DHS Wants Details of Network Outages Kept SecretA proposal that would require telecommunications companies to file public disclosures of large-scale outages of high-speed data lines or wireless networks faces a challenge from the Department of Homeland Security, which claims such a rule would provide terrorists with a “virtual roadmap” to targeting critical infrastructures. According to a story in The Register, the reports would include details such as geographic area, causes of the outage, whether or not there was malicious activity and so on. DHS, instead, would like to keep a record of such incidents from public view. It suggested reporting incidents to the Telecom Information Sharing and Analysis Center (ISAC). Data exchanged within the Telecom-ISAC is protected from public view. In an FCC filing this month, the Register reports that the DHS argued, “While this information is critical to identify and mitigate vulnerabilities in the system, it can equally be employed by hostile actors to idnetify vulnerabilities for the purpose of exploiting them.”Full story. GAO Report Critcizes D.C. Area Anti-Terror Spending As much as $340 million in federal money earmarked for security the Washington area against terrorism has been spent without a plan for measuring how safe the area is, according to a congressional report. As reported in the Washington Post, a 53-page study by the General Accounting Office criticizes the Department of Homeland Security for neglecting to track the spending and failing to tell Congress whether critical security gaps remain. Rep. Thomas M. Davis III (R-Va.) told the Post, “It’s very discouraging that, according to the GAO, there’s been no coordinated plan for spending the vast majority of federal emergency funds we’ve made available the past couple of years.” A spokesman for Secretary Tom Ridge said most of the grants the GAO examined were issued before DHS was created. Full story.AOL Employee Accused of Selling Millions of E-mail AddressesAn American Online engineer was arrested yesterday for selling 92 million e-mail addresses of AOL customers to spammers. The case is among the first under a new anti-spam law, which took effect Jan. 1.According to a story by The New York Times, Jason Smathers, 24, was arrested in his home in Harper’s Ferry, Va. Sean Dunaway, 21, a broker of e-mail lists for spam was arrested in Las Vegas. Dunaway bought the list from Smathers to promote his online gambling site, and then sold the list to other spammers for $52,000, according to the complaint. Dunaway is also alleged to have paid Smathers $100,000 last March for an updated list. AOL discovered the crime while it was conducting research for a civil lawsuit against a group of spammers.Full story. Related content news analysis DHS unveils one common platform for reporting cyber incidents Ahead of CISA cyber incident reporting regulations, DHS issued a report on harmonizing 52 cyber incident reporting requirements, presenting a model common reporting platform that could encompass them all. By Cynthia Brumfield Sep 25, 2023 10 mins Regulation Regulation Regulation news Chinese state actors behind espionage attacks on Southeast Asian government The distinct groups of activities formed three different clusters, each attributed to a specific APT group. By Shweta Sharma Sep 25, 2023 4 mins Advanced Persistent Threats Cyberattacks feature How to pick the best endpoint detection and response solution EDR software has emerged as one of the preeminent tools in the CISO’s arsenal. Here’s what to look for and what to avoid when choosing EDR software. By Linda Rosencrance Sep 25, 2023 10 mins Intrusion Detection Software Security Monitoring Software Data and Information Security feature Top cybersecurity M&A deals for 2023 Fears of recession, rising interest rates, mass tech layoffs, and conservative spending trends are likely to make dealmakers cautious, but an ever-increasing need to defend against bigger and faster attacks will likely keep M&A activity steady in By CSO Staff Sep 22, 2023 24 mins Mergers and Acquisitions Data and Information Security IT Leadership Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe