Cyber Security Industry Alliance Newsletter • Volume 1, Number 10 • June 2005

Executive Director’s Message

The Paradox of Emerging Technologies

Emerging technologies create an interesting paradox. More than likely, they are an improvement upon existing technologies, making our lives easier, faster and more convenient. However, the advanced nature of new technologies makes it increasingly challenging to secure them, and we are unable to protect the same information that we wish to transmit quickly and efficiently.


Survey Research on Voter Attitudes Toward Internet Security Issues

The electorate may be as polarized on party lines as ever, but on at least one topic do Republicans and Democrats stand together: government needs to do more to protect consumers' privacy on the Internet. This was the key finding in a survey Pineda Consulting recently conducted of 1,003 likely voters on the topic of Internet policy on behalf of the Cyber Security Industry Alliance. Voters are becoming increasingly insecure about using the Internet.


VoIP Security Workshop: Harmonizing Technology and Policy

On June 1 & 2, CSIA co-hosted a workshop focusing on the technical, legal and policy challenges of voice over internet protocol (VoIP). University of North Texas, George Mason University and The University of Tulsa were the other co-hosts. Approximately 150 participants spent the first day focused on technical and policy challenges, then spent the second day developing a long-term security and reliability research and development agenda for VoIP.


Report on the CSIA/GMU Symposium on Cyber Security and the Law: Addressing Compliance, Complexity, and Confusion — International Level

On Thursday, May 26, CSIA and George Mason University School of Law, Critical Infrastructure Protection Program co-sponsored the third in a series of forums on state, federal and international cyber security legislation. This event focused on international level issues and legislative efforts.


CSIA Member Spotlight

About iPass

About iPass: iPass Inc. delivers simple, secure and manageable enterprise mobility services, that maximize the productivity of workers as they move between office, home and remote locations. iPass security services — based on unique Policy Orchestration capabilities — work to close the gaps in protecting computers, networks assets, user identities and data whenever users connect over the Internet. iPass connectivity services utilize the iPass global virtual network, a unified network of hundreds of dial-up, wireless, and broadband providers in over 150 countries.


Trusted Teleworking

Teleworking: a concept that seems so simple. Employees are given the tools to work from home or on the road. Being able to have your work with you, wherever you are, has engendered popular tools and services like laptops and ubiquitous remote access. These tools have tremendously increased productivity for individuals, businesses and government agencies. Unfortunately, teleworking opens up new opportunities for malicious behavior that exploits this new productivity: hackers, intellectual property theft, viruses and worms, and malware.