Estonia’s Cyber Revenge

Estonia, the small eastern European nation that says it was the first target of state-sponsored cyber warfare from Russia, may soon be able to strike back. 

Mirroring larger NATO members, its military is assembling a cyber-command unit to combat virtual attacks that have been growing by as much as 20 percent a year.

As well as defensive strategies, the team of 300 people will develop offensive capabilities, though these won’t be deployed during peacetime.

“To prepare for defense, you need to know how to attack,” Col. Andres Hairk, head of the cyber-command unit, said in an interview before this week’s official opening.

“When the real need arises, through armed conflict or war, then this capability that’s been developed to test our systems can be employed against potential adversaries.”

While Russia’s army is more than 150 times bigger, Estonia may have an edge on the cyber battlefield. As well as being a technology hub that helped create Skype, the Baltic country of 1.3 million people hosts NATO’s cyber-defense center and organised the first cyber exercises for European Union defense ministers last year.

The nation, once an unwilling member of the Soviet Union, also has first-hand knowledge of the kind of attacks it’s looking to see off.

In 2007, Estonia suffered cyber-attacks that disabled government, banking and media websites following a row with the Kremlin over the relocation of a World War II memorial in Tallinn.

Nine years later, hackers that researchers later connected to Russian military intelligence were accused of attacking Estonia’s largest shale-oil producer. Russia denied involvement in both incidents and Hairk refused to name it, or any other countries, as potential threats.

Bloomberg

You Might Also Read: 

EU Creates A Unified Cyber-Force:

Which Countries Are Ready For Cyberwar?:

« Bank Industry Is Turning On To AI Technology
Criminals Are Driving Australian Data Breaches »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 7,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

authen2cate

authen2cate

Authen2cate offers a simple way to provide application access with our Identity and Access Management (IAM) solutions for enterprise, small business, and individual customers alike.

CyberArk Software

CyberArk Software

CyberArk is an established leader in privileged access management and offers the most complete set of Identity Security capabilities.

Avatier

Avatier

Avatier identity management software products automate identity access management, user provisioning and IT governance to ensure information security and compliance.

Beta Systems Software

Beta Systems Software

Beta Systems automate IT-based business processes, control access rights, monitor processes, secure the network and optimize the infrastructure management of corporate IT.

FFRI Security

FFRI Security

FFRI is committed to research and development of preventing the most advanced cyber-attacks and breaches.

Cybersecurity Competence Center (C3)

Cybersecurity Competence Center (C3)

The Cybersecurity Competence Center was created to further strengthen the Luxembourg economy in the field of cybersecurity.

Aiuken Cybersecurity

Aiuken Cybersecurity

Aiuken is an international IT Security company, focused on communications and IT technologies, specialised in Security and Cloud Services solutions with high added value.

GBT Technologies

GBT Technologies

GBT Technologies is a technology company focused on chip design and software to enable IoT, global mesh networks, and for applications relating to artificial intelligence.

Udacity

Udacity

Udacity's mission is to train the world’s workforce in the careers of the future. Our programs range from beginner to expert levels and deliver the hands-on skills for real-world expertise.

Stronghold Cyber Security

Stronghold Cyber Security

Stronghold Cyber Security is a consulting company that specializes in NIST 800, the Cybersecurity Framework and the Cybersecurity Maturity Model Certification.

Appurity

Appurity

Appurity specialises in mobile and application security, delivering comprehensive solutions across all verticals.

Heron Technology

Heron Technology

Heron Technology are a technology solutions consultancy with core competencies in the areas of Cyber Security and Digital Aviation.

Ofcom

Ofcom

Ofcom is the UK's communications regulator. We regulate the TV, radio and video on demand sectors, fixed line telecoms, mobiles, postal services, plus the airwaves over which wireless devices operate.

OxCyber

OxCyber

OxCyber's mission is to ignite and encourage cybersecurity and technology growth in the Thames Valley through meetings, webinars, in person events, workshops and mentorship programs.

Seal Security

Seal Security

Seal Security revolutionizes software supply chain security operations, empowering organizations to automate and scale their open source vulnerability remediation and patch management.

Secomea

Secomea

Secomea redefines manufacturing plant security by combining internationally recognized industry best practices as critical components of our robust cybersecurity strategy.