We could not find any results for:
Make sure your spelling is correct or try broadening your search.
Name | Symbol | Market | Type |
---|---|---|---|
Xtrackers California Municipal Bonds ETF | NASDAQ:CA | NASDAQ | Exchange Traded Fund |
Price Change | % Change | Price | Bid Price | Offer Price | High Price | Low Price | Open Price | Traded | Last Trade | |
---|---|---|---|---|---|---|---|---|---|---|
0.00 | 0.00% | 24.885 | 10.01 | 39.56 | 0 | 09:09:44 |
Mordecai Rosen, senior vice president and general manager for the cybersecurity business at CA Technologies (NASDAQ: CA), joined industry representatives to testify before the U.S. House Homeland Security Subcommittee on Cybersecurity, Infrastructure Protection, and Security Technologies. Rosen assessed implementation of the Cybersecurity Act of 2015, offered recommendations to help bolster participation in cyber threat information sharing programs, and highlighted new cybersecurity challenges facing the government and commercial sectors.
“Identity has become the attack vector of choice for cyber criminals. It is the single unifying control point in the application economy, critical to accessing all apps, devices, data and users,” said Rosen. “The Cybersecurity Act of 2015 includes guidance that addresses the need for identity protection, multi-factor authentication, and least-privilege access controls to better protect the critical systems and infrastructure of our nation and our industries.”
Three core questions around the Act’s information sharing authorization relate to the timeliness and security of the information, and the liability protections afforded to participating organizations.
“To effectively thwart attacks, organizations will need to know that the information they receive through this program will be timely, accessible and actionable,” Rosen said. “Just as important as the timeliness, they will need to know that the shared information is secure. Trust is vital to the success of this program, and industry needs to know that the participants in the program are authenticated and that the data they share and receive is legitimate.
“Finally, further clarification is desired around the liability protections for sharing information with other private sector organizations and the automated removal of personally identifiable information,” Rosen added.
Rosen also outlined three recommendations related to specific provisions within the Cybersecurity Act of 2015:
CA Technologies is available to speak further about this topic. Please call or email the press contact below.
About CA Technologies
CA Technologies (NASDAQ:CA) creates software that fuels transformation for companies and enables them to seize the opportunities of the application economy. Software is at the heart of every business in every industry. From planning, to development, to management and security, CA is working with companies worldwide to change the way we live, transact, and communicate – across mobile, private and public cloud, distributed and mainframe environments. Learn more at www.ca.com.
Follow CA Technologies
Legal Notices
Copyright © 2016 CA, Inc. All Rights Reserved. All trademarks, trade names, service marks, and logos referenced herein belong to their respective companies.
View source version on businesswire.com: http://www.businesswire.com/news/home/20160615005122/en/
Press:CA TechnologiesLeanne Agurkis, +1 407-620-2136Leanne.Agurkis@ca.com
1 Year Xtrackers California Mun... Chart |
1 Month Xtrackers California Mun... Chart |
It looks like you are not logged in. Click the button below to log in and keep track of your recent history.
Support: +44 (0) 203 8794 460 | support@advfn.com
By accessing the services available at ADVFN you are agreeing to be bound by ADVFN's Terms & Conditions