I recently finished reading “This is How They Tell Me the World Ends”, by New York Times cybersecurity reporter, Nicole Perlroth. It is an exciting read about the raging global cyber-warfare landscape. The book deep dives into the history of international espionage, the development of the “Zero-Day” black market, nation state backed groups, the sophisticated tools being used costing the public and private sector billions in damages annually, and orchestrated threats to American democracy. I’d highly recommend this book to any business owner, enterprise executive, company stakeholder, or public official who is looking to understand the threats and the importance of implementing a comprehensive layered approach to cybersecurity. “There are two kinds of big companies in the United States. There are those who've been hacked by the Chinese and those who don't know they've been hacked by the Chinese.”. - James Comey, former Director of the FBI. #cybersecurity #globalcyberwarfare #zeroday #nationstate
Richard Fernandez’s Post
More Relevant Posts
-
Is Your Business Safe? Biden's Ban on Kaspersky Lab Poses Urgent Security Challenge! 🚨💥 The Biden administration has banned Kaspersky Lab products, citing severe security threats due to the company's alleged ties to Russia. With escalating tensions and conflict, this move is crucial for national security. Why Act Now? 🔐 Kaspersky Lab is now barred from selling, updating, or licensing products in the U.S. Commerce Secretary Gina Raimondo warns, "Russia has the capacity and intent to exploit companies like Kaspersky to weaponize the personal information of Americans. Is Your Business at Risk? How are you adapting to this critical change? Share your strategies and concerns below. Let’s work together to safeguard our businesses! #CyberSecurity #BusinessSafety #NationalSecurity #BidenBan #TechAlert
To view or add a comment, sign in
-
This is an extremely interesting topic, which can easily lead to a series of deep reflections on modern #hybridwarfare, the valuable role of agency coordination, and helps to better understand geopolitical events in cyberspace. Kudos to Francesco and the team! Here you can find the article: https://lnkd.in/dbJfCQDr
This isn't perhaps our best work, but it's certainly the one we wanted to publish at all costs. Writing about intelligence is always a delicate and complex task, especially when it comes to finding the right intersection between intelligence and cybersecurity. The last two years have been decidedly "interesting" from the perspective of international events. The war in Ukraine is redefining a way of conducting conflicts that is both new and, in a sense, ancient. In the field of cybersecurity, along with Cosimo, we have noticed some discrepancies in the way cyber operations are conducted. These operations often lack the necessary coordination in the chain of command and control to achieve the intended objectives, both from an offensive and defensive standpoint. This led us to question whether this is a problem specific to this part of the world or if it also concerns those who today find themselves on the other side of the new Iron Curtain. We tried to be precise and rigorous. The topic is complex and we approached it with the necessary attention, aware of its sensitivity. We wanted to contribute to the academic debate, which can sometimes seem distant from operational reality, while maintaining a balance between what we wanted to write and what couldn't be shared for confidentiality reasons. We particularly thank Professor Max Smeets from ETH Zurich, who dedicated time to read our work and provide valuable feedback, helping us bring the project to a level of maturity. We are convinced that there is still much to explore and write about on this topic. #cyberthreatintelligence #cti #cybersecurity #infosec #APT
To view or add a comment, sign in
-
Blurred lines: Two major conflicts — Ukraine-Russia and Israel-Hamas — show how #cyber operations are sometimes being combined with kinetic attacks, especially to target of critical national infrastructure and supply chains, and that even when not successful, can still have a profound psychological impact, say Adi Bleih & Daniel P. from threat intelligence firm Cyberint, in this interview we recorded at this year's @Infosecurity Europe in London. Watch now ▶: https://lnkd.in/eHM7hJGb
To view or add a comment, sign in
-
Associate Professor in Information Security at Royal Holloway, University of London; Visiting Professor, Keio University, Tokyo, Japan 特別 招聘 准教授 慶応 大学 東京 日本
We tend to think of adversaries in offensive #cyber operations, cyber #warfare, and in any #conflict in general, as monolithic entities with clearly defined aims and strategies. This is shown to be an oversimplified perception of the reality of conflicts. Cultural aspects, information asymmetries, and (internal) competition diversify the entities within adversaries. In our recent work, we investigate these internal conflicts amongst the three Russian intelligence agencies. The full article can be found here: https://lnkd.in/dJaAUb9W Please feel free to share with anyone who might find this area of research interesting. #cyberwar #conflict #cybersecurity
This isn't perhaps our best work, but it's certainly the one we wanted to publish at all costs. Writing about intelligence is always a delicate and complex task, especially when it comes to finding the right intersection between intelligence and cybersecurity. The last two years have been decidedly "interesting" from the perspective of international events. The war in Ukraine is redefining a way of conducting conflicts that is both new and, in a sense, ancient. In the field of cybersecurity, along with Cosimo, we have noticed some discrepancies in the way cyber operations are conducted. These operations often lack the necessary coordination in the chain of command and control to achieve the intended objectives, both from an offensive and defensive standpoint. This led us to question whether this is a problem specific to this part of the world or if it also concerns those who today find themselves on the other side of the new Iron Curtain. We tried to be precise and rigorous. The topic is complex and we approached it with the necessary attention, aware of its sensitivity. We wanted to contribute to the academic debate, which can sometimes seem distant from operational reality, while maintaining a balance between what we wanted to write and what couldn't be shared for confidentiality reasons. We particularly thank Professor Max Smeets from ETH Zurich, who dedicated time to read our work and provide valuable feedback, helping us bring the project to a level of maturity. We are convinced that there is still much to explore and write about on this topic. #cyberthreatintelligence #cti #cybersecurity #infosec #APT
To view or add a comment, sign in
-
#GenAI has accelerated a two decades old emphasis on 'Agile' 'fast food feature-rich software'. It also poses threats and risks to Mission Critical and Social Critical infrastructure. The Technical Risks and Technical Debts being proliferated by these #AISystems are being transferred onto Society at large through the necessity of compensatory Taxpayer funded regulations and oversight. This accumulating Technical Debt is being financed by National Debt.
The threat is NOT theoretical Cybersecurity IS national security Absolutely stellar testimony from Jen Easterly today on the hearing on "China's Cyber Threat to the U.S." Jen discusses how: - How Cybersecurity and Infrastructure Security Agency (CISA) teams have found and eradicated Chinese intrusions in MULTIPLE critical infrastructure sectors (aviation, water, energy and transportation) - Based on intelligence, this is JUST the tip of the iceberg of Chinese pervasive attacks and presence on U.S. critical infrastructure - Efforts to detect and eradicate malicious Chinese intrusions across U.S. critical infrastructure - How we've made it EASY due to inherently insecure software and products across critical infrastructure - Our national security weaknesses and exploitability due to decades of insecure development, prioritization of speed to market and not considering cybersecurity a core part of that process. - The need for a software liability regime, along with safe harbor for those who properly prioritize cybersecurity Great example of cybersecurity leadership from Jen and CISA in this testimony, clearly laying out the reality that cyber risk is business and national security risks and if we don't change the current paradigm, our everyday way of life and prosperity will continue to be at grave risk. https://lnkd.in/evjMfcvV #cybersecurity #nationalsecurity #software
User Clip: Jen Easterly
c-span.org
To view or add a comment, sign in
-
I think👁️feel | read | write | speak | talk to myself, | talk to people, | sing, | strum strum strings | tap keys | tap screens | tap temples | Drink | eat | absorb | Discard🃏⚡🤠⚡👶🤖🐢👨🎤👮🏼♀️🥷🏽👻👾
Cybersecurity IS National Security
The threat is NOT theoretical Cybersecurity IS national security Absolutely stellar testimony from Jen Easterly today on the hearing on "China's Cyber Threat to the U.S." Jen discusses how: - How Cybersecurity and Infrastructure Security Agency (CISA) teams have found and eradicated Chinese intrusions in MULTIPLE critical infrastructure sectors (aviation, water, energy and transportation) - Based on intelligence, this is JUST the tip of the iceberg of Chinese pervasive attacks and presence on U.S. critical infrastructure - Efforts to detect and eradicate malicious Chinese intrusions across U.S. critical infrastructure - How we've made it EASY due to inherently insecure software and products across critical infrastructure - Our national security weaknesses and exploitability due to decades of insecure development, prioritization of speed to market and not considering cybersecurity a core part of that process. - The need for a software liability regime, along with safe harbor for those who properly prioritize cybersecurity Great example of cybersecurity leadership from Jen and CISA in this testimony, clearly laying out the reality that cyber risk is business and national security risks and if we don't change the current paradigm, our everyday way of life and prosperity will continue to be at grave risk. https://lnkd.in/evjMfcvV #cybersecurity #nationalsecurity #software
User Clip: Jen Easterly
c-span.org
To view or add a comment, sign in
-
Solid logic and excellent delivery of the message. Cyber risk is a matter of national security. Also love the use of the word "saunter" to describe the threat actors entering through doors that have been left open. Some of these exposures to attack are indeed not locked doors nor even closed doors. It's almost incorrect to call them breaches when there is/was no resistance or control in place to stop the activity. #CISA #Easterly #testimony #cybersecurity #nationalsecurity #imperitaives #resilience #riskmanagement #criticalinfrastructure #publicprivatepartnership #FTW
The threat is NOT theoretical Cybersecurity IS national security Absolutely stellar testimony from Jen Easterly today on the hearing on "China's Cyber Threat to the U.S." Jen discusses how: - How Cybersecurity and Infrastructure Security Agency (CISA) teams have found and eradicated Chinese intrusions in MULTIPLE critical infrastructure sectors (aviation, water, energy and transportation) - Based on intelligence, this is JUST the tip of the iceberg of Chinese pervasive attacks and presence on U.S. critical infrastructure - Efforts to detect and eradicate malicious Chinese intrusions across U.S. critical infrastructure - How we've made it EASY due to inherently insecure software and products across critical infrastructure - Our national security weaknesses and exploitability due to decades of insecure development, prioritization of speed to market and not considering cybersecurity a core part of that process. - The need for a software liability regime, along with safe harbor for those who properly prioritize cybersecurity Great example of cybersecurity leadership from Jen and CISA in this testimony, clearly laying out the reality that cyber risk is business and national security risks and if we don't change the current paradigm, our everyday way of life and prosperity will continue to be at grave risk. https://lnkd.in/evjMfcvV #cybersecurity #nationalsecurity #software
User Clip: Jen Easterly
c-span.org
To view or add a comment, sign in
-
“To counteract a cyber attacker, organizations need to learn to think like one.” Watch our insightful interview here 👉 https://lnkd.in/ehTkSEhA Sarah Armstrong-Smith delves into the psychology behind the most prolific cyber attacks in history, providing a rare glimpse into the humans orchestrating these digital age battles, and their impact on modern geopolitics and more...
To view or add a comment, sign in
-
Malware as a Tool of Influence: Unveiling a New Threat to Election Integrity A groundbreaking study by Christopher Whyte, an associate professor of homeland security and emergency preparedness at the L. Douglas Wilder School of Government and Public Affairs, casts light on a new cyber threat to democracy. Published in the Oxford Journal of Cybersecurity and highlighted by CSO magazine, Whyte's research into Russia's use of malware for boosting disinformation campaigns signals a significant shift in electoral interference tactics. This pivotal work prompts a reevaluation of our defenses against cyber-enabled influence operations. Explore the insights that set a new course for protecting our democratic processes. Read the full article in CSO: https://bit.ly/3Pd74ZI #ElectionIntegrity #CyberSecurity #DemocraticInstitutions"
To view or add a comment, sign in
-
Building the Greatest Computer Forensics & Data Breach Investigative Firm | Assisting Law Firms & Corporations
-Disclosure of the 'The Mask' espionage group resurfacing after a decade sheds light on their latest campaign in Latin America and Central Africa, setting off alarms within the cyber security community due to their Spanish-speaking origin and nearly 400 past victims. -The technical sophistication displayed by 'The Mask' group, coupled with their target regions and previous success, signals an elevated threat level to organizations in these areas. -This development underscores the importance of proactive defenses, continuous monitoring, and advanced threat intelligence to mitigate the risk posed by such persistent threat actors in the ever-evolving cyber landscape.
To view or add a comment, sign in