"Keys To The Kingdom"

"Keys To The Kingdom"

Two escalations in cyber-threat capabilities have moved the world into a different post-Cold War environment, one in which online conflicts that can damage economies and yield physical harm have become part of daily routines and one in which current smartphone security has become anachronistic. First, zero-day bugs, which are errors in software programs that enable hackers to circumvent all security systems, has elevated system risks for corporations and government agencies. The term “zero day” is intended to explain that by the time outsiders discover a bug in a target’s software, the target has no days left to fix it. Second, a more recent zero-click surveillance software, called Pegasus, can circumvent nearly all security and encryption on a smartphone and embed itself in a target phone “over the air.” With these two entrants into the realm of cyber-hacking, the threat environment has moved to a much higher level of risk and damage. These kinds of cyber-security changes reveal that traditional methods of keeping cybersystems secure - much like home security systems - might be able to keep out the amateur, but they hav emuch more trouble keeping out the pros, especially when the pros are state-backed. In a networked world ,security comes down to the weakest link.  

Share this Insight

We look forward to helping you