Latest cyber-attack report underscores size of the threat – and need for defense

In the bad old days of the Cold War, people worried about missile silos in the Soviet Union.

In the emerging world of cyber-warfare, the most pervasive threats may come from nests of sophisticated computer hackers in Shanghai, Tehran, or Pyongyang.

The Feb. 18 release of a private report that tracked 141 corporate data thefts to China, perhaps even to units of the People’s Liberation Army itself, has heightened government and private concerns about cyber-attacks. Increasingly at risk are some of America’s lifelines – including its energy pipelines, its water supply, its health care networks, and its financial institutions.

Hackers have hit thousands of U.S. companies in the last few years, including Twitter, Facebook, Coca-Cola, and Apple, but few publicly admit it for fear of looking weak to competitors, customers, and shareholders. Stolen data may include proprietary processes, blueprints, contact lists, and in the case of government data, national security information.

During his State of the Union address, President Obama noted the growing threat of cyber-attacks, saying “we cannot look back years from now and wonder why we did nothing in the face of real threats to our security and our economy.”

Obama also signed an executive order in February encouraging information-sharing about online threats between the government and private companies.

Strategies for guarding against cyber threats will be explored Feb. 26 during a Wisconsin Innovation Network luncheon meeting in Madison, where two experts on the front lines of defense will discuss how state expertise is being tapped.

Miron Livny, director of core computational technology at the Morgridge Institute for Research on the UW-Madison campus, will be joined by Josh Bressers, the founder and head of the Red Hat Product Security team, for a discussion about emerging threats and solutions.

Known for his work on the HTCondor system, Livny is part of a UW-Madison, Indiana University, and University of Illinois team that won a $23.6 million cybersecurity grant from the Department of Homeland Security. They are developing a “Software Assurance Marketplace” to work closely with developers of software analysis technologies and “open-source” programmers to advance security of software.

Open-source software is computer software developed by multiple programmers in collaborative environments. It is designed to be widely available, but highly adaptable.

With offices in Wisconsin, Red Hat is responsible for working with product groups to incorporate software assurance practices into their development. Bressers was previously a senior software engineer in the Red Hat Security Response Team and has more than 10 years of experience working on security issues with the open source community.

Other private, nonprofit groups such as the Milwaukee Institute and Wisconsin Security Research Consortium are also examining cyber threats and establishing research avenues.

 

The importance of cybersecurity to businesses of all sizes is hard to overestimate. Whether the hackers are clever kids around the corner or people involved in highly organized efforts such as those based in China, the end result is the same: Hackers act as vampires, sucking away at the lifeblood of American innovation and security.

How the nation comes to grips with cybersecurity is something of a mid-life crisis. The Internet is the defining technology of our era, but it’s nearly 40 years old and getting a bit long in the tooth, especially when it comes to protecting digital data.

“The major glaring weakness [of the Internet] is the lack of security, because the protocols and the technology were not designed to support security,” warned Wisconsin computer science pioneer Larry Landweber, a member of the Internet Society’s Hall of Fame.

Wisconsin is a state with large health care and financial service sectors, both of which come with growing cybersecurity needs. It’s also a state with the kind of academic and private resources that can help build a 21st century line of defense.

Sign up for the free IB Update – your weekly resource for local business news, analysis, voices, and the names you need to know. Click hereIf you are not already a subscriber to In Business magazine, be sure to sign up for our monthly print edition here.