Cyber War and Real War Coincide In Ukraine

Eastern Ukraine Comabt Zone

The type of cyber war that the US government and military are most worried about, and preparing for, is already in full swing in the Ukraine

The Ukraine has found itself on the receiving end of both cyber and direct attacks by Russian groups backing a separatist movement inside their country. And despite the Ukraine's large number of hackers who have played havoc with computer systems around the world, it has found itself woefully unprepared to defend its own computer networks.

According to a Wall Street Journal report, the Ukrainian Ministry of Defense, Foreign Affairs and its presidential administration have all been compromised at one time or another with many of the hacked documents appearing on the CyberBerkut website.

CyberBerkut is a Moscow-based hacking group that has taken credit for attacking Ukrainian computer networks. In addition to conducting cyber attacks, the group took responsibility for a physical attack on the Ukrainian election office destroying computer systems meant to track the elections process, said a report on Globalsecurity.org.

While US forces could most likely thwart direct attacks upon their military and government facilities, American officials are less sure about defending the cyber frontier and are taking steps to buttress these walls.

Recently, the head of the US Cyber Command, Adm. Michael S. Rogers, called for his organization's capabilities to be better integrated into all aspects of the country's cyber security effort. This would include building cybersecurity operations into all military planning. The WSJ said other attacks have targeted Ukrainian officials involved in fighting the land war against the separatists.

The US Army Cyber Command is even running field tests on how to insert cyberspace warfighting into smaller Army units on the battlefield. Here they would handle tasks such as centered on snagging tactical intelligence from the enemy's communications systems that can be put to immediate use by a commander, as well as, defending our own forces from similar incursions, Isaac Porsche, the Rand Corp. associate director, forces and logistics program told SCMagazine.com.

SC Magazine:  

« Mystery Fingers on Keyboard in JPMorgan Hack
Cybercrime: How to Recognize an Online Fraudster »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

VMRay

VMRay

VMRay delivers advanced threat analysis and detection that combines a unique agentless hypervisor-based network sandbox with a real-time reputation engine.

Cyber Craft

Cyber Craft

CyberCraft is an innovative and dynamic software development, outsourcing and consulting company. Services offered include penetration testing.

Slovenska Akreditacija (SA)

Slovenska Akreditacija (SA)

Slovenska Akreditacija is the national accreditation body for Slovenia. The directory of members provides details of organisations offering certification services for ISO 27001.

CyberGuru

CyberGuru

CyberGuru is a service provided by CyberSecurity Malaysia specializing in cyber security professional training and development.

Texas A&M Cybersecurity Center

Texas A&M Cybersecurity Center

Texas A&M Cybersecurity Center is dedicated to combating adversaries who desire to harm our citizens, our government, and our industry through cyber-attacks.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

FINX Capital

FINX Capital

FINX strives to solve the cybersecurity issues with its proprietary technolog, FINX SHIELD, by utilizing big data, blockchain combined with artificial intelligence.

PhishProtection

PhishProtection

We created Phish Protection to prevent all types of phishing including spear phishing protection and office 365 email protection for your small business.

Tozny

Tozny

Tozny offers products with security and privacy in mind that are built on the foundation of end-to-end encryption, and open-source verifiable software.

DEKRA

DEKRA

DEKRA’s promise is to ensure the safety of human interaction with technology and the environment.

AT&T Cybersecurity

AT&T Cybersecurity

AT&T Cybersecurity’s Edge-to-Edge technologies provide threat intelligence, collaborative defense, security without the seams, and solutions that fit your business.

Siometrix

Siometrix

Siometrix addresses digital identity fraud. It steals your attacker's time and prevents many prevalent attack vectors.

Cool Waters Cyber

Cool Waters Cyber

Cool Waters Cyber manage cyber security governance, risk and compliance.

CyXcel

CyXcel

CyXcel is a cyber security consulting business grounded in the law which natively fuses crises, legal, technical, and consulting expertise digital networks, information and operational technology.

Amtivo Ireland

Amtivo Ireland

Amtivo Ireland (formerly Certification Europe and EQA) offers a range of certifications and related services.

Mitra Informatics Integration (MII)

Mitra Informatics Integration (MII)

Mitra Informatics Integration is the information communication technology solution business of the Metrodata Group.