America Remains Vulnerable To Cyber Attack

Leon Panetta (pictured), who served as CIA director and Defense Secretary during the administration of President Barack Obama, has recently written that he considers the plans established by the Trump administration to protect the electric grid against cyber sabotage “distract from the real solutions that would truly protect American critical infrastructure.”’
 
The article , co-authored with  a former Republican Senator James Talent, called on Congress to go beyond 2015 legislation aimed at fostering communication between private companies and the government about vulnerabilities, and to double down on other structural changes such as the establishment of a cybersecurity agency within the Department of Homeland Security.
 
“Congress must now ensure that these entities have the necessary resources and personnel,” the authors wrote. “The federal government’s inability to retain cyber talent is a serious obstacle to preparedness.”
 
They recommended that Congress act quickly on pending legislation that allows private-sector or academic cyber experts to work for federal agencies for up to two years.
 
But they also listed other key challenges, including:
 
• Developing best practices aimed at segregating business IT systems from systems that control infrastructure;
• Allay industry concerns about possible antitrust violations arising from developing collective responses to cyber threats.
 
“The threat of a destructive cyber-attack that could cost lives is growing every day,” the authors wrote. “Facing limited resources and adversaries that range from nation states to terrorists, government cannot do this alone.”
 
Panetta named Russia and Iran as the two most serious cyber adversaries, but they pointed out that US vulnerabilities could be exploited by anyone sitting at a computer able to “deploy cheap but destructive cyber-attacks on US critical infrastructure.
 
“There must be a partnership of government and the private sector if the United States is to effectively defend itself from a cyber Pearl Harbor,” the authors wrote.
 
CrimeReport
 
You Might Also Read: 
 
Why Has The US Not Been Hit With A Devastating Cyber Attack?:
 
 
 
« US Head of Homeland Security’s Departure Raises Questions
A Cybersecurity Guide For Small Business »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Wizard Computing

Wizard Computing

Wizard Computer Services is a full service IT solutions provider that offers managed services, consultation, installation, and support to small and large businesses in New England.

Tripwire

Tripwire

Tripwire are a leading provider of risk-based security, compliance and vulnerability management solutions.

Cyber Aware

Cyber Aware

Cyber Aware aims to drive behaviour change amongst small businesses and individuals, so that they adopt simple secure online behaviours.

H3C Group

H3C Group

H3C provides a full range of Computer, Storage, Networking and Security solutions.

Dice

Dice

Dice is a leading recruitment platform, helping technology professionals manage their careers and employers connect with highly skilled tech talent in specialist areas including cybersecurity.

Exponential-e

Exponential-e

Exponential-e provide Cloud and Unified Communications services and world-class Managed IT Services including Cybersecurity.

Knowledge Transfer Network (KTN)

Knowledge Transfer Network (KTN)

KTN links new ideas and opportunities with expertise, markets and finance through our network of businesses, universities, funders and investors.

Jobsite

Jobsite

Jobsite is an award winning job board in the UK providing job listings in the key sectors of IT, Engineering and Finance.

Snowflake

Snowflake

Empower your cybersecurity and compliance teams with Snowflake. Gain full visibility into security logs, at massive scale, while reducing costs of Security Information and Event Management systems.

Hyperion Gray

Hyperion Gray

Hyperion Gray are a small research and development team focused on innovative work in a variety of areas including Software & Security Research, Penetration Testing, Incident Response, and Red Teaming

Great American Insurance Group

Great American Insurance Group

Great American's Cyber Risk Division offers cyber solutions for small and medium-sized businesses.

Cyber Chasse

Cyber Chasse

Cyber Chasse is an IT consulting and staffing company offering a full range of cybersecurity solutions, contract staffing services and online training courses.

iVision

iVision

iVision is a technology integration and management firm that engineers success for clients through objective recommendations, process and technology expertise and best-of-breed guidance.

Veriti

Veriti

Veriti is a unified security posture management platform that integrates with your security solutions and proactively identifies and remediates potential risks and misconfigurations.

Sterling Information Technologies

Sterling Information Technologies

Sterling is an information security, operational risk consulting and advisory group. Our Advisory services help to safeguard information assets while supporting business operations.

Apex

Apex

We aspire to make the AI revolution run faster, securely, for the benefit of all. We are purposely built for the new AI era and are creating capabilities to safely enable AI.