Tag Archive for: desperate

Will a Desperate China Take Desperate Measures?


REVIEW: ‘Danger Zone: The Coming Conflict with China’ by Hal Brands and Michael Beckley

Chinese president Xi Jinping / Getty Images

Mike Watson • October 16, 2022 4:59 am

When it comes to the China problem, most Americans have viewed the challenge as holding off a steadily rising China as the United States declines in relative power. In their new book Danger Zone, Michael Beckley and Hal Brands argue that this framing is off. “China will be a falling power far sooner than most people think,” they write. And that spells trouble.

Their book challenges an important piece of conventional wisdom, that rising powers like China are more likely to fight established powers like the United States when they are on the ascent but tend to back off when they pass their peak. Brands and Beckley show this is not necessarily the case. Once they realize that time is no longer on their side, some countries make bigger and bigger gambles to try to stave off stagnation. Germany before World War I and Japan in the leadup to Pearl Harbor are only the two most dramatic of the examples they list.

China’s rise has been remarkable since Mao Zedong’s death, but Beckley and Brands note that China enjoyed many advantages in that period that have eroded away. The United States and its allies embraced China and hoped to reform it through trade for decades; today, China’s aggressive behavior is alarming its neighbors and provoking the strategic encirclement Beijing has long feared. Mao’s successors, particularly Deng Xiaoping, promoted economic reforms and ruled through interparty consensus, but Xi Jinping’s one-man rule threatens to return China to the days of Mao’s erratic and often catastrophic leadership—and the brutal struggles for power when the strongman dies.

What the Marxists in Beijing may appreciate most clearly is the change in material factors. China’s enormous demographic dividend has now expired: In the early 2000s, there were 10 workers for every retiree, but by 2050 there will only be 2. “To prevent senior citizens from dying in the streets,” China will have to devote 30 percent of its GDP to elderly care, as much as it spends on its entire…

Source…

Internet of Things in desperate need of more robust identity and access management


The future of identity and access management in the Internet of Things will escape the confines of user-focused identity and transition toward a more inclusive model, according to a new analysis research report by ABI Research.

The new multi-faced approach will include machine and system identity along with IoT device and platform management operations.

“IAM is yet another identity and security framework that poses significant challenges when crossing from the IT realm onto the IoT,” says Dimitrios Pavlakis, senior cyber security and IoT analyst at ABI Research.

“Most cloud providers regard IAM as a purely user-focused term while other IoT device management and platform providers make references to IAM in device access control,” he says.

“IAM in traditional IT environment is used to streamline user digital identities and to enhance the security of user-facing front-end operations using a variety of management tools, privilege management software and automated workflows to create a user-focused authorisation framework.”

Pavlakis says the explosion of IoT technologies has significantly increased the sheer volume and complexity or interconnected devices, users, systems, and platforms making traditional IT IAM insufficient, if not problematic in some cases. 

“Insufficient access control options, legacy infrastructure and proprietary protocol dependencies, traditionally closed networks, the fervent increase in digitisation, albeit with lackluster security operations, are some of the most prominent challenges for IAM in IoT,” he explains. 

“Regardless of which IAM terminology is used, these challenges along with the highly complex IoT identity value chain point toward a more competent model of IAM, which touches upon various technologies and security protocols to be considered under the IAM umbrella including: user privilege management and on-prem access control, edge-to-cloud integration, cloud directory-as-a-service, system and machine ID, data security and governance, API management, IoT device identity, authentication and access control.”

Pavlakis says the justifiable lack of a unified IoT security standardisation framework, the fact that organisations are always on a…

Source…

A desperate YouTube moderator scam spam

A desperate YouTube moderator scam spam

Times must be getting tough for spammers if they’re having to resort to these types of tricks to get their unwanted messages seen.

Graham Cluley