WebProNews

Tag: Network Security

  • Huawei Warns of Fallout If U.S. Cuts Off Chip Supplies

    Huawei Warns of Fallout If U.S. Cuts Off Chip Supplies

    Huawei is warning that Pandora’s box would be opened if the U.S. proceeds with its plans to cut the company off from its chip supplies.

    U.S. officials decided last week to move forward with alterations to the Foreign Direct Product Rule in an effort to keep Huawei from purchasing chips from companies such as Taiwanese firm TSMC. Under the rule, some foreign goods that are based, at least in part, on U.S. technology can be subjected to U.S. regulations and export rules. Officials hope to use the rule to enforce a stranglehold on Huawei.

    Huawei, however, is warning that such a move would have disastrous and far-reaching consequences. According to Bloomberg, Chairman Eric Xu told reporters:

    “If the Pandora’s box were to be opened, we’ll probably see catastrophic damage to the global supply chain — and it won’t just be one company, Huawei, destroyed. I don’t think the Chinese government will just watch and let Huawei be slaughtered on a chopping board. I believe the Chinese government will also take some countermeasures.”

    Given the number of companies that rely on China as a source of manufacturing, as well as their largest growing market, such a retaliation could have devastating consequences for many American firms.

  • How a Zero Trust Network Can Keep Your Business Data Secure

    How a Zero Trust Network Can Keep Your Business Data Secure

    The numerous data breaches that occurred over the years clearly indicate that cybersecurity is still prone to failure. Every new security measure system defenders come up with is eventually thwarted by hackers.

    The number of affected users is staggering. A minimum of 500 million Yahoo users were affected by the 2014 security breach that hit the company. The last US presidential election was rife with reports of hackers stealing sensitive emails. Meanwhile, the US Navy, the Internal Revenue Service, and the Justice Department were also targeted by hackers.

    While there have been large-scale attacks on government agencies and the technology sector, hackers have also targeted businesses. As a matter of fact, 15% of international businesses have estimated that their sensitive data was potentially breached or compromised over a one-year period.

    The Operation Aurora attack in 2009, saw companies increasing perimeter security using firewalls and VPNs. By that time, Google had already developed a new security architecture—Zero Trust. As the name implies, trust is removed from the system so everyone, whether outside or inside the firewall, is considered a suspect. Everything attempting to connect to a company’s systems must be verified before being given access.

    Understanding Zero Trust

    The Zero Trust Architecture model was developed by John Kindervag in 2010. The security system’s concept revolved around the idea that institutions should not blindly trust anything or anyone outside or inside its perimeters.

    Previous security paradigms worked on the idea of “trust but verify.” Organizations concentrated on protecting the perimeter under the assumption that everything inside has already been cleared for access and therefore didn’t pose a threat. This method is clearly dangerous now as more corporate data centers are being housed in the cloud, with users (ex. customers, employees) accessing it using applications from devices in multiple locations.

    With Zero Trust, the idea is basically “trust no one.” According to Charlie Gero, Akamai Technologies’ CTO of Enterprise and Advanced Projects Group, Zero Trust doesn’t allow access to machines, IP addresses, etc. until it knows who the user is and whether or not they’re authorized.

    Benefits of a Zero Trust Security Network

    The zero-trust model meets the security demands that companies need today. The rise of cloud technology, ubiquitousness of mobile devices, and the use of third-party sources have opened a lot of loopholes in security systems.

    One major benefit of the zero trust architecture is how it enabled the system to take into account the changing nature of users and their devices. It does so by redefining the user’s corporate identity, along with their device at a given point in time. This provides the system with the context required to make trust decisions at the actual time.

    It also diminishes the importance of static credentials, which is an element often used in an attack. Since each access request is individually authenticated and accredited, every credential required to start a secure session is given a limited scope depending on the user and device linked to a particular resource.

    Challenges of Zero Trust

    As with any security system, organizations that use zero-trust will face challenges. One major challenge is the fact that this is not an install-and-forget setup. Organizations that implement a zero-trust system have to comprehend access rights starting from the lowest level of the technology right up to the topmost level.

    It’s often impractical for any corporation to have a complete, exact and detailed picture of all the resources used at each level through the whole enterprise architecture on an ongoing basis. Companies that do take on this daunting task will see their efforts rewarded.

    Cost and employee productivity can also be an issue with a zero-trust network since there’s some tradeoff between productivity and security. For instance, an employee might be unable to start working while the system is verifying their credentials.

    Fully employing a zero-trust system also demands the acquisition of expensive tools and a large amount of administrative manpower to get everything working smoothly. Luckily, sectors like IT support and employee productivity will see reduced spending once the system is running.

    There are still a lot of questions and doubts about the zero-trust security system. Some sectors believe doing away with trust is virtually impossible. There’s also the issue of cost and implementation. But there’s also no denying that the principle of the system is a good and achievable goal.

    [Featured image via Pixabay]

  • Wifi-Blocking Wallpaper To Go On Market In 2013

    Wifi-Blocking Wallpaper To Go On Market In 2013

    Have you ever wanted to block somebody else’s WiFi out of your living space? Coming soon in 2013, that dream will become reality. To achieve blocking out all outside WiFi signals, a new wallpaper will be unveiled that you can use. This wifi-blocking wallpaper has been made possible through a collaboration of scientists from the “institut polytechnique Grenoble INP” and the “Centre Technique du Papier”.

    The wifi-blocking wallpaper looks like any wallpaper that you can pick up at a local store; however, beneath its pattern (snowflakes) is copper lining that helps to keep wifi signals on one side of the material. If you are not happy with the snowflake pattern, you can add/layer your own preference of wallpaper over the top of it.

    Benefits of utilizing this wifi-blocking wallpaper have been provided below.

    • This wallpaper will be extremely useful in places like hospitals, where wifi signals could be harmful to the other equipment around the hospital.
    • Prevents hackers and wardrivers from accessing your network outside your living space.
    • If you live in an apartment community, only your network will be listed rather than everybody else’s as well.

    An evident downside to the wifi-blocking wallpaper is that it will not block the signal flowing through windows and doors.