Tucson News Plus

collapse
Home / Daily News Analysis / Government Can’t Win the Cyber War Without the Private Sector

Government Can’t Win the Cyber War Without the Private Sector

May 13, 2026  Twila Rosenbaum  8 views
Government Can’t Win the Cyber War Without the Private Sector

Cybersecurity has become a defining challenge of the modern era, pitting relentless attackers against defenders who often operate with limited resources and fragmented coordination. For far too long, governments around the world have attempted to secure their digital perimeters in isolation, while adversaries—ranging from individual hackers to organized criminal syndicates and nation-states—exploit vulnerabilities with impunity. The result is a growing threat landscape where public-sector entities are frequent targets, suffering breaches that disrupt essential services, compromise sensitive data, and undermine public trust. Despite regulations and frameworks designed to enforce baseline security controls, the volume and sophistication of attacks continue to escalate. The digital infrastructure that underpins modern government functions—from tax collection and social services to national defense and emergency response—is overwhelmingly built and operated by private companies. This reality underscores a fundamental truth: the state cannot secure what it does not wholly control. The path forward requires a paradigm shift away from siloed defense and toward deep, institutionalized collaboration with the private sector.

Rise in the Scale and Complexity of Cyberthreats

Modern cyberattacks have evolved far beyond the simple viruses and phishing scams of the past. Today's adversaries employ multi-vector campaigns that simultaneously target endpoints, networks, cloud infrastructure, software-as-a-service (SaaS) applications, and identity systems. According to incident response data from Palo Alto Networks, 87% of intrusions across more than 750 cases involved attacks on multiple attack surfaces. This means that defending a single layer—no matter how robust—is insufficient when attackers can pivot laterally through connected systems. The speed of these attacks has also accelerated dramatically. Intrusions that once took days to unfold now happen in minutes, thanks to automation and the use of artificial intelligence. In one out of every five incidents, attackers manage to exfiltrate data within the first hour of compromise. Governments, with their often bureaucratic procurement cycles and legacy IT systems, are ill-equipped to match this pace. Even with dedicated cybersecurity agencies and teams, the sheer scale of the threat—compounded by the interconnectedness of networks—demands a level of agility and visibility that only private-sector partnerships can provide.

Growing Attack Surface Underpinned by Everyday Dependencies

Years ago, an organization's attack surface was largely confined to its own network perimeter. Today, that perimeter has dissolved. Critical functions rely on cloud platforms, application programming interfaces (APIs), third-party vendors, managed service providers, and supply chain partners. Each of these dependencies introduces new entry points for attackers. A compromise of a remote support tool, for example, allowed hackers to access multiple U.S. Treasury Department offices, demonstrating how third-party access can become the easiest path into a supposedly secure environment. Governments depend on thousands of private companies for everything from software updates to data storage to emergency notification systems. When a ransomware attack hit OnSolve CodeRED in November 2023, the emergency-notification platform was taken offline, disrupting alerts used by law enforcement and public safety agencies across the country. This incident highlights the cascading risks that arise when critical infrastructure is operated by private entities that may not have the same level of security maturity as the government expects. To manage this expanding attack surface, governments must establish collaborative frameworks that share threat intelligence, conduct joint risk assessments, and enforce security standards across the vendor ecosystem.

Technology Ownership Controlled by Private Entities

There was a time when major technological breakthroughs—such as the internet, global positioning systems (GPS), and solar energy—were direct outcomes of government-funded research and development. But that era has passed. Today, nearly all digital innovation originates in the private sector. Companies like Microsoft, Amazon, Google, and countless startups build the operating systems, cloud platforms, networking hardware, and cybersecurity tools that governments rely on. The government's role has shifted from primary innovator to primary customer and regulator, but it lacks total control over the operational levers of the infrastructure it depends on. This asymmetry creates vulnerabilities: if a critical cloud provider suffers a breach, government data hosted on that platform is compromised regardless of the government's own security posture. To address this, governments must move beyond traditional procurement relationships and forge strategic partnerships that include co-development of security features, shared incident response protocols, and joint investment in research on emerging threats. The private sector's agility and expertise in areas like artificial intelligence, threat detection, and secure software development are indispensable assets that can augment government capabilities.

Cybercrime Has Gone Industrial and Is Very Persistent

Cybercrime is no longer the domain of lone hackers in basements. It has evolved into a sophisticated industrial enterprise with specialized roles—ransomware operators, initial access brokers, money launderers, and exploit developers—each selling services on dark web marketplaces. This industry is decentralized and resilient: taking down one group or one server rarely makes a lasting impact because others quickly fill the void. The underlying incentives remain strong. In 2023 alone, crypto scams and fraud schemes generated an estimated $17 billion, fueled by a dramatic rise in impersonation tactics that increased by 1,400% year over year. The persistence of cybercrime demands a coordinated response that targets the entire criminal enterprise model—its hosting infrastructure, identity abuse pathways, and laundering networks. Governments cannot dismantle this ecosystem on their own; they need the cooperation of internet service providers, domain registrars, payment processors, and cybersecurity firms to disrupt operations at scale. Private sector companies often have better visibility into these criminal networks because they monitor traffic, analyze malware, and track financial flows in real time. By sharing this intelligence and jointly conducting takedown operations, public and private entities can achieve what neither could alone.

Geopolitics Enters the Fray as Nation-States Use Cybercrime

State-enabled cybercrime has become routine. Nations use hacking groups to conduct espionage, influence elections, disrupt critical infrastructure, and steal intellectual property. These operators are better funded, more patient, and more sophisticated than typical cybercriminals. They leverage global platforms, third-party infrastructure, and cross-border supply chains to achieve their objectives. A recent survey found that 64% of organizations now factor geopolitically motivated cyberattacks into their risk mitigation strategies. The concept of "national cyber defense" can no longer be purely national in execution. It must involve international alliances and, crucially, private-sector operators who manage key visibility and control points on the internet—such as cloud providers, content delivery networks, and social media platforms. These companies often detect nation-state activity before governments do, because they see the network traffic and behavioral patterns at scale. Formalizing information-sharing channels, co-developing threat intelligence, and aligning incident response procedures across public-private boundaries are essential steps to counter state-sponsored threats. Without this collaboration, governments remain blind to the reach of adversaries who operate across jurisdictions.

The Accelerating Role of AI as an Attack Enabler and Defender

Artificial intelligence is transforming cybersecurity at an unprecedented pace. For attackers, AI shrinks the time required to develop and execute intrusions. Tasks that once took hours or days—such as crafting convincing phishing emails, scanning for vulnerabilities, or evading detection—can now be performed in minutes by AI-powered tools. On the defensive side, AI offers new capabilities for threat detection, automated response, and predictive analytics. However, organizations are rushing to deploy AI systems without fully understanding the security implications. New models, plugins, connectors, and data paths are added rapidly, widening the attack surface. Legacy security controls, designed for a slower and less interconnected world, are simply not equipped to handle this pace of change. Governments face a particular challenge: they must secure their own AI deployments while also regulating the private sector's use of AI. But they cannot solve this alone. The most effective approach is to foster public-private coordination that ensures threat intelligence about AI-related attacks disseminates quickly, secure patterns for AI development are built and shared, and governance frameworks are aligned across sectors. By working together, governments and private companies can develop AI systems that are secure by design, and can jointly respond to the next generation of cyber threats that will inevitably exploit this transformative technology.


Source: SecurityWeek News


Share:

Your experience on this site will be improved by allowing cookies Cookie Policy