|Tuesday, 30 June 2009 20:00|
Why cyber defense?
Mellissa Hathaway firmly established the use of “cyber” in both her address to RSA 2009 and her published Cyberspace Policy Review document.
So “cyber” is now used to refer to those parts of IT infrastructure and the threat environment that deal with countering attacks and “cyberspace” refers to the global network of computers, networks, and people who use them.
How is this different from what has gone before? The primary difference is the motivation, purpose and methodologies of the attackers. Their concerted effort to infiltrate, steal, sabotage, and attack is a much more serious scenario than the random attacks that have been the norm since the birth of the security industry and the first firewalls and anti-virus products. The attackers now include cyber criminals looking for credit card databases, account access, and executing elaborate pump and dump schemes using compromised stock trading accounts. They include insiders stealing information for sale to those cyber criminals or seeking their own path to riches or revenge against their employers. And yes, cyber defense is the category that addresses the threat posed by nation states, terrorists, and fanatics as they engage in cyber espionage and targeted denial of service attacks.
With the level of spending projected by the United States , the UK, India, Pakistan, Israel, and most modern nations, there will be new players entering the IT security sector. Military contractors such as Raytheon, Booz Allen, and Lockheed Martin have already announced plans for cyber initiatives in order to win a piece of that spending. In the meantime existing vendors of defense security measures are seeing a banner year thanks to that spending. Over time there will develop a class of tools and systems that will address an expressed need for offensive measures as well.
Comments and input are welcome as always on this critical new category.
Listen to this week's
For bulk orders send me an email