Government Technology Insider
  • About
  • State & Local
  • Civilian
  • Defense & IC
SUBSCRIBE
No Result
View All Result
  • Acquisition
  • AI & Data
  • Cybersecurity
  • CX
  • Digital Transformation
  • Hybrid Work
    • Work Smarter
  • Public Safety
  • Resources
    • Technology Trends Shaping the Future of Government
    • World of Work
    • Your Digital Transformation Path Starts Here
    • The Frontlines of Customer Experience
    • Innovative Solutions for Connecting Agencies
    • Be Ready For What’s Next
Government Technology Insider
  • Acquisition
  • AI & Data
  • Cybersecurity
  • CX
  • Digital Transformation
  • Hybrid Work
    • Work Smarter
  • Public Safety
  • Resources
    • Technology Trends Shaping the Future of Government
    • World of Work
    • Your Digital Transformation Path Starts Here
    • The Frontlines of Customer Experience
    • Innovative Solutions for Connecting Agencies
    • Be Ready For What’s Next
No Result
View All Result
Government Technology Insider
No Result
View All Result
Home Cybersecurity

State of Cyber: Threats will Continue to Grow, Experts Say

by GTI Editors
January 14, 2015
in Cybersecurity
Reading Time: 3 mins read
A A
Share on FacebookShare on Twitter

The differences between the United States and Europe on issues of Internet privacy make it difficult to agree on something akin to global cybersecurity policies, but the biggest obstacle is simply the speed with which technology is changing. Those are two of the major takeaways from Bloomberg Government’s Cybersecurity Summit, held last month at the Ronald Reagan Building in Washington, D.C.

Mike Walker, a program manager at the Defense Advanced Research Projects Agency (DARPA), compared improvements in cybersecurity to automobile safety – but not in a positive way.

“Tomorrow’s cars are going to be safer than the ones today,” he said. “But cybersecurity is the opposite … Not only do the attackers win more often, they’re getting better faster. The Internet we’re going to use [in the future] will be more dangerous than the one we use today.”

Walker said the current push toward security automation will not address the zero-day exploits that continue to plague the IT field. “Not one security company could come forward and say they could find Heartbleed through automation,” he said.

Another part of the security challenge is the question of who is the threatening party, since each requires its own solutions, policies, and enforcement mechanisms.

Joe Demarest, Assistant Director of the FBI’s Cyber Division, listed five distinct types of cyber foes: the nation-state actors, such as Russia, Iran, and North Korea; cyber terrorists, who seek ways to use their cyber attacks for kinetic effect, such as the attack on Saudi Arabia’s Aramco oil company computer networks that wiped out data on most of the PCs; organized crime, which poses the biggest risk for ordinary citizens in terms of identity theft, card-skimming and other financial crimes; insider threats; and hacktivists, such as those who attacked the Ferguson, Mo., Police Department after the grand jury decision in the Michael Brown case.

Whichever of these groups commits a cyber exploit, the borderless nature of the Internet makes identification and prosecution beyond difficult, said Benoit Godart, Head of Outreach at the European Cybercrime Centre, EUROPOL.

“We are not the United States of Europe,” Godart pointed out. “We are now facing a situation where cybercrime is the speed of electricity.” But it takes time for allies to work together, days, even weeks, to get permissions, he said.

Everyone agreed one critical element must be gaining the active cooperation of the business community, particularly transnational corporations.

“I would like to see the private sector move past the culture of shame and secrecy about what’s happening to them,” said Sen. Sheldon Whitehouse (D-RI), who has been serving on the Judiciary Committee’s Crime and Terrorism subcommittee. “We need government to be a lot more open, classify a lot less, [and] on the private sector side, people simply have to start talking about this … I think the private sector tries to bury [news about attacks on them], and that’s unfortunate.”

Catherine Lotrionte, Director of the Institute for Law, Science, and Global Security at Georgetown University, said building worldwide agreement on what is not acceptable is under way, using the norms established in the physical world.

“Building on something that already exists, though it was not meant for cyber, makes it easier,” Lotrionte said. “The State [Department] is taking rules developed for the physical world and adapting them.”

Tags: CybercrimecybersecurityDARPAFBI Cyber DivisionHeartbleedinternet privacyzero day exploits

RELATED POSTS

FedRAMP is the Foundation of Trusted and Secure Government
Acquisition

FedRAMP is the Foundation of Trusted and Secure Government

March 29, 2023
Contributed Articles

Silent But Deadly: The Cybersecurity Risks of Quiet Quitting

March 9, 2023
collaborating on cybersecurity
Cybersecurity

Collaborating on Cybersecurity Best Practices Enables Federal Agencies to Combat Global Threats

March 8, 2023
Please login to join discussion

TRENDING NOW

  • Advana

    Meet Advana: How the Department of Defense Solved its Data Interoperability Challenges

    9416 shares
    Share 3766 Tweet 2354
  • Exploring the New Department of Defense Zero Trust Strategy: A Podcast with Verizon and Zscaler

    82 shares
    Share 33 Tweet 21
  • FedRAMP is the Foundation of Trusted and Secure Government

    35 shares
    Share 14 Tweet 9
  • Why the Government Needs a Cloud-Native Workforce

    18 shares
    Share 7 Tweet 5

CONNECT WITH US

Advertisement Banner Ad Advertisement Banner Ad Advertisement Banner Ad
Advertisement Banner Advertisement Banner Advertisement Banner
Advertisement Banner Advertisement Banner Advertisement Banner
Advertisement Banner Ad Advertisement Banner Ad Advertisement Banner Ad
MaaS Nebula Software Factory Banner Ad MaaS Nebula Software Factory Banner Ad MaaS Nebula Software Factory Banner Ad
Advertisement Banner Ad Advertisement Banner Ad Advertisement Banner Ad
Advertisment Banner Ad Advertisment Banner Ad Advertisment Banner Ad
Advertisement Banner Advertisement Banner Advertisement Banner
Advertisement Banner Ad Advertisement Banner Ad Advertisement Banner Ad

BECOME AN INSIDER

Get Government Technology Insider news and updates in your inbox.

Strategic Communications Group is a digital media company that helps business-to-business marketers drive customer demand through content marketing, content syndication, and lead identification.

Related Communities

Financial Technology Today
Future Healthcare Today
Modern Marketing Today
Retail Technology Insider
Today’s Modern Educator

Quick Links

  • Home
  • About
  • Contact Us

Become a Sponsor

Strategic Communications Group offers analytics, content marketing, and lead identification services. Interested?
Contact us!

© 2023 Strategic Communications Group, Inc.
Privacy Policy      |      Terms of Service

No Result
View All Result
  • Home
  • About Government Technology Insider
  • State & Local
  • Civilian
  • Defense & IC
  • Categories
    • Acquisition
    • AI & Data
    • Customer Experience
    • Cybersecurity
    • Digital Transformation
    • Hybrid Work
    • Public Safety
  • Contact Us