Posted on

Code, power, and chaos: The geopolitics of cybersecurity

Off the coast of Ireland, beneath the Atlantic Ocean, lies a vast nervous system of cables. These strands of fibre-optic wiring form the invisible infrastructure of our globalised world. These aren’t just conduits for internet traffic; they’re arteries of modern civilisation, carrying everything from financial transactions to state secrets.

And now, they’re under siege. This seabed has been making headlines as it is not just an ocean that connects us but underwater cables that ar the lifeline of our virtual connections. In todays world we are seeing daily threats to the very infrastructure that allows us the freedom to connect, explore and trade with the rest of the world.

The hyper-sensitivity to globalisation has inserted fear where there was opportunity. Instead of viewing these connections as extremely valuable points of cultural intersections we are seeing them as threats to the viability of local industries. 

It is not just the fibre-optic wiring stretching thousands of miles across the seabed that is threatened, but rather the ability to operate, trade and communicate globally. Stability in geopolitics is crucial for doing business in all shapes and forms today. 

As recent global tensions rise, cybersecurity threats multiply, and there is an increasing risk of disruption. 

The new frontline is digital

The world is teetering on the edge of a new era, one where firewalls matter more than fences, and zero-day exploits can be as devastating as missile strikes. “I look at the current political landscape and see a world under strain,” says Rhythm Jain, a Marketing Development Manager at Resonance Security.

This battleground is vast and largely invisible, stretching from the inboxes of public officials to the seabeds off Ireland’s coast. In 2024, NATO released a bold new strategy to secure undersea infrastructure, citing increased Russian submarine activity near British waters. The message is clear: cables are now targets, and data is a strategic asset.

The cables are just one piece. From the 2020 SolarWinds breach to daily ransomware attacks on hospitals and water systems, it’s clear that the digital realm is now where the most consequential battles are fought.

“If you’re building anything that holds value, you’re a target,” says Jain. In a world where physical borders blur and kinetic warfare feels like an artifact of the 20th century, the real battles are happening in code. The firewalls of corporations and nations alike are now the new frontlines, and the stakes have never been higher.

“Geopolitical rivalries, economic uncertainty, and fractured alliances are fuelling a surge in cyber threats. Tensions between major powers like the US, China, and Russia, alongside regional flashpoints like Iran or North Korea, have turned cyberspace into a battleground.”

The past decade has seen an explosion in digital espionage, ransomware, and infrastructure sabotage. From hospitals being locked down by ransomware during a pandemic to energy pipelines halted by keystrokes, it’s clear, cybersecurity is now a necessity.

Also Read: AI power shift: How geopolitics and innovation are rewriting global rules

Vital infrastructure is exposed and vulnerable

Modern critical infrastructure including power grids, healthcare networks, financial systems were never designed with state-sponsored hackers in mind. “I believe ransomware attacks on critical infrastructure are a growing threat, often fueled by geopolitical tensions,” says Jain. “They exploit weak identity and access controls, letting hackers lock up vital systems.”

The situation demands a radical rethink. Blockchain-based decentralised identity (DID) systems are being explored as a solution, offering cryptographic verification instead of passwords and making impersonation significantly harder.

“Blockchain’s strength is its decentralised, tamper-proof ledger,” says Jain. “Imagine a power plant where every technician’s access is verified on a blockchain; hackers couldn’t easily impersonate someone to gain entry.”

Early implementations are promising, with companies experimenting with blockchain to verify machine identities and reduce unauthorised access to vital infrastructure. But this tech isn’t 100 per cent secure.

“Blockchain doesn’t stop phishing or social engineering. It’s also resource-heavy. And if private keys are mismanaged, then the whole system becomes vulnerable.”

In other words, there is no silver bullet but there is a smarter way forward. And it starts with layered, adaptive defenses built on a deep understanding of threat evolution.

Regulation is a hot topic

As cyber threats escalate, so too does the conversation around regulation. But not all regulation is created equal.

“Regulations create a baseline,” says Jain. “They force companies and institutions to adopt minimum standards: multi-factor authentication, encryption, incident response plans. Without that push, many organisations wouldn’t prioritise security until it’s too late.”

However, regulation can backfire when reduced to checklists and certifications. “Compliance is not security,” he warns. “I’ve seen companies with all the right certifications still fall victim to ransomware because no one was monitoring their logs.”

The solution? Thoughtful oversight that prioritises real-world resilience over audit-readiness. “The goal of regulation should be to raise the floor, not define the ceiling. It should encourage companies to build a real security culture and not just tick boxes once a year.”

Also Read: Asia’s trade turning point: How tariffs and geopolitics are redrawing supply chains

Security experts are a voice of reason in the storm

This fragmentation of global digital infrastructure has global implications. If countries begin developing separate, competing networks, the internet as we know it could become increasingly divided, where national security priorities override the free flow of information. 

For businesses, this could mean increased costs and inefficiencies as they navigate multiple regulatory and security frameworks. For individuals, it could mean a future where access to information is dictated by geopolitics rather than technological progress. 

Addressing these risks requires a multi-pronged approach. First, international cooperation must be strengthened to safeguard all infrastructure. The US and its allies are also working on developing quantum encryption technologies to prevent cyber intrusions on data transmitted through undersea cables. Secondly, offering public and private partnerships where security experts can provide case studies, evidence, and education with regards to vulnerable areas of work.

Welcome to the era of cyber geopolitics where the interconnected world is adding layers of new security challenges. By safeguarding the infrastructures that unite us and thoughtfully navigating the currents of globalisation, we can transform challenges into avenues for cooperation and mutual growth. How nations respond in the coming years will determine whether the internet remains a tool for progress or a source of conflict.

Editor’s note: e27 aims to foster thought leadership by publishing views from the community. Share your opinion by submitting an article, video, podcast, or infographic.

Join us on InstagramFacebookXLinkedIn, and our WA community to stay connected.

Image courtesy: Canva Pro

The post Code, power, and chaos: The geopolitics of cybersecurity appeared first on e27.