US Cyber Strike On Iran Is A Step Change

After the US launched a cyber-attack on Iran’s weapons systems last month, military warfare could increasingly look like a loss of connectivity, rather than a loss of life, according to a cyber-security expert.

The attack on Iran’s security systems, used to control its rocket and missile launches, was a “game changing” event for both the cyber-security industry and “how we think about geopolitics,” Haiyan Song, the Senior Vice President of IT / Security firm Splunk. “A military action got diverted to really becoming a cyber action,” said Song being interviewed by CNBC.

US President Trump reportedly approved the cyber-attack against the Islamic Revolutionary Guard Corps on June 22, days after Tehran shot down a surveillance drone. 

Days before the cyber-attack, Trump had called off a conventional military assault against Iran, saying that the expected loss of life, estimated to be about 150 people, would have been disproportionate to the downing of the unmanned drone.
The attack marked the latest chapter in the US and Iran’s on-going cyber operations against each other. Tensions have been escalating between Washington and Tehran, after the US unilaterally withdrew from the 2015 nuclear deal with Iran last year and began a policy of “maximum pressure” campaign aimed at ending its nuclear ambitions.

Asked if she anticipated a ramping up of such cyberattacks as a means of warfare, Song, senior vice president and general manager of security markets at the multinational software company, was unequivocal.

“The short answer is absolutely,” Song said at the World Economic Forum in Dalian, China. “I think this is really a new way for a lot of countries and nation states to really think about their competitiveness in the military world.”

Such forms of cyber-attacks are also growing in the business world, Song noted, highlighting phishing attacks and the infiltration of cloud technology as two particular areas of disruption.

She added that as inter-connectivity increases, “the vengeance, the frequency and the speed and the coverage” of such attacks will only grow.

CNBC:

You Might Also Read: 

The ‘Rules’ Of Modern Warfare Are Being Rewritten:

The Human Cost Of Cyberwar:

 

 

« The Cyber Effects Of Industry 4.0 On Warfare
Professionals Say Network Security is Getting Harder »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Qualitèsoft Technology

Qualitèsoft Technology

Qualitèsoft Technology is a leading Software Development and Quality Assurance organization. We specialize in Custom Development, Mobile Application, Software Testing and Quality Assurance.

Telefonica Tech

Telefonica Tech

Telefónica Cyber Security Tech is focused on the prevention, detection and appropriate response to security incidents aimed at protecting your digital services.

National Cyber Security Directorate (DNSC) - Romania

National Cyber Security Directorate (DNSC) - Romania

DNSC (formerly CERT-RO) is the Romanian national cyber security and incident response team.

MailXaminer

MailXaminer

MailXaminer is an advance and powerful email investigation platform that scans digital data, performs analysis, reports on findings and preserves them in a court validated format.

Armis

Armis

Armis offers the markets leading asset intelligence platform designed to address the new threat landscape that connected devices create.

Newtech Recycyling

Newtech Recycyling

Newtech Recycyling specializes in the removal and disposal of IT infrastructure which has reached the end of its life cycle.

jobsDB.com

jobsDB.com

jobsDB Singapore is a search engine for jobs throughout Singapore.

Gluu

Gluu

Modern Authentication for Digital Enterprise. Organizations around the world trust Gluu for large-scale, high-security identity & access management.

Involta

Involta

Involta orchestrates IT transformation journeys using well-defined and rigorous processes to deliver hybrid cloud solutions, consulting and data center services tailored to our clients’ needs.

SecOps Group

SecOps Group

SecOps Group is a boutique cybersecurity consultancy helping enterprises identify & eliminate security risks on a continuous basis.

Eleos Labs

Eleos Labs

Eleos Labs' suite of security tools prevent Web3 cyber attacks, reduce economic risks, and protect digital assets.

BitLyft

BitLyft

BitLyft is a managed detection and response provider that is dedicated to delivering unparalleled protection from cyber attacks for organizations of all sizes.

Supra ITS

Supra ITS

Supra ITS is a leading full-service technology partner offering IT Consulting, Cloud Services, 24x7 Managed IT & Cybersecurity Services, and IT Project Support.

Razilio

Razilio

Razilio is a boutique cybersecurity consultancy located in Sydney, Australia and serving the world.

Camms

Camms

Camms are a team of experienced professionals dedicated to providing innovative GRC software solutions that help organizations manage risk, make informed decisions, and drive positive change.

Symbiotic Security

Symbiotic Security

Symbiotic Security revolutionizes code security by integrating an AI-driven security coach directly within developers' IDEs.