Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Vulnerabilities / Threats

8/13/2019
10:00 AM
Nick Jovanovic
Nick Jovanovic
Commentary
Connect Directly
LinkedIn
Twitter
RSS
E-Mail vvv
50%
50%

History Doesn't Repeat Itself in Cyberspace

The 10th anniversary of the US Cyber Command is an opportunity to prepare for unknowns in the rapidly changing cybersecurity landscape.

Ten years ago, GPS on phones was just becoming available. Self-driving cars were secretly making their way into traffic, and most people hadn't even heard of 3D printing. This was when the US Cyber Command was created to direct and coordinate cyberspace planning and operations to defend and advance national interests with domestic and international partners.

It's an understatement to say things have changed a lot since 2009, especially the cyber landscape. Though the majority of its operations are classified, it's not hard to imagine the Cyber Command has also gone through major changes over the past decade.

Anniversaries are usually an opportunity to reflect on the past and think about the future, but that's tricky to do when most of the Cyber Command's activities are essentially kept from the public's eye. And while history is known to repeat itself, cyberspace — the epitome of constant change — bucks that trend. This secrecy, conflated with the dynamic cyber landscape, makes it difficult to accurately predict what the next decade might bring for the Cyber Command and technology in general. (Seriously, who could've foreseen that a social media platform conceived by a broken-hearted student in a college dorm room would end up being a tool for skewing elections of a world superpower?)  

After a recent (and rare) briefing at its new Joint Operations Center, a modicum of visibility emerged regarding the maturing Cyber Command's new "defend forward" operating philosophy. With publicly announced plans to defend the 2020 elections from foreign interference, along with authorization to operate against overseas adversaries, it's seems likely that the Cyber Command is stepping up its cyber warfare game, as it should. But will investment in its own technology infrastructure be commensurate with risks it faces?  

This 10-year milestone is exactly the right time to contemplate what may be said about the Cyber Command in 2029, and sentiment will hinge on technology decisions it makes in the near term. A decade from now, we'll look back again across the entire cyber landscape to assess the efficacy of the command and many other federal agencies, especially as multicloud complexity increases and threats become increasingly hard to thwart.  

There are clues that point to what the future holds, and at least one thing comes into focus pretty clearly right now: risky behavior taking place in federal agencies across the board is a huge homegrown threat that the Cyber Command (and anyone conducting business online) cannot ignore.

A recent report revealed that digital transformation efforts of federal agencies are putting sensitive government data — your data — at risk. Nearly 70% of respondents in the report admit they're not encrypting the data they're supposed to be protecting. Even as agencies struggle with cloud complexity, the race for digitally transformative technologies is literally pushing security aside. And despite increases in data breaches and regulatory compliance, proper investment in data protection is low for agencies. Without a sea change, 2029 won't mark a happy anniversary.   

Cyber Command's work over the next 10 years will require an increasing level of interoperability of data and data-handling systems between federal agencies — something they've acknowledged. But without the most robust encryption security in place, data fusion that must take place between multiple federal agencies will continue to be risky and potentially expose secrets to adversaries who are also building up their own cyber forces, for good or evil.  

Cyber Command acknowledges it must focus on persistent innovation and rapid change. During opening remarks at a Cyber Subcommittee Hearing last year to review Department of Defense operational readiness, Senator Mike Rounds of South Dakota, a member of the Senate Armed Services Committee and chairman of the Cybersecurity Subcommittee, said cyber readiness issues revolve around several problems including "...the shortage of skilled, cyber-capable personnel" and concerns about being properly equipped with the right tools to respond to operational needs.

At a minimum, these pronouncements show Cyber Command recognizes the clear and present danger of not being prepared in the cyber theater of war. If 60% of federal respondents in the same report say they've been breached (with 35% in the past year alone), and only 30% are properly encrypting data, the wake-up call should be loud and clear: Investment in modern data solutions for modern architectures is critical to national and global security.

Data security professionals, federal or otherwise, face a ticking time bomb and must be constantly vigilant. Everyone — from the intern to the CEO — has data worth stealing and worth protecting. Without support and proper investment, the institutions they protect will remain at risk.

Related Content:

Nick Jovanovic has more than 18 years of experience as a technology expert with familiarity in a broad spectrum of data storage and security technologies. He is currently responsible for leading and growing the Thales CPL U.S. Federal sales team by providing federally ... View Full Bio
Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Navigating Security in the Cloud
Diya Jolly, Chief Product Officer, Okta,  12/4/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
Navigating the Deluge of Security Data
In this Tech Digest, Dark Reading shares the experiences of some top security practitioners as they navigate volumes of security data. We examine some examples of how enterprises can cull this data to find the clues they need.
Flash Poll
Rethinking Enterprise Data Defense
Rethinking Enterprise Data Defense
Frustrated with recurring intrusions and breaches, cybersecurity professionals are questioning some of the industrys conventional wisdom. Heres a look at what theyre thinking about.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-16772
PUBLISHED: 2019-12-07
The serialize-to-js NPM package before version 3.0.1 is vulnerable to Cross-site Scripting (XSS). It does not properly mitigate against unsafe characters in serialized regular expressions. This vulnerability is not affected on Node.js environment since Node.js's implementation of RegExp.prototype.to...
CVE-2019-9464
PUBLISHED: 2019-12-06
In various functions of RecentLocationApps.java, DevicePolicyManagerService.java, and RecognitionService.java, there is an incorrect warning indicating an app accessed the user's location. This could dissolve the trust in the platform's permission system, with no additional execution privileges need...
CVE-2019-2220
PUBLISHED: 2019-12-06
In checkOperation of AppOpsService.java, there is a possible bypass of user interaction requirements due to mishandling application suspend. This could lead to local information disclosure no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVers...
CVE-2019-2221
PUBLISHED: 2019-12-06
In hasActivityInVisibleTask of WindowProcessController.java there�s a possible bypass of user interaction requirements due to incorrect handling of top activities in INITIALIZING state. This could lead to local escalation of privilege with no additional execution privileges need...
CVE-2019-2222
PUBLISHED: 2019-12-06
n ihevcd_parse_slice_data of ihevcd_parse_slice.c, there is a possible out of bounds write due to a missing bounds check. This could lead to remote code execution with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-8.0 Android...