Cyber Weapons Are Proliferating Beyond Control

Cybersecurity headlines in recent years have been dominated by companies losing money by being hacked and leaking the data of millions of customers. 

But today, cybersecurity is moving beyond the financial impact to concerns over public safety, national security and even cyberwarfare. 

To understand the state of cyberwar and its potential impact, we should all keep in mind two things:

1. The proliferation of Cyber-Weapons is already happening

Countries are already stockpiling cyber-weapons that they can use against each other. These weapons could cause real world damage to public infrastructure, public utilities, and other facilities that could endanger people's lives and crash economies. 

The United States, China, and Russia are the most well-known stockpilers of cyber-weapons, but there are plenty of others engaged in the cyber-weapons arms race. 

We even saw during the 2018 US midterms that there were reports America was preparing a cyber-weapons attack on Russia if it was discovered that the Russians hacked the US election.

2. Arms control of Cyber-Weapons hasn't caught up

While the world has a decades-long history of treaties governing the use of weapons of mass destruction such as ballistic missiles, biochemical weapons, and nuclear arms, very little has been done yet to regulate cyber-weapons. 

The challenge is that most lawmakers and government officials have minimal understanding of how these weapons work, how they differ from traditional weapons, and the true dangers they can pose. 

The other challenge is that it is far faster and cheaper to create and stockpile cyber-weapons than traditional weapons. 

We should take a lesson from history and remember that both of the world wars were preceded by years of unchecked weapons buildup.

ZDNet:

You Might Also Read:

Is Cyber The Perfect Weapon?

« Cybercrime Is The Biggest Evolving Source Of Crime In The UK
Waymo Is First With Driverless Car Service »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

SonicWall

SonicWall

SonicWall provide products for network security, access security, email security & encryption.

Keyfactor

Keyfactor

Keyfactor is a leader in cloud-first PKI as-a-Service and crypto-agility solutions. Our Crypto-Agility Platform seamlessly orchestrates every key and certificate across the enterprise.

SIGA

SIGA

SIGA provides cyber security solutions for Industrial Control Systems SCADA systems used in critical infrastructures and industrial processes.

V-Key

V-Key

V-Key is a global leader in software based digital security, providing solutions for mobile identity, authentication, authorization, and mobile payments for major banks.

Mitek Systems

Mitek Systems

Mitek's global mobile capture and identity verification technology optimizes the digital user experience for thousands of financial services organizations.

Cyversity

Cyversity

Cyversity's mission (formerly ICMCP) is the consistent representation of women and underrepresented minorities in the cybersecurity industry.

Edvance

Edvance

Edvance operates a range of cybersecurity businesses including value added cybersecurity solutions distribution, security technology innovation and development, and SaS solution offerings.

Gluu

Gluu

Modern Authentication for Digital Enterprise. Organizations around the world trust Gluu for large-scale, high-security identity & access management.

CyberScotland

CyberScotland

The CyberScotland Partnership is a collaboration of key strategic stakeholders, brought together to focus efforts on improving cyber resilience across Scotland in a coordinated and coherent way.

Astrix Security

Astrix Security

Astrix enables security teams to instantly see through the fog of connects and detect redundant, misconfigured and malicious third-party exposure to their critical systems.

NAK Consulting Services

NAK Consulting Services

NAK is helping organisations to create Secure, Agile IT Environments. Our goal is to be the trusted advisor and managed service partner for our clients.

BSS

BSS

BSS is a solutions and services business based in the UK with a focus on Cyber Security, Data, Financial Crime, Internal Audit, Change, Risk and Resilience.

Effectiv

Effectiv

Effectiv is a real-time fraud & risk management platform for Financial Institutions and Fintechs.

True North Solutions

True North Solutions

True North Solutions provides a wide range of fully customized, vendor-neutral industrial engineering and OT automation solutions to companies across North America and around the world.

Redinent Innovations

Redinent Innovations

Redinent is a cutting-edge IoT Security platform that offers precise security posture analysis and delivers actionable intelligence, empowering businesses to operate with unrivaled resilience.