US Cyber Strike On Iran Is A Step Change

After the US launched a cyber-attack on Iran’s weapons systems last month, military warfare could increasingly look like a loss of connectivity, rather than a loss of life, according to a cyber-security expert.

The attack on Iran’s security systems, used to control its rocket and missile launches, was a “game changing” event for both the cyber-security industry and “how we think about geopolitics,” Haiyan Song, the Senior Vice President of IT / Security firm Splunk. “A military action got diverted to really becoming a cyber action,” said Song being interviewed by CNBC.

US President Trump reportedly approved the cyber-attack against the Islamic Revolutionary Guard Corps on June 22, days after Tehran shot down a surveillance drone. 

Days before the cyber-attack, Trump had called off a conventional military assault against Iran, saying that the expected loss of life, estimated to be about 150 people, would have been disproportionate to the downing of the unmanned drone.
The attack marked the latest chapter in the US and Iran’s on-going cyber operations against each other. Tensions have been escalating between Washington and Tehran, after the US unilaterally withdrew from the 2015 nuclear deal with Iran last year and began a policy of “maximum pressure” campaign aimed at ending its nuclear ambitions.

Asked if she anticipated a ramping up of such cyberattacks as a means of warfare, Song, senior vice president and general manager of security markets at the multinational software company, was unequivocal.

“The short answer is absolutely,” Song said at the World Economic Forum in Dalian, China. “I think this is really a new way for a lot of countries and nation states to really think about their competitiveness in the military world.”

Such forms of cyber-attacks are also growing in the business world, Song noted, highlighting phishing attacks and the infiltration of cloud technology as two particular areas of disruption.

She added that as inter-connectivity increases, “the vengeance, the frequency and the speed and the coverage” of such attacks will only grow.

CNBC:

You Might Also Read: 

The ‘Rules’ Of Modern Warfare Are Being Rewritten:

The Human Cost Of Cyberwar:

 

 

« The Cyber Effects Of Industry 4.0 On Warfare
Professionals Say Network Security is Getting Harder »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

ADF Solutions

ADF Solutions

ADF Solutions is a leading provider of digital forensic and media storage exploitation tools.

Kaymera Technologies

Kaymera Technologies

Kaymera’s comprehensive mobile enterprise security solution defends against all mobile threat and attack vectors.

Hague Security Delta (HSD)

Hague Security Delta (HSD)

The Hague Security Delta Campus is home of the leading cyber security cluster in Europe with an Innovation Centre, labs and training facilities.

Materna Virtual Solution

Materna Virtual Solution

Materna Virtual Solution security solutions enable user-friendly, secure mobile working environments.

CyberSift

CyberSift

CyberSift is a cyber security provider. We develop threat detection software which needs no infrastructure changes as it integrates with almost any security tool.

Cyber Security Austria (CSA)

Cyber Security Austria (CSA)

Cyber Security Austria (CSA) is an independent non-profit association with the aim to address security issues in the area of IT/cyber security of critical/strategic infrastructures in Austria.

Cybersecurity Defense Initiative (CDI) - University of Arkansas

Cybersecurity Defense Initiative (CDI) - University of Arkansas

The Cybersecurity Defense Initiative is a national cybersecurity training program, developed for technical personnel and managers who monitor and protect our nation's critical cyber infrastructures.

ReFirm Labs

ReFirm Labs

ReFirm Labs provides the tools you need for firmware security, vetting, analysis and continuous IoT security monitoring.

Cyber Security & Cloud Expo

Cyber Security & Cloud Expo

The Cyber Security & Cloud Expo is an international event series in London, Amsterdam and Silicon Valley.

Fusion Risk Management

Fusion Risk Management

Fusion Risk Management focuses on operational resilience encompassing business continuity, risk management, IT risk, and crisis and incident management.

BT Security

BT Security

BT provides telecommunications and network infrastructure services to keep businesses around the world connected and secure.

CyberScotland

CyberScotland

The CyberScotland Partnership is a collaboration of key strategic stakeholders, brought together to focus efforts on improving cyber resilience across Scotland in a coordinated and coherent way.

HackEDU

HackEDU

HackEDU provides secure coding training to companies ranging from startups to the Fortune 500.

Airiam

Airiam

Airiam provides cybersecurity, managed IT, consulting, incident response, and digital transformation services so you can focus on what matters most.

Triskele Labs

Triskele Labs

Triskele Labs deliver services including Penetration Testing, Compliance and Risk Management through to 24*7*365 Security Operations and outsourced Cybersecurity Managers.

Xmore AI

Xmore AI

Xmore AI, an emerging disruptor in our incubation, is building AI models to optimize and secure IT with the mission of increasing efficiency and reducing costs.