Cyber Weapons Are Proliferating Beyond Control

Cybersecurity headlines in recent years have been dominated by companies losing money by being hacked and leaking the data of millions of customers. 

But today, cybersecurity is moving beyond the financial impact to concerns over public safety, national security and even cyberwarfare. 

To understand the state of cyberwar and its potential impact, we should all keep in mind two things:

1. The proliferation of Cyber-Weapons is already happening

Countries are already stockpiling cyber-weapons that they can use against each other. These weapons could cause real world damage to public infrastructure, public utilities, and other facilities that could endanger people's lives and crash economies. 

The United States, China, and Russia are the most well-known stockpilers of cyber-weapons, but there are plenty of others engaged in the cyber-weapons arms race. 

We even saw during the 2018 US midterms that there were reports America was preparing a cyber-weapons attack on Russia if it was discovered that the Russians hacked the US election.

2. Arms control of Cyber-Weapons hasn't caught up

While the world has a decades-long history of treaties governing the use of weapons of mass destruction such as ballistic missiles, biochemical weapons, and nuclear arms, very little has been done yet to regulate cyber-weapons. 

The challenge is that most lawmakers and government officials have minimal understanding of how these weapons work, how they differ from traditional weapons, and the true dangers they can pose. 

The other challenge is that it is far faster and cheaper to create and stockpile cyber-weapons than traditional weapons. 

We should take a lesson from history and remember that both of the world wars were preceded by years of unchecked weapons buildup.

ZDNet:

You Might Also Read:

Is Cyber The Perfect Weapon?

« Cybercrime Is The Biggest Evolving Source Of Crime In The UK
Waymo Is First With Driverless Car Service »

CyberSecurity Jobsite
Check Point

Directory of Suppliers

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Ethio-CERT

Ethio-CERT

National Cyber Emergency Readiness and Response Team of Ethiopia.

maCERT

maCERT

maCERT is the national Computer Emergency Response Team for Morocco.

Seqrite

Seqrite

Seqrite offers a highly advanced range of enterprise and IT security solutions to protect your organization's most critical data.

Capula

Capula

Capula is a leading system integration specialist for control, automation and operational IT systems across all applications and industry sectors.

Joint Accreditation System of Australia and New Zealand (JASANZ)

Joint Accreditation System of Australia and New Zealand (JASANZ)

JASANZ is the joint national accreditation body for Australia and New Zealand. The directory of members provides details of organisations offering certification services for ISO 27001.

Cyber Wales

Cyber Wales

Cyber Wales provides a focus and forum for everyone in the industry, helping businesses come together and collaborate both within Wales and internationally.

Envieta

Envieta

Envieta is a leader in cryptographic solutions. From server to sensor, we design and implement powerful security into new or existing infrastructure.

CV-Library

CV-Library

Start your job search with 216,931 live UK vacancies on award-winning CV-Library. Register your CV and find local jobs near you today!

ITQ Latam

ITQ Latam

ITQ Latam are specialists in cybersecurity, in a convergent ecosystem of technological solutions in infrastructure, cloud and security networks.

TIM Enterprise

TIM Enterprise

TIM Enterprise offers innovative, sustainable and secure 360-degree digital solutions to companies and public administrations.

Seal Security

Seal Security

Seal Security revolutionizes software supply chain security operations, empowering organizations to automate and scale their open source vulnerability remediation and patch management.

Efex

Efex

Efex is one of Australia’s leading Managed Technology Solutions providers. We service local companies across Australia, providing accessible, fast and straightforward IT.

CHERI Alliance

CHERI Alliance

CHERI Alliance is an industry initiative spearheading the global adoption of the Capability Hardware Enhanced RISC Instructions (CHERI) security technology across the computing industry.

Slide

Slide

Slide is a modern, security-first Business Continuity & Disaster Recovery (BCDR) company built exclusively for Managed Service Providers.

DOT Security

DOT Security

DOT Security provides advanced security services for businesses of all sizes.

Axiler

Axiler

Axiler’s AI-driven self-healing architecture seamlessly detect, patch, and neutralize threats in real-time, ensuring systems remain secure and ever-adaptable.