Los Angles Wire

collapse
Home / Daily News Analysis / Government Can’t Win the Cyber War Without the Private Sector

Government Can’t Win the Cyber War Without the Private Sector

Apr 19, 2026  Twila Rosenbaum  15 views
Government Can’t Win the Cyber War Without the Private Sector

Cybersecurity is increasingly characterized by a relentless battle between attackers and defenders. For too long, government entities have attempted to safeguard their digital domains in isolation, often facing minimal resistance from attackers who target public-sector systems, leading to attacks with significant national repercussions. Despite existing regulations aimed at establishing foundational security controls, the reality is that the threat landscape continues to expand, making it clear that governments alone cannot adequately defend against the growing cyber threats.

The digital infrastructure that governments strive to protect is primarily a creation of private enterprises. This reality highlights the limitations of government capabilities and underscores the urgent need for enhanced collaboration with the private sector.

In this context, a shift towards a more collaborative approach is essential for developing an effective risk management strategy that integrates both defensive and offensive measures.

Escalating Complexity and Scale of Cyber Threats

Modern cyberattacks have reached unprecedented levels of frequency, scale, and sophistication. These attacks do not rely on a single point of entry. Research from Palo Alto Networks indicates that 87% of intrusions observed in over 750 incident response cases targeted multiple attack surfaces, including endpoints, networks, cloud infrastructure, SaaS applications, and identity systems. Attackers can navigate through various access points within a singular campaign, making it insufficient to secure just one layer of defense.

Expanding Attack Surface Driven by Daily Dependencies

Historically, the attack surface was focused primarily on an organization's operational perimeter. However, today’s cyber threats extend beyond these boundaries to encompass all functional aspects of organizations, including cloud services, APIs, and third-party vendors. This reliance on external entities significantly broadens the attack surface, providing cybercriminals with more opportunities for exploitation. For instance, a breach involving a remote support tool allowed attackers to infiltrate multiple offices within the U.S. Treasury Department, illustrating how third-party access can serve as a vulnerable entry point.

Private Sector Control Over Technology Ownership

In the past, major technological advancements often resulted from government-funded research, leading to innovations such as the Internet and GPS. However, the landscape has shifted, and private companies now lead the charge in driving technological progress. This shift means that critical digital infrastructure is predominantly developed and managed by private entities, which limits the government’s ability to control and secure all operational aspects. Consequently, there is an urgent need for government entities to partner with the private sector to protect the vital infrastructure upon which the nation relies.

The Industrial Nature of Cybercrime

Cybercrime has evolved into a sophisticated industry characterized by specialization, diverse services, and established methodologies. This decentralized nature means that dismantling one criminal group does little to curtail overall cyber threats; other groups quickly emerge to fill the void. The motivations for cybercrime remain robust, as evidenced by the $17 billion generated from crypto scams last year, driven largely by a staggering 1,400% increase in impersonation schemes. A notable incident was the ransomware attack on OnSolve CodeRED, which disrupted critical emergency notification systems used by law enforcement and public agencies.

Given the persistent nature of cybercrime, a comprehensive and coordinated response that targets the entire criminal ecosystem—including hosting services and money laundering channels—is essential. A more aggressive offensive strategy is necessary rather than merely reacting to individual incidents.

Geopolitical Dimensions of Cybercrime

State-sponsored cybercrime has become an established method for espionage and strategic disruption. Nation-state actors not only possess advanced capabilities but also have extensive reach, utilizing global platforms and third-party infrastructures. Organizations are increasingly recognizing the importance of accounting for geopolitically motivated cyber threats in their risk mitigation strategies, with 64% of organizations doing so.

A purely national approach to cyber defense is no longer viable. Effective national cyber strategies must involve collaboration with private-sector partners to manage essential visibility and control points across borders.

The Role of AI in Cybersecurity

Artificial Intelligence (AI) is significantly accelerating the pace of cyberattacks, with attack timelines decreasing by approximately 100 times. Intrusions that previously took days to materialize can now occur in mere minutes. Data breaches are increasingly common within the first hour of an attack, prompting organizations to rapidly deploy AI systems and integrate new models, which in turn expands the attack surface further. Traditional security measures are ill-equipped to handle this rapid evolution, highlighting the need for improved public-private coordination. This includes faster dissemination of threat intelligence, development of secure AI patterns, and governance alignment across sectors.

Moving forward, the focus must shift towards establishing a shared defense framework that operates at the speed of adversaries. While governments can set accountability standards, true resilience will only be achieved through enhanced collaboration with the private sector, expedited inter-agency information sharing, secure AI design, and joint efforts to disrupt criminal infrastructures across borders.


Source: SecurityWeek News


Share:

Your experience on this site will be improved by allowing cookies Cookie Policy