🔺 What to do when markets are at an all-time high? Find smart bargains, like these.See Undervalued Stocks

U.S. unveils new cybersecurity strategy with tighter regulations

Published 03/02/2023, 05:06 AM
Updated 03/03/2023, 05:11 AM
© Reuters.

By Suzanne Smalley

(Reuters) - The White House on Thursday announced a new cybersecurity strategy in the latest effort by the U.S. government to bolster its cyber defenses amid a steady increase in hacking and digital crimes targeting the country.

The strategy, which is intended to guide future policy, urges tighter regulation of existing cybersecurity practices across industries and improved collaboration between the government and private sector.

It comes after a series of high-profile hacking incidents by domestic and foreign actors against the United States and amid the military conflict between Russia and Ukraine, in which cyber warfare has featured prominently.

The strategy names China and Russia as the most prominent cybersecurity threats to the United States. On a call with reporters, a U.S. official who declined to be named, said part of the new strategy was aimed at reining in Russian hackers.

"Russia is serving as a de facto safe haven for cybercrime, and ransomware is a predominant issue that we're dealing with today," the official said.

Ransomware attacks, in which cyber criminal gangs seize control of a target's systems and demand ransom payments, are among the most common type of cyber attacks and have impacted a wide range of industries in recent years.

"The criminal justice system isn't going to be able to on its own address this problem – we do need to look at other elements of national power," the official added. "So we're hopeful that Russia understands the consequences of malicious activity in cyberspace, and will continue to be restrained."

The strategy calls for building coalitions with foreign partners "to create pressure on Russia and other malicious actors to change their behavior," said a second U.S. official on the call, who also declined to be named.

© Reuters. A hand is seen on a laptop with binary codes displayed in front of the USA flag in this illustration taken, August 19, 2022. REUTERS/Dado Ruvic/Illustration

"I think we've seen some success in sustaining those coalitions over the last year," the official added.

Among a range of things, the strategy calls for improving standards of patching vulnerabilities in computer systems, and implementing an executive order that would require cloud companies to verify the identity of foreign customers.

Latest comments

Risk Disclosure: Trading in financial instruments and/or cryptocurrencies involves high risks including the risk of losing some, or all, of your investment amount, and may not be suitable for all investors. Prices of cryptocurrencies are extremely volatile and may be affected by external factors such as financial, regulatory or political events. Trading on margin increases the financial risks.
Before deciding to trade in financial instrument or cryptocurrencies you should be fully informed of the risks and costs associated with trading the financial markets, carefully consider your investment objectives, level of experience, and risk appetite, and seek professional advice where needed.
Fusion Media would like to remind you that the data contained in this website is not necessarily real-time nor accurate. The data and prices on the website are not necessarily provided by any market or exchange, but may be provided by market makers, and so prices may not be accurate and may differ from the actual price at any given market, meaning prices are indicative and not appropriate for trading purposes. Fusion Media and any provider of the data contained in this website will not accept liability for any loss or damage as a result of your trading, or your reliance on the information contained within this website.
It is prohibited to use, store, reproduce, display, modify, transmit or distribute the data contained in this website without the explicit prior written permission of Fusion Media and/or the data provider. All intellectual property rights are reserved by the providers and/or the exchange providing the data contained in this website.
Fusion Media may be compensated by the advertisers that appear on the website, based on your interaction with the advertisements or advertisers.
© 2007-2024 - Fusion Media Limited. All Rights Reserved.