US Cyber Strike On Iran Is A Step Change

After the US launched a cyber-attack on Iran’s weapons systems last month, military warfare could increasingly look like a loss of connectivity, rather than a loss of life, according to a cyber-security expert.

The attack on Iran’s security systems, used to control its rocket and missile launches, was a “game changing” event for both the cyber-security industry and “how we think about geopolitics,” Haiyan Song, the Senior Vice President of IT / Security firm Splunk. “A military action got diverted to really becoming a cyber action,” said Song being interviewed by CNBC.

US President Trump reportedly approved the cyber-attack against the Islamic Revolutionary Guard Corps on June 22, days after Tehran shot down a surveillance drone. 

Days before the cyber-attack, Trump had called off a conventional military assault against Iran, saying that the expected loss of life, estimated to be about 150 people, would have been disproportionate to the downing of the unmanned drone.
The attack marked the latest chapter in the US and Iran’s on-going cyber operations against each other. Tensions have been escalating between Washington and Tehran, after the US unilaterally withdrew from the 2015 nuclear deal with Iran last year and began a policy of “maximum pressure” campaign aimed at ending its nuclear ambitions.

Asked if she anticipated a ramping up of such cyberattacks as a means of warfare, Song, senior vice president and general manager of security markets at the multinational software company, was unequivocal.

“The short answer is absolutely,” Song said at the World Economic Forum in Dalian, China. “I think this is really a new way for a lot of countries and nation states to really think about their competitiveness in the military world.”

Such forms of cyber-attacks are also growing in the business world, Song noted, highlighting phishing attacks and the infiltration of cloud technology as two particular areas of disruption.

She added that as inter-connectivity increases, “the vengeance, the frequency and the speed and the coverage” of such attacks will only grow.

CNBC:

You Might Also Read: 

The ‘Rules’ Of Modern Warfare Are Being Rewritten:

The Human Cost Of Cyberwar:

 

 

« The Cyber Effects Of Industry 4.0 On Warfare
Professionals Say Network Security is Getting Harder »

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 8,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

CERT-MU

CERT-MU

CERT-MU is the Mauritian National Computer Security Incident Response Team.

Censornet

Censornet

Censornet's autonomous, integrated cloud security gives mid-market organisations the confidence and control of enterprise-grade cyber protection.

Kenna Security

Kenna Security

Kenna Security is a risk intelligence & vulnerability management platform that helps prioritize and remediate vulnerabilities.

CyberDefcon

CyberDefcon

CyberDefcon is an independent organization dedicated to the pursuit of making the internet a safer place.

Zymbit

Zymbit

Zymbit provides hardware security modules (HSM) for IoT devices, including Raspberry Pi and other single board computers.

Satori Cyber

Satori Cyber

The Satori Cyber Secure Data Access Cloud is the first solution on the market to offer continuous visibility and granular control for data flows across all cloud and hybrid data stores.

Razorpoint Cybersecurity

Razorpoint Cybersecurity

Razorpoint’s world-class security experts have provided advanced, effective cybersecurity expertise to corporate and public-sector organizations around the world.

Semmle

Semmle

Semmle's code analysis platform helps teams find zero-days and automate variant analysis. Secure your code with continuous security analysis and automated code review.

Code Intelligence

Code Intelligence

Code Intelligence offers a platform for automated software security testing to help developers make their software more robust and secure.

Analygence

Analygence

ANALYGENCE is your trusted partner for mission support, cyber solutions, and management services.

Vaultree

Vaultree

We believe in an encrypted tomorrow. Vaultree technology enables a foundational change in how we communicate with each other: Safely!

Brightsolid

Brightsolid

Brightsolid are experts in Hybrid Cloud. We design, build and manage secure, scalable cloud environments that meet customers’ business ambitions.

Infinavate

Infinavate

Infinavate Fort CyberVault offers end-to-end services that comprehensively responds to the organization’s information security and privacy needs.

GIS Consulting (GISPL)

GIS Consulting (GISPL)

From General Data Protection Regulations to advanced Network Infrastructure Audits, GIS Consulting has established a reputation as one the leading cyber security companies in the industry.

Siguria Kibernetike (Cyber Security)

Siguria Kibernetike (Cyber Security)

Siguria Kibernetike is a company based in Tirana that offers full service in the field of cyber and physical security.

Sourcepoint

Sourcepoint

Sourcepoint offers enterprise-grade privacy automation for complex, dynamic compliance challenges.