![]() ![]() For this reason, much of the company’s security software is open source, much like Netflix’s.Ĭyber security has become too important to leave to a few nameless IT experts working deep in the bowels of a bank, government agency, or hospital. These centres operate under the philosophy that involving more eyes and more hands will make cyber security stronger. Huawei, for example, has opened Transparency Centres in China, Canada, and four European countries where customers or governments (this varies by location) can inspect the inner workings of its products, including their source codes. Some telecom equipment makers are going further to make themselves more open. ![]() NESAS also features a dispute resolution mechanism to deal with grievances from companies that believe their products, or those of competitors, were not fairly evaluated. This globally-recognised system tests not only products, but also how they are developed and maintained (including the installation of firmware updates). The best one we have currently, although it still has room for improvements, is the Network Equipment Security Assurance Scheme, or NESAS. To secure networks and devices, the industry has developed security assurance systems that are constantly being strengthened further. Yet, the dawn of the 5G era has posed a particular challenge, because as all devices are progressively connected to the Internet, security standards for telecom have needed to become more stringent. Increasingly, independent laboratories issue globally recognised security certificates for a growing range of telecom products. The industry now provides a model of openness – one that could inspire practices in other industries.įor several years now, equipment vendors have been constantly developing new ways to meet the concerns of both governments and customers through more transparency. For this reason, makers of electric vehicles need to be extremely open about their cyber security so that owners, or trusted experts, can assess if the company’s systems offer effective protection.Īlthough they do not themselves manage data, telecom equipment makers take their responsibility in supplying network operators just as seriously as makers of electric cars. Naturally, car owners want certainty that this does not expose them to hacking, remote carjackings and shut downs, or being spied on as they drive. To deliver updates, an electric car maker requires worldwide access privileges to the on-board computers on its cars. For example, Tesla distributes updates to owners at least once per month. ![]() Many models require extremely sophisticated software that has to be updated frequently. Secrecy in cyber security puts everyone at risk: the company, its customers, and its suppliers.Įlectric vehicles serve as a good example of the value of openness in cyber security. The less hackers know about how a company guards its data, the safer the data becomes, according to this line of thinking. You might expect that companies would be better off keeping their cards close to their chest. Netflix saw that harnessing the world’s pool of programmers to build its security software actually made the company, and its data, more secure. In response to the Dark Overlord hack, it developed dozens of open-source cybersecurity products that other companies are allowed to use freely. What makes Netflix unusual is how transparent it has become about its cyber defences. Of course, many companies have digital assets to secure. The worst incident occurred in 2017, when a group called Dark Overlord broke in and released some new episodes of Orange is the New Black on the Internet. #Security obscurity seriesNetflix also wants to keep its popular TV series beyond the reach of those who try to view the content without paying.įor a company with so much digital treasure, Netflix hasn’t had many security mishaps. ![]() Tens of millions of households entrust the company with their personal information, including credit card details and the viewing habits of each family member. Netflix has a lot of valuable data it needs to protect from hackers. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |