Ushering in a Transparent Revolution in Cybersecurity – The Cipher Brief
Thomas Warrick was DHS Deputy Assistant for Counterterrorism Policy from August 2008 to June 2019 and is now Director of the Future of DHS Project at the Atlantic Council.
Javed Ali held senior counterterrorism positions at DHS, the FBI, the Office of the Director of National Intelligence, and the National Security Council. He is a Towsley Policymaker in Residence at the University of Michigan.
OPINION Eyebrows were raised when the Biden administration initially chose veterans of the usually secretive National Security Agency (NSA) for all four top cybersecurity positions in the most diverse administration in U.S. history.
The two leaders who face confirmation hearings on ThursdayChris Inglis as National Cyber Director and Jen Easterly as director of the Department of Homeland Securitys Cybersecurity and Infrastructure Security Agency (CISA)deserve confirmation by the Senate. They, along with NSA senior executive Anne Neuberger, the Deputy National Security Adviser for cybersecurity, and Amit Mital, who in April replaced NSAs Michael Sulmeyer as senior director for cybersecurity, could be the right people to help lead what needs to be a transparent revolution in cybersecurity.
Given NSAs reputation for secrecy, this might seem odd. In fact, what these NSA veterans share, apart from strong individual qualities, is their knowledge that what is needed now in civilian cybersecurity is significantly increased transparency and an emphasis on enhanced information-sharing. As national security practitioners, they knowas do we (between the two of us we have more than fifty years experience) that while secrecy has its place, especially in protecting sources and methods, it also has its limits. And given the need in cybersecurity for information-sharing, speed, and strong collaboration between the public and private sectorsa critical feature that sets cybersecurity apart from other aspects of national securitydefaulting to a secretive and insular approach would be a mistake.
The first reason to expect a revolution in transparency is that strong cybersecurity requires a robust partnership between the government and the many technology stakeholders who own information technology infrastructure, platforms, and services that adversaries target.
Almost all the cyber infrastructure in the United States is outside the hands of the federal government, in the hands of private industry, state and local governments, academia, and other non-federal sectors. Conversely, much of the information about cyber threats or adversaries intentions and capabilities is in the hands of the federal intelligence and law enforcement communities. As both the Cyberspace Solarium Commission and the Future of DHS Project concluded, cyber operators in this non-federal space need high-fidelity, often classified intelligence to first identify threats to their networks and then to justify actions to their C-Suite executives to defend them. Increasing the speed of sharing is now vital. Recent attackslike those against Colonial Pipeline and JBS Foodsshow that government and private operators need to exchange information, including attribution, in real-time and at network speeds. Hostile nation-states and criminals will hold U.S. national security and prosperity at risk unless the federal government and private sector open up to each other.
Second, the federal cybersecurity enterprise needs the trust of the American people.
For the private sector and government to work together at network speeds, it is essential there be trust, communication, and a shared understanding of desired outcomes. This is one reason security veterans know that NSA is not the right agency to lead civilian cybersecurity. NSA is trusted within the government, but for historical reasons, not so much outside it. This is why the role of DHSs CISA is so important, and why confirming Jen Easterlywhose career spans both cyber and non-cyber threats, and both the government and private sectorsis critical.
Third, to keep the peoples trust, civilian cybersecurity effortsand the information that private citizens provide the government to help secure our networksmust never be used for partisan political purposes.
Like the military and the intelligence communitiesfrom which NSA comesthe federal cybersecurity enterprise needs to be, to the greatest extent possible, nonpartisan and above politics. The same needs to be said about election security, another CISA responsibility.
The fourth aspect of the coming transparency revolution is that the federal cybersecurity enterprise needs to adopturgentlya consumer-focused side that the American people can trust and rely on for impartial advice on personal cybersecurity.
Its good the federal cybersecurity enterprise works with corporations that provide our networks, social media platforms, and major software products. Increasingly, though, the American people need authoritative, understandable cybersecurity information.
In cybersecurity, every American is now on the front linestargetable by hostile nation-states, confidence tricksters, criminals intent on stealing money, and those wanting to sow hatred and division. This reality totally upends previous concepts of national security and political economy. In a bring your own device world, your iPhone or Android phone can be exploited to target you and your workplace, school, or neighbors. You need to know which apps transmit personal data overseas to servers under the effective control of the Chinese Communist Party, or how to instantly recognize the telltale signs of Russian or Iranian disinformation. Your social media feed can be manipulated in non-transparent ways to change how you vote, shop, or even think. Government cybersecurity needs to communicate effectively with individual Americans protect themselves from cyber threats without turning us into a nanny state.
Fifth, and most importantly, cybersecurity needs to be re-scaled by government, by non-federal stakeholders, and by everyday Americans.
The finest cybersecurity policies in the world are useless if theyre not adequately resourced. No matter what you may think of NSA, it is one of governments most successful examples of having learned the importance of scale.
The Cyberspace Solarium Commission said Congress must invest significant resources in CISA and the private sector needs to increase cybersecurity spending. Top cybersecurity experts Richard Clarke and Rob Knake found that successful companies spent 8% of their IT budgets on cyber defense. Today, most dont. CISAs current budget, enacted during the Trump administration, is $2billion, plus $650million added in President Bidens Covid-19 relief bill. In March, House Homeland Security ranking Republican John Katko called for CISA to become a $5billion agency. He is in the right ballpark.
The Russian Sunburst hack into SolarWinds in 2020 and recent ransomware attacks from Russian-based criminal groups show what capable, well-resourced adversaries can do against systems that are vulnerable to cyber exploitation. We should be deeply concerned about adversaries exploiting gaps and seams in the ability of overseas-focused agencies like NSA to collect cyber intelligence inside the United States. Just because there hasnt been a cyber Pearl Harbor or a cyber 9/11 doesnt mean that one is impossible. It means only that weve been luckyso far. Cybersecurity today takes serious resources, trust, and transparency. Swift Senate confirmation of Inglis and Easterly is essential to help bring this revolution about.
Read more expert-driven national security perspectives, insight and analysis in The Cipher Brief
Visit link:
Ushering in a Transparent Revolution in Cybersecurity - The Cipher Brief
- Securus Technologies Supports Expansion of Sheriff-Led NSA I.G.N.I.T.E. Initiative to Improve Jail Safety and Reentry Outcomes - PR Newswire - February 7th, 2026 [February 7th, 2026]
- NSA set to deal with defiant parties, politicians, supporters on integrity of democratic process - ThePointNG - February 7th, 2026 [February 7th, 2026]
- Where NSA zero trust guidance aligns with enterprise reality - Help Net Security - February 4th, 2026 [February 4th, 2026]
- UNG third in Division 1 of NSA cyber event - University of North Georgia - February 4th, 2026 [February 4th, 2026]
- Green Beret Lieutenant General Joshua Rudd Tapped To Lead NSA and US Cyber Command - SOFREP - February 4th, 2026 [February 4th, 2026]
- SC Flags Health Concerns, Urges Rethink on Sonam Wangchuks NSA Detention - The Morning Voice - February 4th, 2026 [February 4th, 2026]
- What security teams need to know about the NSA's new zero trust guidelines - IT Pro - February 4th, 2026 [February 4th, 2026]
- 'India won't be bullied': NSA Ajit Doval told Marco Rubio that New Delhi would wait out Trump term for trade deal: Report - theweek.in - February 4th, 2026 [February 4th, 2026]
- When Protest becomes a Threat: Inside the Supreme Court hearing on Sonam Wangchuks NSA detention - SabrangIndia - February 4th, 2026 [February 4th, 2026]
- If NSA Commits Database Query Violations, But Nobody Audits Them, Do They Really Happen? - emptywheel - February 4th, 2026 [February 4th, 2026]
- Army general tapped to lead NSA vows to follow the law if confirmed - Military Times - February 1st, 2026 [February 1st, 2026]
- Overturned tractor-trailer shuts portion of Route 32 near NSA - WBAL-TV - February 1st, 2026 [February 1st, 2026]
- Nominee to lead NSA backs controversial spying law - Defense One - February 1st, 2026 [February 1st, 2026]
- NSA pick champions foreign spying law as nomination advances - The Record from Recorded Future News - February 1st, 2026 [February 1st, 2026]
- NSA Releases Phase One and Phase Two of the Zero Trust Implementation Guidelines - National Security Agency (.gov) - February 1st, 2026 [February 1st, 2026]
- Army General Tapped to Lead NSA Said He Doesnt Know Much About the Biggest NSA Controversy - The Intercept - February 1st, 2026 [February 1st, 2026]
- Trump's pick to lead the NSA vows to follow the law if confirmed - ABC News - February 1st, 2026 [February 1st, 2026]
- Trump's pick to lead the NSA vows to follow the law if confirmed - Oskaloosa Herald - February 1st, 2026 [February 1st, 2026]
- Trump's pick to lead the NSA vows to follow the law if confirmed - The Derrick - February 1st, 2026 [February 1st, 2026]
- Overturned tractor-trailer shuts westbound Maryland Route 32 near NSA exit, police say - WBAL News Radio - February 1st, 2026 [February 1st, 2026]
- SC to hear plea against Sonam Wangchuks NSA detention on February 2 - The New Indian Express - February 1st, 2026 [February 1st, 2026]
- Powys sheep sector to hear from Llyr Gruffydd at NSA meeting - County Times - February 1st, 2026 [February 1st, 2026]
- NSA calls for consultation on castration and tail docking to involve sheep farmers - cravenherald.co.uk - January 24th, 2026 [January 24th, 2026]
- NSA launches 13th annual survey for insight into cases of sheep worrying by dogs - Yahoo News UK - January 24th, 2026 [January 24th, 2026]
- NSA Ajit Doval says he doesn't use phone or internet. Here's why - MSN - January 14th, 2026 [January 14th, 2026]
- NSA Ajit Doval says he doesnt use phone or internet; shares views on Indias future and youth - WION - January 11th, 2026 [January 11th, 2026]
- Liberia: NSA Director's Special Assistant Suspended Amid Alleged Gang Sodomy of 15-Year-Old; Authorities Remain Silent - FrontPageAfrica - January 11th, 2026 [January 11th, 2026]
- 'Wars happen because some countries want to impose their will on others': NSA Ajit Doval - Deccan Herald - January 11th, 2026 [January 11th, 2026]
- We have to avenge our history: NSA Ajit Doval urges youth to make India great in every aspect - The Indian Express - January 11th, 2026 [January 11th, 2026]
- CISA, NSA, and Canadian Cyber Centre update Brickstorm analysis with new Rust-based variants - Industrial Cyber - January 11th, 2026 [January 11th, 2026]
- ROVER communication terminals approved for international use by NSA - Military Embedded Systems - January 9th, 2026 [January 9th, 2026]
- L3Harris ROVER and TNR systems gain NSA approval enabling secure coalition interoperability - Defence Industry Europe - January 9th, 2026 [January 9th, 2026]
- Former NSA insider Kosiba brought back as spy agencys No. 2 - The Record from Recorded Future News - January 9th, 2026 [January 9th, 2026]
- Trumps tariff threat to India self-inflicted wound: Former US NSA John Bolton - The Indian EYE - January 9th, 2026 [January 9th, 2026]
- NSA Scotland demands support for sheep farmers ahead of Holyrood elections - Farmers Guardian - January 9th, 2026 [January 9th, 2026]
- Announcing tariffs for purchasing Russian oil unfortunate: Former US NSA backs closer relationship with India - Punjab News Express - January 9th, 2026 [January 9th, 2026]
- NSA Ajit Doval likely to be part of Indian delegation at WEF in Davos - The New Indian Express - January 9th, 2026 [January 9th, 2026]
- "A lot of hot air": Former NSA John Bolton on Trump's remarks on possible action beyond Venezuela - ANI News - January 9th, 2026 [January 9th, 2026]
- NSA employee sues Trump administration over order on transgender rights and two 'immutable' genders - Yahoo - December 22nd, 2025 [December 22nd, 2025]
- NSA employee sues the Trump administration over transgender rights and 'immutable' genders - AP News - December 22nd, 2025 [December 22nd, 2025]
- Senior official at Indo-Pacific Command is set to be Trumps pick to lead Cyber Command, NSA - The Record from Recorded Future News - December 22nd, 2025 [December 22nd, 2025]
- NSA employee sues the Trump administration over transgender rights and 'immutable' genders - Temple Daily Telegram - December 22nd, 2025 [December 22nd, 2025]
- Potential NSA, Cyber Command leader nomination transmitted to Senate - Nextgov/FCW - December 22nd, 2025 [December 22nd, 2025]
- After Eight Months, White House Names Nominee To Head NSA And CYBERCOM - Defense Daily - December 22nd, 2025 [December 22nd, 2025]
- Fubara Hosts NSA, Says Tinubu Happy With Rivers Governor - TVC News - December 22nd, 2025 [December 22nd, 2025]
- CISA, NSA warn of Chinas BRICKSTORM malware after incident response efforts - The Record from Recorded Future News - December 10th, 2025 [December 10th, 2025]
- CISA and NSA Warn of BRICKSTORM Malware Attacking VMware ESXi and Windows Environments - CybersecurityNews - December 10th, 2025 [December 10th, 2025]
- NSA, CISA, and Others Release Guidance on Integrating AI in Operational Technology - National Security Agency (.gov) - December 4th, 2025 [December 4th, 2025]
- NSA has met 2,000-person workforce reduction goal, people familiar say - Nextgov/FCW - December 4th, 2025 [December 4th, 2025]
- NSA Doval, Thai Foreign Minister Phuangketkeow discuss maritime security, threats of online scams - The Indian EYE - December 4th, 2025 [December 4th, 2025]
- NSA Doval, Thai FM discuss maritime security, threats of online scams - Awaz The Voice - December 4th, 2025 [December 4th, 2025]
- All-clear issued about 2 hours after NSA Naples schools evacuated over potential threat - Stars and Stripes - November 18th, 2025 [November 18th, 2025]
- 'Dhurandhar': R Madhavan reveals Aditya Dhar's little trick that perfected his NSA-inspired look for the - The Times of India - November 18th, 2025 [November 18th, 2025]
- Army officer with Indo-Pacific experience emerges as potential Cyber Command, NSA pick - The Record from Recorded Future News - November 18th, 2025 [November 18th, 2025]
- NSA Dr Rahman to attend Security Conclave in New Delhi - United News of Bangladesh - November 18th, 2025 [November 18th, 2025]
- Man claims NSA told him to shatter glass at AT&T building with hatchet, Nashville police say - WSMV - November 18th, 2025 [November 18th, 2025]
- How the heartbreaking lack of a confirmed leader is impacting CYBERCOM and NSA - Breaking Defense - November 7th, 2025 [November 7th, 2025]
- Goa invokes NSA for three months to tackle anti-socials - The Times of India - November 7th, 2025 [November 7th, 2025]
- CISA, NSA and other unveil security blueprint to harden Microsoft Exchange servers - Homeland Preparedness News - November 7th, 2025 [November 7th, 2025]
- NSA Shares Q3 Revenue Results Below Expectations - GuruFocus - November 7th, 2025 [November 7th, 2025]
- Filipinos aware of civilian supremacy over military NSA Ao - Philippine News Agency - October 28th, 2025 [October 28th, 2025]
- Sonam Wangchuk says his words were twisted to justify his NSA detention - The Statesman - October 26th, 2025 [October 26th, 2025]
- Nokia and stc pioneer the first commercial 5G NSA Cloud RAN deployment in the MEA region - ZAWYA - October 26th, 2025 [October 26th, 2025]
- China accuses NSA of multi-year hack targeting its national time systems - Nextgov/FCW - October 23rd, 2025 [October 23rd, 2025]
- Cybersecurity News: AWS outage, NSA hacking accusations, High risk WhatsApp automation - CISO Series - October 23rd, 2025 [October 23rd, 2025]
- Hackers Say They Have Personal Data of Thousands of NSA and Other Government Officials - Homeland Security Today - October 23rd, 2025 [October 23rd, 2025]
- AWS outage, NSA hacking accusations, High risk WhatsApp automation - LinkedIn - October 23rd, 2025 [October 23rd, 2025]
- Palestinian President Mahmoud Abbas: No Concessions Were Made In The Oslo Accords 1.85 Million Palestinians Returned To Their Homeland;... - October 23rd, 2025 [October 23rd, 2025]
- NSA to partner JKG to drive sports technology through Artificial Intelligence - GhanaWeb - October 23rd, 2025 [October 23rd, 2025]
- China claims NSA hacked its national timing systems using 42 "special cyber weapons" - TechSpot - October 23rd, 2025 [October 23rd, 2025]
- US NSA alleged to have launched a cyber attack on a Chinese agency - csoonline.com - October 21st, 2025 [October 21st, 2025]
- Hackers Say They Have Personal Data of Thousands of NSA and Other Government Officials - 404 Media - October 21st, 2025 [October 21st, 2025]
- China says it has foiled a series U.S. cyberattacks on its critical infrastructure Ministry of State Security says it has 'irrefutable evidence' NSA... - October 21st, 2025 [October 21st, 2025]
- China claims the NSA conducted cyberattacks on its national time center - Engadget - October 21st, 2025 [October 21st, 2025]
- China claims the US NSA conducted cyberattacks on its national time center - TechRadar - October 21st, 2025 [October 21st, 2025]
- Donald Trump's ex-NSA John Bolton indicted; charged over mishandling classified information; Trump calls - Times of India - October 19th, 2025 [October 19th, 2025]
- Trump critic and former NSA adviser John Bolton indicted on classified documents charges - MLive.com - October 19th, 2025 [October 19th, 2025]
- NSA Accused of Stealing Secrets from Chinas National Time Centre - Modern Diplomacy - October 19th, 2025 [October 19th, 2025]
- Ex-Donald Trump NSA John Bolton Indicted: All About The 18 Charges - NDTV - October 19th, 2025 [October 19th, 2025]
- Explained: What are the charges against ex-US NSA John Bolton? What next? - Firstpost - October 19th, 2025 [October 19th, 2025]