Obama Authorizes Sanctions Against Hackers

obama-authorizes-sanctions-against-hackers-300X225.jpg

President Barack Obama has signed an executive order authorizing the US government to impose sanctions on people, organizations and governments that partake in "malicious cyber-enabled activities" that harm the country.

"The same technologies that help keep our military strong are used by hackers in China and Russia to target our defense contractors and systems that support our troops," Obama said in a statement.
The sanctions would target activities that significantly harm critical infrastructure, disrupt computer networks, expose personal information and trade secrets, and entities that profit from information stolen in cyberattacks. The administration will focus on threats from outside the US and Obama made the point that "many of these attacks originate from outside our borders."
The sanctions Obama announced will help prevent and respond to cyberattacks when channels such as working with law enforcement and the private sector or cooperating with nations don't offer a resolution. In some cases, foreign laws are too weak or governments "either unwilling or unable to crack down on those responsible," the statement said.
The new powers allow the government to block a person or organization's access to US financial institutions and any property they have in the country. Suspected hackers are also barred from either giving or receiving funds and transferring assets.
Preventing cybercriminals from transferring funds deposited in a U.S. bank can limit "their ability to both commit these malicious acts and to profit from them," the statement said.
In his remarks, Obama mentioned recent cyberattacks against the US, including the December data breach at Sony Pictures that was linked to North Korea. Other industries that have been targeted by cyberattacks of late include retail, banking and health care.

Computerworld:  http://bit.ly/1FOxGVT

« Malware Remodeled
Why Use Bitcoin? »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Exclusive Networks

Exclusive Networks

Exclusive Networks accelerate market entry and growth for innovative cybersecurity, networking and infrastructure technologies.

Opengear

Opengear

Opengear ensures network resilience to enterprises by enabling business continuity with the Network Resilience Platform.

NESEC

NESEC

NESEC is a specialist in information security consulting services and solutions.

Certego

Certego

Certego is a company of the VEM Sistemi Group specialised in providing managed computer security services and to combat Cyber Crime.

Datacom Systems

Datacom Systems

Datacom Systems is a leading manufacturer of network visibility solutions.

Dataglobal

Dataglobal

Dataglobal is an industry-leading provider of Information Archiving/Governance and Unified Data Classification solutions.

ETSI

ETSI

ETSI is a European Standards Organization dealing with telecommunications, broadcasting and other electronic communications networks and services including cybersecurity.

ePlus

ePlus

ePlus designs and delivers effective, integrated cybersecurity programs centered on culture and technology, aimed at mitigating business risk and empowering digital transformation.

Intercast Global

Intercast Global

Intercast's mission is to be a strategic resource to our clients in Risk Reduction. We are a global leader in cyber security staffing and consulting to the enterprise.

Digital Boundary Group (DBG)

Digital Boundary Group (DBG)

Digital Boundary Group (DBG) is an information technology security assurance services firm providing information technology security auditing and compliance assessment services to clients worldwide.

Amnesty Tech

Amnesty Tech

Amnesty Tech's Security Lab leads technical investigations into cyber-attacks against civil society and provides critical support when individuals face such attacks.

ACSG Corp

ACSG Corp

ACSG Corp is a Critical Infrastructure Protection Company with a multi-disciplinary focus on building analytics software for various industry sectors.

Noetic Cyber

Noetic Cyber

Noetic provides a proactive approach to cyber asset and controls management, empowering security teams to see, understand, and optimize their cybersecurity posture.

Verizon

Verizon

Verizon is a leader in IT technology solutions - Verizon Cloud, Networking, Security, Mobility, Machine-to-Machine (M2M), Advanced Communications and Professional Services.

Armata Cyber Security

Armata Cyber Security

Armata exists to bring Cyber Security to all people – from home users and SMBs to large enterprises. We believe all users have the right to an affordable yet effective Cyber Security solution.

Btech

Btech

Btech is the market leader in providing affordable managed IT security services for credit unions.