Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Vulnerabilities / Threats

8/13/2019
10:00 AM
Nick Jovanovic
Nick Jovanovic
Commentary
Connect Directly
LinkedIn
Twitter
RSS
E-Mail vvv
50%
50%

History Doesn't Repeat Itself in Cyberspace

The 10th anniversary of the US Cyber Command is an opportunity to prepare for unknowns in the rapidly changing cybersecurity landscape.

Ten years ago, GPS on phones was just becoming available. Self-driving cars were secretly making their way into traffic, and most people hadn't even heard of 3D printing. This was when the US Cyber Command was created to direct and coordinate cyberspace planning and operations to defend and advance national interests with domestic and international partners.

It's an understatement to say things have changed a lot since 2009, especially the cyber landscape. Though the majority of its operations are classified, it's not hard to imagine the Cyber Command has also gone through major changes over the past decade.

Anniversaries are usually an opportunity to reflect on the past and think about the future, but that's tricky to do when most of the Cyber Command's activities are essentially kept from the public's eye. And while history is known to repeat itself, cyberspace — the epitome of constant change — bucks that trend. This secrecy, conflated with the dynamic cyber landscape, makes it difficult to accurately predict what the next decade might bring for the Cyber Command and technology in general. (Seriously, who could've foreseen that a social media platform conceived by a broken-hearted student in a college dorm room would end up being a tool for skewing elections of a world superpower?)  

After a recent (and rare) briefing at its new Joint Operations Center, a modicum of visibility emerged regarding the maturing Cyber Command's new "defend forward" operating philosophy. With publicly announced plans to defend the 2020 elections from foreign interference, along with authorization to operate against overseas adversaries, it's seems likely that the Cyber Command is stepping up its cyber warfare game, as it should. But will investment in its own technology infrastructure be commensurate with risks it faces?  

This 10-year milestone is exactly the right time to contemplate what may be said about the Cyber Command in 2029, and sentiment will hinge on technology decisions it makes in the near term. A decade from now, we'll look back again across the entire cyber landscape to assess the efficacy of the command and many other federal agencies, especially as multicloud complexity increases and threats become increasingly hard to thwart.  

There are clues that point to what the future holds, and at least one thing comes into focus pretty clearly right now: risky behavior taking place in federal agencies across the board is a huge homegrown threat that the Cyber Command (and anyone conducting business online) cannot ignore.

A recent report revealed that digital transformation efforts of federal agencies are putting sensitive government data — your data — at risk. Nearly 70% of respondents in the report admit they're not encrypting the data they're supposed to be protecting. Even as agencies struggle with cloud complexity, the race for digitally transformative technologies is literally pushing security aside. And despite increases in data breaches and regulatory compliance, proper investment in data protection is low for agencies. Without a sea change, 2029 won't mark a happy anniversary.   

Cyber Command's work over the next 10 years will require an increasing level of interoperability of data and data-handling systems between federal agencies — something they've acknowledged. But without the most robust encryption security in place, data fusion that must take place between multiple federal agencies will continue to be risky and potentially expose secrets to adversaries who are also building up their own cyber forces, for good or evil.  

Cyber Command acknowledges it must focus on persistent innovation and rapid change. During opening remarks at a Cyber Subcommittee Hearing last year to review Department of Defense operational readiness, Senator Mike Rounds of South Dakota, a member of the Senate Armed Services Committee and chairman of the Cybersecurity Subcommittee, said cyber readiness issues revolve around several problems including "...the shortage of skilled, cyber-capable personnel" and concerns about being properly equipped with the right tools to respond to operational needs.

At a minimum, these pronouncements show Cyber Command recognizes the clear and present danger of not being prepared in the cyber theater of war. If 60% of federal respondents in the same report say they've been breached (with 35% in the past year alone), and only 30% are properly encrypting data, the wake-up call should be loud and clear: Investment in modern data solutions for modern architectures is critical to national and global security.

Data security professionals, federal or otherwise, face a ticking time bomb and must be constantly vigilant. Everyone — from the intern to the CEO — has data worth stealing and worth protecting. Without support and proper investment, the institutions they protect will remain at risk.

Related Content:

Nick Jovanovic has more than 18 years of experience as a technology expert with familiarity in a broad spectrum of data storage and security technologies. He is currently responsible for leading and growing the Thales CPL U.S. Federal sales team by providing federally ... View Full Bio
Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Zero-Factor Authentication: Owning Our Data
Nick Selby, Chief Security Officer at Paxos Trust Company,  2/19/2020
44% of Security Threats Start in the Cloud
Kelly Sheridan, Staff Editor, Dark Reading,  2/19/2020
Ransomware Damage Hit $11.5B in 2019
Dark Reading Staff 2/20/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
6 Emerging Cyber Threats That Enterprises Face in 2020
This Tech Digest gives an in-depth look at six emerging cyber threats that enterprises could face in 2020. Download your copy today!
Flash Poll
How Enterprises Are Developing and Maintaining Secure Applications
How Enterprises Are Developing and Maintaining Secure Applications
The concept of application security is well known, but application security testing and remediation processes remain unbalanced. Most organizations are confident in their approach to AppSec, although others seem to have no approach at all. Read this report to find out more.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-7914
PUBLISHED: 2020-02-21
btif/src/btif_dm.c in Android before 5.1 does not properly enforce the temporary nature of a Bluetooth pairing, which allows user-assisted remote attackers to bypass intended access restrictions via crafted Bluetooth packets after the tapping of a crafted NFC tag.
CVE-2016-4606
PUBLISHED: 2020-02-21
Curl before 7.49.1 in Apple OS X before macOS Sierra prior to 10.12 allows remote or local attackers to execute arbitrary code, gain sensitive information, cause denial-of-service conditions, bypass security restrictions, and perform unauthorized actions. This may aid in other attacks.
CVE-2020-5243
PUBLISHED: 2020-02-21
uap-core before 0.7.3 is vulnerable to a denial of service attack when processing crafted User-Agent strings. Some regexes are vulnerable to regular expression denial of service (REDoS) due to overlapping capture groups. This allows remote attackers to overload a server by setting the User-Agent hea...
CVE-2019-14688
PUBLISHED: 2020-02-20
Trend Micro has repackaged installers for several Trend Micro products that were found to utilize a version of an install package that had a DLL hijack vulnerability that could be exploited during a new product installation. The vulnerability was found to ONLY be exploitable during an initial produc...
CVE-2019-19694
PUBLISHED: 2020-02-20
The Trend Micro Security 2019 (15.0.0.1163 and below) consumer family of products is vulnerable to a denial of service (DoS) attack in which a malicious actor could manipulate a key file at a certain time during the system startup process to disable the product's malware protection functions or the ...