We scan new podcasts and send you the top 5 insights daily.
Adversaries increasingly use cyberspace to attack the foundations of society, government, and the economy. This creates a state of perpetual, low-level conflict—a 'gray zone' between war and peace. These actions test confidence in core systems and undermine international order without triggering a traditional military response.
The concept of World War III as a repeat of WWII is outdated. The current global conflict is already underway, fought not with grand armies but through cyber attacks, economic leverage, proxy wars, and utility grid attacks—cheaper, more resilient forms of warfare.
The Russia-Ukraine conflict demonstrates that the first move in modern warfare is often a cyberattack to disable critical systems like logistics and communication. This is a low-cost, high-impact method to immobilize an adversary before physical engagement.
The next escalation in the Russia-NATO conflict won't be conventional warfare but an expansion of the current "shadow war." This involves asymmetric tactics like cyberattacks, destroying undersea cables, using drones in allied airspace, and funding vandalism of critical infrastructure to divide and destabilize European allies from within.
Just as North Korea evolved from a non-threat to a world-class hacking power targeting financial institutions, Iran's cyber prowess is frequently underestimated by military and intelligence analysts. This creates a recurring strategic blind spot.
The successful drone attack on Amazon data centers highlights a critical vulnerability where cheap physical weapons can disable core digital infrastructure. This scenario, blurring the line between physical and cyber warfare, is not in most corporate threat models.
Cloudflare's CEO observes that powerful nations like Russia avoid direct cyberwar with the US due to a "mutually assured destruction" vulnerability. Instead, they use other global conflicts, such as Israel-Hamas, as cover to launch attacks while disguising their origin, making attribution difficult.
AT&T's CEO frames cybersecurity not as a technical problem but a geopolitical one. For-profit companies are pitted against nation-state actors who have unlimited resources and are not constrained by financial performance, creating a fundamentally asymmetric conflict.
The U.S. approach to cybersecurity is often reactive and hampered by political turnover and short-term thinking. This contrasts sharply with China's patient, long-game strategy of embedding assets and vulnerabilities that may not be activated for years, creating a significant strategic disadvantage for America.
The country that controls the physical internet infrastructure (hardware) can compromise everything running on it. This makes hardware the decisive battlefield in the global technology war, more critical than software-level information operations.
Offensive cyber attacks are dangerous not just because they are asymmetric (low cost, high impact), but because they are 'non-kinetic'. An invisible attack on critical infrastructure is hard to attribute and react to, creating a murky 'cold war' scenario and challenging doctrinal questions about what constitutes an escalation of force.