U.S., Canadian Authorities Seize Counterfeit Hardware
In a joint announcement, officials from the Federal Bureau of Investigation (FBI), Immigration and Customs Enforcement (ICE), Customs and Border Protection (CBP), and Royal Canadian Mounted Police (RCMP) revealed that they had intercepted $76 million worth of counterfeit network hardware.The bust was the result of joint efforts over several years to attack the problem of counterfeit routers and other hardware entering the United States and Canada. The investigation, code-named Operation Cisco Raider by the FBI, resulted in more than 400 separate seizures involving tens of thousands of bogus Cisco components and labels.
Assistant Attorney General Alice S. Fisher warned, "Counterfeit network hardware entering the marketplace raises significant public safety concerns and must be stopped." Inspector Peter Goulet of the RCMP echoed Fisher's remarks, asserting that counterfeit networking hardware raises "serious health and safety concerns." If nothing else, the operation shows how easy it would be for even a vigilant business to wind up with counterfeit hardware: some of the defective products were sold to the Marine Corps, Air Force, the Federal Aviation Administration, and even the FBI itself.SiliconValley.com, InformationWeek
How Enterprises Are Attacking the IT Security EnterpriseTo learn more about what organizations are doing to tackle attacks and threats we surveyed a group of 300 IT and infosec professionals to find out what their biggest IT security challenges are and what they're doing to defend against today's threats. Download the report to see what they're saying.
2017 State of IT ReportIn today's technology-driven world, "innovation" has become a basic expectation. IT leaders are tasked with making technical magic, improving customer experience, and boosting the bottom line -- yet often without any increase to the IT budget. How are organizations striking the balance between new initiatives and cost control? Download our report to learn about the biggest challenges and how savvy IT executives are overcoming them.