U.S. Renews Call to Private Industry to Help Cybersecurity
The U.S. government increasingly sees a pressing need to address security threats against IT networks effectively.
In a speech to the audience of the Symantec Government Symposium, General Keith Alexander, Commander, U.S. Cyber Command and Director, National Security Agency/Chief, Central Security Service, said that only a close collaboration between the private industry and the government can meet this goal.
"We can defend this space. But we're stuck at the starting line figuring out how we're going to do this," he said. "That's going to be the push you see from the administration and Congress, and should be the push from business and the American people. We all have these devices. We all benefit by having secure devices that our children and grandchildren can get on and call from securely."
One of the major challenges is, according to Alexander, to understand the nature of attacks, which are growing more and more sophisticated. "The biggest problem is education," Alexander said. "Most people do not technically understand the network." The fact that mobile devices are now always connected to data and are being integrated into critical environments with access to important information would require "a defensible architecture," he said.
The good news is that, even if that architecture is not available, the private industry and government both are willing to collaborate. AMD, Honeywell, Intel, Lockheed Martin, and RSA/EMC recently announced the formation of the Cyber Security Research Alliance (CSRA) with the intent to work with the government on cyber security technologies.

I really don't want the government stepping in on how they think they can protect private citizens from the denizens from the net. We might get our own Great Firewall of the United States.
Since when do they(Gov) have money? http://www.usdebtclock.org/index.html
Security Auditor: http://serverfault.com/questions/293217/our-security-auditor-is-an-idiot-how-do-i-give-him-the-information-he-wants
Server OS update frequency: Once every few months
Group Policy: Fits all situations, according to management
Response Plan to an Attack: Last updated in 1990s for a previous 1980's server system
Special Permission Usage: Granted to all tasks because compatibility troubleshooting is too much work
Firewall: Allow all incoming/outgoing traffic
Education of security: Once every year, if we remember to do it
Password format: Plaintext
Most common passwords: 1234
Admin password: Password
SQL injection resistance: What SQL injection attack?
Funding for a server upgrade: Diverted to CEO's bonus paycheck
Vulnerability to URL exploit: Never checked, like this is ever going to happen: http://www.theregister.co.uk/2011/06/14/citigroup_website_hack_simple/
World war 2 - Chemical warfare
World war 3 - Cyber warfare
did you figure this out all on your own?
World war 1 - Aviation warfare
World war 2 - Chemical warfare
World war 3 - Cyber warfare
Check your facts. Both aviation and chemical warfare were used in World War I. Chemical warfare was even pioneered back then. Aviation warfare was introduced a few years earlier in the first Balkan war.
World War II is far better known for the use of tanks. And of course the big introduction of atomic weapons at the very end.
One of the dumbest comments I've ever read on here.
Ok this comment is second for dumbest comment I've read here.
WW2 and chemical warfare?
Chemical weapons were never used on a large scale in WW2. The Nazis had plans but realize if they use it the Allies would just use it back, not a good idea when you are already getting your cities bombed day and night.
The bad guys have a lot of money too. Nation state threat actors are nationally funded and have the resources to buy all the tools we would use and test their malware against it to make sure it works. They also get considerably computational power for things like brute forcing passwords (or reversing the password hash to clear text) provided to them