America Remains Vulnerable To Cyber Attack

Leon Panetta (pictured), who served as CIA director and Defense Secretary during the administration of President Barack Obama, has recently written that he considers the plans established by the Trump administration to protect the electric grid against cyber sabotage “distract from the real solutions that would truly protect American critical infrastructure.”’
 
The article , co-authored with  a former Republican Senator James Talent, called on Congress to go beyond 2015 legislation aimed at fostering communication between private companies and the government about vulnerabilities, and to double down on other structural changes such as the establishment of a cybersecurity agency within the Department of Homeland Security.
 
“Congress must now ensure that these entities have the necessary resources and personnel,” the authors wrote. “The federal government’s inability to retain cyber talent is a serious obstacle to preparedness.”
 
They recommended that Congress act quickly on pending legislation that allows private-sector or academic cyber experts to work for federal agencies for up to two years.
 
But they also listed other key challenges, including:
 
• Developing best practices aimed at segregating business IT systems from systems that control infrastructure;
• Allay industry concerns about possible antitrust violations arising from developing collective responses to cyber threats.
 
“The threat of a destructive cyber-attack that could cost lives is growing every day,” the authors wrote. “Facing limited resources and adversaries that range from nation states to terrorists, government cannot do this alone.”
 
Panetta named Russia and Iran as the two most serious cyber adversaries, but they pointed out that US vulnerabilities could be exploited by anyone sitting at a computer able to “deploy cheap but destructive cyber-attacks on US critical infrastructure.
 
“There must be a partnership of government and the private sector if the United States is to effectively defend itself from a cyber Pearl Harbor,” the authors wrote.
 
CrimeReport
 
You Might Also Read: 
 
Why Has The US Not Been Hit With A Devastating Cyber Attack?:
 
 
 
« US Head of Homeland Security’s Departure Raises Questions
A Cybersecurity Guide For Small Business »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Navista

Navista

Navista's hardware and software modules are especially designed to ease the deployment of secure networks.

HANDD Business Solutions

HANDD Business Solutions

HANDD are independent specialists in data protection with expertise at every stage of the Protect, Detect and Respond cycle, from consultancy and design, right through to installation.

Purdicom

Purdicom

Purdicom (formerly known as Selcoms) is an award winning distributor specialising in Wireless, Cloud & Security technologies.

Perspective Risk

Perspective Risk

Perspective Risk provides penetration testing, security assessments, risk management & compliance solutions, InfoSec training and consultancy services.

Malware Patrol

Malware Patrol

Malware Patrol provides intelligent threat data that protects against cyber attacks.

Ekran System

Ekran System

Ekran System is an advanced insider threat detection solution for companies of any size.

Cyber Craft

Cyber Craft

CyberCraft is an innovative and dynamic software development, outsourcing and consulting company. Services offered include penetration testing.

Blockchain R&D Hub

Blockchain R&D Hub

Blockchain R&D Hub's mission is to serve the needs of blockchain ecosystem as the center of excellence for technology research and development.

CyberClan

CyberClan

CyberClan’s carefully selected team of experts is capable of solving complex cyber security challenges – keeping your data secure and your businesses running as usual.

Key Cyber Solutions

Key Cyber Solutions

Key Cyber is an IT consulting firm that specializes in agile software development services, program management and infrastructure services, cyber security and cloud and managed services.

Bleckwen

Bleckwen

Bleckwen is a proven fraud detection system that helps financial institutions build trust with customers.

Real Protect

Real Protect

Real Protect is a Brazilian provider of managed security (MSS) and cyber defense services.

Trusted Cyber Solutions

Trusted Cyber Solutions

Trusted Cyber Solutions is an independent Cyber Security and Risk Management consultancy.

Quartz Network

Quartz Network

Quartz Network is a curated community for change-makers, up-and-comers, and professionals who are ready to grow, adapt, and thrive.

Sweet Security

Sweet Security

Sweet Security delivers Runtime Attack Security for Cloud Workloads.

Strobes Security

Strobes Security

Strobes is among the world’s first cybersecurity platforms specifically designed for end-to-end continuous threat exposure management.