Daily Cybersecurity Blog

Playoffs Time: What Can Cyber Policymakers Learn from the NFL?

This blog series began by asserting that in the new year, given the obvious ineffectiveness of our current cyber policies it’s time for policymakers to begin focusing on issues that might really matter in terms of creating a sustainably secure system.  We then moved forward to identify two major areas where government could really make a difference but have spent comparatively little time and resources in addressing them – specifically workforce development and enhanced law enforcement.  These posts suggested a range of directions government could take in these areas to address these deficiencies both in the short and longer terms. However, many in government, while largely ignoring issues like improved law enforcement and workforce development, instead

Read More
Share on facebook
Share on twitter
Share on linkedin
Share on email

Join the Rethink Cybersecurity Community

Recent Post

Rethinking Cyber Regulation Part II: Creating A Risk-Based Regulatory System

In our previous post, we noted that the new National Cyber Director’s office, which is charged with coordinating federal cyber policy, ought to begin that effort by evaluating and coordinating current cyber regulation. We pointed to studies (including government studies) that showed from 40 to 70 percent of federal cyber regulation – including those imposed on states and localities – is redundant and/or conflicting, thus wasting scarce cyber resources.

Read More »

Congressional Leaders Agree Cybersecurity is not just an IT Issue, finally

By now anyone who is reading this sort of blog is aware that the ransomware epidemic is totally out of control. Colonial just paid $5 million in Bitcoin to get their data (and our gas) released. But this is by no means an isolated event. Ransomware attacks have been proliferating both in number and size of ransom for a while. Earlier in May, former CISA Director Chris Krebs told the House Cybersecurity Subcommittee that we are on the cusp of a world-wide ransomware pandemic fueled by greed.

Read More »

Solarium Chairs are Right: We Need a Cyber Social Contact

Cyberspace Solarium Commission co-chairs Sen. Angus King (I-ME) and Rep. Mike Gallagher (R-WI) said Monday that the Colonia Pipeline attack “underscores the vulnerability of our national critical infrastructure in cyberspace and “the disruption is a clear example of the need to create a new social contract between the Federal government and systemically important critical infrastructure,”

Read More »

New Federal CISO “Passionate” for Regulatory Streamlining: Action Required

At a recent meeting of the IT Sector Coordinating Council, the new U.S. Government’s Chief Information Security Officer, Chris DeRusha, welcomed a question about the extent of redundant and conflicting cybersecurity regulations that impair both state and local governments and the private sector from efficiently addressing cyber threats. Mr. DeRusha told the Council that he has long been “passionate” about the need to streamline
cybersecurity regulations dating back to his days as the Chief Information Officer for the State of Michigan.

Read More »


The Internet Security Alliance (ISA) is writing to the House and Senate Committees on Appropriations in support of President’ Biden’s FY’2022 budget, as a minimum level for federal cybersecurity spending in the coming year.

Read More »

Cybersecurity Demands a Collective Defense Model

The U.S. Constitution clearly states that among government’s obligations are to “provide for the common defense and promote the general welfare.” However, it also states that the government is created by “we the people” implying there is more than a hands-off responsibility for the private sector to help achieve these goals.

Read More »

For Cybersecurity, You Need Management Agility

Numerous factors propel us to rethink our approach to cybersecurity as this blog series maintains. Many of these thoughts revolve around the changing nature of the attackers themselves with their greater size sophistication. Other thoughts turn to the attack methods as new vulnerabilities are discovered and exploited or the nature of the threat itself as we move from assessing risk to entities to a great focus on systemic risks.

Read More »