North Korea More Likely To Launch A Cyber Attack Than A Military Strike

North Korea is more likely to wage a cyber-attack against the United States than a military strike, according to Homeland Security Secretary John Kelly.

As tensions build between Pyongyang and Washington in anticipation of possible military action from either, Mr. Kelly said that North Korean dictator Kim Jong Un is more inclined to direct hackers against American cyber targets in lieu of deploying a more traditional arsenal.

“In the case of North Korea, you know, a kinetic threat against the United States right now I don’t think is likely, but certainly a cyber threat,” Mr. Kelly said in an interview on “Meet the Press.”

“So we would raise various threat levels in the event that something happened and we felt as though there were a possible threat. You always want to come down on the side of caution,” he said in a preview.

North Korea and the US each have threatened military action one another in recent days amid reports the former is readying a possible nuclear test to commemorate the anniversary this weekend of the birth of its founder, Kim il-Sung.

Yet despite being largely otherwise disconnected from the outside world, US officials have acknowledged the hermit kingdom is most certainly capable of compromising American computer networks, notably evidenced by the 2014 cyber-attack suffered by Sony Pictures Entertainment and widely attributed on North Korea.

Washington Times

You Might Also Read:

Cyber Attacks Against Korean Missile Launches:

Cyberwarfare: Borders Offer No Defense:

Surprise: N Korea Hacked S Korea Cyber Command:

War In The Information Age:

 

 

 

« Cybercrime Is A Growing Threat To Small Business
Time To Speak The Language Of Risk »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

HANDD Business Solutions

HANDD Business Solutions

HANDD are independent specialists in data protection with expertise at every stage of the Protect, Detect and Respond cycle, from consultancy and design, right through to installation.

Red Hat

Red Hat

Red Hat is a leader in open source software development. Our software security team proactively identifies weaknesses before they become problems.

Kaseya

Kaseya

Kaseya is a premier provider of unified IT management and security software for managed service providers (MSPs) and small to medium-sized businesses (SMBS).

Morphisec

Morphisec

Morphisec's world leading prevention-first software stops ransomware and other advanced attacks from endpoint to the cloud.

Jetico

Jetico

Jetico provides pure & simple data protection software for all sensitive information throughout the lifecycle. Solutions include data encryption and secure data erasure.

Bangladesh Computer Council (BCC)

Bangladesh Computer Council (BCC)

Bangladesh Computer Council (BCC) is a government body providing support for ICT related activities including formulating national ICT strategy and policy.

Fedco International

Fedco International

Fedco International is an IT and SCADA ICS Security consultancy firm.

Privacera

Privacera

Privacera enables consistent data governance, security, and compliance across all your data services - on-premises and in the cloud - so you can maximize the value of your data.

Saepio Solutions

Saepio Solutions

Saepio promote an all-encompassing approach to cybersecurity, ensuring the appropriate balance of budget and resource across Policy, Product and People.

Stratus Technologies

Stratus Technologies

Edge Computing solves the inherent challenges of bandwidth, latency, and security at edge locations to enable IIoT devices and data acquisition.

Spyderbat

Spyderbat

Spyderbat ATI closes the manual investigation gap between detection and response by instantly presenting causally connected threat activity to security analysts at the onset of an investigation.

Cyber Chasse

Cyber Chasse

Cyber Chasse is an IT consulting and staffing company offering a full range of cybersecurity solutions, contract staffing services and online training courses.

Cybergroot

Cybergroot

Cybergroot provides Cybersecurity Assessment services and professional Information Security trainings.

Abacus Group

Abacus Group

Abacus Group is a global IT services firm for alternative investment firms, providing an enterprise technology platform specifically designed to meet the unique needs of financial services.

Filigran

Filigran

Filigran provides threat intelligence, adversary simulation and crisis response open solutions to thousands of cybersecurity and crisis management teams across the world.

Blink Ops

Blink Ops

Blink helps security teams streamline everyday workflows and protect your organization better.