greater prices and penalties” for cyberattacks directed at U.S. targets.
The U.S. has already taken retaliatory motion towards dangerous cyber actors; in one among his ultimate acts as president, Joe Biden issued an govt order on cybersecurity that grants expanded authorities for sanctions towards those that launch cyberattacks towards U.S. crucial infrastructure. Quickly after, the Treasury Division sanctioned an alleged hacker and corporations in China linked to the latest Salt Hurricane hack of U.S. telecommunications companies. Washington has imposed comparable sanctions and monetary restrictions on entities linked to different latest China-linked assaults, and the Division of Protection’s most up-to-date Cyber Technique instructed the division to organize responses to “harmful cyber assaults.” However many specialists consider the U.S. nonetheless lacks a transparent offensive cyber technique.
The U.S. has already taken retaliatory motion towards dangerous cyber actors; in one among his ultimate acts as president, Joe Biden issued an govt order on cybersecurity that grants expanded authorities for sanctions towards those that launch cyberattacks towards U.S. crucial infrastructure. Quickly after, the Treasury Division sanctioned an alleged hacker and corporations in China linked to the latest Salt Hurricane hack of U.S. telecommunications companies. Washington has imposed comparable sanctions and monetary restrictions on entities linked to different latest China-linked assaults, and the Division of Protection’s most up-to-date Cyber Technique instructed the division to organize responses to “harmful cyber assaults.” However many specialists consider the U.S. nonetheless lacks a transparent offensive cyber technique.
The Cipher Transient requested specialists what such a method may appear like. They supplied a variety of concepts – from offensive “playbooks” to cyber counterstrikes to an elevated function for the non-public sector – all within the identify, as one knowledgeable put it, of creating “the leap from passivity to proactivity.”
Entry all of The Cipher Transient’s nationwide security-focused knowledgeable perception by changing into a Cipher Transient Subscriber+ Member.
Signal Up Log In