Eskenzi PR ad banner Eskenzi PR ad banner
  • About Us
Friday, 27 January, 2023
IT Security Guru
Eskenzi PR banner
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us
No Result
View All Result
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us
No Result
View All Result
IT Security Guru
No Result
View All Result

Lancope: There are no rules for espionage as there are for war

by The Gurus
April 29, 2014
in Editor's News
Share on FacebookShare on Twitter

There is no clear line when it comes to online attacks in a conflict, but in the case of a land war, the critical national infrastructure will be a target.
 
Speaking to IT Security Guru, Tom Cross, director of security research at Lancope, said that “cyber war” will fit most contexts, but it is another theatre and Governments are learning from this. “Estonia suffered as its infrastructure was very modern and the attack had a greater impact on its ability to function,” he said. “The US Government is not so modern and can react as it has fewer services online and as more are reliant on the web, the impact of being down becomes more significant.”
 
Cross commented that there had not been so much denial-of-service (DoS) attack activity in the Ukraine situation, but this was more limited in scope. “There is no clear line, with a nation state you have to be aware of what you are doing,” he said. “The lines are not black and white, they are grey. The US Government is much more targeted, but the interest is in getting data that they seek. Wherever you are, people are interested in getting access to what you want to keep private.”
 
Cross mentioned that there are rules for warfare and consequences, but cyber espionage is seen as “fair game” as countries are spying on each other. “It was the case in the 1950s that the spy went to the victim, but now you connect online and you can get to your victim from the comfort of your own living room.”
 
He concluded by saying that there is an ethical framework for war, but nothing for espionage, and the world is not used to living in this situation and it is hard to function in this manner.

FacebookTweetLinkedIn
ShareTweetShare
Previous Post

BSides London: Let's build better privacy solutions

Next Post

Cyber Security Breaches Decrease in UK But Costs Double

Recent News

#MIWIC2022: Carole Embling, Metro Bank

#MIWIC2022: Carole Embling, Metro Bank

January 26, 2023
Lupovis eliminates false positive security alerts for security analysts and MSSPs

Lupovis eliminates false positive security alerts for security analysts and MSSPs

January 26, 2023
Threat actors launch one malicious attack every minute

Threat actors launch one malicious attack every minute

January 25, 2023
The Salt Security API Protection Platform is Now Available on Google Cloud Marketplace

The Salt Security API Protection Platform is Now Available on Google Cloud Marketplace

January 25, 2023

The IT Security Guru offers a daily news digest of all the best breaking IT security news stories first thing in the morning! Rather than you having to trawl through all the news feeds to find out what’s cooking, you can quickly get everything you need from this site!

Our Address: 10 London Mews, London, W2 1HY

Follow Us

© 2015 - 2019 IT Security Guru - Website Managed by Calm Logic

  • About Us
No Result
View All Result
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us

© 2015 - 2019 IT Security Guru - Website Managed by Calm Logic

This site uses functional cookies and external scripts to improve your experience.

Privacy settings

Privacy Settings / PENDING

This site uses functional cookies and external scripts to improve your experience. Which cookies and scripts are used and how they impact your visit is specified on the left. You may change your settings at any time. Your choices will not impact your visit.

NOTE: These settings will only apply to the browser and device you are currently using.

GDPR Compliance

Powered by Cookie Information