Cyber Attacks May Lead To A “shooting war”

Joe Biden has said that Russia and China are growing threats to American national security and that the growing wave of cyber attacks, including ransomware attacks, against US government agencies and private industry could end up being in a real shooting war with a major power.

“I can’t guarantee this, and you’re as informed as I am, but I think it’s more likely we’re going to end up, well, if we end up in a war, a real shooting war with a major power, it’s going to be as a consequence of a cyber breach of great consequence,” Biden said during a half-hour speech while visiting the Office of the Director of National Intelligence (ODNI)

Cyber security has become a top agend issue for the Biden administration after a series of high profile attacks on entities such as network management company SolarWinds, the Colonial Pipeline company and software firm Kaseya hurt the US far beyond just the companies hacked. Some of the attacks affected fuel and food supplies in parts of the US.

Biden and Russian President Vladimir Putin and Biden shared a list of critical infrastructure the US considers off-limits to nation-state actors during a June 16 summit in Geneva. Since then, senior members of the Biden administration's national security team have been in constant contact with senior members of the Kremlin over cyber attacks on the United States, agencies quoted the White House.

Biden highlighted the threats posed by China, referring to President Xi Jinping as "deadly earnest about becoming the most powerful military force in the world, as well as the largest and most prominent economy in the world by the mid-40s, the 2040s." 

In his remarks to 120 ODNI employees and senior leadership officials, the President asserted that he understood the complexity and critical nature of their work. The ODNI oversees the 17 other US intelligence organisations. "You have my full confidence.I know there's no such thing as 100 per cent certainty in the intelligence world. Occasionally that happens. Rarely, rarely, rarely,” he said, adding that he would never politicise the intelligence agency’s work.

Reuters:       Financial Times:      ITPro:         The Register:        India Today:

You Might Also Read: 

CISA, NSA And The Dual Hat:

 

« Cyber Security Standards For Critical Infrastructure
No More Ransom Saves Victims »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Spiceworks

Spiceworks

Spiceworks provide a range of free apps for IT professionals including network inventory, network monitor, and help desk.

European Council on Foreign Relations (ECFR)

European Council on Foreign Relations (ECFR)

ECFR is a pan-European think-tank conducting research and promote informed debate on European foreign policy. Cyber security is becoming an intrinsic element of foreign policy debate.

Global Information Assurance Certification (GIAC)

Global Information Assurance Certification (GIAC)

GIAC provides certification in the knowledge and skills necessary for a practitioner in key areas of computer, information and software security.

CIRISK

CIRISK

CIRISK offers a wide range of services from consulting to audit or project management to help you develop your cyber security or information security strategy.

SOCOTEC Certification International

SOCOTEC Certification International

SOCOTEC Certification International has been providing management systems assessment and accredited ISO certification services to organisations around the world since 1995.

GMV

GMV

GMV is a technological business group offering solutions, services and products in diverse sectors including Intelligent Transportation Systems, Cybersecurity, Telecoms and IT.

Tier1Asset (T1A)

Tier1Asset (T1A)

T1A is Europe’s leading IT refurbisher. We offer certified data erasure using blancco on site and at our facilities, providing environmentally sound disposal of your used equipment.

apiiro

apiiro

apiiro invented the industry-first Code Risk Platform™ that uses developers and code behavior analysis to accelerate delivery and automatically remediate product risk.

Lightspin

Lightspin

Lightspin is a contextual cloud security platform that continuously visualizes, detects, prioritized, and prevents any threat to your cloud stack.

Stefanini Group

Stefanini Group

Stefanini is a global IT services company providing a broad range of solutions for digital transformation including automation, cloud, IoT and cybersecurity.

Sentra

Sentra

Sentra is focused on improving data security practices within the cloud, mitigating the risks of damaging data leaks by providing comprehensive visibility into critical data assets.

Privacy Compliance Hub

Privacy Compliance Hub

Privacy Compliance Hub provide an easy to use platform with a comprehensive data protection compliance programme including training, information, templates and reporting.

StrongBox.Academy

StrongBox.Academy

StrongBox.Academy provides cybersecurity training courses that are tailored to the specific needs and challenges of the industry.

Axians

Axians

Axians supports its customers in their digital transformation journey. We offer ICT solutions and services in areas including Enterprise Networks and Cybersecurity.

Secuvy

Secuvy

Secuvy leads in data security, privacy, compliance, and governance, offering a unified platform for proactive data discovery, management, protection, and enhanced data value.

Tracebit

Tracebit

Tracebit uses decoys to detect and respond to cloud intrusions in minutes.