The New US President Must Win the Cyber War On Terror

The trenches of modern warfare are now being tunneled in Cyberspace, and the next US president and Congress must dig in and give comfort to the American public that they will commit to winning the cyber war on terror.

America’s Cold War has become a Code War. The recent announcement by Yahoo that state-sponsored hackers raided 500 million customer accounts is just the latest in a year of increasingly aggressive state-led Cyberattacks against American consumers, government and economic interests.

In 2016 alone the Russian intelligence services have hacked the servers of the Democratic National Committee and release the personal emails and phone numbers of members of Congress and congressional staff. We have knowledge that foreign hackers breached voter registration systems in my home state of Illinois and in Arizona in a possible attempt to influence the November elections. And we know that a Russian hacker is behind high-profile attacks on American social networking companies LinkedIn and Tumblr.

These incidents, like the 2015 North Korea hack on Sony, have come to light because they are cyber battles in a greater cyber war that we did not win. And they aren’t rare occurrences. State-sponsored hackers are regularly attempting to take down international banking services and US government websites and wiping the computer servers of multibillion-dollar American companies.

The US is now in the midst of World War 3.0 and cannot afford to fight this as a silent war in the shadows. Just as America prioritized personnel recruitment in its spy agencies and defense modernization in the military during the Cold War, they are being asked to do the same today for the Code War.

Congress must be actively engaged in promoting initiatives, legislation and funding streams that help our national security apparatus and international partners deal with Cyber threats. Considering the stakes of the next four years, it is important that the next American president must be prepared to be the first Cyber Wartime president.

Americans think the best computer minds and innovators must be brought into government. The future of democratic elections, the electric grid and economic infrastructure depend on it, and US national security now hinges on the ability to recruit more Mark Zuckerbergs than Jason Bournes.

The Hill:

 

« The Science of Threat Intelligence
Virtual Reality - The Next Wave »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Global Secure Solutions (GSS)

Global Secure Solutions (GSS)

Global Secure Solutions is an IT security and risk consulting firm and authorised ISO training partner for the PECB.

ForeScout Technologies

ForeScout Technologies

ForeScout delivers pervasive network security by allowing organisations to continuously monitor & mitigate security exposures & cyberattacks.

Micron Technology

Micron Technology

Micron is a global leader in the semiconductor industry providing memory and secure storage devices for Networks, Mobile devices and IoT applications.

Schneider Electric

Schneider Electric

Schneider Electric develops connected technologies and solutions to manage energy and process in ways that are safe, reliable and sustainable.

Sangfor Technologies

Sangfor Technologies

Sangfor is a global leader of IT infrastructure, security solutions, and cloud computing.

Xage Security

Xage Security

Xage is the world’s first blockchain-protected security platform for Industrial IoT.

Fastcomcorp

Fastcomcorp

Fastcomcorp offers a world-class proactive cyber security defense and risk management consulting. Including Darkweb monitoring and posture assessments.

Cyturus Technologies

Cyturus Technologies

Cyturus Technologies delivers cybersecurity business risk quantification services using our proprietary Adaptive Risk Model (ARM).

Intellias

Intellias

Intellias is a trusted technology partner to top-tier organizations and digital natives helping them accelerate their pace of sustainable digitalization.

Tetra Defense

Tetra Defense

Tetra Defense is a leading incident response, cyber risk management and digital forensics firm.

AutoRABIT

AutoRABIT

AutoRABIT provides DevSecOps tools built specifically for Salesforce developers to increase release velocity, produce consistently high-quality code, and enhance data security.

People Driven Technology

People Driven Technology

People Driven Technology is a customer-obsessed organization. We leverage our decades of business, technology, and engineering experience to deliver outcomes for our clients.

SeeMetrics

SeeMetrics

SeeMetrics is an automated cybersecurity performance management platform that integrates security data and business objectives into a simple interface.

Xact IT Solutions

Xact IT Solutions

Xact IT Solutions are a certified cybersecurity firm offering cybersecurity, compliance and managed services.

Tychon

Tychon

Tychon develops advanced enterprise endpoint management technology that enables commercial and government organizations to bridge the gap between security and IT operations.

NinjaOne

NinjaOne

The NinjaOne Platform was built to help IT and MSP teams efficiently manage, patch, and support all endpoints.