Feeds

Obama boosts military, 'black' and spook cyber forces

Tanks? Feds? Pah! I want NERDS

Maximizing your infrastructure through virtualization

US President Barack Obama wants to increase spending on cyber security in his proposed budget for the fiscal year 2014, which starts in October.

Obama said that he wanted to increase the military cyber forces led by the US Cyber Command and bump up funding for cyber security information sharing in the Department of Defense (DoD) allocation.

"We must confront new dangers, like cyber attacks, that threaten our nation’s infrastructure, businesses, and people," said POTUS.

"The budget supports the expansion of government-wide efforts to counter the full scope of cyber threats, and strengthens our ability to collaborate with state and local governments, our partners overseas, and the private sector to improve our overall cybersecurity."

The president pointed out in the budget that recent attacks on banks in the States and on the government showed that no network was immune to attack. To combat these attacks, Obama wants to expand the government's cyber expertise and link up different cybersecurity centres and analytics "in real time".

"This system will also develop and publish machine-readable interoperable technical standards that will allow for automated information sharing. The goal is for relevant pieces of information to make their way to authorised users throughout the government, to help connect the dots in identifying cybersecurity threats," the proposal reads.

Cyber security is one of the few areas where the US government seems eager to spend money rather than make cuts. Obama wants to increase DoD spending on cybersecurity by $800m to $4.7bn, at the same time as aiming for a $3.9bn cut in the Pentagon's overall budget.

The Department of Homeland Security is also getting a slice of the cyber cash, with an extra $44m to spend on helping government departments to share their information. However, its total budget drops by $615m. DHS will also have $810m to spend on cybersecurity research and on helping business and local government to strengthen their defences.

There will be more cyber dosh stashed in the black budgets - classified spending that's not reported - making it difficult to figure out exactly how many extra dollars the government reckons cybersecurity is worth, although it has upped the ante.

"The budget includes increases and improvements to a full range of cyberspace activities," the proposal notes under the "National Intelligence Program" section. ®

Top three mobile application threats

More from The Register

next story
Arrr: Freetard-bothering Digital Economy Act tied up, thrown in the hold
Ministry of Fun confirms: Yes, we're busy doing nothing
'Blow it up': Plods pop round for chat with Commonwealth Games tweeter
You'd better not be talking about the council's housing plans
Help yourself to anyone's photos FOR FREE, suggests UK.gov
Copyright law reforms will keep m'learned friends busy
ONE EMAIL costs mining company $300 MEEELION
Environmental activist walks free after hoax sent share price over a cliff
Apple smacked with privacy sueball over Location Services
Class action launched on behalf of 100 million iPhone owners
US judge: YES, cops or feds so can slurp an ENTIRE Gmail account
Crooks don't have folders labelled 'drug records', opines NY beak
UK government officially adopts Open Document Format
Microsoft insurgency fails, earns snarky remark from UK digital services head
You! Pirate! Stop pirating, or we shall admonish you politely. Repeatedly, if necessary
And we shall go about telling people you smell. No, not really
prev story

Whitepapers

Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Top 8 considerations to enable and simplify mobility
In this whitepaper learn how to successfully add mobile capabilities simply and cost effectively.
Seven Steps to Software Security
Seven practical steps you can begin to take today to secure your applications and prevent the damages a successful cyber-attack can cause.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.