As the U.S. Department of Defense (DoD) builds up its cyberwarfare programs, what sorts of cyber ops are North Korea and other nation-state adversaries focusing on? Does attribution or admission of responsibility actually act as a deterrent to other would-be cyberattackers?
Cyberwarfare is akin to "a guerrilla warfare domain," where attackers hide behind proxies to maintain a level of plausible and diplomatic deniability.
CODE QUALITY BLOG: As cyberwarfare becomes increasingly part of the norm, many, if not most, military embedded systems are safety- and/or security-critical in nature. To combat this increasing risk, it only makes sense that military systems should be constructed following some of the industry’s most rigorous software development standards to ensure their safe, secure, and functionally accurate operation. Following these standards offers a double benefit. Not only does it reduce safety and security risk, but it also reduces cost. Software development standards improve maintainability, upgradability, reusability, and testability, delivering long-term benefits especially given the typical life span of these systems.