To cure their woes, the bug bounty industry should look no further than risk pooling. To cure their woes, the bug bounty industry should look no further than risk pooling. (Photo: Shutterstock)

As the political climate heats up, so does the new era for cyberwarfare. In recent history, nation states supplemented military conflict with attacks on digital infrastructure to either gather intelligence or cause outages, but now with their high impact and versatile usage, there is more reason to include cyber attacks not only before, but during and after conflicts. Actually, there is no reason to stop. In order to maximize effectiveness, cyber attackers target not only government-owned equipment, but banks, transport and infrastructure to cause damage. Securing one set of systems is already a challenge, and now we have a problem of securing an entire nation's systems.

Want to continue reading?
Become a Free PropertyCasualty360 Digital Reader

  • All PropertyCasualty360.com news coverage, best practices, and in-depth analysis.
  • Educational webcasts, resources from industry leaders, and informative newsletters.
  • Other award-winning websites including BenefitsPRO.com and ThinkAdvisor.com.
NOT FOR REPRINT

© 2024 ALM Global, LLC, All Rights Reserved. Request academic re-use from www.copyright.com. All other uses, submit a request to [email protected]. For more information visit Asset & Logo Licensing.