InvestorsHub Logo
Followers 5
Posts 2595
Boards Moderated 0
Alias Born 09/06/2006

Re: None

Wednesday, 05/01/2019 5:07:31 PM

Wednesday, May 01, 2019 5:07:31 PM

Post# of 248841
Putin Signs Controversial Internet Law

https://www.securityweek.com/putin-signs-controversial-internet-law

President Vladimir Putin on Wednesday signed into law a "sovereign internet" bill which will allow Russian authorities to isolate the country's internet, a move decried by rights groups.

Russian lawmakers insist the new law is necessary to ensure the security of Russia's online networks but critics say the vaguely worded bill gives new censorship powers to government monitors.

The text of the law was published Wednesday but it will not come into effect until November.

The measures include creating technology to monitor internet routing and to steer Russian internet traffic away from foreign servers, ostensibly to prevent a foreign country from shutting it down.

The authors of the initiative say Russia must ensure the security of its networks after US President Donald Trump unveiled a new American cybersecurity strategy last year that said Russia had carried out cyber attacks with impunity.

Thousands of people recently rallied in Russia against this and other bills that critics say aim to restrict information and communication online.

Separately, Putin in March signed controversial laws that allow courts to fine and briefly jail people for showing disrespect towards authorities, and block media for publishing "fake news".

The laws are part of an ongoing Kremlin clampdown on media and internet freedoms that has seen people jailed for sharing humorous memes.

Last week 10 international rights organisations called on Russia to scrap the internet bill.

"The bill created a system that gives the authorities the capacity to block access to parts of the Internet in Russia," said a statement backed by Human Rights Watch, Reporters Without Borders and others.

The blocking would be "extrajudicial and non-transparent," the statement said.

Under the new law Russian Internet access providers will also need to ensure that their networks have the technical means for "centralised traffic control" to counter potential threats.

This control will pass notably to the Russian FSB security service and the telecoms and media monitoring agency Roskomnadzor, which is often accused of arbitrarily blocking content on the web.

In recent years Russian authorities have blocked online sites and content linked to the opposition, as well as internet services which fail to cooperate with them, including the Dailymotion video platform, the Linkedin online social networking site and the encrypted messaging app Telegram.
==================================================================
In the event that the U.S. chooses to use cyberweapons against Russia, this isolation of Russia's internet stands as a defense to those cyberweapons. The U.S. probably will not pass a law similar to this law by Russia so the U.S. needs a credible cyber defense against Russia. Defending the U.S. with activated TPMs would be a better solution given the logistical problems and protests with the isolation of the U.S. internet. A little security chip on most business computers, the TPM is backed by 150+ companies and is an international standard!! Software only solutions would easily leave the U.S. defeated in a large cyberattack by Russia. Hardware security (TPMs activated and SEDs) and software security combined that are proven could give the U.S. and its Allies a great defensive posture against a large possible cyberattack!!

Wave has great TPM solutions, and Wave SED management that could save many organizations from terrible cyberattacks!! Please see the Wave Alternative below which could protect organizations in the event of a large cyberattack. Some previous posts may be helpful as well.
==================================================================
https://www.wavesys.com/

https://www.wavesys.com/wave-alternative

The IT perimeter is gone

With tablets, smartphones, and cloud applications, your employees can access sensitive data anytime, from anywhere. Indeed, around 70 percent of security breaches and data thefts are inside jobs. Meanwhile, the hackers only get better: advanced persistent threats (APTs) appear as normal traffic, and malware can go unnoticed for weeks.

It’s a new world, one without borders. Yet most organizations are still trying to protect their data with the same old firewalls and antivirus software. It’s not working. We refer you to the headline-making breach of the week.

You have to start with the device

Wave has an alternative: security that’s built into each and every device.

We’re talking about hardware: self-encrypting drives (SEDs), which protect data when a device is stolen or lost, and trusted platform modules (TPMs), or embedded security chips. Both go in at the factory, and increasingly, both are standard. They make it possible for you to monitor and control each individual device and its data, no matter where it is. But you need software to turn on and manage your SEDs and TPMs. Wave makes that software.

We’ve been refining comprehensive, centralized management of hardware-based security longer than anyone else. More than that, we’ve shaped the field as a founding member of the Trusted Computing Group, the not-for-profit that develops and promotes industry standards for the hardware.

Security that’s confirmed, not assumed

With Wave, you’ll know that you’re secure. Because we start with the individual devices, you get a broad, deep view of your network. You can see exactly who’s on it, with what devices and what apps, at any given time. Just for example, if Bob goes home and tries to log onto Facebook with the company laptop, Wave can stop him.

A big piece of this heightened security is device authentication. Traditional two-factor authentication requires what amounts to two user IDs. But by using the TPMs inside your devices, Wave can confirm the identity of not only users, but also the devices they’re on. Combine that with fast, enforced encryption of sensitive data via your SEDs—all easily managed with Wave software—and your data is protected from the full range of modern risks: device theft, missent emails, flash drives, portable hot spots … even (and no one else can say this) hardware keyloggers. Not to mention Bob.

Do we need to say that with Wave, compliance is no problem?

Start closing your security gaps today, with what you’ve got

You might be surprised to hear that 90 percent or more of your computers probably already have TPMs. Mobile devices are catching up fast. SEDs are newer, but you probably have a bunch of those too. Machines that don’t have them can often be outfitted at little to no extra cost. So you’ve got some or all of the hardware. All you need to do is turn it on with Wave.

It’s almost as easy as it sounds. TPMs and SEDs are built to open, vendor-neutral industry standards, and so are Wave solutions. That means Wave works on your existing mix of hardware, across platforms, and will evolve with you. It’s part of what makes the Wave alternative not only more secure, but also simpler and cheaper. Total cost of ownership for Wave data protection can be almost half that of a traditional software-based system.

Questions? Read on, or contact our sales department.

















Join the InvestorsHub Community

Register for free to join our community of investors and share your ideas. You will also get access to streaming quotes, interactive charts, trades, portfolio, live options flow and more tools.