Huawei will continue security support for Android smartphones

Huawei will continue security support for Android smartphones

LONDON (Reuters) - Huawei said on Monday it would continue to provide security updates and services for its smartphones and tablets after being barred from Google updates to its Android operating system. But it did not say what would happen with phones it would sell
/
Top 7 characteristics of a modern data architecture

Top 7 characteristics of a modern data architecture

A modern data architecture (MDA) must support the next generation cognitive enterprise which is characterized by the ability to fully exploit data using exponential technologies like pervasive artificial intelligence (AI), automation, Internet of Things (IoT) and blockchain. In addition, an MDA must support a platform-centric business model that fully supports people,
/

Cyberwar Concerns

This last week the Washington Post published a bombshell story on the recent attacks on the US election infrastructure ironically under their motto “Democracy dies in darkness.

On the Vidder blog Thursday I said that we were at cyberwar.  My case was simple:

  • Cyber warfare is by nature stealth;
  • There are no cyber-specific treaties;
  • The migration of attacks from economic targets to political suggests direct nation state complicity; and
  • Now our intel agencies have proven direct Russian intel agency involvement.

Then a recent Reuters report broke that made things even more bleak: Russian officialsare demanding source code from US tech companies, even code for security products.

Reports are now emerging of a hack attack against UK’s parliament, another political target.

A pattern of increasing attacks against servers and devices and politically motivated targets is emerging and Russia named as the common source.

See this recent Wired piece on Ukraine: How an Entire Nation Became Russia’s Test Lab for Cyberwar.

For years many security experts have attacked cloud adoption, calling it a security risk. Yet recent events might accelerate cloud adoption, especially for legacy workloads protected by US tech giants flirting with releasing source code to have (ironically) greater access to the Russian market.

Even the perception of a source code sharing risk could dampen enthusiasm for traditional security products and get more CISOs considering protection by AWS, Azure or Google, who are investing billions in advanced infrastructure and might have enough market power to resist Russian demands.

Some of these companies are under tremendous operating pressures and having to fight off innovative startups and IaaS offerings that are catching up if not surpassing (in terms of security) for most enterprises. Some are struggling with layoffs designed to right the ship.

Now there is a source code risk that could give Russian hackers enhanced access to enterprise systems increasingly exposed by digitalization and growing populations of endpoints with network access.

Time will tell.  IMHO cyberwar could be a significant new driver for the growth of cloud for existing, premises workloads.

By Greg Ness

Cloud Syndicate

The 'Cloud Syndicate' is a mix of short term guest contributors, curated resources and syndication partners covering a variety of interesting technology related topics.

Contact us for syndication details on how to connect your technology article or news feed to our syndication network.

Impact of AI and 5G on the Possibilities of Data

Impact of AI and 5G on the Possibilities of Data

Impact of AI and 5G This blog post was made in collaboration with Intel. A smarter world is now a ...
AI, Automation & 5G ensuring the future of Industry 4.0

AI, Automation & 5G ensuring the future of Industry 4.0

AI, Automation & 5G Industry 4.0 involves interconnecting all parts of a company and giving rise to effective automation resulting ...
How Blockchain Has Unexpectedly Improved Big Data Integrity

How Blockchain Has Unexpectedly Improved Big Data Integrity

Big Data Integrity Blockchain technology was developed to improve the integrity of bitcoin. However, as bitcoin became more popular, its ...
How prepared are you to overcome the misuse of AI

How prepared are you to overcome the misuse of AI

Overcome the Misuse of AI Have you ever considered that the AI system integrated into your organisation's computing infrastructure could ...