menu

Topic:

Cybersecurity

GAO Report Shows Weakness of Regulatory Approach in Cyber

The Smart Grid is the way of the future in electricity management, but it also presents cybersecurity challenges. A recent report on Smart Grid Cyber Security from the Government Accountability Office cautioned against using regulation to bolster security. There is a “default setting” on businesses and government entities that seems to drive them toward regulatory solutions. It is a harmful tendency in our modern world, and it is not the right approach for improving U.S. cybersecurity.

Observations on the 2012 Aspen Security Forum

The Aspen Institute’s Security Forum, held at the end of July, proved why it has become, in only three years, a “must-attend” event for those of us working in the homeland and national security space. The four-day program was packed with insight from leading thinkers and past and present policy makers and influencers on the subject of national and homeland security. There was not a single bad panel, but three sessions stood out in my mind as being a slight cut above the rest.

Locking Private Sector Shields Against Cyber Attacks

Information travels through America’s cyber networks at the speed of light. The legislation that will be used to govern some aspects of network security is traveling at the speed of bureaucracy. The Senate has been debating two cybersecurity bills that will impact U.S. cybersecurity standards, but whatever Congress eventually decides, the onus is on U.S. citizens and businesses to step up their individual security efforts.

Chinese Cyber Attacks Are Looting U.S. Private Sector

One issue that receives too little public attention is the blatant use of hackers by China to steal U.S. intellectual property, defense technology, and other data critical to national security and competitiveness. China is one of America’s biggest competitors, and they (hackers, Chinese corporations and the Chinese government) clearly have no problem penetrating U.S. public and private sector networks to leapfrog over the years of hard work and innovation. Are we not outraged?

The War of 1812 Redux – Using National Security Tools to Protect the Private Sector

By Rob Strayer
Two hundred years ago today, the United States declared war against Great Britain, beginning the War of 1812. At that time, the British Navy was the aggressor, boarding U.S. commercial vessels. Today, the United States faces a digital threat to its national security and commercial interests. Like their nineteenth century counterparts conducting flagrant piracy on the high seas, cyber attackers openly and notoriously exploit U.S. commercial networks. How does the United States develop a national cyber security policy that is tailored to the problems that private sector companies face (avoiding the mistakes of 1812)?

In the World of Cyber Security, It's Go Time

Once again, America is officially under attack. According to multiple reports, including an “incident response” report from the Industrial Control Systems Cyber Emergency Response Team (ICS-CERT), U.S. natural gas pipeline companies are at the center of a major cyber attack campaign. While I’m certain that some in Congress will use this latest cyber attack campaign as fodder to further their cyber security legislation, I do not believe we can legislate our way out of this problem.

Administration Decides to "Fight" for Cyber Security

On Monday, one of the Obama Administration’s heavies took to the Op-Ed page of the Washington Post to fight for cyber security. John Brennan, the President’s senior advisor on counterterrorism and homeland security, published a pretty impassioned piece reminding the Nation that cyber treats are real. Personally, I thought we were beyond the debate about the existence of the cyber threat and our need for better cyber defenses, cyber hygiene, training, and public-private info sharing. I guess there are still nay-sayers out there.

Homeland Security Leaders Question Cyber Reality

Once again, I was honored to do a presentation for the DHS-sponsored Center for Homeland Security and Defense. This long-term, comprehensive course introduces operational leaders from law enforcement, fire fighting, emergency services, public health, and federal agencies to a wide array of issues, and propels them to intellectually “punch above their weights” in a way they makes them even bigger assets to the Nation than they were when they began. These folks are like sponges – they push one another and their instructors, demand proof, and are skeptical in a healthy way.

The Homeland Security Show – What You’ve Missed and What’s Coming Up

For the past month, the Homeland Security Show I host is spotlighting issues in homeland security without the interlude of media packaging stories into three minute segments or subjected to political hyperbole from Capitol Hill. This is not a show about thrillers, even if some of the content is more twisted and strange than most science fiction. Here is a rundown of my guests and show topics and some of our upcoming broadcasts.

In Cyber, Those That Deny Threats Never Help

When I was a Deputy Assistant Secretary of Defense, every time we tried to do something – like develop cyber security capabilities – we were accused of cravenly seeking new budget allocations. Yet, the only reason I have been, am now, and will continue to push cyber as a key issue is that I believe it is one. In a recent Foreign Policy article, Thomas Rid argues the cyber threat is not real. I sincerely wish he were correct. He is sincerely wrong. Denying threats does not make them go away.