at? what is it you hope to accomplish, and what is it you hope to accomplish in a relatively short order of time? >> right. so i think that the short order of time, as i have said, works to our benefit. i've said it's the marathon within the sprint, the sprint within the marathon. either way it's
the sector as a whole has really raised its game in terms of cybersecurity. given the recent cyber attacks in the ukraine, think there could be some very valuable lessons in terms of the implications here in the united states. last and certainly not least is scott kaine, at delta risk. he is a newly appointed ceo there, so congratulations on that. and thank you for helping sponsor our event. >> sure. >> what i thought i would do is jump right into questions. we want to save time for...
47
47
May 11, 2016
05/16
by
CSPAN3
tv
eye 47
favorite 0
quote 0
reductions in the cybersecurity risk. we're focusing in the private sector for increasing our capacity in these two key areas. how do we demonstrate to the private sector the value of automated cybersecurity threat information sharing and how do we actually promulgate and measure the effectiveness of best practices being adopted across the private sector and in particular across the nation's critical infrastructure. >> general hoover, when you think of the national guard, they embody the citizen soldier. we can all look back to major crises and recognize that the role that the guard plays in mitigating the consequences of these sorts of attacks. where do you see the national guard fitting into our overall cybersecurity equation? and what more can or should companies and state and local authorities know about the guard's role here? >> sure. so i think there is a couple of things. first, the days of putting a lot of money into cyber to build a wall are over. we all have to kind of get our arms around the -- >> you mean we ca
reductions in the cybersecurity risk. we're focusing in the private sector for increasing our capacity in these two key areas. how do we demonstrate to the private sector the value of automated cybersecurity threat information sharing and how do we actually promulgate and measure the effectiveness of best practices being adopted across the private sector and in particular across the nation's critical infrastructure. >> general hoover, when you think of the national guard, they embody the...
67
67
May 25, 2016
05/16
by
CSPAN2
tv
eye 67
favorite 0
quote 0
yes just by sharing you receive a liability protection the act of sharing is protected under the cybersecurity act but as we were talking earlier so for all the deadlines in the legislation were very aggressive people or working very late hours but the next deadline was first to publish the initial draft so we're on track to meet those deadlines either now or shortly to have a workshop on june 9th to go over where we are to show final drafts and the listener feedback i do expect us to meet that deadline to finalize documents. i think we were pretty close on the mark from what i heard from industry there are very clear and helpful but the biggest feedback actually they want the documents to cover the topic we didn't intend or expected to cover the liability protections for sharing with each other we got outside of that scope but we will address that says is a holder to get more information on that. >> we're going back and forth right now but we have shared these documents we have published them listening to comments and other industry groups hit it will be in early june. >> do we have one more
yes just by sharing you receive a liability protection the act of sharing is protected under the cybersecurity act but as we were talking earlier so for all the deadlines in the legislation were very aggressive people or working very late hours but the next deadline was first to publish the initial draft so we're on track to meet those deadlines either now or shortly to have a workshop on june 9th to go over where we are to show final drafts and the listener feedback i do expect us to meet that...
65
65
May 25, 2016
05/16
by
CSPAN2
tv
eye 65
favorite 0
quote 1
yes just by sharing you receive a liability protection the act of sharing is protected under the cybersecurityact but as we were talking earlier so for all the deadlines in the legislation were very aggressive people or working very late hours but the next deadline was first to publish the initial draft so we're on track to meet those deadlines either now or shortly to have a workshop on june 9th to go over where we are to show final drafts and the listener feedback i do expect us to meet that deadline to finalize documents. i think we were pretty close on the mark from what i heard from industry there are very clear and helpful but the biggest feedback actually they want the documents to cover the topic we didn't intend or expected to cover the liability protections for sharing with each other we got outside of that scope but we will address that says is a holder to get more information on that. >> we're going back and forth right now but we have shared these documents we have published them listening to comments and other industry groups hit it will be in early june. >> do we have one more q
yes just by sharing you receive a liability protection the act of sharing is protected under the cybersecurityact but as we were talking earlier so for all the deadlines in the legislation were very aggressive people or working very late hours but the next deadline was first to publish the initial draft so we're on track to meet those deadlines either now or shortly to have a workshop on june 9th to go over where we are to show final drafts and the listener feedback i do expect us to meet that...
86
86
May 16, 2016
05/16
by
CSPAN
tv
eye 86
favorite 0
quote 0
i represent san antonio, a national leader in the cybersecurity field. institutions in san antonio do cutting edge cyberwork that keeps our nation safe. for example, the university of texas at san antonio leads the national cybersecurity preparedness consortium, which helps communities across the nation improve their cyberdefenses. it's critical that localities understand the impact cyber teches could have on their ability to function and are prepared to prevent, detect, respond to and recover from harmful cyber incidences. they are educating communities about these cyberthreats and helping them develop the defenses they need to successfully withstand a cyberemergency. this legislation allows consortiums like utsa's to work more closely with d.h.s. to address cybersecurity risks and incidents at the state and local level. this collaboration will bolster our cyberpreparedness and keep us one step ahead of cyberattackers. mr. speaker, again, i'd like to thank the homeland security committee's leadership for their partnership on this legislation and also all
i represent san antonio, a national leader in the cybersecurity field. institutions in san antonio do cutting edge cyberwork that keeps our nation safe. for example, the university of texas at san antonio leads the national cybersecurity preparedness consortium, which helps communities across the nation improve their cyberdefenses. it's critical that localities understand the impact cyber teches could have on their ability to function and are prepared to prevent, detect, respond to and recover...
80
80
May 27, 2016
05/16
by
CSPAN3
tv
eye 80
favorite 0
quote 0
and i really thank the congress for the cybersecurity act of 2015. which gave private sector companies liability protection for sharing this information with the government. we formally -- the secretary formally certified our system as live on march 16th. and since then we've got about 30 entities right now, companies, federal agencies, state and local governments. part of that system, we're growing by a handful of companies every week. we've shared thousands of indicators to date. but obviously we're still in the early stages of that system. but it's working. it's live. and people are receiving value from it already. what i would say is my charge to you and the audience, is the only way we collectively succeed with this system is if we all put information in and take advantage of the information that's in it. my message when i'm out talking to companies now is we built it, we've given you the tool that you've asked for, i need you to join, i need to you share back with us. that's really the next stage of where we are on the automated indicator sharin
and i really thank the congress for the cybersecurity act of 2015. which gave private sector companies liability protection for sharing this information with the government. we formally -- the secretary formally certified our system as live on march 16th. and since then we've got about 30 entities right now, companies, federal agencies, state and local governments. part of that system, we're growing by a handful of companies every week. we've shared thousands of indicators to date. but...
67
67
May 9, 2016
05/16
by
CSPAN3
tv
eye 67
favorite 0
quote 0
and front and center in those dialogues was the subject of cybersecurity. of course, encryption arose, but the sharing of information and the development of institutional responses to a harm that we are all exposed to was upper most in our minds and upper most in our discussions. and so i hope that we will be able to work together to build a cybersecurity infrastructure that parallels the success that we enjoy and that we execute in the counter-terrorism and broader national security structure, and i appreciate your time and i look forward to fielding your questions in the minutes ahead. thank you very much. [ applause ] >> thank you very much. >> permit me, if i may, deputy secretary, to pose two questions. and then open it to the audience for questions themselves. so let me switch to the counter-terrorism. post paris and brussels, what has become very evident is that there have been enclaves of isolated communities within those -- throughout europe really but specifically in brussels that have permitted the radicalization on a community basis of some membe
and front and center in those dialogues was the subject of cybersecurity. of course, encryption arose, but the sharing of information and the development of institutional responses to a harm that we are all exposed to was upper most in our minds and upper most in our discussions. and so i hope that we will be able to work together to build a cybersecurity infrastructure that parallels the success that we enjoy and that we execute in the counter-terrorism and broader national security structure,...
70
70
May 20, 2016
05/16
by
CSPAN
tv
eye 70
favorite 0
quote 0
cybersecurity are, you know, global. physical location is one element but probably in the case of cybersecurity, not the most important in terms of concerns, it's more about the secure by design sort of notion, you know what have you put in place and how well is it implemented. so those would be more my primary concerns, in some cases the physical location. mr. lynch: my concern is obviously the communist government of vietnam is going to require access. so that was my concern. you suffered enough. i want to yield back. thank you. mr. meadows: thank you. i want to thank all the bnses -- witnesses for being here today and if there is no other business, the subcommittee stands adjourned. [captioning performed by national captioning institute] [captions copyright national able satellite corp. 2016] >> up next vice president joe biden speaks about his political career. then an event with donald trump in new jersey. >> this weekend we'll explore the history and literary life of haties birg, mississippi. don't hurry me down to hadies. tells the story through the eyes of soldiers and their families and how important it was for
cybersecurity are, you know, global. physical location is one element but probably in the case of cybersecurity, not the most important in terms of concerns, it's more about the secure by design sort of notion, you know what have you put in place and how well is it implemented. so those would be more my primary concerns, in some cases the physical location. mr. lynch: my concern is obviously the communist government of vietnam is going to require access. so that was my concern. you suffered...
32
32
May 3, 2016
05/16
by
CSPAN2
tv
eye 32
favorite 0
quote 0
i think today the reason is cybersecurity. since it is software-based. but there is technology available that could be useful in this situation. >> i think we will open up to questions now, if the people who want to jump into the conversation with the question. please identify yourself and ask a question or icy in the front row here. >> -- i see in the front row here. >> my name is john gardner, h.e.w. alumnus, former naval intelligence officer but so many years ago is irrelevant. might interest is us versus others. and how this comes up in layered forms. i'm thinking about the general reluctance of the u.s. to what may anybody from syria. this is a political issue now. in europe, there's a great reluctance to bring in muslims, particularly in the case of france, say, from algeria but generally in europe from syria or other conflict areas. so one of the solutions is to pay turkey to take in a whole lot of the refugee flow. so europe and the u.s. don't have to deal with it. but money only deals with a small part of the problem. the food, clothing, shelter
i think today the reason is cybersecurity. since it is software-based. but there is technology available that could be useful in this situation. >> i think we will open up to questions now, if the people who want to jump into the conversation with the question. please identify yourself and ask a question or icy in the front row here. >> -- i see in the front row here. >> my name is john gardner, h.e.w. alumnus, former naval intelligence officer but so many years ago is...
83
83
May 1, 2016
05/16
by
WJLA
tv
eye 83
favorite 0
quote 0
the cybersecurity, of -- did cybersecurity come up or no? >> issues. what is politically viable relative your allies and so on. up --one thing that came we didn't show it in the film but came up quite a bit -- was nuclear spending. on the streets some of the conversations we had, people always said cuts to nuclear spending. you mentioned that before the break. talk to me more about that. why do you think that was something that was highlighted? >> that was cut 13%, nuclear weapons. americans understand we have lots and lots of nuclear weapons that are tremendously destructive, and they don't see a lot of scenarios where those weapons make sense. jill: it is interesting, so much of public opinion is about perception and what they see and read. in your survey they provide a lot of context. with the f 35 we see it in the headlines so often. if he or not, it is a poster child of def spending run amok. how much are people influenced by what they read in the media? are these well-informed responses? >> the average person isn't particularly well-informed but w
the cybersecurity, of -- did cybersecurity come up or no? >> issues. what is politically viable relative your allies and so on. up --one thing that came we didn't show it in the film but came up quite a bit -- was nuclear spending. on the streets some of the conversations we had, people always said cuts to nuclear spending. you mentioned that before the break. talk to me more about that. why do you think that was something that was highlighted? >> that was cut 13%, nuclear weapons....
62
62
May 31, 2016
05/16
by
CSPAN2
tv
eye 62
favorite 0
quote 0
the committee established for basic priorities. order security. we feel 18 hearings on some aspect of our unsecure border. cybersecurity. we passed the federal cybersecurity enhancement act of a good measure. protecting our critical interest lecture them are particularly terror attack on a cyberattack from emp mgm v. finally, what can we do as a nation to protect our homeland against islamic terrorists another violent extremists. the hearing is about the last priority, addressing islamic terror and trying to secure our homeland and keep it safe. not an easy task. every last one of these hearings goal is primarily to layout of reality as best we can so that we can identify, find the problem and it happened so we can work towards some common sense solutions, recognizing in this realm the solutions are very, very difficult and they will take quite some time to finally defeat the islamic terror. i just want to layout a couple couple facts developed by staff, recognizing these are estimates. there's nothing hard and fast, but it gives us some indication of what we are dealing with when we talk about isis. apparently, the mont
the committee established for basic priorities. order security. we feel 18 hearings on some aspect of our unsecure border. cybersecurity. we passed the federal cybersecurity enhancement act of a good measure. protecting our critical interest lecture them are particularly terror attack on a cyberattack from emp mgm v. finally, what can we do as a nation to protect our homeland against islamic terrorists another violent extremists. the hearing is about the last priority, addressing islamic terror...
98
98
May 25, 2016
05/16
by
FOXNEWSW
tv
eye 98
favorite 0
quote 0
secretary of state and her staff or, quote, slow to recognize and manage effectively the legal requirements and cybersecuritywith electronic data communications as pertain to the most senior leadership. a lot in here, 78 pages, this investigation into hillary clinton and her emails. (engine winding up) (pilot talking to tower on radio) once you get out here... there's just one direction... forward. one time: now. and there's just one sound. you and us... together. telling the world... we're coming for you. martha: a 78 page report has been released dealing with the inspector general's look at hillary clinton and other secretaries of state in claims they poorly managed electronic communication. and her failures on this front are indeed more serious that she and her staff failed to recognize and manage effectively the legal requirements and cybersecurity risks associated with electronic data communications so we have more on this throughout the rest of the program. judge andrew napolitano will sit down with us in a moment. bill: senator john soon from south dakota came to talk about other matters. let's start
secretary of state and her staff or, quote, slow to recognize and manage effectively the legal requirements and cybersecuritywith electronic data communications as pertain to the most senior leadership. a lot in here, 78 pages, this investigation into hillary clinton and her emails. (engine winding up) (pilot talking to tower on radio) once you get out here... there's just one direction... forward. one time: now. and there's just one sound. you and us... together. telling the world... we're...
24
24
May 14, 2016
05/16
by
CSPAN2
tv
eye 24
favorite 0
quote 0
cybersecurity our global. physical location is one element that probably in the case of cybersecurity not the most dispositivein terms of concerns i would have. it's more about this secure by design sort of notion, would it be put in place and how well is it implemented and so one? so those would be more my primary concerns. >> my concern is obviously the communist government of vietnam is going to require access. i have -- i will yield back. .. [inaudible] [inaudible] [inaudible] [inaudible] [inaudible] [inaudible] [inaudible] [inaudible] [inaudible] [inaudible] [inaudible] [inaudible] [inaudible] [inaudible] [inaudible] [inaudible] on night on eight eastern on c-span's q&a. >> now, army colonel for inherent result brief reporter on the pentagon on the fight against isis. he confirms that the u.s. did not carry out the strike that killed the top has blood commander in damascus. this is about 40 minutes. >> good morning everybody. happy friday the 13th. steve, you're looking great and were pleased to have you over you to use your. >> thank you pentagon press corps, it's always good to be with you on friday. t
cybersecurity our global. physical location is one element that probably in the case of cybersecurity not the most dispositivein terms of concerns i would have. it's more about this secure by design sort of notion, would it be put in place and how well is it implemented and so one? so those would be more my primary concerns. >> my concern is obviously the communist government of vietnam is going to require access. i have -- i will yield back. .. [inaudible] [inaudible] [inaudible]...
60
60
May 13, 2016
05/16
by
CSPAN3
tv
eye 60
favorite 0
quote 0
they now let people know about the importance of cybersecurity in the medical domain. cybersecurity in health i.t. is no longer an overhead for the hospital managers. it has now become an integral part of their services. they have realized if they do not invest enough on cybersecurity and i.t. it's going to hurt their main core operational businesses. so i think now that these recent ransom ware attacks have created the awareness. healthcare providers would have more business incentives to invest on a cybersecurity and insuring patient privacy like other businesses. >> what are those ransom ware attacks? we heard it. i think everybody knows the medstar attack where hackers held hostage a ten history system asking for bitcoins to release the information back. and hospital executives basically had to cancel patient visits. you are not at medstar but you're at a medstar rival. i'm curious. as an executive of a hospital watching this happen what were the meetings like in the board rooms at sibley to make sure you are not the next medstar? >> i don't know if it's a direct qu
they now let people know about the importance of cybersecurity in the medical domain. cybersecurity in health i.t. is no longer an overhead for the hospital managers. it has now become an integral part of their services. they have realized if they do not invest enough on cybersecurity and i.t. it's going to hurt their main core operational businesses. so i think now that these recent ransom ware attacks have created the awareness. healthcare providers would have more business incentives to...
242
242
May 27, 2016
05/16
by
KNTV
tv
eye 242
favorite 0
quote 0
thing we did is find the bowlers that also do cybersecurity. >> reporter: it's so remote, your cell phone won't even work. >> good neighbors. >> reporter: john bowers family has run the general store since 1929. he hopes whoever buys it will create some jobs. >> i'll throw a few bucks your way if you want to come down here. >> reporter: i'm in. let's take up a collection. so if you really want to be the master of your own domain, get your bid in now. kevin tibbles, nbc news, sugar grove, west virginia. >>> that's going to do it for us on a thursday night. i'm lester holt. for all of us at nbc news, thank you for watching and good night.where is pearl pinson? the search intensifies for the . nbc bay area news begins with breaking us in. >>> where is pearl pinson, the search intensifies, and the man accused of taking her is now dead in a shootout with the police. >> authorities don't know where the missing girl is. now, she was last seen yesterday morning in vallejo being pulled by a man in on a highway over pass, an amber alert was issued and witnesses that saw here said her faus was
thing we did is find the bowlers that also do cybersecurity. >> reporter: it's so remote, your cell phone won't even work. >> good neighbors. >> reporter: john bowers family has run the general store since 1929. he hopes whoever buys it will create some jobs. >> i'll throw a few bucks your way if you want to come down here. >> reporter: i'm in. let's take up a collection. so if you really want to be the master of your own domain, get your bid in now. kevin tibbles,...
126
126
May 25, 2016
05/16
by
KNTV
tv
eye 126
favorite 0
quote 0
the report says had she sought approval, it would have been denied because of the cybersecurity risk. clinton is in northern california today. she'll be in san jose on thursday. >>> meanwhile, bill clinton campaigning in san francisco yesterday. the former president held a rally in fremont yesterday. [cheers and applause ] >>> meanwhile, protesters rushed passed a barricade in albuquerque forcing police to block the entrance. officers responded with smoke canisters and pepper spray. several people were also arrested. >>> and people in washington state were voting and donald trump and hillary clinton are the winners there. trump is now just 30 delegates away from securing the republican presidential nomination. clinton won last night, too, but she doesn't get any delegates and that's because washington state held caucuses in march and awarded most of the delegates to bernie sanders. voters by a wide margin did take clinton as their choice. >> nomination process is very confusing. >> exactly. so now we're doing the delegates and the popular vote separately in some states as well? >> you
the report says had she sought approval, it would have been denied because of the cybersecurity risk. clinton is in northern california today. she'll be in san jose on thursday. >>> meanwhile, bill clinton campaigning in san francisco yesterday. the former president held a rally in fremont yesterday. [cheers and applause ] >>> meanwhile, protesters rushed passed a barricade in albuquerque forcing police to block the entrance. officers responded with smoke canisters and pepper...
38
38
May 29, 2016
05/16
by
FBC
tv
eye 38
favorite 0
quote 0
the move. >> cybersecurity will grow. >> adam. >> s&p 500 large cap growth. some names they'll know in there. >> ben. >> spiders, the usual and it's done great. >> you are not worried or are worried about kids who stay at home? that they're sucking -- is that your view? >> i'm not worried about them at all. they're big babies, but there have always been a lot of big babe be byes. >> puts it in perspective. >> trump economics is a recipe for lower wages, fewer jobs, more debt. he could bankrupt america like he's bankrupted his company. >> hillary clinton warning voters that a president trump would mean fewer jobs in america, but some here say trump is the only presidential candidate who actually created jobs in america, so who's right and who's wrong? hi, everybody, welcome to forbes on fox. let's go in focus with mr. steve forbes. rich carlguard, mike and elizabeth mcdonald, john and bruce jackson. so, rich, what does hillary actually know about business? >> well, not much. i
the move. >> cybersecurity will grow. >> adam. >> s&p 500 large cap growth. some names they'll know in there. >> ben. >> spiders, the usual and it's done great. >> you are not worried or are worried about kids who stay at home? that they're sucking -- is that your view? >> i'm not worried about them at all. they're big babies, but there have always been a lot of big babe be byes. >> puts it in perspective. >> trump economics is a recipe...
176
176
tv
eye 176
favorite 0
quote 0
fireeye, not doing so well the cybersecurity company. is more "countdown to the closing bell" straight ahead. liz: breaking news. with coal jobs getting crushed in west virginia and the state holding its primary on tuesday we now have remaining presidential candidates hitting the campaign trail to work very hard to appeal to voters in western virginia, west virginia, rather. many whom relied on coal for work and for jobs. look at this, we have 11,200 coal mining jobs in the u.s. have been lost in the last year alone. west virginia chamber of commerce president steve roberts tells us how west virginia should deal with coal's decline and how you guys are dealing with coal's decline. can't be a surprise to you that the coal business is shrinking, sir. let's talk about this a little bit. >> well, liz, thank you for having me on. we're doing lots of things in west virginia to diversify our economy. we are an energy-producing and creating state. we know about energy exploration. we have the technology here to find and produce and sell natural
fireeye, not doing so well the cybersecurity company. is more "countdown to the closing bell" straight ahead. liz: breaking news. with coal jobs getting crushed in west virginia and the state holding its primary on tuesday we now have remaining presidential candidates hitting the campaign trail to work very hard to appeal to voters in western virginia, west virginia, rather. many whom relied on coal for work and for jobs. look at this, we have 11,200 coal mining jobs in the u.s. have...
414
414
May 26, 2016
05/16
by
WCAU
tv
eye 414
favorite 0
quote 0
perspective buyer chad bennett is eyeing the place for his cybersecurity firm. >> probably be the first thing we did is find the bowels that also do cybersecurity. >> reporter: it's so remote, your cell phone won't even work. >> good neighbors. >> reporter: john bowers family has run the general store since 1929. he hopes whoever buys it will create some jobs. >> i'll throw a few bucks your way if you want to come down here. >> reporter: i'm in. let's take up a collection. so if you really want to be the master of your own domain, get your bid in now. kevin tibbles, nbc news, sugar grove, west virginia. >>> that's going to do it for us on a thursday night. i'm lester holt. for all of us at nbc news, thank you >>> johnny depp's $400 million divorce. the clues before the split. the prenup shocker. >> now, on "extra." >>> the first photo of amber heard after filing for divorce from johnny. his ex vanessa vanessa paradis to his side today. why amber wanted out. did his family hate her? and johnny's own "extra" confession, questioning the meaning of marriage. >> i never found myself needing
perspective buyer chad bennett is eyeing the place for his cybersecurity firm. >> probably be the first thing we did is find the bowels that also do cybersecurity. >> reporter: it's so remote, your cell phone won't even work. >> good neighbors. >> reporter: john bowers family has run the general store since 1929. he hopes whoever buys it will create some jobs. >> i'll throw a few bucks your way if you want to come down here. >> reporter: i'm in. let's take up...
160
160
May 26, 2016
05/16
by
WRC
tv
eye 160
favorite 0
quote 0
perspective buyer chad bennett is eyeing the place for his cybersecurity firm. >> probably be the first thing we did is find the bowels that also do cybersecurity. >> reporter: it's so els that also do cybersecurity. >> reporter: it's srls that also do cybersecurity. >> reporter: it's sls that also do cybersecurity. >> reporter: it's sls that also do cybersecurity. >> reporter: it's sels that also do cybersecurity. >> reporter: it's srls that also do cybersecurity. >> reporter: it's so ls that also do cybersecurity. also do cybersecurity. >> reporter: it's srls that also do cybersecurity. >> reporter: it's so remote, your cell phone won't even work. >> good neighbors. >> reporter: john bowers family has run the general store since 1929. he hopes whoever buys it will create some jobs. >> i'll throw a few bucks your way if you want to come down here. >> reporter: i'm in. let's take up a colltion. ec >>> lights, camera, access. >>> it's escape, it's hiding, you know? i like hiding. >> that's johnny on the very day wife amber heard filed for divorce. i'm billy bush, and we'll tell you why t
perspective buyer chad bennett is eyeing the place for his cybersecurity firm. >> probably be the first thing we did is find the bowels that also do cybersecurity. >> reporter: it's so els that also do cybersecurity. >> reporter: it's srls that also do cybersecurity. >> reporter: it's sls that also do cybersecurity. >> reporter: it's sls that also do cybersecurity. >> reporter: it's sels that also do cybersecurity. >> reporter: it's srls that also do...
67
67
May 10, 2016
05/16
by
WTXF
tv
eye 67
favorite 0
quote 0
the nyc cybersecurity company has expanded rapidly, now in jersey, across the u.s., overseas, and heocal municipalities and governments. why such a response? it could be because his sublet spies have a 100% success rate. >> everyone that's come to us whether they've got multiple units, we come back to them and say here's an airbnb in your building. >> they use the most advanced technology, searching thousands of databases. now, for the naysayer that thinks he's ruining it for people like you and me that just want to make an extra buck, he says he's going after the mass network that has now become what he's calling organized crime. >> this is not some mom and pop trying to scrape by and make a few extra dollars. in fact, more than half the listings that airbnb talks about, completely inactive. the bulk of their business is coming from these professional illegal hotel operators. it's organized crime, and that's what we're hunting, not some, you know, poor, starving artists. >> with such a successful system in place, one would hope that new york city and other cities looked at them for
the nyc cybersecurity company has expanded rapidly, now in jersey, across the u.s., overseas, and heocal municipalities and governments. why such a response? it could be because his sublet spies have a 100% success rate. >> everyone that's come to us whether they've got multiple units, we come back to them and say here's an airbnb in your building. >> they use the most advanced technology, searching thousands of databases. now, for the naysayer that thinks he's ruining it for people...
173
173
May 12, 2016
05/16
by
FBC
tv
eye 173
favorite 0
quote 0
unveiling a product and service at the upgrades that concerns about the state of cybersecurity. details. reporter: lauren, nicole, good morning. here at tech crunch, the biggest conversation to senator around privacy and security. general michael hayden, former head of the nsa and dia weighed in on the debate and where we stand now as a country. >> the greatest future threat to american security is in the cyberdomain. we need to be really careful we could and cybersecurity even for the chittenden immediate security questions over here. reporter: of course, here at tech crunch at not all about security and privacy. it's also about the next big idea. venture capitalists coming to find those. carmelo anthony of the new york knicks is looking for what is going to come next for his venture capital firm. i asked him if the new york knicks for a startup, would he invest? >> absolutely, absolutely. new york is the greatest city in the world, biggest media market in the world. some of the greatest opportunities here are in new york in the world. of course i would invest in that. reporter
unveiling a product and service at the upgrades that concerns about the state of cybersecurity. details. reporter: lauren, nicole, good morning. here at tech crunch, the biggest conversation to senator around privacy and security. general michael hayden, former head of the nsa and dia weighed in on the debate and where we stand now as a country. >> the greatest future threat to american security is in the cyberdomain. we need to be really careful we could and cybersecurity even for the...
654
654
May 9, 2016
05/16
by
CSPAN2
tv
eye 654
favorite 0
quote 0
and no, they would not last beyond the next cybersecurity felt good, the next scandal but it could be updated continually. i think with time to do this because the internet of things, the rhetoric of the internet of things, as for exceeding the actual deployment. it is in the early stages and it is time to develop standards and regulations so it can fulfill this great promise of greater efficiency, effectiveness, convenience. however, it will not do so if security as an afterthought, if the government waits until disaster strikes to take action. thank you very much for your attention. i look forward to comments and questions. [applause] >> thank you, admiral. thank you for painting and import canvas, one that i think isn't getting nearly as much attention as it ought to. and i think you -- i think you could've brought a sense of urgency to the internet of things. and the need to start good architecture, a good design to you were at the naval academy. that's how do we start designing at the very roots sorts of issues, the secure device. question i have is how are we going to get the po
and no, they would not last beyond the next cybersecurity felt good, the next scandal but it could be updated continually. i think with time to do this because the internet of things, the rhetoric of the internet of things, as for exceeding the actual deployment. it is in the early stages and it is time to develop standards and regulations so it can fulfill this great promise of greater efficiency, effectiveness, convenience. however, it will not do so if security as an afterthought, if the...
54
54
May 3, 2016
05/16
by
CSPAN2
tv
eye 54
favorite 0
quote 0
quickly established it and we have made enormous progress in improving the cybersecurity of the dhs systems from that experience, earlier this year, the cio that at the dmag approved, the winter study to look at our infrastructures across all the component to make sure our information infrastructure is up to date, working, delivering necessary services, did a review, came up with a common approach to measuring and testing whether an analytical approach to see what works, what was then prioritize. so it might be the cbp as cementing status before i need this because it is so critical and have gained alignment on how to improve our infrastructure with much more commonality, much more common approach going forward, based on the dmag discussion, openness, clarity, we are now in the process of using the funding we have two most importantly prioritized how we are improving our infrastructure. i hope these examples underscore the opportunity to collaborate when it make sense and still remain independent when it makes sense and the last piece of this is every employee, every college should feel i'm
quickly established it and we have made enormous progress in improving the cybersecurity of the dhs systems from that experience, earlier this year, the cio that at the dmag approved, the winter study to look at our infrastructures across all the component to make sure our information infrastructure is up to date, working, delivering necessary services, did a review, came up with a common approach to measuring and testing whether an analytical approach to see what works, what was then...
352
352
May 26, 2016
05/16
by
WRC
tv
eye 352
favorite 0
quote 0
the report also blames the state department foron cybersecurity failures. "the washington post" editorial board has come out against clinton on the issue saying clinton displayed inexcusable willful disregard for the rules. >>> breaking news overnight. a deadly shooting at a new york city concert hall where rapper t.i. was scheduled to perform. police say someone opened fire last night in a green room in irving plaza. three men and one woman hit by bullets and one man died at the hospital. witnesses say the shooting sparked a stampede sending panicked concert goers running for the exist and no arrests have been made and no word on the possible motive. metal detectors were in place but one was told new york city security was laxed. t.i. had not taken the stage when the shooting occurred. >>> the head of the tsa says the agency is adding staff to help deal with increasingly long airport security lines. >> we have a challenge this summer which we are aggressively meeting head-on. we are providing more overtime we are also converting with the help of congress an
the report also blames the state department foron cybersecurity failures. "the washington post" editorial board has come out against clinton on the issue saying clinton displayed inexcusable willful disregard for the rules. >>> breaking news overnight. a deadly shooting at a new york city concert hall where rapper t.i. was scheduled to perform. police say someone opened fire last night in a green room in irving plaza. three men and one woman hit by bullets and one man died at...
359
359
May 28, 2016
05/16
by
FOXNEWSW
tv
eye 359
favorite 0
quote 0
just a different era where the threats of cybersecurity were far less sophisticated than they are today. >> what's the larger political impact of this among democrats? still got the california primary coming up. this going to hurt her among democrats? >> all it does is is backs up the idea that she is untrut worthy. and you know, this has been her biggest problem all along in this election, those numbers and polls saying americans don't believe what she has to say. now, you've got a report in which the ig demolishes again everything she's done over the last year and she's till out claiming and spinning it is something other than it is. >> all right. when we come back, hillary clinton and donald trump sharpen their attacks as they look ahead to the general election. trump is is rehashing the clinton scandals of the 1990s while hillary is focusing on her rival's record as a business man, so, will either strategy work? i thought i married an italian. my lineage was the vecchios and zuccolis. through ancestry, through dna i found out that i was only 16% italian. he was 34% eastern european.
just a different era where the threats of cybersecurity were far less sophisticated than they are today. >> what's the larger political impact of this among democrats? still got the california primary coming up. this going to hurt her among democrats? >> all it does is is backs up the idea that she is untrut worthy. and you know, this has been her biggest problem all along in this election, those numbers and polls saying americans don't believe what she has to say. now, you've got a...
103
103
May 4, 2016
05/16
by
CNBC
tv
eye 103
favorite 0
quote 0
and in exchange for those votes on his social media page, this hacker turned over that data to the cybersecurity firm. so a very strange one here in the firm says it's troubling that this data was out there in the first place. >> unbelievable. thank you. day by day, the sib areaward stories get more interesting. donald trump is the likely gop nominee. on the democratic side, theoretically, it's still up for grabs. hillary clinton holds a strong lead whether you consider the super delegates over bernie sanders. so if donald trump locks it in and hillary gets the democratic nomination, what does this mean for your money and investment strategy? let's bring in michael farr and david seeberg. let me start with you, michael assuming hillary becomes -- senator clinton becomes president. what should do you with your portfolio and what happens? what should do you with the portfolio if donald trump becomes president? >> right. michelle, this is really an election where all the old rules are up. i mean, republicans typically vote -- pro business and they typically vote republican. and they stay away from
and in exchange for those votes on his social media page, this hacker turned over that data to the cybersecurity firm. so a very strange one here in the firm says it's troubling that this data was out there in the first place. >> unbelievable. thank you. day by day, the sib areaward stories get more interesting. donald trump is the likely gop nominee. on the democratic side, theoretically, it's still up for grabs. hillary clinton holds a strong lead whether you consider the super...
46
46
May 4, 2016
05/16
by
CSPAN2
tv
eye 46
favorite 0
quote 0
the conclusion that forcing a company to undermine unproduct security would imperil not just the cybersecuritybut also the fiscal security of worldwide users. in sum, weakening protection far from advancing security concerns to the contrary may well have a net negative security impact. we've also seen repeatedly how government overstates how important surveillance is even for specific short-term security goals. examples include the two recent high-profile confrontations between the fiduciary duty -- fbi and apple, the one i already mentioned. the other one involved an iphone that was used by a brooklyn drug dealer. in both cases the fbi insisted over and over again that it could not access the data on the phones unless court's took the unprecedented step making apple design that would let the fbi break into customers' devices. in both cases those claims turned out to be unfounded. first in march the fbi announced that it had found an alternative way to access san bernardino phone and also found an alternative way to access the brooklyn phone. we saw the same pattern with the national security
the conclusion that forcing a company to undermine unproduct security would imperil not just the cybersecuritybut also the fiscal security of worldwide users. in sum, weakening protection far from advancing security concerns to the contrary may well have a net negative security impact. we've also seen repeatedly how government overstates how important surveillance is even for specific short-term security goals. examples include the two recent high-profile confrontations between the fiduciary...
42
42
May 13, 2016
05/16
by
CSPAN
tv
eye 42
favorite 0
quote 0
the security protections that even we have. mr. evanina. mr. evanina: i concur with your concern for cybersecurity and the need for us to be prepared to, at least meet where we are in the global economy. i'm not particularly familiar with requirements to contain -- contained within this new policy, so i can't speak to that. but in the purview of national security, the cyberthreat is real. i think we have to take that into consideration for anything we do moving forward, whether here, domestically in the united states or any of our businesses and government operations verseas. mr. lynch: mr. scott, ms. cobert, do you want to take a bite at that? mr. scott: one thing is that cybersecurity knows no bounds. concerns about cybersecurity are, you know, global. physical location is one element but probably in the case of ybersecurity, not the most important in terms of concerns, it's more about the secure by design sort of notion, you know what have you put in place and how well is it implemented. so those would be more my primary concerns, in some cases the physical location. mr. lynch: my concern is ob
the security protections that even we have. mr. evanina. mr. evanina: i concur with your concern for cybersecurity and the need for us to be prepared to, at least meet where we are in the global economy. i'm not particularly familiar with requirements to contain -- contained within this new policy, so i can't speak to that. but in the purview of national security, the cyberthreat is real. i think we have to take that into consideration for anything we do moving forward, whether here,...
47
47
May 27, 2016
05/16
by
CSPAN2
tv
eye 47
favorite 0
quote 0
passing the cybersecurity enhancement act; protecting our critical infrastructure from cyber attack, emp and gmb; and finally what we can do as a nation to protect the homeland against islamic terrorist and other violent extremist. this hearing is about that last priority and addressing islamic terror and trying to secure our homeland and keep it safe. not an easy task. every last one of these hearing's goal is to primarily lay out a reality as best we can so we can identify, define the problem, and admit we have it so we can work toward commonsense solutions recognizing in this realm the solutions are very, very difficult and they will take quite some time to finally in the end defeat islamic terror. i want to lay out a couple facts that have been developed by staff, recognizing again these are estimates. there is nothing hard and fast but it gives some indication of what we are dealing here when we talk about isis. the monthly revenue of isis dropped from 80 million per month, which is a little less than a billion per y
passing the cybersecurity enhancement act; protecting our critical infrastructure from cyber attack, emp and gmb; and finally what we can do as a nation to protect the homeland against islamic terrorist and other violent extremist. this hearing is about that last priority and addressing islamic terror and trying to secure our homeland and keep it safe. not an easy task. every last one of these hearing's goal is to primarily lay out a reality as best we can so we can identify, define the...
89
89
May 16, 2016
05/16
by
CNBC
tv
eye 89
favorite 0
quote 0
reit rates a buy and $210 target which, my friend, is a 60% upside. >> it is a favorite in the cybersecurityen a favorite all the way down. >> it has had tough time. our next stock here, bank of america. cutting bank of america to a market perform from outperform. saying the bank has plucked much of the low anging fruit to get returns. they expect changes in the overhang of the crisis which are preventing it from achieving profitability. wait for better opportunity to buy shares which are up 26% since february. eventually higher rates will help. we're talking about rates before. but bank of america needs to have a plan beyond waiting for rates to rise. >> basically been a $13 stock for a few years an down 75% from the high ten years ago. all right. your fifth stock, always this sort of. >> narrator: radar name of the day. it's a pretty well known name. jones langlasalle. they've been whacked this year. kbw thinks this stock is a good value. they start coverage of jones with an outforeman and $131 target. they say that jones lang and two others benefit from the on going institutionalization o
reit rates a buy and $210 target which, my friend, is a 60% upside. >> it is a favorite in the cybersecurityen a favorite all the way down. >> it has had tough time. our next stock here, bank of america. cutting bank of america to a market perform from outperform. saying the bank has plucked much of the low anging fruit to get returns. they expect changes in the overhang of the crisis which are preventing it from achieving profitability. wait for better opportunity to buy shares...
159
159
May 26, 2016
05/16
by
KPIX
tv
eye 159
favorite 0
quote 0
the report conclude clinton violated the department's cybersecurity guidelines.oints out hackers tried to get into clinton's personal e-mail server a couple of times and that she should have turned over every e-mail sent before she left office. clinton turned over about half. the report does point out that other secretaries of state also used personal e-mail systems. meanwhile, candidate clinton on the stump in california. nancy cordes reports. >> people are listening to donald trump and they're wondering what is going on in america? >> we defeat donald trump by very large numbers. >> reporter: technically hillary clinton and bernie sanders are running against each other here in california. but they barely mention each other. clinton loaded up her speeches tuesday with new attacks on trump. >> we are going to take on climate change which donald trump says is a hoax. exempt when it comes to his golf courses. >> reporter: talking about the trump organization application to build a sea wall for one of the golf courses in island citing global warming which trump call
the report conclude clinton violated the department's cybersecurity guidelines.oints out hackers tried to get into clinton's personal e-mail server a couple of times and that she should have turned over every e-mail sent before she left office. clinton turned over about half. the report does point out that other secretaries of state also used personal e-mail systems. meanwhile, candidate clinton on the stump in california. nancy cordes reports. >> people are listening to donald trump and...
73
73
May 16, 2016
05/16
by
CSPAN3
tv
eye 73
favorite 0
quote 0
conclusion that forcing a company to undermine its own product security will imperial not just the cybersecurity, but also the physical security of its worldwide users. in sum, weakening communications privacy protections far from advancing security concerns to the contrary may well have a net negative security impact. we have also seen repeatedly how government overstates how important surveillance is even for specific short-term security goals. examples include the high profile confrontations between the fbi and apple, the one i already mentioned involving the work iphone that was used by one of the san bernardino terrorists and the other one involving an iphone used by a brooklyn drug dealer. in both cases, the fbi insisted over and over again that it could not access the data on these phones unless courts took the unprecedented step of common dearing apple to design and authenticate software that would let the fbi break into its customers' devices. yet in both cases, those claims turned out to be unfounded. first in march, the fbi announced it had found an alternative way to access the san b
conclusion that forcing a company to undermine its own product security will imperial not just the cybersecurity, but also the physical security of its worldwide users. in sum, weakening communications privacy protections far from advancing security concerns to the contrary may well have a net negative security impact. we have also seen repeatedly how government overstates how important surveillance is even for specific short-term security goals. examples include the high profile confrontations...
81
81
May 5, 2016
05/16
by
CSPAN2
tv
eye 81
favorite 0
quote 0
the laws that what you refer do we have been very much engaged in whether it's the ngo law the cybersecurity love the national security law and the counterterrorism law and we have concerns about the substance of the laws. the ngo law as you know, they move to the enforcement of that law to the ministry of public security which sends a terrible signal about how they see ngos which are actually acting to the benefit of china in its own people so we share those concerns. i want to assure you we will continue to focus on them until we can to make progress. one aspect of this is not just us but us bringing together other countries to express concern because there is some strength in numbers at the human rights council and geneva we got a dozen countries to sign a statement expressing their concerns about the evolution of human rights and civil liberties in china. these things over time have been effectively went through decades of cold war with the soviet union. members of congress played meaningful roles in that spotlight on the soviet union and its human rights abuses and for decades it didn't
the laws that what you refer do we have been very much engaged in whether it's the ngo law the cybersecurity love the national security law and the counterterrorism law and we have concerns about the substance of the laws. the ngo law as you know, they move to the enforcement of that law to the ministry of public security which sends a terrible signal about how they see ngos which are actually acting to the benefit of china in its own people so we share those concerns. i want to assure you we...
121
121
May 18, 2016
05/16
by
FBC
tv
eye 121
favorite 0
quote 1
why the fbi is ramping up cybersecurity to protect the presidential campaigns and why do big corporateroups favor hillary clinton over businessman donald trump? we'll talk to art laffer about that and whether he would vote for hillary if she appoints bill as her economic czar. melissa: come on! david: he voted for bill twice. you don't want to miss this coming up. you wouldn't order szechuan without checking the spice level. it really opens the passages. waiter. water. so why would you invest without checking brokercheck? check your broker with brokercheck. burning, pins-and-needles of beforediabetic nerve pain, these feet played shortstop in high school, learned the horn from my dad and played gigs from new york to miami. but i couldn't bear my diabetic nerve pain any longer. so i talked to my doctor and he prescribed lyrica. nerve damage from diabetes causes diabetic nerve pain. lyrica is fda approved to treat this pain, from moderate to even severe diabetic nerve pain. lyrica may cause serious allergic reactions or suicidal thoughts or actions. tell your doctor right away if you hav
why the fbi is ramping up cybersecurity to protect the presidential campaigns and why do big corporateroups favor hillary clinton over businessman donald trump? we'll talk to art laffer about that and whether he would vote for hillary if she appoints bill as her economic czar. melissa: come on! david: he voted for bill twice. you don't want to miss this coming up. you wouldn't order szechuan without checking the spice level. it really opens the passages. waiter. water. so why would you invest...
161
161
May 14, 2016
05/16
by
CSPAN2
tv
eye 161
favorite 0
quote 0
cybersecurity our global. physical location is one element that probably in the case of cybersecurity not the most dispositivein terms of concerns i would have. it's more about this secure by design sort of notion, would it be put in place and how well is it implemented and so one? so those would be more my primary concerns. >> my concern is obviously the communist government of vietnam is going to require access. i have -- i will yield back. .. [inaudible] [inaudible] [inaudible] [inaudible] [inaudible] [inaudible] [inaudible] [inaudible] [inaudible] [inaudible] [inaudible] [inaudible] [inaudible] [inaudible] [inaudible] [inaudible] on. [inaudible] >> this sunday night on q and a, historian adam and his books and spain in our hearts, on the american involvement on the spanish civil war in the late 19 thirties. >> of this attempt hapten in spain when all over the country, right winged army officers tried to seize power and imparts of parts of the country succeeded in seizing power in 1936. it sent a shockwave of alarm throughout the world. here was a major country in europe, the right-wing military quickly ba
cybersecurity our global. physical location is one element that probably in the case of cybersecurity not the most dispositivein terms of concerns i would have. it's more about this secure by design sort of notion, would it be put in place and how well is it implemented and so one? so those would be more my primary concerns. >> my concern is obviously the communist government of vietnam is going to require access. i have -- i will yield back. .. [inaudible] [inaudible] [inaudible]...
158
158
May 1, 2016
05/16
by
WABC
tv
eye 158
favorite 0
quote 0
the whole issue of cybersecurity and data protection, whether you're just a man or woman on the street, a young person, or a big corporation or a government -- all the data that's in your cellphone, in your hard drive, which is in the internet and everything -- everything has a hard drive. we, or any other responsible recycler, turns the data into dust. >> oh, wow. >> and this is the whole key to the whole issue now. not only do we need to protect the environment, but everyone needs to protect their data. so, when we keep the electronics, in partnership with veolia and the city of new york, out of the landfills here, we then responsibly recycle it, 100% of it gets recycled -- all the plastics, the metals, and the glass -- and all your data turns into dust. so, this way you don't have to worry about somebody finding the data. right now, as we're taping this show, the former secretary of state is, uh -- you know, her hard drive is being de-encrypted, uh, and they're -- right now, the fbi is looking to see if there were any e-mails that may be potentially dangerous to -- you know, with to
the whole issue of cybersecurity and data protection, whether you're just a man or woman on the street, a young person, or a big corporation or a government -- all the data that's in your cellphone, in your hard drive, which is in the internet and everything -- everything has a hard drive. we, or any other responsible recycler, turns the data into dust. >> oh, wow. >> and this is the whole key to the whole issue now. not only do we need to protect the environment, but everyone needs...
108
108
May 11, 2016
05/16
by
CSPAN2
tv
eye 108
favorite 0
quote 0
though they would not last as about the next cybersecurity development, beyond the next scandal, but they could be updated, updated continually. i think we have time to do this because the internet of things, the rhetoric of the internet of things is far exceeding the actual deployment so far. it really is in the early stages and there is time to develop standards and regulations so that it can fulfill this great promise of greater efficiency, greater effectiveness, greater convenience. however, it will not do so if security as an afterthought, if the government waits until disaster strikes to take action. so thank you for your attention. i look forward to comments and questions. >> thank you, admiral. [applause] >> thank you for painting an important canvas, one that i think isn't getting nearly as much attention as the dodgy. and i think you clearly brought a sense of urgency as the internet of things, need to start good architecture. the design. you at the naval academy. it's how do we start designing at the very roots sorts of issues, a seeker device. question i have is, how are
though they would not last as about the next cybersecurity development, beyond the next scandal, but they could be updated, updated continually. i think we have time to do this because the internet of things, the rhetoric of the internet of things is far exceeding the actual deployment so far. it really is in the early stages and there is time to develop standards and regulations so that it can fulfill this great promise of greater efficiency, greater effectiveness, greater convenience....
198
198
May 5, 2016
05/16
by
KNTV
tv
eye 198
favorite 0
quote 0
the calm, confines of stanford university, a class with an urgent mission. fortify military security. >> problems they are addressing are complex. >> specifically cybersecurity. >> this is a great opportunity to be of service to the country. >> stanford calls it hacking for defense. >> it feels like a start up. >> students using their skills to help make america's military safer. >> when you think about it a little bit, it's making you work harder, you know for a lot of the teams, people's lives are on the line. >> an interesting problem that you are trained in a certain discipline as an engineer, but it's about problem solving. >> the professor, former army colonol. >> we were wondering if people would show up. >> and to transfer it to something meaningful, that affects a serious national security issue that is exciting. >> and an army major. >> the exposer to some cutting edge technology, and really some of the cutting edge minds and that problem solving ability that we talked about, is huge. >> students on the farm, working to help soldiers on the field of battle. >> the class at stanford runs through may. organizers and the military say they are encourag
the calm, confines of stanford university, a class with an urgent mission. fortify military security. >> problems they are addressing are complex. >> specifically cybersecurity. >> this is a great opportunity to be of service to the country. >> stanford calls it hacking for defense. >> it feels like a start up. >> students using their skills to help make america's military safer. >> when you think about it a little bit, it's making you work harder, you...
539
539
May 26, 2016
05/16
by
KNTV
tv
eye 539
favorite 0
quote 0
the report blames the state department for long-standing cybersecurity failures. lester? >> andrea mitchell tonight, thank you. >>> let's turn to the latest in the long tsa lines at airports we've been seeing nationwide. just as the summer vacation season sets to kick off this weekend. the man who runs the tsa today said the agency is making progress in cutting the wait times at many airports, but there's still 4,000 to 5,000 screeners short. we learned today on hundreds of occasions, tsa officers have been pulled from airports to work political events. here's nbc's tom costello. >> reporter: one big reason the tsa is in trouble, the numbers just don't add up. in 2011, there were 45,000 screening officers at the nation's airports. five years later, 2,500 fewer are on the job. with 100 million more passengers flooding the system. that's what the checkpoint backup stretching one, two, even three hours. tens of thousands of passengers missing their flights. >> we have a challenge this summer which we are aggressively meeting head-on. >> reporter: the tsa chief on the capitol
the report blames the state department for long-standing cybersecurity failures. lester? >> andrea mitchell tonight, thank you. >>> let's turn to the latest in the long tsa lines at airports we've been seeing nationwide. just as the summer vacation season sets to kick off this weekend. the man who runs the tsa today said the agency is making progress in cutting the wait times at many airports, but there's still 4,000 to 5,000 screeners short. we learned today on hundreds of...
160
160
May 26, 2016
05/16
by
KNTV
tv
eye 160
favorite 0
quote 0
. >> reporter: she did not talk about the report that said she violated cybersecurity guidelines by using a private e-mail. >> she is as crooked as they come. she had bad news today. >> reporter: with california's june primary around the corner, political analysts say the timing of the report is not good for clinton. >> this is a chance for sanders to stay in the game and for clinton, it's a chance for sanders to put her away. >> bay area news. >> i just couldn't take it anymore. >> she said she told police she was molested but it took nearly two years for the authorities to arrest the accused abuser. up next, a stunning admission from the district attorney's office about what happened and why the da is now apologizing. >> also ahead, hollywood drama that ends in handcuffs, what we have learned about a man who climbed, yep, on one of the world's most famous signs this evening. >> and good evening, i'm jeff renieri, we are tracking a warm up that now you whi-- that now includes 90s. >>> a teenage girl found the courage to report sexual abuse she said that she endured since being second gra
. >> reporter: she did not talk about the report that said she violated cybersecurity guidelines by using a private e-mail. >> she is as crooked as they come. she had bad news today. >> reporter: with california's june primary around the corner, political analysts say the timing of the report is not good for clinton. >> this is a chance for sanders to stay in the game and for clinton, it's a chance for sanders to put her away. >> bay area news. >> i just...