Threat Intelligence

10/31/2017
02:26 PM
50%
50%

Trump Administration to Craft New Cybersecurity Plan

Strategy will mirror President Trump's cybersecurity Executive Order.

White House Homeland Security Adviser Tom Bossert said today that the Trump administration will establish a new cybersecurity strategy that draws from the president's Executive Order signed in May.

"As soon as we're prepared to put forward a strategy that will be beneficial to the government and the nation, we'll do so," Bossert said, according to a DefenseOne report.

Bossert said the strategy will encompass the themes of the EO, including beefing up security in federal agency networks and critical infrastructure, and adoption of security best practices. 

The EO specifically called for the adoption of the National Institute of Standards and Technology's cybersecurity risk framework of best security practices.

Read about Bossert's comments here.

Join Dark Reading LIVE for two days of practical cyber defense discussions. Learn from the industry’s most knowledgeable IT security experts. Check out the INsecurity agenda here.

Dark Reading's Quick Hits delivers a brief synopsis and summary of the significance of breaking news events. For more information from the original source of the news item, please follow the link provided in this article. View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
RussD653
100%
0%
RussD653,
User Rank: Strategist
11/2/2017 | 10:07:59 AM
Plans are ok but bot the total solution
Having a plan is fine and dandy, but unless you fund it, add resources and provide enforcement and corrective actions then the plan is just a piece of paper. Politicians are good at writing plans and bills, but doing it right and making ti work are not their strong suit. And that goes for both sides of the aistle.
'Hidden Tunnels' Help Hackers Launch Financial Services Attacks
Kelly Sheridan, Staff Editor, Dark Reading,  6/20/2018
Inside a SamSam Ransomware Attack
Ajit Sancheti, CEO and Co-Founder, Preempt,  6/20/2018
Tesla Employee Steals, Sabotages Company Data
Jai Vijayan, Freelance writer,  6/19/2018
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2018-12697
PUBLISHED: 2018-06-23
A NULL pointer dereference (aka SEGV on unknown address 0x000000000000) was discovered in work_stuff_copy_to_from in cplus-dem.c in GNU libiberty, as distributed in GNU Binutils 2.30. This can occur during execution of objdump.
CVE-2018-12698
PUBLISHED: 2018-06-23
demangle_template in cplus-dem.c in GNU libiberty, as distributed in GNU Binutils 2.30, allows attackers to trigger excessive memory consumption (aka OOM) during the "Create an array for saving the template argument values" XNEWVEC call. This can occur during execution of objdump.
CVE-2018-12699
PUBLISHED: 2018-06-23
finish_stab in stabs.c in GNU Binutils 2.30 allows attackers to cause a denial of service (heap-based buffer overflow) or possibly have unspecified other impact, as demonstrated by an out-of-bounds write of 8 bytes. This can occur during execution of objdump.
CVE-2018-12700
PUBLISHED: 2018-06-23
A Stack Exhaustion issue was discovered in debug_write_type in debug.c in GNU Binutils 2.30 because of DEBUG_KIND_INDIRECT infinite recursion.
CVE-2018-11560
PUBLISHED: 2018-06-23
The webService binary on Insteon HD IP Camera White 2864-222 devices has a stack-based Buffer Overflow leading to Control-Flow Hijacking via a crafted usr key, as demonstrated by a long remoteIp parameter to cgi-bin/CGIProxy.fcgi on port 34100.