US National Cyber Defense Policy

The US Senate will vote on its version of the 2021 defense authorisation bill in the near future. US Joint Cyber Planning has proposed an amendment to the 2021 defense policy bill which aims to help government and private actors to respond quickly to cyber attacks mounted from Russia, China and elsewhere. 

The spending  package authorises $740 billion for the military and it allocates an extra $15 million to the Cybersecurity and Infrastructure Security Agency (CISA) which for tye first timewill be required to report on risks posed by the use of technology from Huawei, whose 5G networking products are widely used around the world and which is increasingly regarded in the US as a security threat

Right now, US companies are largely on their own for cyber security defense. even in responding to big incidents and there is little coordination between the government and the private sector. For exmaple, the US government may have known as early as 2015 about Russians’ presence on servers belonging to the Democratic National Committee, however, it wasn’t until July 2018, nearly two years after the release of information stolen from the DNC, that the NSA announced the formation of a group to counter aggressive Russian cyber activities.

There’s a lot of room for improvement in coordinating public and private cyber responses.

Ex-Democrat party Presidential candidate Senator Bernie Sanders wants to find out what is going on inside the Pentagon.and has tabled an amendment that woud require the Pentagon comptroller to issue guidance that would incentivise different agencies and services for audit achievements.

These recommendation arise from the Cyberspace Solarium Commission  report on legidative proposals and is expected to have broad bipartisan support in Congress.

Reuters:       DefenseOne:       Federal News Network:    Solarium Commission:        JDSupra

You Might Also Read:

US Cyber Command Is A Tool Of Foreign Policy:

 

« Use Machine Learning To Predict What Is Most Likely To Be Exploited.
Home Working Cyber Security Toolkit »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

DTEX Systems

DTEX Systems

DTEX Systems is the global leader for insider risk management. We empower organizations to prevent data loss by proactively stopping insider risks from becoming insider threats.

Cradlepoint

Cradlepoint

With Cradlepoint customers leverage the speed and economics of wired and wireless Internet broadband for branch, mobile, and IoT networks while maintaining end-to-end visibility, security and control.

Fluency Security

Fluency Security

Fluency is the only Security Analytics & Orchestration (SAO) solution that automates correlation, detection, validation and ongoing tracking.

Altron

Altron

Altron provides locally relevant innovative and integrated ICT solutions to business, government and consumers.

Mend.io

Mend.io

Mend.io (formerly known as WhiteSource) is an application security company built to secure today’s digital world.

Kickstart

Kickstart

Kickstart supports your startup in scaling deep technology businesses in Switzerland in areas such as AI, Blockchain and Cybersecurity.

Authomize

Authomize

Authomize aggregates identities and authorization mechanisms from any applications around your hybrid environment into one unified platform so you can easily and rapidly manage and secure all users.

Pivot Point Security

Pivot Point Security

Pivot Point Security is a trusted leader in information security consulting. We help clients master their information security management systems.

BT Security

BT Security

BT provides telecommunications and network infrastructure services to keep businesses around the world connected and secure.

OpenAVN (DefenseArk)

OpenAVN (DefenseArk)

Defending your life online, keeping your data safe and private. We detect digital threats magnitudes faster than the leading antivirus software.

Valency Networks

Valency Networks

Valency Networks provide cutting edge results in the areas of Vulnerability Assessment and Penetration Testing services for webapps, cloud apps, mobile apps and IT networks.

CertiProf

CertiProf

CertiProf has been enhancing professional lives since 2015, offering a wide range of IT certifications and agile framework training.

NSI Global

NSI Global

NSI Global is a specialist Global Risk and Intelligence Advisory Firm that has built a reputation for consistently managing complex projects.

Computacenter

Computacenter

Computacenter is a leading independent technology partner, trusted by large corporate and public sector organisations. We help our customers to source, transform and manage their IT infrastructure.

Opkalla

Opkalla

We started Opkalla because we believe IT professionals deserve better. We help our clients navigate the confusion in the marketplace and choose the solution that is right for your business.

SFY Information Technology

SFY Information Technology

SFY helps companies with Cyber Security and Managed IT, allowing them to focus on what really matters to them.