Digitisation and advancements in information and communication technology have revolutionised every aspect of modern life. While a connected digital ecosystem that intertwines critical infrastructure provides enormous potential for innovation and development, it also increases the attack surface. The way a country responds to the opportunities and risks that arise in cyberspace plays a crucial role in its growth and security.
Though we all acknowledge the imminent risks cyber attacks pose, are we aware of the scale of impact such attacks can have on a country and its people? Let’s explore the impact as well as who the attackers are, and how they can be stopped.
Who are the attackers and what can they do to a nation?
Based on their motives and scale of attack, cyber attackers can be classified into four groups:
• State sponsored attackers are nonstate individuals or organisations who are discreetly supported by a government entity. These attackers generally operate to fulfill political, commercial or military interests of their country of origin. In today’s world of mutual distrust where nations want to have an upper hand over others, state sponsored cyberattacks have become commonplace. Attackers use a combination of different techniques ranging from spear phishing attempts backed by well-researched social engineering to sophisticated advanced persistent threat (APT) campaigns in order to infiltrate networks and gain access to confidential information such as trade-secrets, research findings, and war strategies to name a few. Cyber espionage and insider attacks (where a trusted insider is paid for carrying out parts of the attack) are also not uncommon. State sponsored attacks have the potential to crumple entire nation-states when the right data is compromised.
• Hacktivists are individuals or groups of individuals who use cyber-attacks as a way of expressing political or ideological extremism.
Numerous cyber-attacks have been carried out in the past as a means of expressing resistance. Launching large scale distributed denial of service (DDoS) attacks to render government servers inaccessible and loading videos and images that criticise a state’s policies on government websites are some of the most common methods hacktivists employ to make their voice heard. While hacktivism appears to be just a form of electronic civil disobedience without malicious intent, taking down networks of organisations that provide essential services such as hospitals can have devastating impact on citizens’ lives.
Continue reading your story on the app
Continue reading your story in the magazine
“ENCRYPTION IS NON-NEGOTIABLE”: KAPALYA
MOHAMED MENAKBI, VP SALES & STRATEGIES – EMEA, KAPALYA, DELVES INTO THE IMPORTANCE OF ENCRYPTION IN KEEPING DATA PROTECTED AND IN SECURING ENTERPRISES.
ROADMAP TO CLOUD SUCCESS
AS THE CLOUD CONTINUES TO GROW AT A RAPID AND UNMITIGATED PACE, IT AND BUSINESS LEADERS NEED TO ENSURE THAT KEY PEOPLE WITHIN THEIR ORGRANISATION ARE EQUIPPED WITH THE SKILLS TO EFFECTIVELY AND SECURELY LEVERAGE THE BENEFITS. SANS INSTITUTE FELLOW INSTRUCTOR FRANK KIM DISCUSSES HOW THE COMPANY’S LATEST CURRICULUM CAN ENABLE ENTERPRISES TO FUTURE-PROOF THEIR CLOUD STRATEGIES.
THE QUICK AND THE DEAD: FUTURE-PROOFING SECOPS
SAM CURRY, CHIEF SECURITY OFFICER, CYBEREASON, DISCUSSES HOW CYBER ADVERSARIES ARE EVOLVING THEIR METHODS AND WHAT IT WILL TAKE FOR ENTERPRISES TO FUTURE-PROOF THEIR STRATEGIES.
SIMPLIFIED CONNECTIONS
DAN KLIMKE, DIRECTOR OF MARKETING, NETALLY, ON HOW THE COMPANY IS PROVIDING TOOLS TO SIMPLIFY NETWORK TESTING AND DELIVER INCREASED VISIBILITY ACROSS WIRED AND WIRELESS NETWORKS.
NAVIGATING THE NEW NORMAL
HUSNI HAMMOUD, MANAGING DIRECTOR BARRACUDA NETWORKS, IVANTI AND ESET MIDDLE EAST (PART OF MIDIS GROUP) SPEAKS TO SAME ABOUT THE NEW SECURITY LANDSCAPE POST THE PANDEMIC AND HOW INNOVATION CONTINUES TO REMAIN THE KEY TO FUTURE GROWTH.
RANSOMWARE: WHAT IS YOUR DATA WORTH?
MARK NUTT, SENIOR VICE PRESIDENT, EMEA, VERITAS TECHNOLOGIES, WEIGHS IN ON THE AGE-OLD IT SECURITY QUESTION – SHOULD YOU OR SHOULD YOU NOT PAY RANSOMWARE?
ESET: READY TO MAKE WAVES AT GITEX 2020
COMPANY TO SHOWCASE RECENTLY LAUNCHED PRODUCTS AT EVENT, SAYS DEMES STROUTHOS – GENERAL MANAGER, ESET MIDDLE EAST.
HOW CLOUD COMPUTING WILL ACCELERATE DIGITAL TRANSFORMATION IN A POST-EPIDEMIC ERA
LI SHI, PRESIDENT OF CLOUD AND AI BUSINESS GROUP, HUAWEI MIDDLE EAST, DISCUSSES HOW DIGITAL TECHNOLOGIES SUCH AS CLOUD COMPUTING AND AI WILL ENABLE ENTERPRISES TO SUCCEED IN A POST-EPIDEMIC ERA.
DEFENDING THE HYBRID LANDSCAPE
BEN CARR, CHIEF INFORMATION SECURITY OFFICER, QUALYS, DISCUSSES WHY ENTERPRISES NEED TO UPDATE THEIR CYBERSECURITY BEST PRACTICES TO PROTECT THE NEW HYBRID WORKPLACE.
CYBERSECURITY 2021: THE NEW YEAR WILL BRING NEW CHALLENGES
WITH ATTACKS ON THE RISE AND A LARGER-THAN-LIFE SURFACE TO DEFEND, SECURITY TEAMS WILL NEED A NEW MINDSET IN ORDER TO KEEP THEIR SYSTEMS, DATA AND PEOPLE SAFE, SAYS CITRIX’S CHIEF INFORMATION SECURITY OFFICER FERMIN SERNA.
INTEL REPLACES ITS CHIEF EXECUTIVE AFTER A ROCKY STRETCH
Intel is replacing its CEO after only two years in what had been a rough stretch for the chipmaker.
WATCH AND LEARN
We Honed Our Discreet Observation Skills at the Two-Day Guerrilla Mentor Rural Reconnaissance Class
Acer Swift 5 (2020) : This MacBook Air alternative plays Fortnite
At 2.3 pounds, the Acer Swift 5 is a tiny Tiger Lake powerhouse.
2021: PUSHING THE BOUNDARIES
With the introduction of a 5G iPhone, a superfast M1 chip for the Mac, a bunch of hardware like AirPods Max, Apple Watch SE, and HomePod mini, and significant investments in its services division, Apple had a stellar year in 2020. But the future is just around the corner, and even greater innovations await.
2021: PUSHING THE BOUNDARIES
With the introduction of a 5G iPhone, a superfast M1 chip for the Mac, a bunch of hardware like AirPods Max, Apple Watch SE, and HomePod mini, and significant investments in its services division, Apple had a stellar year in 2020. But the future is just around the corner, and even greater innovations await. Let’s take a look at what the company has up its sleeve.
SILICON: HOW IT WILL REVOLUTIONIZE COMPUTING
At this year’s virtual WWDC, Apple announced plans to move away from Intel-based Macs to custom silicon, perhaps one of the biggest changes to the Mac since its introduction in 1984. By further unifying the hardware and software of MacBooks, Mac Minis and iMacs in a similar manner to the iPhone, it could revolutionize the way Apple does computing forever…
SCAD
Ervin A. Johnson’s #InHonor Project
How To Apply Thermal Paste
NON CONDUCTIVE THERMAL PASTE Recommended, Noctua NT-H1.
Baldur's Gate III
Remembering the Forgotten Realms
AOC C27G2
Punchy pricing for 165Hz, pity about that VA panel