- The Strategist - https://aspistrategist.ru -

Cyber wrap

Posted By on July 8, 2015 @ 13:42

Hillary Clinton [1]

Cyber security has impacted on the US Presidential race this week, with Hillary Clinton condemning [2] Chinese hacking at a campaign event. Her commentary—that the Chinese are ‘trying to hack into anything that doesn’t move’—was part of a longer discussion on US–China competition in the Asia–Pacific, which indicates that cyber security and foreign policy will likely be linked on the campaign trail. China has dismissed [3] Clinton’s claims and drew attention to last week’s agreement with Secretary of State John Kerry to cooperate on cybersecurity threats. The US and Brazil have also agreed [4] to recommence cyber policy dialogues after the Snowden-induced freeze.

Meanwhile, US and British security agencies have wrapped up [5] a three week long cyber war game in Virgina. They invited representatives from the banking and energy sectors to participate in scenarios that affected their industries. They probably should have invited Home Depot and Walmart too, as US defence contractors scored lower than financial institutions and retailers on BitSight’s ranking [6] of US corporate cyber defence capabilities. On the west coast, the FBI [7] are trying to solve a series of fibre optic cable cutting incidents that have blacked out internet and phone services from Sacramento to Seattle.

China has continued its legislative efforts to protect itself from cyber threats through the new National Security Law [8] on 1 July. The law calls for secure and controllable information architecture in critical sectors and a national security review and supervision system to examine foreign investments and technology that may impact national security. This has renewed [9] concern among tech firms that they’ll be forced to hand over intellectual property before being authorised to operate in China. Chinese officials [10] have defended the law on the basis that internet sovereignty is an extension of national sovereignty. Similarly, the Chinese ambassador to the UN has opposed [11] the perceived marginalization of governments in internet governance at the expense of NGOs and corporations.

Australia’s banking, insurance and superannuation regulator APRA has written [12] to its industry charges about the risk of outsourcing shared computing services—including cloud services—as banks seek to reduce costs through complex IT outsourcing arrangements. APRA noted that weaknesses in outsourcing arrangements exposed institutions to financial risk, and has urged prudence and appropriate consideration of IT risk and assurance mechanisms when engaging these services. In the Australian mining sector, concern about cyber security threats is also growing [13], with some resource company executives now taking extra precautions with personal electronic devices when travelling, especially to China.

Tech firm lobby group BSA released [14] their inaugural Asia–Pacific Cybersecurity Dashboard this week, evaluating ten regional countries’ cyber security policy frameworks and how well they enable public and private actors to cope with cyber threats. Australia compared favorably to most of the region, although the lack of a formal public-private partnership or sector specific cyber security plans was notable when compared with pack-leader Singapore.

Proving that even the best cyber security skills aren’t a sure guarantee of security, controversial Italian company Hacking Team [15] has become the latest victim of a data spill. Listed as an enemy of the internet by Reporters Without Borders for its ‘no questions asked’ [16] cyber surveillance and espionage exports, it appears that Hacking Team has been selling its wares around the globe including unlikely destinations such as Sudan [17], and US security agencies including the NSA and the DEA.

And finally, the Irish Government has released their National Cyber Security Strategy [18] this week, which will see the Irish CERT transformed into a National Cyber Security Centre by 2017.



Article printed from The Strategist: https://aspistrategist.ru

URL to article: /cyber-wrap-78/

URLs in this post:

[1] Image: https://aspistrategist.ru/wp-content/uploads/2015/07/459273330_531317fec6_z.jpg

[2] condemning: http://www.bbc.com/news/world-us-canada-33399711

[3] dismissed: http://thehill.com/policy/cybersecurity/246916-china-pushes-back-against-clinton-on-cyber

[4] agreed: http://thehill.com/policy/cybersecurity/246549-us-brazil-to-restart-long-dormant-internet-working-group

[5] wrapped up: http://www.scmagazineuk.com/us-agencies-join-brits-in-cyber-war-games/article/424710/

[6] ranking: http://www.nextgov.com/cybersecurity/2015/07/pentagon-contractors-ranked-below-retailers-and-banks-when-it-comes-cybersecurity/116899/

[7] FBI: http://www.thedailybeast.com/articles/2015/07/04/who-s-cutting-california-internet-cables-the-fbi-has-no-idea.html

[8] National Security Law: https://www.lexology.com/library/detail.aspx?g=b24c8ae0-0509-492b-b7ed-21ae34b8ba0a

[9] renewed: http://www.bbc.com/news/world-asia-china-33340322

[10] officials: http://www.globaltimes.cn/content/928808.shtml

[11] opposed: http://english.cntv.cn/2015/07/02/VIDE1435837809198235.shtml

[12] written: http://www.theaustralian.com.au/business/financial-services/apra-to-tighten-cyber-supervision/story-fn91wd6x-1227431301490

[13] growing: http://www.abc.net.au/news/2015-06-30/australian-miners-increasingly-targeted-by-hackers-report-warns/6584172

[14] released: http://www.zdnet.com/article/apac-nations-slow-to-establish-cybersecurity-strategiesapac-nations-slow-to-establish-cybersecurity/

[15] Hacking Team: http://www.npr.org/sections/thetwo-way/2015/07/06/420554427/controversial-italian-cyber-espionage-company-is-hacked

[16] no questions asked’: http://surveillance.rsf.org/en/

[17] Sudan: http://www.defenseone.com/technology/2015/07/someone-just-leaked-price-list-cyberwar/117043/

[18] National Cyber Security Strategy: http://www.dcenr.gov.ie/Communications/Business+and+Technology/Cyber+Security/National+Cyber+Security.htm

Copyright © 2024 The Strategist. All rights reserved.