article thumbnail

US government adds DJI to Commerce blacklist over ties to Chinese government

The Verge

This is likely a reference to DJI’s involvement in providing drones to the Chinese government to surveill detention camps in the Xinjiang provice, as detailed in a Bloomberg Businessweek report. Europe and the UK have largely declined to follow suit and continue to use Huawei hardware in their telecommunications networks.

article thumbnail

Chinese state-sponsored attack uses custom router implant to target European governments

Tech Republic Security

The post Chinese state-sponsored attack uses custom router implant to target European governments appeared first on TechRepublic. Learn technical details about this cyberattack, as well as Check Point Research's tips on how to detect and protect against this security threat.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Florida man arrested for selling $1 billion in fake Cisco hardware online

TechSpot

This week, a federal grand jury indicted a Florida man for allegedly selling more than $1 billion of counterfeit Cisco networking equipment to several individuals, hospitals, schools, government agencies, and even the military.

article thumbnail

How customers capture real economic value with zero trust

CIO Business Intelligence

Hub-and-spoke networks and castle-and-moat security architectures were designed for days gone by when users, apps, and data all resided on premises. Whether it’s for expensive MPLS networks or complex stacks of hardware security appliances for defending network access, massive spend is inevitable.

article thumbnail

Networking the Cloud for IoT - Pt. 1: IoT and the Government

Cloud Musings

Dwight Bu e s & Kevin Jackson This is Part 1 of a three part series that addresses the need for a systems engineering approach to IoT and cloud network design: The “Internet of Things” depends on the “Cloud” for the processing and storage of data. The Cloud’s backbone, however, is the network.

article thumbnail

White House instructs government agencies to beef up cybersecurity, adopt ‘zero trust’ in new memo

The Verge

The White House released a new cybersecurity strategy Wednesday aimed at reducing the risk of cyberattacks against government infrastructure. This zero trust strategy is about ensuring the Federal Government leads by example, and it marks another key milestone in our efforts to repel attacks from those who would do the United States harm.”.

article thumbnail

Prioritizing AI? Don’t shortchange IT fundamentals

CIO Business Intelligence

Fundamentals like security, cost control, identity management, container sprawl, data management, and hardware refreshes remain key strategic areas for CIOs to deal with. What it’s doing is surfacing your lack of governance around your data. But the usual laundry list of priorities for IT hasn’t gone away. But it was.

Hardware 141