www.infosecurity-magazine.com Open in urlscan Pro
18.66.248.104  Public Scan

Submitted URL: http://url9274.cyberheistnews.com/ls/click?upn=Uamt9mHsVnKn91os22RmxCneKisS7BVeyAQcu7ixjIruk-2BXudUDocb7MoVgfs0tzVgt3-2BJLNHUVXIgT...
Effective URL: https://www.infosecurity-magazine.com/news/microsoft-cyberspace-domain-warfare/
Submission: On May 24 via api from US — Scanned from DE

Form analysis 2 forms found in the DOM

<form class="gsc-search-box gsc-search-box-tools" accept-charset="utf-8">
  <table cellspacing="0" cellpadding="0" class="gsc-search-box">
    <tbody>
      <tr>
        <td class="gsc-input">
          <div class="gsc-input-box" id="gsc-iw-id1">
            <table cellspacing="0" cellpadding="0" id="gs_id50" class="gstl_50 gsc-input" style="width: 100%; padding: 0px;">
              <tbody>
                <tr>
                  <td id="gs_tti50" class="gsib_a"><input autocomplete="off" type="text" size="10" class="gsc-input" name="search" title="search" id="gsc-i-id1" dir="ltr" spellcheck="false"
                      style="width: 100%; padding: 0px; border: none; margin: 0px; height: auto; background: url(&quot;https://www.google.com/cse/static/images/1x/en/branding.png&quot;) left center no-repeat rgb(255, 255, 255); outline: none;"></td>
                  <td class="gsib_b">
                    <div class="gsst_b" id="gs_st50" dir="ltr"><a class="gsst_a" href="javascript:void(0)" title="Clear search box" role="button" style="display: none;"><span class="gscb_a" id="gs_cb50" aria-hidden="true">×</span></a></div>
                  </td>
                </tr>
              </tbody>
            </table>
          </div>
        </td>
        <td class="gsc-search-button"><button class="gsc-search-button gsc-search-button-v2"><svg width="13" height="13" viewBox="0 0 13 13">
              <title>search</title>
              <path
                d="m4.8495 7.8226c0.82666 0 1.5262-0.29146 2.0985-0.87438 0.57232-0.58292 0.86378-1.2877 0.87438-2.1144 0.010599-0.82666-0.28086-1.5262-0.87438-2.0985-0.59352-0.57232-1.293-0.86378-2.0985-0.87438-0.8055-0.010599-1.5103 0.28086-2.1144 0.87438-0.60414 0.59352-0.8956 1.293-0.87438 2.0985 0.021197 0.8055 0.31266 1.5103 0.87438 2.1144 0.56172 0.60414 1.2665 0.8956 2.1144 0.87438zm4.4695 0.2115 3.681 3.6819-1.259 1.284-3.6817-3.7 0.0019784-0.69479-0.090043-0.098846c-0.87973 0.76087-1.92 1.1413-3.1207 1.1413-1.3553 0-2.5025-0.46363-3.4417-1.3909s-1.4088-2.0686-1.4088-3.4239c0-1.3553 0.4696-2.4966 1.4088-3.4239 0.9392-0.92727 2.0864-1.3969 3.4417-1.4088 1.3553-0.011889 2.4906 0.45771 3.406 1.4088 0.9154 0.95107 1.379 2.0924 1.3909 3.4239 0 1.2126-0.38043 2.2588-1.1413 3.1385l0.098834 0.090049z">
              </path>
            </svg></button></td>
        <td class="gsc-clear-button">
          <div class="gsc-clear-button" title="clear results">&nbsp;</div>
        </td>
      </tr>
    </tbody>
  </table>
</form>

<form class="gsc-search-box gsc-search-box-tools" accept-charset="utf-8">
  <table cellspacing="0" cellpadding="0" class="gsc-search-box">
    <tbody>
      <tr>
        <td class="gsc-input">
          <div class="gsc-input-box" id="gsc-iw-id2">
            <table cellspacing="0" cellpadding="0" id="gs_id51" class="gstl_51 gsc-input" style="width: 100%; padding: 0px;">
              <tbody>
                <tr>
                  <td id="gs_tti51" class="gsib_a"><input autocomplete="off" type="text" size="10" class="gsc-input" name="search" title="search" id="gsc-i-id2" dir="ltr" spellcheck="false"
                      style="width: 100%; padding: 0px; border: none; margin: 0px; height: auto; background: url(&quot;https://www.google.com/cse/static/images/1x/en/branding.png&quot;) left center no-repeat rgb(255, 255, 255); outline: none;"></td>
                  <td class="gsib_b">
                    <div class="gsst_b" id="gs_st51" dir="ltr"><a class="gsst_a" href="javascript:void(0)" title="Clear search box" role="button" style="display: none;"><span class="gscb_a" id="gs_cb51" aria-hidden="true">×</span></a></div>
                  </td>
                </tr>
              </tbody>
            </table>
          </div>
        </td>
        <td class="gsc-search-button"><button class="gsc-search-button gsc-search-button-v2"><svg width="13" height="13" viewBox="0 0 13 13">
              <title>search</title>
              <path
                d="m4.8495 7.8226c0.82666 0 1.5262-0.29146 2.0985-0.87438 0.57232-0.58292 0.86378-1.2877 0.87438-2.1144 0.010599-0.82666-0.28086-1.5262-0.87438-2.0985-0.59352-0.57232-1.293-0.86378-2.0985-0.87438-0.8055-0.010599-1.5103 0.28086-2.1144 0.87438-0.60414 0.59352-0.8956 1.293-0.87438 2.0985 0.021197 0.8055 0.31266 1.5103 0.87438 2.1144 0.56172 0.60414 1.2665 0.8956 2.1144 0.87438zm4.4695 0.2115 3.681 3.6819-1.259 1.284-3.6817-3.7 0.0019784-0.69479-0.090043-0.098846c-0.87973 0.76087-1.92 1.1413-3.1207 1.1413-1.3553 0-2.5025-0.46363-3.4417-1.3909s-1.4088-2.0686-1.4088-3.4239c0-1.3553 0.4696-2.4966 1.4088-3.4239 0.9392-0.92727 2.0864-1.3969 3.4417-1.4088 1.3553-0.011889 2.4906 0.45771 3.406 1.4088 0.9154 0.95107 1.379 2.0924 1.3909 3.4239 0 1.2126-0.38043 2.2588-1.1413 3.1385l0.098834 0.090049z">
              </path>
            </svg></button></td>
        <td class="gsc-clear-button">
          <div class="gsc-clear-button" title="clear results">&nbsp;</div>
        </td>
      </tr>
    </tbody>
  </table>
</form>

Text Content

Infosecurity Group Websites
 * 
 * Magazine
 * Events
   * Infosecurity Europe
   * Infosecurity Leadership Summit
   * Infosecurity Magazine Events
   * Infosecurity North America
   * Infosecurity Netherlands
   * Infosecurity Belgium
   * Infosecurity Russia
   * Infosecurity Mexico
   * Infosecurity Middle East
 * Insight
   * Infosecurity Webinars
   * Infosecurity Whitepapers
   * Infosecurity Online Summits

 * Log In
 * Sign Up

 * ×
   
   search
    

 * News
 * Magazine Features
 * Opinions
 * News Features
 * Interviews
 * Editorial
 * Blogs
 * Reviews
 * Slackspace
 * Next-Gen Infosec
 * Webinars
 * White Papers
 * Podcasts
 * Industry Events & Training
 * Magazine Events
 * Online Summits
 * Company Directory

 * Application Security
 * Automation
 * Big Data
 * Business Continuity
 * Cloud Security
 * Compliance
 * Cybercrime
 * Data Protection
 * Digital Forensics
 * Encryption
 * Human Factor
 * Identity Access Management
 * Industry Announcements
 * Internet Security
 * Malware
 * Managed Services
 * Mobile Security
 * Network Security
 * Payment Security
 * Physical and Information Security Convergence
 * Privacy
 * Risk Management
 * The Internet of Things
 * Infosec Blog

 * Log In
 * Sign Up


Latest
 * Senate Report: US Government Lacks Comprehensive Data on Ransomware
 * Ransomware Attacks Increasing at "Alarming" Rate
 * What Does Zero Trust Mean for MSPs?
 * Cabinet Office Reports 800 Missing Electronic Devices in Three Years
 * US Car Giant General Motors Hit by Cyber-Attack Exposing Car Owners' Personal
   Info



 *  
 * News
 * Topics
 * Features
 * Webinars
 * White Papers
 * Podcasts
 * Events & Conferences
 * Directory
 * Search
   * ×
     
     search
      


Infosecurity Magazine Home » News » Microsoft President: Cyber Space Has Become
the New Domain of Warfare
19 May 2022 News


MICROSOFT PRESIDENT: CYBER SPACE HAS BECOME THE NEW DOMAIN OF WARFARE

JAMES COKER REPORTER, INFOSECURITY MAGAZINE

 * Follow @ReporterCoker



The conflict in Ukraine has shown that warfare has entered its “fourth plane” –
cyber space, according to Microsoft’s President Brad Smith, speaking
during Microsoft Envision in London, UK, today.

He argued that Russia’s invasion of Ukraine marks a significant shift in how
warfare is conducted. This follows previous eras, in which land, sea, and air
were prominent arenas. Smith noted that we are approaching the three-month point
of the Russia-Ukraine conflict, “the world’s first major hybrid war.”

Smith pointed out this is a phenomenon Microsoft has already considered. For
example, in calling for a Digital Geneva Convention to “obligate governments to
protect civilians in times of peace as well as war. It also helped set up
the Cybersecurity Tech Accord, which involves 150 companies from 29 countries
around the world. This “brought us together to think about the principles for
which we would stand as we saw a proliferation of weapons moving into cyber
space.”

However, he expressed surprise that he would be discussing these principles in
the context of a “significant, major war” so soon after. 

Smith then set out three major tech roles Microsoft has focused on concerning
the Russia-Ukraine conflict:


SUSTAINING A GOVERNMENT

He highlighted that the UK government had to move its communications underground
in World War Two. “Technology changed where communication needed to live,” he
stated. Something similar has happened in respect of the Ukrainian government,
except this time, “communications have moved to the cloud.”

Smith said that even one week before the invasion began, the Ukrainian
government ran entirely on-premise. It realized this was dangerous, and
Microsoft helped the government very quickly move to the cloud, in addition to
other parts of the country’s economy. “We recognized that we needed in this case
not just to move their data and infrastructure to the cloud, but in some
instances to move it to the cloud outside Ukraine.” He added: “The best way to
protect a country in time of war is to make sure its continuity by dispersing
its digital assets.”


DEFENDING A NATION

Smith emphasized that the first shots of the war were not fired on February 24,
when the invasion began, but before then, “where the first “shells” were
actually fired in cyber space.” The first weapon was malware called FoxBlade,
which simultaneously attacked more than 300 targets across the Ukrainian
government and critical industries. This attack showed that in warfare,
“distances have shrunk, and speeds accelerated.” He added that “cyber weapons
today can go halfway around the world at the speed of light – far faster than
any hypersonic weapon.”

> “Cyber weapons today can go halfway around the world at the speed of light –
> far faster than any hypersonic weapon.”

Microsoft threat intelligence personnel are at the frontline of these threats,
stated Smith. They have observed that Russian cyber-attacks have been
“incredibly sophisticated,” delivered in a very coordinated way from seven
different units in three different parts of the Russian government. Unlike
the NotPetya attacks in 2017, which spilled over to organizations worldwide,
these are “precisely targeted,” designed to penetrate a domain and only affect
computers within that domain.

He noted that the nature of cyber-attacks evolved from the start of the conflict
when techniques like DDoS and website defacement were prevalent. As the war
continued, Russia used a combination of cyber and kinetic attacks. For example,
in early March, in the space of a couple of days, Russia went from taking down a
network in a nuclear powerplant to attacking that powerplant. “We’re seeing in
real-time the evolution of this hybrid war,” Smith explained.

This trend demonstrates the importance of “rapid defense.” Smith said Microsoft
has worked to quickly send information about attacks they see “to the people who
can stop them.” This first line of defense is often ordinary people working in a
business, like network administrators or CIOs. “We have to find them any way we
can,” he outlined.

In the same way that radar enabled Britain to quickly respond to enemy bombers
during World War Two, Smith commented that detection and security are critical
to defending Ukraine’s government and critical infrastructure from
cyber-attacks.

Smith also highlighted the role of disinformation in the conflict, which “is
part of an integrated operation that is being done to support Russian military
aims in Ukraine on a global basis.” Therefore, “we are going to need to develop
the offensive capabilities to combat this kind of cyber-attack in the same way
that we combat others.”


PROTECTING PEOPLE

The role of protecting innocent civilians at this time “is the most fundamental
for all of us,” said Smith. Most fundamentally, this involves ensuring there is
accountability for war crimes contraventions during the war, such as shelling
hospitals. Tech has a huge role in gathering the evidence required to prosecute
perpetrators, particularly in “collecting, preserving and analyzing data related
to war crimes investigations.”

He revealed that using Satellite imagery, Microsoft had developed an AI
algorithm “that can identify each day hospital, school and water tower being
attacked, damaged or destroyed.”

Smith added that it is important “to use all of the tools that we have to try to
protect people, and it’s important to ensure that we create the foundation to do
what was done after World War Two at Nuremberg.”

Recommended for you
Women In Cybersecurity Net...
www.infosecurity-magazine.com
Executive Breakfast: Creati...
www.infosecurity-magazine.com
Top Ten Ways to Reduce Your Digit...
www.infosecurity-magazine.com
(ISC)2 Offers 100,000 Free Entr...
www.infosecurity-magazine.com

AddThis


Related to This Story
 * Microsoft: 1000+ Hackers Worked on SolarWinds Campaign
 * Microsoft: Russia Has Launched Hundreds of Cyber Operations in Ukraine
 * Microsoft: Nearly All Russian State Actors Now Targeting Ukraine
 * Top 10: Cybersecurity Lessons CISOs Should Take from the Russia-Ukraine
   Conflict
 * Western Intelligence Blames Russia for Europe-Wide Cyber-Attack


WHAT’S HOT ON INFOSECURITY MAGAZINE?

 * Read
 * Shared
 * Watched
 * Editor's Choice

1
8 Jul 2021 News


NEW PRINTNIGHTMARE PATCH CAN BE BYPASSED, SAY RESEARCHERS


2
8 Jul 2021 News


CYBERCRIME COSTS ORGANIZATIONS NEARLY $1.79 MILLION PER MINUTE


3
8 Jul 2021 News


CTOS KEEPING QUIET ON BREACHES TO AVOID CYBER BLAME GAME


4
7 Jul 2021 News


OVER 170 SCAM CRYPTOMINING APPS CHARGE FOR NON-EXISTENT SERVICES


5
7 Jul 2021 News


MOST INSIDER DATA BREACHES AREN'T MALICIOUS


6
7 Jul 2021 News


KREMLIN HACKERS REPORTEDLY BREACHED REPUBLICAN NATIONAL COMMITTEE



1
24 May 2022 News


SENATE REPORT: US GOVERNMENT LACKS COMPREHENSIVE DATA ON RANSOMWARE


2
24 May 2022 News


RANSOMWARE ATTACKS INCREASING AT "ALARMING" RATE


3
24 May 2022 Blog


WHAT DOES ZERO TRUST MEAN FOR MSPS?


4
24 May 2022 News


CABINET OFFICE REPORTS 800 MISSING ELECTRONIC DEVICES IN THREE YEARS


5
24 May 2022 News


US CAR GIANT GENERAL MOTORS HIT BY CYBER-ATTACK EXPOSING CAR OWNERS' PERSONAL
INFO


6
24 May 2022 News


ICO FINES CLEARVIEW AI £7.5M FOR COLLECTING UK CITIZENS’ DATA



1
8 Jul 2021 Webinar


OVERCOMING 'SHADOW IT' NEED AND RISK


2
23 Sep 2021 Webinar


HOW TO RETHINK END-USER PROTECTION AND ELIMINATE PHISHING AND RANSOMWARE


3
21 Oct 2021 Webinar


MACHINE ID MANAGEMENT AND DIGITAL TRANSFORMATION: BUILDING A SECURE FUTURE


4
16 Sep 2021 Webinar


NEW STRATEGIES FOR MANAGING MACHINE IDENTITIES


5
7 Oct 2021 Webinar


THIRD-PARTY VULNERABILITIES: DEMYSTIFYING THE UNKNOWN


6
24 Jun 2021 Webinar


DEFINING THE ZERO TRUST AND SASE RELATIONSHIP



1
14 Feb 2022 Digital Edition


INFOSECURITY MAGAZINE, DIGITAL EDITION, Q1, 2022, VOLUME 19, ISSUE 1


2
24 Feb 2022 Webinar


HACKERS ARE STRIKING GOLD WITH YOUR EMPLOYEES' PII


3
3 Feb 2022 Podcast


INTOSECURITY CHATS, EPISODE 8: BRIAN HONAN, BROUGHT TO YOU BY HP


4
14 Feb 2022 News Feature


AS NATION-STATE AND CYBERCRIME THREATS CONFLATE, SHOULD CISOS BE WORRIED?


5
14 Feb 2022 Editorial


EDITORIAL: ONLY THE GOOD DIE YOUNG (Q1 2022 ISSUE)


6
17 Mar 2022 Webinar


THE JOURNEY BEYOND THE ENDPOINT




 * The Magazine
 * About Infosecurity
 * Subscription
 * Meet the Team
 * Contact Us
 * Cookies Settings

 * Advertisers
 * Media Pack

 * Contributors
 * Forward Features
 * Op-ed
 * Next-Gen Submission

 * Copyright © 2022 Reed Exhibitions Ltd.
 * Terms and Conditions
 * Privacy Policy
 * Intellectual property statement
 * Cookie Policy
 * Sitemap
 * 

Please wait…









COOKIE PREFERENCE CENTRE

We process your information, to deliver content or advertisements and measure
the delivery of such content or advertisements, extract insights, and generate
reports to understand service usage; and/or accessing or storing information on
devices for that purpose.

You can choose not to allow some types of cookies. However, blocking some types
of cookies may impact your experience of the site and the services we are able
to offer. Click on the different category headings to find out more, to change
our default settings, and/or view the list of Google Ad-Tech Vendors.


Cookie Policy



MANAGE CONSENT PREFERENCES

STRICTLY NECESSARY COOKIES

Always Active
Strictly Necessary Cookies

These cookies are necessary for the website to function and cannot be switched
off in our systems. They are usually only set in response to actions made by you
which amount to a request for services, such as setting your privacy
preferences, logging in or filling in forms. You can set your browser to block
or alert you about these cookies, but some parts of the site will not then work.
These cookies do not store any personally identifiable information.



Cookies Details‎

PERFORMANCE COOKIES

Performance Cookies

These cookies allow us to count visits and traffic sources so we can measure and
improve the performance of our site. They help us to know which pages are the
most and least popular and see how visitors move around the site.

Cookies Details‎

FUNCTIONAL COOKIES

Functional Cookies

These cookies enable the website to provide enhanced functionality and
personalisation. They may be set by us or by third party providers whose
services we have added to our pages. If you do not allow these cookies then some
or all of these services may not function properly.

Cookies Details‎

TARGETING COOKIES

Targeting Cookies

These cookies may be set through our site by our advertising partners. They may
be used by those companies to build a profile of your interests and show you
relevant adverts on other sites. If you do not allow these cookies, you will
experience less targeted advertising.

Cookies Details‎

UNCATEGORISED COOKIES

Uncategorised cookies

Uncategorised cookies are cookies that we are in the process of classifying,
together with the providers of individual cookies.

Cookies Details‎
Confirm My Choices

Back Button

Back


PERFORMANCE COOKIES



Vendor Search Search Icon Filter Icon


Clear Filters

Information storage and access
Apply
Consent Leg.Interest

All Consent Allowed

Select All Vendors
Select All Vendors
All Consent Allowed

 * HOST DESCRIPTION
   
   View Cookies
   
   REPLACE-WITH-DYANMIC-HOST-ID
    * Name
      cookie name

Confirm My Choices


We use cookies to analyse and improve our service, to improve and personalise
content, advertising and your digital experience. We also share information
about your use of our site with our social media, advertising and analytics
partners. Cookie Policy

Accept All Cookies
Cookies Settings