The United States\u2019 cybersecurity in both the public and private sectors is at continual risk, according to Director of National Intelligence (DNI) Daniel R. Coats. And the country should expect attacks from both nation state and non-state actors.Furthermore, the \u201cpotential for surprise\u201d will continue to increase as billions more devices are connected to the internet with little or no security, Coats said. He also called out the attacks that occurred on the infrastructure of the Ukraine and Saudi Arabia in 2017 and said such an attack is possible against the U.S. and its allies.Coats shared his thoughts on the state of affairs with respect to threat to the U.S. with the Senate Select Committee on Intelligence (SSCI) on Feb. 13, 2018. The open session saw the leadership of the U.S. intelligence community answering questions from members, which could be answered in an open and unclassified forum. The SSCI\u2019s classified session occurred in the afternoon behind closed doors in the classified information sector of the Capitol building.Nation state cyber threats to the U.S.When it comes to nation states that pose a significant risk to the U.S., the threats have not changed. Russia, China, Iran, and North Korea lead the list. Additionally, three of those states \u2014 Russia, Iran, and North Korea \u2014 \u201care testing more aggressive cyber-attacks.\u201dCoats discussed these specific nation-state threats:Russia \u2013 The intelligence apparatus of Russia will continue to \u201cdisseminate false information\u201d using Russia controlled media and \u201ccovert online personas.\u201d The purpose of the Russian activities will be to generate \u201canti-U.S. political views.\u201d With Ukraine being the primary recipient of enhanced Russian cyber capabilities, the Russians can be expected to enhance and increase their activities with respect to infrastructure and companies which support infrastructure.China \u2013 The global reach of China continues, as does its need to enable domestic industry through acquisition of intellectual property and capability to assist their active foreign and domestic policies. During 2017, most detected cyber operations were focused on cleared defense contractors and companies that supported public and private networks worldwide.Iran \u2013 Coats called out the interest of Iran to penetrate U.S. and allied networks for espionage and to position technology within networks for use in future conflicts. Of particular note is the methodology of penetrating and destroying data, via exfiltrating data, as evidence in the Iranian attacks on Saudi Arabia and Israel.North Korea \u2013 The use of cyber technologies to harvest crypto currencies will continue as a means to collect sorely needed foreign exchange credits. In addition, the North Koreans can be expected to launch a range of offensive weapons to include DDoS, data deletion, and ransomware.Non-state cybersecurity threatsNon-state actors, such as criminals and terrorists, will continue to demonstrate their capacity via cyber operations, which will put at risk the personal identifying information, denial of services and for-profit crimes.Alarmingly, Coats\u2019 prognosis of 2017 continues to apply in 2018, and he says the line between nation state actors and non-nation state actors will blur in 2018.