Inside Cybersecurity

April 10, 2020

Home Page

By Charlie Mitchell

The Justice Department and other federal members of “Team Telecom” are urging the Federal Communications Commission to “revoke and terminate” China Telecom’s authorizations to provide international services to and from the United States, citing cyber and other national security risks.

Cyber Congress: Analysis
By Charlie Mitchell

Senate Commerce Chairman Roger Wicker (R-MS) sees the COVID-19 crisis as a huge moment for demonstrating the widespread benefits of “Big Data” analytics – and also as yet another chance to shine a light on the need for a federal privacy standard.

By Sara Friedman

The National Institute of Standards and Technology is planning to separate its control baselines, and overlay and mapping guidance from the latest revision of standards for data security and privacy used by federal agencies, and will create a companion document draft for comment when the final standards are released later this year.

By Charlie Mitchell

Kiersten Todt, executive director of President Obama’s national cybersecurity commission and a key player in cyber policy development, says the recent executive order on telecom security underscores the vital role that an empowered cyber coordinator could play, pointing to a White House position abolished in 2018.

By Sara Friedman

California’s privacy law and the European Union’s General Data Protection Regulation are useful starting points for U.S. lawmakers to draw from when drafting a national privacy law, academics focused on privacy research say, but there are negatives from both of the standards that should be considered when crafting new legislation.

By Justin Doubleday

The Defense Department wants to shift more than four million employees to a new teleworking service based on Microsoft Teams, as federal employees increasingly work from home amid the coronavirus pandemic.

Working Remotely?

We recognize that many of our readers are, or will be, working remotely, and may not be able to access this service in the usual way (because your username and password is saved in your office computer, or because your organization's access is managed by IP address, etc). If you find yourself in this situation, let us know and we’ll provide you with temporary access credentials. You can contact us at