CIO Today

CIO Today Network Sites:   Top Tech News  |   CIO Today   |   Mobile Tech Today   |   Data Storage Today
Daily Briefing for Technology's Top Decision-Makers
Neustar, Inc.
Protect your website & network
using real-time information & analysis

www.neustar.biz
Thursday, April 24th 
The future of tape is here.
This ad will display for the next 20 seconds. Please click for more information, or scroll down to pass the ad, or Close Ad.
Trending Topics:   Security Heartbleed Big Data Cloud Computing Windows XP Data Centers OS X Mavericks
Home
Enterprise Software
Enterprise Hardware
Big Data
Network Security
Cloud Computing
CRM Systems
Data Storage
Operating Systems
Communications
CIO Issues
Mobile Tech
Chips & Processors
World Wide Web
Business Briefing
After Hours
Press Releases
 
Free Newsletters
Top CIO News
 
Mobile Tech Today
 

Network Security

FBI Wants More Cyber Threat Aid From Private Sector

FBI Wants More Cyber Threat Aid From Private Sector
March 2, 2012 4:43PM

Bookmark and Share
Though many companies may be reluctant to report security breaches, FBI Director Robert Muller encouraged corporations and other organizations to report cyber crimes to the FBI. In turn, the FBI pledges to launch an investigation that will include the requisite steps for minimizing disruption to businesses while safeguarding enterprise privacy.

Your Next Generation Data Center Is Here! Vblock™ Systems: the world's most advanced converged infrastructure are built on the Cisco Unified Computing System with Intel® Xeon® processors. Vblock™ Systems deliver extraordinary time to market, ROI and TCO, and flexibility to meet your continually changing demands with 5X faster deployment, 96% less downtime, and 1/2 the cost. Click here to learn more.

FBI Director Robert Muller said Friday that cyber threats will one day pose a more significant danger to U.S. national security than terrorism, which is currently the FBI's top priority.

"In the not too distant future, we anticipate that the cyber threat will pose the No. 1 threat to our country," Muller told attendees at the RSA Computer Security Conference in San Francisco.

RSA conference attendees are often the first to see new threats coming down the road, and know what data is critically important and what could be at risk, Muller observed.

"Real-time information-sharing is essential [and] much information can -- and should be -- shared with the private sector," Muller said. "In turn, those of you in the private sector must have the means and the motivation to work with us."

Muller noted that the FBI's dual role in law enforcement and national security uniquely positions the bureau to collect the intelligence it needs to take down criminal networks, prosecute those responsible, and protect our national security. The problem is that Internet technology is evolving so rapidly that it is difficult for the FBI to keep up from a security perspective.

"We cannot confront cyber crime on our own," Muller said.

Reporting Security Breaches Is Crucial

The most dangerous cyber threats the FBI faces today are posed by the state-sponsored computer experts of hostile foreign nations seeking to steal corporate trade secrets and classified U.S. government documents ,as well as potentially wreak havoc on the nation's most vital infrastructure.

"State-sponsored hackers are patient and calculating, have the time, the money, and the resources to burrow in and to wait," Muller said. "They may come and go, conducting reconnaissance and exfiltrating bits of seemingly innocuous information -- information that in the aggregate may be of high value."

Though many companies may be reluctant to report security breaches, Muller encouraged corporations and other organizations to report cyber crimes to the FBI. In turn, the FBI pledges to launch an investigation that will include the requisite steps for minimizing disruption to businesses while safeguarding enterprise privacy.

"Where necessary, we will seek protective orders to preserve trade secrets and business confidentiality," Muller said. "And we will share with you what we can -- as quickly as we can -- about the means and the methods of attack."

Catching Threat Actors

Muller is convinced that there are only two types of companies -- those that have been hacked and those that will be. "And even they are converging into one category: companies that have been hacked and will be hacked again," he said. (continued...)

1  |  2  |  Next Page >

 

Tell Us What You Think
Comment:

Name:

Bishop916:

Posted: 2012-03-03 @ 9:13pm PT
Funny that the feds throw rocks into hornets' nests by threatening those on the fringe of the free flow of information with punitive action, but now turn to those very same people to help them get a handle on the situation. It's hilarious really...



 Network Security
1. Lessons from Verizon's Threat Report
2. Verizon Report Exposes Cyberthreats
3. How Are Web Sites Post-Heartbleed?
4. White House Updating Privacy Policy
5. Target Hackers May Be Tough To Find




 Most Popular Articles
1. BlackBerry Drops T-Mobile After Nasty Spat
2. Cisco, IBM Launch Internet of Things Consortium
3. Salesforce CRM Gets Industry Specific for Internet of Customers
4. Intel Bets on Cloudera for Big Data Analytics
5. SAP HANA Data Warehouse App Gets Faster Analytics


Have an informed opinion on this story?
Send a Letter to the Editor.
We want to know what you think.
Send us your Feedback.

 Related Topics  Latest News & Special Reports

  Google Maps, Now with Time Travel
  Lessons from Verizon's Threat Report
  NYPD Twitter Campaign Backfires
  Net Gets Faster, But Easier to Attack
  OnePlus One Boasts Android Weapon

 Technology Marketplace
Business Intelligence
Get real-time, cloud-based information services with Neustar.
 
Cloud Computing
Next Generation Data Center Is Here! Vblock™ Systems from VCE
 
Contact Centers
HP delivers the future of the contact center with HP Qfiniti 10.
 
Data Storage
Next Generation Data Center Is Here! Vblock™ Systems from VCE
Barium Ferrite (BaFe) is the future of tape.
2.5" Enterprise-class SATA & SAS SSDs for server & storage applications
 
Enterprise Hardware
Barium Ferrite (BaFe) is the future of tape.
2.5" Enterprise-class SATA & SAS SSDs for server & storage applications
 
Hardware
Protect your network with APC Smart-UPS battery backup
 
Network Security
Protect your network with APC Smart-UPS battery backup
 

Network Security Spotlight
What Verizon's Data Breach Report Can Teach Enterprises
It’s probably not a jaw-dropper, but cyberespionage is officially on the rise. And the use of stolen or misused credentials is still the leading way the bad guys gain access to corporate information.
 
Top Cyberthreats Exposed by Verizon Report
Beyond Heartbleed, there are cyberthreats vying to take down enterprise networks, corrupt smartphones, and wreak havoc on businesses. Verizon is exposing these threats in a new report.
 
Where Do Web Sites Stand, Post-Heartbleed?
A security firm says the vast majority of Web sites have patched themselves to protect against the Heartbleed bug, but now there are questions raised on the reliability of open-source programs.
 
Navigation
CIO Today
Home/Top News | Enterprise Software | Enterprise Hardware | Big Data | Network Security | Cloud Computing | CRM Systems
Data Storage | Operating Systems | Communications | CIO Issues | Mobile Tech | Chips & Processors | World Wide Web
Business Briefing | After Hours | Press Releases
Also visit these Enterprise Technology Sites
Top Tech News | CIO Today | Mobile Tech Today | Data Storage Today

Services:
FreeNewsFeed | Free Newsletters | XML/RSS Feed

About CIO Today Network | How To Contact Us | Article Reprints | Services for PR Pros (In partnership with NewsFactor) | Top Tech Wire | How To Advertise

Privacy Policy | Terms of Service
© Copyright 2000-2014 CIO Today. All rights reserved. Article rating technology by Blogowogo. Member of Accuserve Ad Network.