A close-up on an abstract design of a display, which is warning about a cyber attack. Multiple rows ... [ ] of hexadecimal code are interrupted by red glowing warnings and single character exclamation marks. The image can represent a variety of threats in the digital world: data theft, data leak, security breach, intrusion, etc... My most recent FORBES article focused on 3 big trends impacting the cybersecurity ecosystem. They included, the expanding cyber-attack surface, the use of ransomware as a cyber weapon of choice by hackers, and the growing ICS, OT/IT Cyber-Threat convergence. All the elements of that article apply to this analysis of the myriad of cyber-threat trends & challenges we are currently or will be soon facing.
GovCon Expert Chuck Brooks has published his latest article as a member of Executive Mosaic's GovCon Expert program on Wednesday. Brooks discussed the development and procurement of emerging technologies as they influence every sector of the federal marketplace, including the Department of Defense (DoD), the Department of Homeland Security (DHS), academia and the intelligence community. You can read Chuck Brooks' latest GovCon Expert article below: The development and procurement of emerging technologies is being institutionalized throughout government, particularly in national security areas. There are a variety of new initiatives and programs that have been created to ensure that the United States is prepared for a new era of technology leadership. If you are interested in transformative technologies, it is an exciting time to follow what is happening both in industry and in government.
The cognitive technologies AI & ML also have quite a hot measurement on the Scoville pepper scale. AI & ML are not necessarily new innovations, but they are ones that still have yet to reach full potential. In 2020, both AI & ML started to flourish -- and it will continue to do so throughout 2021. At its core, AI & ML are really about data integration, quality (image definition) and collection and processing of that data that allows for meaningful analytics. Applications for AI are increasing in variety and capability (especially automation) and are now being applied to almost every industry vertical, including finance, healthcare, energy, transportation, and cybersecurity. Most intriguing, but only in the earliest stages is AL/ML neural human augmentation. Neuromorphic technologies, and human/computer interface will extend our human brain capacities, memories and capabilities.
The growing complexity and magnitude of risks in such an integrated communications structure requires an unprecedented level of collaboration between public and private stakeholders than ever before. Most of the urban critical infrastructure is owned by the private sector and regulated by the public sector. Because of that ownership factor, a secure smart city can only be really viable if it operates under the umbrella of a strong public/private a partnership. Extending public/private sector working partnerships to physical and cyber threats to the critical infrastructure makes good sense. It can be planned and built through investments, grants, and tax incentives. Keeping a smart city secure is a challenge as the urban safety ecosystem of citizens can involve a variety of scenarios and threats, including terrorism, crime, weather incidents, and natural disasters. Thus, from a security perspective, a smart city design needs to include processes and technologies that protect and secure citizens.
Our digital world is under assault, and we need to urgently upgrade our defenses. In the past couple of years, the digital attack surface has vastly expanded from a move to remote work, from more people coming online, and from more interconnectivity of PCs and smart devices around the globe. Simultaneously, criminal enterprises and state actors have taken advantage of the lack of visibility and security administration. They are sharing resources and tactics over Dark Web forums and are growing more sophisticated and capable of using advanced hacking tools that enable them to discover vulnerable targets to infiltrate malware and automate attacks. The recent Solar Winds breach that circumvented cyber-defenses of numerous countries and most of the Fortune 500 companies was yet another wake-up call to the overwhelmed cybersecurity ecosystem incessantly being bombarded by phishing, ransomware, spoofing, and Distributed Denial of Service attacks. By 2025, the research firm Cybersecurity Ventures estimates that the cost of cybercrime will amount to $10.5 Trillion from multi-vector breaches.