Now on Demand Ransomware Resilience & Recovery Summit - All Sessions Available
Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Cyberwarfare

General Alexander Urging Congress to Act Before It Is Too Late

General Alexander Urges Congress That Defensive Cybersecurity Actions Must Be Taken Before it Is Too Late

General Alexander Urges Congress That Defensive Cybersecurity Actions Must Be Taken Before it Is Too Late

During a speech at the American Enterprise Institute on Monday, General Keith Alexander, head of the U.S. Cyber Command and the National Security Agency, said that the U.S. must adopt laws that will protect the nation from cyber attack. He called the passing of such laws vital.

“The conflict is growing, the probability for crisis is mounting,” the General stated.

The Nation’s cybersecurity chief said that there needs to be concern for when the existing attacks turn from disruptive in nature to destructive, adding, “…while we have the time, we should think about and enact those things that we need to ensure our security in this area. Do it now, before a crisis…”

He said that the notion of a turn from disruptive to destructive is already visible. “You can see this statistically. The number of attacks is growing.”

Cyber Command

Such laws, if they were created, would need to focus on privacy as well he explained

“For situational awareness, we need to be able to see what’s going on. I don’t mean the government has to be in the network to see…Like the police force, like the fire department, they don’t see around buildings waiting for a fire to come on, you call them when it happens. In cyberspace, I see very much the same thing in our partnership with industry.”

In May, General Alexander told Senator John McCain in a letter that if the Department of Defense is to defend the nation against cyber attack, it must be able to see those attacks in real time.

Advertisement. Scroll to continue reading.

“This requires legislation that, at a minimum, removes existing barriers and disincentives that inhibit the owners of the critical infrastructure from sharing cyber threat indicators with the Government,” General Alexander wrote.

“Additionally, given DoD reliance on certain core critical infrastructure to execute its mission, as well as the importance of the Nation’s critical infrastructure to our national and economic security overall, legislation is also needed to ensure that infrastructure is efficiently hardened and resilient. Recent events have shown that a purely voluntary and market driven system is not sufficient.”

Written By

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

People on the Move

Bill Dunnion has joined telecommunications giant Mitel as Chief Information Security Officer.

MSSP Dataprise has appointed Nima Khamooshi as Vice President of Cybersecurity.

Backup and recovery firm Keepit has hired Kim Larsen as CISO.

More People On The Move

Expert Insights

Related Content

Cyberwarfare

WASHINGTON - Cyberattacks are the most serious threat facing the United States, even more so than terrorism, according to American defense experts. Almost half...

Cybercrime

Patch Tuesday: Microsoft calls attention to a series of zero-day remote code execution attacks hitting its Office productivity suite.

Cyberwarfare

Russian espionage group Nomadic Octopus infiltrated a Tajikistani telecoms provider to spy on 18 entities, including government officials and public service infrastructures.

Cyberwarfare

Several hacker groups have joined in on the Israel-Hamas war that started over the weekend after the militant group launched a major attack.

Cyberwarfare

An engineer recruited by intelligence services reportedly used a water pump to deliver Stuxnet, which reportedly cost $1-2 billion to develop.

Application Security

Virtualization technology giant VMware on Tuesday shipped urgent updates to fix a trio of security problems in multiple software products, including a virtual machine...

Application Security

Fortinet on Monday issued an emergency patch to cover a severe vulnerability in its FortiOS SSL-VPN product, warning that hackers have already exploited the...

Cyberwarfare

The war in Ukraine is the first major conflagration between two technologically advanced powers in the age of cyber. It prompts us to question...