Privacy has become a constantly diminishing asset in an age of “always-on” connected devices. As internet connected devices have become ubiquitous, the public has reached a degree of comfort with the passive and anonymized collection of personal data. That data, however, is now becoming a lot more personal.
Agile, flexible, and quick to respond to market factors. Unfortunately, these adjectives describe cyber criminals more accurately than cyber defenders. Despite organization’s spending more than ever to prevent cyber intrusions, attackers continue to penetrate defenses. A big reason for that is because, while cyber attackers are clearly (and highly) incentivized to accomplish their goals, the exact opposite is true in many cases for cyber defenders.
An increasing number of organizations are keen not to just limit and assess the damage when they’re hacked; they want a means of knowing as much as possible about potential foes so that they might be able to prevent intrusions before they occur. That’s why the idea of a more holistic, integrated approach to cyber security is currently taking shape.
As online adversaries have continued to enhance their capabilities, organizations have placed an increased importance on developing proactive cybersecurity measures alongside more traditional reactive practices. Threat Hunting, the practice of preemptively identifying and neutralizing threats, is gaining popularity as a response to an increasingly hostile cyberspace.
In December 2016, the Department of Homeland Security released the updated National Cyber Incident Response Plan (NCIRP). The NCIRP is a comprehensive strategic framework covering the roles and responsibilities of every Federal agency involved in responding to any major cyber incident.
The United States has a new foreign policy. This shift in strategic thinking comes at a time when tensions between the United States and its geopolitical rivals are not only on the rise, but are increasingly playing themselves out in cyberspace.
Reality has changed. The physical world in which we live is rapidly merging with the fourth dimension of cyberspace. The geopolitical battleground is no longer just the South China Sea, the oil fields of Arabia, or even the corner of Main and Broad. It’s cyberspace.