While the threat of militarized terrorism is important to monitor (i.e. lone wolves and sleeper cells), the larger threats to the civilized world continue to be attacks on global infrastructure, connected devices, command and control systems, SCADA, etc. We would be remiss if we do not continue to harden our defenses and teach our citizens how to protect themselves. ~GhostSecGroup
The Target is the Economy, Which Depends on Technology
In military parlance, a vulnerability that, when properly exploited, decides a conflict is called a Center of Gravity. With the ever further increasing inter-operability of every military unit, from a tank battalion to a carrier strike group and upwards, becoming a reality, IT-based command and control systems are perhaps the closest incarnation of a perfect Center of Gravity that ever existed. Given the world’s (and especially the West’s) rapidly increasing dependence on IT for its organizations to function, cyber operations move from the fringes to the very center of future warfare.
Read the full article here: Asynchronous Warfare part 3: How Conventional Strategies and Tactics Are Applied to Cyberwarfare – Security Boulevard