Tag Archives: infrastructure

My latest Gartner research: Vendor Rating: Huawei

5 December 2017  |  Huawei’s transition from being an ICT technology provider to providing both ICT infrastructure and cloud services in China has had impacts domestically and abroad. This research enables infrastructure and operations leaders to assess Huawei’s technology and supplier management risks and benefits….

Gartner clients can access this research by clicking here.




Facebooktwittergoogle_plusredditpinterestlinkedinmail

Gartner Says The Transition of The Indian Banking Sector To Cashless Society is Driving Increased Technology Investments

The transition of the Indian banking sector to a cashless society is creating many opportunities for technology investment in digital payments infrastructure, according to Gartner, Inc. IT spending in banking and securities firms in India will increase 11.7 percent in 2017 to reach $9.1 billion.

My latest Gartner research: Vendor Rating: Huawei

Huawei has established itself as a solid provider of ICT infrastructure technologies across consumer, carrier and enterprise markets worldwide. CIOs and IT leaders should utilize this research to familiarize themselves with Huawei’s “all-cloud” strategy and ecosystem development….

Gartner subscribers can access this research by clicking here.


Facebooktwittergoogle_plusredditpinterestlinkedinmail

[ISN] The Drug Cartels’ IT Guy

http://motherboard.vice.com/read/radio-silence By Brian Anderson motherboard.vice.com March 3, 2015 It could have been any other morning. Felipe del Jesús Peréz García got dressed, said goodbye to his wife and kids, and drove off to work. It would be a two hour commute from their home in Monterrey, in Northeastern Mexico’s Nuevo León state, to Reynosa, in neighboring Tamaulipas state, where Felipe, an architect, would scout possible installation sites for cell phone towers for a telecommunications company before returning that evening. That was the last time anyone saw him. Felipe’s wife, Tanya, is haunted by his disappearance. “All this time I’ve spent searching for his whereabouts,” she told me. Felipe was 26, with clear hazel eyes and a wide mouth, when he disappeared on March 19, 2013, just under two years ago. It’s a story, or lack thereof, that’s common across Mexico. People vanish, and the vast majority of cases aren’t solved for years, if they’re ever closed at all. Tanya is just one of the bereaved in an expanding web of loved ones and friends left with more questions than answers, and a collective resolve to seek justice for los desaparecidos. They’re waiting for the phone to ring. Only this story is, perhaps, not just another kidnapping. What happened to Feli​pe Peréz? One theory suggests he was abducted by a sophisticated organized crime syndicate, and then forced into a hacker brigade that builds and services the cartel’s hidden, backcountry communications infrastructure. They’re the Geek Squads to some of the biggest mafia-style organizations in the world. That’s how Tanya sees it, at least. She looks at the rash of kidnapping cases across Mexico, many of which have taken place in Tamaulipas, targeted specifically at architects, engineers, and other information technology types, and can’t help but think Felipe was one of them. Nearly 40 information technology specialists have disappeared in Mexico s​ince 2008, allegedly nabbed by one of the two dominant gangs in the region, the Cartel del Golfo or Los Zetas. […]


Facebooktwittergoogle_plusredditpinterestlinkedinmail

[ISN] Europol disrupts cybercrime ring that infected millions of PCs

http://uk.reuters.com/article/2015/02/25/uk-cybersecurity-europe-idUKKBN0LT0U020150225 BY ANTHONY DEUTSCH AND JIM FINKLE AMSTERDAM/BOSTON Reuters.com Feb 25, 2015 (Reuters) – A cybercrime operation that stole banking information by hacking more than 3 million computers in Indonesia, India and other countries has been disrupted by European police with assistance from three technology companies, officials said on Wednesday. The European Cybercrime Centre at Europol, the European police agency, coordinated the operation out of its headquarters in The Hague, targeting the so-called Ramnit botnet, a network of computers infected with malware. Working with investigators from Germany, Italy, the Netherlands and Britain, it was assisted by AnubisNetworks, a unit of BitSight Technologies; Microsoft Corp and Symantec Corp in dismantling the server infrastructure used by the criminals, Europol said. “The criminals have lost control of the infrastructure they were using,” Paul Gillen, head of operations at Europol’s cybercrime centre, told Reuters. […]


Facebooktwittergoogle_plusredditpinterestlinkedinmail

[ISN] Auto industry gears up to stop hackers

http://www.freep.com/story/money/cars/mark-phelan/2015/02/18/cyber-security-hacking-auto/23571009/ By Mark Phelan Detroit Free Press Auto Critic February 18, 2015 Cars may become tempting targets for hackers looking to wreak havoc, and the auto industry is just beginning to face the challenge of stopping them, a panel of experts said at a conference in suburban Detroit Tuesday. Current vehicles are very vulnerable. A 14-year-old kid armed with a $14 circuit board built from Radio Shack parts cracked a new car’s the security at a hack-a-thon supplier Delphi sponsored last summer, Delphi senior vice president and chief technologist Andrew Brown Jr. told a cyber-security conference sponsored by the Center for Automotive Research. Connected cars that share information with each other and have internet and wi-fi service present automakers with myriad new challenges – and vast opportunities for hackers, Frost & Sullivan research manager Praveen Narayanan said. Cars presenting a tempting target not because hackers want to mess with a single driver, but because the car will be communicating with other vehicles, the infrastructure and finance networks, Anuja Sonalker of Battelle said. […]


Facebooktwittergoogle_plusredditpinterestlinkedinmail

[ISN] The World’s Email Encryption Software Relies on One Guy, Who is Going Broke

http://www.propublica.org/article/the-worlds-email-encryption-software-relies-on-one-guy-who-is-going-broke By Julia Angwin ProPublica Feb. 5, 2015 Update, Feb. 5, 2015, 8:10 p.m.: After this article appeared, Werner Koch informed us that last week he was awarded a one-time grant of $60,000 from Linux Foundation’s Core Infrastructure Initiative. Werner told us he only received permission to disclose it after our article published. Meanwhile, since our story was posted, donations flooded Werner’s website donation page and he reached his funding goal of $137,000. In addition, Facebook and the online payment processor Stripe each pledged to donate $50,000 a year to Koch’s project. The man who built the free email encryption software used by whistleblower Edward Snowden, as well as hundreds of thousands of journalists, dissidents and security-minded people around the world, is running out of money to keep his project alive. Werner Koch wrote the software, known as Gnu Privacy Guard, in 1997, and since then has been almost single-handedly keeping it alive with patches and updates from his home in Erkrath, Germany. Now 53, he is running out of money and patience with being underfunded. “I’m too idealistic,” he told me in an interview at a hacker convention in Germany in December. “In early 2013 I was really about to give it all up and take a straight job.” But then the Snowden news broke, and “I realized this was not the time to cancel.” […]


Facebooktwittergoogle_plusredditpinterestlinkedinmail

[ISN] What every utility should know about the new physical security standard

http://www.intelligentutility.com/article/15/01/what-every-utility-should-know-about-new-physical-security-standard By William E. Reiter intelligentutility.com Jan 29, 2015 On April 16, 2013, an incident in San Jose, California, led to development of a new physical security standard for owners and operators of transmission stations and substations. In the 2013 incident, a sniper attack on a Pacific Gas & Electric transmission substation knocked out 17 large transformers that powered Silicon Valley. The sniper attack served as a dramatic wake-up call for the industry and raised fears regarding the vulnerability of the nation’s power grid to terrorist attack. The more than 160,000 transmission line miles that comprise the U.S. power grid are designed to handle natural and man-made disasters, as well as fluctuations in demand; but what about physical attack? As a result of the San Jose assault, the Federal Energy Regulatory Commission (FERC) in April 2014 required the North America Energy Reliability Corporation (NERC) to establish Critical Infrastructure Protection (CIP) standards to “address physical security risks and vulnerabilities related to the reliable operation” of the bulk power system. NERC developed and issued what is now commonly referred to as CIP-014-1. This is a physical security standard that has a stated purpose to identify and protect transmissions stations and transmission substations and their associated primary control centers that—if rendered inoperable or damaged as a result of a physical attack—could result in uncontrolled separation or cascading within an interconnection. […]


Facebooktwittergoogle_plusredditpinterestlinkedinmail