Skip to content
Advertisement

Cybersecurity 2018

"Cybersecurity 2018: Online Security and Safety in Government, Industry and Civil Society" is a Special Report published by The Washington Times Special Sections Department and Salute to Veterans.

Recent Stories

Innovation, modernization key to U.S. cybersecurity leadership

In recent years, it has become clear that the world of cybersecurity is rapidly changing — cyberattacks are not only growing in volume, but also in complexity. As chairman of the Senate Commerce Subcommittee on Consumer Protection, Product Safety, Insurance, and Data Security, I've convened hearings and publicly questioned private corporations to determine what protections and practices they have in place to better protect their customers' personal and financial data.

Inspiring success, insightful discussion and cybersecurity careers for our 22 million veterans

The Salute to Veterans Series delves into the top issues that our veterans and troops face daily. The TV series features vibrant discussions and provides advice and solutions from distinguished veterans who are also successful businessmen, community leaders and were accomplished college and/or professional football athletes: Rocky Bleier, Bryce Fisher and Greg Gadson.

Reducing security risk by protecting enterprise applications

Relentless threats from increasingly sophisticated attackers. Organized crime and rogue nation-states. Hacktivism and new mechanisms of compromise. Many years ago, the prospect of these security challenges seemed like something out of James Bond. Now I defend organizations from these threats every minute of every day.

Preparing now for safe, secure self-driving cars and other innovative technologies

There really isn't anything quite like American innovation. What makes U.S. innovation so different is that it's not just one field or sector; it's an ethos that inspires business across the country. Whether it's due to Americans' work ethic, an entrepreneurial spirit or a framework that allows innovators to succeed, the United States is second to none when it comes to creating technology that improves our daily lives.

Time's up for poor cyber hygiene

On Jan. 30, President Trump will deliver his first State of the Union address to Congress. The purpose of this constitutionally sanctioned speech is to reflect on the challenges facing our country and policies to address them. One challenge that must not be ignored is the ongoing threat of cyberattacks to our personal security.

Effective national policy needed to protect the cyber domain

Our world is increasingly reliant on the cyber domain and the connections that it creates. We live in a world where the "internet of things" includes the smartphones and computers we use every day and also seemingly benign objects such as factory robots and appliances in our homes. This digital connection to the world around us brings great convenience, efficiency and prosperity, but vulnerability accompanies it.

How tech can address the greatest security challenges of our time

After Hurricane Harvey struck southeast Texas in August, a network of Good Samaritans who call themselves the Cajun Navy took to social media to help organize relief efforts. Airbnb's Homes program connected hosts with people in need of emergency shelter. And Lyft added the American Red Cross to its Round Up & Donate feature, letting riders contribute to relief efforts.

Safeguarding Americans' data in federal agencies

In today's digital age, nearly every service imaginable is available through a couple of quick clicks on an app or a website. We can order food or groceries right to our doorsteps, we can call a ride to the airport, or we can pay for a parking spot — all within seconds. But this convenience comes with inherent risk — living one's life in the digital age means trusting your sensitive information with outside applications, organizations and vendors.

America's Air Force: Defenders of air, space and cyberspace

In this daily deluge of information that shapes our American way of life, we continue to see headline after headline of cyberattacks affecting our trusted government agencies, commercial corporations — large and small — and in some cases, our very own personal data.

Preparing our nation for 21st century challenges in the digital age

In early December of 2017, world technology leaders assembled in Wuzhen, China, for the 4th Annual World Internet Conference. It was a widely attended event and included the chief executive officers of Apple and Google. The theme of the conference was "developing a digital economy of openness and shared benefits."

The 5th domain: Cyber defense needed in the 21st century

In today's world, we have all been to cyberspace and enjoyed the many conveniences this global domain has added to our lives. But did you know that cyberspace has been declared the fifth domain of warfare? Just like it does in our own lives, cyberspace provides interconnectivity and communications between the other four domains of war — air, land, sea and space. Therefore, an enemy doesn't need extensive ground troops or nuclear weapons to take on the United States. All that's needed are a few inexpensive tools, some knowledge and skill, and access to our networks where the cost of entry is almost nonexistent.

Global cooperation of 'utmost importance' for a stable cyberspace

I come from Estonia, a country that is known for Skype and the NATO Cooperative Cyber Defense Center of Excellence, as well as for being the first country in the world to introduce e-government, e-taxation, e-voting and a thousand other e-services. These are all part of what we call our e-lifestyle.

Painful cyberattacks driving demand for security

The right to defend yourself and your property applies in today's increasingly connected world, just as it did more than 200 years ago. While the Second Amendment protects the right to keep and bear arms, the threats we face today are changing, just as the way we interact with people, data and content are changing. As individuals, companies and countries, we must be increasingly on guard and behaviors need to shift away from reactionary defense towards an always prepared and secure posture, much the way we've seen with homeland security and traditional national defense.

Rep. Yvette Clarke, New York Democrat.

Cybersecurity and elections: Are we ready for November?

At first, "Cozy-Bear," "Fancy-Bear" and "Gucifer 2.0" may sound like characters out of a science fiction thriller. But on June 15, 2016, we learned that these were the names associated with Russian groups who hacked into campaign committee computer networks. The following week, Wikileaks published 20,000 emails from the hack, which exposed the cybersecurity vulnerabilities of our democratic institutions for all Americans to witness.

Col. Andrew O. Hall with Google's Vinton G. Cerf, co-designer of the TCP/IP protocols and the architecture of the Internet, a keynote speaker at CyCon U.S. in November 2017. U.S. Army photo by Clare Blackmon.

West Point's Army Cyber Institute: Developing the cyber leadership model

Speaking at CyCon U.S., General Mark Milley challenged the audience's younger members to take up the mantle of cyber leadership. "That rock is going to go in your rucksack, and we are counting on you for the future." The need for innovative programs to train our future cyber leaders is apparent to the U.S. Army chief of staff and many national-level leaders. The problem is not limited to the military: In a borderless domain, cyberthreats don't distinguish between military and civilian networks. Nor is the problem solely technological: The Army chief also pointed out the moral, legal and ethical concerns brought on by advances in artificial intelligence and autonomous battlefield systems.

Federal cyber leadership should be bipartisan

Imagine: @realDonaldTrump has been hacked and the latest missive from the president's Twitter account announces imminent airstrikes on Genovia. Foreign militaries scramble, and the potential for an accidental escalation of conflict is suddenly very real.

Our nation's counties, cybersecurity and ransomware

America's counties employ 3.6 million employees who serve some 308 million county residents. Counties play a significant role in every aspect of our lives — including hospitals and clinics, roads, bridges, airports and other infrastructure, public safety and courts — and are largely responsible for local and federal elections administration. Counties provide vital services to all Americans, from issuing birth certificates and marriage licenses, to operating 911 call centers. While balancing numerous administrative responsibilities, counties deliver essential services to ensure healthy, vibrant and safe communities across the United States.

Too small to get hacked? Think again ...

I worked for two small businesses in the early 2000s. I was responsible for managing a Network and Security Operations Center that monitored and managed several federal agencies' networks and systems — an environment that was much different than it is today. We focused on changes to the operating environment — internal threats. However, we operated in an environment where more than 50 percent of American households had internet access. The sophistication of the security tools at that time was limited, so threats like the Sapphire worm were able to infect hundreds of thousands of computers in less than three hours.

Veterans wanted! Cyber career opportunities abound for veterans

Cybersecurity jobs are grounded in patriotism. Every single day, businesses and government entities across the nation are being targeted and breached by opportunists (with varying motives) who identify vulnerabilities and take advantage of those vulnerabilities, leaving a wake of victims in their path.

Cyber deterrence remains a missing piece of U.S. cybersecurity

While we wait for Robert Mueller to wrap up his investigation into President Trump's pre-election dealings with Russians, let's remember how we got here. The Russian Government compromised the emails of U.S. political organizations and used the information to damage the Clinton campaign. Punishing any potential violations of U.S. law that enabled this effort is important, so why is the Trump administration doing so little to beef up our nation's ability to investigate and apprehend cybercriminals?

Human phish-bait: Why people are the weakest link in our cyber defense

Over the past century there have been tremendous improvements in our ability to use and defend cyber systems. Technology itself has changed drastically from our heavy vacuum tube computers in the 1950s to the world we see today, teeming with mobile devices, the Internet of Things, Cloud computing — and the next big idea.

U.S. ingenuity created the Internet; can it keep it safe and secure?

On March 23, 2016, Su Bin, a Chinese national, pled guilty to a criminal conspiracy involving hacking into the networks of key American defense contractors, stealing critical military data and then sending that information back to China. The data he stole involved programs such as the C-17 strategic airlifter as well as advanced American fighter jets. This operation was just one in a series of recent high-profile, cyber espionage campaigns against U.S. military targets.

For cybersecurity problems, seek bottom-up solutions

Everyone agrees on the need for strong cybersecurity policy. Each month, we see headlines telling of high-profile hacks and expansive bugs that threaten our nation's commerce, privacy and even our safety. But there is much disagreement on how best to proceed.

Cybersecurity: Is anything really safe?

2017 was a spectacular year for cyberattacks, including some previous ones only recently and reluctantly disclosed by embarrassed victims. They include a veritable who's who of government, business and technology, including some of the world's most technically sophisticated organizations.