Cyber Weapons Are Proliferating Beyond Control

Cybersecurity headlines in recent years have been dominated by companies losing money by being hacked and leaking the data of millions of customers. 

But today, cybersecurity is moving beyond the financial impact to concerns over public safety, national security and even cyberwarfare. 

To understand the state of cyberwar and its potential impact, we should all keep in mind two things:

1. The proliferation of Cyber-Weapons is already happening

Countries are already stockpiling cyber-weapons that they can use against each other. These weapons could cause real world damage to public infrastructure, public utilities, and other facilities that could endanger people's lives and crash economies. 

The United States, China, and Russia are the most well-known stockpilers of cyber-weapons, but there are plenty of others engaged in the cyber-weapons arms race. 

We even saw during the 2018 US midterms that there were reports America was preparing a cyber-weapons attack on Russia if it was discovered that the Russians hacked the US election.

2. Arms control of Cyber-Weapons hasn't caught up

While the world has a decades-long history of treaties governing the use of weapons of mass destruction such as ballistic missiles, biochemical weapons, and nuclear arms, very little has been done yet to regulate cyber-weapons. 

The challenge is that most lawmakers and government officials have minimal understanding of how these weapons work, how they differ from traditional weapons, and the true dangers they can pose. 

The other challenge is that it is far faster and cheaper to create and stockpile cyber-weapons than traditional weapons. 

We should take a lesson from history and remember that both of the world wars were preceded by years of unchecked weapons buildup.

ZDNet:

You Might Also Read:

Is Cyber The Perfect Weapon?

« Cybercrime Is The Biggest Evolving Source Of Crime In The UK
Waymo Is First With Driverless Car Service »

CyberSecurity Jobsite
Check Point

Directory of Suppliers

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

Webroot

Webroot

Webroot delivers next-generation endpoint security and threat intelligence services to protect businesses and individuals around the globe.

Cristie Data

Cristie Data

Cristie have been a trusted, innovative and leading edge data storage, backup and virtualisation solutions provider across all sectors of industry for over 40 years.

Corero Network Security

Corero Network Security

Corero Network Security is dedicated to improving the security of the Internet through the deployment of its innovative DDoS & Network Security Solutions.

Fortinet

Fortinet

Fortinet is a provider of network security systems. Our products provide protection against dynamic security threats while simplifying the IT security infrastructure.

ProPay

ProPay

ProPay provides secure payment solutions for organizations ranging from small businesses to large enterprises requiring complex payment solutions.

Guy Carpenter

Guy Carpenter

Guy Carpenter delivers a powerful combination of broking expertise, strategic advisory services, and industry-leading analytics.

ThreatQuotient

ThreatQuotient

ThreatQuotient delivers an open and extensible threat intelligence platform to provide defenders the context, customization and collaboration needed for increased security effectiveness.

SmartCyber

SmartCyber

SmartCyber is a company specializing in custom IT projects and Cybersecurity.

Spike Reply

Spike Reply

Spike Reply is the company within the Reply Group focusing on cybersecurity and personal data protection.

Allentis

Allentis

Allentis provide adapted solutions to ensure the security and performance of your information system.

Cardonet

Cardonet

Cardonet is an IT Support and IT Services business offering end-to-end IT services, 24x7 IT Support to IT Consultancy, Managed IT and Cyber Security.

WhizHack Technologies

WhizHack Technologies

WhizHack's mission is to not only create a pipeline of cyber security products but also to empower people to sustainable innovation in securing digital assets of tomorrow.

Axiata Digital Labs

Axiata Digital Labs

Axiata Digital Labs is the technology hub of Axiata Group Berhad Malaysia which is one of the leading groups in telecommunication in Asia.

Total Secure Technology

Total Secure Technology

Total Secure Technology provides trusted Managed IT Security and Managed IT Services for organizations looking to increase their cybersecurity defensive posture.

eGeneration

eGeneration

eGeneration is one of the leading technology solutions and system integration companies in Bangladesh.

Clango

Clango

Clango employs an identity-centric approach to optimizing your cybersecurity investment while minimizing risk.