Daily Cybersecurity Blog

GUEST BLOG: U.S. Acts against Huawei and ZTE, Allies Disadvantaged in Replicating “Rip and Replace”

By Sarina Krantzler, ISA Research Associate “The greatest victory is that which requires no battle” – Sun Tzu, The Art of War In the previous discussion, China’s 14th Five-Year Plan was summarized to capture relevant aspects of dual circulation, the Digital Silk Road (DSR), and the Belt Road Initiative (BRI) that aim to advance China as an economic, technological, and foreign policy powerhouse. Both of those initiatives are well-funded, thoughtful, and strategic in their attempts to spread influence and widespread dependency on Chinese products. The first blog concluded with a strong message of encouragement for the U.S. to evolve its own creative cybersecurity strategy leveraging strategic goals with economics and public policy to create a

Read More
Share on facebook
Share on twitter
Share on linkedin
Share on email

Join the Rethink Cybersecurity Community

Recent Post

Rethinking Cyber Regulation Part II: Creating A Risk-Based Regulatory System

In our previous post, we noted that the new National Cyber Director’s office, which is charged with coordinating federal cyber policy, ought to begin that effort by evaluating and coordinating current cyber regulation. We pointed to studies (including government studies) that showed from 40 to 70 percent of federal cyber regulation – including those imposed on states and localities – is redundant and/or conflicting, thus wasting scarce cyber resources.

Read More »

Congressional Leaders Agree Cybersecurity is not just an IT Issue, finally

By now anyone who is reading this sort of blog is aware that the ransomware epidemic is totally out of control. Colonial just paid $5 million in Bitcoin to get their data (and our gas) released. But this is by no means an isolated event. Ransomware attacks have been proliferating both in number and size of ransom for a while. Earlier in May, former CISA Director Chris Krebs told the House Cybersecurity Subcommittee that we are on the cusp of a world-wide ransomware pandemic fueled by greed.

Read More »

Solarium Chairs are Right: We Need a Cyber Social Contact

Cyberspace Solarium Commission co-chairs Sen. Angus King (I-ME) and Rep. Mike Gallagher (R-WI) said Monday that the Colonia Pipeline attack “underscores the vulnerability of our national critical infrastructure in cyberspace and “the disruption is a clear example of the need to create a new social contract between the Federal government and systemically important critical infrastructure,”

Read More »

New Federal CISO “Passionate” for Regulatory Streamlining: Action Required

At a recent meeting of the IT Sector Coordinating Council, the new U.S. Government’s Chief Information Security Officer, Chris DeRusha, welcomed a question about the extent of redundant and conflicting cybersecurity regulations that impair both state and local governments and the private sector from efficiently addressing cyber threats. Mr. DeRusha told the Council that he has long been “passionate” about the need to streamline
cybersecurity regulations dating back to his days as the Chief Information Officer for the State of Michigan.

Read More »


The Internet Security Alliance (ISA) is writing to the House and Senate Committees on Appropriations in support of President’ Biden’s FY’2022 budget, as a minimum level for federal cybersecurity spending in the coming year.

Read More »

Cybersecurity Demands a Collective Defense Model

The U.S. Constitution clearly states that among government’s obligations are to “provide for the common defense and promote the general welfare.” However, it also states that the government is created by “we the people” implying there is more than a hands-off responsibility for the private sector to help achieve these goals.

Read More »

For Cybersecurity, You Need Management Agility

Numerous factors propel us to rethink our approach to cybersecurity as this blog series maintains. Many of these thoughts revolve around the changing nature of the attackers themselves with their greater size sophistication. Other thoughts turn to the attack methods as new vulnerabilities are discovered and exploited or the nature of the threat itself as we move from assessing risk to entities to a great focus on systemic risks.

Read More »


President Biden’s massive infrastructure proposal – dubbed infrastructure for the digital age – includes a wide variety of items not traditionally thought of as infrastructure such as home health care, as well as some items that are very much digital infrastructure such as $650 million for expanded broadband networks.

Read More »