Search
00
GBAF Logo
trophy
Top StoriesInterviewsBusinessFinanceBankingTechnologyInvestingTradingVideosAwardsMagazinesHeadlinesTrends

Subscribe to our newsletter

Get the latest news and updates from our team.

Global Banking & Finance Review®

Global Banking & Finance Review® - Subscribe to our newsletter

Company

    GBAF Logo
    • About Us
    • Advertising and Sponsorship
    • Profile & Readership
    • Contact Us
    • Latest News
    • Privacy & Cookies Policies
    • Terms of Use
    • Advertising Terms
    • Issue 81
    • Issue 80
    • Issue 79
    • Issue 78
    • Issue 77
    • Issue 76
    • Issue 75
    • Issue 74
    • Issue 73
    • Issue 72
    • Issue 71
    • Issue 70
    • View All
    • About the Awards
    • Awards Timetable
    • Awards Winners
    • Submit Nominations
    • Testimonials
    • Media Room
    • FAQ
    • Asset Management Awards
    • Brand of the Year Awards
    • Business Awards
    • Cash Management Banking Awards
    • Banking Technology Awards
    • CEO Awards
    • Customer Service Awards
    • CSR Awards
    • Deal of the Year Awards
    • Corporate Governance Awards
    • Corporate Banking Awards
    • Digital Transformation Awards
    • Fintech Awards
    • Education & Training Awards
    • ESG & Sustainability Awards
    • ESG Awards
    • Forex Banking Awards
    • Innovation Awards
    • Insurance & Takaful Awards
    • Investment Banking Awards
    • Investor Relations Awards
    • Leadership Awards
    • Islamic Banking Awards
    • Real Estate Awards
    • Project Finance Awards
    • Process & Product Awards
    • Telecommunication Awards
    • HR & Recruitment Awards
    • Trade Finance Awards
    • The Next 100 Global Awards
    • Wealth Management Awards
    • Travel Awards
    • Years of Excellence Awards
    • Publishing Principles
    • Ownership & Funding
    • Corrections Policy
    • Editorial Code of Ethics
    • Diversity & Inclusion Policy
    • Fact Checking Policy
    Original content: Global Banking and Finance Review - https://www.globalbankingandfinance.com

    A global financial intelligence and recognition platform delivering authoritative insights, data-driven analysis, and institutional benchmarking across Banking, Capital Markets, Investment, Technology, and Financial Infrastructure.

    Copyright © 2010-2026 - All Rights Reserved. | Sitemap | Tags

    Editorial & Advertiser disclosure

    Global Banking & Finance Review® is an online platform offering news, analysis, and opinion on the latest trends, developments, and innovations in the banking and finance industry worldwide. The platform covers a diverse range of topics, including banking, insurance, investment, wealth management, fintech, and regulatory issues. The website publishes news, press releases, opinion and advertorials on various financial organizations, products and services which are commissioned from various Companies, Organizations, PR agencies, Bloggers etc. These commissioned articles are commercial in nature. This is not to be considered as financial advice and should be considered only for information purposes. It does not reflect the views or opinion of our website and is not to be considered an endorsement or a recommendation. We cannot guarantee the accuracy or applicability of any information provided with respect to your individual or personal circumstances. Please seek Professional advice from a qualified professional before making any financial decisions. We link to various third-party websites, affiliate sales networks, and to our advertising partners websites. When you view or click on certain links available on our articles, our partners may compensate us for displaying the content to you or make a purchase or fill a form. This will not incur any additional charges to you. To make things simpler for you to identity or distinguish advertised or sponsored articles or links, you may consider all articles or links hosted on our site as a commercial article placement. We will not be responsible for any loss you may suffer as a result of any omission or inaccuracy on the website.

    1. Home
    2. >Business
    3. >THE WHITE HOUSE RACES TO CLAMP DOWN SECURITY
    Business

    The White House Races to Clamp Down Security

    Published by Gbaf News

    Posted on July 14, 2015

    5 min read

    Last updated: January 22, 2026

    Add as preferred source on Google
    4 july 1100030757012814 int
    Why waste money on news and opinion when you can access them for free?

    Take advantage of our newsletter subscription and stay informed on the go!

    Subscribe

    By Kevin Bocek, VP of Security Strategy and Threat Intelligence, Venafi

    The White House has been forced to rapidly issue new cyber security rulings for government agencies after it emerged that a second security breach against the U.S government’s Office of Personnel Management (OPM) has exposed the files of millions of federal workers, as well as information on their friends, families and colleagues.

    The breach could leave federal workers and their contacts open to blackmail or spear phishing attacks by cyber criminals, or users may be duped into downloading dangerous malware.

    The OPM breach was the second attack in as many weeks – and comes on the back of other high profile security attacks such as the Community Health Systems breach in the US, which affected 4.5 million patients and the attack on Sony Pictures. It therefore comes as no surprise to seethe White House announce major developments to ramp up encryption and intensify website security across the board.

    In the wake of this second attack, The White House has directed all federal agencies to take a series of rapid measures to lock down government systems. U.S. Chief Information Officer Tony Scott has launched what is being referred to as a 30-day cyber security sprint. During this time, agencies are being asked to patch all known vulnerabilities and shore up systems using information provided by Homeland Security, the Government department designated to protect the nation.  Agencies will all be asked to report on their progress during this period.

    The U.S. Office of Management and Budget (OMB) has also announced that all federal agencies will be required to use HTTPS to improve website security. On its coat tails, the House Energy Commerce Committee sent letters to the CEOs of Apple, Google, Microsoft and Mozilla expressing concern that Certificate Authorities (CAs) owned by national governments have the power to issue certificates which could be used for fraudulent purposes.  Although these two initiatives are unrelated – they are linked.

    The Committee is seeking industry direction on whether limiting CAs can actually improve the way the certificate system is run, if it is technically possible, what adverse effects such restrictions would have, and how security can be improved overall?

    Federal agencies will be required to inspect all inbound TLS/SSL traffic for potential risks as they move to 100 percent encryption.All traffic will need to be carefully examined as cyber criminals are happy to play the waiting game and hide out for as long as it takes to launch a successful attack.

    THE WHITE HOUSE RACES TO CLAMP DOWN SECURITY

    Agencies will also need to search out the malicious use of forged, compromised, or fraudulent certificates across the Internet to brick wall so called spoofing and man-in-the-middle (MITM) attacks. With a compromised, stolen, or forged key and certificate, attackers can impersonate, surveil, and monitor their targets’ websites, infrastructure, clouds, mobile devices, and system administrators, and decrypt communications thought to be private.

    While the motives behind increasing encryption are largely positive – the OMB’s announcement to use HTTPS has some gaping holes. If HTTPS isn’t properly implemented with an immune system to protect the cryptographic keys and digital certificates, the increased use of HTTPS may actually increases the security risks. More encrypted traffic will require bad guys to use HTTPS and either forge or compromise certificates to mount effective attacks. Unfortunately, we live in a world without trust today because there is no immune system to detect keys and certificates that do not belong and are being misused as the bad guys accelerate their attacks.

    In its directive, the OMB has yet to specify or mandate any type of key or certificate management system to ensure it is efficiently managed and safeguarded. There has also been no reference to the U.S government’s National Institute of Standards and Technology(NIST) guidance issued two years ago for preparing for a CA breach. NIST guidelines are aligned with internationally accepted best practices and standards on computer security. This is what makes the Committee’s letters to the industry seeking advice on limiting CA’s all the more intriguing.

    Governments should be anxious about who we trust in our browsers and if we can have confidence in the security of websites. This is why we welcomed Google’s decision to block CNNIC, the Chinese CA, earlier this year, following the discovery that the state-run organisation had issued unauthorised certificates for Google domains that left it exposed to man-in-the-middle attacks capable of intercepting private communications.

    Shockingly, any CA in the world, through fraud or compromise, could issue malicious certificates for .gov domains, as well as more obvious .com sites and others. It is imperative that CAs cannot abuse certificates or issue malicious ones that could be used as ammunition against the US or its allies. Google Certificate Transparency (CT) is undoubtedly a help – butit only covers the high-level extended validation (EV) certificates, and does not address compromise or misuse after issuance. This is why we are seeing a rise in so called Certificate Reputation, which allows website operators to monitor their web domains to help ensure there are no fraudulent issued SSL certificates.

    The move that the US Government have taken is undoubtedly a step in the right direction – but unfortunately more encrypted traffic makes them an even more inviting target for cyber criminals. Unless we have an Immune System for the Internet – a system that that can identify certificates, safely deliver them for use with SSL/TLS inspection, and detect and stop the misuse of certificates for governments and enterprises – we will continue to see a frightening number of attacks take place.

    More from Business

    Explore more articles in the Business category

    Image for Submit Your Entry for Years of Excellence Awards 2026
    Submit Your Entry for Years of Excellence Awards 2026
    Image for Nominations Open for Travel & Hospitality Awards 2026
    Nominations Open for Travel & Hospitality Awards 2026
    Image for Submit Your Entry Today for Telecom Awards 2026
    Submit Your Entry Today for Telecom Awards 2026
    Image for Submit Your Entries for The Next 100 Global Awards 2026
    Submit Your Entries for the Next 100 Global Awards 2026
    Image for Submit Your Entry: Public Sector & Governance Excellence Awards 2026
    Submit Your Entry: Public Sector & Governance Excellence Awards 2026
    Image for Nominations Invited for Real Estate Development Awards 2026
    Nominations Invited for Real Estate Development Awards 2026
    Image for Submit Your Entry: Process & Product Awards 2026
    Submit Your Entry: Process & Product Awards 2026
    Image for Call for Entries: HR & Recruitment Awards 2026
    Call for Entries: HR & Recruitment Awards 2026
    Image for Submit Your Nominations Today for Education & Training Awards 2026
    Submit Your Nominations Today for Education & Training Awards 2026
    Image for Join the Corporate Governance Awards 2026: Showcase Your Organisation’s Leadership
    Join the Corporate Governance Awards 2026: Showcase Your Organisation’s Leadership
    Image for Submit Your Entry Today for Business Awards 2026
    Submit Your Entry Today for Business Awards 2026
    Image for Decentralized Masters’ ‘family culture’ building trust instead of hierarchy
    Decentralized Masters’ ‘family Culture’ Building Trust Instead of Hierarchy
    View All Business Posts
    Previous Business PostNo Surprises: Making Life More Predictable for the CFO
    Next Business PostThe First Step on the Path to Hadoop Nirvana?