Eastern Super-powers Pledge To Fight Cyber Security

Russia and China Pledge to Fight Together for Cyber Security

The world’s two eastern super-powers, Russia and China, have pledged not to attack one another in cyber space and to fight together for “international information security.” More simply, this is seen as a “nonaggression pact in cyberspace,” at a time when relations between the US and Russia are very seriously strained.

The cyber security deal was one of a total of 32 agreements signed by the two nations during a visit to Russia by Xi Jinping, President of the People’s Republic of China at the weekend.

In a statement, Xi Jinping said he had held “substantial talks” with Russian President Vladimir Putin, and that they had agreed to continue to develop strategic cooperation and mutual foreign policy support.

In the high-powered publicized on the Russian Government website, the two leaders agreed they would do everything in their power to ensure that the internal political and socio-economic “atmosphere” was not destabilized. They also agreed they would do all they could to ensure public order was not disturbed.

The agreement between the two countries identified the primary threats to information security, and also determined the principles, main areas of interest, mechanisms and forms of cooperation between them. In terms of the agreement, both information technology (IT) and cyber threat data will be shared.

The Russian Foreign Ministry described this as a “strategic partnership,” and stated that the agreement would help to mutually promote a “beneficial cooperation” between China and Russia.

What the Pact Means to the West and US

In an interview transmitted on the US Public Broadcasting Service (PBS), Orville Schell, director of the Center on US-China Relations at the Asia Society in Berkeley, California, said the two eastern super-powers had clearly teamed up because both found themselves “at odds with the West.”

He said they had a number of common interests, including:

  • Energy that Russia can offer China
  • Weapons that Russia can supply to China
  • A common 5,000-mile border
  • Psychological symmetry of two “big empires” that have suffered at the hands of Japan and the West

According to Ian Wallace of the New America Foundation’s Cybersecurity Initiative, the joint interest of Russia and China in information security is very different to that in the US and in Europe. He believes the primary interest of Russia and China focuses on “regime stability.”

It is probably also inevitable, following the breakdown of cyber relations between the US and both Russia and China. In 2014 a Russian-US “cyber working group” collapsed after the Russian military offensive in Ukraine. A similar China-US working group also collapsed after five members of the Chinese military were indicted by the US Government for hacking. Different reasons, same result.

China has also come under fire for trying to force US companies operating in that country to use encryption coding approved in Beijing, and make them supply source code to the government for inspection.

The primary difference is that the US, Europe and other Western nations see the Internet as a free hub, while Russia, China and other like-minded nations believe digital data should be controlled at government level. Putin has gone so far as to claim that the Internet was launched as “a CIA project.

Certainly the new cyber security deal between China and Russia is going to set a precedent for cyber security issues facing these two eastern nations.

By Penny Swift

Gamestop NFT

Could GameStop Issue An NFT Dividend?

NFT Dividends A Non-Fungible Token (NFT) is a piece of data that is stored on a blockchain that certifies a digital asset to be unique. An NFT can represent pictures, videos, GIFs, audio and other ...
Doug Hazelman Cloudberry

Managing an Increasingly Complex IT Environment

Managing Complex IT Environments The hybrid work model is here to stay—at least for the time being. That’s how things feel in these still uncertain times. This new way of work that has evolved from ...
Threat Security

Azure Red Hat OpenShift: What You Should Know

Azure Red Hat OpenShift: What You Should Know What Is Azure Red Hat OpenShift? Red Hat OpenShift provides a Kubernetes platform for enterprises. Azure Red Hat OpenShift permits you to deploy fully-managed OpenShift clusters in ...
Fernando Castanheira

How the Shift to Hybrid Work Will Impact Digital Transformations

The Shift to Hybrid Work Before COVID-19, most enterprises had a digital transformation in flight, but the pandemic threw those programs into hyperdrive. Scrambling to accommodate workforces that were suddenly working online and mostly from ...
Brian Rue

What’s Holding DevOps Back

What’s Holding DevOps Back And How Developers and Businesses Can Vault Forward to Improve and Succeed Developers spend a lot of valuable time – sometimes after being woken up in the middle of the night ...

CLOUD MONITORING

The CloudTweaks technology lists will include updated resources to leading services from around the globe. Examples include leading IT Monitoring Services, Bootcamps, VPNs, CDNs, Reseller Programs and much more...

  • Opsview

    Opsview

    Opsview is a global privately held IT Systems Management software company whose core product, Opsview Enterprise was released in 2009. The company has offices in the UK and USA, boasting some 35,000 corporate clients. Their prominent clients include Cisco, MIT, Allianz, NewVoiceMedia, Active Network, and University of Surrey.

  • Nagios

    Nagios

    Nagios is one of the leading vendors of IT monitoring and management tools offering cloud monitoring capabilities for AWS, EC2 (Elastic Compute Cloud) and S3 (Simple Storage Service). Their products include infrastructure, server, and network monitoring solutions like Nagios XI, Nagios Log Server, and Nagios Network Analyzer.

  • Datadog

    DataDog

    DataDog is a startup based out of New York which secured $31 Million in series C funding. They are quickly making a name for themselves and have a truly impressive client list with the likes of Adobe, Salesforce, HP, Facebook and many others.

  • Sematext Logo

    Sematext

    Sematext bridges the gap between performance monitoring, real user monitoring, transaction tracing, and logs. Sematext all-in-one monitoring platform gives businesses full-stack visibility by exposing logs, metrics, and traces through a single Cloud or On-Premise solution. Sematext helps smart DevOps teams move faster.