How US Congress can shut the door to cyberthreats

Six years ago, the federal government’s classified computer networks were infiltrated by a tiny bit of malware. A massive operation known as Buckshot Yankee was carried out to clean the networks of the intruder, and the event helped spur the creation of U.S. Cyber Command, which is now growing rapidly. The government has put cyberthreats at the top of its national security threat matrix.But one of the debates that began then remains unresolved: How to protect large and vulnerable private-sector networks? Not all the answers can be found in government, but on actions that do require legislation, this session of Congress and the one before it have come to an impasse. It is time for the lame-duck session, or the new one convening in January, to take the bipartisan path forward that a number of legislators have laid out.

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.