Trump Calls On US To Use Offensive Cyber Weapons

The US government needs to be ready to use its offensive Cyber-weapons in response to attacks from other nations, Republican presidential candidate Donald Trump has said.

The US has significant offensive Cyber-capabilities, but it has been shy about deploying them, Trump said during a speech in Herdon, Va. "This is the warfare of the future," he said.

The US should also increase its use of Cyber-weapons to attack terrorists, Trump said. President Barack Obama has failed to protect the nation's Cybersecurity and a new focus is needed, added Trump, who has largely avoided technology issues in his campaign.

Trump said he will create an international Cybersecurity task force to battle hackers, and he will ask US military leaders for suggestions on how to improve the nation's Cyber-defenses.

Another team of experts will review all US government Cyber-security systems. "Ultimately, all systems will be reviewed and made as secure as modern technology permits," he said. "The review team will also remain current with constantly evolving new methods of attack and will attempt to anticipate them and develop defense as often as possible before breaches occur."

Trump also called on US agencies to follow "best and strongest" security practices and to set up new security training programs for all employees.

Trump didn't say how he'd pay for an overhaul of the government's IT systems, which could cost tens of billions of dollars. His description of the review team's duties to anticipate attacks mirror efforts that have been in place in the US government for years.

Trump also used the speech to attack Democratic candidate Hillary Clinton's operation of a private email server while she served as Obama's secretary of state.

Trump said his speech on Cyber-security was "just the beginning of a long and overdue discussion" about the issue.

Clinton released a Cyber-security plan months ago. She called on expanded investments in Cyber-security technologies and accelerated adoption of best practices such as the U.S. National Institute of Standards and Technology Cybersecurity Framework, first issued in February 2014.

Computerworld

 

 

« Virtual Reality - The Next Wave
Future War - Extremely Fast And Lethal »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

SC Media

SC Media

SC Media arms information security professionals with the in-depth, unbiased business and technical information they need to tackle the countless security challenges they face.

Infosecurity Europe

Infosecurity Europe

Infosecurity Europe is Europe’s number one information security conference and exhibition.

TestingXperts

TestingXperts

TestingXperts is a specialist software QA and testing company.

Thermo Systems

Thermo Systems

Thermo Systems is a design-build control systems engineering and construction firm. Capabilties include industrial control system cybersecurity.

Georgia Cyber Center

Georgia Cyber Center

Georgia Cyber Center is dedicated to training the next generation of professionals through education and real-world practice while also supporting innovation in new technologies for online defenses.

Dreamlab Technologies

Dreamlab Technologies

Dreamlab specialises in securing critical IT infrastructures. We offer qualitative support and advice for managing your infrastructure and cyber security needs.

GuardianKey

GuardianKey

GuardianKey is a solution to protect systems against authentication attacks.

Echosec Systems

Echosec Systems

Echosec Systems is a data discovery company delivering social media and dark web threat intelligence. Our web based security software delivers critical information for situational awareness.

VikingCloud

VikingCloud

VikingCloud (formerly Sysnet Global Solutions) offers organizations an integrated cybersecurity and compliance solution to make informed, predictive, and cost-effective risk mitigation and prevention

Artjoker

Artjoker

Artjoker is a full cycle software development partner specialized in Blockchain projects and smart contract development including full cycle information security of all projects.

CyberX9

CyberX9

CyberX9 helps you protect against a wide range of cyber attacks whether you are a business or a high-net worth individual under risk.

Nicoll Curtin

Nicoll Curtin

Nicoll Curtin is a global company with over 20 years of experience in connecting outstanding talent with industry leading companies within Technology, Change and Cyber Security.

iNovex

iNovex

iNovex is a community of innovators that work together to solve hard problems. We partner with you to meet problems head-on and push boundaries with technology solutions.

Cyber Proud

Cyber Proud

Cyber proud is leading a talent revolution to promote and create an inclusive skilled cyber workforce.

Focus Group

Focus Group

Focus Group are one of the UK’s leading independent providers of essential business technology. Here to take care of all your telecoms, IT and connectivity services.

ITConnexion

ITConnexion

ITConnexion is an Australian-based Managed IT Service with over 20 years of experience. We offer a complete IT management service for non-profits, SMEs, and enterprises.