Sp Server Startup

Government Seeks Cybersecurity, Superiority in Mostly Lawless Domain

The typical IT department must concern itself with all sorts of threats: Spyware and cookies that hop on users’ computers after a seemingly harmless click on a banner ad; malware that unwitting e-mailers save to their hard drives in pursuit of a fun e-card from a friend; and malicious codes that save themselves to your hard drive after inserting a flash drive. All of these things could cripple the enterprise’s network infrastructure, making it quite difficult to continue with business as usual.

But what about when that business is the U.S. government? Not only is its network more critical, but it’s also sustains a great many more threats: Last year, Defense Department systems alone sustained about six million assaults a day. And government networks run everything from the nation’s power grids to software on fighter jets, meaning a successful attack could have far-reaching, devastating consequences.

“Our government needs to be aware of what’s happening out there, how are these attacks occurring, whether our entire financial critical infrastructure [could be] at risk,” said Ed Jaehne, chief strategy officer at cybersecurity firm KEYW.

That pro-active approach is part of the government, Defense Department and intelligence services’ goal to bolster not just their cybersecurity but also their cyber superiority, the ability not only to defend critical assets but also to extract key information – about foreign companies, intelligence services or defense operations, for example – from cyberspace. Cyber superiority also focuses on using such information-gathering tactics to create a “decision advantage” for the country’s leadership. “We need to be ready to shift into an attack mode if that is authorized and required. Importantly, need to understand how attacks against us can be conducted,” Jaehne said.

In a recently released paper, Rice University’s IT policy fellow Chris Bronk argues that the United States employs a double standard when it seeks to use cyber tools to affect other nations – swiping intellectual property or messing with critical infrastructure, for example – but raises a cry when other entities reach into U.S. networks

“I hear a lot in the United States about how bad it is for other countries to try to steal intellectual property and other stuff from us and from other countries. I think it’s a form of hypocrisy for the U.S. to say that, because that’s what we’re doing,” Bronk said in an interview.

At the same time, he said, that doesn’t mean that the federal government shouldn’t simply ignore the Internet’s ability to bolster the nation’s security.

“I’m not saying that we shouldn’t use information technology to spy on Iran’s nuclear program or to keep tabs on Hezbollah; both of those seem like a great idea,” Bronk said. “But we can’t then go and point our finger at other world powers and say, ‘You’re spying on our companies. That’s bad.’”

But what exactly the government is saying about its cybersecurity policy is a bit unclear. It has no publicized policy on securing cyberspace, and both Bronk and Jaehne said it has quite a bit of work to do to be able to secure all its assets.

“The state of policy is substantially behind the threat,” Jaehne said. “It is something that has a lot of attention, but there’s a lot more attention and a lot more in the way of meetings than there is in the way of action on the policy level.”

Bronk said that he would like to see the United States develop a cybersecurity policy that seeks to “play by the rules” – but that a major issue internationally is the dearth of agreements governing the domain. Though much of the world follows the European Union’s Convention on Cybercrime, those regulations address only criminal behavior – identity theft, stealing, money laundering – and fail to prescribe anything for those that carry out cyber attacks.

“There’s all this other nastiness going on,” Bronk said. “Why isn’t there an international agreement on banning denial of service attacks?”

Featured

  • Maximizing Your Security Budget This Year

    Perimeter Security Standards for Multi-Site Businesses

    When you run or own a business that has multiple locations, it is important to set clear perimeter security standards. By doing this, it allows you to assess and mitigate any potential threats or risks at each site or location efficiently and effectively. Read Now

  • Survey: 72% of CISOs Are Concerned Generative AI Solutions Could Result In Security Breach

    Metomic recently released its “2024 CISO Survey: Insights from the Security Leaders Keeping Critical Business Data Safe.” Metomic surveyed more than 400 Chief Information Security Officers (CISOs) from the U.S. and UK to gain deeper insights on the state of data security. The report includes survey findings on various cybersecurity issues, including security leaders’ top priorities and challenges, SaaS app usage across their organization, and biggest concerns with implementing generative AI solutions. Read Now

  • New Research Shows a Continuing Increase in Ransomware Victims

    GuidePoint Security recently announced the release of GuidePoint Research and Intelligence Team’s (GRIT) Q1 2024 Ransomware Report. In addition to revealing a nearly 20% year-over-year increase in the number of ransomware victims, the GRIT Q1 2024 Ransomware Report observes major shifts in the behavioral patterns of ransomware groups following law enforcement activity – including the continued targeting of previously “off-limits” organizations and industries, such as emergency hospitals. Read Now

  • OpenAI's GPT-4 Is Capable of Autonomously Exploiting Zero-Day Vulnerabilities

    According to a new study from four computer scientists at the University of Illinois Urbana-Champaign, OpenAI’s paid chatbot, GPT-4, is capable of autonomously exploiting zero-day vulnerabilities without any human assistance. Read Now

Featured Cybersecurity

Webinars

New Products

  • 4K Video Decoder

    3xLOGIC’s VH-DECODER-4K is perfect for use in organizations of all sizes in diverse vertical sectors such as retail, leisure and hospitality, education and commercial premises. 3

  • EasyGate SPT and SPD

    EasyGate SPT SPD

    Security solutions do not have to be ordinary, let alone unattractive. Having renewed their best-selling speed gates, Cominfo has once again demonstrated their Art of Security philosophy in practice — and confirmed their position as an industry-leading manufacturers of premium speed gates and turnstiles. 3

  • PE80 Series

    PE80 Series by SARGENT / ED4000/PED5000 Series by Corbin Russwin

    ASSA ABLOY, a global leader in access solutions, has announced the launch of two next generation exit devices from long-standing leaders in the premium exit device market: the PE80 Series by SARGENT and the PED4000/PED5000 Series by Corbin Russwin. These new exit devices boast industry-first features that are specifically designed to provide enhanced safety, security and convenience, setting new standards for exit solutions. The SARGENT PE80 and Corbin Russwin PED4000/PED5000 Series exit devices are engineered to meet the ever-evolving needs of modern buildings. Featuring the high strength, security and durability that ASSA ABLOY is known for, the new exit devices deliver several innovative, industry-first features in addition to elegant design finishes for every opening. 3