The Cyber Security Top Ten Power List

The continuing rise of nation-state and state sponsored  hackers has been one of the most compelling  cyber security developments of recent years. The exploits of the  Russian hacking groups, including Fancy Bear and Turla, have earned them both international renown and notoriety. The so called 'Hack of the Decade' against US Government agencies and numerous leading private sector organisations which took place in 2020 is almost certainly the work of sophisticated professional hackers from Russia. 

China, North Korea and Iran all posses powerful, well resourced and astonishingly effective hacking groups, capable of sustained and highly damaging espionage, sabotage and theft. In the case of North Korea, a concerted multiyear campaign targeting Banks and other financial institutions has largely funded the nation's nuclear weapons program.

According to the team at the Belfer Center for Science and International Affairs at Harvard's Kennedy School, the most powerful cyber countries in the world are as follows:   

1. USA  
2. China
3. UK
4. Russia
5. Netherlands
6. France
7. Germany
8. Canada
9. Japan
10. Australia 

Surprisingly, this list includes neither Israel nor Iran, which might be thought more obvious candidates for this list rather than Germany or Australia, which have both figured prominently as victims of cyber attacks from hostile nations.

Cyber espionage has been going on pretty much since the dawn of the web, with Russia, China, Iran and North Korea generally seen as the most likely to be engaging in cyber-espionage campaigns against Western targets. Their Advanced Persistent Threat (APT) hacking groups target governments and organisations around the world.

Western governments are also investing heavily in their own cyber-espionage expertise and one of the most high-profile cyber attacks, the Stuxnet worm used against the Iranian nuclear project, was led by the US. 

Now, a new set of countries are beginning to use the same tactics as some of their larger and more powerful rivals. Some states, like China, France, Singapore and the United States, have created higher-level military commands and substantial dedicated force structures. In these cases, there can be the added complication of overlaps, in terms of doctrine and force structure, between cyber operations and information warfare operations. Other states, like Israel and the Britain, rely more heavily on structures that integrate their military and civilian capabilities.

All of these events clearly point to a growing recognition of the vital strategic value of a nation's cyber security skills for both defensive and offensive purposes. To update Chairman Mao's belief that political power grows from the barrel of a gun some might say that in the 21st century, it emerges via a computer keyboard. 

Harvard Belfer Center:     IISS:           ZDNet:      World Economic Forum:     SecureWorldExpo

You Might Also Read: 

Iran's Cutting Edge Cyberwar Capabilities:

 

« AI Will Soon Replace Cyber Security Staff
How Nation States Use Their Cyber Power »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Lakeside Software

Lakeside Software

Lakeside Software is how organizations with large, complex IT environments can finally get visibility across their entire digital estates and see how to do more with less.

InAuth

InAuth

InAuth Security Platform delivers advanced device identification, risk detection, and analysis capabilities to help organizations limit risk and reduce fraud.

Mixed Mode

Mixed Mode

Mixed Mode is a specialist in embedded and software engineering for applications including IoT and secure embedded systems.

Crest International

Crest International

Crest is focused on professionalizing the technical cyber security market whilst driving quality and standards of organizations that operate within it.

MAY Cyber Technology

MAY Cyber Technology

MAY Cyber Technology is a Security Management solutions provider located in Turkey & Germany.

Zeneth Technology Partners

Zeneth Technology Partners

Zeneth is a consulting firm providing information technology and cybersecurity services to federal and commercial clients.

Aspen Insurance

Aspen Insurance

Aspen is a leading diversified specialty insurance and reinsurance company. Products offered include cyber insurance.

Intuity

Intuity

The Intuity suite of services provides companies with a complete awareness of their security status and helps them in an efficient, efficient and sustainable improvement process.

Pratum

Pratum

Pratum is an information security services firm that helps clients solve challenges based on risk, not fear.

Guernsey

Guernsey

Guernsey provides a wide range of engineering, architecture and consulting services to multiple markets, including cybersecurity consulting and CMMC certification.

Quantum eMotion (QeM)

Quantum eMotion (QeM)

Quantum eMotion is a Montreal-based advanced developer leading the way towards a new generation of quantum-safe encryption for the quantum computing age.

Custodia Continuity

Custodia Continuity

Custodia Continuity manage your Security, Backup, Continuity and Compliance. You get on with your business.

Credo AI

Credo AI

Credo have pioneered a Responsible AI platform that enables context driven, comprehensive and continuous governance, oversight and accountability of AI.

Barquin Solutions

Barquin Solutions

Barquin Solutions is a full-service information technology consulting firm focused on supporting U.S. federal government agencies and their partners.

Seven AI

Seven AI

Seven AI develops cyber security software designed to identify online threats.

Cygence

Cygence

Cygence is a cyber security consultancy providing independent expertise and tailored security solutions.