Visit Our E2 Forums |
Education |
Financial Services |
Government |
Healthcare |
Manufacturing |
Retail
|
||||||
![]() |
||||||
![]() |
||||||
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
When Cyber Threats Become Cyber AttacksBruce Rayner, Contributing Editor, Enterprise Efficiency OEM | 4/6/2012 |
Two news items about US-China relations caught my eye this week. The first was a New York Times article about a Brookings Institution report that revealed the distrust between the two countries has "grown to a dangerous degree."
![]() The second was a Wall Street Journal article that quoted the FBI's top cyber official saying US companies were failing to protect corporate networks from exploitation, including from hackers in China. The two are connected. China believes that its time has arrived -- that it will displace the US as the world's largest economy in a matter of years, not decades, said Wang Jisi, an advisor to the Chinese Communist Party. The national policy of "keeping a low profile" will end with the departure of China's President Hu Jintao at the end of this year, Wang was quoted as saying in The New York Times. As China flexes its muscles and the US responds, relations could devolve to "open antagonism," according to the Brookings Institution. Increasingly US OEMs will be caught in the crossfire. Competition from Chinese companies has been intensifying in recent years in virtually all markets from automotive to communications to medical -- even military and aerospace hardware. A deterioration of relations will impair manufacturing operations and disrupt global supply chains. It will be important for companies that have international operations to develop contingency plans. Case in point is the deployment of 180 US Marines to Darwin, Australia, this week, ahead of 2,500 Marines that will be stationed there as part of a US-Australian agreement. China is not happy with the show of force in its regional backyard. It's worth keeping an eye on China's reaction in the coming months. As for countering cyber-threats, Shawn Henry, the outgoing executive assistant director of the FBI's Criminal, Cyber, Response, and Services Branch, said in an interview earlier this week that the US was "not winning" the war on cyber-crime and that companies need to change the ways they protect, police, and use computer networks, The Wall Street Journal reported. In one corporate case, hackers stole 10-year's worth of intellectual property valued at over $1 billion, the FBI's Henry said. Many of these threats are alleged to be coming from China, and US companies remain clueless. According to one source that tracked intrusions back to Chinese hackers, 94 percent of the targeted companies didn't realize they had been breached. The median number of days between the start of an intrusion and detection was 416. Henry believes the way companies are fighting cyber-attacks is unsustainable: "Unsustainable in that you never get ahead, never become secure, never have a reasonable expectation of privacy or security." Needless to say, CEOs and CFOs need to lead the charge to change their strategies and tactics to protect networks and company IP. Given the stakes, they need to arm CIOs to the teeth with tools to protect their corporate assets. Rising tensions between the US and China are potentially going to lead to more cyber-espionage -- in both directions -- and will require new strategies and more resources by companies to protect their assets. But there's a more sinister prospect lurking in the shadows, one that companies should not ignore. Consider a cyber-attack, traced to China, on a US government agency, defense contractor, national lab, nuclear power plant, or other facility that has "national security" implications. Up till now, according to one IT security expert, the US government has been very specific about classifying such breaches as "exploitation." It has never classified one as an "attack." But if it were to do so, it raises questions about the prospect of military retaliation -- either physical or cyber, or both. This is a very gray area. And no one knows what exactly a cyberwar would look like. But given the news of the week, it's worth thinking about the impact it would have on your business. Related posts: The blogs and comments posted on EnterpriseEfficiency.com do not reflect the views of TechWeb, EnterpriseEfficiency.com, or its sponsors. EnterpriseEfficiency.com, TechWeb, and its sponsors do not assume responsibility for any comments, claims, or opinions made by authors and bloggers. They are no substitute for your own research and should not be relied upon for trading or any other purpose. |
![]() |
![]() |
![]() |
More Blogs from Bruce Rayner
Bruce Rayner 7/20/2012
![]() Earlier this month we witnessed a little scuffle involving Apple that sheds light on perhaps the most important challenge the electronics industry faces: how to balance environmental ...
Bruce Rayner 7/13/2012
![]() The tectonic plates of global manufacturing are starting to shift -- and the consequences could be dramatic.
Bruce Rayner 6/29/2012
![]() There was a piece in today's New York Times about Google's domestic manufacturing experiment. Seems the company's Nexus Q, a just-released home media player, is not only being designed in ...
Bruce Rayner 6/15/2012
![]() When we think of global companies, we typically think of the Fortune 500. These are big companies with their names plastered on shiny office buildings in cities like Berlin, London, ...
Bruce Rayner 6/8/2012
![]() Last year, 2011, was a calamitous year for OEMs as weird weather wreaked havoc on their supply chains. Perhaps the worst climate-related catastrophe from a supply-chain standpoint was the ...
E2 IT Migration Zones
![]() Why PowerShell Is Important
Reduce the Windows 8 Footprint for VDI
Rethinking Storage Management
![]() SQL Server : 240 To de mémoire flash pour votre data warehouse
Quand Office vient booster les revenus Cloud et Android de Microsoft
Windows Phone : Nokia veut davantage d'applications (et les utilisateurs aussi)
![]() Cloud Computing: Warum Unternehmen trotz NSA auf die „private“ Wolke setzen sollten
Cloud Computing bleibt Wachstumsmarkt – Windows Azure ist Vorreiter
Like Us on Facebook
Site Moderators Wanted
Enterprise Efficiency is looking for engaged readers to moderate the message boards on this site. Engage in high-IQ conversations with IT industry leaders; earn kudos and perks. Interested? E-mail:
moderators@enterpriseefficiency.com SPONSORED BY DELL
CASE STUDIES
![]() ![]() ![]() ![]() ![]() ![]() VIDEOS
![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() A Video Case Study – Translational Genomics Research Institute e2 OEM Video
|
||
![]() |
||||||
![]() |
||||||
![]() |
||||||
|