Still, the shield's effectiveness as a defense in cyber-warfare is far from clear: Bruce Schneier, the founder and chief technology officer of security firm BT Counterpane, argues that no single strategy can stop determined hackers.
Indeed, the NSC has shown irresponsible disinterest in the whole matter of technology security, enormously compounding the risks of capricious decontrol actions -- and increasing the likelihood that they will occur.
Fu Liquan is the chairman of Zhejiang Dahua Technology, a supplier of security and surveillance products.
FORBES: 2013 Forbes Billionaires List: 10 China Newcomers On The Move
Mr Obama has directed stimulus money to domestic manufacturers of renewable-energy technology, promised to revisit controls on exports of technology with national-security implications and has said he will protect American intellectual-property rights more rigorously abroad.
So why are some states still using outmoded voting technology after years of security warnings?
Some corporations will also be concerned, said Chris Wysopal, chief technology officer of computer security consultant Veracode.
The Transportation Security Administration cannot discuss specific detection capabilities of its technology for security reasons, said TSA spokesman Greg Soule.
E-mails leaked in 2010 described how a group of technology and security firms cooked up a plan to spy on and feed disinformation to Chamber Watch and discussed it with the Chamber's law firm.
Under no circumstances should the United States assent to German demands for further liberalization of the multilateral export control regime unless and until Bonn can demonstrate the adoption of a far more conscientious technology security policy and effective enforcement of existing arrangements.
In early October, Ambassador Alan Wendt of the State Department and the director of the Defense Technology Security Agency, William Rudman, made an important tour of European capitals.
Russell Dietz is vice president and chief technology officer at SafeNet, a global leader in information security, and has more than 25 years of technology experience in the data management, security, embedded and distributed systems industries.
FORBES: Securing Data in the Cloud? Call in the Magnificent Seven
But even before the terrorism in Boston, the benefits of applying technology to security altered the trade-off with privacy expectations.
President Bush, like Ronald Reagan before him, should call for a ministerial meeting involving all COCOM nations to review the current state and future direction of Western technology security policy.
In a February 1998 survey of information-technology companies by the Minnesota Department of Economic Security, 57% of respondents said they were having trouble finding qualified workers.
ECONOMIST: Minnesota��s job market: Land of 1,000 opportunities | The
Inevitably, given the pervasiveness of information technology, cyberspace is also becoming a question of security.
Controversy surrounding use of the scanners has focused mainly on privacy concerns, and it would seem that the potential health risks of the technology have been largely downplayed in the interest of security.
FORBES: Europe Bans Airport Body Scanners For "Health and Safety" Concerns
For example, there are 189 ISO standards for information security, our National Institute of Standards and Technology ( NIST) has produced a full set of world-class materials on information security, and the Information Systems Audit and Control Association ( ISACA) has developed its best practices, the Control Objectives for Information Technology ( CobiT).
FORBES: Congress Needs to Go Back To School on Cyber Legislation
These include better baggage-screening, sharing information, and the use of sophisticated security technology.
So how are we addressing both the technology and policy sides of cyber security to advance the global cloud computing opportunity?
FORBES: How Secure is the 'Cloud in Your Pocket?' Someone is Making It Bulletproof.
And Sinosun Technology, a maker of computer security software backed by Granite Global Ventures, which also backed Tudou, rose by 5.9% on Friday, after gaining 9.7% on Thursday.
FORBES: Lujiazui Breakfast: News And Views About China Stocks -- July 2
Atalla is indeed a father of information security technology, and he says he is working on a new advance that will make all computers much more secure than any of us think we can expect.
While the foregoing litany illustrates the mindset of many in the Bush Administration on the irrelevance of a rigorous technology security policy in the so-called post-Cold War world, the specific device being used to force reckless decontrol actions through the U.S. government warrants special mention.
Smith discussed the contribution being made by the Casey Institute to the national debate on issues in the nexus between national security as traditionally understood and the emerging fields of financial, economic, technology and energy security.
CENTERFORSECURITYPOLICY: 'Global warning' about global climate change treaty
According to the State of Information Security Survey 2003, a complex integration of technology, education, risk analysis, as well as corporate and government regulation are needed.
Interestingly, the report points to the shelving of a similar identity project in the UK because of the huge costs, unreliable and untested technology and the risks to the safety and security of citizens.
" He went on to describe the four criteria that would govern that decision: "the nature of threat, the cost of meeting it, the effectiveness of the available technology, and the impact of this decision on our overall security, including our relationship with Russia and other nations, 3 and the need to preserve the ABM Treaty.
CENTERFORSECURITYPOLICY: Post-Mortem on the Summit: The Talbott Communique
Over fifty percent of U.S. export licenses to the Soviet Union carry conditions, frequently including strict assurances that the American firm will oversee the security of the technology in question.
Last month in London, Samsung hosted the first meeting of a new government-advisory board, made up of Samsung executives and technology-security experts from Western government agencies, including the U.S. National Security Agency.
Gertz quotes John Shaw, the Deputy Under Secretary of Defense for International Technology Security, who contends - based on information from two reliable European intelligence services - that Russian troops and Iraqi intelligence "almost certainly" removed the missing material from the facility.
The Center for Security Policy today questioned the Bush Administration's failure to put a proposed acquisition by the Japanese firm Komatsu of a unique American high technology capability on hold, pending a thorough investigation of its national security implications and appropriate decisions concerning steps needed to ensure that such a capability remains available to the United States.
应用推荐