Cyber Attacks May Lead To A “shooting war”

Joe Biden has said that Russia and China are growing threats to American national security and that the growing wave of cyber attacks, including ransomware attacks, against US government agencies and private industry could end up being in a real shooting war with a major power.

“I can’t guarantee this, and you’re as informed as I am, but I think it’s more likely we’re going to end up, well, if we end up in a war, a real shooting war with a major power, it’s going to be as a consequence of a cyber breach of great consequence,” Biden said during a half-hour speech while visiting the Office of the Director of National Intelligence (ODNI)

Cyber security has become a top agend issue for the Biden administration after a series of high profile attacks on entities such as network management company SolarWinds, the Colonial Pipeline company and software firm Kaseya hurt the US far beyond just the companies hacked. Some of the attacks affected fuel and food supplies in parts of the US.

Biden and Russian President Vladimir Putin and Biden shared a list of critical infrastructure the US considers off-limits to nation-state actors during a June 16 summit in Geneva. Since then, senior members of the Biden administration's national security team have been in constant contact with senior members of the Kremlin over cyber attacks on the United States, agencies quoted the White House.

Biden highlighted the threats posed by China, referring to President Xi Jinping as "deadly earnest about becoming the most powerful military force in the world, as well as the largest and most prominent economy in the world by the mid-40s, the 2040s." 

In his remarks to 120 ODNI employees and senior leadership officials, the President asserted that he understood the complexity and critical nature of their work. The ODNI oversees the 17 other US intelligence organisations. "You have my full confidence.I know there's no such thing as 100 per cent certainty in the intelligence world. Occasionally that happens. Rarely, rarely, rarely,” he said, adding that he would never politicise the intelligence agency’s work.

Reuters:       Financial Times:      ITPro:         The Register:        India Today:

You Might Also Read: 

CISA, NSA And The Dual Hat:

 

« Cyber Security Standards For Critical Infrastructure
No More Ransom Saves Victims »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

IONU Security

IONU Security

IONU offer a security platform focused specifically on providing Data-centric Security.

Red Hat

Red Hat

Red Hat is a leader in open source software development. Our software security team proactively identifies weaknesses before they become problems.

Aruba Networks

Aruba Networks

Aruba, a Hewlett Packard Enterprise company, is a leading provider of next-generation network access solutions for the mobile enterprise.

Aptive Consulting

Aptive Consulting

Aptive is a cyber security consultancy providing Penetration Testing and Vulnerability Assessment services.

Segusoft

Segusoft

With its encryption platform SEGULINK, Segusoft provides standard software for companies to securely transfer files and messages.

Zecurion

Zecurion

Zecurion data loss prevention (DLP) solution is an easy-to-use solution for securing confidential data at rest and in motion.

Blaze Information Security

Blaze Information Security

Blaze Information Security is a privately held, independent information security firm born from years of combined experience and international presence.

IoT Security Institute (IoTSI)

IoT Security Institute (IoTSI)

IoT Security Institute is an academic and industry body dedicated to providing frameworks and supporting educational services to assist in managing security within an Internet of Things eco-system.

Xilinx

Xilinx

Xilinx is the inventor of the FPGA, programmable SoCs, and now, the ACAP. We are building the Adaptable, Intelligent World.

e-End

e-End

e-End provides hard drive shredding, degaussing and data destruction solutions validated by the highest electronic certifcations to keep you compliant with GLB, SOX, FACTA, FISMA, HIPAA, COPPA, ITAR.

Paladin Capital Group

Paladin Capital Group

Paladin is a leading global investor that supports and grows the world’s most innovative cyber companies.

Knovos

Knovos

Knovos is a leading technology innovator developing solutions for automating, integrating, and innovating Information Governance.

Censys

Censys

Our customers rely on Censys data to get the global visibility they need of their attack surfaces in order to proactively prevent nation-state attacks and emerging threats.

Loki Labs

Loki Labs

Loki Labs provides expert cyber security solutions and services, including vulnerability assessments & penetration testing, emergency incident response, and managed security.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

Regulativ.ai

Regulativ.ai

Regulativ.ai is an innovative and comprehensive platform, driven by AI, to address the regulatory and compliance needs of Cyber Security Regulatory compliance and reporting.

Capital Network Solutions

Capital Network Solutions

Capital Network Solutions are a highly accredited managed IT services and consultancy provider, specialising in cyber security, infrastructure and communications.

BlastWave

BlastWave

BlastWave’s BlastShield integrates three innovative products into a single solution to help prevent inadvertent and intentional attacks.