ISA NATIONAL DEFENSE CYBER THREAT REPORT: GOVERNMENT PART 2

  Our Government is Not Cyber-Secure Two weeks ago, the Congressional Budget Office (CBO) confirmed it was suffering an ongoing hack perpetrated by Chinese state-backed agents. The attack potentially exposed CBO’s communications with lawmakers’ offices and access to cost estimates and analysis of legislation—information that could be of significant interest to foreign intelligence services tracking […]

ISA NATIONAL DEFENSE CYBER THREAT REPORT: WATER PART 2

The Navy can’t protect us from these attacks on the water. Chinese military strategists have long emphasized that the most effective way to weaken an adversary is to disrupt its critical infrastructure without firing a shot. The discovery that Volt Typhoon, a Chinese military cyber group, has successfully attacked and compromised access to American water […]

ISA NATIONAL DEFENSE CYBER THREAT REPORT: AGRICULTURE PART 2

  Food is on the Front Line of Nation-State Cyber Attacks   We Are Already Under Attack Agriculture is one of the nation’s most essential and least protected infrastructures. Rapid digitization of precision farming, automated processing, and just-in-time logistics has created an attack surface that has expanded far more quickly than cybersecurity investment. USDA officials […]

ISA NATIONAL DEFENSE CYBER THREAT REPORT: INFORMATION TECHNOLOGY PART 2

The Heart and Soul and Muscle of Cybersecurity: The IT Sector and Its People Before World War II, the United States viewed warfare as occurring in two primary domains: land, overseen by the Army, and sea, managed by the Navy. The attack on Pearl Harbor revealed a third essential domain—the air—forcing the U.S. to rethink […]

What the Venezuelan Operation Illustrates About U.S. Cybersecurity

2026: The Cyber Threat has Changed – Congress Needs to Change Too   The very nature of cyber-attacks has changed dramatically, and the US Congress will need structural reform to keep up with the evolved threat to our national security.   The US action against Venezuela this past weekend was a blended operation, apparently including […]

Cybersecurity Needs to be Treated as a National Defense Issue

WE ARE FIGHTING THE LAST WAR – AND LOSING For more than a decade, the United States has misdiagnosed the nature of the cyber threat. We treated cybersecurity as if it were a primarily consumer protection matter, and in the early days, perhaps it was. Our strategy was mostly geared to directing private companies to […]

ISA NATIONAL DEFENSE CYBER THREAT REPORT: FINANCIAL SERVICES

Cyber Defense in the Financial Sector: Securing the Infrastructure Behind America’s Economic Power   Every U.S. military operation depends on a stable and secure financial infrastructure. Payroll for 2.1 million service members moves through commercial banks. Defense contractors rely on credit markets to fund production. Treasury’s sanctions—the nation’s most effective non-kinetic weapon—require a functioning financial […]

ISA NATIONAL DEFENSE CYBER THREAT REPORT: AGRICULTURE

  Food is on the Front Line of Nation-State Cyber Attacks   We Are Already Under Attack Agriculture is one of the nation’s most essential and least protected infrastructures. Rapid digitization of precision farming, automated processing, and just-in-time logistics has created an attack surface that has expanded far more quickly than cybersecurity investment. USDA officials […]

ISA NATIONAL DEFENSE CYBER THREAT REPORT: THE ELECTRIC GRID

Chinese Hackers Have Infiltrated Our Grid American cybersecurity faces a significant and immediate challenge. Chinese state-sponsored hackers have embedded themselves in our critical electric utility infrastructure—positioning themselves to potentially disrupt both our economy and our operational national defense capability. In November, Politico quoted the Chief Information Security Officer of a major critical infrastructure company, stating, […]

ISA NATIONAL DEFENSE CYBER THREAT REPORT THREE: WATER

The Navy can’t protect us from these attacks on the water. Chinese military strategists have long emphasized that the most effective way to weaken an adversary is to disrupt its critical infrastructure without firing a shot. The discovery that Volt Typhoon, a Chinese military cyber group, has successfully attacked and compromised access to American water […]