Cyber Attacks Are The New Cold War

On 16th June President Biden had a meeting with President Putin in Geneva to talk about cyber secuity, among several other important issues. Doubtles on the agenda was  the attack which hacked the US IT services company SolarWinds, the successful ransom attacks on the Colonial Pipeline, Microsoft and numerous other costly breaches of US and allied governments and agencies.  

The US governmnet has pointed at Russian state-sponsored hackers known as Darkside as being the perpetrators at the direction of Russia's intelligence services. The geo-political engagement between the two leaders shows the level of heated argumnent beween the US and Russia over responsibilty for these cyber attacks.

The White House itself has not made any public comments about the international response to the SolarWinds hack, perhaps because cyber attacks have become so common that only the largest scale and most damaging attacks make the news, but it has been working with Microsoft on an investigation.  

Just like the the Cold War in the 1940s and 1950s, each side has reason to fear its opponent gaining a technological upper hand, and just as the Internet brings people together socially it has also enabled malicious activity with data breaches, ransomware and destroyed systems. 

Now, more than 30 years after the end of the Cold War, the US and Russia have decommissioned thousands of nuclear weapons, however, tensions are growing one more. A modern-day cold war would include cyber attacks and nuclear powers’ involvement in allies’ conflicts. It’s already happening.

Now a new kind of Cold War, with Artificial Intelligence (AI) serving as the basis of this arms race and nation-states are employing cyber-attacks, as a prelude to military actions. Attacks launched from the open Internet are at a constant level of activity, just below armed conflict.We think of cyber-attacks in terms of router configurations or malware code, but the tremendous amounts of communications traffic make cyber security a field of data science. 

The US is one the  most connected  country in the world, with everything from cars to refrigerators to security cameras connected online, making it among the most vulnerable. 

All these new sensors and Internet of Things (IoT) devices produce tremendous amounts of data that can be analysed to detect adversary activity. Such massive volumes of data need analytic techniques to synthesise the essence of the activity for human understanding and decision-making and the use of AI to analyse these massive amounts of cyber data and capabilities is growing exponentially. 

Cyber attacks are now a constant and range from the annoying to the devastating. There is still a significant lag between attack and detection and AI can be used to improve defenses and reduce that gap. Previously, rules-based systems were applied in cyber security to detect malware signatures and look for known insider threat patterns. But AI's self-learning techniques are now being used to look for unknown insider threat patterns and other malicious activity. Significantly, these methods can learn based on data that may already contain the threat activity. In addition, AI can synthesize the difference between normal router outages in the open Internet and botnet attacks.

In the Cyber Cold War, one must always assume that your defenses have been breached and your adversaries are already in the system. This is the basic  assumption behind Zero Trust,  which is an essential defensive methodology. 

Organisations must move away from perimeter security to follow the principles of zero trust, to adopt in role-based access controls for every resource and provide secure communications throughout. It can not be assumed that the open Internet is benign and concept of zero-trust concept must be extended into the open Internet to "defend forward" beyond our network perimeters. Finally, we need to extend our security monitoring to leverage AI to search for unknownpatterns of malicious activity. AI is the arms race to analyse more data with greater speed and provide transparent identification and recommendations for human decision-makers.

Cyber resilience must not be viewed as a costly optional add-on but must be considered an essential part of doing business. We must recognise that the more governments develop offensive techniques, the more vulnerable our infrastructure is on defense. Cyber will be a part of every future military action where in the world of AI and sensory-intelligent machines, there are no non-combatants.

Dark Reading:   BBC:      Metro:    The Converstaion:     Cyber NewsFeed:    Jioforme:    Urgent Comm:     

You Might Also Read:

Cyber Warfare Is The New Frontier:

Cyberwar Vs. Traditional Conflict: (£)

 

 

« Why Is It So Difficult To Convict Cyber Criminals?
Cyber Security In The Crypto World »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

Blueliv

Blueliv

Blueliv is a leading provider of targeted cyber threat information and intelligence. We deliver automated and actionable threat intelligence to protect the enterprise and manage your digital risk.

Zayo

Zayo

Zayo is a leading global bandwidth infrastructure services provider for high-performance connectivity, secure colocation and flexible cloud services.

MD5

MD5

MD5 is a leading UK provider of Digital Forensic & eDiscovery services to large multi-national corporate businesses, Law Enforcement & Government Agencies, high profile legal firms.

Secret Double Octopus

Secret Double Octopus

Secret Double Octopus offers the world’s only keyless multi-shield authentication technology for users and things.

AVeS Cyber Security

AVeS Cyber Security

AVeS combines expert knowledge and services with leading technology products to provide comprehensive Information Security and Advanced IT Infrastructure solutions.

LUCY Security

LUCY Security

LUCY is the answer when you want to increase your IT security, maintain your cyber security awareness, or test your IT defenses.

GreenWorld Technologies

GreenWorld Technologies

GreenWorld has a proven track record in industry leading IT asset management, secure data destruction and remarketing.

SmartContractAudits.com

SmartContractAudits.com

SmartContractAudits.com is the leading platform for finding companies providing smart contract auditing services.

Findcourses.com

Findcourses.com

Findcourses is a dedicated education search engine designed to make it easy for our learners to search and find exactly what they need from our community of trusted training providers.

01 Communique Laboratory

01 Communique Laboratory

01 Communique Laboratory is an innovation leader in the new realm of Post-Quantum Cyber Security.

Cyber Readiness Institute (CRI)

Cyber Readiness Institute (CRI)

At the Cyber Readiness Institute, our mission is simple: empower small and medium-sized enterprises with free tools and resources to help them become more secure and resilient.

Xscale Accelerator

Xscale Accelerator

Xscale's vision is to create world-class startups out of India by transforming sales and providing access to global markets.

IntelliDyne

IntelliDyne

IntelliDyne is a leading information technology consulting firm enabling better mission performance through innovative technology solutions.

Cyber1

Cyber1

CYBER1 is a leader in cyber security advisory and solutions. We are uniquely placed to help customers achieve cyber resilience and thus, safeguard reputation and value.

Doherty Associates

Doherty Associates

Drawing on our deep industry knowledge and business insight, Doherty deliver intelligent IT solutions and services that help people work more securely, more productively and more creatively.

SpectrumWise

SpectrumWise

SpectrumWise is a business technology specialist that provides Managed Services and Managed Security for small and medium IT Networks.