US Cyber Strike On Iran Is A Step Change

After the US launched a cyber-attack on Iran’s weapons systems last month, military warfare could increasingly look like a loss of connectivity, rather than a loss of life, according to a cyber-security expert.

The attack on Iran’s security systems, used to control its rocket and missile launches, was a “game changing” event for both the cyber-security industry and “how we think about geopolitics,” Haiyan Song, the Senior Vice President of IT / Security firm Splunk. “A military action got diverted to really becoming a cyber action,” said Song being interviewed by CNBC.

US President Trump reportedly approved the cyber-attack against the Islamic Revolutionary Guard Corps on June 22, days after Tehran shot down a surveillance drone. 

Days before the cyber-attack, Trump had called off a conventional military assault against Iran, saying that the expected loss of life, estimated to be about 150 people, would have been disproportionate to the downing of the unmanned drone.
The attack marked the latest chapter in the US and Iran’s on-going cyber operations against each other. Tensions have been escalating between Washington and Tehran, after the US unilaterally withdrew from the 2015 nuclear deal with Iran last year and began a policy of “maximum pressure” campaign aimed at ending its nuclear ambitions.

Asked if she anticipated a ramping up of such cyberattacks as a means of warfare, Song, senior vice president and general manager of security markets at the multinational software company, was unequivocal.

“The short answer is absolutely,” Song said at the World Economic Forum in Dalian, China. “I think this is really a new way for a lot of countries and nation states to really think about their competitiveness in the military world.”

Such forms of cyber-attacks are also growing in the business world, Song noted, highlighting phishing attacks and the infiltration of cloud technology as two particular areas of disruption.

She added that as inter-connectivity increases, “the vengeance, the frequency and the speed and the coverage” of such attacks will only grow.

CNBC:

You Might Also Read: 

The ‘Rules’ Of Modern Warfare Are Being Rewritten:

The Human Cost Of Cyberwar:

 

 

« The Cyber Effects Of Industry 4.0 On Warfare
Professionals Say Network Security is Getting Harder »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Resecurity, Inc.

Resecurity, Inc.

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Quttera

Quttera

Quttera provides Website Security Solutions for Small & Medium Businesses, Enterprises and Organizations.

Q-CERT

Q-CERT

Q-CERT is the National Computer Security Emergency Team of Qatar.

Citicus

Citicus

Citicus provides world-class security, risk and compliance management software, plus supporting services.

Zimperium

Zimperium

Zimperium offers enterprise class protection for mobile devices against the next generation of advanced mobile attacks.

Verve Industrial

Verve Industrial

Verve specialize in providing software and services to help protect and secure critical industrial control systems.

e-Governance Academy (eGA)

e-Governance Academy (eGA)

eGA is a think tank and consultancy founded for the transfer of knowledge and best practice in e-governance, e-democracy and national cyber security.

Swiss Re

Swiss Re

Swiss Re Group is a leading wholesale provider of reinsurance, insurance and other insurance-based forms of risk transfer including cyber risk.

ThreatAware

ThreatAware

Total visibility of your business cybersecurity. Monitoring, management and compliance for your cybersecurity tools, people and processes from one easy to use dashboard.

National Accreditation Agency of Ukraine (NAAU)

National Accreditation Agency of Ukraine (NAAU)

NAAU is the national accreditation body for Ukraine. The directory of members provides details of organisations offering certification services for ISO 27001.

Trustify

Trustify

Trustify is a Managed Security Service Provider offering a suite of world-class Cyber Risk Management services.

Protek International

Protek International

Protek International delivers world-class Digital Forensics, eDiscovery, Cyber Security, and related Advisory services.

RKVST

RKVST

RKVST is a powerful tool that builds trust in multi-party processes when it’s critical to have high assurance in data for confident decisions.

Fireblocks

Fireblocks

Fireblocks is a digital asset security platform that helps financial institutions protect digital assets from theft or hackers.

RIoT Secure

RIoT Secure

RIoT Secure AB is a technology enabler within the IoT industry - created with a vision to ensure security technology exists in the foundations of software development for IoT solutions.

Coalition for Secure AI (CoSAI)

Coalition for Secure AI (CoSAI)

CoSAI is an open ecosystem of AI and security experts from industry leading organizations dedicated to sharing best practices for secure AI deployment and collaborating on AI security research.

Bridgenet Solutions

Bridgenet Solutions

Bridgenet specialises as a top-notch Information and Technology Solutions Provider for businesses.