The Big Three: N. Korea, ISIS and CyberWar

Director of National Intelligence James Clapper delivered his annual assessment of the top dangers facing the U.S to the Senate Armed Services Committee recently. 

Clapper said North Korea has expanded a uranium enrichment facility and restarted a plutonium reactor.

Clapper also said that Islamic militants will continue plotting against US interests overseas and homegrown attacks will pose the most significant threat from violent extremists to Americans at home.

"The perceived success of attacks by homegrown violent extremists in Europe and North America, such as those in Chattanooga and San Bernardino, might motivate others to replicate opportunistic attacks with little or no warning, diminishing our ability to detect terrorist operational planning and readiness," he said.

"ISIL involvement in homeland attack activity will probably continue to involve those who draw inspiration from the group's highly sophisticated media without direct guidance from ISIL leadership," he said using an acronym for the militant group.

Clapper also said Iran remains the top state sponsor of terrorism, al-Qaida-linked groups remain resilient and the US will continue to see cyber threats from China, Russia and North Korea.

Clapper also said, US information systems, controlled by the US government and American industry, are vulnerable to cyberattacks from Russia and China.

North Korea "probably remains capable and willing to launch disruptive or destructive cyberattacks to support its political objectives," he said.

Moscow "is assuming a more assertive cyber posture" that is based on its willingness to target critical infrastructure and carry out espionage operations even when those operations have been detected and under increased public scrutiny, Clapper said.

Russia's cyber operations are likely to target US interests in part to underpin its intelligence gathering to support Russia's moves in the Ukraine and Syrian crises, he said.

Clapper said China selectively uses cyberattacks against targets Beijing believes threaten Chinese domestic stability or regime legitimacy.

"We will monitor compliance with China's September 2015 commitment to refrain from conducting or knowingly supporting cyber-enabled theft of intellectual property with the intent of providing competitive advantage to companies or commercial sectors," he said.

Ein News: http://bit.ly/1VyNSRK

« The Sony Hackers Are Alive And Still Hacking
All The Gadgets Coming To Your Next Car »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall And Why Does It Matter

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall And Why Does It Matter

See how to use next-generation firewalls (NGFWs) and how they boost your security posture.

Get Cyber Safe

Get Cyber Safe

Get Cyber Safe is a national public awareness campaign created to educate Canadians about Internet security and the simple steps they can take to protect themselves online.

Zerto

Zerto

Zerto provides enterprise-class disaster recovery and business continuity software specifically for virtualized data centers and cloud environments.

HireVergence

HireVergence

HireVergence is a full service IT staffing and recruiting firm with a focus on cyber and information security.

Cyber Indemnity Solutions (CIS)

Cyber Indemnity Solutions (CIS)

CIS is an InsurTech company focused on licensing innovative cyber risk insurance solutions to the global insurance industry.

HYPR

HYPR

HYPR Decentralized Authentication minimizes the risk of enterprise data breaches while providing an enhanced user experience for your customers and employees.

AXA XL

AXA XL

AXA XL is the P&C and Specialty Risk Division of AXA. Professional insurance products include Cyber Insurance.

Telecommunications & Digital Government Regulatory Authority (TDRA) - UAE

Telecommunications & Digital Government Regulatory Authority (TDRA) - UAE

TDRA focuses on regulating the telecommunications sector and enabling government entities in the field of smart transformation. It is responsible for the overall digital infrastructure in the UAE.

IntaPeople

IntaPeople

IntaPeople are IT and engineering recruitment specialists. We have specialist teams for job sectors including Cybersecurity, IT infrastructure and DevOps.

Guardian Digital

Guardian Digital

Guardian Digital makes email safe for business. Threat-ready business email protection. Fully supported.

PSafe

PSafe

PSafe is a leading provider of mobile privacy, security, and performance apps. We deliver innovative products that protect your freedom to safely connect, share, play, express and explore online.

Hybrid Identity Protection Conference (HIP)

Hybrid Identity Protection Conference (HIP)

Hybrid Identity Protection (HIP) is the premier educational forum for identity-centric cybersecurity practitioners charged with defending hybrid cloud environments.

E2E Technologies

E2E Technologies

E2E Technologies are a proactive, SLA-beating, managed service provider that busts the common stereotypes surrounding IT.

LocateRisk

LocateRisk

LocateRisk provides more efficiency, transparency and comparability in IT security with automated, KPI-based IT risk analyses.

Verica

Verica

Verica uses chaos engineering to make systems more secure and less vulnerable to costly incidents.

Virtual Technologies Group (VTG)

Virtual Technologies Group (VTG)

Virtual Technologies Group is a single source, IT product and services provider for SMBs and IT departments, delivering reliable, cost-efficient service, maintenance and support solutions.

ConductorOne

ConductorOne

ConductorOne is building the identity security platform for the modern workforce.