• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Excelitas Qioptiq banner

BATTLESPACE Updates

   +44 (0)77689 54766
   

  • Home
  • Features
  • News Updates
  • Company Directory
  • About
  • Subscribe
  • Contact
  • Media Pack 2022

CYBER WARFARE AND HOMELAND SECURITY UPDATE

December 19, 2011 by

15 Dec 11. This was the year in which we came to accept the fact that we could not depend on our defenses to protect us from cyber intrusions. The cybersecurity focus began to shift more to response and mitigation as we realized that compromise is a fact of life.
“If someone really has you in their sights, they’ve got you,” Tim Roxey,
director of risk assessment at the North American Electric Reliability Corp., said in August when NERC announced that it had issued two threat alerts to power distributors. A group of C-level executives participating in a Washington discussion of cybersecurity in September agreed that despite the number of headlines generated by recent high-profile breaches, the instances of advanced persistent threats reported in the press are only the tip of an iceberg and organizations should assume that they already have been or will be breached. The conclusion was, if you can be sure that you have no malware lurking in your network, you either have nothing in your network worth stealing or you don’t know what is going on. There were not necessarily more breaches in 2011 than in previous years, but the persistent drumbeat of high-profile or just embarrassing incidents made it clear how difficult it is to defeat the bad guys in an asymmetrical game in which the defense must maintain a perfect score. For a while the most serious threats shifted away from brute force attacks relying on extensive botnet resources to more sophisticated and targeted attacks that crept in under the radar. The attackers bided their time, picked their targets and crafted blended threats that relied on clever social engineering as well as technology to land big phish and infiltrate systems. But just as we thought APTs were the only thing we had to worry about, the smash-and-grab artists of LulzSec and Anonymous reminded us that low-tech attacks against known vulnerabilities in websites also could expose a lot of sensitive information. (Source: GCN)

Primary Sidebar

Advertisers

  • qioptiq.com
  • Exensor
  • TCI
  • Visit the Oxley website
  • Visit the Viasat website
  • Blighter
  • SPECTRA
  • InVeris
  • Britbots logo
  • Faun Trackway
  • Systematic
  • CISION logo
  • ProTEK logo
  • businesswire logo
  • ProTEK logo
  • ssafa logo
  • DSEi
  • Atkins
  • IEE
  • EXFOR logo
  • KME logo
Hilux DVD2022 GlobalMilSat

Contact Us

BATTLESPACE Publications
Old Charlock
Abthorpe Road
Silverstone
Towcester NN12 8TW

+44 (0)77689 54766

BATTLESPACE Technologies

An international defence electronics news service providing our readers with up to date developments in the defence electronics industry.

Recent News

  • EXHIBITIONS AND CONFERENCES

    July 1, 2022
    Read more
  • VETERANS UPDATE

    July 1, 2022
    Read more
  • MANAGEMENT ON THE MOVE

    July 1, 2022
    Read more

Copyright BATTLESPACE Publications © 2002–2022.

This website uses cookies to improve your experience. If you continue to use the website, we'll assume you're ok with this.   Read More  Accept
Privacy & Cookies Policy

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Non-necessary
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
SAVE & ACCEPT