DIRECTORY

  • Alerts
  • APTs
  • Blog
  • Books
  • Certifications
  • Cheat Sheets
  • Courses
  • Cyber Briefing
  • CyberDecoded
  • CyberReview
  • CyberStory
  • CyberTips
  • Definitions
  • Domains
  • Entertainment
  • FAQ
  • Frameworks
  • Hardware Tools
  • Incidents
  • Malware
  • News
  • Papers
  • Podcasts
  • Quotes
  • Reports
  • Tools
  • Threats
  • Tutorials
No Result
View All Result
  • Login
  • Register
  • Cyber Citizens
  • Cyber Professionals
  • Institutions
CyberMaterial
Get Help
  • Cyber Citizens
  • Cyber Professionals
  • Institutions
CyberMaterial
No Result
View All Result
Get Help
CyberMaterial
Home DeFi Protocol

US Unveils Aggressive cybersecurity Strategy

Reading Time: 2 mins read
in News

 

The US government has released its National Cybersecurity Strategy, which includes plans to use mandatory regulation to ensure critical infrastructure vendors adopt secure-by-design principles and prioritize essential services.

The government will also encourage the adoption of secure cybersecurity practices, with entities urged to exceed the minimum requirements defined by regulation.

The strategy is divided into five pillars: Defend Critical Infrastructure, Disrupt and Dismantle Threat Actors, Shape Market Forces to Drive Security and Resilience, Invest in a Resilient Future, and Forge International Partnerships to Pursue Shared Goals.

The document also authorizes law enforcement and intelligence agencies to “disrupt and dismantle threat actors” with a more aggressive ‘hack-back’ approach to deal with foreign adversaries and ransomware actors.

The strategy aims to disrupt hostile networks preemptively by authorizing US defense, intelligence, and law enforcement agencies to hack into the computer networks of criminals and foreign governments.

It discourages the payment of data-extortion ransoms to cybercriminals and plans to reduce the potential for profit by making malicious actors incapable of mounting sustained cyber-enabled campaigns that threaten the national security or public safety of the US.

The government will work with cloud and other internet infrastructure providers to identify malicious use of US-based infrastructure, share reports of malicious use, and make it more difficult for malicious actors to access these resources.

The federal government is also exploring a federal cyber insurance backstop to provide stability to the economy during catastrophic events or major crises. Private companies will be full partners to issue early warnings and help repel cyberattacks.

The strategy document assigns the work to the FBI’s National Cyber Investigative Joint Task Force working in tandem with all relevant US agencies. The government plans to use existing authorities to set “necessary cybersecurity requirements in critical sectors” and work with Congress to close any legal gaps around authority.

Read More

Tags: GovernmentMarch 2023NewsNews 2023SurveillanceUnited States
ADVERTISEMENT

Related Posts

Steam Ends Support for Old Windows

Steam Ends Support for Old Windows

March 30, 2023
US Sentences CEO for Cryptocurrency Fraud

US Sentences CEO for Cryptocurrency Fraud

March 30, 2023
Call to Pause Development of Advanced AI

Call to Pause Development of Advanced AI

March 30, 2023
Hacker Returns Stolen Funds to Euler

Hacker Returns Stolen Funds to Euler

March 30, 2023

More Articles

Cyber101

Nonaffiliated Third Party

June 7, 2022

Cyber Breach Response That Actually Works: Organizational Approach to Managing Residual Risk

April 19, 2021

Threatpost talks – Podcast

April 14, 2022

FBI warns about ongoing Google Voice authentication scams

January 6, 2022
Podcast

Email Transport Security with Gareth Gudger

March 15, 2023
Book

Cryptography And Network Security, 7Th Edition

May 24, 2022
Alerts

Prototype pollution-like bug variant discovered in Python

January 11, 2023
Quotes

“Even the bravest cyber defense will…”

November 4, 2020
Load More

Security through data

Cybersecurity Domains

  • API Security
  • Business Continuity
  • Career Development
  • Compliance
  • Cryptography
  • HSM
  • KPIs / KRIs
  • Penetration Testing
  • Shift Left
  • Vulnerability Scan

Emerging Technologies

  • 5G
  • Artificial Intelligence
  • Blockchain
  • Cryptocurrency
  • Deepfake
  • E-Commerce
  • Healthcare
  • IoT
  • Quantum Computing

Frameworks

  • CIS Controls
  • CCPA
  • GDPR
  • NIST
  • 23 NYCRR 500
  • HIPAA

Repository

  • Books
  • Certifications
  • Definitions
  • Documents
  • Entertainment
  • Quotes
  • Reports

Threats

  • APTs
  • DDoS
  • Insider Threat
  • Malware
  • Phishing
  • Ransomware
  • Social Engineering

© 2023 | CyberMaterial | All rights reserved.

World’s #1 Cybersecurity Repository

  • About
  • Legal and Privacy Policy
  • Site Map
No Result
View All Result
  • Audience
    • Cyber Citizens
    • Cyber Professionals
    • Institutions
  • Highlights
    • Blog
    • CyberDecoded
    • Cyber Review
    • CyberStory
    • CyberTips
  • Cyber Risks
    • Alerts
    • Attackers
    • Domains
    • Incidents
    • Threats
  • Opportunities
    • Events
    • Jobs
  • Repository
    • Books
    • Certifications
    • Cheat Sheets
    • Courses
    • Definitions
    • Frameworks
    • Games
    • Hardware Tools
    • Memes
    • Movies
    • Papers
    • Podcasts
    • Quotes
    • Reports
  • Report Cyber Incident
  • GET HELP

Subscribe to our newsletter

© 2022 Cybermaterial - Security Through Data .

Welcome Back!

Sign In with Google
Sign In with Linked In
OR

Forgotten Password? Sign Up

Create New Account!

Sign Up with Google
Sign Up with Linked In
OR

All fields are required. Log In

Retrieve your password

Please enter your username or email address to reset your password.

Log In

Add New Playlist

This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy and Cookie Policy.