Instead, a House subcommittee deferred questions about "damage" of leaks to a classified briefing U.S. lawmakers had a chance to pose questions to the director of the National Security Agency on Wednesday but declined to ask him about reports that the agency plans to install malware on millions of computers.General Keith Alexander did not volunteer information about the reported NSA program to deploy tens of thousands of copies of surveillance malware on computers and networking devices around the world.Committee members didn’t ask him about it, either. Instead, committee members praised the soon-to-retire Alexander for his years of service at the NSA and Cyber Command. “A grateful nation salutes you,” said Representative Jim Langevin, a Rhode Island Democrat.Alexander was testifying before a subcommittee of the House Armed Services Committee, where he talked about the need for U.S. Cyber Command, the sister agency to the NSA, to get real-time cyberthreat information from U.S. businesses. Representative Vicky Hartzler, a Missouri Republican, asked if the subcommittee would address questions about holding a briefing on the latest leaks by former NSA contractor Edward Snowden, the source of the reports on the agency’s malware plan.Wednesday’s hearing was focused on Cyber Command, not NSA issues, said Intelligence Subcommittee Chairman Mac Thornberry, a Texas Republican. The committee would schedule a classified intelligence briefing “where we can go deeply into the damage done to our national security” by the Snowden leaks, he said. Alexander’s main focus at the hearing was to advocate for legislation that would allow U.S. businesses to share cyberthreat information with Cyber Command and other government agencies. He called on Congress to pass legislation that would protect businesses from lawsuits if they accidentally overshare information.“We have to have a way to understand when Wall Street is under attack,” Alexander said. “Right now, we get it after the fact. We get called up, it’s not real time, and as a consequence, we can’t defend them.”The government and businesses need to be able to share cyberthreat information “at network speed,” he said.Some privacy and digital rights groups have questioned information-sharing legislation, saying it could allow businesses to share personal information unrelated to cyberattacks.Grant Gross covers technology and telecom policy in the U.S. government for The IDG News Service. Follow Grant on Twitter at GrantGross. Grant’s email address is grant_gross@idg.com. Related content news UK government plans 2,500 new tech recruits by 2025 with focus on cybersecurity New apprenticeships and talent programmes will support recruitment for in-demand roles such as cybersecurity technologists and software developers By Michael Hill Sep 29, 2023 4 mins Education Industry Education Industry Education Industry news UK data regulator orders end to spreadsheet FOI requests after serious data breaches The Information Commissioner’s Office says alternative approaches should be used to publish freedom of information data to mitigate risks to personal information By Michael Hill Sep 29, 2023 3 mins Government Cybercrime Data and Information Security feature Cybersecurity startups to watch for in 2023 These startups are jumping in where most established security vendors have yet to go. By CSO Staff Sep 29, 2023 19 mins CSO and CISO Security news analysis Companies are already feeling the pressure from upcoming US SEC cyber rules New Securities and Exchange Commission cyber incident reporting rules don't kick in until December, but experts say they highlight the need for greater collaboration between CISOs and the C-suite By Cynthia Brumfield Sep 28, 2023 6 mins Regulation Data Breach Financial Services Industry Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe