Why Aren’t Companies Using Military Security?

Cyber Security: How Utilities Can Reduce Threat

The number of cybersecurity incidents and percentage of the total by industry in the US during fiscal year 2014 (source: US Homeland Security Department)

Have you ever stopped to think why defense companies have a classified network to prevent cyber attack, whereas companies handling our critical systems – electricity, gas or water – don’t? It’s rather a curious situation if you think about it. Why aren’t electric companies using the same classified network thus ensuring the power supply in times of peace as well as times of war?

US senators are soon to begin legislation meant, among other things, to make it easier for companies to share information regarding cyber security with each other and with the government. However, the Cyber Security Sharing Act is still uncertain, as it is getting a lot of criticism stemming from privacy and civil rights concerns. Furthermore, many previous attempts to address the matter have failed to reach the president’s desk.

When unclassified e-mail servers of the U.S Joint Chiefs of Staff were recently hacked, the ability to communicate securely on classified networks kept Pentagon operations moving. Cyber incident response teams managing the breach could communicate with the intelligence community, law enforcement, and other parts of the Pentagon without the alleged Russian attackers listening in. We all know what would have happened had a private company been attacks by the same attackers.
Today companies in the defense industry, such as Lockheed Martin, Boeing and others, have access to such cyber defense capabilities. The companies use a separate, classified network called DIBNET to share classified information in a secure fashion with each other as with the US Department of Defense.

Cyber security is usually thought of as a partnership between the government and the private sector. For that partnership to be fully realized, private companies bearing the costs of defending themselves against nation-state adversaries like China and Russia must be allowed access to the same networks and same information that federal agencies use to prevent and respond to cyberattacks.

I-hls

 

« Vodafone Leaked Email on 'hacking' of Reporter
The Shocking State of Cybercrime in Russia »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Herjavec Group

Herjavec Group

Herjavec Group's Managed Security Services practice defends your organization from increasingly sophisticated, targeted cybercrime threats.

Altius IT

Altius IT

Altius IT reviews your website for security vulnerabilities and provides a report identifying vulnerabilities and recommendations to make secure.

CERT-PA

CERT-PA

CERT-PA is the national Computer Emergency Response Team for Italian government institutions.

Dataglobal

Dataglobal

Dataglobal is an industry-leading provider of Information Archiving/Governance and Unified Data Classification solutions.

Woz U

Woz U

Woz U provides best-in-class technology training for Learners, Higher-Ed and Corporations. We focus on the most in-demand occupations such as Software Development, Data Science and Cyber Security.

LMG Security

LMG Security

LMG Security is a cybersecurity consulting, research and training firm.

BHC Laboratory

BHC Laboratory

BHC Laboratory is a cyber capabilities’ development company for a wide range of global customers.

Diateam

Diateam

Diateam is an R&D company specializing in computer security. Diateam develops highly innovative cyber range platforms and Industry-leading systems for cybersecurity training and testing labs.

Advantex Network Solutions

Advantex Network Solutions

Advantex Network Solutions are a leading provider in Mitel, IT Solutions, Networking, and iP surveillance.

OSI Security

OSI Security

OSI Security's primary services include penetration testing, security auditing, web application security testing and risk management.

Panther Labs

Panther Labs

Panther’s mission is to make security monitoring fast, flexible and scalable for all security teams.

iSPIRAL IT Solutions

iSPIRAL IT Solutions

iSPIRAL is a leading regulatory technology software provider delivering state-of-art AML, KYC, Risk and Compliance solutions.

Access Venture Partners

Access Venture Partners

Access Venture Partners are an early stage VC firm investing in bold founders and helping every step of the way. Areas we give special focus to include cybersecurity.

Moonlock

Moonlock

Cybersecurity tech for humans. At Moonlock, we make software that seamlessly protects you and has your back as you live your life.

Allstate Identity Protection

Allstate Identity Protection

Allstate make it easy to provide complete identity protection, so everyone can live more confidently online.

Security Compliance Associates (SCA)

Security Compliance Associates (SCA)

The sole focus of SCA is safeguarding critical information and complying with information security regulations.