Cyber Attacks Are The New Cold War

On 16th June President Biden had a meeting with President Putin in Geneva to talk about cyber secuity, among several other important issues. Doubtles on the agenda was  the attack which hacked the US IT services company SolarWinds, the successful ransom attacks on the Colonial Pipeline, Microsoft and numerous other costly breaches of US and allied governments and agencies.  

The US governmnet has pointed at Russian state-sponsored hackers known as Darkside as being the perpetrators at the direction of Russia's intelligence services. The geo-political engagement between the two leaders shows the level of heated argumnent beween the US and Russia over responsibilty for these cyber attacks.

The White House itself has not made any public comments about the international response to the SolarWinds hack, perhaps because cyber attacks have become so common that only the largest scale and most damaging attacks make the news, but it has been working with Microsoft on an investigation.  

Just like the the Cold War in the 1940s and 1950s, each side has reason to fear its opponent gaining a technological upper hand, and just as the Internet brings people together socially it has also enabled malicious activity with data breaches, ransomware and destroyed systems. 

Now, more than 30 years after the end of the Cold War, the US and Russia have decommissioned thousands of nuclear weapons, however, tensions are growing one more. A modern-day cold war would include cyber attacks and nuclear powers’ involvement in allies’ conflicts. It’s already happening.

Now a new kind of Cold War, with Artificial Intelligence (AI) serving as the basis of this arms race and nation-states are employing cyber-attacks, as a prelude to military actions. Attacks launched from the open Internet are at a constant level of activity, just below armed conflict.We think of cyber-attacks in terms of router configurations or malware code, but the tremendous amounts of communications traffic make cyber security a field of data science. 

The US is one the  most connected  country in the world, with everything from cars to refrigerators to security cameras connected online, making it among the most vulnerable. 

All these new sensors and Internet of Things (IoT) devices produce tremendous amounts of data that can be analysed to detect adversary activity. Such massive volumes of data need analytic techniques to synthesise the essence of the activity for human understanding and decision-making and the use of AI to analyse these massive amounts of cyber data and capabilities is growing exponentially. 

Cyber attacks are now a constant and range from the annoying to the devastating. There is still a significant lag between attack and detection and AI can be used to improve defenses and reduce that gap. Previously, rules-based systems were applied in cyber security to detect malware signatures and look for known insider threat patterns. But AI's self-learning techniques are now being used to look for unknown insider threat patterns and other malicious activity. Significantly, these methods can learn based on data that may already contain the threat activity. In addition, AI can synthesize the difference between normal router outages in the open Internet and botnet attacks.

In the Cyber Cold War, one must always assume that your defenses have been breached and your adversaries are already in the system. This is the basic  assumption behind Zero Trust,  which is an essential defensive methodology. 

Organisations must move away from perimeter security to follow the principles of zero trust, to adopt in role-based access controls for every resource and provide secure communications throughout. It can not be assumed that the open Internet is benign and concept of zero-trust concept must be extended into the open Internet to "defend forward" beyond our network perimeters. Finally, we need to extend our security monitoring to leverage AI to search for unknownpatterns of malicious activity. AI is the arms race to analyse more data with greater speed and provide transparent identification and recommendations for human decision-makers.

Cyber resilience must not be viewed as a costly optional add-on but must be considered an essential part of doing business. We must recognise that the more governments develop offensive techniques, the more vulnerable our infrastructure is on defense. Cyber will be a part of every future military action where in the world of AI and sensory-intelligent machines, there are no non-combatants.

Dark Reading:   BBC:      Metro:    The Converstaion:     Cyber NewsFeed:    Jioforme:    Urgent Comm:     

You Might Also Read:

Cyber Warfare Is The New Frontier:

Cyberwar Vs. Traditional Conflict: (£)

 

 

« Why Is It So Difficult To Convict Cyber Criminals?
Cyber Security In The Crypto World »

CyberSecurity Jobsite
Check Point

Directory of Suppliers

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

ISACA

ISACA

ISACA is a global professional association and learning organization for members who work in information security, governance, assurance, rissk and privacy.

CERT.AZ

CERT.AZ

The national Cyber Security Center of the Republic of Azerbaijan.

Trinexia

Trinexia

Trinexia (formerly Credence Security) is a specialty Value-added Distributor of Cyber Security, Digital Forensics, Security Awareness, Data Security & Governance solutions.

Surevine

Surevine

Surevine builds secure, scalable collaboration solutions for the most security conscious organisations, enabling collaboration on their most sensitive information.

Bl4ckswan

Bl4ckswan

Bl4ckswan is a Management Consulting firm specialized in the delivery of information security and compliance services.

Cyber Pathways

Cyber Pathways

Cyber Pathways brings together the next generation of Cyber professionals along with delegates who are looking to cross train and enter the cyber market.

ISA Global Cybersecurity Alliance (ISAGCA)

ISA Global Cybersecurity Alliance (ISAGCA)

Objectives of the ISA Global Cybersecurity Alliance include the acceleration and expansion of standards, certification, education programs, advocacy efforts, and thought leadership.

CENSUS

CENSUS

CENSUS is a Cybersecurity services provider offering services to multiple industries worldwide such as Security Testing, Code Auditing, Secure SDLC, Vulnerability Research and Consulting Services.

Digital Pathways

Digital Pathways

Digital Pathways is an award-winning data security provider that helps businesses protect their digital assets.

Quartz Network

Quartz Network

Quartz Network is a curated community for change-makers, up-and-comers, and professionals who are ready to grow, adapt, and thrive.

Otava

Otava

Otava is a global leader of secure, compliant hybrid cloud and IT solutions for service providers, channel partners and enterprise clients.

AdronH

AdronH

AdronH is a company of Cyber Security consultants. We support companies and public institutions with their digital transformation to new and secure business platforms.

OutKept

OutKept

OutKept offers the highest quality phishing simulation campaigns, supported by a community of ethical phishers, to build awareness, and maintain alertness.

ABPGroup

ABPGroup

ABPGroup is Asia’s leading cybersecurity technology provider focusing on providing best-of-breed solutions that address today’s pressing challenges.

Acumen

Acumen

Acumen's cyber security engineers protect your critical systems, in critical moments. We are here when you need us most.

NetDescribe

NetDescribe

NetDescribe, part of Xantaro Group, advises and supports companies in building secure and stable IT environments.