From the editor’s desk: Integrate or fail

October 2018 News & Events

The news earlier this month was that Bloomberg Businessweek published a story about Chinese cyber spies (well, with our media it has to be them or the Russians). Apparently, these devious spies had corrupted the supply chain for a company that makes circuit boards in China and inserted a tiny chip on the boards which would allow someone to gain full access to computers and networks.

The accuracy of the story is still not 100% verified, although it is pretty much accepted as accurate. There again, in the current climate of hysterical news opposed by hysterical censorship in the name of propaganda (and not only in America), who can be sure what the facts really are. You can read more at www.bloomberg.com/news/features/2018-10-04/the-big-hack-how-china-used-a-tiny-chip-to-infiltrate-america-s-top-companies (short link: securitysa.com/*bloom1), as well as comments from some of the companies involved at www.bloomberg.com/news/articles/2018-10-04/the-big-hack-amazon-apple-supermicro-and-beijing-respond (short link: securitysa.com/*bloom2), and a good summary of the whole saga at https://krebsonsecurity.com/2018/10/supply-chain-security-is-the-whole-enchilada-but-whos-willing-to-pay-for-it/ (short link: securitysa.com/*krebs3).

We’re not in a position to know how accurate the report is, but it does highlight a common weakness in security all over the world – silos. It’s standard that when a company or individual tries to secure their people, systems and assets, they concentrate on doing what is in their immediate scope and leave the rest to other people – assuming everyone else does the job properly. And this is where the problem lies.

You can make your little world 100% secure (if it was possible), but as soon as you interact with other people and systems, you have strangers coming onto your premises and data going in and out of your systems to unknowns. In other words, your supply chain.

You can’t control what anyone else in your supply chain does or doesn’t do, but working together to integrate your physical and logical security based on industry standards won’t risk anyone’s intellectual property, but will strengthen the chain from beginning to end. Unfortunately, as one of the authors above notes, this will require time and money (and mostly effort and support from the top), which is why it doesn’t happen.

On another cyber/physical security note, you may remember the Mirai botnet from a few years ago that used IoT devices, including DVRs and surveillance cameras, to form a botnet to launch denial of service attacks on some high-level websites – with great success.

Well, the authors of the botnet have been caught and convicted, but won’t spend any time in jail. Due to their “extraordinary cooperation” with authorities, they get probation and community service, and a fine.

Well, fine. To me it seems like a colossal omnishambles, much the same as we saw here with the Brett Kebble murder. I suppose it’s good to know that such Brobdingnagian blundering is not confined to the South African government. (After last month’s new word I discovered and mentioned in my column, someone suggested I introduce a new word in this column as well; so there it is, Brobdingnagian.)

Andrew Seldon

Editor



Credit(s)




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Hytera supports communication upgrade for Joburg
News & Events Infrastructure Government and Parastatal (Industry)
By equipping Johannesburg’s metro police and emergency services with multimode radios which integrate TETRA and LTE networks, Hytera is bridging coverage gaps and improving response times across the city.

Read more...
The global generative AI market surpassed $130 billion in 2024
News & Events AI & Data Analytics
According to a new research report from the IoT analyst firm, Berg Insight, the Generative AI (GenAI) market grew substantially in 2024, experiencing triple-digit growth rates in all three major segments: GenAI hardware, foundation models, and development platforms.

Read more...
Your Wi-Fi router is about to start watching you
News & Events Surveillance Security Services & Risk Management
Advanced algorithms are able to analyse your Wi-Fi signals and create a representation of your movements, turning your home's Wi-Fi into a motion detection and personal identification system.

Read more...
ProtecLink 2025: Ithegi Electronics supports a safer, smarter security ecosystem
News & Events
If you are a security buyer, operations lead, or technology partner, do not miss ProtecLink 2025, to be held in Polokwane on 16 September 2025, at the Polokwane Royal Hotel.

Read more...
Directory of suppliers
Technews Publishing SMART Security Solutions Fire & Safety
The Directory of Product and Solution Suppliers for the fire safety industry includes details of companies that provide security and risk mitigation products, advice, and services within this market.

Read more...
Fire safety in commercial kitchens
Technews Publishing Kestrel Distribution Products & Solutions Fire & Safety Commercial (Industry)
Fire safety in commercial kitchens is becoming increasingly critical. Defender is Europe’s first EN 17446:2021-approved kitchen hood fire suppression system and offers the indispensable safety measures required.

Read more...
IZI Group acquires G4S Cash Solutions South Africa
News & Events
IZI Africa, a sister company within the IZI Group, has acquired G4S Cash Solutions (SA) following the receipt of all necessary regulatory approvals. This transaction marks a significant consolidation in the South African cash handling industry.

Read more...
Secutel maintains ISO certifications
News & Events Fire & Safety
Secutel Technologies has successfully recertified all four of its ISO standards, a reflection of its continued commitment to excellence, client trust, and operational integrity.

Read more...
SABRIC appoints Andre Wentzel as interim CEO
News & Events Financial (Industry) Associations
The South African Banking Risk Information Centre (SABRIC) has announced the appointment of Andre Wentzel as interim chief executive officer, effective immediately.

Read more...
Choicejacking bypasses smartphone charging security
News & Events Information Security
Choicejacking is a new cyberthreat that bypasses smartphone charging security defences to confirm, without the victim’s input or consent, that the victim wishes to connect in data-transfer mode.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.