Facebook Google Plus Twitter LinkedIn YouTube RSS Menu Search Resource - BlogResource - WebinarResource - ReportResource - Eventicons_066 icons_067icons_068icons_069icons_070

Cybersecurity Transparency and the Federal Government

The Cybersecurity Information Sharing Act is missing a key component needed to strengthen America's digital defenses – transparency into what the government itself is doing or not doing to protect its networks from hackers.

A lot is being discussed in Washington about the need to secure our national cyber infrastructure following the massive data breach at the United States Office of Personnel Management (OPM). This week lawmakers are debating the Cyber Information Sharing Act (CISA), which could come up for a vote very soon.

In Opinion: Why the ‘cyber bill’ falls short on protecting critical networks, an article in CSM Passcode, Ron Gula, Tenable CEO, discusses CISA and the need for more transparency into the government’s cyberhygiene. While CISA is a good idea, the bill currently only applies to the private sector; it must be strengthened with directives for federal information sharing. The federal government should demonstrate its commitment to cybersecurity by increasing transparency and accountability to the American public.

Read the full article

Subscribe to the Tenable Blog

Subscribe
Try for Free Buy Now

Try Tenable.io Vulnerability Management

FREE FOR 60 DAYS

Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy. Sign up now and run your first scan within 60 seconds.

Buy Tenable.io Vulnerability Management

Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy. Purchase your annual subscription today.

65 assets

Try Nessus Professional Free

FREE FOR 7 DAYS

Nessus® is the most comprehensive vulnerability scanner on the market today. Nessus Professional will help automate the vulnerability scanning process, save time in your compliance cycles and allow you to engage your IT team.