INTERNET SECURITY ALLIANCE

Daily Cybersecurity Blog

TOP TEN REASONS FOR A VIRTUAL CYBERSECURITY SERVICE ACADEMY (Part 1)

In a series of recent posts, we have noted the time has come for us to create a national virtual cyber service academy, modeled on our traditional military academies, but updated for the digital age (link). We subsequently detailed the public policy argument for this academy (link) and outlined a governance model for it (link).  In this post we will summarize some of the many advantages for creating this national, virtual cybersecurity service academy – it will take multiple posts to cover them all, but we will start with these. ADVANTAGE ONE: WE WILL, FINALLY, CREATE A PATHWAY TO NATIONAL CYBERSECURITY It is axiomatic that none of the technologies, frameworks, coalitions, or strategies to

Read More
Share on facebook
Share on twitter
Share on linkedin
Share on email

Join the Rethink Cybersecurity Community

Recent Post

Solarium Chairs are Right: We Need a Cyber Social Contact

Cyberspace Solarium Commission co-chairs Sen. Angus King (I-ME) and Rep. Mike Gallagher (R-WI) said Monday that the Colonia Pipeline attack “underscores the vulnerability of our national critical infrastructure in cyberspace and “the disruption is a clear example of the need to create a new social contract between the Federal government and systemically important critical infrastructure,”

Read More »

New Federal CISO “Passionate” for Regulatory Streamlining: Action Required

At a recent meeting of the IT Sector Coordinating Council, the new U.S. Government’s Chief Information Security Officer, Chris DeRusha, welcomed a question about the extent of redundant and conflicting cybersecurity regulations that impair both state and local governments and the private sector from efficiently addressing cyber threats. Mr. DeRusha told the Council that he has long been “passionate” about the need to streamline
cybersecurity regulations dating back to his days as the Chief Information Officer for the State of Michigan.

Read More »

ISA TO CONGRESS: SHOW CISA THE MONEY!

The Internet Security Alliance (ISA) is writing to the House and Senate Committees on Appropriations in support of President’ Biden’s FY’2022 budget, as a minimum level for federal cybersecurity spending in the coming year.

Read More »

Cybersecurity Demands a Collective Defense Model

The U.S. Constitution clearly states that among government’s obligations are to “provide for the common defense and promote the general welfare.” However, it also states that the government is created by “we the people” implying there is more than a hands-off responsibility for the private sector to help achieve these goals.

Read More »

For Cybersecurity, You Need Management Agility

Numerous factors propel us to rethink our approach to cybersecurity as this blog series maintains. Many of these thoughts revolve around the changing nature of the attackers themselves with their greater size sophistication. Other thoughts turn to the attack methods as new vulnerabilities are discovered and exploited or the nature of the threat itself as we move from assessing risk to entities to a great focus on systemic risks.

Read More »

WOULD YOU BUILD ROADS YOU KNEW WERE UNSAFE?

President Biden’s massive infrastructure proposal – dubbed infrastructure for the digital age – includes a wide variety of items not traditionally thought of as infrastructure such as home health care, as well as some items that are very much digital infrastructure such as $650 million for expanded broadband networks.

Read More »

CISA TO CONGRESS: SHOW ME THE MONEY!!!

“We need to rethink our approach to managing cybersecurity,” said Cybersecurity and Infrastructure Security Agency (CISA) Acting Director Brandon Wales at a House Appropriations Homeland Security Subcommittee hearing last week last week.

Read More »

The Cyber Policy Path Forward

Guest Blog: Robert Mayer USTelecom’s Senior Vice President of Cybersecurity & Innovation There can be no clearer evidence of the need for industry and government

Read More »

A NEW ROLE FOR MILITARY IN NATION STATE CYBER ATTACKS

As Commander-In-Chief, the President is the ultimate strategic player in defending the country. Merriam-Webster defines warfare as military operations between enemies, also:an activity undertaken by a political unit (such as a nation) to weaken or destroy another

Read More »

TIME TO DO SOMETHING ABOUT CYBER CRIME

For the past two weeks we have been documenting the enormous costs, and total lack of effective action to address cyber-crime. Without repeating the staggering statistics, the evidence shows demonstrably that cyber criminals are getting filthy rich, their businesses expanding and innovating and there is virtually no chance that virtually any of the criminals are going to be held responsible.

Read More »

Legal Structures are a Barrier to Fighting Cybercrime

International jurisdictional disputes often keep law enforcement from effectively operating. What may be legal in one country may not be legal in the U.S. and may be treated differently in a third country. In these instances where cybercriminals are at large internationally, countries require extradition agreements. The U.S. has many of these such agreements, but currently does not have them with China or Russia.

Read More »

DISORGANIZED LAW ENFORCEMENT AT THE CAPITOL: JUST LIKE CYBER

The lead story in today’s New York Times on the investigation into the January 6 attack on the U.S. Capitol reports that yesterday’s Senate hearing “also showed that the overlapping jurisdiction of the Capitol Police, District of Columbia government and other agencies created utter confusion that hindered attempts to stop the assault.”

Read More »