America Remains Vulnerable To Cyber Attack

Leon Panetta (pictured), who served as CIA director and Defense Secretary during the administration of President Barack Obama, has recently written that he considers the plans established by the Trump administration to protect the electric grid against cyber sabotage “distract from the real solutions that would truly protect American critical infrastructure.”’
 
The article , co-authored with  a former Republican Senator James Talent, called on Congress to go beyond 2015 legislation aimed at fostering communication between private companies and the government about vulnerabilities, and to double down on other structural changes such as the establishment of a cybersecurity agency within the Department of Homeland Security.
 
“Congress must now ensure that these entities have the necessary resources and personnel,” the authors wrote. “The federal government’s inability to retain cyber talent is a serious obstacle to preparedness.”
 
They recommended that Congress act quickly on pending legislation that allows private-sector or academic cyber experts to work for federal agencies for up to two years.
 
But they also listed other key challenges, including:
 
• Developing best practices aimed at segregating business IT systems from systems that control infrastructure;
• Allay industry concerns about possible antitrust violations arising from developing collective responses to cyber threats.
 
“The threat of a destructive cyber-attack that could cost lives is growing every day,” the authors wrote. “Facing limited resources and adversaries that range from nation states to terrorists, government cannot do this alone.”
 
Panetta named Russia and Iran as the two most serious cyber adversaries, but they pointed out that US vulnerabilities could be exploited by anyone sitting at a computer able to “deploy cheap but destructive cyber-attacks on US critical infrastructure.
 
“There must be a partnership of government and the private sector if the United States is to effectively defend itself from a cyber Pearl Harbor,” the authors wrote.
 
CrimeReport
 
You Might Also Read: 
 
Why Has The US Not Been Hit With A Devastating Cyber Attack?:
 
 
 
« US Head of Homeland Security’s Departure Raises Questions
A Cybersecurity Guide For Small Business »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Navista

Navista

Navista's hardware and software modules are especially designed to ease the deployment of secure networks.

Harel Mallac Technologies

Harel Mallac Technologies

Harel Mallac Technologies is a Mauritian organisation that has developed a strong network of ICT specialists with nodes across the African continent.

Oznet Cyber Security

Oznet Cyber Security

Oznet Cyber Security is dedicated to offering integral solutions oriented to the support and security of information.

DQM GRC

DQM GRC

DQM GRC are one of the UK's leading providers of data governance, e-privacy and GDPR services, to commercial organisations across all industries in the UK.

MyCyberSecurity Clinic (MyCSC)

MyCyberSecurity Clinic (MyCSC)

MyCyberSecurity Clinic's main goal is toward establishing an international reference centre for excellence in the field of digital forensics and data recovery services.

GrrCON

GrrCON

GrrCON is an information security and hacking conference that provides the Midwest InfoSec community with a fun atmosphere to come together and engage with like minded people.

Right-Hand Cybersecurity

Right-Hand Cybersecurity

Right-Hand Cybersecurity empowers businesses to monitor, measure and mitigate employee induced cyber risks in real-time.

SAST

SAST

SAST provide Static Application Security Testing as a service based on SAST Tools.

Diateam

Diateam

Diateam is an R&D company specializing in computer security. Diateam develops highly innovative cyber range platforms and Industry-leading systems for cybersecurity training and testing labs.

ISMAC

ISMAC

ISMAC was founded to create a security solution that would work for smaller to medium as well as bigger corporations at an affordable price.

South East Cyber Resilience Centre (SECRC)

South East Cyber Resilience Centre (SECRC)

The South East Cyber Resilience Centre supports and helps protect SMEs and supply chain businesses and third sector organisations in the region against cyber crime.

Accedian

Accedian

Accedian is a leader in performance analytics and end user experience solutions, dedicated to providing our customers with the ability to assure their digital infrastructure.

Akamai Technologies

Akamai Technologies

Akamai's leading security, compute, and delivery solutions are helping global companies make life better for billions of people, billions of times a day.

VISO Cyber Security

VISO Cyber Security

VISO provide Cyber Security Consulting and CISO as a Service to companies who need to augment their leadership teams with information security expertise.

National Cybersecurity Agency (ACN) - Italy

National Cybersecurity Agency (ACN) - Italy

The ACN is the National Authority for Cybersecurity in Italy. the Agency promotes public-private initiatives to strengthen the national cybersecurity and resilience posture.

Tsaaro Academy

Tsaaro Academy

Tsaaro Academy is a unique privacy certification training platform and here you earn a privacy certification CEH, CISM and DPO from India’s No.1 Privacy training platform.