{"id":10732,"date":"2012-02-24T10:42:00","date_gmt":"2012-02-24T15:42:00","guid":{"rendered":"http:\/\/devweb.rjrinnovations.com\/cybersecurity-threats-to-communications-networks-and-private-sector-responses-part-4-2\/"},"modified":"2012-02-24T10:42:00","modified_gmt":"2012-02-24T15:42:00","slug":"cybersecurity-threats-to-communications-networks-and-private-sector-responses-part-4-2","status":"publish","type":"post","link":"https:\/\/www.rjrinnovations.com\/fr\/cybersecurity-threats-to-communications-networks-and-private-sector-responses-part-4-2\/","title":{"rendered":"&#8220;Cybersecurity: Threats to Communications Networks and Private-Sector Responses&#8221; &#8211; Part 4"},"content":{"rendered":"<p>Testimony of Bill Conner, President and CEO of Entrust<\/p>\n<p>Before the Subcommittee on Communications and Technology<br \/>of the Energy and Commerce Committee<br \/>U.S. House of Representatives<\/p>\n<p>Part 4<\/p>\n<p>Moore&#8217;s Law<\/p>\n<p>To put this all in context, hardware technology follows Moore&#8217;s Law, which states that capacity doubles and cost halves every 18 months. In the new cyber world, software tools are changing in days, not years, and in many cases hours or even minutes. That makes it a constant real-time battle for all of us.<\/p>\n<p>We are facing a wide range of extremely dangerous enemies armed with expensive and sophisticated hardware, software and boldness. They function in an environment where their white-collar crime, even if identified and apprehended, brings only minimal punishment. This is because most of these attacks are across sovereign borders around the globe.<\/p>\n<p>The good news is that technology and solutions exist today to thwart these cybercriminals. However, it must be applied consistently and universally to deny cybercriminals the easy access they have today.<\/p>\n<p>By Bill Conner<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Testimony of Bill Conner, President and CEO of Entrust Before the Subcommittee on Communications and Technologyof the Energy and Commerce CommitteeU.S. House of Representatives Part 4 Moore&#8217;s Law To put this all in context, hardware technology follows Moore&#8217;s Law, which states that capacity doubles and cost halves every 18 months.  [&#8230;]<\/p>\n","protected":false},"author":26,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[36],"tags":[39],"class_list":["post-10732","post","type-post","status-publish","format-standard","hentry","category-blog-fr","tag-english-fr"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>&quot;Cybersecurity: Threats to Communications Networks and Private-Sector Responses&quot; - Part 4 - RJR Innovations<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.rjrinnovations.com\/fr\/cybersecurity-threats-to-communications-networks-and-private-sector-responses-part-4-2\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"&quot;Cybersecurity: Threats to Communications Networks and Private-Sector Responses&quot; - Part 4 - RJR Innovations\" \/>\n<meta property=\"og:description\" content=\"Testimony of Bill Conner, President and CEO of Entrust Before the Subcommittee on Communications and Technologyof the Energy and Commerce CommitteeU.S. House of Representatives Part 4 Moore&#8217;s Law To put this all in context, hardware technology follows Moore&#8217;s Law, which states that capacity doubles and cost halves every 18 months. [...]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.rjrinnovations.com\/fr\/cybersecurity-threats-to-communications-networks-and-private-sector-responses-part-4-2\/\" \/>\n<meta property=\"og:site_name\" content=\"RJR Innovations\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/RJR-Innovations-107107129324171\/\" \/>\n<meta property=\"article:published_time\" content=\"2012-02-24T15:42:00+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@RJRInnovations\" \/>\n<meta name=\"twitter:site\" content=\"@RJRInnovations\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.rjrinnovations.com\\\/fr\\\/cybersecurity-threats-to-communications-networks-and-private-sector-responses-part-4-2\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.rjrinnovations.com\\\/fr\\\/cybersecurity-threats-to-communications-networks-and-private-sector-responses-part-4-2\\\/\"},\"author\":{\"name\":\"\",\"@id\":\"\"},\"headline\":\"&#8220;Cybersecurity: Threats to Communications Networks and Private-Sector Responses&#8221; &#8211; Part 4\",\"datePublished\":\"2012-02-24T15:42:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.rjrinnovations.com\\\/fr\\\/cybersecurity-threats-to-communications-networks-and-private-sector-responses-part-4-2\\\/\"},\"wordCount\":176,\"publisher\":{\"@id\":\"https:\\\/\\\/www.rjrinnovations.com\\\/#organization\"},\"keywords\":[\"English @fr\"],\"articleSection\":[\"Blog\"],\"inLanguage\":\"fr-FR\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.rjrinnovations.com\\\/fr\\\/cybersecurity-threats-to-communications-networks-and-private-sector-responses-part-4-2\\\/\",\"url\":\"https:\\\/\\\/www.rjrinnovations.com\\\/fr\\\/cybersecurity-threats-to-communications-networks-and-private-sector-responses-part-4-2\\\/\",\"name\":\"\\\"Cybersecurity: Threats to Communications Networks and Private-Sector Responses\\\" - Part 4 - RJR Innovations\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.rjrinnovations.com\\\/#website\"},\"datePublished\":\"2012-02-24T15:42:00+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.rjrinnovations.com\\\/fr\\\/cybersecurity-threats-to-communications-networks-and-private-sector-responses-part-4-2\\\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.rjrinnovations.com\\\/fr\\\/cybersecurity-threats-to-communications-networks-and-private-sector-responses-part-4-2\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.rjrinnovations.com\\\/fr\\\/cybersecurity-threats-to-communications-networks-and-private-sector-responses-part-4-2\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.rjrinnovations.com\\\/fr\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"&#8220;Cybersecurity: Threats to Communications Networks and Private-Sector Responses&#8221; &#8211; Part 4\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.rjrinnovations.com\\\/#website\",\"url\":\"https:\\\/\\\/www.rjrinnovations.com\\\/\",\"name\":\"RJR Innovations\",\"description\":\"Connect your business... All of IT\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.rjrinnovations.com\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.rjrinnovations.com\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.rjrinnovations.com\\\/#organization\",\"name\":\"RJR Innovations\",\"url\":\"https:\\\/\\\/www.rjrinnovations.com\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/www.rjrinnovations.com\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.rjrinnovations.com\\\/wp-content\\\/uploads\\\/2015\\\/07\\\/RJR_Logo_Blue_Text_400x263.png\",\"contentUrl\":\"https:\\\/\\\/www.rjrinnovations.com\\\/wp-content\\\/uploads\\\/2015\\\/07\\\/RJR_Logo_Blue_Text_400x263.png\",\"width\":400,\"height\":237,\"caption\":\"RJR Innovations\"},\"image\":{\"@id\":\"https:\\\/\\\/www.rjrinnovations.com\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/RJR-Innovations-107107129324171\\\/\",\"https:\\\/\\\/x.com\\\/RJRInnovations\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/rjr-innovations\",\"https:\\\/\\\/www.youtube.com\\\/user\\\/RJRInnovations\"]},{\"@type\":\"Person\",\"@id\":\"\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"\"Cybersecurity: Threats to Communications Networks and Private-Sector Responses\" - Part 4 - RJR Innovations","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.rjrinnovations.com\/fr\/cybersecurity-threats-to-communications-networks-and-private-sector-responses-part-4-2\/","og_locale":"fr_FR","og_type":"article","og_title":"\"Cybersecurity: Threats to Communications Networks and Private-Sector Responses\" - Part 4 - RJR Innovations","og_description":"Testimony of Bill Conner, President and CEO of Entrust Before the Subcommittee on Communications and Technologyof the Energy and Commerce CommitteeU.S. House of Representatives Part 4 Moore&#8217;s Law To put this all in context, hardware technology follows Moore&#8217;s Law, which states that capacity doubles and cost halves every 18 months. [...]","og_url":"https:\/\/www.rjrinnovations.com\/fr\/cybersecurity-threats-to-communications-networks-and-private-sector-responses-part-4-2\/","og_site_name":"RJR Innovations","article_publisher":"https:\/\/www.facebook.com\/RJR-Innovations-107107129324171\/","article_published_time":"2012-02-24T15:42:00+00:00","twitter_card":"summary_large_image","twitter_creator":"@RJRInnovations","twitter_site":"@RJRInnovations","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.rjrinnovations.com\/fr\/cybersecurity-threats-to-communications-networks-and-private-sector-responses-part-4-2\/#article","isPartOf":{"@id":"https:\/\/www.rjrinnovations.com\/fr\/cybersecurity-threats-to-communications-networks-and-private-sector-responses-part-4-2\/"},"author":{"name":"","@id":""},"headline":"&#8220;Cybersecurity: Threats to Communications Networks and Private-Sector Responses&#8221; &#8211; Part 4","datePublished":"2012-02-24T15:42:00+00:00","mainEntityOfPage":{"@id":"https:\/\/www.rjrinnovations.com\/fr\/cybersecurity-threats-to-communications-networks-and-private-sector-responses-part-4-2\/"},"wordCount":176,"publisher":{"@id":"https:\/\/www.rjrinnovations.com\/#organization"},"keywords":["English @fr"],"articleSection":["Blog"],"inLanguage":"fr-FR"},{"@type":"WebPage","@id":"https:\/\/www.rjrinnovations.com\/fr\/cybersecurity-threats-to-communications-networks-and-private-sector-responses-part-4-2\/","url":"https:\/\/www.rjrinnovations.com\/fr\/cybersecurity-threats-to-communications-networks-and-private-sector-responses-part-4-2\/","name":"\"Cybersecurity: Threats to Communications Networks and Private-Sector Responses\" - Part 4 - RJR Innovations","isPartOf":{"@id":"https:\/\/www.rjrinnovations.com\/#website"},"datePublished":"2012-02-24T15:42:00+00:00","breadcrumb":{"@id":"https:\/\/www.rjrinnovations.com\/fr\/cybersecurity-threats-to-communications-networks-and-private-sector-responses-part-4-2\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.rjrinnovations.com\/fr\/cybersecurity-threats-to-communications-networks-and-private-sector-responses-part-4-2\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.rjrinnovations.com\/fr\/cybersecurity-threats-to-communications-networks-and-private-sector-responses-part-4-2\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.rjrinnovations.com\/fr\/"},{"@type":"ListItem","position":2,"name":"&#8220;Cybersecurity: Threats to Communications Networks and Private-Sector Responses&#8221; &#8211; Part 4"}]},{"@type":"WebSite","@id":"https:\/\/www.rjrinnovations.com\/#website","url":"https:\/\/www.rjrinnovations.com\/","name":"RJR Innovations","description":"Connect your business... All of IT","publisher":{"@id":"https:\/\/www.rjrinnovations.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.rjrinnovations.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/www.rjrinnovations.com\/#organization","name":"RJR Innovations","url":"https:\/\/www.rjrinnovations.com\/","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.rjrinnovations.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.rjrinnovations.com\/wp-content\/uploads\/2015\/07\/RJR_Logo_Blue_Text_400x263.png","contentUrl":"https:\/\/www.rjrinnovations.com\/wp-content\/uploads\/2015\/07\/RJR_Logo_Blue_Text_400x263.png","width":400,"height":237,"caption":"RJR Innovations"},"image":{"@id":"https:\/\/www.rjrinnovations.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/RJR-Innovations-107107129324171\/","https:\/\/x.com\/RJRInnovations","https:\/\/www.linkedin.com\/company\/rjr-innovations","https:\/\/www.youtube.com\/user\/RJRInnovations"]},{"@type":"Person","@id":""}]}},"_links":{"self":[{"href":"https:\/\/www.rjrinnovations.com\/fr\/wp-json\/wp\/v2\/posts\/10732","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.rjrinnovations.com\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.rjrinnovations.com\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.rjrinnovations.com\/fr\/wp-json\/wp\/v2\/users\/26"}],"replies":[{"embeddable":true,"href":"https:\/\/www.rjrinnovations.com\/fr\/wp-json\/wp\/v2\/comments?post=10732"}],"version-history":[{"count":0,"href":"https:\/\/www.rjrinnovations.com\/fr\/wp-json\/wp\/v2\/posts\/10732\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.rjrinnovations.com\/fr\/wp-json\/wp\/v2\/media?parent=10732"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.rjrinnovations.com\/fr\/wp-json\/wp\/v2\/categories?post=10732"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.rjrinnovations.com\/fr\/wp-json\/wp\/v2\/tags?post=10732"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}