www.helpnetsecurity.com
Open in
urlscan Pro
52.32.168.182
Public Scan
URL:
https://www.helpnetsecurity.com/2023/12/15/government-cybersecurity-tools/
Submission: On December 15 via api from TR — Scanned from DE
Submission: On December 15 via api from TR — Scanned from DE
Form analysis
1 forms found in the DOMPOST
<form id="mc4wp-form-1" class="mc4wp-form mc4wp-form-244483 mc4wp-ajax" method="post" data-id="244483" data-name="Footer newsletter form">
<div class="mc4wp-form-fields">
<div class="hns-newsletter">
<div class="hns-newsletter__top">
<div class="container">
<div class="hns-newsletter__wrapper">
<div class="hns-newsletter__title">
<i>
<svg class="hic">
<use xlink:href="#hic-plus"></use>
</svg>
</i>
<span>Cybersecurity news</span>
</div>
</div>
</div>
</div>
<div class="hns-newsletter__bottom">
<div class="container">
<div class="hns-newsletter__wrapper">
<div class="hns-newsletter__body">
<div class="row">
<div class="col">
<div class="form-check form-control-lg">
<input class="form-check-input" type="checkbox" name="_mc4wp_lists[]" value="520ac2f639" id="mcs1">
<label class="form-check-label text-nowrap" for="mcs1">Daily Newsletter</label>
</div>
</div>
<div class="col">
<div class="form-check form-control-lg">
<input class="form-check-input" type="checkbox" name="_mc4wp_lists[]" value="d2d471aafa" id="mcs2">
<label class="form-check-label text-nowrap" for="mcs2">Weekly Newsletter</label>
</div>
</div>
</div>
</div>
<div class="form-check form-control-lg mb-3">
<input class="form-check-input" type="checkbox" name="_mc4wp_lists[]" value="28abe5d9ef" id="mcs3">
<label class="form-check-label" for="mcs3">(IN)SECURE - monthly newsletter with top articles</label>
</div>
<div class="input-group mb-3">
<input type="email" name="email" id="email" class="form-control border-dark" placeholder="Please enter your e-mail address" aria-label="Please enter your e-mail address" aria-describedby="hns-newsletter-submit-btn" required="">
<button class="btn btn-dark rounded-0" type="submit" id="hns-newsletter-submit-btn">Subscribe</button>
</div>
<div class="form-check">
<input class="form-check-input" type="checkbox" name="AGREE_TO_TERMS" value="1" id="mcs4" required="">
<label class="form-check-label" for="mcs4">
<span>I have read and agree to the <a href="https://www.helpnetsecurity.com/newsletter/" target="_blank" rel="noopener" class="d-inline-block">terms & conditions</a>
</span>
</label>
</div>
</div>
</div>
</div>
</div>
</div><label style="display: none !important;">Leave this field empty if you're human: <input type="text" name="_mc4wp_honeypot" value="" tabindex="-1" autocomplete="off"></label><input type="hidden" name="_mc4wp_timestamp"
value="1702650688"><input type="hidden" name="_mc4wp_form_id" value="244483"><input type="hidden" name="_mc4wp_form_element_id" value="mc4wp-form-1">
<div class="mc4wp-response"></div>
</form>
Text Content
* News * Features * Expert analysis * Videos * Events * Whitepapers * Industry news * Product showcase * Newsletters * * * Please turn on your JavaScript for this page to function normally. John Benkert, CEO, Cigent December 15, 2023 Share FORTIFYING CYBER DEFENSES: A PROACTIVE APPROACH TO RANSOMWARE RESILIENCE Ransomware has become a pervasive threat, compromising the security and functionality of vital systems across the United States. While governmental pledges and public declarations of intent to fight cybercrime are foundational, they often lack the immediate and tangible impact necessary to counter sophisticated cyber threats. Case in point – the US recently pledged, along with 39 other countries, not to pay ransoms. In theory this makes sense: don’t pay, the bad guys don’t make money and move on to other crimes. In practice, it won’t work. GETTING THE RIGHT TOOLS Instead of investing time in formulating non-binding pledges rather than working on actionable solutions, the US Government should adopt a more proactive stance by directly procuring advanced cybersecurity tools. These tools, which have been developed to keep data safe and stop ransomware attacks, exist and are continually evolving. By spearheading the implementation, through investment and education, the government can set a powerful example for the private sector to follow, thereby reinforcing the nation’s cyber infrastructure. The effectiveness of such tools is not hypothetical: they have been tested and proven in various cybersecurity battlegrounds. They range from advanced threat detection systems that use artificial intelligence to identify potential threats before they strike, to automated response solutions that can protect data on infected systems and networks, preventing the lateral spread of ransomware. Investing in these tools would not only enhance the government’s defensive capabilities but would also stimulate the cybersecurity industry, encouraging innovation and development of even more effective defenses. This approach can also foster public-private partnerships, as government agencies can collaborate with cutting-edge technology firms to develop new standards, best practices, and adapt commercial tools for government use, ensuring the most robust protection possible. These collaborations can also facilitate expanded information sharing, enabling both to stay ahead of emerging threats and collectively strengthen the nation’s cyber defenses. Moreover, the procurement of cutting-edge cybersecurity tools by the US Government would serve as a deterrent to potential attackers. Cybercriminals often target entities with known vulnerabilities, and the current reactive posture is not sufficient to discourage the initiation of ransomware campaigns. However, if adversaries are aware that the US Government is equipped with powerful tools that can thwart their efforts, they may be less inclined to target American infrastructure. This could lead to a broader decline in ransomware incidents, as the risk-to-reward ratio for cybercriminals skews towards high risk and low reward. A government-led initiative to combat ransomware through technology acquisition would have significant ancillary benefits. For example, it could pave the way for standardizing cybersecurity practices across various federal and state agencies, creating a unified front against cyber threats. This standardization would not only improve the security posture of the government but could also serve as a template for the private sector, especially for critical industries such as energy, healthcare, and finance. By demonstrating the efficacy of these tools, the government can drive wider adoption, creating a more resilient national cybersecurity ecosystem. EDUCATION On top of the direct procurement of these tools, a comprehensive strategy should involve robust education initiatives. Ensuring that government agencies are well-versed in the deployment and optimization of these advanced tools is crucial for their effectiveness. But education should extend beyond mere tool usage to encompass a broader understanding of the TTPs (tactics, techniques, and procedures) of cyber threats and cybercriminals. This proactive approach to cybersecurity education not only empowers government entities to better safeguard their networks effectively but also fosters a culture of continuous learning and adaptation in the face of rapidly evolving threats. By continued investment in technology, education, and development of expertise for cybersecurity professionals, the US Government can fortify its defenses and stay ahead of the ever-changing landscape of cyber threats. CONCLUSION While pledges and policies are essential elements of a comprehensive cybersecurity strategy, they must be complemented by concrete actions. The US Government has the opportunity to lead by example, transitioning from a posture of hopeful deterrence to one of active prevention. By purchasing and deploying advanced tools to stop ransomware in its tracks, the government can protect its assets and citizens, deter adversaries, stimulate the cybersecurity sector, and set a standard for private sector organizations to emulate. Such a shift could be the cornerstone of a new era in cyber defense, one where ransomware attacks can be managed and actively prevented. More about * attacks * Cigent * cybersecurity * government * investment * opinion * ransomware * resilience * strategy * USA Share FEATURED NEWS * Fortifying cyber defenses: A proactive approach to ransomware resilience * Russian hackers target unpatched JetBrains TeamCity servers * Attackers are trying to exploit Apache Struts vulnerability (CVE-2023-50164) Guide: Application security posture management deep dive SPONSORED * eBook: Cybersecurity career hacks for newcomers * Download: The Ultimate Guide to the CISSP * eBook: Keeping Active Directory out of hackers’ cross-hairs * Guide: SaaS Offboarding Checklist DON'T MISS * Fortifying cyber defenses: A proactive approach to ransomware resilience * Russian hackers target unpatched JetBrains TeamCity servers * Attackers are trying to exploit Apache Struts vulnerability (CVE-2023-50164) * Cybercrime operation that sold millions of fraudulent Microsoft accounts disrupted * Digital ops and ops management security predictions for 2024 Cybersecurity news Daily Newsletter Weekly Newsletter (IN)SECURE - monthly newsletter with top articles Subscribe I have read and agree to the terms & conditions Leave this field empty if you're human: © Copyright 1998-2023 by Help Net Security Read our privacy policy | About us | Advertise Follow us ×