Posted on 06/30/2022 9:36:40 AM PDT by SeekAndFind
Global hacking threats and cyber-warfare are by no means a new phenomenon as the past several years have seen an explosion of attacks against America and other Western nations from countries like Russia and China. In 2021, major supply chain disruptions against American entities Colonial Pipeline and JBS Foods clearly defined the threats facing the U.S. and the rest of the world. Despite these dangers facing Western nations, American cyber-security, along with our neighbor Canada's and most of the Western world, are severely lacking in manpower.
In America, a June report from the Washington Post claimed that the United States is either just as vulnerable to hacking attacks or even more vulnerable now than five years ago. The report cited a shortage of capable cyber-security professionals, which is occurring as the Department of Homeland Security (DHS), which is charged with overseeing the Cybersecurity and Infrastructure Security Agency (CISA), has been futile in its efforts, particularly in regard to the U.S.-Mexico border.
Despite the dysfunction plaguing DHS, CISA, which has gone through a multitude of changes over the past year and a half, may actually have kept the U.S. safer from hacking attacks this year versus 2021.
Among the changes at CISA contributing to what may possibly be better results, as 2022 still hasn't seen a major infrastructure or supply chain hack at the level of the JBS Foods or Colonial Pipeline, was the installation of Jen Easterly as director.
Although the general public is obviously not aware of all attacks, as some may have been kept private by businesses, newly proposed regulations in both Canada and America are aimed toward installing mandatory reporting protocols for private-sector entities that find themselves victimized by hacks.
(Excerpt) Read more at americanthinker.com ...
This is the problem with nuke energy. Nuke engineers plan this energy with the idea that there will be people in the far future to manage waste. That’s stupid.
I have an acquaintance who is a nuke engineer. When I say that I get a blank stare. Mouth breathing.
I have been thinking about all those windmill blades that when worn out will not erode.
There will be piles of them. Maybe if they were placed in a somewhat architectural manner they could provide homeless shelter. Kind of like living under a freeway.
Nukes are fine, so is gas, windmills. I think so late is way underrated and pushed aside
Nukes are fine as long as the waste is under control. Who’s going to guarantee that
Cybersecurity sounds all cool and sexy, but really to be a meaningful defender in the networked world, you have to get good at the most boring and pedantic parts of the computer world first.
Systems administration and cybersecurity isn’t invested in properly by industry, it doesn’t make the company money, it costs the company money, so as a liability on the budget line it often gets stuck under the CFO’s duties where technology investment and workforce training are also treated as liabilities.
It’s often seen as a waste to pay a college graduate when you can get some guy with a junior college degree to wire up the computers and college grads in buzzword-heavy cyber programs get shuffled off to management positions where they never learn how to actually “do” the things they supposedly learned in school. The managers see the writing on the wall and they invest not in training their workforce, but buying buzzword-laden services that frequently do nothing but look great on paper. They don’t build out capacity, plan past the end of the fiscal year, and they don’t create career on ramps for other skilled IT people to get smart on cybersecurity, and because they aren’t accountants themselves, so long as they are stuck under the CFO, they have a cap on their own career advancement.
I think the only way things effectively get fixed is for government to step in, which I know isn’t a popular statement in this forum. The SEC proposed cybersecurity rules this year, but they’re mostly focused on reporting incidents and surface level CYA stuff, not enforcing best practices and strategic investment in cybersecurity for publicly traded companies. IT auditing is big business, but it frequently looks at the wrong stuff.
For some, it might actually be cheaper to go back to paper.
Add that to Pilots, truck drivers, nuclear engineers, plumbers, nurses, machinists
Maybe we should start with an inventory of what we DO have a lot of? Only productive occupations, please.
Part of the problem is that there is a disconnect between what is taught in universities and the skills required right now in the market place.
I would rather hire a certification bunny (CompTIA / Cisco / Azure / etc) than what comes out of college with a BS degree, with a few exceptions.
College is mostly lecture followed by reading and then writing a paper on the concepts. Very little practical lab work or hands on. My Alma Mater, Western Governors University requires passage of the industry cert associated with the course as appropriate. For example, Linux class requires passage of the Comptia Linux+ cert.
Absolute TRUTH!
Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.