Court Upholds Decision Against Broad E-Mail SubpoenaA federal appeals court will not reverse last year’s decision that the issuance of an egregiously overbroad subpoena for e-mail can qualify as a computer intrusion in violation of anti-hacking laws, according to a story in The Register today. The Justice Department had argued to no avail that a side-effect of the ruling has already made it harder for law enforcement officials to obtain Americans’ private e-mail. The Register outlines the case in question, but in short, overbroad subpoenas could constitute a violation of the Computer Fraud and Abuse Act and the Stored Communications Act (SCA), which outlaw unauthorized access to computers and stored email, respectively. Both those laws include criminal penalties, which means civil attorneys issuing overbroad subpoenasnot an uncommon eventnow risk lawsuits, and even potential criminal prosecution as computer intruders, under the decision. New Security Certification Gaining GroundFederal Computer Week today, new certification for information security professionals is beginning to gain traction less than a year after it was introduced, with about 100 people having earned the Information Systems Security Engineering Professional (ISSEP) credential, an extension of the popular Certified Information Systems Security Professional (CISSP) certification. The Systems Security Certification Consortium developed the certification with the National Security Agency, to address the specialized knowledge and expertise that the national security community requires of its employees and contractors. All of the consortium’s credentials require professionals to learn certain skills and practices in the relevant field and then pass tests. Results show that the person has attained a certain level of expertise in the given discipline. According to a story in A Software Program Aimed at Taming File-SharingNew York Times, The company has developed a technology that it says can spot copyrighted materials while they are being passed from computer to computer and block the transfer. File-sharing companies have argued that they cannot control copyright infringement on their networks. Record industry executives, who have said that they are against government-ordered technology fixes for copyright problems, said that they are not asking Congress to act, at least at this time. But the Times quotes Josh Bernoff, a principal analyst with Forrester Research, who says, “I think it does change the game. Now if you’re a legislator, you’re going to have to make a decision about whether you’re going to protect the rights of downloaders, or of the people who own the copyrights to the music.” The Recording Industry Association of America has been talking up a company named Audible Magic to lawmakers and regulators in Washington in recent weeks in an attempt to show that file-sharing networks can be tamed. According to todays Related content news analysis Companies are already feeling the pressure from upcoming US SEC cyber rules New Securities and Exchange Commission cyber incident reporting rules don't kick in until December, but experts say they highlight the need for greater collaboration between CISOs and the C-suite By Cynthia Brumfield Sep 28, 2023 6 mins Regulation Data Breach Financial Services Industry news UK data regulator warns that data breaches put abuse victims’ lives at risk The UK Information Commissioner’s Office has reprimanded seven organizations in the past 14 months for data breaches affecting victims of domestic abuse. By Michael Hill Sep 28, 2023 3 mins Electronic Health Records Data Breach Government news EchoMark releases watermarking solution to secure private communications, detect insider threats Enterprise-grade software embeds AI-driven, forensic watermarking in emails and documents to pinpoint potential insider risks By Michael Hill Sep 28, 2023 4 mins Communications Security Threat and Vulnerability Management Security Software news SpecterOps to use in-house approximation to test for global attack variations The new offering uses atomic tests and in-house approximation in purple team assessment to test all known techniques of an attack. By Shweta Sharma Sep 28, 2023 3 mins Penetration Testing Network Security Security Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe