Cyber Attacks Do More Damage Than Physical Attacks

Previous Head the US Dept. of Homeland Security thinks that digital attacks are now more dangerous & damaging than physical attacks.

If you still doubted the importance of stronger digital security to businesses even after the now-infamous Sony Pictures hack of 2014,  Former US secretaryf the Department of Homeland Security Tom Ridge’s comments at the Concordia Summit recently in New York might convince you. The former (and first ever) secretary of was part of a panel on cybersecurity, and opened his remarks by mentioning recent incidents in New York, New Jersey, and Paris.

“Notwithstanding the pain and horror associated with a physical attack,” Ridge said, “the potential for physical, human, and psychic impact with a cyber-attack, I think, is far more serious.”

That’s right: Digital attacks are now more dangerous and damaging than physical attacks, Ridge argues. Ridge made his case further by adding that a cyber-attack can have “much more significant impact on the country’s psyche… We live in the digital forevermore, and that risk is dynamic, it continues to morph, continues to get more serious, actors get better financed.

That “digital forevermore” is an apparent pet phrase of Ridge’s these days, and it makes sense. While the Sony hack is everyone’s favorite example, big companies like Home Depot, Anthem, Blue Cross, Starwood, and Target have been targeted in the past two years. Many different news outlets called 2015 “the year of the hack.”

And it isn’t always hacker groups, but too often, countries hacking each other. “Nations are using cyber as an element of national power,” said retired US Army General Keith Alexander, “not only to collect information but to hit other countries. It’s continued and will continue to grow.”

One potential solution, the panelists agreed: better sharing of information between governmental departments, and between government and the private sector. Reginald Brothers, Homeland Security’s undersecretary for science and technology, stressed the need for information-sharing. In late April, Brothers helped organize Homeland Security Day in Silicon Valley, an “ideation event” where representatives of the government brainstormed and collaborated with tech entrepreneurs in Menlo Park.

Brothers said a topic of particular interest was what Homeland Security can do with respect to the Internet of Things, a now-common term for the many Web-connected devices that fill our homes and lives.

“In this whole idea of partnering up with industry, a huge part is information-sharing with respect to threat factors,” Brothers said, “but a second part is getting the creativity from all of you to help us do the best job we can for the department and the nation.”

Ridge’s point, Alexander’s point, and Brothers’ point can be taken in tandem, cyber-attacks are getting worse; they are now coming even from nations, not just hacker groups; the damage of cyber-attacks can often be worse than physical attacks; and if Silicon Valley innovators can work with government, the threats could be somewhat alleviated.

Yahoo Finance
 

« AI Is Replacing Human Made Decisions In The US Military
Something To Hide? Apple Will Share Your iMessages With The Police »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

Resecurity, Inc.

Resecurity, Inc.

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Micron Technology

Micron Technology

Micron is a global leader in the semiconductor industry providing memory and secure storage devices for Networks, Mobile devices and IoT applications.

Cast Software

Cast Software

CAST is a pioneer in Software Analysis and Measurement (SAM) to capture and quantify the reliability and security of business applications.

Cognni

Cognni

Cognni (formerly Shieldox) will make your InfoSec think like a human, right out of the box, so you can focus on the bigger picture, keeping the information flow safe.

CybernetIQ

CybernetIQ

CLAW by CybernetIQ is the industry's most advanced SOAR platform helping unify all cybersecurity tools under one umbrella and providing organizations faster, better and more accurate cybersecurity.

Anitian

Anitian

The Anitian Compliance Automation platform builds, configures, and monitors cloud environments to accelerate compliance for standards such as FedRAMP, PCI, ISO/GDPR and CJIS.

DarkLight

DarkLight

DarkLight is a cybersecurity platform that mimics human thinking at scale to build resiliency to Advanced Persistent Threats.

Trail of Bits

Trail of Bits

Trail of Bits combine high-end security research with a real-world attacker mentality to reduce risk and fortify code.

AVANTEC

AVANTEC

AVANTEC is the leading Swiss provider of IT security solutions in the areas of cloud, content, network and endpoint security.

Gray Analytics

Gray Analytics

Gray Analytics is a Cybersecurity Risk Management company providing best-practice services across a broad spectrum of cyber scenarios for both government and commercial customers.

4Securitas

4Securitas

4Securitas is an innovative cyber security firm focused on protecting critical data at the core of every organisation.

Trellix

Trellix

Trellix is an extended detection and response (XDR) solutions provider created from a merger of McAfee Enterprise and FireEye Products.

Q5id

Q5id

At Q5id, we prove that your customers' digital identity and real-world identity are the same, our verification and authentication solution delivers a Proven and Secure digital identity for everyone.

Trackd

Trackd

At trackd, we’re re-imaging vulnerability remediation for the benefit of the entire cyber security community. Automating Vulnerability Remediation without the Fear of Disruption.

Sidcon International Consulting Company

Sidcon International Consulting Company

SIDCON International Consulting Company has been providing consulting services since 2002 for private and public organizations in Ukraine and other countries.

PixelQA

PixelQA

Are you looking for a security testing company to cross-check whether your software or mobile app has a possible security threat or not?

BreakPoint Labs

BreakPoint Labs

BreakPoint Labs is dedicated to providing the methods and means for sustainable, measurable, and effective cybersecurity operations.