Cyber Affairs
No Result
View All Result
  • Login
  • Register
  • Home
  • Live Threat Map
  • Books
  • Careers
  • Latest
  • Podcast
  • Popular
  • Press Release
  • Reports
  • Tech Indexes
  • White Papers
  • Contact
  • AI
  • Cyber Crime
  • Intelligence
  • Laws & Regulations
  • Cyber Warfare
  • Hacktivism
  • More
    • Digital Influence Mercenaries
    • Digital Diplomacy
    • Electronic Warfare
    • Emerging Technologies
    • ICS-SCADA
    • Books
    • Careers
    • Cyber Crime
    • Cyber Intelligence
    • Cyber Laws & Regulations
    • Cyber Warfare
    • Digital Diplomacy
    • Digital Influence Mercenaries
    • Electronic Warfare
    • Emerging Technologies
    • Hacktivism
    • ICS-SCADA
    • News
    • Podcast
    • Reports
    • Tech Indexes
    • White Papers
COMMUNITY
NEWSLETTER
  • AI
  • Cyber Crime
  • Intelligence
  • Laws & Regulations
  • Cyber Warfare
  • Hacktivism
  • More
    • Digital Influence Mercenaries
    • Digital Diplomacy
    • Electronic Warfare
    • Emerging Technologies
    • ICS-SCADA
    • Books
    • Careers
    • Cyber Crime
    • Cyber Intelligence
    • Cyber Laws & Regulations
    • Cyber Warfare
    • Digital Diplomacy
    • Digital Influence Mercenaries
    • Electronic Warfare
    • Emerging Technologies
    • Hacktivism
    • ICS-SCADA
    • News
    • Podcast
    • Reports
    • Tech Indexes
    • White Papers
NEWSLETTER
No Result
View All Result
Cyber Affairs
No Result
View All Result
  • Cyber Crime
  • Cyber Intelligence
  • Cyber Laws & Regulations
  • Cyber Warfare
  • Digital Diplomacy
  • Digital Influence Mercenaries
  • Electronic Warfare
  • Emerging Technologies
  • Hacktivism
  • ICS-SCADA
  • Reports
  • White Papers
Home Cyber Crime

The $10 Trillion Case For Decentralized Cybersecurity

admin by admin
Feb 2, 2023
in Cyber Crime
0 0
A A
0
FacebookTwitterLinkedIn

Smart city and IoT (Internet of Things) concept. ICT (Information Communication Technology).

getty

With historic inflation, rising prices, the escalating Ukraine conflict, and massive job losses in banking and tech, policymakers and executives are stretched to deliver a recovery agenda to get the world back to normal. Most have little bandwidth for yet more problems to solve, like the impending perils faced by cyber threats.

Sadie Creese, a Professor of Cyber Security at the University of Oxford, said, “There’s a gathering cyber storm and it’s really hard to anticipate just how bad that will be.”

Speaking at the World Economic Forum in Davos in January, she was joined by other heavy hitters sounded alarm bells like Jürgen Stock, Secretary-General of the International Criminal Police Organization (INTERPOL) who said, “This is a global threat, and it calls for a global response and enhanced and coordinated action.”

Their concern cannot be understated. Fortunately, heads are becoming unstuck from the sand pile of cyber threat denial, albeit slowly. We are facing an estimated $10 trillion, or eight percent of global GDP, cyber damage headache by the year 2025 if we continue to take a “business as usual” approach to cybersecurity.

The statistics make grim reading. A 2021 CyberEdge report stated that 85 percent of the surveyed organisations in the report were affected by a successful cyberattack. Ransomware attacks have increased by 80% year-over-year with over 37,700 ransomware attacks happen every hour globally, that is about 578 ransomware attacks each minute.

Putting the size of the cyberthreat problem into context is a herculean task. With global GDP estimated at $94 trillion, eight percent, or $7.5 trillion, is a hefty sum of money to put at risk to criminals.

Currently, the combined market value of FAANG (Facebook, Amazon, Apple, Netflix, and Google exceeds $3 trillion. If you compare this to the GDP of a country, Apple’s market cap is 2.1 times higher than Mexico’s GDP, and Amazon’s market cap is 4 times the GDP of Austria.

Add Microsoft into the mix, and its $1.8 trillion market cap would make it one of the richest countries in the world, with a value larger than the GDPs of Canada, Russia and Spain combined, even then however, the market cap of FAANG and Microsoft combined would only amount to $4.8 trillion.

Some of the best criminal minds are poised to control more money than the largest companies and countries in the world, and many criminal syndicates are state-sponsored.

This money will not be invested in new infrastructure, job creation, poverty alleviation, food security, or the environment. The money is lining the pockets of a cohort that are not acting in the best interests of “team humanity” or democracy.

The Cost Of Convenience And Connected Devices

The Internet of Things (IoT) has been an incredible contributor to humanity, but it comes at a cost. According to Statista the global number of connected IoT devices is expected to grow to 30 billion connections by 2025. Everything from car keys to baby monitors, laptops to mobiles are all potential single points of failure as their internet connectivity opens back doors to vulnerable networks.

In the past, enterprise and institutional security was ring-fenced, and could be managed within the walls of the organization, but with servers moving to the cloud, remote workers, and a proliferation of IoT devices creating a huge mesh of interconnectivity, borders are no longer identifiable or defensible.

This glaring weakness has been swept under the rug or at least underestimated by both Web2 and Web3 enterprises. Until there is a monumental major shift in our understanding and thinking of both cybercrime and cybersecurity, institutions and private citizens will continue to be victims relentless criminal hackers.

Monica Oravcova, co-founder and COO of Naoris Protocol says, ”When the World Economic Forum and the head of INTERPOL state that cybersecurity is in a crisis, it’s time that we change our approach and embrace new technologies like decentralized solutions, that remove the single points of failure [from traditional cybersecurity solutions] with the ability to identify and mitigate threats in real time.”

The Centralized Status Quo

Current cybersecurity is centralized, it configures every device to be a single point of risk to the network it’s connected to. Cybersecurity software lives in a black box controlled by the cybersecurity company, it is opaque and centrally owned and governed.

Cloud services used by companies, institutions and governments are also centralized, so it’s a challenge to trust the service when we cannot see or audit how it operates and performs. Any device is a point of entry for an attacker and any centralised system is vulnerable.

We are only now beginning to spotlight the weaknesses that exist in the current cybersecurity arena. Many organisations are realizing that they are working off outdated cybersecurity models and practices that are no longer fit for purpose, with some systems and processes dating back 40 years.

Today, a professional hacker can breach a system in less than 12 hours, using software that they can buy off the dark web for a few hundred dollars. Hackers are forming cohesive and organised businesses, with their own marketing departments and administrative systems, for the purpose of selling ransomware-as-a-Service (RaaS).

Institutions Are Slow To Move And Are Losing The Battle

We are only now beginning to spotlight the weaknesses that exist in the current cybersecurity arena. Many organizations are realizing that they are working off outdated cybersecurity models and practices that are no longer fit for purpose, with some systems and processes dating back 40 years.

The cybercrime space is as at least as well funded as the cybercrime prevention space – but the criminals are winning. The fight is not against a band of hooded teenagers grappling with existential malaise, cybercrime is a multi-billion-dollar industry run by some of the many brilliant minds on the planet, and often incentivized by malevolent governments.

Despite a global cybersecurity spend of $1.75 trillion in 2022, companies are still losing the battle, not because they are being outsmarted, but because they have been riding horses to tank battle. There needs to be stronger intervention and more innovation in the technology used to fight cybercrime.

According to Microsoft, the average cost of a data breach is touching $4.25 million, and username and password attacks amount to 921 attacks every second, a 74 percent increase in 12 months, from July 2021 to June 2022. Their digital defense teams blocked 34.7 billion identity threats and 37 billion email threats in 2022.

It’s not difficult to understand why so much money is being thrown at the problem. IBM reports current detection time for a reported breach is 280 days on average, it’s little wonder that chief information and risk officers are being kept awake at night.

No company is immune to attack, in 2017 the Equifax hack compromised private data of 50 percent of the US population, Twitter had 200 million records compromised, the U.K’s Royal Mail was shut down due to a Ransomware attack, and 44 universities or colleges and 45 U.S. school districts were hit by ransomware attacks in 2022. The list of companies affected by cyber attacks in 2022 reads like the Top Companies List, it includes San Francisco 49ers, Cisco, Macmillan Publishers and The Red Cross.

Traditional Web2-based cybersecurity configures devices to operate independently of each other and not in harmony, with each device acting by default as a single point of risk (as it is outside the walled security network of an enterprise and a vulnerability for hackers to attack).

This means there is no unifying governance between network devices. In addition, there is no ability to monitor device behavior and trust status, moment to moment. The traditional Web2 “single point of failure” model cannot be trusted.

A New Way To View Cybersecurity

A recent Gartner report identified cybersecurity mesh as a leading trend for 2023, but they stop short of looking at a decentralized mesh that can remove the centralized mesh’s points of failure. While zero trust and cybersecurity mesh strategies offer the flexibility and composability to accommodate moving boundaries and limit attack surfaces, the underlying device architecture is still centralized.

Companies, like Naoris Protocol, are leading the charge with a new approach to technology that transforms centrally managed computer networks with traditionally un-trusted devices and services such as mobiles, servers and laptops. A whole new category of startups in the decentralized cybersecurity space have popped up including Anchore, Dig Security, Project Discovery, and Twingate.

David Holtzman, security advisor & architect of DNS, echoes this new approach, “The rapid ascension of Web 3.0 acknowledges the evolution from centralized to decentralized architecture, including a decentralized cybersecurity mesh. This transition is inevitable for three reasons:

  1. It takes far less resources to attack a network than to defend it,
  2. Centralized security systems provide a single point of vulnerability that, like the Equifax hack, can affect huge amounts of people for the price of a single operation,
  3. Third, a decentralized approach eliminates the requirement for blind faith in a global cybersecurity company as it removes the company itself from being an entry point for hackers, therefore if the company fails the security protocol continues.”

Technological innovation is moving at a pace that few others than innovators and cyber criminals can keep up with. Business and government leaders are slowing understanding that Web3 will not safely scale for society without a dramatic shift in our thinking to decentralized networks, which require decentralized cybsecurity solutions.

Even with little bandwidth, leaders will require greater and a more persistent digital education to better secure our future from cybercrime, or worse, a cyber meltdown.

Read the full article here

ShareTweetSharePinShareShareSend

Related Articles

Cyber fraudsters extort money using recorded cybersex videos in Tamil Nadu- The New Indian Express
Cyber Crime

Cyber fraudsters extort money using recorded cybersex videos in Tamil Nadu- The New Indian Express

Thunder Bay: Joshua MAXWELL Faces Child Pornography Charges
Cyber Crime

Thunder Bay: Joshua MAXWELL Faces Child Pornography Charges

New partnership to harness data networks to tackle cybercrime and food security
Cyber Crime

New partnership to harness data networks to tackle cybercrime and food security

Top Cybercrime Trends Organisations Should Take Note Of In 2023
Cyber Crime

Top Cybercrime Trends Organisations Should Take Note Of In 2023

Cruel new twist on well-known ‘hi mum’ WhatsApp scam revealed
Cyber Crime

Cruel new twist on well-known ‘hi mum’ WhatsApp scam revealed

Need stringent law to curb unlawful Internet behaviour, cyber crime: NHRC
Cyber Crime

Need stringent law to curb unlawful Internet behaviour, cyber crime: NHRC

Cybercrime cops intensify investigation in GRE malpractice case
Cyber Crime

Cybercrime cops intensify investigation in GRE malpractice case

Governments and Business Are Key Partners Against Cybercrime
Cyber Crime

Governments and Business Are Key Partners Against Cybercrime

Kratos Receives Approximate $13 Million Potential Value Electronic Warfare System Single Award Contract
Cyber Crime

ABN AMRO offers large and medium-sized businesses comprehensive protection against cybercrime

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Recommended Stories

Understanding the Implications & Guarding Privacy- Axios Security Group

Understanding the Implications & Guarding Privacy- Axios Security Group

Hackers Actively Using Pupy RAT to Attack Linux Systems

Hackers Actively Using Pupy RAT to Attack Linux Systems

Buckle Up_ BEC and VEC Attacks Target Automotive Industry

Buckle Up_ BEC and VEC Attacks Target Automotive Industry

Chinese Chipmaker Nexperia: Gigabytes of Data Stolen

Chinese Chipmaker Nexperia: Gigabytes of Data Stolen

Popular VPN Software Flaw Let Attackers Crash the Systems

Popular VPN Software Flaw Let Attackers Crash the Systems

The most important cyber news and events of the day

Be the first to know latest important news & events directly to your inbox.

By signing up, I agree to our TOS and Privacy Policy.

Popular Stories

  • Fortinet Vulnerability Exploited To Deploy RMM Tools & Backdoor

    Fortinet Vulnerability Exploited To Deploy RMM Tools & Backdoor

    0 shares
    Share 0 Tweet 0
  • Malware Trends 2024 – Top Malware Families and Types

    0 shares
    Share 0 Tweet 0
  • French Football Club Ticketing System Targeted in Cyber Attack

    0 shares
    Share 0 Tweet 0
  • Singha Durbar server continues to face cyberattacks

    0 shares
    Share 0 Tweet 0
  • Argentina – Global Investigations Review

    0 shares
    Share 0 Tweet 0
Cyber Affairs

Cyber Affairs is your one-stop news website for the latest cyber crime, cyber warfare, and all cyber related news and updates, follow us to get the news that matters to you.

LEARN MORE »

Recent News

  • Understanding the Implications & Guarding Privacy- Axios Security Group
  • Hackers Actively Using Pupy RAT to Attack Linux Systems
  • Buckle Up_ BEC and VEC Attacks Target Automotive Industry

Topics

  • AI
  • Books
  • Careers
  • Cyber Crime
  • Cyber Intelligence
  • Cyber Laws & Regulations
  • Cyber Warfare
  • Digital Diplomacy
  • Digital Influence Mercenaries
  • Electronic Warfare
  • Emerging Technologies
  • Hacktivism
  • ICS-SCADA
  • News
  • Podcast
  • Reports
  • Tech Indexes
  • Uncategorized
  • White Papers

Get Informed

The most important cyber news and events of the day

Be the first to know latest important news & events directly to your inbox.

By signing up, I agree to our TOS and Privacy Policy.

Copyright © 2022 Cyber Affairs. All rights reserved.

No Result
View All Result
  • Home
  • Cyber Crime
  • Cyber Intelligence
  • Cyber Laws & Regulations
  • Cyber Warfare
  • Digital Diplomacy
  • Digital Influence Mercenaries
  • Electronic Warfare
  • Emerging Technologies
  • Hacktivism
  • ICS-SCADA
  • Reports
  • White Papers

Copyright © 2022 Cyber Affairs. All rights reserved.

Welcome Back!

Login to your account below

Forgotten Password? Sign Up

Create New Account!

Fill the forms below to register

All fields are required. Log In

Retrieve your password

Please enter your username or email address to reset your password.

Log In
This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy and Cookie Policy.