Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecurityManagementSecurity NewswireSecurity Leadership and ManagementLogical SecuritySecurity & Business ResilienceCybersecurity NewsGovernment: Federal, State and Local

DHS memo warns of potential Russian cyberattack

Cyber attack
January 28, 2022

According to a Department of Homeland Security (DHS) intelligence memo sent to law enforcement around the United States, DHS ranks the risk of a cyberattack on U.S. organizations by Russia as remaining "very high."

Tensions between Russia and the Ukraine have risen, with a cyberattack on multiple Ukrainian governmental websites and an increase of Russian troops at the border since the start of 2022. The DHS memo warned law enforcement officials of a possible Russian cyberattack on U.S. organizations if the situation continues to escalate.

Security leaders with military and cyber expertise weigh in on the warning below:

Jeff Engle, Chairman and President of Conquest Cyber

There are real geopolitical implications when the private industry and government organizations that support national critical functions lack cyber resiliency. The United States’ dominant worldwide stance relies upon our ability to project power, support our allies and deter threats on a global scale. Our literal geographic position in the world, powerful navy and innovative populace has given us a historical advantage.

Cyber erodes that dominant position. Our decentralization and distribution of national critical functions helps spur innovation, but without cyber resiliency, it can also become the source of our greatest weakness. Now, we are seeing what was inevitable. Our options are being limited not by the reality of debilitating cyberattacks but the real threat that they are not only possible — they are likely already present and awaiting the "go ahead."

Colonel Barry Hensley, (USA, Ret.), SVP and Chief Threat Intelligence Officer at Secureworks

We have recently seen the rising geopolitical tensions between Ukraine and Russia appear to result in a combination of cyberattacks including website defacement, DDoS attacks and use of a malicious software called WhisperGate to sabotage or wipe critical data. We know that this is currently not another version of NotPetya. But with the recent statement issued by the U.S. Department of Homeland Security, we understand that heightened focus on these attacks can make organizations wonder if they are at risk from further escalation of the situation between Russia and the Ukraine.

I think tensions will heighten — and depending on U.S./North Atlantic Treaty Organization (NATO) and Russian actions and reactions — this has the potential to reach beyond just the Ukraine, even if by collateral damage. It is a good time to assess where your partners and suppliers have a presence geographically, as you may have an inherited risk you may not have been aware of or may not have concerned you previously. Organizations with operations in the Ukraine should be extra vigilant and review their business continuity and resilience plans. The keys we would recommend focusing on would be first, maintaining current backups of business-critical systems and data — and ensuring that backups cannot be impacted by ransomware-style or wiper malware attacks and that they are tested for functionality. Backups that do not work as designed are not of any use. Secondly, we would recommend preparations for continuity of operations in the case of power disruptions or the loss of other business-critical services. We have recommended to our clients who have reached out that they monitor, segment networks and block known threat indicators — we are able to help organizations who don’t have a security partner and need help identifying a course of action in this area.

It is always good to remember that opinions will vary widely, depending on where in the world you sit. There will be both pro-Russian and pro-Ukraine sentiment running very high in that region, and it is especially important for companies and organizations to refrain from public commentary about either, lest you draw the ire of nation-state or activist groups that wish to make a statement by attacking you in response.

KEYWORDS: cyber attack cyber security threat Department of Homeland Security enterprise cyber security nation-state attack Russian hacking

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Cyber tech background

    Security’s Top Cybersecurity Leaders 2026

    Security magazine’s Top Cybersecurity Leaders 2026 award...
    Cybersecurity
  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Security Education & Training
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Popular Stories

Man on laptop

Healthcare Executives Face a New Era of Personal Risk

Man walking with briefcase

The Rising Tide of Executive Protection: Corporations Ramp Up Security in an Era of Heightened Threats

Stadium

Physical Security in Global Arenas: How AI Improves Security at Scale

Person in red hoodie

When Metal Theft Becomes a Life Safety Crisis

Stacked books

Safe Learning 101 Program Supports Schools in Strengthening Campus Security

SEC 2026 Benchmark Banner
SEC 2026 Benchmark Banner

Events

April 30, 2026

Building a Campus-Wide Culture of Security and Shared Responsibility

In today’s higher education environment, where institutions face evolving and multifaceted incidents, safety must be embedded into the fabric of campus culture. Learn strategies for generating collective buy-in from faculty, staff, students and senior leadership. 

May 7, 2026

Beyond Cameras: Revolutionizing Perimeter Security with LiDAR, AI and Digital Twins

In this webinar, we will explore how LiDAR‑based detection, AI‑powered analytics and digital twins are transforming the future of perimeter protection with 3D detection, real-time situational awareness and unified operational views.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products
SEC 2026 Top Cybersecurity Leaders

Related Articles

  • DHS Warns of Potential Explosives in Toothpaste, Cosmetics Containers on Flights

    See More
  • White House

    Cyber Memo Warns of New Cybersecurity Risks to White House Network

    See More
  • phishing freepik

    Microsoft warns of Russian Nobelium phishing campaign

    See More

Related Products

See More Products
  • 9780367259044.jpg

    Understanding Homeland Security: Foundations of Security Policy

  • 9780367221942.jpg

    From Visual Surveillance to Internet of Things: Technology and Applications

  • Security of Information and Communication Networks

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2026. All Rights Reserved BNP Media, Inc. and BNP Media II, LLC.

Design, CMS, Hosting & Web Development :: ePublishing