Politics

What the government’s new cybersecurity report could mean for business

Industry is apparently part of the problem — and the solution.

Sen. Angus King

Sen. Angus King, I-Maine, co-chairs the Cyberspace Solarium Commission, which issued a report Wednesday saying the U.S.' cybersecurity infrastructure is dangerously inadequate.

Photo: Aaron P. Bernstein via Getty Images

America's cybersecurity strategy needs an overhaul, according to a massive new government report — but what does that mean for the technology industry?

"The reality is that we are dangerously insecure in cyber," co-chairs Sen. Angus King, I-Maine, and Rep. Mike Gallagher, R-Wisc., wrote in a letter prefacing the report, which was released by the bipartisan Cyberspace Solarium Commission on Wednesday. "Your entire life — your paycheck, your health care, your electricity — increasingly relies on networks of digital devices that store, process and analyze data. These networks are vulnerable, if not already compromised."


Get what matters in tech, in your inbox every morning. Sign up for Source Code.


The 182-page report argues for an approach of "layered cyber deterrence" and makes dozens of recommendations that would affect public and private sectors alike. The more than 75 recommendations run the gamut, from concrete suggestions about ensuring paper trails for voting machines to additional authorities for the Cybersecurity and Infrastructure Security Agency, as well as specific legislative fixes aimed at spurring private sector security changes.

Many of the recommendations in the report "do not break new ground," James A. Lewis, senior vice president and director of the Technology Policy Program at the Center for Strategic and International Studies, told Protocol. But if they are enacted, some of them could have a significant impact on technology companies and other industries.

There's a lot to dig through, but here are some key takeaways.

Industry is part of the problem — and the solution

The report is littered with references to public-private partnerships and collaboration, many of them vague. But the general vision laid out in the report "will require private-sector entities to step up and strengthen their security posture," King and Gallagher not, adding that most critical infrastructure "is owned by the private sector." The underlying message: That some of that infrastructure is not resilient enough.

If the strategy laid out were followed through, there would be additional expectations placed on private industry — generally in the form of things like adhering to new security standards and working with various new federal structures designed to help manage digital national security risks.

However, King and Gallagher say they "do not want to saddle the private sector with onerous and counterproductive regulations, nor do we want to force companies to hand over their data to the federal government." That suggests that even they are looking for voluntary cooperation in many circumstances.

Data security and privacy liability incoming?

That said, there are some places where the Commission calls for concrete changes that would change business practices.

One of the most significant is the recommendation that Congress pass legislation requiring "that final goods assemblers of software, hardware and firmware are liable for damages from incidents that exploit known and unpatched vulnerabilities for as long as they support a product or service."

This would provide clarity and increased protections for consumers, it argues, while putting businesses on the hook for keeping their products and services secure. Expect plenty of pushback from across the tech sector and beyond over any proposed lawmaking along those lines.

On a similar front, the Commission recommends Congress "pass a national data security and privacy protection law establishing and standardizing requirements for the collection, retention and sharing of user data." Right now, there is no overarching federal standard, akin to Europe's General Data Protection Regulation, for data security. Instead a patchwork of state regulations help set the effective floor of privacy protections, led by more stringent regulation out of California.

The impact of any such law on businesses would obviously depend on just how strict it is — but there is increasing bipartisan support for some form of data privacy regulation, so watch this space.

One other recommendation that could affect industry is the proposal that Congress establish a "National Cybersecurity Certification and Labeling Authority" to run programs including voluntary security certifications and labeling for IT and communications products. While voluntary, this would be a step toward giving cybersecurity safety certifications similar to those used to show certain electric products meet basic safety standards — and could change customer perceptions of the products and services they buy.

But don't assume Congress will act

While the report lays out the stakes as dire — it even opens with a bit of dystopian fiction about a post-cyberpocalypse Washington — there's no guarantee Congress will take action anytime soon. In fact, many of the report's recommendations, including a comprehensive federal data privacy law, are proposals that have been floating around in the legislative ether in one form or another for years.

Angus acknowledged the legislative status quo in an interview with Wired, saying he hopes that around half of the recommendations will be considered as part of the National Defense Authorization Act in May.

Still, Rep. Jim Langevin, D-R.I., a member of the commission and co-founder and co-chair of the Congressional Cybersecurity Caucus, said he has "never felt more optimistic" during his decade of working on cybersecurity issues than with the release of this report.

"We have a long way to go as a nation to close our aperture of vulnerability in cyberspace," the Congressman told Protocol in an emailed statement. "But the strategy we lay out today will make us much more secure if we have the political will to execute it."

Fintech

Judge Zia Faruqui is trying to teach you crypto, one ‘SNL’ reference at a time

His decisions on major cryptocurrency cases have quoted "The Big Lebowski," "SNL," and "Dr. Strangelove." That’s because he wants you — yes, you — to read them.

The ways Zia Faruqui (right) has weighed on cases that have come before him can give lawyers clues as to what legal frameworks will pass muster.

Photo: Carolyn Van Houten/The Washington Post via Getty Images

“Cryptocurrency and related software analytics tools are ‘The wave of the future, Dude. One hundred percent electronic.’”

That’s not a quote from "The Big Lebowski" — at least, not directly. It’s a quote from a Washington, D.C., district court memorandum opinion on the role cryptocurrency analytics tools can play in government investigations. The author is Magistrate Judge Zia Faruqui.

Keep ReadingShow less
Veronica Irwin

Veronica Irwin (@vronirwin) is a San Francisco-based reporter at Protocol covering fintech. Previously she was at the San Francisco Examiner, covering tech from a hyper-local angle. Before that, her byline was featured in SF Weekly, The Nation, Techworker, Ms. Magazine and The Frisc.

The financial technology transformation is driving competition, creating consumer choice, and shaping the future of finance. Hear from seven fintech leaders who are reshaping the future of finance, and join the inaugural Financial Technology Association Fintech Summit to learn more.

Keep ReadingShow less
FTA
The Financial Technology Association (FTA) represents industry leaders shaping the future of finance. We champion the power of technology-centered financial services and advocate for the modernization of financial regulation to support inclusion and responsible innovation.
Enterprise

AWS CEO: The cloud isn’t just about technology

As AWS preps for its annual re:Invent conference, Adam Selipsky talks product strategy, support for hybrid environments, and the value of the cloud in uncertain economic times.

Photo: Noah Berger/Getty Images for Amazon Web Services

AWS is gearing up for re:Invent, its annual cloud computing conference where announcements this year are expected to focus on its end-to-end data strategy and delivering new industry-specific services.

It will be the second re:Invent with CEO Adam Selipsky as leader of the industry’s largest cloud provider after his return last year to AWS from data visualization company Tableau Software.

Keep ReadingShow less
Donna Goodison

Donna Goodison (@dgoodison) is Protocol's senior reporter focusing on enterprise infrastructure technology, from the 'Big 3' cloud computing providers to data centers. She previously covered the public cloud at CRN after 15 years as a business reporter for the Boston Herald. Based in Massachusetts, she also has worked as a Boston Globe freelancer, business reporter at the Boston Business Journal and real estate reporter at Banker & Tradesman after toiling at weekly newspapers.

Image: Protocol

We launched Protocol in February 2020 to cover the evolving power center of tech. It is with deep sadness that just under three years later, we are winding down the publication.

As of today, we will not publish any more stories. All of our newsletters, apart from our flagship, Source Code, will no longer be sent. Source Code will be published and sent for the next few weeks, but it will also close down in December.

Keep ReadingShow less
Bennett Richardson

Bennett Richardson ( @bennettrich) is the president of Protocol. Prior to joining Protocol in 2019, Bennett was executive director of global strategic partnerships at POLITICO, where he led strategic growth efforts including POLITICO's European expansion in Brussels and POLITICO's creative agency POLITICO Focus during his six years with the company. Prior to POLITICO, Bennett was co-founder and CMO of Hinge, the mobile dating company recently acquired by Match Group. Bennett began his career in digital and social brand marketing working with major brands across tech, energy, and health care at leading marketing and communications agencies including Edelman and GMMB. Bennett is originally from Portland, Maine, and received his bachelor's degree from Colgate University.

Enterprise

Why large enterprises struggle to find suitable platforms for MLops

As companies expand their use of AI beyond running just a few machine learning models, and as larger enterprises go from deploying hundreds of models to thousands and even millions of models, ML practitioners say that they have yet to find what they need from prepackaged MLops systems.

As companies expand their use of AI beyond running just a few machine learning models, ML practitioners say that they have yet to find what they need from prepackaged MLops systems.

Photo: artpartner-images via Getty Images

On any given day, Lily AI runs hundreds of machine learning models using computer vision and natural language processing that are customized for its retail and ecommerce clients to make website product recommendations, forecast demand, and plan merchandising. But this spring when the company was in the market for a machine learning operations platform to manage its expanding model roster, it wasn’t easy to find a suitable off-the-shelf system that could handle such a large number of models in deployment while also meeting other criteria.

Some MLops platforms are not well-suited for maintaining even more than 10 machine learning models when it comes to keeping track of data, navigating their user interfaces, or reporting capabilities, Matthew Nokleby, machine learning manager for Lily AI’s product intelligence team, told Protocol earlier this year. “The duct tape starts to show,” he said.

Keep ReadingShow less
Kate Kaye

Kate Kaye is an award-winning multimedia reporter digging deep and telling print, digital and audio stories. She covers AI and data for Protocol. Her reporting on AI and tech ethics issues has been published in OneZero, Fast Company, MIT Technology Review, CityLab, Ad Age and Digiday and heard on NPR. Kate is the creator of RedTailMedia.org and is the author of "Campaign '08: A Turning Point for Digital Media," a book about how the 2008 presidential campaigns used digital media and data.

Latest Stories
Bulletins