Cyber Attacks May Lead To A “shooting war”

Joe Biden has said that Russia and China are growing threats to American national security and that the growing wave of cyber attacks, including ransomware attacks, against US government agencies and private industry could end up being in a real shooting war with a major power.

“I can’t guarantee this, and you’re as informed as I am, but I think it’s more likely we’re going to end up, well, if we end up in a war, a real shooting war with a major power, it’s going to be as a consequence of a cyber breach of great consequence,” Biden said during a half-hour speech while visiting the Office of the Director of National Intelligence (ODNI)

Cyber security has become a top agend issue for the Biden administration after a series of high profile attacks on entities such as network management company SolarWinds, the Colonial Pipeline company and software firm Kaseya hurt the US far beyond just the companies hacked. Some of the attacks affected fuel and food supplies in parts of the US.

Biden and Russian President Vladimir Putin and Biden shared a list of critical infrastructure the US considers off-limits to nation-state actors during a June 16 summit in Geneva. Since then, senior members of the Biden administration's national security team have been in constant contact with senior members of the Kremlin over cyber attacks on the United States, agencies quoted the White House.

Biden highlighted the threats posed by China, referring to President Xi Jinping as "deadly earnest about becoming the most powerful military force in the world, as well as the largest and most prominent economy in the world by the mid-40s, the 2040s." 

In his remarks to 120 ODNI employees and senior leadership officials, the President asserted that he understood the complexity and critical nature of their work. The ODNI oversees the 17 other US intelligence organisations. "You have my full confidence.I know there's no such thing as 100 per cent certainty in the intelligence world. Occasionally that happens. Rarely, rarely, rarely,” he said, adding that he would never politicise the intelligence agency’s work.

Reuters:       Financial Times:      ITPro:         The Register:        India Today:

You Might Also Read: 

CISA, NSA And The Dual Hat:

 

« Cyber Security Standards For Critical Infrastructure
No More Ransom Saves Victims »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

QNAP Systems

QNAP Systems

QNAP Systems, Inc. delivers world class network attached storage (NAS) and network video recorder (NVR) solutions.

Academic Centres of Excellence in Cyber Security Research

Academic Centres of Excellence in Cyber Security Research

The ACE-CSRs scheme is part of the UK Government’s National Cyber Security Strategy, working with academia and industry to make the UK more resilient to cyber attacks.

Xcitium

Xcitium

Xcitium (formerly Comodo) is and industry leading provider of state-of-the-art endpoint protection solutions. Our Zero threat platform isolates and removes all ransomware & malware infectictions.

Alan Turing Institute

Alan Turing Institute

Alan Turing Institute is the UK national institute for data science. A major focus is Big Data analysis with applications including cyber security.

National Institute of Information and Communications Technology (NICT)

National Institute of Information and Communications Technology (NICT)

NICT is Japan’s sole National Research and Development Agency specializing in the field of information and communications technology.

PlainID

PlainID

PlainID provides IAM teams with a simple and intuitive means to control their organization’s entire authorization process.

Modux

Modux

Modux focus on a number of core competencies across cyber security including; cyber intelligence & analytics, penetration testing and training.

CyberSec.sk

CyberSec.sk

CyberSec.sk is the Slovak portal bringing the latest cyber security news, politics, tips and instructions on how to protect the internet.

Ellipsis Technologies

Ellipsis Technologies

Ellipsis Technologies is a diversified technology company that develops innovative security software for websites and online applications.

Extreme Protocol Solutions (EPS)

Extreme Protocol Solutions (EPS)

Extreme Protocol Solutions is an industry leading Data Sanitization Software, Hardware and Onsite Service Provider.

Nasuni

Nasuni

The Nasuni File Data Platform offers the protection, detection, and recovery of file shares from ransomware attacks or random disasters within minutes.

ExtraHop

ExtraHop

ExtraHop's dynamic cyber defense platform uses cloud-scale AI to help enterprises detect and respond to advanced threats - before they compromise your business.

NextGen Cyber Talent

NextGen Cyber Talent

NextGen Cyber Talent is a non-profit providing a platform to increase diversity and inclusion in the cybersecurity industry.

Cybervergent

Cybervergent

Cybervergent (formerly Infoprive) are a leading cybersecurity technology company in Africa. We provide cybersecurity guidance and solutions that help protect your business.

Camelot Secure

Camelot Secure

Camelot Secure Secure360 platform is a holistic redefinition of what world-class cybersecurity strategies can be. Prepare. Protect. Deploy.

RunReveal

RunReveal

RunReveal's mission is to make sure no breach goes undetected. That means having a product that is accessible and effective for companies of all sizes.