White House cyber plan would hold software companies liable for attacks

  • 📰 latimes
  • ⏱ Reading Time:
  • 71 sec. here
  • 3 min. at publisher
  • 📊 Quality Score:
  • News: 32%
  • Publisher: 82%

Belgique Nouvelles Nouvelles

Belgique Dernières Nouvelles,Belgique Actualités

An ambitious new White House cybersecurity strategy calls for bolstering protections of critical sectors and making software companies legally liable when their products don’t meet basic standards

An ambitious and wide-ranging White House cybersecurity plan released Thursday calls for bolstering protections on critical sectors and making software companies legally liable when their products don’t meet basic standards. The strategy document promises to use “all instruments of national power” to pre-empt cyberattacks.

The 35-page document lays the groundwork for better countering rising threats to government agencies, private industry, schools, hospitals and other vital infrastructure that are routinely breached. In the past few weeks, the FBI, U.S. Marshals Service and Dish Network were among the intrusion victims.Although millions of records remained secure, the L.A. Unified data breach was worse than previously disclosed and included the release of sensitive student information.

Brandon Valeriano, former senior adviser to the federal government’s Cyberspace Solarium Commission, agreed. In a new report, the tech data firm Forrester Research said state-sponsored cyberattacks rose nearly 100% between 2019 and 2022 and their nature changed, with a greater percentage now carried out for data destruction and financial theft. The threats are mostly from abroad: Russia-based cybercrooks and state-backed hackers from Russia, China, North Korea and Iran.

As a nation, “we tend to devolve responsibility for cybersecurity downward. We ask individuals, small businesses and local governments to shoulder a significant burden for defending us all,” Walden said.“Too many vendors ignore best practices for secure development, ship products with insecure default configurations or known vulnerabilities, and integrate third-party software of unvetted or unknown provenance,” the document says.

 

Merci pour votre commentaire. Votre commentaire sera publié après examen.
Nous avons résumé cette actualité afin que vous puissiez la lire rapidement. Si l'actualité vous intéresse, vous pouvez lire le texte intégral ici. Lire la suite:

 /  🏆 11. in BE

Belgique Dernières Nouvelles, Belgique Actualités