The Cyber Security Top Ten Power List

The continuing rise of nation-state and state sponsored  hackers has been one of the most compelling  cyber security developments of recent years. The exploits of the  Russian hacking groups, including Fancy Bear and Turla, have earned them both international renown and notoriety. The so called 'Hack of the Decade' against US Government agencies and numerous leading private sector organisations which took place in 2020 is almost certainly the work of sophisticated professional hackers from Russia. 

China, North Korea and Iran all posses powerful, well resourced and astonishingly effective hacking groups, capable of sustained and highly damaging espionage, sabotage and theft. In the case of North Korea, a concerted multiyear campaign targeting Banks and other financial institutions has largely funded the nation's nuclear weapons program.

According to the team at the Belfer Center for Science and International Affairs at Harvard's Kennedy School, the most powerful cyber countries in the world are as follows:   

1. USA  
2. China
3. UK
4. Russia
5. Netherlands
6. France
7. Germany
8. Canada
9. Japan
10. Australia 

Surprisingly, this list includes neither Israel nor Iran, which might be thought more obvious candidates for this list rather than Germany or Australia, which have both figured prominently as victims of cyber attacks from hostile nations.

Cyber espionage has been going on pretty much since the dawn of the web, with Russia, China, Iran and North Korea generally seen as the most likely to be engaging in cyber-espionage campaigns against Western targets. Their Advanced Persistent Threat (APT) hacking groups target governments and organisations around the world.

Western governments are also investing heavily in their own cyber-espionage expertise and one of the most high-profile cyber attacks, the Stuxnet worm used against the Iranian nuclear project, was led by the US. 

Now, a new set of countries are beginning to use the same tactics as some of their larger and more powerful rivals. Some states, like China, France, Singapore and the United States, have created higher-level military commands and substantial dedicated force structures. In these cases, there can be the added complication of overlaps, in terms of doctrine and force structure, between cyber operations and information warfare operations. Other states, like Israel and the Britain, rely more heavily on structures that integrate their military and civilian capabilities.

All of these events clearly point to a growing recognition of the vital strategic value of a nation's cyber security skills for both defensive and offensive purposes. To update Chairman Mao's belief that political power grows from the barrel of a gun some might say that in the 21st century, it emerges via a computer keyboard. 

Harvard Belfer Center:     IISS:           ZDNet:      World Economic Forum:     SecureWorldExpo

You Might Also Read: 

Iran's Cutting Edge Cyberwar Capabilities:

 

« AI Will Soon Replace Cyber Security Staff
How Nation States Use Their Cyber Power »

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

CERT-FR

CERT-FR

CERT-FR is the French national government computer security incident response team.

Sysmosoft

Sysmosoft

Sysmosoft specializes in providing highly secured telecommunication solutions for mobile devices for companies requiring protected access to sensitive data remotely.

Total Defense

Total Defense

Total Defense solutions include anti-malware, anti-virus, intrusion prevention & mobile security.

ZenGRC

ZenGRC

ZenGRC (formerly Reciprocity) is a leader in the GRC SaaS landscape, offering robust and intuitive products designed to make compliance straightforward and efficient.

Elemendar

Elemendar

Elemendar Artificial Intelligence reads cyber threat reports written by humans and translates them into industry-standard, machine-readable and machine-actionable data.

Pentest People

Pentest People

Pentest People are a UK-based security consultancy focussing on bringing the benefits of Pentesting as a Service (PTaaS) to all its clients.

NFIR

NFIR

NFIR is a specialist in the field of cyber security incident response and digital forensics.

Inspira Enterprise

Inspira Enterprise

Inspira Enterprise is a leading digital transformation company with expertise in Cyber Security, Internet of Things (IOT), Blockchain, Big Data & Analytics, Intelligent Automation and Cloud Computing.

Aversafe

Aversafe

Aversafe provides individuals, employers and certificate issuers around the world with a first line of defense against credential fraud.

Digital Identification & Authentication Council of Canada (DIACC)

Digital Identification & Authentication Council of Canada (DIACC)

DIACC is a non-profit coalition of public and private sector leaders committed to developing a Canadian framework for digital identification and authentication.

Grip Security

Grip Security

Grip Security provides comprehensive visibility, governance and data security to help enterprises effortlessly secure a burgeoning and chaotic SaaS ecosystem.

Framatome

Framatome

Framatome Cybersecurity portfolio is directly inspired by its unique experience in nuclear safety for critical information systems and electrical systems design.

ECS Ethiopia

ECS Ethiopia

ECS Ethiopia provides Ethiopia’s leading institutions with top cyber-security expertise and technology to enable them to overcome risks and market barriers enabling them to grow their business.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

CyberSecAsia

CyberSecAsia

CyberSecAsia series conference is the one and only decision-makers gathering for CISO and info security experts in Asia.

Replica

Replica

Replica creates authentic virtual environments that ensure identities and assets are always protected no matter where or what work needs to get done.