<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Topic:Cyber Security &#8212; Global Security Review %</title>
	<atom:link href="https://globalsecurityreview.com/subject/cyber-security/feed/" rel="self" type="application/rss+xml" />
	<link>https://globalsecurityreview.com/subject/cyber-security/</link>
	<description>A division of the National Institute for Deterrence Studies (NIDS)</description>
	<lastBuildDate>Mon, 08 Dec 2025 11:40:01 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://globalsecurityreview.com/wp-content/uploads/2026/05/cropped-GSR-Chrome-Logo-2026-1-32x32.png</url>
	<title>Topic:Cyber Security &#8212; Global Security Review %</title>
	<link>https://globalsecurityreview.com/subject/cyber-security/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>The Impact of the India-US Growing Strategic Partnership on South Asia</title>
		<link>https://globalsecurityreview.com/the-impact-of-the-india-us-growing-strategic-partnership-on-south-asia/</link>
					<comments>https://globalsecurityreview.com/the-impact-of-the-india-us-growing-strategic-partnership-on-south-asia/#respond</comments>
		
		<dc:creator><![CDATA[Harsa Kakar]]></dc:creator>
		<pubDate>Mon, 08 Dec 2025 13:14:14 +0000</pubDate>
				<category><![CDATA[Allies & Extended Deterrence]]></category>
		<category><![CDATA[Archive]]></category>
		<category><![CDATA[Strategic Adversaries]]></category>
		<category><![CDATA[Balochistan Think Tank Network]]></category>
		<category><![CDATA[beca]]></category>
		<category><![CDATA[chanakya philosophy]]></category>
		<category><![CDATA[china assertiveness]]></category>
		<category><![CDATA[comcasa]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[defense industrial base]]></category>
		<category><![CDATA[Deterrence]]></category>
		<category><![CDATA[gsomia]]></category>
		<category><![CDATA[India-Pakistan relations]]></category>
		<category><![CDATA[india-us strategic partnership]]></category>
		<category><![CDATA[Indo-Pacific region]]></category>
		<category><![CDATA[Indo-Pacific Strategy]]></category>
		<category><![CDATA[internal politics]]></category>
		<category><![CDATA[joint air exercises]]></category>
		<category><![CDATA[joint naval exercises]]></category>
		<category><![CDATA[lemoa]]></category>
		<category><![CDATA[malabar exercise]]></category>
		<category><![CDATA[maritime security]]></category>
		<category><![CDATA[nuclear posture]]></category>
		<category><![CDATA[pakistan diplomacy]]></category>
		<category><![CDATA[quad framework]]></category>
		<category><![CDATA[regional actors bangladesh]]></category>
		<category><![CDATA[regional actors sri lanka]]></category>
		<category><![CDATA[regional cooperative mechanisms]]></category>
		<category><![CDATA[regional stability]]></category>
		<category><![CDATA[self-reliant defense industries]]></category>
		<category><![CDATA[South Asia security]]></category>
		<category><![CDATA[strategic autonomy]]></category>
		<category><![CDATA[strategic convergence]]></category>
		<category><![CDATA[technology transfers]]></category>
		<category><![CDATA[united states india defense partnership]]></category>
		<guid isPermaLink="false">https://globalsecurityreview.com/?p=31934</guid>

					<description><![CDATA[<p>In October 2025, the United States and India agreed to a 10-year defense partnership. It is an attempt to renew defense relations between the two countries. The partnership developed from past defense collaboration agreements between the US and India that included exercises, technology exchanges, and manufacturing collaboration. While the partnership received considerable media attention, it [&#8230;]</p>
<p><a href="https://globalsecurityreview.com/the-impact-of-the-india-us-growing-strategic-partnership-on-south-asia/">The Impact of the India-US Growing Strategic Partnership on South Asia</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>In October 2025, the United States and India agreed to a <a href="https://www.dawn.com/news/1952338/us-signs-10-year-defence-pact-with-india-hegseth-says">10-year defense partnership</a>. It is an attempt to renew defense relations between the two countries. The partnership developed from past defense collaboration agreements between the US and India that <a href="https://youtu.be/XclJLVMMnoA?si=Yml33bA21duNVtbY">included</a> exercises, technology exchanges, and manufacturing collaboration. While the partnership received considerable media attention, it represents evolutionary, rather than revolutionary progress.</p>
<p>The partnership is a result of a long-standing history of defense partnerships but does not represent a paradigm shift in defense collaborations. However, the nature of this defense collaboration continues to evolve concerning the relationship of Pakistan to the United States and India. Examining the India-US defense partnership with an eye to the history, agreement details, and overall implications is worth the effort. <a href="https://wenewsenglish.com/chanakyan-playbook-in-indias-strategy/">Chanakya</a>’s philosophical concepts, which are discussed below, are also instructive.</p>
<p><strong>History</strong></p>
<p>The United States and India are not new defense partners. The current agreement is an extension of those older <a href="https://www.cfr.org/timeline/us-india-relations">agreements</a>. This series of partnerships began in 2002 under the General Security of Military Information Agreement (<a href="https://www.stimson.org/2016/implications-general-security-military-information-agreement-south-korea/">GSOMIA</a>), the Communications Compatibility and Security Agreement (<a href="https://thediplomat.com/2018/09/comcasa-another-step-forward-for-the-united-states-and-india/">COMCASA</a>), the Basic Exchange and Cooperation Agreement (<a href="https://2009-2017.state.gov/documents/organization/143676.pdf">BECA</a>), and the Logistics Exchange Memorandum of Agreement (<a href="https://cscr.pk/pdf/rb/RB%20_LEMOA.pdf">LEMOA</a>).</p>
<p>The most recent agreement expands the areas of cooperative defense to cyber and maritime security issues. This agreement will help bring the American and Indian militaries into alignment and make their defense capabilities and strategies align more effectively.</p>
<p>This US-India defense partnership is one of the ways that India can move toward greater defense independence and create “<a href="https://timesofindia.indiatimes.com/india/india-us-ink-new-defence-framework-for-10-years-aim-to-deepen-cooperation-in-all-domains/articleshow/125007676.cms">self-reliant</a>” defense industries. The goal of this effort is to encourage the development of defense systems produced domestically or developed through technology transfers from other countries and to allow India to produce and export these products globally.</p>
<p>The US-India partnership also anticipates India having an upgraded military, being able to project maritime power more effectively, and enhancing its ability to deter aggression. The improvements in India’s military capabilities and its nuclear posture align with India’s pursuit of strategic autonomy; however, India’s evolving security environment is beginning to mirror the American security environment.</p>
<p>The partnership between the US and India will also help to reinforce the Quad framework (US, Japan, Australia, and India) as a key element of American Indo-Pacific Strategy, creating a free, open, and rules-based regional order. It is also anticipated that increased defense cooperation between the US and India will provide an enhanced collective deterrent against Chinese assertiveness and will enable the US and India to conduct more frequent and extensive joint naval and air exercises, such as the Malabar exercise.</p>
<p>Similar to other forms of strategic wisdom that are based upon the doctrines of Chanakya, the US-India defense agreement appears to reflect the concepts of not engaging directly with an adversary, depleting an adversary’s resources, and winning when the circumstances are appropriate. As such, it appears that India is employing a similar approach (building partnerships, establishing a defense industrial base, attaining strategic independence, and then waiting until the opportunity presents itself to engage) with similar replenishment concepts (economic and diplomatic) that were outlined in Chanakya’s playbook to allow India to capitalize on a potential weakening of the enemy due to internal politics.</p>
<p>While this agreement does provide a framework for cooperation and addresses some of the regional security concerns, including India’s negative view of China as an aggressive actor in the Indo-Pacific, the agreement does not establish a legally binding security arrangement, like the North Atlantic Treaty Organization (NATO).</p>
<p>Rather, the agreement reflects an increasing level of strategic convergence and represents a cooperative structure for defense. Media coverage of the agreement frequently exaggerates the significance of the agreement, while downplaying the fact that defense relationships between the US and India are not new and have little impact on the strategic balance between India and Pakistan.</p>
<p>While some in Pakistan see this latest agreement as a threat, the best option for Pakistan is to employ diplomacy, act in good faith to prevent future terror attacks in Indian territory, and avoid escalating tensions due to a false perception of encirclement. Positive dialogue with India and other regional actors will decrease the chance of conflict and build trust.</p>
<p>The US can serve as a stabilizing force to create dialogue between India and Pakistan and enhance regional cooperative mechanisms. Regional actors, such as China, Bangladesh, and Sri Lanka, etc., need to develop new policies to maintain an equilibrium in South Asia and not take action that exacerbates existing regional tensions.</p>
<p>The latest US-India agreement serves as a foundation for increased cooperation and may benefit regional stability and the overall security of the Indo-Pacific region. The degree to which this defense agreement has the ability to positively contribute to the strategic stability of South Asia depends on successful implementation of its provisions and the degree to which the United States and India can work with other regional states to address emerging challenges.</p>
<p><em>Harsa Kakar is as an Assistant Research Fellow at Balochistan Think Tank Network (BTTN), Quetta. The views expressed are personal. She can be reached at </em><a href="mailto:Kakarhsa01@gmail.com"><em>Kakarhsa01@gmail.com</em></a><em>.</em></p>
<p><a href="http://globalsecurityreview.com/wp-content/uploads/2025/12/The-Impact-of-the-India-US-Growing-Strategic-Partnership-on-South-Asia.pdf"><img decoding="async" class="alignnone wp-image-29852" src="http://globalsecurityreview.com/wp-content/uploads/2025/01/2025-Download-Button-1.png" alt="" width="259" height="72" srcset="https://globalsecurityreview.com/wp-content/uploads/2025/01/2025-Download-Button-1.png 450w, https://globalsecurityreview.com/wp-content/uploads/2025/01/2025-Download-Button-1-300x83.png 300w" sizes="(max-width: 259px) 100vw, 259px" /></a></p>
<p><a href="https://globalsecurityreview.com/the-impact-of-the-india-us-growing-strategic-partnership-on-south-asia/">The Impact of the India-US Growing Strategic Partnership on South Asia</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://globalsecurityreview.com/the-impact-of-the-india-us-growing-strategic-partnership-on-south-asia/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Expand U.S. CYBERCOM to better secure American Infrastructure</title>
		<link>https://globalsecurityreview.com/expand-cybercom-to-better-secure-american-infrastructure/</link>
		
		<dc:creator><![CDATA[Taylor Clark]]></dc:creator>
		<pubDate>Mon, 07 Nov 2022 18:22:22 +0000</pubDate>
				<category><![CDATA[Defense & Security]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[United States]]></category>
		<guid isPermaLink="false">http://globalsecurityreview.com/?p=23799</guid>

					<description><![CDATA[<p>This article was originally published on April 13, 2021. According to McAfee, over $1 trillion was lost to cybercrime in 2020. Some estimate if governments do not secure the cybersphere, this number will continue to skyrocket and reach over $10 trillion annually by 2025. Even cybersecurity firms are at risk. For example, FireEye, a government [&#8230;]</p>
<p><a href="https://globalsecurityreview.com/expand-cybercom-to-better-secure-american-infrastructure/">Expand U.S. CYBERCOM to better secure American Infrastructure</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><em>This article was originally published on April 13, 2021.</em></p>
<p><span style="color: #333333;">According to <a href="https://www.mcafee.com/enterprise/en-us/assets/reports/rp-hidden-costs-of-cybercrime.pdf">McAfee</a>, over $1 trillion was lost to cybercrime in 2020. Some estimate if governments do not secure the cybersphere, this number will continue to skyrocket and reach over <a href="https://cybersecurityventures.com/hackerpocalypse-cybercrime-report-2016/">$10 trillion</a> annually by 2025. Even cybersecurity firms are at risk. For example, <a href="https://www.fireeye.com/blog/products-and-services/2020/12/fireeye-shares-details-of-recent-cyber-attack-actions-to-protect-community.html">FireEye</a>, a government contract cybersecurity company, was recently a victim of a state-sponsored attack targeting its assessment tools.</span></p>
<p><span style="color: #333333;">Currently, the United States has no whole-of-government approach to secure its cyber vulnerabilities. Private companies maintain most of the control, with little to no oversight, and the Department of Defense (DOD) focuses almost exclusively on military cyber vulnerabilities. The United States needs to take definitive action to secure its systems to avoid further loss. By expanding the Department of Defense’s Cyber Command (USCYBERCOM), the U.S. can create a whole-of-government approach to improve resiliency and consolidate cyber expertise and resources.</span></p>
<p><span style="color: #333333;"><a href="https://www.cybercom.mil/About/Mission-and-Vision/">USCYBERCOM</a> is one of the commands of the Department of Defense. It has three points of focus: defending the DOD’s network, offering mission support, and strengthening U.S. networks against cyber-attacks. Expanding USCYBERCOM’s focus beyond military capabilities to include other U.S. Government Departments, allies, and private companies will lead to more effective policy.</span></p>
<p><span style="color: #333333;">First, expanding USCYBERCOM increases resiliency against internal and external threats, against both state and non-state actors. By adapting preexisting infrastructure, more of these threats can be easily assessed and rectified. USCYBERCOM methods can be easily expanded to encompass more critical infrastructure.</span></p>
<p><span style="color: #333333;">Second, consolidating resources means more effective work. The number of qualified personnel is relatively small and spread through different government agencies and private companies. By fusing the specialized workforce, the government can implement more innovative ideas and decrease vulnerability. Furthermore, merging budgets provides more extensive protection. The United States government spends between <a href="https://www.statista.com/statistics/675399/us-government-spending-cyber-security/">$18-19</a> billion per year on cybersecurity. Instead of having this money spent across various agencies and departments, collective action would be more easily achieved by combining them.</span></p>
<p><span style="color: #333333;">Finally, expanding USCYBERCOM leads to a whole-of-government approach. As it currently stands, private companies work separately on their systems, the US government employs them, and there is little oversight. USCYBERCOM works on military cyber capacities with congressional oversight. An expanded USCYBERCOM would involve more government agencies, include private companies’ input, and generate even more robust oversight from the Congress. This extensive involvement creates a well-rounded approach to cyber vulnerabilities and a timely response to discovered weaknesses.</span></p>
<p><span style="color: #333333;">For some, the dual-hat arrangement that the commander of CYBERCOM is also the Director of the National Security Agency (NSA) is controversial. Established in 2009 under the Obama Administration, USCYBERCOM was a small operation, and under the agreement, USCYBERCOM and NSA shared staffing and information resources. Following the Snowden leaks, different leaders have suggested the separation of the two. But this is not in the interest of national cybersecurity as, without this agreement, the NSA would not be compelled to share information or manpower. Without formal information-sharing agreements, U.S. agencies may be simultaneously working to address the same vulnerabilities. Expanding CYBERCOM will reduce duplication and lead to a more effective government response to cyberattacks and cyber vulnerabilities.</span></p>
<p><span style="color: #333333;">Expanding the responsibilities and members of USCYBERCOM gives the United States the ability to stand against malicious actors by implementing comprehensive and unified cyber policy. Decisive action will enable us to address vulnerabilities and reduce monetary and property losses. As the internet continues to expand, CYBERCOM can protect and promote American security and prosperity.</span></p>
<p><a href="https://globalsecurityreview.com/expand-cybercom-to-better-secure-american-infrastructure/">Expand U.S. CYBERCOM to better secure American Infrastructure</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Déjà Vu: Hacked Again</title>
		<link>https://globalsecurityreview.com/deja-vu-hacked-again/</link>
		
		<dc:creator><![CDATA[Matthew J. Fecteau]]></dc:creator>
		<pubDate>Mon, 01 Feb 2021 14:52:48 +0000</pubDate>
				<category><![CDATA[Defense & Security]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Russia]]></category>
		<category><![CDATA[United States]]></category>
		<guid isPermaLink="false">http://globalsecurityreview.com/?p=23652</guid>

					<description><![CDATA[<p>This is getting old. Yet again, Russian-backed agents have hacked the United States. The United States can only sanction and indict so many people before discovering that this alone will neither prevent nor deter future cyberattacks. The United States must have a unified plan to confront cyberaggression through defensive and offensive action in the cyber [&#8230;]</p>
<p><a href="https://globalsecurityreview.com/deja-vu-hacked-again/">Déjà Vu: Hacked Again</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>This is getting old. Yet again, Russian-backed agents have <a href="https://www.nytimes.com/2020/12/08/technology/fireeye-hacked-russians.html">hacked the United States</a>.</p>
<p>The United States can only sanction and indict so many people before discovering that this alone will neither prevent nor deter future cyberattacks. The United States must have a unified plan to confront cyberaggression through defensive and offensive action in the cyber realm. This position may mean protecting fragile democratic allies and conducting coordinated cyber strikes against malignant state and non-state actors.</p>
<p>While the latest cyberattack is still under investigation, authorities suspect that a Russian-backed group known as <a href="https://www.washingtonpost.com/national-security/russian-government-spies-are-behind-a-broad-hacking-campaign-that-has-breached-us-agencies-and-a-top-cyber-firm/2020/12/13/d5a53b88-3d7d-11eb-9453-fc36ba051781_story.html">Cozy Bear</a> hacked a management company called <a href="https://www.solarwinds.com/">SolarWinds</a> via its Orion tool, which is used to monitor outages. Then, between <a href="https://d18rn0p25nwr6d.cloudfront.net/CIK-0001739942/57108215-4458-4dd8-a5bf-55bd5e34d451.pdf">March and June 2020, this group inserted malware</a> into its updates, impacting countless federal and private systems.</p>
<p>It was only when cybersecurity firm FireEye discovered the breach that the hack was revealed. FireEye noted that this attack was conducted by <a href="https://www.nytimes.com/2020/12/08/technology/fireeye-hacked-russians.html">&#8220;a nation with top-tier offensive capabilities.&#8221;</a> Indeed, Russia has previously used malware to steal critical information, but this attack was much different, focusing on &#8220;supply-side&#8221; vulnerabilities, including SolarWinds&#8217; monitoring products. <a href="https://www.gao.gov/assets/700/693405.pdf">In 2018, the Government Accountability Office outlined</a> the cybersecurity challenges related to supply-side risks (though they admitted that an attack of this magnitude was left out).</p>
<p>This &#8220;sophisticated&#8221; attack reportedly used IP addresses located in the United States, all while evading the <a href="https://www.cisa.gov/">Cybersecurity and Infrastructure Security Agency&#8217;s</a> costly and sophisticated intrusion detection system called <a href="https://www.cisa.gov/einstein">Einstein</a>. The malware sat dormant until activated, sending sensitive information to the hackers.</p>
<p>This cyberattack is concerning due to Russia&#8217;s interference in the <a href="https://www.intelligence.senate.gov/sites/default/files/documents/Report_Volume1.pdf">2016 U.S. election through a coordinated information operations campaign</a> that included a sophisticated social media strategy, hacking, and the release of compromising information via Wikileaks. Russian-backed agents also allegedly attempted to hack voting systems in nearly all 50 states. These agents could delete or change voter data. Russia also used a quasi-private company known as the Internet Research Agency to create a &#8220;troll farm&#8221; to influence social media.</p>
<p>According to a <a href="https://www.intelligence.senate.gov/sites/default/files/documents/Report_Volume2.pdf">congressional report</a>, the 2016 meddling intended to &#8220;sow discord in American politics and society.&#8221; The response to the Russian interference was lukewarm. <a href="https://www.justice.gov/file/1080281/download">The United States indicted 12 Russians for operating a military agency</a> called the Main Intelligence Directorate of the General Staff, and the U.S. Treasury Department sanctioned some Russian entities and individuals. Clearly, these penalties didn&#8217;t go far enough because here we are again.</p>
<p>The United States isn&#8217;t Russia&#8217;s only target. The Russian-backed group <a href="https://www.crowdstrike.com/blog/who-is-fancy-bear/">Fancy Bear</a> (the same group involved in 2016&#8217;s Russian meddling) hacked <a href="https://balkaninsight.com/2018/03/05/russia-s-fancy-bear-hacks-its-way-into-montenegro-03-01-2018/">Montenegro&#8217;s government</a> apparatus, hoping to influence the country&#8217;s impending NATO membership. In 2007, Estonia—which introduced online voting in 2001 and was considered one of the most technologically advanced nations globally—<a href="https://www.bbc.com/news/39655415">was also a victim of a Russian information operations</a> campaign involving hacking and disinformation. Russia also conducted coordinated information operation campaigns involving social media and hacking in countries like Ukraine.</p>
<p>Nation-states such as China, Iran, North Korea, and Russia are operating with impunity in the cyber domain. Each of these respective countries has carried out cyberattacks on the United States, its allies, or private-sector entities. It is almost like the Wild West in the cyber realm, and these world powers have proven time and time again that no matter how much in good faith the United States acts, they will cooperate only in words alone.</p>
<p>There are some realistic options on the table to prevent and deter further cyberaggression. In 2011, <a href="https://obamawhitehouse.archives.gov/sites/default/files/rss_viewer/international_strategy_for_cyberspace.pdf">President Obama defined attacks in the cyber realm as potential acts of war</a>. With this in mind, the United States can respond with conventional means but is highly unlikely to react in such a manner. On the other hand, the United States has other tools in its arsenal for an appropriate response.</p>
<p>First, the United States needs an oversight board that can proactively and expeditiously identify government vulnerabilities, make recommendations, and penalizes contracted companies for security violations. While valuable, the report on Russian meddling took years to produce. In theory, an oversight board would be flexible enough to both produce reports and perform risk assessments.</p>
<p>While the hack is still under investigation, there are some red flags that cannot be ignored. SolarWinds&#8217;s server was left relatively unprotected with a weak password (solarwinds123), and the sign-in certificate was somehow manipulated to hack the systems. SolarWinds&#8217;s server was continuously exposed since at least 2018, thereby allowing anyone with a valid sign-in certificate to log onto its network. A government oversight board would have the ability to investigate and penalize a company or an individual for placing such compromising information online.</p>
<p>Second, a comprehensive systems upgrade is critical. Current U.S. cyber defenses — such as the Cybersecurity and Infrastructure Security Agency&#8217;s Einstein — failed because they didn&#8217;t have sensors to recognize and neutralize malicious traffic or an information-sharing agreement with agencies to identify servers that shouldn&#8217;t be sending information internationally. Likewise, the Pentagon&#8217;s cloud-based software is antiquated and vulnerable to attack (an upgrade is well in order). Of course, such upgrades require both funding and congressional will.</p>
<p>Third, cyber-offensive activities should be an option in the future. The National Security Agency has the capability and the know-how to conduct cyberattacks through the agency&#8217;s elite hacking unit known as <a href="https://www.washingtonpost.com/world/national-security/nsa-employee-who-worked-on-hacking-tools-at-home-pleads-guilty-to-spy-charge/2017/12/01/ec4d6738-d6d9-11e7-b62d-d9345ced896d_story.html">Tailored Access Operations</a>. However, such operations are rarely acknowledged, and that should change. There should be known penalties for cyberaggression.</p>
<p>The National Security Agency conducted a cyberattack against Iran using the Stuxnet virus, but the operation received little acknowledgment from the U.S. government. The Stuxnet virus destroyed thousands of Iran&#8217;s centrifuges at the Natanz powerplant that could have been used to make a nuclear weapon.</p>
<p>Additionally, in 2018, the U.S. Cyber Command conducted <a href="https://www.washingtonpost.com/opinions/2020/07/10/trump-confirms-an-interview-us-cyberattack-russia/">an attack against Russia&#8217;s Internet Research Agency</a>, successfully disrupting Russia&#8217;s information operations campaign during that year&#8217;s U.S. mid-term elections. This attack was acknowledged by the U.S. government and also sent a message that cyber aggression will not be tolerated.</p>
<p>The United States must be ready to respond to further cyber aggression in the future. The United States must shore up its cyber defenses and leverage cyber offense as an option for deterrence. Countries like Russia don&#8217;t seem to care too much for the carrot approach. Perhaps it is time for the stick.</p>
<div>
<p><em>Thanks go to Thomas Lawrence of </em><a href="https://www.lawrencesystems.com/">Lawrence Technology Services</a><em> for his technical expertise in writing this article. </em></p>
</div>
<div>
<p><em> </em></p>
</div>
<div>
<p><i>The views expressed in this report are those of the author and do not necessarily reflect the official policy or position of the Department of the Army, the Department of Defense, or the U.S. Government.</i></p>
</div>
<p><a href="https://globalsecurityreview.com/deja-vu-hacked-again/">Déjà Vu: Hacked Again</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>COVID-19 &#038; Global Cybersecurity: Urgent Action is Needed</title>
		<link>https://globalsecurityreview.com/covid-19-global-cybersecurity-urgent-action-is-needed/</link>
		
		<dc:creator><![CDATA[Leo S.F.  Lin]]></dc:creator>
		<pubDate>Mon, 13 Jul 2020 21:16:03 +0000</pubDate>
				<category><![CDATA[Defense & Security]]></category>
		<category><![CDATA[COVID-19]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[United States]]></category>
		<guid isPermaLink="false">http://globalsecurityreview.com/?p=15741</guid>

					<description><![CDATA[<p>COVID-19 has impacted our lives in many aspects; one of them is the emerging trend in cybersecurity threats on a global scale. Many governments have reported an increase in cyber threats since the outbreak of the COVID-19. Just recently, the Federal Bureau of Investigation (FBI) and the Department of Justice (DoJ) have recently warned that [&#8230;]</p>
<p><a href="https://globalsecurityreview.com/covid-19-global-cybersecurity-urgent-action-is-needed/">COVID-19 &#038; Global Cybersecurity: Urgent Action is Needed</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>COVID-19 has impacted our lives in many aspects; one of them is the emerging trend in cybersecurity threats on a global scale. Many governments have reported an increase in cyber threats since the outbreak of the COVID-19. Just recently, the Federal Bureau of Investigation (FBI) and the Department of Justice (DoJ) have recently warned that the <a href="https://www.fbi.gov/coronavirus">coronavirus-related cyber threat</a> is growing and a massive spike in hackers and scammers using the COVID-19 crisis is targeting Americans for financial or informational gain. For example, the FBI&#8217;s Internet Crime Complaint Center (IC3) has received at least <a href="https://thehill.com/policy/cybersecurity/504389-fbi-sees-major-spike-in-coronavirus-related-cyber-threats">20,000 coronavirus-related cyber threat reports</a> this year; it is between <a href="https://thehill.com/policy/cybersecurity/493198-fbi-sees-spike-in-cyber-crime-reports-during-coronavirus-pandemic">3,000 and 4,000</a> complaints per day. The European Union (EU) officials have already stated that the EU cybersecurity<a href="https://www.euronews.com/2020/03/24/covid-19-eu-cybersecurity-at-risk-from-hackers"> &#8220;at risk from hackers</a>&#8221; and asks for joint actions with the Members States and other stakeholders to improve cybersecurity capabilities.</p>
<p>At the international level, top <a href="https://www.hindustantimes.com/world-news/600-increase-in-malicious-emails-amid-covid-19-crisis-un-official/story-YAcXHHIuDsxQ7l5KaIerEJ.html">United Nations officials </a>have warned that &#8220;cybercrime is also on the rise, with a 600 percent increase in malicious emails during the current crisis.&#8221; The United Nations (UN) officials described the COVID-19-related cyber threats as an <a href="https://www.un.org/en/un-coronavirus-communications-team/un-tackling-%E2%80%98infodemic%E2%80%99-misinformation-and-cybercrime-covid-19">&#8220;infodemic&#8221; of misinformation.</a> It is a situation where people received misinformation, disinformation, and rumors during a health emergency.  Cybercriminals have been conducting attempted ransomware attacks in which their<a href="https://www.forbes.com/sites/daveywinder/2020/03/22/healthcare-workers-targeted-by-dangerous-new-windows-ransomware-campaign-using-coronavirus-as-bait/#4c1beda62212"> phishing and ransomware campaigns</a> are using the coronavirus pandemic to actively target healthcare workers. The International Criminal Police Organization (<a href="https://www.interpol.int/en/How-we-work/COVID-19">INTERPOL) </a>also sees an increase in counterfeit medical products, fraud, and cybercrime. Cybercriminals would disguise themselves as the World Health Organization (WHO) to conduct scams or to steal personal and sensitive information.</p>
<p>One direct and obvious factor contributing to the rise of cyber threats is the drastic increase of internet users &#8211; from students, teachers, government workers, to private-sector employees and politicians. After the shutdown of schools and many governmental and non-government sectors, all face-to-face meetings were transferred into online platforms. The Internet has become the primary tool for many people to conduct their works. The amount of time that people spend on the Internet increased, exposing themselves to the risks of cyberthreats. Private-sector data revealed <a href="https://www.forbes.com/sites/jessedamiani/2020/03/26/google-data-reveals-350-surge-in-phishing-websites-during-coronavirus-pandemic/#45842c1819d5">a 350% surge in phishing websites since the start of the pandemic</a>.</p>
<p>Another factor is the inadequate cybersecurity education to raise public awareness in many countries, including the United States. With the sudden change of people&#8217;s online-using habits before and after the outbreak of the COVID-19, people (old and young) have not yet realized that they could be in danger online &#8211; even staying at home. This is not a new problem. For example, <a href="https://www.securitymagazine.com/articles/90748-healthcare-employees-lack-cybersecurity-education-and-awareness">one article</a> pointed out that employees of healthcare organizations in North America lack cybersecurity education and awareness in three main areas: regulation, policy, and training.</p>
<p>With the increasing number of internet users in the event of COVID-19, there are three areas that we need to take immediate action. First, one of the most vulnerable groups during COVID-19 is school-aged children. Most of the school children had to used e-learning in the past spring semester and now have entered their summer vacation, and it is difficult to have a comprehensive study about how much time they spend in front of the &#8220;screens.&#8221; The amount of time they use electronic devices has drastically increased. Since they could not quickly distinguish between the real and virtual worlds, there has been an immediate risk of falling prey to cybercriminals.</p>
<p>The second area is the protection of information and finance for enterprises and workers. The world&#8217;s dependence on information and telecommunication technologies is unprecedented. The Business Email Compromise (BEC) is on the rise, especially during the pandemic, and there is much work to be done. The growth of digital dependency in the workforce worldwide has increased the vulnerability to companies and their employees.</p>
<p>The third area is the cybersecurity infrastructure in many developing countries are not strong enough. According to the <a href="https://www.financialexpress.com/world-news/top-un-official-warns-malicious-emails-on-rise-in-pandemic/1968351/">International Telecommunication Union</a>, nearly 90 countries are still only at the early stages of making commitments to cybersecurity.&#8221; It relies on multi-national efforts to assist those countries, including adjusting national legal and regulatory frameworks in the cyberspace and unifying cybersecurity awareness campaigns, despite it is challenging to conduct on-site capacity building during this situation.</p>
<p>As the COVID-19 pandemic continues to change our way of life, it is a daunting alarm that people are exposing more to the increasing cybersecurity threats while not having enough awareness and education. For the private sector, the improvement of data management, IT security, and employee education are critical to prevent cyber hacking and BECs. We need to push governments to work more with private sectors and international partners toward feasible and effective campaigns.</p>
<p>The worst-case scenario is that the governments are more concerned about the economy than the increasing level of cybersecurity threats.  Whether governments and companies learn security lessons from the COVID-19 pandemic remains to be seen.</p>
<p><a href="https://globalsecurityreview.com/covid-19-global-cybersecurity-urgent-action-is-needed/">COVID-19 &#038; Global Cybersecurity: Urgent Action is Needed</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>A Global Recession Will Fuel Cyber-Espionage</title>
		<link>https://globalsecurityreview.com/global-recession-will-fuel-cyber-espionage/</link>
		
		<dc:creator><![CDATA[Mohamed ELDoh]]></dc:creator>
		<pubDate>Sun, 19 Apr 2020 20:18:53 +0000</pubDate>
				<category><![CDATA[Economics & Trade]]></category>
		<category><![CDATA[China]]></category>
		<category><![CDATA[COVID-19]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Russia]]></category>
		<category><![CDATA[United States]]></category>
		<guid isPermaLink="false">http://globalsecurityreview.com/?p=15152</guid>

					<description><![CDATA[<p>Over the past several years, many economists (for a variety of reasons) have predicted a global recession in 2020. The ongoing COVID-19 pandemic is aggressively pushing the world into a deep recession. Businesses are laying off or furloughing workers, cutting salaries, and even closing. These actions were anticipated for firms operating within heavily impacted industries [&#8230;]</p>
<p><a href="https://globalsecurityreview.com/global-recession-will-fuel-cyber-espionage/">A Global Recession Will Fuel Cyber-Espionage</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Over the past several years, many economists (for a variety of reasons) have <a href="https://www.theguardian.com/business/2018/sep/13/recession-2020-financial-crisis-nouriel-roubini">predicted</a> a global recession in 2020. The ongoing COVID-19 pandemic is <a href="https://www.nytimes.com/2020/04/01/business/economy/coronavirus-recession.html">aggressively</a> pushing the world into a deep recession. <a href="https://www.businessinsider.com/coronavirus-layoffs-furloughs-hospitality-service-travel-unemployment-2020#marriott-international-the-worlds-largest-hotel-company-said-it-has-started-to-furlough-what-could-amount-to-tens-of-thousands-of-employees-on-march-17-furloughs-as-opposed-to-layoffs-occur-when-employees-are-required-to-take-an-unpaid-leave-of-absence-arne-sorenson-the-president-and-ceo-announced-that-his-own-salary-will-be-suspended-for-the-rest-of-the-year-and-senior-executives-salaries-will-be-reduced-by-50-3">Businesses</a> are laying off or furloughing workers, cutting salaries, and even closing. These actions were anticipated for firms operating within heavily impacted industries like the retail, hospitality, tourism, travel, financial services, and real estate sectors. However, the same actions are being adopted by firms in a growing range of industries, including the technology sector. Tesla, for instance, <a href="https://www.cnbc.com/2020/04/08/tesla-will-slash-employee-pay-furlough-hourly-workers.html">announced</a> that it would be cutting employee salaries and furloughing hourly workers as it was forced to suspend production temporarily.</p>
<h3>Cyber-Espionage and the Economy</h3>
<p>While the current pandemic crisis presents businesses with unprecedented economic challenges to their very existence, it has also created a tremendous level of cyber-risks. Heightened risks are present not only due to the significant numbers of individuals working from home, increasing the vulnerability landscape, but also because as states fall deeper into recessions, some may resort to cyber-espionage in an attempt to position better their post-pandemic political, economic, and industrial structures. Regardless of the industry, the intellectual property (IP) of any organization is likely to be a precious target for foreign government-sponsored hackers.</p>
<p>Whether they seek production know-how, manufacturing plans, patents, research, or trade secrets, foreign governments may resort to unethical means of acquiring critical industrial and trade information to enhance their domestic economy posture and further leverage their comparative and absolute advantages, while simultaneously imposing costs on their adversaries. Chinese government-sponsored hacking groups, as well as their Russian counterparts, have a long-standing <a href="https://www.telegraph.co.uk/technology/2018/10/09/china-ahead-russia-biggest-state-sponsor-cyber-attacks-west/">history</a> of engaging in such malicious acts.</p>
<p>Government-sponsored and international criminal hacking groups, particularly those sponsored by the Chinese and Russian governments, are likely already <a href="https://www.technologyreview.com/s/615346/chinese-hackers-and-others-are-exploiting-coronavirus-fears-for-cyberespionage/">taking</a> advantage of the pandemic to increase their espionage activities around the globe. In this respect, it was recently <a href="https://thehill.com/policy/cybersecurity/489531-experts-discover-recent-increase-in-chinese-cyberattacks">reported</a> that the Chinese cyber threat group, <a href="https://attack.mitre.org/groups/G0096/">APT41</a>, has already launched “one of the broadest&nbsp;campaigns by a Chinese cyber espionage actor we have observed in recent years” according to the cybersecurity firm FireEye. The attacks targeted the healthcare sector, including the pharmaceutical industry as well as other industries, including banking, manufacturing, media, telecommunications, and non-profits in <a href="https://www.reuters.com/article/us-usa-china-cyber/u-s-cybersecurity-experts-see-recent-spike-in-chinese-digital-espionage-idUSKBN21C1T8">several</a> countries. Though, arguably, different sectors might be more prone to cyber-espionage campaigns than others, depending on the level of the industry’s criticality and IP possession. Yet in desperate economic times, government-sponsored hackers are likely to “harvest” as much data as possible—even non-industrial data.</p>
<h3>Politically Motivated Cyber-Espionage</h3>
<p>Many would argue that an organization&#8217;s IP or industrial data are the primary targets for government-backed hackers and cyber-attacks. However, non-industrial data can also be of great value to adversary governments to leverage their political advantage and position. Such data can include the general online behavior of the public, which then can give adversary-states insight into public sentiment towards the government of a target country, thus allowing adversaries to more effectively plan and orchestrate targeted online disinformation campaigns. These online campaigns are usually conducted <a href="https://www.ned.org/issue-brief-how-disinformation-impacts-politics-and-publics/">to degrade</a> the credibility and trust between the targeted country’s public and its media and governmental institutions. In doing so, adversaries attempt to covertly shape political developments in targeted countries.</p>
<p>Accordingly, cyber espionage is an activity that effective online disinformation campaigns are built upon. Again, it is no wonder how Chinese and Russian backed cyber-troops <a href="https://thehill.com/policy/national-security/488659-pompeo-says-china-russia-iran-are-spreading-disinformation-about">pioneered</a> the systematic use of online disinformation tactics and exploitation of social media for such purpose. The latter is particularly evident from the recent <a href="https://securityboulevard.com/2020/04/covid-19-china-and-russia-disinformation-and-shenanigans/">actions</a> performed by China and Russia while the ongoing pandemic crisis is taking place, where both countries tried to <a href="https://www.nytimes.com/2020/03/28/us/politics/china-russia-coronavirus-disinformation.html">push</a>&nbsp;conspiracy theories targeting western audiences to create political divisions, fear, and confusion. Furthermore, as the pandemic crisis continues to profoundly disrupt the global economy, the debate on global power <a href="https://www.theguardian.com/world/2020/mar/28/power-equality-nationalism-how-the-pandemic-will-reshape-the-world">shifts</a>, and the reshaping of the international <a href="https://www.foreignaffairs.com/articles/china/2020-03-18/coronavirus-could-reshape-global-order">order</a> is already starting to take place. In this regard, one cannot ignore China’s hegemonic intentions, and neither should one be surprised to see a surge of Chinese cyber-espionage and disinformation campaigns.</p>
<h3>Countermeasures</h3>
<p>Undoubtedly, the current pandemic presents both public and private organizations around the world with unprecedented economic risks leading to severe consequences on a macro and micro-scale. Although macro-level implications are evident in terms of economic performance, unemployment, and economic security, micro-level consequences may include a rise in crime, public unrest, and threats to civil order. Furthermore, the micro-level effects mentioned can be further fuelled by foreign cyber espionage and disinformation campaigns aimed at undermining the internal stability of a targeted state by adversarial actors.</p>
<p>That said, protective measures and recovery plans must be collective, in coordination and close partnership between a nation’s government, domestic organizations, and the private sector. The current pandemic has narrowed the available options for mitigating the economic fallout given the unanticipated and significant decline many industries are facing.</p>
<p>As economic measures, including but not limited to stimulus packages—an integral part of a state’s national security—are being implemented around the globe, the focus here is on governmental countermeasures targeting the spread of foreign cyber-espionage and disinformation. Even a slight relaxation of counter-espionage and counter-disinformation measures could impact economic recovery efforts. In this respect, several actions can be taken at the national level:</p>
<ol>
<li>Sovereign states should agree on a formalized collective, coordinated intergovernmental response of indictment, and sanctions against governments sponsoring hacking groups should be implemented.</li>
<li>Governments should reinforce and harness their cyber defenses and data encryption. Additionally, governments must continuously address the weakest link in their cybersecurity chain: the human factor. The human element is mostly thought of in terms of increasing cyber-awareness and hygiene training. However, the particular focus here is the importance of increased monitoring of staff to limit insider threats who can be recruited by foreign bodies for facilitating espionage or network access.</li>
<li>Existing data policies of every governmental institution should be reviewed to further control and limit who have access to what.</li>
<li>Governments should strongly encourage the private sector industries to harness their internal cybersecurity team. While medics globally are on the frontline of fighting the pandemic and coronavirus spread, the organization’s cybersecurity teams are on the frontline of fighting the dangerously rising level of cyberthreats and associated digital risks related to espionage. That said, regardless of the industry, organizations must empower their cybersecurity teams more than before to more effectively counter increasing vulnerabilities surface and cyber-risks. Especially that with the growing pandemic uncertainties, social distancing measures will undoubtedly increase the individuals use of internet, computers, tablets, and smartphones.</li>
<li>Governments should increase online cyber-hygiene and awareness training for their general public. While cyber-hygiene has been something long-time called for, yet it is currently more required than before. Individuals must ensure vigilance while digitally navigating. Especially in times of crisis and fear, due to human nature, individuals thrive on more news and updates on the internet. In this regard, cybercriminals will possibly exploit such concerns to distribute more malware, malicious link, malicious websites, phishing emails, and scamming attempts. Recent reports <a href="http://hrnews.co.uk/attacks-on-businesses-as-email-phishing-rises-667-since-the-start-of-march/">found</a> that global phishing activity increased by 667 percent during March 2020.</li>
<li>Governments should as well as encourage the private sector industries to limit the access of employees working from home to the organization’s intellectual property. Whether confidential financial documents, business plans, or critical research in an R&amp;D department, employees’ access to any document or material deemed as the organization’s intellectual property should be as limited as possible. Concerning point five, it is never guaranteed that employees will not fall prey to any online malicious trap that could infect their device.</li>
<li>Continuously re-evaluate the digital and online tools needed by public and private sector employees needs to work from home to ensure safety, privacy, and security as much as possible. As different organizations utilize different tools and thus requires a different level of assessment. However, one example we can indicate here is the rapid adoption of <a href="https://zoom.us/">Zoom</a>, a video conferencing website and app that saw a rapid <a href="https://www.theguardian.com/technology/2020/mar/31/zoom-booms-as-demand-for-video-conferencing-tech-grows-in-coronavirus-outbreak">rise</a> globally over the past month as a result of the “working from home” implementation. Accordingly, it’s <a href="https://healthitsecurity.com/news/zoom-domains-targeted-by-hackers-as-use-surges-with-covid-19">been reported</a> that hackers are capitalizing on the current extensive use of communication apps, including Zoom and Google classrooms, and are trying to <a href="https://securitybrief.com.au/story/zoom-meetings-infiltrated-by-hackers-check-point">infiltrate</a> online meetings. Furthermore, there are <a href="https://www.nytimes.com/2020/03/30/technology/new-york-attorney-general-zoom-privacy.html">ongoing</a> concerns over Zoom’s privacy practices, with countries like <a href="https://www.dailymail.co.uk/sciencetech/article-8196719/Taiwan-bans-Zoom-government-use-recommends-workers-use-Google-Microsoft-instead.html">Taiwan</a> already banning its use.</li>
<li>In tackling online disinformation threats, governments should set up a dedicated taskforce comprising stakeholders of its national intelligence, national security, media, and ICT authorities. Such a task force would contribute to protecting their nation’s citizens by ultimately monitoring continuously and responding to foreign media outlets, online propaganda, and social media for adversaries&#8217; disinformation campaigns. Furthermore, such a taskforce should regularly communicate to the public the right and factual information to avoid unintentional misinformation spread by the public.</li>
<li>Governments should work at all levels to ensure the highest level possible of transparency and government performance with its citizens via daily press briefings, in appearances on national media outlets, and official social media accounts. In doing so, governments minimize the possibility of having its citizens falling victim to falsified information spread by adversaries online.</li>
</ol>
<p>With the ongoing pandemic crisis combined with the “warning drums” of a deep economic recession, governments worldwide are facing a full-scale national crisis that perhaps the maximum was done prepare for it was a hypothetical simulation or a table-top exercise. Managing the crisis, in reality, can be much more complex and a nightmare for decision-makers. However, flexible, agile, and governments that are being flexible and adaptable while at the same time prioritizing their cybersecurity measures and counter-espionage efforts are more prone to survive the crisis as well as sustain domestic business operations with minimal loss.</p>
<p><a href="https://globalsecurityreview.com/global-recession-will-fuel-cyber-espionage/">A Global Recession Will Fuel Cyber-Espionage</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Cyber Insecurity is Harming Emerging Markets</title>
		<link>https://globalsecurityreview.com/cyber-insecurity-harming-emerging-markets/</link>
		
		<dc:creator><![CDATA[Spandana Singh]]></dc:creator>
		<pubDate>Tue, 04 Dec 2018 14:28:31 +0000</pubDate>
				<category><![CDATA[Economics & Trade]]></category>
		<category><![CDATA[Africa]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Indonesia]]></category>
		<category><![CDATA[Morocco]]></category>
		<category><![CDATA[Nigeria]]></category>
		<category><![CDATA[South Africa]]></category>
		<guid isPermaLink="false">http://globalsecurityreview.com/?p=8955</guid>

					<description><![CDATA[<p>Emerging Market Businesses Want to Grow, But Can They Succeed Without Cybersecurity? Data breaches seem to be the name of the game in tech this year, and the latest, a software flaw that exposed the private data of hundreds of thousands of Google+ users, has just snagged the spotlight. Despite the fact that data breaches [&#8230;]</p>
<p><a href="https://globalsecurityreview.com/cyber-insecurity-harming-emerging-markets/">Cyber Insecurity is Harming Emerging Markets</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></description>
										<content:encoded><![CDATA[<h2>Emerging Market Businesses Want to Grow, But Can They Succeed Without Cybersecurity?</h2>
<p>Data breaches seem to be the name of the game in tech this year, and the latest, a <a href="https://www.wsj.com/articles/google-exposed-user-data-feared-repercussions-of-disclosing-to-public-1539017194">software flaw</a> that exposed the private data of hundreds of thousands of Google+ users, has just snagged the spotlight. Despite the fact that data breaches and cybersecurity attacks occur across the globe, their occurrences in major technology markets such as the United States and the European Union (EU) tend to take policy precedence and draw greater media attention.</p>
<p>However, as emerging market nations—such as Indonesia and those in Sub-Saharan Africa—continue to rapidly digitize and foster new technology-based businesses, more attention needs to be paid to the risks these markets and their users face. Failure to do so will significantly hinder economic growth and business development in these regions.</p>
<p>Over <a href="http://www.serianu.com/downloads/AfricaCyberSecurityReport2017.pdf">90%</a> of African businesses operate under the <a href="https://www.healthcareitnews.com/news/75-health-orgs-live-below-cybersecurity-poverty-line">cybersecurity poverty line</a>, which means they are unable to adequately protect themselves from vulnerabilities and losses. Although Africa has comparatively limited communications infrastructure, the continent has a <a href="https://www.brookings.edu/blog/africa-in-focus/2018/05/30/global-cybercrimes-and-weak-cybersecurity-threaten-businesses-in-africa/">high penetration rate of new technologies</a>, and as a result is a prime target for digital attacks. In 2017, cybercrime <a href="https://qz.com/africa/1303532/cybercrime-costs-businesses-in-kenya-south-africa-nigeria-billions/">cost</a> the continent $3.5 billion and yet 96% of online security incidents went unreported. Large and expanding digital hubs such as Nigeria and Kenya <a href="https://www.brookings.edu/blog/africa-in-focus/2018/05/30/global-cybercrimes-and-weak-cybersecurity-threaten-businesses-in-africa/">particularly suffered</a>, accruing losses of $649 million and $210 million, respectively.</p>
<p>Cybercrime in Africa has targeted startups, corporations, institutions and governments alike. This June, South African insurance company Liberty Holdings Ltd. was <a href="https://www.bloomberg.com/news/articles/2018-06-17/south-africa-s-liberty-says-payment-demand-refused-after-breach">held ransom</a> by hackers who were able to access sensitive data including emails. The company is <a href="https://www.bloomberg.com/news/articles/2018-06-17/south-africa-s-liberty-says-payment-demand-refused-after-breach">responsible</a> for overseeing 2.5 million life-insurance policies and administering over 10,000 retirement plans and 500,000 individual and institutional investment customers, raising concerns about the consequences of such a hack. Some progress, however, is being made: there was a <a href="https://www.brookings.edu/blog/africa-in-focus/2018/06/04/cybersecurity-in-africa-securing-businesses-with-a-local-approach-with-global-standards/">73% increase</a> of Information Security Management System certified companies on the continent between 2015 and 2016, the majority of which are based in South Africa, Nigeria and Morocco.</p>
<p>Similarly, in the Asia-Pacific region, cybercrime poses a serious threat to economic success. A study commissioned by Microsoft <a href="https://jakartaglobe.id/business/indonesia-firms-face-34b-losses-due-cyber-attacks-report/">found</a> that the total potential losses to the region from cyber attacks was $1.745 trillion, or 7% of the region’s current gross domestic product (GDP). These risks are particularly apparent in the ASEAN region, where nations <a href="https://en.tempo.co/read/news/2018/01/25/310915156/Indonesia-Prone-to-Cyber-Attacks-up-to-the-Year-2025">invest</a> an average of 0.07% of their GDP in cybersecurity infrastructure and operations. The consequences of such underfunded and undervalued cybersecurity initiatives can be seen in practice in Indonesia, where the <a href="https://www.bloomberg.com/news/articles/2018-09-16/go-jek-is-said-in-talks-to-raise-at-least-2-billion-in-funding">country’s highest valued startup on record</a>, Go-Jek, was found to have significant security vulnerabilities.<span class="Apple-converted-space"> </span></p>
<p>Go-Jek is a ride-sharing and logistics startup that has <a href="https://asia.nikkei.com/Business/Companies/Google-invests-in-Go-Jek-in-its-first-big-Indonesian-venture">over 15 million weekly active users</a> and is widely considered a major competitor to global brands such as Uber and Lyft. In March 2017, Fallible, an Indian security firm <a href="https://www.techinasia.com/indian-firm-exposes-go-jek-data-leaks">claimed</a> they were able to extract information such as GPS coordinates of rides and user data such as phone numbers and pick up and drop off points from two problematic APIs on the app. The firm also claimed they were able to exploit a vulnerability which enabled them to manipulate notifications users received. An Indonesian hacker based in Thailand <a href="https://www.techinasia.com/indonesia-go-jek-security-loopholes">identified</a> similar vulnerabilities in 2016. Go-Jek is Indonesia’s<a href="https://www.cnbc.com/2018/07/02/nadiem-makarim-and-indonesias-billion-dollar-unicorn-start-up-go-jek.html"> first startup to become a unicorn</a> (meaning it became valued at $1 billion), and over the past year, the company has <a href="https://techcrunch.com/2017/12/14/go-jek-buys-three-startups-to-advance-its-mobile-payment-business/">invested heavily</a> in expanding their services to include mobile payments.<span class="Apple-converted-space"> </span></p>
<p>This expansion into a field that engages with even more sensitive user data underscores the need for a greater cybersecurity focus, as well as a complementary regulatory environment that similarly prioritizes security in tandem with growth. In 2017, the Government of Indonesia took steps in this regard, <a href="https://thediplomat.com/2016/09/does-indonesia-need-a-new-cyber-agency/">establishing</a> a National Cyber Agency (NCA) to develop an integrated cyber defense strategy. However, given that in the same year, almost half of Indonesia’s companies were <a href="https://jakartaglobe.id/business/indonesia-firms-face-34b-losses-due-cyber-attacks-report/">impacted</a> by over 205 million cyber-attacks, costing $34 billion in direct financial losses and long-term reputational damage, there is a great deal of work to be done.<span class="Apple-converted-space">  </span></p>
<p>In larger and more developed technology markets, data security and privacy laws such as the recently passed General Data Protection Regulation (GDPR) compel companies to invest more time and resources into developing and maintaining robust security infrastructure. However, in markets, such as in Sub-Saharan Africa and Asia-Pacific, where such regulations and cybersecurity-focused policy environments are weaker or lacking in enforcement, commensurate practices by businesses are less common.</p>
<p>Going forward, emerging market businesses and governments need to recognize that to achieve economic growth and reap the benefits of the ongoing digital boom, cybersecurity needs to be a priority. In practice, this means that there needs to be greater emphasis on operating and maintaining updated and robust security systems; training and expanding cybersecurity workforces; developing long-term cyber resilience strategies that account for all levels of corporate or institutional operations; raising awareness about the importance of such security practices; and generating legislation that adequately offers protections and remediations.<span class="Apple-converted-space"> </span></p>
<p>Greater investment in regionally-specific cybersecurity infrastructure can also open up noteworthy business opportunities. The cybersecurity market is expected to be <a href="https://qz.com/africa/1303532/cybercrime-costs-businesses-in-kenya-south-africa-nigeria-billions/">worth</a> $2 billion by 2020, and thus far the African continent has not released any commercially viable cybersecurity products, while ASEAN nations, although having made some progress, also have room to grow.</p>
<p>The average cost of cybercrime for businesses and governments across the globe is increasing at a rapid rate, and emerging markets are at significant risk. Developing more robust cybersecurity infrastructure, policies, programs and cultures must be prioritized. This is particularly important now as these regions will soon be host to the majority of global internet users, as well as a large share of future digital businesses and services.<span class="Apple-converted-space"> </span></p>
<p><a href="https://globalsecurityreview.com/cyber-insecurity-harming-emerging-markets/">Cyber Insecurity is Harming Emerging Markets</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
