IT Pro is supported by its audience. When you purchase through links on our site, we may earn an affiliate commission. Learn more

The IT Pro Podcast: Should the US cyber army be more aggressive?

Is a more proactive strategy the answer to increasing attacks from Russia and China?

The IT Pro Podcast: Should the US cyber army be more aggressive?

It’s fair to say that the US has a lot on its plate when it comes to cyber security. Criminal organisations and foreign operatives continue to find new ways to attack public businesses and private citizens, and as digital technology becomes more and more essential for everyday life, cyber attacks on critical infrastructure are becoming an increasingly troubling prospect.

As digital aggression from countries like Russia and China becomes more of a concern, the question emerges as to whether the US military’s cyber division needs to respond in kind. This week, we’re joined by IT Pro’s US managing editor Justin Cupler and staff writer Zach Marzouk to discuss the prospect of a more aggressive US cyber strategy, and what impact it could have on the country’s safety.

Highlights

“The military is very heavily regulated. It'd be very difficult to have a cyber force in the military, because of all those regulations. If we were to take that idea, and push it over to one of our more covert agencies like the CIA or FBI, suddenly, those rules of engagement go away to a point. Because they are covert, they can do essentially whatever they want, because nobody knows what exactly they're doing.”

“Yeah, I agree with Justin, I think the US needs to unify its talent, communication and collaboration across cybersecurity into one central location. The real danger here is that right now, its opponents across the globe are looking on and licking their lips, seeing how easy it is to make an impact on the country by sending a link to a government worker and an email address or something. So it's definitely something that needs to scale up fairly rapidly and be put into action to protect the nation.”

Read the full transcript here.

Footnotes

Subscribe

Featured Resources

Accelerating AI modernisation with data infrastructure

Generate business value from your AI initiatives

Free Download

Recommendations for managing AI risks

Integrate your external AI tool findings into your broader security programs

Free Download

Modernise your legacy databases in the cloud

An introduction to cloud databases

Free Download

Powering through to innovation

IT agility drive digital transformation

Free Download

Recommended

Carnival hit with $5 million fine over cyber security violations
cyber security

Carnival hit with $5 million fine over cyber security violations

27 Jun 2022
How laptops have changed in the last five years
Sponsored

How laptops have changed in the last five years

16 Jun 2022
What is cyber warfare?
Security

What is cyber warfare?

20 May 2022
The IT Pro Podcast: How Singapore became a data centre powerhouse
data centres

The IT Pro Podcast: How Singapore became a data centre powerhouse

20 May 2022

Most Popular

Salaries for the least popular programming languages surge as much as 44%
Development

Salaries for the least popular programming languages surge as much as 44%

23 Jun 2022
Attracting and retaining talent through training
Sponsored

Attracting and retaining talent through training

13 Jun 2022
The top programming languages you need to learn for 2022
Careers & training

The top programming languages you need to learn for 2022

23 Jun 2022