Like many websites, BSA’s websites use cookies to ensure the efficient functioning of those websites and give our users the best possible experience. You can learn more about how we use cookies, and how you can change your browser's cookie settings, in our cookies statement. By continuing to use this site without changing your cookie settings, you consent to our use of cookies.
BSA | The Software Alliance appreciates the opportunity to provide comments in response to the Cybersecurity and Infrastructure Security Agency’s (CISA) Request for Comment on CISA’s Secure Software Development Attestation Form.
Read more
BSA | The Software Alliance (“BSA”) welcomes this opportunity to provide comments to the US Department of Commerce’s (“Commerce”) Bureau of Industry and Security (“BIS”) in response to its Interim Final Rule (“IFR”) and solicitation of comments regarding the implementation of additional export controls on certain advanced technologies.
Read more
TechTarget, December 7, 2023. BSA | The Software Alliance Managing Director, Policy Kate Goodloe illustrates the importance of federal procurement and how AI can help identify and mitigate cyber threats.
Read more
Politico Pro Morning Cybersecurity, December 6, 2023. BSA | The Software Alliance Managing Director Kate Goodloe will testify before the House Oversight's cyber subcommittee on how the US government can leverage AI for national security.
Read more
Roll Call, December 5, 2023. BSA | The Software Alliance Director, Policy Joseph Whitlock discusses the repercussions of the USTR withdrawal from the WTO digital trade provisions.
Read more
On behalf of the undersigned associations, we wish to express our profound concern and disappointment that the Office of the United States Trade Representative (USTR) has withdrawn its support for proposed World Trade Organizations (WTO) disciplines that protect cross-border data flows; prohibit data localization mandates; preclude discrimination against American-made digital products; and safeguard sensitive source code from forced disclosure mandates that enable malicious cyber activity.
Read more