www.helpnetsecurity.com Open in urlscan Pro
52.32.168.182  Public Scan

URL: https://www.helpnetsecurity.com/2023/12/15/government-cybersecurity-tools/
Submission: On December 15 via api from TR — Scanned from DE

Form analysis 1 forms found in the DOM

POST

<form id="mc4wp-form-1" class="mc4wp-form mc4wp-form-244483 mc4wp-ajax" method="post" data-id="244483" data-name="Footer newsletter form">
  <div class="mc4wp-form-fields">
    <div class="hns-newsletter">
      <div class="hns-newsletter__top">
        <div class="container">
          <div class="hns-newsletter__wrapper">
            <div class="hns-newsletter__title">
              <i>
                        <svg class="hic">
                            <use xlink:href="#hic-plus"></use>
                        </svg>
                    </i>
              <span>Cybersecurity news</span>
            </div>
          </div>
        </div>
      </div>
      <div class="hns-newsletter__bottom">
        <div class="container">
          <div class="hns-newsletter__wrapper">
            <div class="hns-newsletter__body">
              <div class="row">
                <div class="col">
                  <div class="form-check form-control-lg">
                    <input class="form-check-input" type="checkbox" name="_mc4wp_lists[]" value="520ac2f639" id="mcs1">
                    <label class="form-check-label text-nowrap" for="mcs1">Daily Newsletter</label>
                  </div>
                </div>
                <div class="col">
                  <div class="form-check form-control-lg">
                    <input class="form-check-input" type="checkbox" name="_mc4wp_lists[]" value="d2d471aafa" id="mcs2">
                    <label class="form-check-label text-nowrap" for="mcs2">Weekly Newsletter</label>
                  </div>
                </div>
              </div>
            </div>
            <div class="form-check form-control-lg mb-3">
              <input class="form-check-input" type="checkbox" name="_mc4wp_lists[]" value="28abe5d9ef" id="mcs3">
              <label class="form-check-label" for="mcs3">(IN)SECURE - monthly newsletter with top articles</label>
            </div>
            <div class="input-group mb-3">
              <input type="email" name="email" id="email" class="form-control border-dark" placeholder="Please enter your e-mail address" aria-label="Please enter your e-mail address" aria-describedby="hns-newsletter-submit-btn" required="">
              <button class="btn btn-dark rounded-0" type="submit" id="hns-newsletter-submit-btn">Subscribe</button>
            </div>
            <div class="form-check">
              <input class="form-check-input" type="checkbox" name="AGREE_TO_TERMS" value="1" id="mcs4" required="">
              <label class="form-check-label" for="mcs4">
                <span>I have read and agree to the <a href="https://www.helpnetsecurity.com/newsletter/" target="_blank" rel="noopener" class="d-inline-block">terms &amp; conditions</a>
                </span>
              </label>
            </div>
          </div>
        </div>
      </div>
    </div>
  </div><label style="display: none !important;">Leave this field empty if you're human: <input type="text" name="_mc4wp_honeypot" value="" tabindex="-1" autocomplete="off"></label><input type="hidden" name="_mc4wp_timestamp"
    value="1702650688"><input type="hidden" name="_mc4wp_form_id" value="244483"><input type="hidden" name="_mc4wp_form_element_id" value="mc4wp-form-1">
  <div class="mc4wp-response"></div>
</form>

Text Content

 * News
 * Features
 * Expert analysis
 * Videos
 * Events
 * Whitepapers
 * Industry news
 * Product showcase
 * Newsletters

 * 
 * 
 * 


Please turn on your JavaScript for this page to function normally.
John Benkert, CEO, Cigent
December 15, 2023
Share


FORTIFYING CYBER DEFENSES: A PROACTIVE APPROACH TO RANSOMWARE RESILIENCE



Ransomware has become a pervasive threat, compromising the security and
functionality of vital systems across the United States.

While governmental pledges and public declarations of intent to fight cybercrime
are foundational, they often lack the immediate and tangible impact necessary to
counter sophisticated cyber threats. Case in point – the US recently pledged,
along with 39 other countries, not to pay ransoms. In theory this makes sense:
don’t pay, the bad guys don’t make money and move on to other crimes. In
practice, it won’t work.




GETTING THE RIGHT TOOLS

Instead of investing time in formulating non-binding pledges rather than working
on actionable solutions, the US Government should adopt a more proactive stance
by directly procuring advanced cybersecurity tools.

These tools, which have been developed to keep data safe and stop ransomware
attacks, exist and are continually evolving. By spearheading the implementation,
through investment and education, the government can set a powerful example for
the private sector to follow, thereby reinforcing the nation’s cyber
infrastructure.

The effectiveness of such tools is not hypothetical: they have been tested and
proven in various cybersecurity battlegrounds. They range from advanced threat
detection systems that use artificial intelligence to identify potential threats
before they strike, to automated response solutions that can protect data on
infected systems and networks, preventing the lateral spread of ransomware.

Investing in these tools would not only enhance the government’s defensive
capabilities but would also stimulate the cybersecurity industry, encouraging
innovation and development of even more effective defenses.

This approach can also foster public-private partnerships, as government
agencies can collaborate with cutting-edge technology firms to develop new
standards, best practices, and adapt commercial tools for government use,
ensuring the most robust protection possible. These collaborations can also
facilitate expanded information sharing, enabling both to stay ahead of emerging
threats and collectively strengthen the nation’s cyber defenses.

Moreover, the procurement of cutting-edge cybersecurity tools by the US
Government would serve as a deterrent to potential attackers. Cybercriminals
often target entities with known vulnerabilities, and the current reactive
posture is not sufficient to discourage the initiation of ransomware campaigns.
However, if adversaries are aware that the US Government is equipped with
powerful tools that can thwart their efforts, they may be less inclined to
target American infrastructure. This could lead to a broader decline in
ransomware incidents, as the risk-to-reward ratio for cybercriminals skews
towards high risk and low reward.

A government-led initiative to combat ransomware through technology acquisition
would have significant ancillary benefits. For example, it could pave the way
for standardizing cybersecurity practices across various federal and state
agencies, creating a unified front against cyber threats.

This standardization would not only improve the security posture of the
government but could also serve as a template for the private sector, especially
for critical industries such as energy, healthcare, and finance. By
demonstrating the efficacy of these tools, the government can drive wider
adoption, creating a more resilient national cybersecurity ecosystem.


EDUCATION

On top of the direct procurement of these tools, a comprehensive strategy should
involve robust education initiatives. Ensuring that government agencies are
well-versed in the deployment and optimization of these advanced tools is
crucial for their effectiveness.

But education should extend beyond mere tool usage to encompass a broader
understanding of the TTPs (tactics, techniques, and procedures) of cyber threats
and cybercriminals. This proactive approach to cybersecurity education not only
empowers government entities to better safeguard their networks effectively but
also fosters a culture of continuous learning and adaptation in the face of
rapidly evolving threats.

By continued investment in technology, education, and development of expertise
for cybersecurity professionals, the US Government can fortify its defenses and
stay ahead of the ever-changing landscape of cyber threats.


CONCLUSION

While pledges and policies are essential elements of a comprehensive
cybersecurity strategy, they must be complemented by concrete actions. The US
Government has the opportunity to lead by example, transitioning from a posture
of hopeful deterrence to one of active prevention.

By purchasing and deploying advanced tools to stop ransomware in its tracks, the
government can protect its assets and citizens, deter adversaries, stimulate the
cybersecurity sector, and set a standard for private sector organizations to
emulate. Such a shift could be the cornerstone of a new era in cyber defense,
one where ransomware attacks can be managed and actively prevented.





More about
 * attacks
 * Cigent
 * cybersecurity
 * government
 * investment
 * opinion
 * ransomware
 * resilience
 * strategy
 * USA

Share


FEATURED NEWS

 * Fortifying cyber defenses: A proactive approach to ransomware resilience
 * Russian hackers target unpatched JetBrains TeamCity servers
 * Attackers are trying to exploit Apache Struts vulnerability (CVE-2023-50164)

Guide: Application security posture management deep dive



SPONSORED

 * eBook: Cybersecurity career hacks for newcomers
 * Download: The Ultimate Guide to the CISSP
 * eBook: Keeping Active Directory out of hackers’ cross-hairs
 * Guide: SaaS Offboarding Checklist




DON'T MISS

 * Fortifying cyber defenses: A proactive approach to ransomware resilience
 * Russian hackers target unpatched JetBrains TeamCity servers
 * Attackers are trying to exploit Apache Struts vulnerability (CVE-2023-50164)
 * Cybercrime operation that sold millions of fraudulent Microsoft accounts
   disrupted
 * Digital ops and ops management security predictions for 2024




Cybersecurity news
Daily Newsletter
Weekly Newsletter
(IN)SECURE - monthly newsletter with top articles
Subscribe
I have read and agree to the terms & conditions
Leave this field empty if you're human:

© Copyright 1998-2023 by Help Net Security
Read our privacy policy | About us | Advertise
Follow us
×