• Skip to main content
  • Skip to secondary menu
  • Skip to primary sidebar
  • Skip to footer
  • Articles
  • News
  • Events
  • Advertize
  • Jobs
  • Courses
  • Contact
  • (0)
  • LoginRegister
    • Facebook
    • LinkedIn
    • RSS
      Articles
      News
      Events
      Job Posts
    • Twitter
Datafloq

Datafloq

Data and Technology Insights

  • Categories
    • Big Data
    • Blockchain
    • Cloud
    • Internet Of Things
    • Metaverse
    • Robotics
    • Cybersecurity
    • Startups
    • Strategy
    • Technical
  • Big Data
  • Blockchain
  • Cloud
  • Metaverse
  • Internet Of Things
  • Robotics
  • Cybersecurity
  • Startups
  • Strategy
  • Technical

How Cyberwar Became the New Normal (and How to Fight It)

Dan Matthews / 4 min read.
July 25, 2018
Datafloq AI Score
×

Datafloq AI Score: 83.67

Datafloq enables anyone to contribute articles, but we value high-quality content. This means that we do not accept SEO link building content, spammy articles, clickbait, articles written by bots and especially not misinformation. Therefore, we have developed an AI, built using multiple built open-source and proprietary tools to instantly define whether an article is written by a human or a bot and determine the level of bias, objectivity, whether it is fact-based or not, sentiment and overall quality.

Articles published on Datafloq need to have a minimum AI score of 60% and we provide this graph to give more detailed information on how we rate this article. Please note that this is a work in progress and if you have any suggestions, feel free to contact us.

floq.to/qtX1E

In April of 2018, 34 of the world’s leading tech and cybersecurity companies banded together on their own volition to sign the Cybersecurity Tech Accord. These companies include Cisco, Microsoft, HP, Facebook, and Nokia. Then, in June, 11 more companies signed on, including Carbon Black, Salesforce, Atlassian, and Gigamon.

The reason for the accord is the alarming expansion of cyberwarfare around the world. All signers to the accord vowed not to aid governments in cyber attacks on innocent civilians and enterprises. You would think such a consensus goes without saying, but the demand for skilled hackers and cyber warriors is so high that the leading tech companies found it necessary to commit to neutrality. They’re constantly fielding requests for cyber warfare activities.

Here are some of the biggest cyberwar attacks (that we know of) perpetrated within recent memory:

  • In March of 2018, the Justice Department brought charges against 9 Iranians who stole $3 billion worth of intellectual property data from universities (in the U.S. and abroad), government agencies, and companies; the hacks are linked to the Islamic Revolutionary Guard Corps, which defends Iran’s Shi’ite theocracy.
  • In February of 2018, the U.S. and the UK blamed Russia for the costliest cyberattack in history : NotPetya. The 2017 cyber attack started in Ukraine and then spread all over the world, costing companies upwards of $1.2 billion
  • In March 2018, the U.S. accused Russia of planting surveillance malware in operating systems of energy companies and critical manufacturing companies, and announced sanctions against Russia for tampering with the 2016 election.
  • In May 2018, the FBI urged people to reboot their routers and download manufacturer updates to protect against Russian hackers who compromised devices in more than 50 countries.

Due to the nature of cyber warfare, attacks from countries like Russia, Iran, and North Korea are covert and ongoing, which means there are many more infections that organizations may not be aware of yet.

It’s reasonable to assume countries like the U.S., UK, Ukraine, and Israel have retaliated and are retaliating now with their cyberattacks. You’re not going to see headlines that reveal these ongoing attacks. Often you’ll see headlines that claim we’re heading towards a full-blown cyberwar. Don’t let these claims fool you. We are already waging a cyberwar.

The resources and people that governments and organizations use for cybersecurity are the same as those they use for cyberwarfare. Let’s look at a couple of examples.

Cyber Warfare Centers

The comprehensive cyberwarfare center starts with an array of tech solutions, continues with risk mitigation measures, and ends with the right people in a building where they’re comfortable, alert, and safe.


Interested in what the future will bring? Download our 2023 Technology Trends eBook for free.

Consent

In terms of technology, Fountainhead Control Rooms reports that you need network mapping systems, intrusion detection and prevention systems, network activity collection and detonation devices, security information management and storage systems, and log management appliances. You also need state-of-the-art AV equipment.

As Fountainhead points out, Advances in technology that make cyber warfare centers so effective are some of the same technologies that attackers use when exposing and assaulting victims. In other words, the right tech is available to all sides. If there are going to be any winners of the ongoing cyberwar, quality of personnel and money will be the determining factors.

Military Personnel

Western Governors University points out that the situational awareness, precision, and problem-solving abilities that cybersecurity positions require are traits those with military and policing backgrounds already have. If you’re building out your cybersecurity team, it won’t hurt to recruit people who have been involved in the military or law enforcement. These are some of the same types of people who become cyber warriors for governments and government-sponsored organizations.

Private organizations in America have an advantage over the Department of Defense: when it comes to recruiting military personnel, the private sector pays more. Looking ahead, this factor could be troublesome for the U.S. The nature of cyberwar is such that organizations with the best personnel are going to have the advantage. With the Cybersecurity Tech Accord, many of the companies with the best personnel decided not to aid the government with cyber warfare at least, with the type of aggressive cyber warfare that would prove most advantageous to our government.

In countries like Russia, China, Iran, and North Korea, companies aren’t free to make such a decision because of authoritarianism. These countries are undoubtedly employing the best personnel in their cyber efforts.

Cyberwar is now the new normal because there’s very little our government can do to retaliate against cyber attacks. We can impose sanctions, and we can engage in our own cyber attacks, but apparently, the counter-attacks we have made (if any) aren’t sophisticated enough to deter countries like Russia from continuing their campaigns.

Private organizations must mobilize by building their own cybersecurity centers and training their own personnel. The shortage of cybersecurity personnel in America is such that organizations will need to offer increasingly competitive salaries, benefits, and training. As the worldwide cyberwar continues, companies that are the most prepared will suffer the least.

Categories: Big Data, Cybersecurity
Tags: attack, big data security, cyber, national security

About Dan Matthews

Dan Matthews is a writer and content consultant from Boise, ID with a passion for tech, innovation, and thinking differently about the world. You can find him on Twitter and LinkedIn.

Primary Sidebar

E-mail Newsletter

Sign up to receive email updates daily and to hear what's going on with us!

Publish
AN Article
Submit
a press release
List
AN Event
Create
A Job Post

Related Articles

How Data Analytics is Revolutionizing Talent Acquisition Leadership

March 20, 2023 By Monika Sangwan

Storing the World in a Sugar Cube: The DNA Data Revolution Unfolds

March 20, 2023 By Dr Mark van Rijmenam

Optimizing Traditional Agricultural Practices with AI

March 20, 2023 By Roger Brown

Related Jobs

  • Software Engineer | South Yorkshire, GB - February 07, 2023
  • Software Engineer with C# .net Investment House | London, GB - February 07, 2023
  • Senior Java Developer | London, GB - February 07, 2023
  • Software Engineer – Growing Digital Media Company | London, GB - February 07, 2023
  • LBG Returners – Senior Data Analyst | Chester Moor, GB - February 07, 2023
More Jobs

Tags

AI Amazon analysis analytics application applications Artificial Intelligence benefits BI Big Data business China Cloud Companies company costs crypto Data design development digital engineer environment experience future government Group health information learning machine learning mobile news public research security services share skills social social media software solutions strategy technology

Related Events

  • 6th Middle East Banking AI & Analytics Summit 2023 | Riyadh, Saudi Arabia - May 10, 2023
  • Data Science Salon NYC: AI & Machine Learning in Finance & Technology | The Theater Center - December 7, 2022
  • Big Data LDN 2023 | Olympia London - September 20, 2023
More events

Related Online Courses

  • Cloud Transformation
  • Professional Selling: 3 Steps to High-Performance
  • Digital Marketing World Forum Global 2023
More courses

Footer


Datafloq is the one-stop source for big data, blockchain and artificial intelligence. We offer information, insights and opportunities to drive innovation with emerging technologies.

  • Facebook
  • LinkedIn
  • RSS
  • Twitter

Recent

  • How data and modern machine learning can help TSA keep us safe
  • Exploring the Legal Implications of Generative AI: Is it Fair Use?
  • How Data Analytics is Revolutionizing Talent Acquisition Leadership
  • Storing the World in a Sugar Cube: The DNA Data Revolution Unfolds
  • Optimizing Traditional Agricultural Practices with AI

Search

Tags

AI Amazon analysis analytics application applications Artificial Intelligence benefits BI Big Data business China Cloud Companies company costs crypto Data design development digital engineer environment experience future government Group health information learning machine learning mobile news public research security services share skills social social media software solutions strategy technology

Copyright © 2023 Datafloq
HTML Sitemap| Privacy| Terms| Cookies

  • Facebook
  • Twitter
  • LinkedIn
  • WhatsApp

In order to optimize the website and to continuously improve Datafloq, we use cookies. For more information click here.

settings

Dear visitor,
Thank you for visiting Datafloq. If you find our content interesting, please subscribe to our weekly newsletter:

Did you know that you can publish job posts for free on Datafloq? You can start immediately and find the best candidates for free! Click here to get started.

Not Now Subscribe

Thanks for visiting Datafloq
If you enjoyed our content on emerging technologies, why not subscribe to our weekly newsletter to receive the latest news straight into your mailbox?

Subscribe

No thanks

Privacy Overview

This website uses cookies so that we can provide you with the best user experience possible. Cookie information is stored in your browser and performs functions such as recognising you when you return to our website and helping our team to understand which sections of the website you find most interesting and useful.

Necessary Cookies

Strictly Necessary Cookie should be enabled at all times so that we can save your preferences for cookie settings.

If you disable this cookie, we will not be able to save your preferences. This means that every time you visit this website you will need to enable or disable cookies again.

Marketing cookies

This website uses Google Analytics to collect anonymous information such as the number of visitors to the site, and the most popular pages.

Keeping this cookie enabled helps us to improve our website.

Please enable Strictly Necessary Cookies first so that we can save your preferences!