Cyber Attacks May Lead To A “shooting war”

Joe Biden has said that Russia and China are growing threats to American national security and that the growing wave of cyber attacks, including ransomware attacks, against US government agencies and private industry could end up being in a real shooting war with a major power.

“I can’t guarantee this, and you’re as informed as I am, but I think it’s more likely we’re going to end up, well, if we end up in a war, a real shooting war with a major power, it’s going to be as a consequence of a cyber breach of great consequence,” Biden said during a half-hour speech while visiting the Office of the Director of National Intelligence (ODNI)

Cyber security has become a top agend issue for the Biden administration after a series of high profile attacks on entities such as network management company SolarWinds, the Colonial Pipeline company and software firm Kaseya hurt the US far beyond just the companies hacked. Some of the attacks affected fuel and food supplies in parts of the US.

Biden and Russian President Vladimir Putin and Biden shared a list of critical infrastructure the US considers off-limits to nation-state actors during a June 16 summit in Geneva. Since then, senior members of the Biden administration's national security team have been in constant contact with senior members of the Kremlin over cyber attacks on the United States, agencies quoted the White House.

Biden highlighted the threats posed by China, referring to President Xi Jinping as "deadly earnest about becoming the most powerful military force in the world, as well as the largest and most prominent economy in the world by the mid-40s, the 2040s." 

In his remarks to 120 ODNI employees and senior leadership officials, the President asserted that he understood the complexity and critical nature of their work. The ODNI oversees the 17 other US intelligence organisations. "You have my full confidence.I know there's no such thing as 100 per cent certainty in the intelligence world. Occasionally that happens. Rarely, rarely, rarely,” he said, adding that he would never politicise the intelligence agency’s work.

Reuters:       Financial Times:      ITPro:         The Register:        India Today:

You Might Also Read: 

CISA, NSA And The Dual Hat:

 

« Cyber Security Standards For Critical Infrastructure
No More Ransom Saves Victims »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

Resecurity, Inc.

Resecurity, Inc.

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Wizard Computing

Wizard Computing

Wizard Computer Services is a full service IT solutions provider that offers managed services, consultation, installation, and support to small and large businesses in New England.

Roka Security

Roka Security

Roka Security is a boutique security firm specializing in full-scale network protection, defending against advanced attacks, and rapid response to security incidents.

Cyber Defense Media Group (CDMG)

Cyber Defense Media Group (CDMG)

CDMG is the leading global media group for all things cyber defense.

BehavioSec

BehavioSec

BehavioSec uses the way your customers type, swipe, and hold their devices, and enables them to authenticate themselves through their own behavior patterns.

Achtwerk

Achtwerk

Achtwerk manufacture the security appliance IRMA for critical infrastructures and networked automation in production plants.

Naval Dome

Naval Dome

Naval Dome provides the first maritime multilayer cyber defense solution for mission critical onboard systems.

Maven Technologies

Maven Technologies

Maven Technologies specialize in secure data destruction, electronics recycling, asset management, and highly detailed reporting.

DigiSec360

DigiSec360

DigiSec360 is a technology firm focused on the human element of cybersecurity.

Carve Systems

Carve Systems

Carve Systems was founded to bring enterprise level information security, training, and risk management services to organizations of any size and industry.

Secure Digital Solutions (SDS)

Secure Digital Solutions (SDS)

Secure Digital Solutions is a leading consulting firm in the business of information security providing cyber security program strategy, enterprise risk and compliance, and data privacy.

Cyber Security for Europe (CyberSec4Europe)

Cyber Security for Europe (CyberSec4Europe)

CyberSec4Europe is designing, testing and demonstrating potential governance structures for a European Cybersecurity Competence Network.

Mode Solutions

Mode Solutions

Mode guarantee IT performance where you need it most, creating seamless and secure solutions that will alleviate pressure from your business.

RB42

RB42

RB42 (formerly Nexa Technologies) provide cyber defense solutions (ComUnity, secure and encrypted messaging, detection of interception tools, etc) and cyber defense consultancy service.

Mitigo Group

Mitigo Group

Mitigo offers a well considered and effective approach to keeping businesses completely secure from any digital attacks.

SignMyCode

SignMyCode

SignMyCode is a one-stop shop for trusted and authentic code signing solutions to safeguard software.

Glasstrail

Glasstrail

Glasstrail are single-minded about helping organisations gather intelligence and manage vulnerabilities in their attack surface before adversaries exploit them.