Cyberwarfare security solutions for large enterprises

The impact of cyberwarfare

The impact of cyberwarfare on political organizations and critical infrastructure vendors is well-documented. What is considerably less discussed, however, is how and why large enterprises should prepare for politically-motivated cyber-intrusions. Where once warfare had clear rules and targets, modern cyberwarfare is completely anarchic and knows no boundaries.

For example, in 2015, the U.S. Department of Defense issued a warning that external nation-state adversaries were not only using APTs (advanced persistent threats) to compromise sensitive data held by government contractors, but also to steal confidential information from academic institutes. Top cybersecurity firm CrowdStrike gave a similar warning earlier this year, revealing that there has been a resurgence in attempts by Chinese hacking groups to break into the systems of U.S.-based enterprises — specifically including businesses in the pharmaceutical, hotel and telecommunication sectors.

The surge has made it critical for enterprise stakeholders to understand that no system or network can be 100% safe from a cyberassault and that organizations have to increasingly be vigilant and prepared for the new, not-so-apparent risks.

Why is cyberwarfare on the rise?

There are several reasons why non-nation and nation-state actors are investing in cyberwarfare, and today more than 140 nations have some kind of cyberweapon development initiative in place. Primarily, the attack method provides more bang for the buck than investment in traditional weapons. Sophisticated tactics like the use of persistent surveillance tools rely on human resources who can find a starting point by exploiting a day zero flaw, spearphishing or social engineering. Consequently, the skilled amongst these humans adapt, insert and monitor surveillance software in a victim’s network or system.

Gathering a crew to do all this is far more accessible and cheaper to nation-states. It enables politically-driven adversaries to carry out attacks without as much danger of (Read more...)

*** This is a Security Bloggers Network syndicated blog from Infosec Resources authored by Dan Virgillito. Read the original post at: