Trump Calls On US To Use Offensive Cyber Weapons

The US government needs to be ready to use its offensive Cyber-weapons in response to attacks from other nations, Republican presidential candidate Donald Trump has said.

The US has significant offensive Cyber-capabilities, but it has been shy about deploying them, Trump said during a speech in Herdon, Va. "This is the warfare of the future," he said.

The US should also increase its use of Cyber-weapons to attack terrorists, Trump said. President Barack Obama has failed to protect the nation's Cybersecurity and a new focus is needed, added Trump, who has largely avoided technology issues in his campaign.

Trump said he will create an international Cybersecurity task force to battle hackers, and he will ask US military leaders for suggestions on how to improve the nation's Cyber-defenses.

Another team of experts will review all US government Cyber-security systems. "Ultimately, all systems will be reviewed and made as secure as modern technology permits," he said. "The review team will also remain current with constantly evolving new methods of attack and will attempt to anticipate them and develop defense as often as possible before breaches occur."

Trump also called on US agencies to follow "best and strongest" security practices and to set up new security training programs for all employees.

Trump didn't say how he'd pay for an overhaul of the government's IT systems, which could cost tens of billions of dollars. His description of the review team's duties to anticipate attacks mirror efforts that have been in place in the US government for years.

Trump also used the speech to attack Democratic candidate Hillary Clinton's operation of a private email server while she served as Obama's secretary of state.

Trump said his speech on Cyber-security was "just the beginning of a long and overdue discussion" about the issue.

Clinton released a Cyber-security plan months ago. She called on expanded investments in Cyber-security technologies and accelerated adoption of best practices such as the U.S. National Institute of Standards and Technology Cybersecurity Framework, first issued in February 2014.

Computerworld

 

 

« Virtual Reality - The Next Wave
Future War - Extremely Fast And Lethal »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Resecurity, Inc.

Resecurity, Inc.

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

PakCERT

PakCERT

PakCERT is the national Computer Emergency Response Team for Pakistan.

HackCon Norway

HackCon Norway

HackCon is for the people who are interested in technology, psychology, IT and security, and who wants to improve their knowledge within these areas.

Forter

Forter

Forter provides new generation fraud prevention to meet the challenges faced by modern enterprise e-commerce.

BlueKrypt

BlueKrypt

BlueKrypt is a consulting firm for the security of IT systems and their management.

Ockam

Ockam

Ockam gives you the tools you need to establish an architecture for trust within your connected device applications.

MyCyberSecurity Clinic (MyCSC)

MyCyberSecurity Clinic (MyCSC)

MyCyberSecurity Clinic's main goal is toward establishing an international reference centre for excellence in the field of digital forensics and data recovery services.

At-Bay

At-Bay

At-Bay offer an end-to-end solution to cyber risk with comprehensive risk assessment, a tailored cyber insurance policy and year-long, active, risk-management service.

Commonwealth Cyber Initiative (CCI)

Commonwealth Cyber Initiative (CCI)

The Commonwealth Cyber Initiative is establishing Virginia as a global center of excellence at the intersection of security, autonomous systems, and data.

ISMAC

ISMAC

ISMAC was founded to create a security solution that would work for smaller to medium as well as bigger corporations at an affordable price.

Conquest Cyber

Conquest Cyber

Conquest Cyber builds adaptive risk management programs where innovation is most needed – within defense, intelligence, federal civilian agencies and the industrial base that supports them.

Mitnick Security

Mitnick Security

Mitnick Security is a leading global provider of information security consulting and training services.

Apono

Apono

Apono enables DevOps and security teams to manage access to sensitive cloud assets and data repositories in a frictionless and compliant way.

Polygraph

Polygraph

Polygraph monitors the activities of click fraud gangs, including how they operate, who they target, the techniques they use, and how to detect their fraud.

Quantum eMotion (QeM)

Quantum eMotion (QeM)

Quantum eMotion is a Montreal-based advanced developer leading the way towards a new generation of quantum-safe encryption for the quantum computing age.

DigitalPlatforms

DigitalPlatforms

DigitalPlatforms SpA is an Italian group with the mission of providing end-to-end solutions and Internet of Things and Cyber technologies to companies that manage critical infrastructures.

Memcyco

Memcyco

Memcyco is a provider of cutting-edge digital trust technologies to empower brands in combating online brand impersonation fraud, and preventing fraud damages to businesses and their clients.