Connect with us

Cybersecurity

Senator Recommends Mandatory Breach Reporting for Companies

Angus King, I-Maine, also said companies should go through hack testing to beef up security.

Published

on

U.S. Senator Angus King, I-Maine

July 6, 2021 — Sen. Angus King, I-Maine, is calling for the crafting of new rules requiring companies to disclose when they’ve been breached in a hack, as cybersecurity attacks against private companies put defenses in the spotlight.

“Incident reporting should be mandatory, and there should be some liability protection if the rules are followed,” said King, who is a member of the U.S. Senate Select Committee on Intelligence. Currently, there is no federal data breach notification laws requiring companies to disclose whether they have been hacked.

King was speaking to Washington Post national security reporter Ellen Nakashima at an event last week to discuss emerging threats to private and government data systems.

High-profile cyberattacks, including against software company SolarWinds and oil transport company Colonial Pipeline, has put a focus on these types nefarious crimes and their ability to cripple important infrastructure in the country.

King said he believes that with most cybersecurity attacks taking place against the private sector, a new form of relationship should be required with the federal government.

And although hack testing is increasingly becoming common in some sectors like financial services, they are far from being utilized throughout industries, he noted.

King said he strongly advocates that such new rules should be a joint effort with the Geneva Convention for Cyber War. It’s the type of international cooperation that others have recommended between countries.

King suggested that critical industries should be required to undergo live cybersecurity testing by ethical hackers.

“There’s nothing like skull and crossbones coming up on the CEO’s desktop to let them know how vulnerable they are,” he said.

Secretary of Commerce Gina Raimondo said the department is committed to funding solutions to technology threats, and President Joe Biden in May signed an executive order to improve U.S. cybersecurity capabilities.

Last month, Biden spoke with Russian President Vladimir Putin in Geneva, warning him of cyber-attacks, including ransomware, stating that if the Russian government continues to violate basic norms, the United States will respond in a way that serves as a deterrent. It is believed that the Russians were behind at least the SolarWinds hack.

Reporter Mike Ogunji is from Columbus, Ohio, and studied public relations and information technology at the University of Cincinnati. He has been involved in the Model United Nations and We The People. Mike enjoys books, basketball, broadband and exploring the backwoods.

Cybersecurity

Biden On Lookout for Cyberattacks with Russia Massing on Border of Ukraine

The president says that, in the past, Russia has taken covert military actions.

Published

on

Photo of President Joe Biden on Thursday

WASHINGTON, January 20, 2022 – President Joe Biden said Thursday that the administration will be on the lookout for Russian cyberattacks in Ukraine as Russia’s President Vladimir Putin may be edging closer to invading Ukrainian territory.

Biden warned that, in the past, Russia has launched aggressive computer attacks that, while perhaps falling short of overt military action, have been daunting cyber-offensives of “military” officials not wearing Russian uniforms.

The comments came at the beginning of Thursday’s meeting of Biden’s Infrastructure Implementation Task Force. Biden briefly addressed rising tensions surrounding Ukraine.

Many critics of Russia, including Biden, have said that they Putin will pounce.

During his remarks, Biden said Moscow would “pay a heavy price” should it move any Russian troops across the Ukrainian border.

Following his foreign policy comments, Biden turned his attention to the planned task force talks on implementing the Infrastructure Investment and Jobs Act signed on November 15, 2022.

He turned to former New Orleans Mayor Mitch Landrieu, the administration’s unofficial “infrastructure czar,” to offer comments on the administration’s progress to press.

Biden specifically addressed the law’s implications for ongoing supply chain issues.

Since the back half of 2021, the world has faced historic shipping delays on a variety of commercial goods as global manufacturing systems continue struggling to grapple with the coronavirus pandemic and workforce shortages exacerbated by it.

Specifically, the tech industry has faced chronic shortages of semiconductor chips, perhaps worse than most other commodities. The shortages have crippled many digital industry supply chains. products.

Biden said that with the infrastructure law investment in physical infrastructure, including additional highways to alleviate traffic on the nation’s roads, will allow goods to be transported faster through existing supply chains.

Continue Reading

Cybersecurity

Telework Here to Stay, But Devices Need Beefed Up Security

The future of teleworking will need upgraded security.

Published

on

Allen McNaughton, sales director at Infoblox

WASHINGTON, January 19, 2022 – Remote work is here to stay, but that means getting up to speed on securing websites is critical, said a director at an information technology security company Wednesday.

At a Business of Federal Technology event, which posed the question “is hybrid forever?,” Kiran Ahuja, director of the U.S. Office of Personnel Management, said “hybrid remote work and telework policies are clearly helping not only federal agencies, but literally every single office, company, and organization in this country.”

But while Allen McNaughton, sales director at security company Infoblox, agreed that telehealth is “here to stay, no doubt about it,” he also made clear that the reality of hybrid work is not effective without protected technology.

“When you have telework, when you have people that can work anywhere in the world, the world is now your attack surface,” says McNaughton. McNaughton noted that there is now a greater opportunity for hackers to install malware on unsecure devices.

The country has already been gripped by high-profile cyberattacks, including on software company SolarWinds, oil transport company Colonial Pipeline, and meat producer JBS USA.

Some of the attackers simply gained access because devices had simple default passwords, raising concern among security experts about how prepared people are for full-time remote work and school.

Continue Reading

Cybersecurity

Congress Must Avoid ‘Overly Prescriptive’ Incident Reporting To Avoid Missing Larger Cyberattacks

Too many reports could burden federal officials, said the executive director of the Alliance for Digital Innovation.

Published

on

Rep. Debbie Shultz
Rep. Debbie Schultz, D-Florida

WASHINGTON, January 11, 2022 — The executive director of an organization that pushes information technology reform in government testified Tuesday in front of the House Oversight committee that any incident reporting requirements that Congress is considering should not burden officials so much that they end up missing more serious breaches of cybersecurity.

Ross Nodurft of the Alliance for Digital Innovation told lawmakers studying the reform of the Federal Information Security Management Act, a 2002 law which implements an information security and protection program, that the amended legislation should consider keeping Congress abreast of incidents, but should be mindful of how it defines a security problem.

“As Congress considers defining major incidents or codifying vulnerability response policies, any legislation should be mindful of the dynamic nature of responding to cybersecurity challenges facing government networks,” Nodurft said. “If Congress is overly prescriptive in its definition of an incident, it runs the risk of receiving so many notifications that the incidents which are truly severe are missed or effectively drowned out due to thee frequency of reporting,” he said in prepared remarks.

The comments come on the heels of a year that included major cybersecurity attacks, including the attacks on software company SolarWinds, oil transport company Colonial Pipeline, which prompted a Senate hearing on the matter. The House Oversight committee released details of its investigation into some of the breaches in November.

The comments also come after lawmakers proposed new reporting requirements on companies. Those proposed laws would make it mandatory that small and large companies report incidents to the government so they can best prepare a response to protect Americans.

In July, Sens. Mark Warner, D-Virginia, Marco Rubio, R-Florida, and Susan Collins, R-Maine, introduced the Cyber Incident Notification Act of 2021, which requires federal and private sector cybersecurity intrusions to be reported to the government within 24 hours.

Cyber incident reporting was recently left out of a Senate bipartisan version of the National Defense Authorization Act.

Lead cybersecurity officials in government have been calling for mandatory breach reporting to government. Brandon Wales, executive director of the Cybersecurity and Infrastructure Security Agency, told the same Oversight committee in November that Congress should force companies to share that kind of information. Last summer, a Department of Justice official said he supports mandatory breach reporting.

In October, Secretary of State Antony Blinken announced the department intends to create a new cyber bureau to help tackle the growing challenge of cyber warfare.

Agency roles should be clarified

Rep. Debbie Schultz, D-Florida, talked about the varied organizations and institutions in her state that have been affected by cyberattacks and threats, including the Miami-based software company Kaseya, which experienced a major ransomware attack.

Schultz stated that there are two entities that are critical to federal cybersecurity: the Cybersecurity and Infrastructure Security Agency and the Office of the National Cyber Director.

Grant Schneider, senior director of cybersecurity services, Venable, said that the Office of the National Cyber Director acts as a conductor in the framework of FISMA. These organizations work with other organizations, such as the National Institute of Standards and Technologies, and the Office of Management and Budget.

With so many organizations, Nodurft explained how important it is for the roles within these organizations to be defined. He talked about how important it is for agencies to know where to turn to report cyberattacks. In part with this, he continued, agencies who “are proactively trying to mitigate their cyber risks” need clear reporting channels and clear areas of jurisdiction to go to for various issues.

According to Nodurft, these defined roles would “make it much easier for [agencies] to work together, to build a broader defensive structure.”

Continue Reading

Recent

Signup for Broadband Breakfast

Get twice-weekly Breakfast Media news alerts.
* = required field

Trending