PRO+ Premium Content/Information Security
Access your Pro+ Content below.
Battling nation-state cyberattacks in a federal leadership vacuum
This article is part of the Information Security issue of February 2019, Vol. 20, No. 1
In his first state visit to the United States, Chinese President Xi Jinping landed in Seattle on Sept. 22, 2015, to deliver a strong cybersecurity statement to U.S. technology companies. He pledged China would not hack for commercial advantage. "China is a staunch defender of cybersecurity -- it is also a victim of hacking," President Xi said. "The Chinese government will not, in whatever form, engage in commercial thefts or encourage or support such attempts by anyone. Both commercial cybertheft and hacking against government networks are crimes that must be punished in accordance with law and relevant international treaties." Three days later, President Xi and U.S. President Barack Obama agreed both countries would work together to stem "malicious cyber activities" and refrain from "conduct[ing] or knowingly support[ing] cyber-enabled theft of intellectual property." At first, the U.S.-China Cyber Agreement seemed to curtail prolific Chinese cyber operations, according to cybersecurity firms. But following the recent trade ...
Features in this issue
-
Battling nation-state cyberattacks in a federal leadership vacuum
Nation-state cyberattacks could be better fought with a united front. But the U.S. government has failed to find a reliable way to deter or stop attackers.
-
Cutting SecOps breach response time is key to success
A new survey measures the success of security operations breach response by how long it takes to complete a three-step process to detect, understand and contain incidents.
News in this issue
-
What a proactive cybersecurity stance means in 2019
Meeting cyberthreats head-on is no longer a choice but a necessity. Learn what dangers IT security teams may face in 2019 and why a proactive attitude is vital.
Columns in this issue
-
CISO tackles banking cybersecurity and changing roles
Over the course of his career in security, Thomas Hill has held varied positions that inform his views on both technological specifics and strategic roles in modern corporations.