Rogue States Are Funding Stateless Hackers

Cyber-attacks are more likely to come from criminals funded by US enemies than from the enemies themselves, former National Security Agency director Mike Rogers said, speaking at the US  National Cyber Symposium in Colorado earlier this month

“Cyber criminals are a much bigger threat than nation-states.... some states are creating relationships with cyber criminals, giving them money, tools and targets. I suspect that will grow, and it won’t just be the Russians.”

Cyber-attacks will soon become a weapon, Rogers said, because of the growing number of internet-connected devices from cellphones and fitness trackers to thermostats and medical devices such as pacemakers. Rogers also warned that the Pentagon needs to change how it buys weapon systems to build in cyber security from the beginning and include funding for cyber updates and defensive “fixes,” since many systems have outdated cyber security protections by the time they are delivered. 

Rogers said that he is not concerned about a cyber “Pearl Harbor” or surprise attack on the US government or corporate computer networks because such an attack wouldn’t be a surprise, and governments and businesses have recovered more quickly from hackers than from natural disasters. 

He said he is more worried about breaches affecting health care information, because such data are widely shared and the devices measuring health data are multiplying. He added that  the NSA had “lost capabilities” due to leaked information by former contractor Edward Snowden. Those capabilities “had been publicly acknowledged and had to be shut down,” Rogers said. 

At a different conference session, John Chen, Executive Chairman and CEO of the telecoms company, BlackBerry, described how his company was headed for financial disaster when he arrived in 2013, with declining sales, dwindling cash and facing Chinese competitors who could sell similar devices for less than the cost of the parts for BlackBerry’s smartphones.

He said he had to slash costs so the company started to generate instead of burn through cash as competitors from China took advantage of lower costs to commoditixe the mobile phone market.  To come up with a new strategy, Chen said he refocused the company on privacy and security through software giving the company higher profit margins than selling consumer phones that were dropping in price.

The company made numerous acquisitions over the past six years as part of its new strategy, including its purchase late last year of antivirus software provider Cylance to add artificial intelligence capabilities to BlackBerry’s security products for internet-connected devices. 

Governing.com:      Image: Nick Youngson

You Might Also Read:

Cyber Security Threats Are Growing In 2019:

North Korea, WannaCry, Cyberattacks And Lazarus:

 

« Organised Social Media Manipulation
WEBINAR: How to perform a security investigation in AWS »

CyberSecurity Jobsite
Check Point

Directory of Suppliers

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

ZenGRC

ZenGRC

ZenGRC (formerly Reciprocity) is a leader in the GRC SaaS landscape, offering robust and intuitive products designed to make compliance straightforward and efficient.

IGEL Technology

IGEL Technology

IGEL Technology is one of the world's leading thin client vendors. Thin clients increase data security and compliance.

Security Network Munich

Security Network Munich

Security Network Munich brings together leading players in the field of information and cyber security through joint research and innovation projects.

CounterCraft

CounterCraft

The CounterCraft Cyber Deception Platform fits seamlessly into existing security strategies and delivers high-end deception for threat hunting and threat detection.

XM Cyber

XM Cyber

XM Cyber is a leading hybrid cloud security company that’s changing the way innovative organizations approach cyber risk.

u-blox

u-blox

u-blox deliver leading wireless technology to reliably and securely locate and connect people and devices.

Lexsynergy

Lexsynergy

Lexsynergy is a global domain name management and online brand protection company.

Zercurity

Zercurity

Zercurity is on a mission to build the ultimate cybersecurity operations platform for businesses. To help protect against a growing number of internal and external threats.

RocketCyber

RocketCyber

RocketCyber is a Managed SOC platform empowering Managed Service Providers (MSPs) to deliver security services to small and medium businesses.

Raiven Capital

Raiven Capital

Raiven Capital is a global early-stage technology venture capital fund. We focus on founder-led, driven companies on the leading edge of disruption.

DH2i

DH2i

DH2i is a leading provider of multi-platform Software Defined Perimeter and Smart Availability software enabling customers to create an entire IT infrastructure that is always-secure and always-on.

Rimini Street

Rimini Street

Rimini Street is a global provider of enterprise software support products and services, and the leading third-party support provider for Oracle and SAP software products.

Techmentum

Techmentum

At Techmentum, our mission is to utilize technology to help companies succeed. Our expertise includes fully managed IT services, cybersecurity, cloud, and custom technology solutions.

Awareness Software Limited (ASL)

Awareness Software Limited (ASL)

As Hosting Specialists, Awareness Software offer practical and affordable hosting solutions including backup and disaster recovery and a range of cybersecurity services.

Keeran Networks

Keeran Networks

Established in Edmonton in 1999, Keeran specializes in delivering comprehensive IT support and solutions aimed at optimizing technology investments for businesses.

Transcendental Technologies

Transcendental Technologies

Transcendental is a consulting organization which specializes in customized assurance services in the fields of Localization, Mobile Software Solutions, Web Design, Cyber Security & Cyber Forensics.

DRTConfidence

DRTConfidence

DRTConfidence is the proven solution for today’s organizations needing to meet rigorous compliance standards across the enterprise.