Site icon Tech Newsday

White House unveils new National Cybersecurity Strategy for the U.S.

To address the growing threat of cyberattacks, the White House has released a new National Cybersecurity Strategy. The strategy outlines how the government of the United States will work to protect its networks, data, and critical infrastructure from cyberattacks.

Priorities include rebalancing responsibility for cyberspace defense by shifting the burden of cybersecurity away from individuals, small businesses, and local governments and onto organizations that are most capable and best-positioned to reduce risks for all of us. realigning incentives to favor long-term investments by striking a careful balance between defending against immediate threats and strategically planning for and investing in a resilient future.

It proposes to defend critical infrastructure by expanding the use of minimum cybersecurity requirements in critical sectors to ensure national security and public safety, as well as harmonizing regulations to reduce compliance burdens; enabling public-private collaboration at the speed and scale required to defend critical infrastructure and essential services; and defending and modernizing Federal networks, as well as updating Federal incident response policy.

It will also Disrupt and Dismantle Threat Actors by strategically employing all tools of national power to disrupt adversaries; engaging the private sector in disruption activities through scalable mechanisms; and addressing the ransomware threat through a comprehensive Federal approach and in tandem with our international partners.

In addition, there is a plan to form market forces to drive protection and resilience by trying to promote privacy and data security; shifting liability for software products and services to promote secure development practices; and ensuring that federal grant programs encourage investments in secure and resilient new infrastructure. It will invest in a resilient future and form international alliances to achieve shared objectives.

The sources for this piece include an article in BleepingComputer.

Exit mobile version