Cyber Weapons Are Proliferating Beyond Control

Cybersecurity headlines in recent years have been dominated by companies losing money by being hacked and leaking the data of millions of customers. 

But today, cybersecurity is moving beyond the financial impact to concerns over public safety, national security and even cyberwarfare. 

To understand the state of cyberwar and its potential impact, we should all keep in mind two things:

1. The proliferation of Cyber-Weapons is already happening

Countries are already stockpiling cyber-weapons that they can use against each other. These weapons could cause real world damage to public infrastructure, public utilities, and other facilities that could endanger people's lives and crash economies. 

The United States, China, and Russia are the most well-known stockpilers of cyber-weapons, but there are plenty of others engaged in the cyber-weapons arms race. 

We even saw during the 2018 US midterms that there were reports America was preparing a cyber-weapons attack on Russia if it was discovered that the Russians hacked the US election.

2. Arms control of Cyber-Weapons hasn't caught up

While the world has a decades-long history of treaties governing the use of weapons of mass destruction such as ballistic missiles, biochemical weapons, and nuclear arms, very little has been done yet to regulate cyber-weapons. 

The challenge is that most lawmakers and government officials have minimal understanding of how these weapons work, how they differ from traditional weapons, and the true dangers they can pose. 

The other challenge is that it is far faster and cheaper to create and stockpile cyber-weapons than traditional weapons. 

We should take a lesson from history and remember that both of the world wars were preceded by years of unchecked weapons buildup.

ZDNet:

You Might Also Read:

Is Cyber The Perfect Weapon?

« Cybercrime Is The Biggest Evolving Source Of Crime In The UK
Waymo Is First With Driverless Car Service »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Bishop Fox

Bishop Fox

Bishop Fox is a leading authority in offensive security, providing solutions ranging from continuous penetration testing and attack surface management to product and application security assessments.

Octopus Cybercrime Community

Octopus Cybercrime Community

The Octopus Community is a platform for information sharing and cooperation on cybercrime and electronic evidence.

Engineering Group

Engineering Group

Engineering is the Digital Transformation Company, a leader in Italy and with over 80 offices across Europe, the United States, and South America.

Thinklogical

Thinklogical

Thinklogical manufactures secure, KVM, video, audio, and computer peripheral signal switching solutions for defence C4ISR applications.

Pradeo

Pradeo

Pradeo Security offers a complete, automatic and seamless protection to mobile devices and applications, aligned with your organization security policy while preserving business agility.

Lynx Technology Partners

Lynx Technology Partners

Lynx Technology Partners is a full service, full life-cycle risk-based security consulting firm.

limes datentechnik

limes datentechnik

limes datentechnik is an authority in the fields of cryptography and data compression. The FLAM product family is an internationally accepted standard for efficient and safe handling of data.

Idaptive

Idaptive

Idaptive delivers Next-Gen Access through a zero trust approach. Idaptive secures access everywhere with single sign-on, adaptive MFA, EMM and analytics.

Wizard Cyber

Wizard Cyber

At Wizard Cyber, we simplify cyber security, delivering an advanced service that protects your high-risk assets from the complex threats that technology alone can miss, 24/7.

Hyperion Gray

Hyperion Gray

Hyperion Gray are a small research and development team focused on innovative work in a variety of areas including Software & Security Research, Penetration Testing, Incident Response, and Red Teaming

FPT Software

FPT Software

As a leading technology service provider, FPT assists customers of all sizes and from any industries in implementing and adapting digital technologies including cybersecurity.

Eventus Security

Eventus Security

Eventus, are a team of highly skilled professionals who are committed to deliver excellence in next generation cyber security services and customized solutions for your enterprise.

Ingenics Digital

Ingenics Digital

Ingenics Digital is a recognized initiator and leading service provider in the areas of software development and embedded systems.

Resmo

Resmo

Resmo is an all in one platform for SaaS app and access management for modern IT teams.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

Aspiron Search

Aspiron Search

Aspiron Search is a niche-focused Cybersecurity search firm that works exclusively with venture-backed Cybersecurity firms.