News

Subcommittee hearing examines vulnerabilities within wireless technology, wireless networks

The House Energy and Commerce Committee’s Subcommittee on Communications and Technology recently held a hearing to assess cybersecurity risks within wireless technologies and the networks to which they connect.

U.S. Rep. Marsha Blackburn (R-TN), who chairs the subcommittee, said the increasing reliance on wireless devices and networks has provided hackers more avenues to be compromised and harm consumers.

“The sophistication and frequency of cyberattacks against mobile devices continues to escalate and we must meet this challenge head on,” Blackburn said.

According to testimony from Bill Wright, who serves as director of Government Affairs at Symantec, hackers are trending away from utilizing sophisticated attacks and are instead focusing on simple, straightforward attacks.

“Yet despite this trend away from sophisticated attacks, the results were extraordinary, including: over 1.1 billion identities exposed; power outages in the Ukraine; over $800 million stolen through business email compromise (BEC) scams over just a sixth month period; $81 million stolen in one bank heist alone; … these shifting tactics demonstrate the resourcefulness of cyber criminals and attackers,” Wright said.

In a round of questioning, U.S. Rep. Bill Johnson (R-OH) inquired about the shortage of skilled labor in the cybersecurity workforce and what could be done to maintain it.

Amit Yoran, chairman and CEO of Tenable Network Security, responded by stating there were two critical aspects to attracting and retaining cybersecurity talent. One was providing intellectually-stimulating work, while the other was creating a culture that was dynamic and enjoyable to be a part of.

“Hard-working taxpayers are demanding leadership from Washington in the cyber arena and it is our duty to provide it,” Blackburn said. “Whether it is encryption, the use of authentication standards, updating operating systems, or rigorous implementation of anti-virus software – we must have an all of the above approach when it comes to forging defensive strategies that will defeat and deter cyber criminals.”

HPN News Desk

Recent Posts

New legislation seeks to streamline cases for Camp Lejeune water victims

As the legal actions over decades of contaminated water at North Carolina’s Camp Lejeune continue,…

16 hours ago

FEMA, NOAA, and NWS issue annual hurricane outlook ahead of 2024 Atlantic hurricane season

In preparation for the 2024 hurricane season’s kickoff next month, FEMA Deputy Administrator Erik A.…

16 hours ago

Reps. Stefanik, Moolenaar urge DOJ to investigate drone group

On Wednesday, U.S. Reps. Elise Stefanik (R-NY) and John Moolenaar (R-MI) urged the U.S. Department…

5 days ago

New bill would require U.S. Intelligence agencies to develop cyber safeguards for ports

With the introduction of the Secure Smartports Act, U.S. Sens. Bob Casey (D-PA) and Mark…

5 days ago

U.S. Cyber Command, DARPA advance partnership under Constellation technology pathway

Although they have been working together on the Constellation pilot program since 2022, the U.S.…

6 days ago

Bicameral bill proposes reforms for VA healthcare, benefits, and services

A triumvirate of Senate and House leaders introduced the Senator Elizabeth Dole 21st Century Veterans…

6 days ago

This website uses cookies.