Thursday, June 1, 2023
LetsAskBinu.com
  • Home
  • Cybersecurity
  • Cyber Threats
  • Hacking
  • Protection
  • Networking
  • Malware
  • Fintech
  • Internet Of Things
No Result
View All Result
LetsAskBinu.com
No Result
View All Result
Home Cybersecurity

Security amidst a global frost

Researcher by Researcher
February 17, 2023
in Cybersecurity
0
Security amidst a global frost
189
SHARES
1.5k
VIEWS
Share on FacebookShare on Twitter


No longer relegated to a side-show, tech is embedded into virtually every new piece of gear entering the battlefield

As military and tech gather to address the frosty world defense conditions and what the intersection of technology’s role is with those at AFCEA West, it’s clear that the global warfighting world has changed. No longer relegated to a side-show, tech is embedded into virtually every new piece of gear entering the battlefield, and that is changing the perceived responsibility of tech – tech can now kill.

Related articles

Spring Framework Flaw Exploited in Mirai Malware Attacks

Threat Actors Exploit Critical Zyxel Flaw in Botnet Attacks

June 1, 2023
Cisco Acquiring Armorblox for Predictive and Generative AI Technology

Cisco Acquiring Armorblox for Predictive and Generative AI Technology

June 1, 2023

Long gone are the days of hackers in your mom’s basement patching kernels – tech now wrestles with making itself good enough to go to war. While rebooting a server solved many tech problems, it’s harder in a missile.

Also, it simultaneously depersonalizes war and brings terror right into your face. The prevailing belief is that future conflicts will be largely robot-on-robot, and yet they will have destructively powerful impact on people running for their life and pipe them right to our screens in a very personal way.

Also, because tech can seem far less personal, sensors can be sent farther into a conflict without fully committing a force if they’re destroyed, changing the geopolitical optics of what it means to go to war. I’m not sure we ever intended this, but tech platforms will be the future of proxy wars.

One conversation surrounded mining harbors to thwart ship-based attacks, but one panelist argued that we should just let the tech do it. No need to blow up ships in a harbor if you can stop a country’s ability to transfer products because you hacked the cranes needed to load and unload cargo containers, which could have a similarly paralyzing effect.

Speaking of effect, there is a school of thought that tries to tie data feeds directly into a person holding a weapon, so that person can more clearly focus on the net effect, and just use data as an enabler. But thinking further ahead, the whole defensive constellation could be directly brought to bear on a specific effect by feeding swarms of data to swarms of weapons who could ALL focus on a specific effect, say, restricting a beach landing. This disaggregated approach can become a force multiplier at scale, which is far more effective than a specific data-enabled fighter with a great night scope that can paint a dot to suggest a target for a drone.

Turns out, bringing swarms of data to the battlefield of the future is tough, very tough. While in theory we could argue that the parts to accomplish it are largely there, we know from tech ecosystems that playing together nicely is devilishly difficult, especially in an adversarial environment, like when people are shooting at your equipment and data links vaporize in a pile of shrapnel the shape of a mushroom cloud.

Either way, geopolitical forces have entered a kind of a tech arms race, trying to procure and implement rafts of sensors and convince us all why that would be for the best. It’s hard to conceptualize the future of war and conflicts. It’s also going to be far harder to spot what could be used as a weapon.

Tech stacks, after all, can have multiple purposes within the same machinery. What might seem to be an innocent ice-breaking ship, for example, can also focus on a primary role of extensive high-resolution mapping for future military initiatives, and no one would be the wiser.

Meanwhile, securing it all will be daunting at the very least, and an ongoing challenge for the foreseeable future. Also, we continue to hope tech will be used to make the world better, not tear it apart at the seams, we still hope for that, dream about it, and work towards it.



Source link

Tags: frostGlobalsecurity
Share76Tweet47

Related Posts

Spring Framework Flaw Exploited in Mirai Malware Attacks

Threat Actors Exploit Critical Zyxel Flaw in Botnet Attacks

June 1, 2023
0

Threat actors are exploiting a critical-severity Zyxel flaw in order to add vulnerable devices to a Mirai botnet variant. While...

Cisco Acquiring Armorblox for Predictive and Generative AI Technology

Cisco Acquiring Armorblox for Predictive and Generative AI Technology

June 1, 2023
0

Cisco on Wednesday announced that it’s acquiring California-based cybersecurity firm Armorblox for its artificial intelligence (AI) technology. Armorblox specializes in...

8 best practices for securing your Mac from hackers in 2023

8 best practices for securing your Mac from hackers in 2023

June 1, 2023
0

Best practices for securing your Mac against potential hacks and security vulnerabilities include enabling the firewall, using strong passwords and...

ZuoRAT Malware Found Hitting Home Routers

New SeroXen RAT Emerges | Decipher

June 1, 2023
0

Security researchers are tracking a new fileless RAT named SeroXen that has the capability to evade many EDR systems and...

Sentra Raises $30 Million for DSPM Technology

Chrome 114 Released With 18 Security Fixes

May 31, 2023
0

Google this week announced the release of Chrome 114 to the stable channel with a total of 18 security fixes...

Load More
  • Trending
  • Comments
  • Latest
This Week in Fintech: TFT Bi-Weekly News Roundup 08/02

This Week in Fintech: TFT Bi-Weekly News Roundup 15/03

March 15, 2022
QNAP Escalation Vulnerability Let Attackers Gain Administrator Privileges

QNAP Escalation Vulnerability Let Attackers Gain Administrator Privileges

March 15, 2022
Supply chain efficiency starts with securing port operations

Supply chain efficiency starts with securing port operations

March 15, 2022
A first look at threat intelligence and threat hunting tools

A first look at threat intelligence and threat hunting tools

March 15, 2022
Beware! Facebook accounts being hijacked via Messenger prize phishing chats

Beware! Facebook accounts being hijacked via Messenger prize phishing chats

0
Shoulder surfing: Watch out for eagle‑eyed snoopers peeking at your phone

Shoulder surfing: Watch out for eagle‑eyed snoopers peeking at your phone

0
Remote work causing security issues for system and IT administrators

Remote work causing security issues for system and IT administrators

0
Elementor WordPress plugin has a gaping security hole – update now – Naked Security

Elementor WordPress plugin has a gaping security hole – update now – Naked Security

0
Spring Framework Flaw Exploited in Mirai Malware Attacks

Threat Actors Exploit Critical Zyxel Flaw in Botnet Attacks

June 1, 2023
All eyes on APIs: Top 3 API security risks and how to mitigate them

All eyes on APIs: Top 3 API security risks and how to mitigate them

June 1, 2023
Cisco Acquiring Armorblox for Predictive and Generative AI Technology

Cisco Acquiring Armorblox for Predictive and Generative AI Technology

June 1, 2023
This Week in Fintech: TFT Bi-Weekly News Roundup 08/02

This Week in Fintech: TFT Bi-Weekly News Roundup /

June 1, 2023

Recent Posts

Spring Framework Flaw Exploited in Mirai Malware Attacks

Threat Actors Exploit Critical Zyxel Flaw in Botnet Attacks

June 1, 2023
All eyes on APIs: Top 3 API security risks and how to mitigate them

All eyes on APIs: Top 3 API security risks and how to mitigate them

June 1, 2023
Cisco Acquiring Armorblox for Predictive and Generative AI Technology

Cisco Acquiring Armorblox for Predictive and Generative AI Technology

June 1, 2023

Categories

  • Cyber Threats
  • Cybersecurity
  • Fintech
  • Hacking
  • Internet Of Things
  • LetsAskBinuBlogs
  • Malware
  • Networking
  • Protection

Tags

Access attack Attacks banking BiWeekly bug Cisco cloud code critical Cybersecurity Data Digital exploited financial Fintech Flaw flaws Google Group Hackers Krebs Latest launches malware Microsoft million Network News open patches Payments platform Ransomware RoundUp security Software Stories TFT Threat Top vulnerabilities vulnerability warns Week

© 2022 Lets Ask Binu All Rights Reserved

No Result
View All Result
  • Home
  • Cybersecurity
  • Cyber Threats
  • Hacking
  • Protection
  • Networking
  • Malware
  • Fintech
  • Internet Of Things

© 2022 Lets Ask Binu All Rights Reserved