01.11.2023 Views

The Cyber Defense eMagazine November Edition for 2023

Cyber Defense eMagazine November Edition for 2023 #CDM #CYBERDEFENSEMAG @CyberDefenseMag by @Miliefsky a world-renowned cyber security expert and the Publisher of Cyber Defense Magazine as part of the Cyber Defense Media Group as well as Yan Ross, Editor-in-Chief and many more writers, partners and supporters who make this an awesome publication! 196 page November Edition fully packed with some of our best content. Thank you all and to our readers! OSINT ROCKS! #CDM #CDMG #OSINT #CYBERSECURITY #INFOSEC #BEST #PRACTICES #TIPS #TECHNIQUES

Cyber Defense eMagazine November Edition for 2023 #CDM #CYBERDEFENSEMAG @CyberDefenseMag by @Miliefsky a world-renowned cyber security expert and the Publisher of Cyber Defense Magazine as part of the Cyber Defense Media Group as well as Yan Ross, Editor-in-Chief and many more writers, partners and supporters who make this an awesome publication! 196 page November Edition fully packed with some of our best content. Thank you all and to our readers! OSINT ROCKS! #CDM #CDMG #OSINT #CYBERSECURITY #INFOSEC #BEST #PRACTICES #TIPS #TECHNIQUES

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Protecting Critical Infrastructure from <strong>Cyber</strong><br />

Attack<br />

<strong>The</strong> enemy is using cyber weapons that are hard to track and even harder to fully attribute to an<br />

adversary, companies need to act now<br />

By Richard Staynings, Chief Security Strategist <strong>for</strong> Cylera<br />

Escalating geopolitical tensions in Europe and Asia place a very big target on western Critical National<br />

Infrastructure Industries (CNIs). What better way to attack your enemy than to do so using cyber weapons<br />

that are hard to track and even harder to fully attribute to an adversary. Whatsmore, when attribution<br />

finally does occur, it is often years later. By that time, the world has usually <strong>for</strong>gotten and moved on, or<br />

has been stunned by an even more destructive cyberattack. Nearly all cyberattacks and cyber-attackers<br />

thus far, have gone unpunished. This makes it the perfect crime <strong>for</strong> perpetrators.<br />

Use of criminal proxies, insider threat agents, and the manipulation of national discourse with false<br />

inflammatory narratives propagated by social media plat<strong>for</strong>ms, are all designed to weaken an opponent.<br />

Many of these tactics such as undermining of confidence in the western institutions of government are<br />

straight out of the 1950’s KGB playbook but have found new purpose in the 2020’s through the seemingly<br />

addictive mediums of Facebook, Twitter and TikTok. If late twentieth century warfare and nation state<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>November</strong> <strong>2023</strong> <strong>Edition</strong> 151<br />

Copyright © <strong>2023</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!