America Remains Vulnerable To Cyber Attack

Leon Panetta (pictured), who served as CIA director and Defense Secretary during the administration of President Barack Obama, has recently written that he considers the plans established by the Trump administration to protect the electric grid against cyber sabotage “distract from the real solutions that would truly protect American critical infrastructure.”’
 
The article , co-authored with  a former Republican Senator James Talent, called on Congress to go beyond 2015 legislation aimed at fostering communication between private companies and the government about vulnerabilities, and to double down on other structural changes such as the establishment of a cybersecurity agency within the Department of Homeland Security.
 
“Congress must now ensure that these entities have the necessary resources and personnel,” the authors wrote. “The federal government’s inability to retain cyber talent is a serious obstacle to preparedness.”
 
They recommended that Congress act quickly on pending legislation that allows private-sector or academic cyber experts to work for federal agencies for up to two years.
 
But they also listed other key challenges, including:
 
• Developing best practices aimed at segregating business IT systems from systems that control infrastructure;
• Allay industry concerns about possible antitrust violations arising from developing collective responses to cyber threats.
 
“The threat of a destructive cyber-attack that could cost lives is growing every day,” the authors wrote. “Facing limited resources and adversaries that range from nation states to terrorists, government cannot do this alone.”
 
Panetta named Russia and Iran as the two most serious cyber adversaries, but they pointed out that US vulnerabilities could be exploited by anyone sitting at a computer able to “deploy cheap but destructive cyber-attacks on US critical infrastructure.
 
“There must be a partnership of government and the private sector if the United States is to effectively defend itself from a cyber Pearl Harbor,” the authors wrote.
 
CrimeReport
 
You Might Also Read: 
 
Why Has The US Not Been Hit With A Devastating Cyber Attack?:
 
 
 
« US Head of Homeland Security’s Departure Raises Questions
A Cybersecurity Guide For Small Business »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

ON-DEMAND WEBINAR: 2024 and beyond: Top six cloud security trends

ON-DEMAND WEBINAR: 2024 and beyond: Top six cloud security trends

Learn about the top cloud security trends in 2024 and beyond, along with solutions and controls you can implement as part of your security strategy.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Alert Logic

Alert Logic

Alert Logic delivers unrivaled security for any environment, delivering industry-leading managed detection and response (MDR) and web application firewall (WAF) solutions.

QTS

QTS

QTS Realty Trust, Inc. is a leading provider of secure, compliant data center, hybrid cloud and managed services.

Kore Telematics

Kore Telematics

Kore is a leading managed service provider for IoT and M2M applications.

Snyk

Snyk

Snyk is the leader in developer security. We empower the world’s developers to build secure applications and equip security teams to meet the demands of the digital world.

TCPWave

TCPWave

TCPWave IPAM is the world’s first acclaimed DNS/DHCP management software to pass the most stringent Information security tests.

Mantix4

Mantix4

Mantix4’s M4 Cyber Threat Hunting Platform actively defends against cyber threats.

Lifespan Technology

Lifespan Technology

Lifespan Technology provides the full range of IT Asset Disposition services. This includes hardware recycling and disposal, data destruction, and hardware resale.

Security BSides

Security BSides

Security BSides is the first grass roots, DIY, open security conference in the world!. BSides is a community-driven framework for building events for and by information security community members.

Snode Technologies

Snode Technologies

Snode's Guardian cybersecurity platform uses AI and machine learning to monitor, detect and proactively respond to all threats on every device within your network.

Adyta

Adyta

Adyta specializes in cybersecurity solutions adapted to the needs of sovereign institutions, business groups and other organizations that handle information and sensitive or classified data.

Ensighten

Ensighten

Ensighten is a leader in Website Security & Privacy Compliance. Protect your website from malicious attacks, monitor & detect vulnerabilities, protect consumer data.

Identity Management Institute (IMI)

Identity Management Institute (IMI)

Identity Management Institute (IMI) provides professional training and certification in cyber security with a focus on identity and access management, identity theft, and data protection.

CySecK

CySecK

CySecK is a Centre of Excellence in Cybersecurity formed in 2017 by the Government of Karnataka, as part of the Technology Innovation Strategy.

Cyrex

Cyrex

Cyrex is a Web3 security and development company. Our mastery over decentralized applications, smart contracts and blockchain will keep you secure across Web3.

Buzz Cybersecurity

Buzz Cybersecurity

Buzz Cybersecurity systems and services are designed to proactively guard against common and uncommon cyber threats.

Systems Engineering

Systems Engineering

Systems Engineering is a SOC 2, Type 2-certified IT strategy and managed technology services provider.