653445
670675
5
csm_list_article
- ID
15486735
- Field definition ID
1464
- Identifier
source
- Field type identifier
ezobjectrelation
- Description
[empty]
- Contents
Commentary Contributor
- ID
15486737
- Field definition ID
1301
- Identifier
title
- Field type identifier
ezstring
- Description
[empty]
- Contents
4 ways US can boost cyber security
- ID
15486739
- Field definition ID
1302
- Identifier
short_title
- Field type identifier
ezstring
- Description
[empty]
- Contents
4 ways US can boost cyber security
- ID
15486741
- Field definition ID
1303
- Identifier
summary
- Field type identifier
ezxmltext
- Description
[empty]
- Contents
The Obama administration has repeatedly and publicly named China as America’s principal cyber-espionage enemy, highlighting China’s aggressive economic cyberspying against American businesses and critical infrastructure. President Obama himself mentioned cybersecurity concerns during his congratulatory phone call with new Chinese President Xi Jinping.
Deciding to name and shame China openly is a significant step in US cybersecurity policy and has international repercussions: It forces the two countries to address the issue publicly, and shines a spotlight on the cyberactivity of other countries, including the United States. This may increase pressure on governments and companies to act more forcefully against cyber-espionage attacks.
Of course, China is not the only country that has committed, or will commit, cyber-espionage. Indeed, China has accused the US of cyberattacks and recently described itself as a leading victim of hacking attacks. The full scope of international cyberattacks is hard to define because of the challenge of identifying who launched an attack, and the absence of a coordinated, global effort to find out who the hostile cyberactors are.
To navigate this new diplomatic landscape and successfully protect its own cybersecurity interests, the US needs a proactive cyber foreign policy that goes beyond naming and shaming. Here are four steps the US can take to bolster its diplomatic efforts to address cybersecurity threats.
- ID
15486743
- Field definition ID
1304
- Identifier
web_sum
- Field type identifier
ezxmltext
- Description
[empty]
- Contents
The US needs a proactive cyber foreign policy that goes beyond naming and shaming. Here are four steps the US can take to bolster its diplomatic efforts to address cybersecurity threats.
- ID
15486745
- Field definition ID
1305
- Identifier
authors
- Field type identifier
ezbyline
- Description
[empty]
- Contents
By Emilian Papadopoulos Eli Sugarman
- ID
15486747
- Field definition ID
1314
- Identifier
tags
- Field type identifier
ezkeyword
- Description
[empty]
- Contents
[empty]
- ID
15486775
- Field definition ID
1375
- Identifier
internal_tags
- Field type identifier
ezkeyword
- Description
[empty]
- Contents
[empty]
- ID
18989686
- Field definition ID
1687
- Identifier
eztags
- Field type identifier
eztags
- Description
[empty]
- Contents
[empty]
- ID
15486749
- Field definition ID
1307
- Identifier
image
- Field type identifier
ezobjectrelationlist
- Description
[empty]
- Contents
[empty]
- ID
15486755
- Field definition ID
1310
- Identifier
related_external_links
- Field type identifier
ezmatrix
- Description
- was missing
- Contents
Type Path Title Site Name INTERNAL 3f90451d006e7c1319907336fd6893e3 4 ways Chuck Hagel can improve cyber security L634819 INTERNAL a2cf649c2263d9fc791cd2b8ac9b08c1 Wanted: global rules on cyberwarfare L630261 INTERNAL 39ccd73aeabe314450488efb31fa0fd9 China is aiming at America’s soft underbelly: the Internet A251220
- ID
15486757
- Field definition ID
1311
- Identifier
publish_date
- Field type identifier
ezdatetime
- Description
[empty]
- Contents
- ID
16697817
- Field definition ID
1639
- Identifier
updated
- Field type identifier
ezdatetime
- Description
[empty]
- Contents
- ID
15486761
- Field definition ID
1312
- Identifier
can_syndicate
- Field type identifier
ezboolean
- Description
[empty]
- Contents
Yes
- ID
15486751
- Field definition ID
1308
- Identifier
can_syndicate_exclusive
- Field type identifier
ezboolean
- Description
- Check box if CSM has exclusive syndication rights. Do not check for 90-day exclusives rights, guest bloggers, etc. If CSM doesn't own the content, don't check this box.
- Contents
No
- ID
15486763
- Field definition ID
1313
- Identifier
page_keywords
- Field type identifier
ezstring
- Description
[empty]
- Contents
[empty]
- ID
15486765
- Field definition ID
1315
- Identifier
page_url_name
- Field type identifier
ezstring
- Description
[empty]
- Contents
[empty]
- ID
15486767
- Field definition ID
1316
- Identifier
page_title
- Field type identifier
ezstring
- Description
[empty]
- Contents
[empty]
- ID
15486769
- Field definition ID
1318
- Identifier
for_sale
- Field type identifier
ezboolean
- Description
[empty]
- Contents
No
- ID
15486777
- Field definition ID
1376
- Identifier
title_numbering
- Field type identifier
ezselection
- Description
[empty]
- Contents
Count Up
- ID
15486785
- Field definition ID
1306
- Identifier
dateline
- Field type identifier
ezstring
- Description
[empty]
- Contents
[empty]
- ID
15486781
- Field definition ID
1438
- Identifier
inform_tags
- Field type identifier
ezkeyword
- Description
[empty]
- Contents
[empty]
- ID
15486783
- Field definition ID
1443
- Identifier
inform_topics
- Field type identifier
ezkeyword
- Description
[empty]
- Contents
[empty]