Cyberconflict in Ukraine has become normalised in that it is focused, there is no lasting damage, and it effectively conveys a sense of helplessness to the affected government and population. At the same time, it signals to other governments that they are not impervious to such attacks.
Cyber-related risks to the energy sector can be minimised by strategic intelligence gathering on potential threat actors, weaving of cyber security strategies into corporate decisions, industry-wide collaboration as well as up-to-date backup systems.
While maintaining cyber hygiene in these disruptive times is indeed a challenge, each organisation should work towards putting in place a tailor-made work-from-home cyber defence strategy.
TikTok has hooked youngsters around the world. What is worrisome is the lack of understanding about the long-term implications of such social media apps with regard to data protection and national security.
Besides military targets, a number of strategic civilian targets, like urban data and communication centres, stock exchanges, factories and other centres of gravity could also be attacked by e-bombs.
The US decision to elevate its Cyber Command to that of a Unified Combatant Command sends a strong signal to entities and countries inimical to its interests to recalibrate their security calculus.
Most attacks prior to Petya were carried out by criminals for financial gain, but some characteristics of the Petya malware have led to doubts as to whether the culprits are state actors.
From Iron Dome to Cyber Dome: Defending Israel’s Cyberspace
With cyberattacks on the rise in the wake of the Israel–Hamas conflict, Israel’s ‘cyber-dome’ initiative aims to fortify its digital defences.