US Cyber Strike On Iran Is A Step Change

After the US launched a cyber-attack on Iran’s weapons systems last month, military warfare could increasingly look like a loss of connectivity, rather than a loss of life, according to a cyber-security expert.

The attack on Iran’s security systems, used to control its rocket and missile launches, was a “game changing” event for both the cyber-security industry and “how we think about geopolitics,” Haiyan Song, the Senior Vice President of IT / Security firm Splunk. “A military action got diverted to really becoming a cyber action,” said Song being interviewed by CNBC.

US President Trump reportedly approved the cyber-attack against the Islamic Revolutionary Guard Corps on June 22, days after Tehran shot down a surveillance drone. 

Days before the cyber-attack, Trump had called off a conventional military assault against Iran, saying that the expected loss of life, estimated to be about 150 people, would have been disproportionate to the downing of the unmanned drone.
The attack marked the latest chapter in the US and Iran’s on-going cyber operations against each other. Tensions have been escalating between Washington and Tehran, after the US unilaterally withdrew from the 2015 nuclear deal with Iran last year and began a policy of “maximum pressure” campaign aimed at ending its nuclear ambitions.

Asked if she anticipated a ramping up of such cyberattacks as a means of warfare, Song, senior vice president and general manager of security markets at the multinational software company, was unequivocal.

“The short answer is absolutely,” Song said at the World Economic Forum in Dalian, China. “I think this is really a new way for a lot of countries and nation states to really think about their competitiveness in the military world.”

Such forms of cyber-attacks are also growing in the business world, Song noted, highlighting phishing attacks and the infiltration of cloud technology as two particular areas of disruption.

She added that as inter-connectivity increases, “the vengeance, the frequency and the speed and the coverage” of such attacks will only grow.

CNBC:

You Might Also Read: 

The ‘Rules’ Of Modern Warfare Are Being Rewritten:

The Human Cost Of Cyberwar:

 

 

« The Cyber Effects Of Industry 4.0 On Warfare
Professionals Say Network Security is Getting Harder »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Cambray Solutions

Cambray Solutions

Cambray Solutions specializes in locating and securing technical professionals, managers, and executives.

Crypta Labs

Crypta Labs

Crypta Labs is an Award Winning IOT Security startup that is developing a quantum-based encryption chip to secure the Internet of Things.

Cryptsoft

Cryptsoft

Cryptsoft provides key management and security software development toolkits based around open standards such as OASIS KMIP and PKCS#11.

Security & Intelligence Agency (SOA) - Croatia

Security & Intelligence Agency (SOA) - Croatia

SOA is the Croatian security and intelligence service. Areas of activity include Cyber Security and Information Security.

Aergo

Aergo

Aergo offers an easier and more proven way to adopt blockchain and transform your business while building on your existing IT and cloud assets.

Quantum Generation

Quantum Generation

Quantum Cyber Security for a new age of communications. We are developing the largest decentralized orbital, and ground quantum mesh network based on blockchain technology.

Passbase

Passbase

Passbase is building a full-stack identity verification engine backed by verified government documents.

TechDemocracy

TechDemocracy

TechDemocracy are a trusted, global cyber risk assurance solutions provider whose DNA is rooted in cyber advisory, managed and implementation services.

Netenrich

Netenrich

The Netenrich operations intelligence platform is built from the ground up to help enterprises resolve everyday and futuristic problems for stable, secure environments and infrastructures.

Orbus Software

Orbus Software

Orbus develops, markets and sells enterprise software which helps large, blue chip and government organisations across the globe to achieve digital transformation outcomes.

LocateRisk

LocateRisk

LocateRisk provides more efficiency, transparency and comparability in IT security with automated, KPI-based IT risk analyses.

DH2i Company

DH2i Company

DH2i is a leading provider of multi-platform Software Defined Perimeter and Smart Availability software enabling customers to create an entire IT infrastructure that is always-secure and always-on.

Polygraph

Polygraph

Polygraph monitors the activities of click fraud gangs, including how they operate, who they target, the techniques they use, and how to detect their fraud.

CyberconIQ

CyberconIQ

CyberconIQ provide an integrated Human Defense Platform that reduces the probability and/or the cost of a cybersecurity breach by measurably improving our clients risk posture and compliance culture.

Silk Security

Silk Security

Silk is the first platform that enables enterprises to take a strategic, sustainable approach to resolving code, infrastructure and application risk.

Flawnter

Flawnter

Flawnter is a security testing software that finds hidden security and quality flaws in your applications.