https://urgentcomm.com/wp-content/themes/ucm_child/assets/images/logo/footer-logo.png
  • Home
  • News
  • Multimedia
    • Back
    • Multimedia
    • Video
    • Podcasts
    • Galleries
  • Commentary
    • Back
    • Commentary
    • Urgent Matters
    • View From The Top
    • All Things IWCE
    • Legal Matters
  • Resources
    • Back
    • Resources
    • Events
    • Webinars
    • White Papers
    • Reprints & Reuse
  • IWCE
    • Back
    • IWCE
    • Conference
    • Special Events
    • Exhibitor Listings
    • Premier Partners
    • Floor Plan
    • Exhibiting Information
    • Register for IWCE
  • About Us
    • Back
    • About Us
    • Contact Us
    • Advertise
    • Terms of Service
    • Privacy Statement
    • Cookies Policy
  • Related Sites
    • Back
    • American City & County
    • IWCE
    • Light Reading
    • IOT World Today
    • Mission Critical Technologies
    • Microwave/RF
    • T&D World
    • TU-Auto
  • In the field
    • Back
    • In the field
    • Broadband Push-to-X
    • Internet of Things
    • Project 25
    • Public-Safety Broadband/FirstNet
    • Virtual/Augmented Reality
    • Land Mobile Radio
    • Long Term Evolution (LTE)
    • Applications
    • Drones/Robots
    • IoT/Smart X
    • Software
    • Subscriber Devices
    • Video
  • Call Center/Command
    • Back
    • Call Center/Command
    • Artificial Intelligence
    • NG911
    • Alerting Systems
    • Analytics
    • Dispatch/Call-taking
    • Incident Command/Situational Awareness
    • Tracking, Monitoring & Control
  • Network Tech
    • Back
    • Network Tech
    • Interoperability
    • LMR 100
    • LMR 200
    • Backhaul
    • Deployables
    • Power
    • Tower & Site
    • Wireless Networks
    • Coverage/Interference
    • Security
    • System Design
    • System Installation
    • System Operation
    • Test & Measurement
  • Operations
    • Back
    • Operations
    • Critical Infrastructure
    • Enterprise
    • Federal Government/Military
    • Public Safety
    • State & Local Government
    • Training
  • Regulations
    • Back
    • Regulations
    • Narrowbanding
    • T-Band
    • Rebanding
    • TV White Spaces
    • None
    • Funding
    • Policy
    • Regional Coordination
    • Standards
  • Organizations
    • Back
    • Organizations
    • AASHTO
    • APCO
    • DHS
    • DMR Association
    • ETA
    • EWA
    • FCC
    • IWCE
    • NASEMSO
    • NATE
    • NXDN Forum
    • NENA
    • NIST/PSCR
    • NPSTC
    • NTIA/FirstNet
    • P25 TIG
    • TETRA + CCA
    • UTC
Urgent Communications
  • NEWSLETTER
  • Home
  • News
  • Multimedia
    • Back
    • Video
    • Podcasts
    • Galleries
  • Commentary
    • Back
    • All Things IWCE
    • Urgent Matters
    • View From The Top
    • Legal Matters
  • Resources
    • Back
    • Events
    • Webinars
    • White Papers
    • Reprints & Reuse
    • UC eZines
    • Sponsored content
  • IWCE
    • Back
    • Conference
    • WHY ATTEND
    • Exhibitor Listings
    • Floor Plan
    • Exhibiting Information
    • Registration Opens April 2019-Join Our Mailing List
  • About Us
    • Back
    • About Us
    • Contact Us
    • Advertise
    • Terms of Service
    • Privacy Statement
    • Cookies Policy
  • Related Sites
    • Back
    • American City & County
    • IWCE
    • Light Reading
    • IOT World Today
    • TU-Auto
  • newsletter
  • In the field
    • Back
    • Internet of Things
    • Broadband Push-to-X
    • Project 25
    • Public-Safety Broadband/FirstNet
    • Virtual/Augmented Reality
    • Land Mobile Radio
    • Long Term Evolution (LTE)
    • Applications
    • Drones/Robots
    • IoT/Smart X
    • Software
    • Subscriber Devices
    • Video
  • Call Center/Command
    • Back
    • Artificial Intelligence
    • NG911
    • Alerting Systems
    • Analytics
    • Dispatch/Call-taking
    • Incident Command/Situational Awareness
    • Tracking, Monitoring & Control
  • Network Tech
    • Back
    • Cybersecurity
    • Interoperability
    • LMR 100
    • LMR 200
    • Backhaul
    • Deployables
    • Power
    • Tower & Site
    • Wireless Networks
    • Coverage/Interference
    • Security
    • System Design
    • System Installation
    • System Operation
    • Test & Measurement
  • Operations
    • Back
    • Critical Infrastructure
    • Enterprise
    • Federal Government/Military
    • Public Safety
    • State & Local Government
    • Training
  • Regulations
    • Back
    • Narrowbanding
    • T-Band
    • Rebanding
    • TV White Spaces
    • None
    • Funding
    • Policy
    • Regional Coordination
    • Standards
  • Organizations
    • Back
    • AASHTO
    • APCO
    • DHS
    • DMR Association
    • ETA
    • EWA
    • FCC
    • IWCE
    • NASEMSO
    • NATE
    • NXDN Forum
    • NENA
    • NIST/PSCR
    • NPSTC
    • NTIA/FirstNet
    • P25 TIG
    • TETRA + CCA
    • UTC
acc.com

Cybersecurity


Partner content

Cybercrime: Nation-states go prime time

Cybercrime: Nation-states go prime time

  • Written by Marc Wilczek / Dark Reading
  • 5th November 2020

Cybercriminals have become more sophisticated by employing methodologies that make them both tougher to detect and more capable of thwarting even tech-savvy targets. Hostile nation-states are using new attack methods that improve the odds of infiltrating and knocking off high-value targets. Increasingly, criminal groups are shifting their infrastructure to the cloud in order to hide among legitimate services, and bad actors have figured out novel ways to search the Internet for systems that are vulnerable to disruption.

According to the “Digital Defense Report” recently released by Microsoft, nation-state attacks have moved far beyond critical infrastructure, since the lion’s share — over 90% — of security alerts originated from outside of this sector. Within the critical infrastructure arena, 60% of nation-state activity zeroed in on IT organizations, followed by commercial facilities, critical manufacturing, financial services, and the defense industrial base.

Nation-state actors typically do their dirty work in service of broader strategic goals that they see as essential to the political, cultural, and economic health — and even the survival — of their country. That’s why the attackers are so determined and ready to put so much time and expense into disruptive cyber operations.

Their Goals: Espionage, Disruption, or Destruction
As noted in Microsoft’s report, over a dozen hostile states are launching cyberattacks to collect intelligence about what their targets are thinking and doing. They’re seeking official correspondence, proprietary corporate data, and personal information. They’ve also spearheaded operations designed to disrupt or destroy data and physical infrastructure at the organizations in their crosshairs.

Furthermore, nation-state actors have conducted intrusions intended to disrupt or destroy data or physical assets at targeted facilities or institutions. The US National Institute of Standards and Technology (NIST) defines a disruption as “an unplanned event that causes the general system or major application to be inoperable for an unacceptable length of time.” A disruptive attack can cause minor or extended power outages or prolonged network downtime. Destructive attacks are associated with “overwriting, erasing, or physically destroying information,” equipment, or facilities.

To read the complete article, visit Dark Reading.

 

Tags: Alerting Systems Analytics Applications Critical Infrastructure Cybersecurity Enterprise Federal Government/Military Funding Incident Command/Situational Awareness News Policy Public Safety Regional Coordination Security Software State & Local Government System Design System Operation Test & Measurement Tracking, Monitoring & Control Partner content

Related


  • Handcuffs over AI: Solving security challenges with law enforcement
    For the last 20 years, spending to solve cybersecurity goals has exploded to more than $100 billion annually. Security vendors tout advances in detection and protection that will provide the relief that has evaded the craft since its formation. The most recently heralded messiahs are machine learning (ML), security orchestration automation and response (SOAR), and artificial […]
  • Fujitsu: Cyber cretins are casing out private 5G
    Japan’s Fujitsu is inking a partnership with the US-Japanese cybersecurity giant Trend Micro and it’s all around cybersecurity and private 5G. Fujitsu and Trend Micro’s cooperation will kick off with a simulated smart factory environment, and an operational Fujitsu one. It sports a whirring menagerie of high-definition monitoring cameras and automatic guided vehicles. This simulated smart factory […]
  • Faster in-vehicle Wi-Fi dependent on faster connectivity
    Next-generation wifi technology could save manufacturers millions in over the air (OTA) updates carrying costs while offering a more seamless experience for passengers. LG Innotek has recently launched an automotive wifi module based on the next-generation wifi 6E (6th Generation Extendend) technology using 6 GHz bandwidth. The module employs a combination of communications chipset, a […]
  • Digital-health infrastructure benefits from cloud-to-edge architecture
    During COVID-19, digital health took off as physical distancing requirements became paramount. Some providers saw increases in virtual visits in the tens of thousands, other components, including remote patient monitoring  and wearable technology, were becoming more commonplace. Prior to the advent of the pandemic, 88% of healthcare providers had invested in a remote patient monitoring (RPM) […]

Leave a comment Cancel reply

To leave a comment login with your Urgent Comms account:

Log in with your Urgent Comms account

Or alternatively provide your name, email address below:

Your email address will not be published. Required fields are marked *

Related Content

  • Broadband expansion part of American Jobs Plan to rebuild country's infrastructure
  • IoT Cybersecurity Act places security onus on device makers
  • UC-Berkeley survey shines light on cybersecurity concerns surrounding smart-city technologies
  • Intel on the outside: Chips giant, Google, Microsoft the latest to quit MWC

Commentary


Unlocking the power of ESInets: Different NG911 provisioning approaches exist; level of control is key differentiator

7th April 2021

Ransomware? Let’s call it what it really is: extortionware

21st February 2021

Redefining communications for today’s mobile workforces

18th February 2021
view all

Events


UC Ezines


IWCE 2019 Wrap Up

13th May 2019
view all

Twitter


UrgentComm

Public Safety Technology Alliance (PSTA) to shut down dlvr.it/RxpbTh

16th April 2021
UrgentComm

Klobuchar pledges support for NG911 funding, does not address specifics of proposal dlvr.it/Rxp4Wp

16th April 2021
UrgentComm

Want to stay up-to-date on the latest #criticalcommunications and #publicsafety trends? Sign up for IWCE's Urgent C… twitter.com/i/web/status/1…

15th April 2021
UrgentComm

Ubiquiti’s latest hack highlights troubled security path for operators dlvr.it/RxkzLj

15th April 2021
UrgentComm

Dependency problems increase for open-source components dlvr.it/RxkffD

15th April 2021
UrgentComm

How smart environments will take shape post-COVID-19 dlvr.it/RxkVPH

15th April 2021
UrgentComm

RootMetrics 5G report puts AT&T in first place dlvr.it/RxkVKD

15th April 2021
UrgentComm

Newscan: Cincinnati to pay $6 million to settle suit in death of Kyle Plush who called 911 dlvr.it/RxfsSd

14th April 2021

Newsletter

Sign up for UrgentComm’s newsletters to receive regular news and information updates about Communications and Technology.

Expert Commentary

Learn from experts about the latest technology in automation, machine-learning, big data and cybersecurity.

Business Media

Find the latest videos and media from the market leaders.

Media Kit and Advertising

Want to reach our digital and print audiences? Learn more here.

DISCOVER MORE FROM INFORMA TECH

  • American City & County
  • IWCE
  • Light Reading
  • IOT World Today
  • Mission Critical Technologies
  • Microwave/RF
  • T&D World
  • TU-Auto

WORKING WITH US

  • About Us
  • Contact Us
  • Events
  • Careers

FOLLOW Urgent Comms ON SOCIAL

  • Privacy
  • CCPA: “Do Not Sell My Data”
  • Cookies Policy
  • Terms
Copyright © 2021 Informa PLC. Informa PLC is registered in England and Wales with company number 8860726 whose registered and Head office is 5 Howick Place, London, SW1P 1WG.
This website uses cookies, including third party ones, to allow for analysis of how people use our website in order to improve your experience and our services. By continuing to use our website, you agree to the use of such cookies. Click here for more information on our Cookie Policy and Privacy Policy.
X