Rogue States Are Funding Stateless Hackers

Cyber-attacks are more likely to come from criminals funded by US enemies than from the enemies themselves, former National Security Agency director Mike Rogers said, speaking at the US  National Cyber Symposium in Colorado earlier this month

“Cyber criminals are a much bigger threat than nation-states.... some states are creating relationships with cyber criminals, giving them money, tools and targets. I suspect that will grow, and it won’t just be the Russians.”

Cyber-attacks will soon become a weapon, Rogers said, because of the growing number of internet-connected devices from cellphones and fitness trackers to thermostats and medical devices such as pacemakers. Rogers also warned that the Pentagon needs to change how it buys weapon systems to build in cyber security from the beginning and include funding for cyber updates and defensive “fixes,” since many systems have outdated cyber security protections by the time they are delivered. 

Rogers said that he is not concerned about a cyber “Pearl Harbor” or surprise attack on the US government or corporate computer networks because such an attack wouldn’t be a surprise, and governments and businesses have recovered more quickly from hackers than from natural disasters. 

He said he is more worried about breaches affecting health care information, because such data are widely shared and the devices measuring health data are multiplying. He added that  the NSA had “lost capabilities” due to leaked information by former contractor Edward Snowden. Those capabilities “had been publicly acknowledged and had to be shut down,” Rogers said. 

At a different conference session, John Chen, Executive Chairman and CEO of the telecoms company, BlackBerry, described how his company was headed for financial disaster when he arrived in 2013, with declining sales, dwindling cash and facing Chinese competitors who could sell similar devices for less than the cost of the parts for BlackBerry’s smartphones.

He said he had to slash costs so the company started to generate instead of burn through cash as competitors from China took advantage of lower costs to commoditixe the mobile phone market.  To come up with a new strategy, Chen said he refocused the company on privacy and security through software giving the company higher profit margins than selling consumer phones that were dropping in price.

The company made numerous acquisitions over the past six years as part of its new strategy, including its purchase late last year of antivirus software provider Cylance to add artificial intelligence capabilities to BlackBerry’s security products for internet-connected devices. 

Governing.com:      Image: Nick Youngson

You Might Also Read:

Cyber Security Threats Are Growing In 2019:

North Korea, WannaCry, Cyberattacks And Lazarus:

 

« Organised Social Media Manipulation
WEBINAR: How to perform a security investigation in AWS »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Resecurity, Inc.

Resecurity, Inc.

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

TZ-CERT

TZ-CERT

TZ-CERT is the National Computer Emergence Response Team of Tanzania.

PartnerRe

PartnerRe

PartnerRe Ltd. provides multi-line reinsurance to insurance companies on a worldwide basis. Services include Cyber Risk.

ThreatMark

ThreatMark

ThreatMark provides fraud detection solutions for digital banking and payments.

Ensign InfoSecurity

Ensign InfoSecurity

Ensign InfoSecurity is Southeast Asia’s largest pure-play cybersecurity firm.

Sera-Brynn

Sera-Brynn

Sera-Brynn is one of the highest-ranked, pure-play cybersecurity compliance and advisory firms in the world.

Montimage

Montimage

Montimage develops tools for testing and monitoring networks, applications and services; in particular, for the verification of functional, performance (QoS/QoE) and security aspects.

Barbara IoT

Barbara IoT

Barbara is an industrial device platform specifically designed for IoT deployments.

Bright Machines

Bright Machines

Bright Machines delivers intelligent, software-defined manufacturing by bringing together our flexible factory robots with intelligent software, production data and machine learning.

Vector Informatik

Vector Informatik

Vector Informatik is a specialist in automotove electronics and provides services, embedded software and tools for securing embedded systems against cyber-attacks.

HUB Security

HUB Security

Hub Security provide Ultra Secure, Military Grade HSM (Hardware Security Module) Solutions for Blockchain and Digital Assets.

Tehtris

Tehtris

TEHTRIS XDR Platform was developed to control and improve the IT security of private and public companies against advanced cyber threats such as cyber espionage or cyber sabotage activities.

Enso Security

Enso Security

Enso is the first Application Security Posture Management (ASPM) solution, helping security teams everywhere eliminate their AppSec chaos with application discovery, classification and management.

Zaviant Consulting

Zaviant Consulting

Zaviant Consulting is a leading data security and privacy consulting firm assisting organizations comply with constantly evolving security frameworks and privacy regulations.

Concourse Labs

Concourse Labs

Concourse Labs Security Guardrails continuously verify cloud infrastructure and workloads. Continuously assess clouds for security, resiliency, and regulatory compliance.

ASPIA InfoTech

ASPIA InfoTech

ASPIA Infotech is a leading Information and cybersecurity organization focused on innovative approaches to avert targeted attacks.

Two99

Two99

Two99 provide tailored excellence in the areas of E-Commerce, Marketing, Consulting, and Cyber Security.