Cyber Attacks May Lead To A “shooting war”

Joe Biden has said that Russia and China are growing threats to American national security and that the growing wave of cyber attacks, including ransomware attacks, against US government agencies and private industry could end up being in a real shooting war with a major power.

“I can’t guarantee this, and you’re as informed as I am, but I think it’s more likely we’re going to end up, well, if we end up in a war, a real shooting war with a major power, it’s going to be as a consequence of a cyber breach of great consequence,” Biden said during a half-hour speech while visiting the Office of the Director of National Intelligence (ODNI)

Cyber security has become a top agend issue for the Biden administration after a series of high profile attacks on entities such as network management company SolarWinds, the Colonial Pipeline company and software firm Kaseya hurt the US far beyond just the companies hacked. Some of the attacks affected fuel and food supplies in parts of the US.

Biden and Russian President Vladimir Putin and Biden shared a list of critical infrastructure the US considers off-limits to nation-state actors during a June 16 summit in Geneva. Since then, senior members of the Biden administration's national security team have been in constant contact with senior members of the Kremlin over cyber attacks on the United States, agencies quoted the White House.

Biden highlighted the threats posed by China, referring to President Xi Jinping as "deadly earnest about becoming the most powerful military force in the world, as well as the largest and most prominent economy in the world by the mid-40s, the 2040s." 

In his remarks to 120 ODNI employees and senior leadership officials, the President asserted that he understood the complexity and critical nature of their work. The ODNI oversees the 17 other US intelligence organisations. "You have my full confidence.I know there's no such thing as 100 per cent certainty in the intelligence world. Occasionally that happens. Rarely, rarely, rarely,” he said, adding that he would never politicise the intelligence agency’s work.

Reuters:       Financial Times:      ITPro:         The Register:        India Today:

You Might Also Read: 

CISA, NSA And The Dual Hat:

 

« Cyber Security Standards For Critical Infrastructure
No More Ransom Saves Victims »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Cymulate

Cymulate

Cymulate is a SaaS-based breach and attack simulation platform that makes it simple to know and optimize your security posture any time, all the time.

OneWelcome

OneWelcome

Onegini and iWelcome have merged to become OneWelcome, the largest European Identity Access Management Saas Vendor.

exceet Secure Solutions

exceet Secure Solutions

exceet Secure Solutions is your experienced specialist for Internet of Things (IoT), Heath Telematics, electronic signatures and timestamps and IT security.

PBOSecure

PBOSecure

PBOSecure is a dynamic and progressive IT consultancy company specializing in IT and Industrial Control System (ICS) security.

Quantstamp

Quantstamp

Quantstamp are experts in Smart Contract Security Audits. We provide verification that your decentralized system works as intended.

ALTR

ALTR

ALTR provide software-embedded solutions for data security and privacy.

RUSCADASEC

RUSCADASEC

RUSCADASEC is an independent non-profit initiative on developing the open Russian-speaking international community of industrial cyber security/ICS/SCADA cyber security professionals.

DDLS

DDLS

DDLS is Australia's largest provider of corporate IT, process training and cybersecurity training courses and certification programs.

PQShield

PQShield

PQShield are specialists in Post-Quantum Cryptography. We provide quantum-secure cryptographic solutions for software, software/hardware co-design and data in transit.

VIRTIS

VIRTIS

VIRTIS' mission is to provide today's leading organizations peace of mind that their entire digital network perimeter is safe from hackers and data breach.

Cybots Pte Ltd

Cybots Pte Ltd

Cybots is a multinational cyber defence brand founded in Singapore in 2018 to help organizations stay ahead of increasingly sophisticated threats from cyber criminals.

Arcanna.ai

Arcanna.ai

Using a wide range of out-of-the box integrations, Arcanna.ai continuously learns from existing enterprise cybersecurity experts and scales your team’s capacity to deal with threats.

Polygraph

Polygraph

Polygraph monitors the activities of click fraud gangs, including how they operate, who they target, the techniques they use, and how to detect their fraud.

Gutsy

Gutsy

Gutsy uses process mining to help organizations visualize and analyze their complex security processes to understand how they actually run, based on observable event data.

Runecast Solutions

Runecast Solutions

Runecast Solutions is a global leader in AI-powered risk mitigation, security, continuous compliance and more efficient IT operations management.

Dispel

Dispel

Dispel makes the fastest secure remote access for industrial networks. Built by operators for operators: a zero trust engine for your entire OT, IoT, and xIoT stack.