Home / News

Defense Science Board Urges Obama to Take Immediate Cybersecurity Measures

According to a report by the Defense Science Board, the President-elect Barack Obama will inherit a cybersecurity infrastructure that is ill-prepared for advanced cyberattacks which will be of particular challenge for the new leaders. From the report: "There is increasing concern throughout the Department of Defense (DOD) about advanced cyber threats. Many studies are underway; budgets are being developed, evaluated, and amended; and organizations are being restructured. But there has been very little actual progress to date in terms of implementing cyber security improvements against advance threats."

Reporting today on eWeek, Roy Mark writes: "The Bush administration has been widely criticized by security experts as de-emphasizing cyber-security and hamstringing the authority of officials in charge of government-wide cyber-security" said Roy Mark in a report eWeek."

The National Cyber Security Initiative began in January of this year and is expected to cost as much as $30 billion over the next seven years. "We believe the new administration should place the highest priority on both supporting and extending this very significant effort," the report point out.

In the newly launched website for the office of the president-elect, Change.gov, the following items are currently listed as part of the administration's information networks defense plan:

• Strengthen Federal Leadership on Cyber Security;
• Initiate a Safe Computing R&D Effort and Harden our Nation's Cyber Infrastructure;
• Protect the IT Infrastructure That Keeps America's Economy Safe;
• Prevent Corporate Cyber-Espionage;
• Develop a Cyber Crime Strategy to Minimize the Opportunities for Criminal Profit;
• Mandate Standards for Securing Personal Data and Require Companies to Disclose Personal Information Data Breaches

Related topics: Cyberattack, Cybercrime, Security

WEEKLY WRAP — Get CircleID's Weekly Summary Report by Email:

Comments

To post comments, please login or create an account.

Related Blogs

Related News

Topics

Industry Updates – Sponsored Posts

dotStrategy Selects Neustar's Registry Threat Mitigation Services for .BUZZ Registry

24 Million Home Routers Expose ISPs to Massive DNS-Based DDoS Attacks

What Does a DDoS Attack Look Like? (Watch First 3 Minutes of an Actual Attack)

Joining Forces to Advance Protection Against Growing Diversity of DDoS Attacks

Why Managed DNS Means Secure DNS

Rodney Joffe on Why DNS Has Become a Favorite Attack Vector

Motivated to Solve Problems at Verisign

Diversity, Openness and vBSDcon 2013

Neustar's Proposal for New gTLD Collision Risk Mitigation

IT Project Management: Best Practices in Small-Scale Engagements

DDoS Attacks in the United Kingdom: 2012 Annual Trends and Impact Survey

7 Keys to Professional Services Value: A Client-Side Perspective

Neustar Launches Global Partner Program

MarkMonitor Named a Top Trusted Website in OTA's 2013 Online Trust Honor Roll

Neustar Chief Technology Officer Appointed to FCC's Technological Advisory Council

Hope is Not a Strategy: Neustar Releases 2012 Annual DDoS Attack and Impact Survey

How Neustar Technology Can Help Mitigate DDoS Attacks

Reducing the Risks of BYOD with Nominum's Security Solution

Neustar Launches Enterprise Professional Services Offerings

Nominum Releases New Security Intelligence Application

Sponsored Topics