- ITDM 2025 전망 | “비전을 품은 기술 투자, 모두가 주춤한 시기에 진가 발휘할 것” 컬리 박성철 본부장
- 최형광 칼럼 | 2025 CES @혁신기술 리터러시
- The Model Context Protocol: Simplifying Building AI apps with Anthropic Claude Desktop and Docker | Docker
- This robot vacuum and mop performs as well as some flagship models - but at half the price
- Finally, a ThinkPad model that checks all the boxes for me as a working professional
CISA Calls For Increased Vigilance One Year After Ukraine’s Russian Invasion
The US Cybersecurity and Infrastructure Security Agency (CISA) warned nations’ defenders yesterday against disruptive and defacement attacks today.
These, the agency said on Thursday, may spur from attempts to sow chaos and societal discord on the anniversary of Russia’s 2022 invasion of Ukraine.
“In response to the heightened geopolitical tensions resulting from Russia’s full-scale invasion of Ukraine, CISA maintains public cybersecurity resources, including Shields Up,” the blog post reads.
According to Zac Warren, chief security advisor of EMEA at Tanium, moving forward, the industry will witness additional cyber activity as a preemptive activity to physical war.
“There were plenty of cyber-attacks coming from Russia to Ukraine and other countries, including NATO,” Warren told Infosecurity in an email.
“This shift makes it critical that we look at critical infrastructure on a global scale, as many countries are when it comes to their cyber-hygiene.”
More generally, Warren said several points in critical infrastructure could be quickly taken out or slowed down by a cyber-attack.
“The conflict in Ukraine demonstrated that cyber is now the starting point for modern warfare, and it’s high time we prepare for the realities of future conflict.”
Phil Neray, VP of cyber defense strategy at CardinalOps, echoed Warren’s point, adding that the reason recent attacks haven’t caused more widespread damage is that Ukraine has considerably improved its continuous security monitoring capabilities in the past few years.
“They also moved their critical data from on-premises servers to the cloud, where it could be better protected,” Neray told Infosecurity in an email.
“Gaining more high-fidelity detections at all security layers (endpoint, network, email, IAM, cloud, etc.) — and moving to the cloud — are the key lessons we can take from the past year.”
The anniversary of the Russian invasion of Ukraine comes days after Google published a report outlining Russia’s cyber strategy in the conflict.