The Cyber Security Top Ten Power List

The continuing rise of nation-state and state sponsored  hackers has been one of the most compelling  cyber security developments of recent years. The exploits of the  Russian hacking groups, including Fancy Bear and Turla, have earned them both international renown and notoriety. The so called 'Hack of the Decade' against US Government agencies and numerous leading private sector organisations which took place in 2020 is almost certainly the work of sophisticated professional hackers from Russia. 

China, North Korea and Iran all posses powerful, well resourced and astonishingly effective hacking groups, capable of sustained and highly damaging espionage, sabotage and theft. In the case of North Korea, a concerted multiyear campaign targeting Banks and other financial institutions has largely funded the nation's nuclear weapons program.

According to the team at the Belfer Center for Science and International Affairs at Harvard's Kennedy School, the most powerful cyber countries in the world are as follows:   

1. USA  
2. China
3. UK
4. Russia
5. Netherlands
6. France
7. Germany
8. Canada
9. Japan
10. Australia 

Surprisingly, this list includes neither Israel nor Iran, which might be thought more obvious candidates for this list rather than Germany or Australia, which have both figured prominently as victims of cyber attacks from hostile nations.

Cyber espionage has been going on pretty much since the dawn of the web, with Russia, China, Iran and North Korea generally seen as the most likely to be engaging in cyber-espionage campaigns against Western targets. Their Advanced Persistent Threat (APT) hacking groups target governments and organisations around the world.

Western governments are also investing heavily in their own cyber-espionage expertise and one of the most high-profile cyber attacks, the Stuxnet worm used against the Iranian nuclear project, was led by the US. 

Now, a new set of countries are beginning to use the same tactics as some of their larger and more powerful rivals. Some states, like China, France, Singapore and the United States, have created higher-level military commands and substantial dedicated force structures. In these cases, there can be the added complication of overlaps, in terms of doctrine and force structure, between cyber operations and information warfare operations. Other states, like Israel and the Britain, rely more heavily on structures that integrate their military and civilian capabilities.

All of these events clearly point to a growing recognition of the vital strategic value of a nation's cyber security skills for both defensive and offensive purposes. To update Chairman Mao's belief that political power grows from the barrel of a gun some might say that in the 21st century, it emerges via a computer keyboard. 

Harvard Belfer Center:     IISS:           ZDNet:      World Economic Forum:     SecureWorldExpo

You Might Also Read: 

Iran's Cutting Edge Cyberwar Capabilities:

 

« AI Will Soon Replace Cyber Security Staff
How Nation States Use Their Cyber Power »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall And Why Does It Matter

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall And Why Does It Matter

See how to use next-generation firewalls (NGFWs) and how they boost your security posture.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

National Response Centre for Cyber Crime (NR3C)

National Response Centre for Cyber Crime (NR3C)

National Response Centre for Cyber Crime (NR3C) is a law enforcement agency in Pakistan dedicated to fighting cyber crime.

ISF Annual World Congress

ISF Annual World Congress

ISF Annual World Congress, our flagship global event, offers attendees an opportunity to discuss and find solutions to current security challenges.

Simula Research Laboratory

Simula Research Laboratory

Simula Research Laboratory carries out research in the fields of communication systems, scientific computing and software engineering.

Namogoo

Namogoo

Namogoo’s disruptive technology identifies and blocks unauthorized product ads that are injected into customer web sessions by client-side Digital Malware.

ReversingLabs

ReversingLabs

ReversingLabs develops cyber threat detection and mitigation tools that address the the latest directed attacks, advanced persistent threats and polymorphic malware.

V-Key

V-Key

V-Key is a global leader in software based digital security, providing solutions for mobile identity, authentication, authorization, and mobile payments for major banks.

CyberPrism

CyberPrism

CyberPrism provides SaaS solutions using proprietary technology, underpinned by industry-leading technical practitioners to protect OT within Government, Maritime and Industrial markets.

Radically Open Security

Radically Open Security

Radically Open Security is the world's first not-for-profit computer security consultancy company.

IAmI Authentications

IAmI Authentications

IAmI is a first in Tokenization Cloud-based IAM Security Services, delivering the most advanced form of Two-Factor Authentication.

Fiserv

Fiserv

Fiserv offers a wide array of Risk & Compliance solutions to help you prevent losses from fraud and ensure adherence to regulatory and compliance mandates.

HackHunter

HackHunter

HackHunter’s passive sensor network continuously monitors, detects and alerts when a malicious WiFi network and/or hacking behaviour is identified.

Sentor Managed Security Services

Sentor Managed Security Services

Sentor Managed Security Services is a cybersecurity company that enables organizations to exist in a digitally connected world.

Kiberna

Kiberna

Kiberna are a small but niche company specialising in data driven security to manage your cyber risks.

Focus Digitech

Focus Digitech

Focus Digitech helps you with your digital transformation journey with our main core offerings of Cloud, Cybersecurity, Analytics and DevOps.

Rescana

Rescana

Rescana offers a cyber risk management platform with the vision to remove the security team bottlenecks, accelerating business processes that require risk assessment.

Google Safety Engineering Center (GSEC)

Google Safety Engineering Center (GSEC)

GSEC Málaga is an international cybersecurity hub where Google experts work to understand the cyber threat landscape and to create tools that keep users around the world safer online.