Close
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
Read Down
Sign in
Close
Welcome!Log into your account
Forgot your password?
Read Down
Password recovery
Recover your password
Close
Search
Logo
Logo
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
More
    Home Cybersecurity
    • Cybersecurity

    Battening Down Security Hatches

    Written by

    Caron Carlson
    Published December 10, 2001
    Share
    Facebook
    Twitter
    Linkedin

      eWEEK content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More.

      As companies continue to grapple with security and disaster recovery concerns brought about by the Sept. 11 terrorist attacks, the federal government is considering a broad set of security standards that it will push its agencies and private industry to follow.

      Last week, the Business Software Alliance, at its Global Tech Summit in Washington, issued a “Cyber Security Blueprint” to guide collaborative government and industry initiatives. The proposals include greater investment in enhanced security tools, federal research and development investment in security technology, and increased criminal penalties against computer crimes.

      While theres much debate over the shape of the proposals, no one is disputing that something like this must be done. There had been much talk even before Sept. 11 of a so-called cyber-terrorist event that would serve as a wake-up call to CIOs and security administrators.

      “Is there the potential for some sort of big event? Absolutely. Yes,” said George Samenuk, CEO of Network Associates Inc., who was in New York to attend the InfoSecurity Conference last week. “I think were naive if we dont believe it can happen. A year ago, people thought they were prepared, but the events of the past year have showed us thats not true. Were ill-prepared.”

      During both series of meetings last week, top government officials including Vice President Dick Cheney and U.S. Attorney General John Ashcroft expressed grave concerns about the security of the nations government and corporate networks. They made it clear that they will not wait for a disastrous cyber-security event to take place before acting.

      “The threat is taken very seriously within the government,” said Samenuk, who attended the meetings in Washington last week. “Theres no doubt in my mind that theyre going to do something.”

      While the form of the proposed government guidelines has not been determined, Samenuk said there will likely be a government/industry panel overseeing the issue.

      Observers said its important that the government concentrate on the nations critical infrastructure and not overstep its bounds by trying to impose rules on the private sector. But the policies will need buy-in from all affected organizations for them to succeed.

      “The key to national infrastructure protection is a grass-roots movement with people devoted to a common cause,” said Steve Hunt, an analyst at Giga Information Group Inc., in Chicago. “Its an achievable goal, and it wont cost a fortune.”

      Indeed, despite the numerous government warnings and continued security incidents such as last weeks rampaging Goner worm, Samenuk and others said they still believe that awareness of the vulnerability of corporate and government networks is low. That, they said, is a major impediment to any large-scale effort to fix the problem.

      “The immediate threat is low, but the long-term one is high,” said Charles Neal, vice president of cyber-terrorism detection and response at Exodus Communications Inc., in El Segundo, Calif., and a former FBI agent. “Its coming.”

      Neal said another difficulty with combating cyber-terrorism is the lack of information about the few events that have taken place.

      “No one wants to raise their hand and say that they were hit, so we never know what happens,” Neal said. “Id say fewer than 3 percent of our customers report incidents like that.”

      “The strength of security is not the issue,” said William Conner, president and CEO of Entrust Inc., at the summit. “Its the attributes of security and the life cycle of security.”

      Industry luminaries, while eager to join government initiatives to strengthen cyber-security, are not without reservations regarding some of the governments proposed measures, including the so-called Magic Lantern surveillance technology. Magic Lantern is a series of surveillance tools under development by federal law enforcement officials. The tools are essentially a combination of existing technologies that can be remotely installed on a suspects computer to monitor keystrokes, passwords and other PC activity.

      “It fundamentally creates an opportunity for a back door to be implemented in software,” said John Thompson, chairman, CEO and president of Symantec Corp., about Magic Lantern. “I think, quite frankly, thats the start of a slippery slope.”

      Discussing the governments increased electronic surveillance powers enacted since Sept. 11, Eric Schmidt, chairman and CEO of Google Inc., said, “Its OK as long as theres a judge involved to issue an order. Where we get into trouble is where the software snarfs everything up in the world.”

      Newt Gingrich, former speaker of the U.S. House of Representatives and current CEO of The Gingrich Group, in Atlanta, told attendees of the InfoSecurity Conference that government and corporate networks will be the targets of new and varied threats in the coming years that arent even on the map yet.

      “You should scan very widely and look for disruptive systems because they give us the capability to shift to a real-time information environment,” Gingrich said. “As information becomes worldwide, you will have threats from overseas, and we have to pay the kind of systematic attention to security that you would if you were opening a bank in a huge intersection.”

      Caron Carlson
      Caron Carlson

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      MOST POPULAR ARTICLES

      Artificial Intelligence

      9 Best AI 3D Generators You Need...

      Sam Rinko - June 25, 2024 0
      AI 3D Generators are powerful tools for many different industries. Discover the best AI 3D Generators, and learn which is best for your specific use case.
      Read more
      Cloud

      RingCentral Expands Its Collaboration Platform

      Zeus Kerravala - November 22, 2023 0
      RingCentral adds AI-enabled contact center and hybrid event products to its suite of collaboration services.
      Read more
      Artificial Intelligence

      8 Best AI Data Analytics Software &...

      Aminu Abdullahi - January 18, 2024 0
      Learn the top AI data analytics software to use. Compare AI data analytics solutions & features to make the best choice for your business.
      Read more
      Latest News

      Zeus Kerravala on Networking: Multicloud, 5G, and...

      James Maguire - December 16, 2022 0
      I spoke with Zeus Kerravala, industry analyst at ZK Research, about the rapid changes in enterprise networking, as tech advances and digital transformation prompt...
      Read more
      Video

      Datadog President Amit Agarwal on Trends in...

      James Maguire - November 11, 2022 0
      I spoke with Amit Agarwal, President of Datadog, about infrastructure observability, from current trends to key challenges to the future of this rapidly growing...
      Read more
      Logo

      eWeek has the latest technology news and analysis, buying guides, and product reviews for IT professionals and technology buyers. The site’s focus is on innovative solutions and covering in-depth technical content. eWeek stays on the cutting edge of technology news and IT trends through interviews and expert analysis. Gain insight from top innovators and thought leaders in the fields of IT, business, enterprise software, startups, and more.

      Facebook
      Linkedin
      RSS
      Twitter
      Youtube

      Advertisers

      Advertise with TechnologyAdvice on eWeek and our other IT-focused platforms.

      Advertise with Us

      Menu

      • About eWeek
      • Subscribe to our Newsletter
      • Latest News

      Our Brands

      • Privacy Policy
      • Terms
      • About
      • Contact
      • Advertise
      • Sitemap
      • California – Do Not Sell My Information

      Property of TechnologyAdvice.
      © 2024 TechnologyAdvice. All Rights Reserved

      Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.

      ×