tag:blogger.com,1999:blog-4088979.post3269673519099927351..comments2023-10-16T06:06:25.012-04:00Comments on TaoSecurity Blog: India v ChinaRichard Bejtlichhttp://www.blogger.com/profile/13512184196416665417noreply@blogger.comBlogger5125tag:blogger.com,1999:blog-4088979.post-79488395945079490122010-09-13T18:07:57.927-04:002010-09-13T18:07:57.927-04:00The new wars will not be fought using the latest m...The new wars will not be fought using the latest millitary weapons, neither will it be through flying planes into buildings.<br /><br />The new war to be fought will be purely based on information espionage. Countries and especially organisations will rise and fall depending on how vulnerable they become due to their inability to persistently protect their data.Peter Abatanhttp://www.enterprisedrm.infonoreply@blogger.comtag:blogger.com,1999:blog-4088979.post-64502059964459067222010-09-08T19:06:11.320-04:002010-09-08T19:06:11.320-04:00No surprise that China is targeting India with tar...No surprise that China is targeting India with targeted information espionage (and likely vice versa). From different magazines China is a bit threatened that India is building its economy more like the US. vs a low wage manufacturing economy like China has mostly had. India is well positioned to be the dominant economic player in the region due to taking this approach and an overall greater entrepreneurial spirit then China on average.Mark Kellyhttp://informationsecurityhq.com/noreply@blogger.comtag:blogger.com,1999:blog-4088979.post-2699618121777966972010-09-07T12:28:01.811-04:002010-09-07T12:28:01.811-04:00The recent Bradley Manning espionage case along wi...The recent Bradley Manning espionage case along with the press about "Operation Buckshot Yankee" continue to show that information is a valuable target. Further, disgruntled insiders or even guests, once inside, can often exceed authorization and gain access to a network worth of information.<br /><br />Firewalls are necessary to protect against the external threat, of course. However, internal security controls and effective logging are becoming necessary as well.Steven Braniganhttp://sbranigan.wordpress.comnoreply@blogger.comtag:blogger.com,1999:blog-4088979.post-81871725160484788022010-09-07T10:17:22.000-04:002010-09-07T10:17:22.000-04:00India is one of seven nations that produces a comb...India is one of seven nations that produces a combat aircraft themselves. I believe it is called the LCA. Brazil, of course, has rocket launching facilities. Thise "developing powers" are already developed in certain sectors, so they struggle with the same security problems as Europe and the US.Unknownhttps://www.blogger.com/profile/12759116729579018689noreply@blogger.comtag:blogger.com,1999:blog-4088979.post-80714758707358656352010-09-07T09:34:03.692-04:002010-09-07T09:34:03.692-04:00You know me too well, Richard. I'm working on ...You know me too well, Richard. I'm working on that very thing for a presentation at Blackhat Abu Dhabi, should it be selected. If I don't make the cut, I'll publish it at Forbes Firewall and ping you. :-)greylogichttps://www.blogger.com/profile/11315329325360540828noreply@blogger.com