Those who don't remember history might just be in the same boat as the rest of us Over the years, I have heard some of the leading thinkers in the intelligence and military fields talk about history, as they often do. They turn and gaze back on the fields in which wars were won and lost, and discuss what caused those victories or defeats.In the 16th century, Sir Walter Raleigh famously said, “He who controls the seas controls the world.” In the 20th century, that saying became, “He who controls the air controls the world,” and now in the 21st century it has become, “He who controls cyberspace controls the world.” The battlefields have changed, but the game remains the same and it’s increasingly difficult to mount an effective defense.Throughout history, alliances have been born that allowed nations with like-minded interests to pool their resources to achieve their goals, whether they sought economic advantage, strategic protection or conquest. Most recently, we learned from the New York Times that the United States and Israel may have collaborated in the development of the Stuxnet worm. Stuxnet was designed to attack Siemens controllers for industrial systems, like those used to run the centrifuges in Iran’s nuclear production facilities. Stuxnet was so successful that experts believe it may have damaged or destroyed more than 900 centrifuges, setting Iran’s nuclear-weapon-production capability back as much as five years.Stay on top of evolving threats with the CSO Daily Dashboard Stuxnet is a beautiful piece of cyberengineering. But it points out a problem all security professionals face: You can’t defend against everything. The United States developed nuclear weapons without the assistance of modern computers. What’s to stop Iran, or any other nation with nuclear ambitions, from going old school? Every weapon used to attack will at some point be vulnerable to countermeasures. Controlling the sea? You probably don’t like torpedoes much. Controlling the air? You could do without surface-to-air missiles. Controlling cyberspace? You get the idea. If Iran were to unplug, its vulnerabilities would decrease.Now reverse that idea: As we focus on defending against the latest and greatest cyberattacks, our adversaries can always go old school. Nowhere is this truer than in cyberspace, where old variants of viruses, worms and Trojans are still floating around 10 years after they appeared. Why is this important? Because as we focus on today’s threats we may forget to protect ourselves from simpler attacks that worked in the past. There’s only so much budget, only so many resources, that any entity can afford to dedicate to defense. This is one of the reasons that security will never, ever be perfect. The abilities of our enemies to develop new, more sophisticated attacks will always outstrip our ability to defend against all threats. Because when we really get good at defending against their new attacks, they can and will go old school and run right through our elaborately designed defenses. While at some point we have to stop worrying about SQL Slammer, we can’t really afford to. Can we? Related content news UK government plans 2,500 new tech recruits by 2025 with focus on cybersecurity New apprenticeships and talent programmes will support recruitment for in-demand roles such as cybersecurity technologists and software developers By Michael Hill Sep 29, 2023 4 mins Education Industry Education Industry Education Industry news UK data regulator orders end to spreadsheet FOI requests after serious data breaches The Information Commissioner’s Office says alternative approaches should be used to publish freedom of information data to mitigate risks to personal information By Michael Hill Sep 29, 2023 3 mins Government Cybercrime Data and Information Security feature Cybersecurity startups to watch for in 2023 These startups are jumping in where most established security vendors have yet to go. By CSO Staff Sep 29, 2023 19 mins CSO and CISO Security news analysis Companies are already feeling the pressure from upcoming US SEC cyber rules New Securities and Exchange Commission cyber incident reporting rules don't kick in until December, but experts say they highlight the need for greater collaboration between CISOs and the C-suite By Cynthia Brumfield Sep 28, 2023 6 mins Regulation Data Breach Financial Services Industry Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe