Intelligence In The Age of Cyber Warfare

The cyber age has brought incalculable advantages to modern life. The world is connected and accessible like never before. But like all technological advances, there is a dark side to this progress: Quite simply, the cyber age is revolutionising warfare.

Whereas security threats were once visible and easily identifiable, today’s cyber-threats are invisible and anonymous. Where once warfare had clear rules and boundaries, modern cyber warfare is largely anarchic and without borders. As a result, governments and corporations alike are struggling to identify threats, let alone combat them effectively.

This calls for an entirely new security discourse.

All’s Fair in Cyber Warfare

A brief glance at some of the most recent cyberattacks illustrates the scope of the task ahead. It appears French presidential candidate Emmanuel Macron’s campaign was targeted by a cyber espionage group recently. Late last year, the San Francisco transit system was disrupted by a ransomware attack, prompting concern over the safety of other US transport networks. Additionally, half of UK businesses reportedly suffered a breach in 2016.

Enemies can seemingly strike anywhere at any time. This is not the work of a conventional army; it is usually the work of a small, dedicated group of fraudsters who wear no identifiable uniform. They are armed with everyday hardware, invisible codes and malware. And in the digital world, borders are irrelevant. A cyber-criminal’s battleground knows no boundaries.

The difficulty of identifying a cyber-attack is compounded by the rapid advances of malicious actors. As connectivity escalates between people, companies and organisations across the globe, fresh opportunities to launch attacks are opening up all the time. Technological developments are inevitably seized upon by enemies up to no good. In this regard, the growth of the Internet of Things (IoT) is set to make the challenge of cyber-security even more complex.

Strategy and Intelligence Over Technology

Until now, the standard response to this increasing danger has been to match technology with technology, in other words, a cyber arms race. In this cat-and-mouse game, an ever-more sophisticated arsenal is developed to counter the latest weapons being deployed. This amounts to applying an increasing number of Band-Aids to all manner of illnesses and infections. It is a piecemeal and inadequate response.

A fresh, more sustainable approach is required. This approach must be holistic, comprehensive and adaptable to the new nature of warfare. Most importantly, intelligence must play a meaningful role.

As a first step, determine exactly who constitutes an enemy in cyberspace. Given that anyone with a computer could theoretically be an attacker, it is critical to narrow down the possibilities. After all, even a colleague can become a threat, or at least an unwitting accomplice to a security event. In cyber warfare, it is often unclear who is friend and who is foe. A clear distinction based on an accurate intelligence assessment must be made between enemies, opponents and allies.

Since cyber warfare is so widespread and varied, it’s important to accept that not every attack can be repelled. Because there is no hermetic cyber-defense system, an intelligence evaluation is required to determine which attacks require an instant response. This means calculating critical interests and resolving to defend them, while at the same time being prepared to tolerate threats to lesser assets.

By doing so, government leaders and corporate managers can better understand the parameters to the cyber threats they face. They will then be able to clearly define what constitutes critical defense and set their security priorities accordingly. Consequently, they will be able to develop a workable cyber-defense strategy, establishing a critical and long-lasting mode of operation.

A War of Attrition

Of course, in today’s world, everything is interconnected. The individual process of establishing a holistic cyber strategy must be complimented by a wider legal and societal consideration of contemporary threats.

Legal systems need to define the lawful boundaries of cyber defense. Meanwhile, workers and network users must be educated and trained to spot the signs of a digital attack. In doing so, they can provide valuable help to the intelligence gathering process.

If governments and corporations seriously wish to win the cyber war, they must make a paradigm shift. Warfare is no longer a question of weaponry, but a matter of strategy. Only a sustainable, strategic approach, with intelligence at its core, can triumph. The alternative is an expensive, never-ending and, ultimately, futile battle against those who wish to cause harm.

Security Intelligence:

You Might Also Read:

Global C4ISR Has A Cyber Warfare Surge:

US vs. North Korea Cyberwar Underway:

A Geneva Convention For Cyber War:

NATO Tools Up For Cybewar:

 

 

« Google Neutralizes Phishing Scam
We Are Not Paid Agents of Russia… »

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Packet Storm

Packet Storm

Packet Storm is an online resource for security tools, whitepapers, exploits, and advisories on computer security issues.

Palo Alto Networks

Palo Alto Networks

Palo Alto Networks, the global cybersecurity leader, is shaping the cloud-centric future with technology that is transforming the way people and organizations operate.

Verimuchme

Verimuchme

Verimuchme is a digital wallet and exchange platform to secure, verify and re-use personal information.

MetaFlows

MetaFlows

MetaFlows’ SaaS malware detection & prevention software passively analyzes the behavior and the content of Internet traffic.

Careers in Cyber Security (CiCS)

Careers in Cyber Security (CiCS)

CareersinCyberSecurity is a leading global job board and career resource for Cyber Security, IT Audit, Technology Risk and Data Protection professionals.

Celerium

Celerium

Celerium transforms cyber defense for both companies and industry sectors by leveraging cyber threat intelligence to defend against cyber threats and attacks.

Pivot Point Security

Pivot Point Security

Pivot Point Security is a trusted leader in information security consulting. We help clients master their information security management systems.

MazeBolt Technologies

MazeBolt Technologies

Israel-based MazeBolt is an innovation leader in cybersecurity, with over two decades of experience in pioneering DDoS protection solutions.

INE

INE

INE is a premier provider of Technical Training for the IT industry.

PhishFirewall

PhishFirewall

PhishFirewall is an advanced AI-driven CyberSecurity Awareness Education, Threat Emulation, and Human Security Analytics Platform.

Outsource Group

Outsource Group

Outsource Group is an award winning Cyber Security and IT Managed Services group working with a range of SME/Enterprise customers across the UK, Ireland and internationally.

Unisys

Unisys

Unisys is a global information technology company providing industry-focused solutions integrated with leading-edge security to clients in the government, financial services and commercial markets.

Cyber Octet

Cyber Octet

Cyber Octet is an IT Solution, Security, Training and Services company. We provide training and services from Web Application Security to ISO 27001 implementation.

VeriBOM

VeriBOM

VeriBOM is a SaaS security and compliance platform that helps protect you and your customers through automation, documentation, and transparency for every software application you build or run.

Prophet Security

Prophet Security

Prophet Security empowers organizations to triage, investigate, and respond to alerts with unparalleled speed and accuracy.

Zynap

Zynap

Zynap is an Advanced AI-powered SaaS platform replicating cybercriminal tactics to predict, detect, and neutralize threats before they strike.