DHS official suggests sharing resources to mitigate cyberattacks
- 19 October, 2012 19:37
Groups of companies in the same industry could pool infrastructure resources to help each other mitigate the effects of cyberattacks and work together on security issues, a senior official in the U.S. Department of Homeland Security suggested on Friday.
The comments by Mark Weatherford, deputy undersecretary for cybersecurity, come as a handful of American banks are dealing with a fourth week of DDoS (distributed denial-of-service) attacks on their websites.
DDoS attacks are one of the simplest forms of cyberattack and seek to push websites offline by overloading them with junk traffic so they cannot handle legitimate requests from users.
The attacks have hit banks including Wells Fargo, U.S. Bancorp, PNC Financial Services Group, Citigroup, Bank of America and JPMorgan Chase, and have been claimed by hackers in Iran.
"This has been an eye-opening experience for a lot of very, very large organizations," Weatherford said. "It's got a lot of people's attention. Not just the banks, but the ISPs and some of the other third-party providers as well."
Weatherford was speaking at a cybersecurity awareness conference in Santa Clara, California, that was organized by the Bay Area Council, a public policy advocacy group made up of local companies.
"How about developing a co-op kind of a model for these Web content delivery providers, like an Akamai or Prolexic or some of those folks, where you buy a bunch of servers, more than any one company might need at one time, but you co-op that for like-minded organizations and when someone needs that kind of service you point it at them and they have it available to them," he said.
"I can tell you, because these big banks have just gone through it, they did not have enough capacity, or they barely had enough capacity [because] no one was hurt too bad over the last couple of weeks, but we need to think about different ways of sharing resources among like-minded organizations," said Weatherford.
Weatherford said he made the suggestion at a cybersecurity forum held by the National Cyber Security Alliance in New York on Monday that included representatives of some U.S. banks in the audience.
He preceded his remarks on Friday by noting, "I have no idea if this is legal or conceptually even possible, but it's something to think about."
Martyn Williams covers mobile telecoms, Silicon Valley and general technology breaking news for The IDG News Service. Follow Martyn on Twitter at @martyn_williams. Martyn's e-mail address is email@example.com
Join the CIO Australia group on LinkedIn. The group is open to CIOs, IT Directors, COOs, CTOs and senior IT managers.
Larry Page wants to see your medical records
Dual-Persona Smartphones Not a BYOD Panacea
After two-year hiatus, EFF accepts bitcoin donations again
CIOs struggle to deliver timely mobile business apps: survey
Spiceworks' free management software gets integrated MDM
Saving Time and Money with Savvy Use of Flash in Automated Storage Tiering
In a sluggish economy, getting the best ROI on every IT dollar spent is the top priority for almost every business. Storage budgets in most IT environments continue to remain flat or are capped as a percentage of the overall IT spend, while data storage requirements continue to grow at an unsustainable pace. Download now to learn about the benefits of using flash in automated storage tiering.
Real-Time Protection Against Malware Infection
Malware is at such high levels (more than 60 million unique samples per year) that protecting an endpoint with traditional antivirus software, has become futile. More than 100,000 new types of malware are now released every day, and antivirus vendors are racing to add new protection features to try to keep their protection levels up. Read more.
Maximising productivity without sacrificing security
Advances in mobility and client computing technology combined with the ubiquity of the Internet and social media are creating a culture and desire for constant connectivity and anywhere access to information. As these trends extend from the home into the work place, IT managers should consider seriously the opportunities for increased productivity and communication with customers and constituents, as well as understand the increased security risks posed by online, anytime access to private networks and data. Read more.