× Business
TelecomHealthcareDigital MarketingERPRetailMedia and EntertainmentOil and GasFood and BeveragesMarketing and AdvertisingBanking and InsuranceMetals and MiningLegalComplianceCryptocurrency
Big DataCloudIT ServiceSoftwareMobileSecurityNetworkingStorageCyber SecuritySAPData AnalysisloTBio TechQuality AssuranceEducationE-commerceGaming and VFXArtificial Intelligencescience-and-technology
Cisco DATABASE Google IBM Juniper Microsoft M2M Oracle Red hat Saas SYMANTEC
CEO ReviewCMO ReviewCFO ReviewCompany Review
Startups Opinion Yearbook Readers Speak Contact Us

New Rules for Cybersecurity in the U.S.A

siliconreview New Rules for Cybersecurity in the U.S.A

United States Senate would force various tech companies to stop providing the source code of the software sold to the U.S military to nations like China, Russia, and many other foreign countries. The major risks here are cybersecurity threats that may infiltrate the US systems and could cause a major problem for the military. Presently the bill was approved by Senate Armed services Committee which is now part of the Defense Authorization Act.

This bill was specifically made not to disclose any sort of vulnerabilities and weak points of the U.S system. Although, the bill still has to be passed by the full Senate and reconciled by the house of legislation and later signed by the US President Donald Trump.

Tech companies will have to reduce the use of software for non-classified areas. Further, all procedures and decisions taken by the tech companies will later be reviewed by the military official. All the data will be stored in a database and will be available at all times for the high-level decision makers to optimize it.

In the past McAfee and HPE who work on the software design for Federal Bureau of Ingestion and Pentagon allowed Russian-Based defense agencies to find flaws in the software will be stopped after the bill is passed.

Our security shouldn’t be breached and the U.S government wants to keep its secret safe. By passing the bill we surely will be avoiding any sort of cybersecurity threats.