Close Menu
    Facebook X (Twitter) Instagram
    Wifi PortalWifi Portal
    • Blogging
    • SEO & Digital Marketing
    • WiFi / Internet & Networking
    • Cybersecurity
    • Tech Tools & Mobile / Apps
    • Privacy & Online Earning
    Facebook X (Twitter) Instagram
    Wifi PortalWifi Portal
    Home»Cybersecurity»AI is speeding up nation-state cyber programs
    Cybersecurity

    AI is speeding up nation-state cyber programs

    adminBy adminApril 26, 2026No Comments5 Mins Read
    Facebook Twitter LinkedIn Telegram Pinterest Tumblr Reddit WhatsApp Email
    AI is speeding up nation-state cyber programs
    Share
    Facebook Twitter LinkedIn Pinterest Email

    In this Help Net Security interview, Kaja Ciglic, Senior Director, Cybersecurity Policy and Diplomacy at Microsoft, discusses how nation-state cyber programs have changed over three years.

    Cyber has become a core instrument of state power, integrated with military, economic, and diplomatic tools. Ciglic argues that responses like sanctions and indictments need broader strategies, including conditional economic pressure and state accountability for ransomware havens. She addresses NATO’s Article 5 ambiguity around cyber attacks and calls for standing coordination between governments and private sector partners before crises occur.

    nation state cyber programs

    Which nation‑state cyber program has evolved most surprisingly over the past three years, and what does that evolution tell us about broader strategic ambitions?

    Across regions and political systems, state cyber programmes have evolved in three closely related ways.

    First, cyber has moved from a specialist tool to a core instrument of state power, increasingly treated alongside military, economic and diplomatic capabilities. Analyses of recent conflicts show cyber operations being embedded into broader national security strategies and defence planning, particularly around critical infrastructure and societal resilience, not just espionage or disruption.

    Second, the integration of cyber with other instruments of power has deepened. Experience from Ukraine and, more recently, the Middle East demonstrates that cyber operations are now coordinated with kinetic actions, information operations and economic pressure. In these contexts, cyber has been used to prepare the environment, shape perceptions, disrupt logistics and test resilience rather than to deliver decisive, stand‑alone effects.

    Third, automation and AI‑enabled tooling have accelerated operational tempo. Multiple assessments point to state and state‑aligned actors using automation and machine‑assisted techniques to scale reconnaissance, exploit vulnerabilities and conduct influence operations more persistently than before. This evolution has lowered the barrier to sustained activity while increasing pressure on defenders.

    North Korea’s cyber program now functions as a sanctions‑evasion mechanism. Does this blur the line between espionage, warfare, and organised crime?

    Yes, and that blurring is structural. North Korean cyber operations are best understood as a state‑directed criminal enterprise, where revenue generation is a core objective. Cryptocurrency theft, supply‑chain compromise, and illicit IT worker schemes directly fund state priorities. Our existing legal frameworks struggle because they assume clean distinctions between espionage, crime, and armed conflict. In practice, this convergence demands closer coordination between financial regulators, cyber defenders, and national security authorities—responses designed for one domain alone are no longer sufficient.

    After SolarWinds, Colonial Pipeline, and Exchange, policymakers keep reaching for sanctions and indictments. What would a more consequential response architecture look like?

    Responses should seek to be deterrent in nature, proportionate and non-escalatory while imposing sufficient costs to dissuade adversaries going forward.This begins with signaling limits on acceptable behavior and then consistently calling out violations and imposing consequences. Importantly, states should not limit themselves to responding in cyberspace and instead employ response options across economic, diplomatic and regulatory domains as needed. Sanctions and indictments are certainly valuable tools in the consequence toolbox, but they are certainly not the only options.

    When faced with persistent intrusions, for example, consequences should ideally be conditional and reversible, designed to shape behavior. The pressure that can be dialed up or down depending on adversary response. This might include sustained economic or diplomatic measures that remain in place until malicious actors verifiably exit compromised networks or demonstrate restraint over time. This keeps escalation in check while restoring leverage to defenders.

    When it comes to criminal activity that is enabled by adversary states providing safe havens for things like ransomware attacks, consequences should focus on state accountability and not just on the individual actors. In the US, designations of “state sponsors of cybercrime,” similar to state sponsors of terror, could help draw attention to these safe havens and open up new avenues of accountability, prompting states to exercise necessary due diligence.

    As much as these cyberattacks are technological challenges, they are also political ones that will require political solutions. Red lines and consequences as we have in other domains. Deterrence in cyberspace will not come from louder condemnations. It will come from consistent, adaptive, behavior‑based responses that reflect how cyber operations work, and that give states real options short of crisis or conflict.

    NATO’s ambiguity around Article 5 and cyber operations. Is that an asset or a liability?

    Some ambiguity is inevitable, and even useful, in deterrence. But ambiguity without credible thresholds and response pathways can become a liability. Adversaries are highly adept at operating below ill‑defined red lines. From our perspective, the most stabilising approach is to strengthen collective resilience, attribution, and response coordination so that sustained cyber campaigns reliably produce consequences, even if those consequences are diplomatic, economic, or legal.

    If you could redesign one structural feature of how democracies coordinate cyber policy, what would it be, and what stands in the way?

    I would prioritise standing, operational cyber coordination mechanisms that connect governments and trusted private‑sector operators before crises occur—not ad hoc task forces assembled after the fact. We still rely too heavily on informal relationships when speed matters most. The biggest obstacle is trust: legal, cultural, and political hesitation to share sensitive information across borders and sectors. Yet without that trust, democracies will continue to face asymmetry, where defenders must coordinate slowly while adversaries move at machine speed.

    Kaja Ciglic is a speaker at Span Cyber Security Arena 2026 taking place in May. Help Net Security will be on-site, get in touch to book a meeting.

    Cyber NationState Programs Speeding
    Share. Facebook Twitter Pinterest LinkedIn Tumblr Telegram Email
    Previous ArticleMicrosoft to roll out Entra passkeys on Windows in late April
    Next Article AI Overview CTR Fell 61%, But Clicks Didn’t Collapse
    admin
    • Website

    Related Posts

    Microsoft to roll out Entra passkeys on Windows in late April

    April 26, 2026

    Bitwarden NPM Package Hit in Supply Chain Attack

    April 26, 2026

    Beating Automated Exploitation at AI Speed

    April 26, 2026
    Add A Comment
    Leave A Reply Cancel Reply

    Search Blog
    About
    About

    At WifiPortal.tech, we share simple, easy-to-follow guides on cybersecurity, online privacy, and digital opportunities. Our goal is to help everyday users browse safely, protect personal data, and explore smart ways to earn online. Whether you’re new to the digital world or looking to strengthen your online knowledge, our content is here to keep you informed and secure.

    Trending Blogs

    AI Overview CTR Fell 61%, But Clicks Didn’t Collapse

    April 26, 2026

    AI is speeding up nation-state cyber programs

    April 26, 2026

    Microsoft to roll out Entra passkeys on Windows in late April

    April 26, 2026

    Bitwarden NPM Package Hit in Supply Chain Attack

    April 26, 2026
    Categories
    • Blogging (68)
    • Cybersecurity (1,520)
    • Privacy & Online Earning (183)
    • SEO & Digital Marketing (929)
    • Tech Tools & Mobile / Apps (1,796)
    • WiFi / Internet & Networking (246)

    Subscribe to Updates

    Stay updated with the latest tips on cybersecurity, online privacy, and digital opportunities straight to your inbox.

    WifiPortal.tech is a blogging platform focused on cybersecurity, online privacy, and digital opportunities. We share easy-to-follow guides, tips, and resources to help you stay safe online and explore new ways of working in the digital world.

    Our Picks

    AI Overview CTR Fell 61%, But Clicks Didn’t Collapse

    April 26, 2026

    AI is speeding up nation-state cyber programs

    April 26, 2026

    Microsoft to roll out Entra passkeys on Windows in late April

    April 26, 2026
    Most Popular
    • AI Overview CTR Fell 61%, But Clicks Didn’t Collapse
    • AI is speeding up nation-state cyber programs
    • Microsoft to roll out Entra passkeys on Windows in late April
    • Bitwarden NPM Package Hit in Supply Chain Attack
    • Beating Automated Exploitation at AI Speed
    • Ubuntu 26.04 LTS delivers memory-safe system tools and live patching for Arm servers
    • Threat actor uses Microsoft Teams to deploy new “Snow” malware
    • Trump Administration Vows Crackdown on Chinese Companies ‘Exploiting’ AI Models Made in US
    © 2026 WifiPortal.tech. Designed by WifiPortal.tech.
    • Home
    • About Us
    • Contact Us
    • Privacy Policy
    • Terms and Conditions
    • Disclaimer

    Type above and press Enter to search. Press Esc to cancel.