Close
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
Read Down
Sign in
Close
Welcome!Log into your account
Forgot your password?
Read Down
Password recovery
Recover your password
Close
Search
Logo
Logo
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
More
    Home Cybersecurity
    • Cybersecurity

    Feds Getting IT Together

    Written by

    Caron Carlson
    Published November 4, 2002
    Share
    Facebook
    Twitter
    Linkedin

      eWEEK content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More.

      Government security officials have begun a new era of interagency cooperation that has led to unprecedented levels of information sharing. And while the high-level meetings have strengthened government security capabilities, they have also highlighted shortcomings in a key part of the data gathering and analysis processes.

      The movement inside the government comes as the White House faces continued pressure to narrow the National Strategy to Secure Cyberspace to focus on systems that are most vulnerable to terrorist threats. Security insiders say provisions for home computer users and small businesses should be revisited in a revised draft that is due to be released by the end of the year.

      As that debate continues, the heads of several federal security organizations—including the Federal Computer Incident Response Center, the Critical Infrastructure Assurance Office and the National Infrastructure Protection Center—have begun meeting regularly to coordinate their activities and establish ground rules for information sharing.

      The meetings represent a significant step forward in the governments handling of vulnerability information. In the past, the various organizations have operated independently, often duplicating efforts and squabbling over responsibility, insiders say.

      “The leaders are already working together and have made remarkable steps in improving information sharing,” said Marcus Sachs, director for communication infrastructure protection in the White House Office of Cyberspace Security here. “Its like an alcoholic admitting a problem. Were past that now.”

      In addition to their own meetings, the leaders of FedCIRC, NIPC and the other bodies are urging their employees to begin talking to one another as well. Theyre working under the assumption that they will be co-workers soon and should develop good rapport, Sachs said.

      Under the proposed Department of Homeland Security, the governments disparate information security organizations would be combined into one body, with the exception of some personnel from the NIPC, who would remain at the FBI. The bill authorizing the funding of the new department is stalled in the U.S. Senate, and Sachs said he doesnt expect it to be approved until late spring or early summer of next year.

      The new move toward cooperation has, however, pointed out some inherent shortcomings in the way organizations gather and share data on attacks and vulnerabilities. A major component of the existing system is the network of industry-specific Information Sharing and Analysis Centers that are supposed to gather information from members and forward it to government and law enforcement officials for correlation.

      Members are encouraged to submit information on attacks and security breaches so that other members can get an early warning of impending problems. The data is stripped of identifying information before it is passed. But, in practice, the process seldom works.

      “No one contributes data because theyre too lazy,” said Mark Rasch, senior vice president and chief security counsel at Solutionary Inc., in Omaha, Neb. “Theres no one whose job it is to share information with the competition.”

      In addition, as government officials scramble to improve their own security infrastructure, theyre also facing tough questions about whether the national strategy should be more focused on national and international priorities and less on educating home users.

      “We dont have any intention of removing [the section on home users],” Howard Schmidt, vice chairman of the Presidents Critical Infrastructure Protection Board, told eWeek. “Once [home users] turn that system on, theyre part of the network.”

      Caron Carlson
      Caron Carlson

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      MOST POPULAR ARTICLES

      Artificial Intelligence

      9 Best AI 3D Generators You Need...

      Sam Rinko - June 25, 2024 0
      AI 3D Generators are powerful tools for many different industries. Discover the best AI 3D Generators, and learn which is best for your specific use case.
      Read more
      Cloud

      RingCentral Expands Its Collaboration Platform

      Zeus Kerravala - November 22, 2023 0
      RingCentral adds AI-enabled contact center and hybrid event products to its suite of collaboration services.
      Read more
      Artificial Intelligence

      8 Best AI Data Analytics Software &...

      Aminu Abdullahi - January 18, 2024 0
      Learn the top AI data analytics software to use. Compare AI data analytics solutions & features to make the best choice for your business.
      Read more
      Latest News

      Zeus Kerravala on Networking: Multicloud, 5G, and...

      James Maguire - December 16, 2022 0
      I spoke with Zeus Kerravala, industry analyst at ZK Research, about the rapid changes in enterprise networking, as tech advances and digital transformation prompt...
      Read more
      Video

      Datadog President Amit Agarwal on Trends in...

      James Maguire - November 11, 2022 0
      I spoke with Amit Agarwal, President of Datadog, about infrastructure observability, from current trends to key challenges to the future of this rapidly growing...
      Read more
      Logo

      eWeek has the latest technology news and analysis, buying guides, and product reviews for IT professionals and technology buyers. The site’s focus is on innovative solutions and covering in-depth technical content. eWeek stays on the cutting edge of technology news and IT trends through interviews and expert analysis. Gain insight from top innovators and thought leaders in the fields of IT, business, enterprise software, startups, and more.

      Facebook
      Linkedin
      RSS
      Twitter
      Youtube

      Advertisers

      Advertise with TechnologyAdvice on eWeek and our other IT-focused platforms.

      Advertise with Us

      Menu

      • About eWeek
      • Subscribe to our Newsletter
      • Latest News

      Our Brands

      • Privacy Policy
      • Terms
      • About
      • Contact
      • Advertise
      • Sitemap
      • California – Do Not Sell My Information

      Property of TechnologyAdvice.
      © 2024 TechnologyAdvice. All Rights Reserved

      Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.

      ×