Cyber Weapons Are Proliferating Beyond Control

Cybersecurity headlines in recent years have been dominated by companies losing money by being hacked and leaking the data of millions of customers. 

But today, cybersecurity is moving beyond the financial impact to concerns over public safety, national security and even cyberwarfare. 

To understand the state of cyberwar and its potential impact, we should all keep in mind two things:

1. The proliferation of Cyber-Weapons is already happening

Countries are already stockpiling cyber-weapons that they can use against each other. These weapons could cause real world damage to public infrastructure, public utilities, and other facilities that could endanger people's lives and crash economies. 

The United States, China, and Russia are the most well-known stockpilers of cyber-weapons, but there are plenty of others engaged in the cyber-weapons arms race. 

We even saw during the 2018 US midterms that there were reports America was preparing a cyber-weapons attack on Russia if it was discovered that the Russians hacked the US election.

2. Arms control of Cyber-Weapons hasn't caught up

While the world has a decades-long history of treaties governing the use of weapons of mass destruction such as ballistic missiles, biochemical weapons, and nuclear arms, very little has been done yet to regulate cyber-weapons. 

The challenge is that most lawmakers and government officials have minimal understanding of how these weapons work, how they differ from traditional weapons, and the true dangers they can pose. 

The other challenge is that it is far faster and cheaper to create and stockpile cyber-weapons than traditional weapons. 

We should take a lesson from history and remember that both of the world wars were preceded by years of unchecked weapons buildup.

ZDNet:

You Might Also Read:

Is Cyber The Perfect Weapon?

« Cybercrime Is The Biggest Evolving Source Of Crime In The UK
Waymo Is First With Driverless Car Service »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

SC Media

SC Media

SC Media arms information security professionals with the in-depth, unbiased business and technical information they need to tackle the countless security challenges they face.

ADF Solutions

ADF Solutions

ADF Solutions is a leading provider of digital forensic and media storage exploitation tools.

Capita

Capita

Capita is a consulting, digital services and software business, providing end-to-end enterprise IT services and solutions focused around digital transformation and innovation.

DataSunrise

DataSunrise

DataSunrise Data-Centric high-performance security software protects the sensitive data in real-time in cloud or on premises, and helps organizations to stay compliant.

MAY Cyber Technology

MAY Cyber Technology

MAY Cyber Technology is a Security Management solutions provider located in Turkey & Germany.

Nexus Group

Nexus Group

Nexus Group develops identity solutions for physical and digital access.

SCIS Security

SCIS Security

SCIS Security provides affordable cyber security services and solutions to small to medium sized businesses and homes.

Hornetsecurity

Hornetsecurity

Meet Hornetsecurity – Leading Cloud Email Security Provider. We protect global organizations so you can focus on what you do best.

Enterprise Ethereum Alliance (EEA)

Enterprise Ethereum Alliance (EEA)

EEA is a member-led industry organization whose objective is to drive the use of Ethereum blockchain technology as an open-standard to empower ALL enterprises.

Forgepoint Capital

Forgepoint Capital

ForgePoint Capital is a premier venture investor for early stage cybersecurity companies.

Cigent Technology

Cigent Technology

Cigent keeps the most valuable asset in your organization safe—your data. Our advanced endpoint and managed network security solutions prevent ransomware and data theft.

Yogosha

Yogosha

Yogosha is a crowdsourced cybersecurity platform enabling a win-win collaboration with the most talented hackers to detect and fix vulnerabilities on your most critical systems.

CloudScale365

CloudScale365

CloudScale365 offers state-of-the-art managed IT services and cloud, hosting, security, and business continuity solutions.

OSP Cyber Academy

OSP Cyber Academy

OSP Cyber Academy are a managed service provider of cyber, information security and data protection training.

Solcon Capital

Solcon Capital

Solcon Capital is a forward-looking, technology-focused investment firm that is committed to identifying and investing in the most promising areas of innovation and development in the tech industry.

Axient

Axient

Axient advances defense and civilian missions from aerospace to cyberspace with multi-domain test and analysis, mission engineering and operations, and advanced technologies.