"It's imperative to develop innovative, sixth-generation defenses"

Check Point Founder and CEO Gil Shwed said at the opening plenary of Cybertech Tel Aviv 2018 that "fifth-generation cyber-attacks excel in identification theft, as well as in targeting cloud services and mobile systems"

Gil Shwed, Founder and CEO of Check Point (Photo: Gilad Kavalerchik)

Gil Shwed, Founder and CEO of Check Point, said at the opening plenary of the Cybertech Tel Aviv conference that "the cyber-attacks of 2018 are fifth-generation attacks, but the defenses are of second- or third-generation. In other words, there is a 10- to 15-year technology lag. How do we cope with this lag? It is imperative to develop innovative, sophisticated, sixth-generation defenses, in order to defeat today's attacks."

Mr. Shwed said that last year saw a rise in cyber-attacks, some targeted the British and German parliaments, banks, factories, etc. Ukraine was almost shut down. There is a good reason why an international survey found that CEOs of large companies see cyber and terrorism at the top of the list of threats.

According to Shwed, cyber-attacks have been developing in several stages. It started with the injection of a virus into a single computer. Then there were internet attacks, malware attacks, server attacks, denial of service attacks, and so on. Current fifth-generation cyber-attacks excel in identification theft, as well as in targeting cloud services and mobile systems.

How can we deal with these threats? According to Mr. Shwed, we need to develop fast, real-time prevention methods. We need to find ways to protect all the components of computers, servers, and cloud services – protect every layer of every system. In his opinion, we should think small: building a vast army of nanotechnologies, small inter-connected measures installed in all layers of defense; developing small software, using artificial intelligence should be used to develop methods for predicting cyber-attacks. "That's what Check Point employees are working on," Shwed said, "and that's the core of sixth-generation cybersecurity."

 

img
Rare-earth elements between the United States of America and the People's Republic of China
The Eastern seas after Afghanistan: the UK and Australia come to the rescue of the United States in a clumsy way
The failure of the great games in Afghanistan from the 19th century to the present day
Russia, Turkey and United Arab Emirates. The intelligence services organize and investigate