WELCOME

to the house of Harry Plopper

A key component of any attack involves compromise of a

A key component of any attack involves compromise of a computer's system by a malicious attacker or malicious script. This is something we cannot do alone, and we recommend that the Department of Homeland Security continue to develop tools to detect and mitigate this threat.

“CISA was not the first administration to warn of the potential impacts of such attacks. In 2009, in the wake of a government computer compromise, the Obama administration announced the first federal computer security and privacy guidelines to address the threat.

DNC cybersecurity official and former NSA agent David H. Schoen told NBC's Meet The Press in May that the president's executive order issued on Tuesday was intended to take a "step backward" in cybersecurity and "make the Internet a more secure and vibrant place."

Hanna F. McCarthy, a spokeswoman for the Cybersecurity and Infrastructure Security and Government Affairs Committee at the House Homeland Security Committee, said the Homeland Security Department had already notified the agency of the incident:

The DHS response was a step forward. The Internet is one of the most secure and accessible information networks in the world. And because the Internet is a critical component of modern communication, it is important to protect the data that we provide our country with.

F. McCarthy added that the "tremendous amount of work being done by our National Security and Intelligence Council partners across the executive branch" includes creating software to protect data.

Comment an article