Cyber in hybrid conflict: The new invisible frontline

02 April, 2026

When I joined the Italian Navy more than thirty‑five years ago, the operational world felt clear and well‑defined. Military doctrine revolved around three physical domains—land, sea, and air. Technology supported these domains but did not shape them. Today, that certainty has disappeared. Multi Domain Operations (MDO) have expanded the battlespace to include space and, most disruptively, cyber.

Cyber is disruptive not because it replaces traditional domains, but because it permeates all of them. In modern hybrid conflicts, cyber operations blur the lines between military defense, national security, and the protection of civilian infrastructure. Cyber is not “IT security in uniform.” It is an operational domain where states maneuver, project power, deny access, influence decisions, and create strategic effects—often without triggering open conflict.

Cyber operations now support kinetic actions by degrading command and control, disrupting intelligence, and shaping the information environment. They manipulate data, perceptions, and trust. They enable persistent engagement below the threshold of war through espionage, sabotage, and coercion. They also create pre‑positioned access that can be activated during crises.

What makes cyber fundamentally different from land, sea, air, and space is that its terrain is largely civilian owned. Military systems depend on commercial telecommunications, cloud platforms, satellite services, and energy grids. Defending military cyber capability is therefore inseparable from defending the broader digital ecosystem. This interdependence forces us to rethink where national defense begins and ends.

The borderline question in hybrid conflict

Where is the boundary between cyber as military defense and cyber as protection of critical infrastructure?

In hybrid conflict, there is no clean technical line. The boundary is defined by authority, intent, impact, and escalation—and it shifts constantly.

Hybrid threat actors exploit this ambiguity. They operate below the threshold of war, targeting civilian systems that are strategically vital but politically difficult to defend with military force. Cyber is the ideal tool for this grey‑zone strategy.

The recent U.S.–Israeli operation against Iran, and the subsequent cyber spillover into the Gulf region, illustrates this dynamic clearly.

Cyber as an instrument of military operations

From the outset, cyber activity was integrated into a broader military campaign. Cyber effects disrupted coordination, isolated decision makers, and constrained Iran’s ability to respond. In this context, cyber functioned as a military domain, synchronized with kinetic planning and strategic signaling.

Iran’s response also blended kinetic and cyber operations. But the effects quickly extended beyond military networks, revealing the true complexity of hybrid conflict.

Civilian infrastructure as strategic terrain

Many affected systems—communications backbones, cloud services, aviation platforms, and digital government systems—were civilian in ownership but military in relevance. Disruptions impacted not only state command structures but also economic activity, public information flows, and societal confidence.

This reflects a core truth: in hybrid conflict, strategic effects are often achieved by targeting civilian infrastructure because it is deeply intertwined with military capability and essential to daily life.

Cyber spillover into the Gulf: A case study in grey-zone tactics

The spillover into Gulf countries made the blurred boundary even more visible. Governments and organizations across the region experienced heightened cyber pressure on public services, financial institutions, aviation, logistics, and energy systems. These states were not direct participants in the initial military operation, yet they were part of the broader ecosystem that supports military basing, coalition operations, and global supply chains.

Here, cyber activity operated in the grey zone between coercion, deterrence, and destabilization—forcing national cyber authorities and private operators to respond long before any formal military escalation.

Private companies as de facto cyber front lines

Perhaps the most revealing aspect of this conflict is the role of private organizations. Cloud providers, logistics firms, and technology vendors found themselves targeted not because they were combatants, but because they were strategically embedded in national and regional operations.

This underscores a hard reality: in hybrid conflict, private organizations become part of the operational terrain. Their networks and services are now integral to national security.

Rethinking cyber defense: Beyond the borderline

One thing is clear, cyber defense can no longer be divided into “military cyber defense” and “civilian critical infrastructure protection.” These are now interdependent components of national and collective security.

Military cyber forces cannot operate effectively without resilient civilian infrastructure. Civilian operators cannot withstand sustained hybrid pressure without intelligence, coordination, and support traditionally associated with national defense.

Hybrid conflict therefore demands deep, institutionalized collaboration between governments and the private sector. This requires:

  • Joint preparation and planning
  • Shared situational awareness
  • Coordinated response mechanisms
  • Clear escalation pathways

Resilience must be designed collaboratively, not improvised during crises.

Critical infrastructure protection must also be recognized as a pillar of deterrence. Hybrid cyber threats ignore borders, so defenses must be equally interconnected. Alliances and partnerships enable shared intelligence, coordinated responses, and collective signaling.

Leaders across government, military, and industry must internalize that cyber conflict is continuous, societal, and inseparable from modern sovereignty. Cyber defense is not something activated in wartime—it is a permanent condition.

Conclusion

Looking back to my early years as a naval officer, the clarity of domains and responsibilities belonged to a different era. Today, cyber has erased many of those boundaries. Military defense, critical infrastructure protection, and private‑sector resilience now form a single, interdependent system.

To operate effectively in this environment, organizations must strengthen their cyber readiness and embrace shared intelligence as a core element of defense. The Crystal Ball initiative is an example of this— collective cyber defense model and cross‑country intelligence‑sharing platform. It reflects this shift toward collective global resilience. CPX helps reinforce the platform’s infrastructure and support organizations in turning shared intelligence into practical resilience.

If you’re looking to strengthen your own cyber defense posture, get in touch with us.

Continue Reading

write

30 March, 2026

How to write threat models that engineers actually use for strong...

Read now

27 March, 2026

Cybersecurity Documentation: Best practices for SOC, IR and secur...

Read now

26 March, 2026

The Big Shift: Making cyber agentic AI (CA2) safer – Governance, ...

Read now

10 March, 2026

vCISO vs. Advisory CISO: How to choose the right Trusted Cybersec...

Read now

06 March, 2026

The Big Shift: Demystifying Cyber Agentic AI (CA2)

Read now

25 February, 2026

Identity and Access Management in the age of AI and autonomous ag...

Read now

05 February, 2026

From Reactive to Autonomous: The rise of Agentic AI in cybersecurity

Read now

03 February, 2026

Risk prioritization in today’s evolving cyber threat landscape

Read now

14 January, 2026

Cybersecurity in 2026: Why identity, AI, and trust will define th...

Read now

21 November, 2025

Red Teaming vs. VAPT: Choosing the right test for stronger cyber ...

Read now

13 November, 2025

Compliance isn’t security: The hidden risks of a checkbox approach

Read now

29 October, 2025

GraphQL Abuse: The silent killer in API security

Read now

22 October, 2025

Securing DevOps: A GRC perspective on agility, assurance and secu...

Read now

08 October, 2025

How SOCaaS can power transformation and foster innovation in GCC

Read now

26 September, 2025

Why is red teaming a must for OT systems

Read now

19 September, 2025

UAE cybercrime statistics 2025: Key data and trends

Read now

17 September, 2025

Cyber Risk Management: Qualitative vs. Quantitative Approaches

Read now

10 September, 2025

Why AI-powered SOCs are the future of cyber defense

Read now

03 September, 2025

How AI is transforming cybersecurity and threat detection

Read now

29 August, 2025

AI vs Hackers: Who is winning the cybersecurity arms race

Read now

28 August, 2025

Why every cybersecurity team needs document version control

Read now

27 August, 2025

AI agents in cybersecurity: Your new virtual SOC team

Read now

21 August, 2025

Securing Operational Technology: Challenges and best practices

Read now

17 July, 2025

Red Teaming in cybersecurity: Why thinking like a hacker matters

Read now

21 May, 2025

What is a SCIF? Inside the CPX Secure Compartmented Information F...

Read now

21 April, 2025

Cybersecurity in the UAE: What CISOs must prioritize today

Read now

18 March, 2025

The critical role of trusted advisors in OT cybersecurity

Read now

14 February, 2025

AI Agents: The new arsenal CISOs need

Read now

27 January, 2025

Make your AI work right: A framework for secure and ethical AI

Read now

14 January, 2025

Revolutionizing SOC efficiency: The power of cyber-physical integ...

Read now

20 November, 2024

The Modern CISO Playbook: Top priorities for CISOs in 2025

Read now

30 August, 2024

Ask the Right Questions to Get Data Privacy Compliance Right

Read now

29 December, 2023

Navigating Cyberspace in 2024: A Sneak Peek into the Top Security...

Read now

14 December, 2023

Top systems integration challenges every organization must prepar...

Read now

29 August, 2023

Help ! My Facebook has been hacked

Read now

20 July, 2023

Security Product Research in the Lab: A fair chance to prove your...

Read now

20 July, 2023

The Cyber Security Conundrum: Balancing Ego and Expertise

Read now

20 July, 2023

The Internet Never Forgets

Read now

20 July, 2023

Top Cloud Security Risks and How to Address Them

Read now

20 July, 2023

Why Continuous Education, Training and Awareness are Essential fo...

Read now

02 May, 2023

A 5-Star Partner: Priming Your IT and Security Services for Success.

Read now

02 May, 2023

AI and Cybersecurity: A Tale of Innovation and Protection

Read now

02 May, 2023

How to Select a Secure Cloud Model, One Size Does Not Fit All

Read now

02 May, 2023

Making Sense of Public Ratings in Product Selection Process

Read now

02 May, 2023

Privacy Compliance: A Four-Step Approach

Read now

02 May, 2023

Securing Your Website – Gaining Online Customers’ Trust

Read now