Metroid, Perfect Dark, Zelda, And Turok Come To Nintendo Switch Online + Expansion Pack Today

Metroid, Perfect Dark, Zelda, And Turok Come To Nintendo Switch Online + Expansion Pack Today

We recently learned about five Mega Man games arriving on Nintendo Switch Online’s Game Boy catalog, but Nintendo has recently focused an increasing amount of its catalog efforts on more obscure titles or those that never came to the West. With many of the most classic titles already on Nintendo Switch Online’s various catalogs, the output has decreased significantly. However, during today’s Nintendo Direct, four of the most requested games were announced for release today.

Metroid: Zero Mission, the excellent Game Boy Advance remake of the original Metroid, and The Legend of Zelda: A Link to the Past Four Swords, the Game Boy Advance remake of the classic SNES title but with a separate co-op campaign, come to Nintendo Switch Online’s Game Boy Advance catalog. On top of that, Nintendo announced the Nintendo 64 catalog is getting two M-rated entries: Perfect Dark, the GoldenEye 007 spiritual successor from developer Rare, and Turok: Dinosaur Hunter.

As a reminder, the NES, SNES, and Game Boy libraries are included in the base Nintendo Switch Online subscription, while Nintendo 64, Game Boy Advance, and Sega Genesis catalogs require you to upgrade to the Nintendo Switch Online + Expansion Pack subscription. As such, to access all of the games announced and released today, you’ll need to subscribe to that premium membership. The Legend of Zelda: A Link to the Past Four Swords and Metroid: Zero Mission join the Game Boy Advance library today, while Perfect Dark and Turok: Dinosaur Hunter join the Nintendo 64 catalog today.

Nintendo Switch Sports Adding Basketball In Free Update

Nintendo Switch Sports Adding Basketball In Free Update

Hot off the Boston Celtics’ NBA Finals victory last night, we learned of a new way we can step onto the court this summer. Nintendo Switch Sports, the successor to the overwhelmingly popular Wii Sports series, arrived in 2022. While the initial offerings lacked depth and sometimes left us craving more than the base game was able to deliver, Nintendo has stuck with the title and has improved the offerings through free updates. A few months after launch, the title added golf at no additional charge, and during today’s Nintendo Direct, we learned that another free update is coming to the game this summer to add basketball to the mix.

Nintendo Switch Sports’ implementation of basketball uses motion controls to dribble, pass, and shoot. You can participate in two-on-two matches locally, or compete in Five-Streak Battle matches and Three-Point Contests. You can also take part in a solo Three-Point Challenge, where you need to make as many baskets as you can before time expires.

Nintendo Switch Sports’ basketball free update arrives this summer. For more on Nintendo Switch Sports, be sure to read our review of the base game here.

The Dragon Age: The Veilguard Digital Issue Is Now Live!

The Dragon Age: The Veilguard Digital Issue Is Now Live!

If you subscribe to the digital edition of Game Informer, you can now learn all about our trip to BioWare for Dragon Age: The Veilguard! Following the cover reveal our digital issue is now live on web browsers, iPad/iPhone, and Android devices.

Alongside our 12-page Dragon Age: The Veilguard cover story, you will also find big features on our trip to Warsaw, Poland to play The Alters, a deep dive on SFB Games the creators of Snipperclips and Crow Country, a look back at Silent Hill with with the developers it has inspired, a feature about how Sony and Microsoft created its specialty accessible controllers, reporting from Summer Game Fest, and lots more! We’ve also got previews for Assassin’s Creed Shadows, Call of Duty: Black Ops 6, Black Myth Wukong, Star Wars Outlaws, Undermine 2, Final Fantasy XIV: Dawntrail, and reviews for Senua’s Saga: Hellblade 2, XDefiant, Paper Mario: The Thousand-Year Door, Crow Country, Minishoot’ Adventures, Lorelei and the Laser Eyes, and much more!

If you love print as much as we do, you can subscribe to the physical magazine:

Subscribe Now

You get 10 issues for $19.91, or two years and 20 issues for $34.99. Individual issues are also now available for purchase at this link or in any GameStop store.

You can download the apps to read the issue by following this link.

The Plants Vs. Zombies-esque Metal Slug Attack Reloaded | New Gameplay Today

The Plants Vs. Zombies-esque Metal Slug Attack Reloaded | New Gameplay Today

Metal Slug Attack actually began as a mobile tower defense game for iOS and Android devices many years ago, but today, as part of Nintendo’s Summer Direct presentation, it was revealed the game is getting “reloaded” for just about every platform. Also, of note, this game is not to be confused with the other tactical Metal Slug game, Metal Slug Tactics. You can learn more about that game here.

Join Kyle Hilliard and Brian Shea for a look at some early gameplay from the game and learn why it is scratching their Plants vs. Zombies itch.

[embedded content]

Head over to Game Informer’s YouTube channel for more previews, reviews, and discussions of new and upcoming games. Watch other episodes of New Gameplay Today right here.

Zelda Is Finally The Protagonist In The Legend Of Zelda: Echoes of Wisdom, Out September

Zelda Is Finally The Protagonist In The Legend Of Zelda: Echoes of Wisdom, Out September

For years, fans of the Legend of Zelda have clamored for the titular princess to star in her own game, but even as she’s become a more prominent character in recent entries, the Zelda-led Zelda game has yet to appear on store shelves. In today’s Nintendo Direct, that wish was finally granted; in The Legend of Zelda: Echoes of Wisdom, it’s up to Princess Zelda to save Hyrule when Link is captured.

[embedded content]

While the game takes its art style from 2019’s Link’s Awakening remake, this title is not a remake of any kind, and there’s no clear indication that it is connected to Link’s Awakening. In this adventure, Zelda uses a new magic item called the Tri Rod to journey across Hyrule. The Tri Rod can create “echoes” of items, like tables, beds, or boxes, to climb and explore the overworld and its dungeons, but it doesn’t stop there. Echoes of water blocks can be used to swim up and over certain obstacles, while trampolines allow players to easily leap across gaps.

Throughout the gameplay demonstration, Series producer Eiji Aonuma explains that players can also make echoes of enemies, and that these enemies can be used in combat on your side. Zelda captures a moblin to fight some slimes, then uses meat to lure in some bird enemies and summons a deku baba to snap them up. Aonuma goes on to say that there are so many echoes in the game and that he hasn’t even counted them all – we’ll have to learn what the limits of echoes are, if any, some other time.

As the trailer continues we get more glimpses into who Zelda will be interacting with throughout the game, and it includes two kinds of Zoras, some Deku shrubs, a Sheikah person (potentially Impa) and the Great Deku Tree. It also features some 2D platforming and underwater sections, as well as Zelda using birds and plants with helicopter-like leaves to glide.

The game launches alongside a golden Hyrule-themed Switch lite, which you can view in the gallery of images above. Luckily, you won’t have to wait long for either of them: the handheld and The Legend of Zelda: Echoes of Wisdom will be available later this year, on September 26.

A Deep Dive Into Dragon Age: The Veilguard’s Combat, Abilities, Skill Tree, And More

If you’re at all familiar with the Dragon Age series, you likely already know BioWare has experimented quite a lot with its gameplay. From Dragon Age: Origins’ real-time strategy RPG approach to Dragon Age II’s mostly-set-within-one-city action experience to Dragon Age: Inquisition’s strategy-action mix, BioWare hasn’t quite defined the franchise’s combat. However, a through-line is apparent from Origins to Inquisition: BioWare seemingly wants this franchise to be action but has attempted to shift to that without abandoning its longtime fans. 

With Dragon Age: The Veilguard, BioWare has completed its transition from strategy to real-time action, but thanks to an optional tactical pause-and-play combat wheel that harkens back to the series’ origins, I feel it’s found a great (battle)ground for Dragon Age combat. Of course, it’s hard to tell how Veilguard’s action will hold up over what is sure to be a dozens-of-hours-long RPG, but if what I’ve seen so far is any indication, the studio is on to something.

A Shift In Strategy

“I think the first thing to keep in mind is that combat […] in the franchise has been an evolution,” game director Corinne Busche tells me within BioWare’s Edmonton office. “Every single entry reimagines what combat is like and I would say our goal was to make sure we had a system that allowed players to feel like they actually were able to step into the world of Thedas. They’re not a player observing from afar – they are inside of this world. Being this authentic world that’s brought to life, the combat system needs to support that, so you are in control of every single action, every block, every dodge, every swing of your sword.”

Busche says players complete every swing in real-time, with particular attention paid to animation swing-through and canceling. On the topic of canceling, I watch Busche “bookmark” combos with a quick dash. With this mechanic, players can pause a combo’s status with a dash to safety and continue the combo where they left off afterward. Alongside the dash, there’s a parry for some classes, the ability to charge moves, and a revamped healing system that allows players to quickly use potions by pressing right on the d-pad. 

Busche says each character will play the same in a way, regardless of class, in that you execute light and heavy attacks with the same buttons, use abilities with the same buttons, and interact with the combo wheel in the same way. During my demo at one point, we use a sword-and-shield Warrior Qunari that hip-fires and aims their shield to throw it like Captain America while hammering down big damage with a sword. Pressing the same buttons as a mage might throw out magical ranged attacks instead of a shield. 

[embedded content]

Abilities, like a Spartan-like kick from a Warrior or a Mage’s firewall that deals continuous damage, add to the player’s repertoire of combat options. Warriors can parry incoming attacks, staggering enemies in the process. Rogues have a larger parry window, and Mages can’t parry at all but instead throw up a shield that blocks all incoming damage so long as they have the mana to sustain the shield. 

“That is just the baseline that allows us to get that level of immersion of, ‘I’m actually in this world; I’m a part of it,'” Busche says. “But again, the abilities, the strategy, linking my companions’ abilities together to perform devastating combos, that is really where the depth and the complexity comes into play.”

Abilities And The Skill Tree

Dragon Age: The Veilguard Dreadwolf Game Informer Cover Story

Warrior Rook Skill Tree

This extends to companions, who, at your choosing, bring three abilities (of their five total) into combat, executed either with quick select buttons or the pause-and-play combat wheel. Every time you rank up a companion’s Relationship Level, you unlock a skill point to spend specifically on that companion – this is how you unlock new combat abilities. 

Though companion skill trees pale in comparison to Rook’s expansive tree, which features passive abilities, combat abilities, and more, as well as paths to three unique class specializations, there’s still some customization here. 

You can find the skill tree for Rook and companions within Veilguard’s start or pause menu. This menu contains pages for Veilguard’s map, journal, character sheets, and a library for lore information, too. Here, you can cross-compare equipment and equip new gear for Rook and companions, build weapon loadouts, and customize your abilities and builds via the aforementioned skill tree, which looks relatively easy to understand. 

You won’t find minutiae here, “just real numbers,” Busche says. In other words, a new unlocked trait might increase damage by 25% against armor, but that’s as in-depth as the numbers get. Passive abilities unlock jump attacks and guarantee critical hit opportunities, while abilities add moves like firewall and spartan kicks to your arsenal. As you spec out this skill tree, which is 100% bespoke to each class, you’ll work closer to unlocking a specialization (which doesn’t take reaching the max level of 50). Every class has three specializations, each with a unique ultimate ability. Busche says BioWare’s philosophy with the skill tree is “about changing the way you play, not the statistical minutiae.” 

Companions In Combat

If you completely ignore companions in combat, they will attack targets, use abilities, and defeat enemies all on their own. “[Companions] are their own people, “Busche says. “They have their own behaviors, they have their own autonomy on the battlefield, they’ll pick their own targets. As their plots progress, they’ll learn how to use their abilities more competently, and it really feels like you’re fighting alongside these realized characters in battle.”

Speaking to companion synergy, Busche adds, “I see all the abilities Harding has, and I see everything that Bellara is capable of. And sometimes, I’m using vulnerabilities synergistically. Maybe I’m pausing or slowing time with Bellara so that I can unleash devastating attacks with Harding, knocking down the enemy, and then me, as Rook, I’m rushing in and capitalizing on this setup they’ve created for me. It is a game about creating this organic sense of teamwork.”

Busche says there are more explicit synergies, with intentional combos where specific companions can play off each other, and you can queue up their abilities to do just that. That’s what the pause-and-play combat wheel is for in Veilguard. 

In this screen, which pauses the camera and pulls up a flashy combat wheel that highlights you and your companions’ skills, you can choose abilities, queue them up, and strategize with synergies and combos the game recognizes, all while targeting specific enemies. Select what you want and release the wheel to watch your selections play out.  

Putting It All Together

During a mission within Arlathan Forest after Veilguard’s prologue, Busche utilizes Veilguard’s dual-loadout mechanic. As Rook, you can create two weapon loadouts for quick switch-ups mid-combat. As a mage Rook, she uses magical attacks to add three stacks of arcane build-up to make an Arcane Bomb on a Sentinel, a mechanical set of armor possessed by a demon. If you hit the Sentinel’s Arcane Bomb with a heavy attack, the enemy will take devastating damage. Once the Sentinel has an Arcane Bomb on it, Busche begins charging a heavy attack on her magical staff, then switches to magical daggers in Rook’s second loadout, accessed with a quick tap of down on the d-pad to unleash some quick light attacks, then back to the staff to finish charging its attack. She then unleashes the heavy attack, and the Arcane Bomb explodes in a liquidy whirl of green magic. 

“I’ve seen [Veilguard’s combat] refined over time [and] I love it,” BioWare general manager Gary McKay tells me. “I love that balance of real-time fluid action, but also the ability to have the depth in the RPG, not just in terms of pause-and-play, but the depth in terms of how you bring your companions into the battlefield. What are you going to do with their skill points? What’s the loadout you’re going to use? Everything is about bringing Rook to the center of the battlefield, and I love it.” 

Former Dragon Age executive producer and Veilguard consultant Mark Darrah feels Veilguard is the first game where the combat is legitimately fun. “What I see in Veilguard is a game that finally bridges the gap,” he says. “Uncharitably, previous Dragon Age games got to the realm of ‘combat wasn’t too bad.’ In this game, the combat’s actually fun, but it does keep that thread that’s always been there. You have the focus on Rook, on your character, but still have that control and character coming into the combat experience from the other people in your party.” 

I get the sense from watching Busche play several hours of Veilguard that BioWare has designed a combat system that relies heavily on players extracting what they want out of it. If you want to button mash and use abilities freely when their cooldowns expire, you can probably progress fine (although on the game’s easier difficulties). But if you want to strategize your combos, take advantage of elemental vulnerabilities, and min-max companions and Rook loadouts, you can do that, too, and I think you’ll find Veilguard rewards that with a more enriching experience. 


For more about the game, including exclusive details, interviews, video features, and more, click the Dragon Age: The Veilguard hub button below.

Rapid AI Advances Spotlight Critical Global Tech Skills Shortage

For a perfect example of just how quickly technology evolves, look no further than ChatGPT. While artificial intelligence, chatbots, and virtual assistants were hardly new concepts prior to ChatGPT launching, it managed to take the conversation to the next level. Today, it seems like AI is…

Generative AI and Robotics: Are We on the Brink of a Breakthrough?

Imagine a world where robots can compose symphonies, paint masterpieces, and write novels. This fascinating fusion of creativity and automation, powered by Generative AI, is not a dream anymore; it is reshaping our future in significant ways. The convergence of Generative AI and robotics is leading…

The societal implications of digital WMDs – CyberTalk

Bryan Neilson is an experienced Cyberspace & Intelligence Operations professional who built his career supporting Cyberspace Operations, Intelligence Collection, and Counterintelligence for the U.S. Intelligence Community. Bryan’s work, which has spanned the globe, can be directly tied to saving the lives of countless officers and assets, enabling of kinetic military objectives, and helping to build and maintain the strategic advantage of the United States throughout Cyberspace and beyond. Fusing his proficiencies in Cyberspace Operations and Human Intelligence, Bryan has become a trailblazer in his industry and has brought his unique expertise to Check Point Software Technologies – where he serves as Regional Architect, Evangelist, and global Subject Matter Expert in Sophisticated Cyberspace and Intelligence Tradecraft.

In the last several days, the cyber security industry has been rocked by a rare acknowledgement from U.S. Government Officials regarding the likelihood of extensive compromise of U.S. Critical Infrastructure by specific state-sponsored hacking groups. In a rare public pronouncement, the United States’ National Security Agency (NSA) revealed the extent to which it (and other federal agencies) believes that specific Nation-State sponsored actors have been actively and successfully engaging in broad campaigns to compromise various systems controlling critical infrastructure components within the U.S.

It has been a long-held belief among many cyberspace professionals that sophisticated state-enabled offensive actors have been actively and covertly compromising various critical infrastructure systems and networks across the United States and its allies – activity that has been on-going for several years.  Nevertheless, these public statements from the NSA – an organization known for keeping such issues and ‘troubles’ concealed from the general public – suggest mounting concerns among U.S. intelligence, military, diplomacy, and congressional officials.

Furthermore, U.S. officials have noted how this observed ‘buildup’ is predominantly targeting critical infrastructure systems of little to no intelligence value; thus, raising alarm that the motivation behind this activity is for the sole purpose of gaining a strategic advantage (the ability to disrupt U.S. and allied critical infrastructure) in the event conflicts arise.

Since early 2023, when the NSA and Microsoft collaboratively identified and publicly-revealed the existence of China’s Volt Typhoon program and alluded to the extent to which this mission had gained strategic access among critical infrastructure, worry throughout Washington has been mounting. The primary concerns are three-fold: A) strategic pre-positioning and control over U.S. critical infrastructure represents a substantive threat to the United States government, economy, and society; B) such wide-ranging pre-positioning has the potential to fundamentally shift the balance of power and displace the United States’ strategic advantage and dominance within the Cyberspace Domain; and C) such pre-positioning activity positions adversarial nation states with a “first-strike” capacity against the United States. These concerns have been echoed by Air Force General Timothy Haugh (Commander of U.S. Cyber Command and the top military official in the United States for cyberspace), in a telling statement made to the Washington Times, “We see attempts to be latent in a network that is critical infrastructure, that has no intelligence value, which is why it is so concerning.

Recent public statements from the NSA and the subsequent comments from the Commander of the U.S. Cyber Command paint a rather bleak picture for the continuing security of United States critical infrastructure – and in turn, the future stability and resiliency of the U.S. government, economy, and society. Nevertheless, it is imperative to remember that this pre-positioning activity some U.S. adversaries are being accused of is neither new, unprecedented, nor, legally speaking, an act of outright hostility. Many countries with cyberspace operations capacities that are at least moderately sophisticated are actively engaged in the premeditated, organized, nation-sanctioned, and clandestine compromise of systems and networks for the sole purpose of gaining a strategic advantage over their adversaries – the United States being no exception. Lacking the critical element of direct and overt hostility, such activity is predominantly viewed and handled in the same manner as espionage, rather than actions indicative of war.

Chartered, in part, with maintaining and increasing the strategic advantage and dominance the United States has long held throughout the cyberspace domain, U.S. Cyber Command actively engages in this same strategic pre-positioning targeting U.S. adversaries. Such maneuvers intend and ultimately result in the compromise of and surreptitious control over thousands of systems and networks deemed advantageous to the interest and strategic advantage of the United States (systems and networks critical to the governmental, military, economic, and societal functions of other nations). This type of activity neither intends nor results in any immediate denial effect and therefore, does not meet the legal standard of Cyberspace Attack – a hostile act.  Rather, this type of activity is more aligned with acts of Cyberspace Exploitation.

Understanding this subtle yet crucial nuance between cyberspace attack and cyberspace exploitation is paramount to properly framing the situation that the world now faces. Cyberspace attack and cyberspace exploitation are two sides of the same coin. While both seek the compromise of systems, networks, data, and other assets, they fundamentally differ in both execution and motivation.

Cyberspace Attack, being of more substantial concern, consists of acts The societal implications of digital WMDs – CyberTalkcarried out within or through the cyberspace domain that have either the intent or result of causing immediate denial effects (defined as any form of degradation, disruption, or destruction). Actions carried out in this manner are still classified as Cyberspace Attack, even if this denial effect impacts resources outside the cyberspace domain. Cyberspace Exploitation, on the other hand, does not arise from the motivation of causing an immediate denial effect. Rather, Cyberspace Exploitation consists of acts of espionage or enablement carried out within or through the cyberspace domain. Lacking any motivation or outcome of an immediate denial effect, acts of Cyberspace Exploitation are not considered directly hostile and, from a legal, military, and diplomatic perspective handled much differently – through espionage, military maneuvers, counterintelligence, international pressure, and diplomacy. Notable however, is the standard setting forth “Enablement Activity” as an act of cyberspace exploitation. Such enablement activity consists of actions carried out for the purpose of enabling future activity or operations within or outside the cyberspace domain – regardless of the intent, motivation, or ultimate outcome inherent to such future activity.

Cyberspace Operations (which includes the aforementioned Cyberspace Attack and Cyberspace Exploitation, along with Cyberspace Security and Cyberspace Defense) establishes the current legal, military, and diplomatic doctrine and framework adopted by a majority of countries. The pre-positioning activity that is now raising alarm within the United States, while concerning and notable, represents non-hostile enablement activity within the discipline of Cyberspace Exploitation. The inclusion of “enablement activity” under the umbrella of Cyberspace Exploitation is a direct causal factor in the increased targeting and successful compromise of critical infrastructure systems around the world.

The rapid expansion in actors capable and willing to engage in cyberspace exploitation combined with the relative ease by which many critical infrastructure components can be compromised has led to a new “Mutually Assured Destruction” (MAD) style buildup of offensive capabilities and strategically pre-compromised and controlled critical assets. Though not directly hostile, this enablement activity does tactically position an actor to have control over the critical infrastructure of another country – thus providing the actor the ability to cause substantial damage to the country’s government, military, economy, and society.

Today, the world finds itself again in the grips of a transformed Cold War – watching the proliferation, buildup, and strategic placement of weapons of mass destruction. Reminiscent of global issues faced in decades past, this race towards mutually assured destruction is now driven by computer code rather than fissile material – a new age of weapons known as Digital Weapons of Mass Destruction.

"Let us hope the will of good men is enough to counter the terrible strength of this thing that was put in motion" - Donaldson, R. (Director) - Thirteen Days, New Line CinemaThe implications go beyond the direct impacts these digital WMDs would have on the physical world to the social and psychological impacts that they could have on people. In his 1955 book titled, “The Sane Society” social psychologist Erich Fromm describes the “Socially Patterned Defect”: a systemic illness underlying and inherent to modern societies, that absent the distractions of modern technology, would present in clinical signs of neurosis, psychosis, and socially-deviant behaviors among the population. Though more than half a century has passed since originally theorized, the hypothesis of a Socially Patterned Defect has been tested and upheld throughout the decades – even in today’s modern world. The aggressive adoption by modern societies of technologies providing on-demand access to real-time communications and information represents a new social and public health threat posed by such Digital WMDs. Unfortunate, but true, is the fact that most societies and individuals within the modern world are ill-prepared and would be effectively unable to function in a world without the modern technologies they have come to rely on.

Consider, as one example, the very real possibility of disruption to a nation’s power and communications infrastructure. While undoubtedly damaging to the nation’s government, military, and economy, the impact such an event would have on the society could be far more substantial. The co-dependency and reliance most modern societies have on current technology creates an ideal comorbidity condition where, any unexpected, immediate, and long-term absence of such technology could have the potential of causing this Socially Patterned Defect to emerge – resulting in mass disorder, public health and law enforcement crises, and ultimately societal and government collapse within the impacted population(s). Such effects resulting from a population’s loss of modern technology are not simply theoretical but have been observed on numerous occasions (and in relatively small scale) in the aftermath of recent natural disasters. This scenario represents a simple and limited-in-scope example of what is possible and of interests to sophisticated actors today. Considering the enablement activity being observed intends to acquire control over the whole of a nation’s critical infrastructure (communications, energy, emergency services, healthcare, transportation, and water systems – to name a few), the outcomes could be even more grave.

While the totality of impact such Digital WMDs would have on society seems dire, there is hope on the horizon. In May 2024, the United States Department of State published the “International Cyberspace and Digital Policy Strategy”. Laying the foundation for a brighter, more secure, and more sustainable future, this policy seeks to set the cornerstone of a more diplomatic approach to cyberspace. Though seen as a watershed moment in the history of cyberspace, it is important to remember that these efforts are still very much in their infancy and will take years to fully formalize and canonize; and could be easily disrupted should tensions between key nations reach a point where conflict involving hostile actions within or through cyberspace seem warranted. Until such time, this new strategy is only complementary to and in no way contradicting or superseding the current military-minded doctrine of cyberspace operations.

With the stakes so high and any global realignment of doctrine so far off, it now rests on the shoulders of the global collective of cyberspace operations and cyber security professionals to help drive the world to this more secure reality – one where Digital WMDs are less prolific and the thought of triggering such weapons is considered a taboo in the same vein as the use of nuclear weapons. As an industry, the most powerful countermeasures are not the cyber security technologies – they have time and again proven inadequate and unable to stand up against sophisticated offensivecapabilities – but rather the knowledge, expertise, good nature, and voices of these unique professionals. In the interest of prevention, advocating for non-proliferation, disarmament, and international oversight and control of Digital WMDs is essential. Through this, governments can be pressured to ensure such weapons are rarely used; and if so, are employed in a restrained manner accounting for all reasonable measures to ensure societal stability.  While seeking prevention would be ideal, mutually agreed global disarmament and restraint among nations who possess (or who could easily develop) Digital WMDs is doubtful. Therefore, a measure of focus must be shifted to preparation and response rather than prevention.

With this new Cold War being fought out within a realm that is largely intangible and through actions rarely perceptible or considered, the seriousness and criticality of the situation the world now faces is often overlooked or not entirely comprehended. Just as populations around the world took measures in preparation for nuclear war throughout the mid-20th century, the world once again must proactively prepare for the possibility of conflict involving actions taken through cyberspace intended to result in disruptions to critical infrastructure. Everyone, from individuals to the largest organizations and educational institutions, to governments must preemptively address these threats and plan for a reality where critical services are made unavailable for an extended period of time.

Organizations can take strategic and common-sense measures to help ensure they are better prepared for such possibilities. Building comprehensive Continuity of Operations Plans that include contingencies for loss of critical infrastructure is fundamental. Through this, organizations should identify resources and services that are deemed critical (those a company would be unable to function without) and identify alternative means of operations should these resources and services be made unavailable. Organizations should also seek to establish substitute communications strategies, alternate work site locations, and disaster-scenario personnel reporting requirements. Additionally, any continuity of operations program should account for identification and loss of human resources that provide or hold critical knowledge for the organization.

To be more proactive, organizations should build teams (or partner with services) to provide real-time monitoring, investigations, digital forensics, incident handling, cyber threat intelligence, and proactive threat hunting capabilities. Governments must also come to the table and lower the bar for entry to build strategic public-private partnerships for the purposes of sharing critical information and intelligence. While sophisticated offensive activity can very likely go unseen even with the latest incident response strategies, technologies, and intelligence, this remains the best method of identifying and curtailing the compromise of critical systems for the purpose of pre-positioning.  Furthermore, where employed, organizations should exercise restraint in the use and deployment of counteroffensive capabilities, actions, and services to avoid causing further escalation.

"Knowledge is of no practical value unless it is put into practice." - Anton ChekhovLastly, while an uncomfortable conversations, all organizations and individuals must come to grips with the limitations and fallibility of many modern security technologies. Where most of these technologies are employed, a sobering fact must be acknowledged: no matter how robust a system is believed to be, the likelihood of previous, current, and ongoing compromise by a sophisticated actor is unquestionable – even more so for any system controlling or maintaining critical infrastructure. Nevertheless, there do exist some truly capable frameworks employing a consolidated and comprehensive approach coupled with AI-powered and cloud-delivered next-generation capabilities. Leveraging these advanced all-encompassing solutions (such as the Check Point Infinity Platform) remains the only method proven successful in preventing sophisticated offensive activity.