Personal tools
You are here: Home Research Trends & Opportunities New Media and New Digital Economy Cyberwarfare and Future Cybersecurity

Cyberwarfare and Future Cybersecurity

(Bay Area/San Francisco, California - Jeff M. Wang)



Cyber warfare is essentially warfare between states, albeit conducted in the cyber realm. It consists of states (and state-sponsored agencies) launching cyber attacks against each other.

The objectives of launching these attacks are various. Sometimes, the motive is to steal corporate or state secrets. Sometimes, an attack aims to disrupt critical infrastructure, or merely infect the software behind this infrastructure and lay silent until it is needed. Needless to mention, some attacks seek to influence elections, either by directly hacking voting software or distributing propaganda among crucial voters.

There are three key pieces of technology, though, that are likely to drive the development of cyberwarfare in the coming decade. 

  • Machine Learning And AI: Artificial Intelligence is already being deployed in a wide range of situations, and it is likely that governments are already incorporating it into their cyber weapons.
  • The Cloud: Cloud storage represents both a risk and an asset when it comes to cyber warfare. On one hand, distributed storage can make critical information easier to steal, because an attacker only needs to identify one weak machine in order to compromise a system. On the other hand, with the correct encryption, cloud storage can actually be more secure than physical drives.
  • Blockchain: Blockchain is also likely to revolutionize cyber warfare in the coming years. By providing a secure way to share key information between multiple users, it promises to protect data from the most common types of cyber attack. On the other hand, we don't think it will be long before even blockchain is compromised


Future Cybersecurity


Our daily life, economic vitality, and national security depend on a stable, safe, and resilient cyberspace. Cyberspace and its underlying infrastructure are vulnerable to a wide range of risk stemming from both physical and cyber threats and hazards. Sophisticated cyber actors and nation-states exploit vulnerabilities to steal information and money and are developing capabilities to disrupt, destroy, or threaten the delivery of essential services. 

Cybersecurity is the practice of protecting systems, networks, and programs from digital attacks. These attacks are usually aimed at accessing, changing, or destroying sensitive information; extorting money from users; or interrupting normal business processes. Implementing effective cybersecurity measures is particularly challenging today because there are more devices than people, and attackers are becoming more innovative.


[More to come ...]



Document Actions