A key aim of the Next Generation Cyber Initiative has been to expand the FBI's ability to quickly define 'the attribution piece' of a cyberattack to help determine an appropriate response, the FBI's Richard McFeely says.
When it comes to fighting DDoS attacks, institutions must understand the threats against them, says Bill Wansley of Booz Allen Hamilton. Varying attack vectors require different modes of detection and prevention.
Online attacks aimed at major U.S. banks have helped to heighten industry cooperation and information sharing. But experts say not all attacks are equal, and understanding the motivation behind the attack is key.
Sen. Jay Rockefeller, in a letter to Fortune 500 company CEOs, queries them about their businesses' IT security practices and wonders if they agree with efforts by the U.S. Chamber of Commerce to block a vote on the Cybersecurity Act of 2012.
Congressional opponents who have blocked legislation to establish voluntary IT security standards for mostly privately owned critical information networks could end up funding such an initiative anyway. Read how.
"The costly and heavy-handed regulatory approach by the current administration will increase the size and cost of the federal bureaucracy and harm innovation in cybersecurity," states the Republican Party platform.