Will Cybersecurity Ever End? Come to a Conclusion?

Risks Evolve over time
Vulnerabilities evolve over time as threat grows
Example: Wannacry ransomware campaign


Short answer is NO!   Since risks evolve -risks and vulnerabilities are always changing!

Even if one could solve all the current vulnerabilities and install the updates everywhere to all of your software and hardware, there would still be new vulnerabilities found in the future at an unknown time, which make the environment less safe.

Even if you could wish all the misconfigurations to be solved, and all problems to be fixed, there will be some items that have not been thought of yet, and in the future there will be a Cybersecurity issue.

For example if a new computer is developed that would make cryptology obsolete then all cryptographic software would have to be replaced, as now you are no longer in PCI compliance.

There are many things happening at once –

The attackers are looking for new vulnerabilities.  (OFFENSE)

The landscape is changing as software becomes obsolete, or an incorrect configuration makes a system more likely to be attacked. (ON DEFENSE)

let’s spend a little time on China as an attacker – why? is always a question. and increasingly the answer is the following:

Casey  Fleming states: the Chinese Communist Party has many Intellectual Property(IP) Transfer centers to move the IP   into a Chinese company to effect the following strategy:  Rob, Replicate, and Replace.  First steal all you can, then create a way to replicate the IP by giving to entities that can take advantage of this IP. Replace comes into being by then literally replacing the original IP products using a Chinese company. So now the original company products are no longer needed.

And Chinese Communist Party is willing to steal everything it can.

I.e. if you are leaving doors open into your IT environment the Chinese will find a way in.

The above video is the epoch Times giving an interview to Chairman and CEO of Invictus Wargame : Casey Fleming, even if you think this is a controversial topic – one has to review the cybersecurity angle to it.

Leave a Comment

This site uses Akismet to reduce spam. Learn how your comment data is processed.