
But are there no computer programs that one can use to check to see if an intrusion has occurred?
On the public record
Every politician on the site, every statement on file. Search, filter, and read the public record.
9,300+·quotes on file

But are there no computer programs that one can use to check to see if an intrusion has occurred?

We cannot call the czars or the heads of offices within the Executive Office of the President before this Committee.

The information and communication networks that we refer to as cyberspace have become critical to our economy, our national defense, and our homeland security.

It was the right decision. It has been judged as success by virtually everyone.

We are living in a wondrous new age of global information, an era that is being shaped by digital technology.

the one huge lever you have. There is nothing close to it. If you want to change security, the lever you have is procurement.

I do have a couple more questions and one comment.

I think we need far more clarity in answering that question because it is going to be a lot easier for the business community if there is a single source to go to.

When Senator Lieberman and I sat down to implement the recommendations of the 9/11 Commission back in 2006, we quickly realized that one of the Commission's recommendations having to do with the placement of the National Counterterrorism…

Do the retailers know what law enforcement to go to?

That is exactly the issue because what may seem to be an isolated attack affecting one business in one State may, in fact, be part of a network of attacks on several different businesses.

I think Mr. Reitinger's suggestion for a joint operations center where you have private sector and public sector people collocated and that is the source you go to, I think we need to get moving on that.

He believes that, as drafted, the RFP is highly likely to produce a platform that would make the users vulnerable to spoofing.

I still think there is a lack of clarity here.

We think it is time for that data to be encrypted so that merchants never have those card numbers in their system.

Thank you. Those are very helpful suggestions and ones that we should adopt.

we need to use the procurement power to increase the security of hardware and software that is bought.