Trump Calls On US To Use Offensive Cyber Weapons

The US government needs to be ready to use its offensive Cyber-weapons in response to attacks from other nations, Republican presidential candidate Donald Trump has said.

The US has significant offensive Cyber-capabilities, but it has been shy about deploying them, Trump said during a speech in Herdon, Va. "This is the warfare of the future," he said.

The US should also increase its use of Cyber-weapons to attack terrorists, Trump said. President Barack Obama has failed to protect the nation's Cybersecurity and a new focus is needed, added Trump, who has largely avoided technology issues in his campaign.

Trump said he will create an international Cybersecurity task force to battle hackers, and he will ask US military leaders for suggestions on how to improve the nation's Cyber-defenses.

Another team of experts will review all US government Cyber-security systems. "Ultimately, all systems will be reviewed and made as secure as modern technology permits," he said. "The review team will also remain current with constantly evolving new methods of attack and will attempt to anticipate them and develop defense as often as possible before breaches occur."

Trump also called on US agencies to follow "best and strongest" security practices and to set up new security training programs for all employees.

Trump didn't say how he'd pay for an overhaul of the government's IT systems, which could cost tens of billions of dollars. His description of the review team's duties to anticipate attacks mirror efforts that have been in place in the US government for years.

Trump also used the speech to attack Democratic candidate Hillary Clinton's operation of a private email server while she served as Obama's secretary of state.

Trump said his speech on Cyber-security was "just the beginning of a long and overdue discussion" about the issue.

Clinton released a Cyber-security plan months ago. She called on expanded investments in Cyber-security technologies and accelerated adoption of best practices such as the U.S. National Institute of Standards and Technology Cybersecurity Framework, first issued in February 2014.

Computerworld

 

 

« Virtual Reality - The Next Wave
Future War - Extremely Fast And Lethal »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

44CON

44CON

44CON is an Information Security Conference & Training event taking place in London. Designed to provide something for the business and technical Information Security professional.

Versasec

Versasec

Versasec is a leader in identity and access management, providing customers with security solutions for managing digital identities.

Featurespace

Featurespace

Featurespace is a world-leader in Adaptive Behavioural Analytics and creator of the ARIC platform for fraud and risk management.

PROOF

PROOF

PROOF is a Brazilian leader in cybersecurity. Our goal is to assist our Customers in managing security efficiently and in tune with business needs.

Zighra

Zighra

Zighra is a leading provider of On-Device AI solutions for continuous authentication and fraud detection on mobile and web applications.

Trinity Cyber

Trinity Cyber

Trinity Cyber’s patent-pending technology stops attacks before they reach internal networks,reducing risk and increasing cost to adversaries.

Cyber Struggle

Cyber Struggle

At Cyber Struggle, our aim is training and certifying the special forces of the cyber world.

Keyless Technologies

Keyless Technologies

Simple, secure, and interoperable authentication. Keyless offers unmatched security, privacy and usability, while reducing risk and infrastructure costs.

MSPAlliance

MSPAlliance

MSPAlliance is the world’s largest industry association and certification body for cloud computing and managed service professionals.

CyberEdBoard

CyberEdBoard

CyberEdBoard is a private, peer-to-peer education and networking community focused on cybersecurity, technology, business processes and risk management.

Information & Communications Technology Association of Jordan (int@j)

Information & Communications Technology Association of Jordan (int@j)

The Information & Communications Technology Association of Jordan is a membership based ICT and IT Enabled Services (ITES) industry advocacy, support and networking association.

Ekco

Ekco

Ekco is one of Europe’s leading managed cloud providers. With a network of infrastructure and security specialists across Europe, we’ve perfected our approach to supporting digital transformation.

CYBHORUS

CYBHORUS

CYBHORUS are a team of Italian cyber security experts, specialized in cyber threat defense and strategic and organizational consulting.

APIsentry

APIsentry

APIsentry is a leading provider of comprehensive API security solutions, specializing in protecting organizations from a wide range of cyber threats targeting their Application Programming Interfaces.

Venticento

Venticento

Venticento is an IT company specialized in consulting and network support and assistance for companies that need to make their business processes more effective.

Backblaze

Backblaze

The Backblaze Storage Cloud provides a foundation for businesses, developers, IT professionals, and individuals to build applications, host content, manage media, back up and archive data, and more.