America Remains Vulnerable To Cyber Attack

Leon Panetta (pictured), who served as CIA director and Defense Secretary during the administration of President Barack Obama, has recently written that he considers the plans established by the Trump administration to protect the electric grid against cyber sabotage “distract from the real solutions that would truly protect American critical infrastructure.”’
 
The article , co-authored with  a former Republican Senator James Talent, called on Congress to go beyond 2015 legislation aimed at fostering communication between private companies and the government about vulnerabilities, and to double down on other structural changes such as the establishment of a cybersecurity agency within the Department of Homeland Security.
 
“Congress must now ensure that these entities have the necessary resources and personnel,” the authors wrote. “The federal government’s inability to retain cyber talent is a serious obstacle to preparedness.”
 
They recommended that Congress act quickly on pending legislation that allows private-sector or academic cyber experts to work for federal agencies for up to two years.
 
But they also listed other key challenges, including:
 
• Developing best practices aimed at segregating business IT systems from systems that control infrastructure;
• Allay industry concerns about possible antitrust violations arising from developing collective responses to cyber threats.
 
“The threat of a destructive cyber-attack that could cost lives is growing every day,” the authors wrote. “Facing limited resources and adversaries that range from nation states to terrorists, government cannot do this alone.”
 
Panetta named Russia and Iran as the two most serious cyber adversaries, but they pointed out that US vulnerabilities could be exploited by anyone sitting at a computer able to “deploy cheap but destructive cyber-attacks on US critical infrastructure.
 
“There must be a partnership of government and the private sector if the United States is to effectively defend itself from a cyber Pearl Harbor,” the authors wrote.
 
CrimeReport
 
You Might Also Read: 
 
Why Has The US Not Been Hit With A Devastating Cyber Attack?:
 
 
 
« US Head of Homeland Security’s Departure Raises Questions
A Cybersecurity Guide For Small Business »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Linklaters LLP

Linklaters LLP

Linklaters is an international law firm. Practice areas include Information Management and Data Protection.

Luxar Tech

Luxar Tech

Luxar's network visibility products enable enterprises and service providers to monitor network traffic, improve security and optimize efficiency.

Clusit

Clusit

Clusit is the Italian Association for Information Security, a nonprofit organization devoted to promoting every aspect of information security.

Secure-NOK

Secure-NOK

Secure-NOK provides products and solutions that detect and remove security attacks and harmful events in industrial networks and control systems.

ZenMate

ZenMate

ZenMate is a Virtual Private Network services provider offering secure encrypted access to the internet.

Red Sift

Red Sift

Red Sift is the only integrated cloud email and brand protection platform, supporting organizations to secure their communications.

Cyber Threat Defense (CT Defense)

Cyber Threat Defense (CT Defense)

CT Defense specialize in penetration testing and security assessments.

Sontiq

Sontiq

Sontiq is committed to providing best-in-class, highly scalable, award-winning identity security solutions to consumers, businesses and government agencies.

Amidas Hong Kong

Amidas Hong Kong

Amidas is your trusted companion on the road to Digital Transformation. We provide a full range of Information Technology Solutions and Professional Services to Enterprise customers.

DeepFactor

DeepFactor

DeepFactor is the industry’s first Continuous Observability platform enabling Engineering and AppSec teams to find and triage RUNTIME security, privacy, and compliance risks in your applications.

Cheops Technology

Cheops Technology

Cheops is a specialist in IT Business Technology Services. We help SMEs and large companies build, optimize and manage their IT so they can focus on their core business.

HarfangLab

HarfangLab

HarfangLab develops a hunting software to boost detection and neutralization of cyberattacks against companies endpoints.

Cerby

Cerby

Your team uses unmanageable applications that put you, your company, and your data at risk. Protect, secure, and accelerate your business automatically with Cerby.

HEROIC Cybersecurity

HEROIC Cybersecurity

HEROIC’s enterprise cybersecurity services help improve overall organizational security with industry best practices and advanced technology solutions.

RiverSafe

RiverSafe

RiverSafe is a professional services provider specialising in Cyber Security, Data Operations and DevOps, putting security at the heart of everything we do.

Seers

Seers

Seers is the world’s leading privacy & consent management platform for companies worldwide. Trusted by over 50,000+ businesses.