Homepage / Technology / The next 9/11 will be a cyberattack, security expert warns
Board Room Apps Secure Board Management With Secure Board Portals What Happens at Board of Directors Meetings? Board Room Software Review How to Prepare Board Rooms for Effective Board Meetings Board Room Software Boosts Performance and Communication Selecting a Secure Data Room Review Local Data Room Service Review How to Find the Best Virtual Data Room Review What to Look for in a Data Room uk Provider Document Storage and Distribution Software Everything About VDRs Corporate Software Advantages How to Choose a Virtual Data Room Provider The Most Secure Way to Transfer Files How to Manage Online Board Meetings Benefits Virtual Data Room Solutions – Must-Haves for M&A and Due Diligence Best Data Room Functions for the Different Types of Industries How to Choose a VDR Software Provider How to Choose an Online Board Portal The Benefits of a Boardroom Review Board Room Online Solutions – How to Get the Most Out of Your Board Meetings Why You Need a Board Room How a Board Room Blog Can Transform Your Business Choosing the Best Board Room Format How to Have Productive and Engaging Board Directors Meetings Choosing the Right Virtual Data Room How to Keep Safe Documents Storage Teaching Kids About Online Safety Avoid Costly Mistakes With Free Data Room Services Corporate Virtual Data Secure Online Data Rooms Solutions How to Keep Share, Edit and Delete Your Data Safe Virtual Data Room Software Secrets for M&A Due Diligence What to Look For in Boardroom Providers Board of Directors Blog Posts How to Deliver Value at Your Board Meetings How to Have Effective Board Meetings Responsibilities of Board Members Deal Management – How to Effectively Manage a Complex Sales Pipeline Data Rooms For Mergers And Acquisitions How to Have a Successful Board Room Meeting Choosing a Board Room Service Provider What is a Board Room Service? Board Room Software Review – Choosing the Best Portal for Mother Board Meetings Why a Board Room Providers Review Is Important What Is a Board Room Review? Venture Software for VC Firms What Is an Assessment Report? The Importance of a Tech Audit Popular Business Applications What to Look For in a Data Room App What Are Business Applications? How to Choose a Virtual Data Room How to Plan a Data Room Review Coronavirus Guide What is a Virtual Data Room? What Is Data Science? What Is an Operating System? Turbotax Small Business Review How Online VDRs Are Used in M&A Deals Why Choose VDR Software? The Power of Business Software The Benefits of a Software Board Online Data Room Review The Importance of Tech Knowledge Improving Accuracy of Financial Data Online Business Records – How to Keep Your Online Business Records Accurate and Secure What is a Board Portal De? DealRoom Review – A Review of VDR Software M&A Due Diligence for Private Companies The Virtual Data Room Review Why Companies Use a Data Room Review to Facilitate M&A Transactions The Best File Sharing Services How Online VDRs Are Used in M&A Deals Best Virtual Data Room How to Choose a Best Board Room Provider Choosing a Data Room for Due Diligence What Is a Data Room Business Software? Best Data Room Providers Review Data Room Providers Review Mostbet Tr Resmî Web Sitesinde Giriş Ve Kayıt Olm Kumar Oynamak Için En Iyi Yerdir The Benefits of Cloud Data Services for Enterprises Online Data Room and SSL How to Build a Diverse Board of Directors Best Virtual Data Review A Data Room Service Review How Runn Makes Project Data Accessible, Accurate and Shareable Five Pillars of Information Protection The Importance of Online Business Reports Benefits of Colocation Services Virtual Data Rooms Guide Choosing a Business Virtual Data Room Choosing the Right VDR Service Review How to Conduct a Virtual Data Room Review Glory Online Casino Türkiye En Iyi Oyunları Ve Bahisleri Olan Kumarhane Mostbet Casino On-line Em Pt 2024 ️ Bónus As Well As Revisão Mostbet Tr Resmî Web Sitesinde Giriş Ve Kayıt Olm Mobil Için Glory Casino Uygulaması: Android’de Ücretsiz Olarak Nasıl Indirili

Technology

The next 9/11 will be a cyberattack, security expert warns

A cyberattack of devastating proportions is not a matter of if, but when, numerous security experts believe.

And the scale of it, one information security specialist said this week, will be such that it will have its own name — like Pearl Harbor or 9/11.

“The more I speak to people, the more they think that the next Pearl Harbor is going to be a cyberattack,” cybersecurity executive and professional hacker Tarah Wheeler told a panel audience during the Organization for Economic Cooperation and Development’s (OECD) annual forum in Paris.

“I think that the most horrifying cybersecurity attack is going to have its own name and I think it’s going to involve something more terrifying than we’ve thought of yet.”

Wheeler is CEO and principal security advisor at Red Queen Technologies, a cybersecurity fellow at Washington, D.C.-based think tank New America, and former cybersecurity czar at multinational software firm Symantec.

Explaining her premonition, Wheeler pointed to vital health and transport infrastructure she described as grossly under-protected.

“I think about the fact that most American healthcare technology is secured, if at all, with ancient, crumbling security infrastructure and architecture. I think of planes full of people, the kind of infrastructure that protects flu vaccinations. I think about fertility clinics losing years’ worth of viable embryos,” she said, stressing that the world is not paying attention to that crumbling infrastructure.

Wheeler is not alone in her apocalyptic outlook. Not a single report from technology companies and researchers in this field has claimed that the cyberthreat environment is becoming less hostile or less significant.

The World Economic Forum’s (WEF) Global Risks Report 2018 names cyberattacks and cyber warfare as a top cause of disruption in the next five years, placed only after natural disasters and extreme weather events.

“In a worst-case scenario, attackers could trigger a breakdown in the systems that keep societies functioning,” the report said. Industry and critical infrastructure like power grids and water purification systems could be potential targets for hackers, whether they are small groups or state actors.

Retired Admiral James Stavridis, who served as NATO Supreme Allied Commander for Europe, echoed these warnings in a prior interview with CNBC: “We’re headed toward a cyber Pearl Harbor, and it is going to come at either the grid or the financial sector… we need to think about this cyberattack as a pandemic.”

Artificial intelligence-focused security firm BluVector reported in February that almost 40 percent of all industrial control systems and critical infrastructure faced a cyberattack at some point in the second half of 2017.

Companies and governments aren’t doing enough to protect these systems, Wheeler said.

“The inevitability is based in the easy access to the kinds of exploits that still work 10, 15, 20 years after they’ve been revealed,” she said, noting that there are still companies running critical infrastructure, including health infrastructure, on Windows XP and other platforms that are unpatchable — meaning they can’t be updated for vulnerability and bug fixes. Many internet of things (IOT) devices, she described, are unpatchable by design.

IOT, which has been described as “merging physical and virtual worlds, creating smart environments” through devices connected to the internet and that communicate with one another, represents a whole new level of vulnerabilities.

And cybercriminals have an exponentially increasing number of potential targets, the WEF report said, “because the use of cloud services continues to accelerate and the internet of things is expected to expand from an estimated 8.4 billion devices in 2017 to a projected 20.4 billion in 2020.”

The CEO of major defense contractor Raytheon, John Harris, recently called cyberattacks the “single biggest threat to global security,” adding that “the more we are connected, the more we are vulnerable.”

But Wheeler didn’t specify who would likely be behind such acts, stressing that the nature of cyber warfare is asymmetric, and while there are state actors with hostile intentions, cyber weapons are accessible to just about anyone with the skills to deploy them.

What’s needed, Wheeler stressed, is “sensible, deep, not broad, cybersecurity regulation that has teeth.” She urged the private sector to listen to its “early warning system” — what she called the information security community, or hackers — rather than criminalizing their activity.

Industry experts have encouraged best practices and a greater awareness of the threats across the public and private sectors, and for both sides to improve collaboration.

The last two years have tested relations between countries amid allegations of Russian election hacking in the U.S. and threats emanating from North Korea, Iran and China, among others.

In March, the Donald Trump administration blamed Russia for a string of cyberattacks going back at least two years that targeted the U.S. power grid. International attacks like the WannaCry virus, which affected 300,000 computers in 150 countries and NotPetya, the alleged Russian-directed attack that caused $300 million in damages to multinational companies, may be just a small glimpse of what is on the horizon.

Source: Tech CNBC
The next 9/11 will be a cyberattack, security expert warns

Comments are closed.