Why Aren’t Companies Using Military Security?

Cyber Security: How Utilities Can Reduce Threat

The number of cybersecurity incidents and percentage of the total by industry in the US during fiscal year 2014 (source: US Homeland Security Department)

Have you ever stopped to think why defense companies have a classified network to prevent cyber attack, whereas companies handling our critical systems – electricity, gas or water – don’t? It’s rather a curious situation if you think about it. Why aren’t electric companies using the same classified network thus ensuring the power supply in times of peace as well as times of war?

US senators are soon to begin legislation meant, among other things, to make it easier for companies to share information regarding cyber security with each other and with the government. However, the Cyber Security Sharing Act is still uncertain, as it is getting a lot of criticism stemming from privacy and civil rights concerns. Furthermore, many previous attempts to address the matter have failed to reach the president’s desk.

When unclassified e-mail servers of the U.S Joint Chiefs of Staff were recently hacked, the ability to communicate securely on classified networks kept Pentagon operations moving. Cyber incident response teams managing the breach could communicate with the intelligence community, law enforcement, and other parts of the Pentagon without the alleged Russian attackers listening in. We all know what would have happened had a private company been attacks by the same attackers.
Today companies in the defense industry, such as Lockheed Martin, Boeing and others, have access to such cyber defense capabilities. The companies use a separate, classified network called DIBNET to share classified information in a secure fashion with each other as with the US Department of Defense.

Cyber security is usually thought of as a partnership between the government and the private sector. For that partnership to be fully realized, private companies bearing the costs of defending themselves against nation-state adversaries like China and Russia must be allowed access to the same networks and same information that federal agencies use to prevent and respond to cyberattacks.

I-hls

 

« Vodafone Leaked Email on 'hacking' of Reporter
The Shocking State of Cybercrime in Russia »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Threatpost

Threatpost

Threatpost, is an independent news site which is a leading source of information about IT and business security.

Portnox

Portnox

In 2007, Portnox set out to create one of the world’s easiest to use, most loved, value-driven network security solutions — and our customers will tell you we’ve succeeded.

Clearwater Security & Compliance

Clearwater Security & Compliance

Clearwater Compliance specialize in Privacy, Security, Compliance and Risk Management Solutions for Health Care, Law Firms and other businesses.

IS Decisions

IS Decisions

IS Decisions builds affordable and easy-to-use Access Management software solutions, allowing IT teams to effectively secure access to Active Directory infrastructures, SaaS apps and data within.

ID Agent

ID Agent

ID Agent provides a comprehensive set of threat intelligence and identity monitoring solutions.

Wind River

Wind River

Wind River delivers the technology and expertise that enables the deployment of safe, secure, and reliable intelligent connected systems.

Tevora

Tevora

Tevora is a specialized management consultancy focused on cyber security, risk, and compliance services.

C5 Capital

C5 Capital

C5 Capital is a specialist investment firm that exclusively invests in the secure data ecosystem including cybersecurity, cloud infrastructure, data analytics and space.

Rizikon Assurance

Rizikon Assurance

Rizikon Assurance is an Online System that improves Third-Party Assurance and Risk Management, through efficiency, automation and better visibility.

ITsMine

ITsMine

ITsMine’s Beyond DLP™? solution is a leading Data Loss Prevention (DLP) solution used by organizations to protect against internal and external threats automatically.

SecureNation

SecureNation

SecureNation offers a wide variety of cutting-edge technologies and IT services to address almost any of your information security, network security and information assurance needs.

Truvantis

Truvantis

Truvantis is a cybersecurity consulting organization providing best-in-class cybersecurity services to secure your organization’s infrastructure, data, operations and products.

Opus Security

Opus Security

Opus dramatically reduces cloud security risks by enabling teams to define, orchestrate, automate and measure remediation processes across the entire distributed organization.

Babble

Babble

Babble is a Unified Comms, Contact Centre and Cyber Solutions provider. We believe in making next-generation technology simple to use, deploy and manage.

Mogwai Labs

Mogwai Labs

Mogwai Labs deliver cutting-edge penetration tests, security assessments and trainings, to safeguard your applications, networks and cloud environments from cyber threats.

Infosec Ventures

Infosec Ventures

Infosec Ventures incubates and scales cyber security innovators that solve inefficiencies in cyber security.