All the latest UK technology news, reviews and analysis


General admits to holes in US security plans

14 Jan 2012
Hacker's hands on keyboard

Anyone who follows the security field knows that protecting government systems can be an uphill battle. With thousands of systems in use, there is no shortage of vectors for attackers to target.

Still, most people expect officials to be confident in their ability to protect critical infrastructure from outside attack. Which makes the recent comments from US general Keith Alexander all the more disturbing,

A recent report from Wired quotes Alexander as saying that the NSA has essentially conceded its networks to outside attackers.

"15,000 enclaves: You can’t see ‘em all. You cannot defend them all," Alexander was quoted as saying.

"You've got to have an infrastructure that is defensible."

Alexander goes on to note that the government is looking to improve security by consolidating its networks and shifting data to centralised locations by way of hosted clouds, but the remarks underscore an ugly truth when it comes to government data security.

In many ways, agencies have already conceded to outside attackers. Recent security exercises all assume that hackers will breach critical systems, and governments have admitted that they cannot secure systems on their own.

Recently, the US has sought to enlist hackers in its efforts to lock down critical infrastructure. DARPA recently hired legendary hacker Peiter "Mudge" Zatko as a programme manager, and the Black Hat co-founder wasted little time in enlisting private security researchers to help with security projects.

  • Comment  
  • Tweet  
  • Google plus  
  • Facebook  
  • LinkedIn  
  • Stumble Upon  
Shaun Nichols
About

Shaun Nichols is the US correspondent for V3.co.uk. He has been with the company since 2006, originally joining as a news intern at the site's San Francisco offices.

More on Security
What do you think?
blog comments powered by Disqus
Poll

BYOD vs CYOD vs BYOC poll

Which approach is your firm taking to managing employees' mobile devices?
24%
14%
4%
17%
29%
12%

Popular Threads

Powered by Disqus
Galaxy S5 vs iPhone 5S vs Nexus 5 showdown

Galaxy S5 vs iPhone 5S vs Nexus 5

We speed test three of the most popular smartphones

Updating your subscription status Loading
Newsletters

Get the latest news (daily or weekly) direct to your inbox with V3 newsletters.

newsletter sign-up button
hpv33

Data protection: the key challenges

Deduplication is a foundational technology for efficient backup and recovery

rdc2

iPad makes its mark in the enterprise

The iPad can become a supercharged unified communications endpoint, allowing users to enhance their productivity

Business Analyst (Agile / Scrum, BDD) - 12 months+ to £415 p/d

Business Analyst (Agile / Scrum, BDD & Software Development...

Systems Test Analyst - Ecommerce

Systems Test Analyst required with experience within...

Software Development Engineer

Develop: Customise: Configure. Maximise your technical...

PHP Developer

PHP Developer PHP / MySQL / LAMP / HTML5 / JavaScript...
To send to more than one email address, simply separate each address with a comma.