The Cyber Security Top Ten Power List

The continuing rise of nation-state and state sponsored  hackers has been one of the most compelling  cyber security developments of recent years. The exploits of the  Russian hacking groups, including Fancy Bear and Turla, have earned them both international renown and notoriety. The so called 'Hack of the Decade' against US Government agencies and numerous leading private sector organisations which took place in 2020 is almost certainly the work of sophisticated professional hackers from Russia. 

China, North Korea and Iran all posses powerful, well resourced and astonishingly effective hacking groups, capable of sustained and highly damaging espionage, sabotage and theft. In the case of North Korea, a concerted multiyear campaign targeting Banks and other financial institutions has largely funded the nation's nuclear weapons program.

According to the team at the Belfer Center for Science and International Affairs at Harvard's Kennedy School, the most powerful cyber countries in the world are as follows:   

1. USA  
2. China
3. UK
4. Russia
5. Netherlands
6. France
7. Germany
8. Canada
9. Japan
10. Australia 

Surprisingly, this list includes neither Israel nor Iran, which might be thought more obvious candidates for this list rather than Germany or Australia, which have both figured prominently as victims of cyber attacks from hostile nations.

Cyber espionage has been going on pretty much since the dawn of the web, with Russia, China, Iran and North Korea generally seen as the most likely to be engaging in cyber-espionage campaigns against Western targets. Their Advanced Persistent Threat (APT) hacking groups target governments and organisations around the world.

Western governments are also investing heavily in their own cyber-espionage expertise and one of the most high-profile cyber attacks, the Stuxnet worm used against the Iranian nuclear project, was led by the US. 

Now, a new set of countries are beginning to use the same tactics as some of their larger and more powerful rivals. Some states, like China, France, Singapore and the United States, have created higher-level military commands and substantial dedicated force structures. In these cases, there can be the added complication of overlaps, in terms of doctrine and force structure, between cyber operations and information warfare operations. Other states, like Israel and the Britain, rely more heavily on structures that integrate their military and civilian capabilities.

All of these events clearly point to a growing recognition of the vital strategic value of a nation's cyber security skills for both defensive and offensive purposes. To update Chairman Mao's belief that political power grows from the barrel of a gun some might say that in the 21st century, it emerges via a computer keyboard. 

Harvard Belfer Center:     IISS:           ZDNet:      World Economic Forum:     SecureWorldExpo

You Might Also Read: 

Iran's Cutting Edge Cyberwar Capabilities:

 

« AI Will Soon Replace Cyber Security Staff
How Nation States Use Their Cyber Power »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

Cybersecurity Philippines CERT (CSP-CERT)

Cybersecurity Philippines CERT (CSP-CERT)

Cybersecurity Philippines CERT is the national Computer Emergency Response Team for the Philippines.

Swiss Re

Swiss Re

Swiss Re Group is a leading wholesale provider of reinsurance, insurance and other insurance-based forms of risk transfer including cyber risk.

DCIT

DCIT

DCIT is a specialist in providing comprehensive consulting and auditing services in the field of information technology, PROVYS development software and security system AuditSquare.

GE Digital

GE Digital

GE Digital is a leading software company for the Industrial Internet. Products include Industrial Cyber Security for Operational Technology (OT).

Labris Networks

Labris Networks

Labris Networks specializes in DDoS mitigation, NG Firewall, Unified Threat Management, Centralized Management, Regulatory Compliances and SOC/CERT Services.

SecuDrive

SecuDrive

SecuDrive, provides hardware encrypted external storage devices to protect a company’s sensitive and important data.

Olfeo

Olfeo

Olfeo is a content filtering software vendor. Our proxy and filtering solution helps our customers to manage, monitor and secure their Internet traffic.

Stealthcare

Stealthcare

Stealthcare is a full service, global cyber security firm offering solutions that educate, empower and protect.

Verifi

Verifi

Verifi is an award-winning provider of end-to-end payment protection and risk management solutions.

Pires Investments

Pires Investments

Pires is building an investment portfolio of high-tech businesses across areas such as Artificial Intelligence, Internet of Things, Cyber Security and Augmented/Virtual Reality.

SnapAttack

SnapAttack

SnapAttack is a collaborative platform that empowers your security team to stay ahead of threats, create robust behavioral analytics for your existing tools, and prove your program's effectiveness.

ClearHub

ClearHub

The aim of ClearHub is simple: to give businesses like yours access to the best talent, all screened and technically tested by Clearvision’s expert team.

Ping Identity

Ping Identity

At Ping Identity, we believe in making digital experiences both secure and seamless for all users, without compromise. That’s digital freedom.

Cranium

Cranium

Cranium are an international consultancy organisation specialised in privacy, security and data management.

Triskele Labs

Triskele Labs

Triskele Labs deliver services including Penetration Testing, Compliance and Risk Management through to 24*7*365 Security Operations and outsourced Cybersecurity Managers.

Sinergi Digital

Sinergi Digital

Sinergi Digital is a business unit of the Metrodata Group with a focus on providing ICT solution to help accelerating digital transformation.