WASHINGTON – A congressionally appointed panel of experts Monday delivered a report to the president calling the government’s incessant focus on public/private partnerships to improve cybersecurity an inadequate solution for the job at hand.In its fourth annual report, the Advisory Panel to Assess Domestic Response Capabilities for Terrorism Involving Weapons of Mass Destruction, chaired by former Virginia Gov. James Gilmore, called the recently released Draft National Strategy to Secure Cyberspace “a small step” in the right direction.“The draft strategy poses what we view as voluntary, tactical responses to an inherently strategic problem of national importance,” the report states. The report also faults the Bush plan because it “relies on private sector willingness to take certain security measures and bear their costs, and chooses not to use government’s power to legislate, regulate or otherwise require certain actions.”That simply hasn’t worked, said Gilmore. “So far pure public/private partnerships and market forces are not acting… to protect the cyber community,” he said. “There is a belief [on the commission] that there needs to be an entirely different commission focusing on the issue of critical infrastructure.”He also cited the need for a greater focus on burden-sharing between the government and the private sector, as well as on liability issues. In the report, the commission specifically faults the government for relying too heavily on persuasion to get the private sector to act.“The government… has failed to exercise any of its powers other than persuasion,” the report concluded. “As a result, there has been no change in the significant market disincentives to the adoption of cybersecurity measures necessary for ensuring the viability of critical functions performed by the information infrastructure that directly contribute to national needs,” such as national security and public health.One of the major stumbling blocks to significant improvements in cybersecurity so far has been the tendency to view cybersecurity separate from the physical aspects of critical infrastructure protection, said Gilmore. “We believe that critical infrastructure has to be looked at as one entire whole and not simply as two pieces,” he said.That sentiment was echoed by John Marsh, former secretary of the Army and the commission member in charge of cybersecurity issues.“You see an expansion in this report from simply the use of [the word] cyber… to including cyber as a part of the totality of critical infrastructure,” said Marsh. “And it seeks to address the key role that cyber plays in critical infrastructure protection.”In other words, Marsh said, cyberprotection can’t be separated from the physical protection of the nation’s critical infrastructure. The commission also criticized the U.S. government for failing to make leaders responsible for cybersecurity lapses.“The federal government does not hold its leaders and managers responsible for cybersecurity,” the report said. “There are essentially little or no consequences for federal government agencies and officials who do not take prudent steps to improve cybersecurity.” Related content how-to Doing tricks on the Linux command line Linux tricks can make even the more complicated Linux commands easier, more fun and more rewarding. By Sandra Henry-Stocker Dec 08, 2023 5 mins Linux news TSMC bets on AI chips for revival of growth in semiconductor demand Executives at the chip manufacturer are still optimistic about the revenue potential of AI, as Nvidia and its partners say new GPUs have a lead time of up to 52 weeks. By Sam Reynolds Dec 08, 2023 3 mins CPUs and Processors Technology Industry news End of road for VMware’s end-user computing and security units: Broadcom Broadcom is refocusing VMWare on creating private and hybrid cloud environments for large enterprises and divesting its non-core assets. By Sam Reynolds Dec 08, 2023 3 mins Mergers and Acquisitions news analysis IBM cloud service aims to deliver secure, multicloud connectivity IBM Hybrid Cloud Mesh is a multicloud networking service that includes IT discovery, security, monitoring and traffic-engineering capabilities. By Michael Cooney Dec 07, 2023 3 mins Network Security Cloud Computing Networking Podcasts Videos Resources Events NEWSLETTERS Newsletter Promo Module Test Description for newsletter promo module. Please enter a valid email address Subscribe