There are hundreds of attacks happening every second. It’s important to protect your data at every step of the way. Watch this video as Paul helps to understand the 5th domain that exists within technology warfare.

 

 

Utilizing different levels of protection is key, but having just any protections can be just as harmful as having no protection. Knowing how to detect spam sites and what to look for should become second nature. Paying more for a product doesn’t mean you’ve paid for the best.

Don’t let threats stop you. Let ThreatSTOP stop them for you. We offer a variety of products with demo products for you to try. Don’t wait before it’s too late. Get in touch with us today and get protected now.

Get a Demo

 

Learn More:

What DNS Security Does A Typical Enterprise Need?

DNS Defense Cloud 

DNS Defense 

 

Video Transcript

Timestamps

0:00 Intro
0:05 Differences In The 5th Domain

0:05 Differences In The 5th Domain

Another way to look at this is what's different in the fifth domain with regard to the resources that the nation state has to work with?

Ari mentioned that, well gee, we know that the U.S government personnel files were all stolen, so that they can come at me with a bunch of questions where it seems like they must be legitimate because they know details of my background. They know my mother's maiden name for example. That was in the U.S. government database. They can seize networks just as their cell tower intercept technologies that are used in the U.S or in other countries. Well, they can use the same tactics in the warfare out there.

One of the new wrinkles here is that cyber-insurance may not apply to nation-state attacks for much longer. Lloyds of London for example, is debating whether or not they should exclude from their cyber-insurance policy nation-state attacks. Not clear exactly how they're going to tell, not clear exactly whether or not the sort of commercial side of North Korea will be counted or not, but the cyber-insurance that some people use to decide, you know, what their risk profile should be may be changing.

There's attacks against Natural Resources, things that aren't usually done by hackers who just want to make off with your money, and the last thing they want to do is to bring the internet down and stop being able to send a new spam.

They have resources to hire affiliates and they deploy different kinds of attacks. According to Clark, both Russia and China were interested in having the capability to disable U.S. power and turn the lights off. The Russians were concentrating on disabling the U.S. power distribution, you know, those towers and transformers and the other parts of the infrastructure that distribute electric power. The Chinese were taking a different approach. They were looking at how to disable the gas pipelines, which are the the things that supply the energy to the power generation, and if you turn off all the gas pipelines, eventually the generators run out of gas. It's not like the good old days when you could pile coal up in your back yard. You can't save, you can't keep more than a little bit of reserve for natural gas, and so the pipelines have to keep running if you want the power to stay on.

So that's another kind of difference. There's quite a larger array of resources that these adversaries bring to the battle.