sb-as logo
Story image

Critical lessons businesses can learn from Huawei - Memset

17 Jun 2019

Following the recent announcement that the Chinese tech giant Huawei has scrapped its laptop launch, Memset CCO Chris Burden says that business leaders need to start having a closer attentiveness to data sovereignty. While a lot of talk has been about increasing barriers for IT hardware supply chains, data is just as important and could easily turn into a geopolitical bargaining chip.

Burden explains, “For most companies outside of regulated sectors, past concerns about data sovereignty were arranged around the level of trust in overseas countries’ environments and a desire to have a clear knowledge of where their data was stored.

“Having a specific place where IT leaders could visit to make sure everything was as it should be is important. However, as the use of public cloud has become more ubiquitous, the geographical whereabouts of data have become less important. This could be about to change.”

In the past ten years, there has been a growth of three paradigms for the internet and control of data.

  • A de-regulated, free-wheeling system in the US that favours businesses
  • An authoritarian, highly controlled internet and data surveillance exhibited by China and Russia behind – designed to give greater control to the state;
  • And a regulated, rules-based approach with the protection of the consumer at its heart, exhibited by the European Union.

However, the recent statements from the US and its blocking of Huawei, the EU’s increasingly aggressive investigations into Big Tech businesses and China and Russia’s move to separate their internet from the rest of the world demonstrate that the different world-views are becoming increasingly hostile to each other.

Burden continues, “The geopolitical climate might seem a long way from many businesses and their decisions on where to store their data.

“However, things could change quickly. A growth in regulatory divergence, threats to global supply chains – which include the handling of data – and the use of technology as bargaining chips in international trade relationships could quickly have a host of ramifications for SMEs."

“Data sovereignty is important and should not just be an afterthought when appointing a cloud provider."

“Suppliers should be able to actively respond with a commitment to only keep data in certain jurisdictions and be able to provide evidence to their customers that they are meeting those commitments. They should also be able to easily adapt to changing sovereignty issues and adjust the storage of data easily."

“Having a clear sense of where your data is and what rules you need to abide by are not only good housekeeping but could be fundamental for the success of businesses."

Story image
Remote workers need to improve security measures amidst COVID-19
Technological support and security measures are amongst ways organisations and their employees can protect their business as they move to remote working during the COVID-19 pandemic. More
Story image
Marriott International reports breach affecting 5.2 million customers
Marriott said in statement that an ‘unexpected’ amount of guest information may have been accessed in mid-January this year, using the login credentials of two employees at one of the company’s franchise properties.More
Story image
ForgeRock appoints new execs to lead IAM growth
“Identity and Access Management is foundational to a modern security architecture especially now as we are experiencing a paradigm shift towards Zero Trust."More
Story image
80% of cyber threat landscape uses COVID-19 as leverage - report
A report released recently by Proofpoint reveals the extent to which cyber attackers are capitalising on fear and paranoia surrounding the pandemic, with instances of coronavirus-themed attacks increasing every day.More
Story image
Email attacks up 667% following rise of COVID-19 worldwide
Of the COVID-19 related attacks detected by Barracuda Sentinel through March 23, 54% were scams, 34% were brand impersonation attacks, 11% were blackmail, and 1% are business email compromise.More
Story image
Mentorship key to bringing women into cybersecurity - Microsoft
“Diverse teams make better and faster decisions 87% of the time compared with all male teams, yet the actual number of women in our field fluctuates between 10 and 20%. What ideas have we missed by not including more women?”More