GDT Webinar Series – How to Fail at Security? Reserve Your Spot

State of the Union address focuses on technology—briefly

State of the Union address

If you missed it, you’re probably not the only one. It was fleeting, but if it slipped past you, technology was a focal point for one brief, shining moment during last night’s State of the Union address. President Trump alluded to technology when he mentioned the need to increase the federal government’s “investments in the cutting-edge industries of the future.” Given the technological arms race between China and, well, the rest of the world, it’s a safe bet that 5G and AI were on his mind.

Executive Orders are waiting in the wings

The Wall Street Journal reported that Trump is preparing a number of executive orders to ramp up 5G and AI (Artificial Intelligence). While we’ll have to wait patiently to learn what specifically will be addressed, the Journal reports states that, according to administration officials, the orders will involve more government resources to advance AI and nudge private companies to enter the race to 5G.

According to Michael Kratsios, a White House technology policy aide, Trump’s overarching technology-related goal is to help ensure that American innovation will remain the envy of the world for generations to come.

Without mentioning the world’s most populated country, Trump’s commitment is clearly aimed at better competing against China, which is, according to most industry analysts both here and abroad, the far and away leader in the race to 5G. That’s not to say security-related issues are playing second fiddle, though. It’s a widely held suspicion that companies utilizing telecom equipment from China—most specifically equipment manufactured by Huawei or ZTE—are opening the door for Chinese espionage.

The United States and several Western European countries are mulling over legislation that would ban equipment manufactured by Huawei or ZTE. On Wednesday, Rob Strayer, the deputy assistance secretary for cyber and international communications and information policy, warned countries that purchasing Huawei networking gear would expand China’s surveillance capabilities to all four (4) corners of the world. Strayer warned that by using its massive 5G presence, Huawei would be poised to steal trillions of dollars in intellectual property and more easily deploy malware and attack competitors’ networks.

Can you afford to not talk to Security Experts?

To find out how to secure your organization’s network and protect its mission critical data, contact GDT’s tenured and talented engineers and security analysts at From their Security and Network Operations Centers, they manage, monitor and protect the networks of companies of all sizes, including those for some of the most notable enterprises, service providers, healthcare organizations and government agencies in the world. They’d love to hear from you.


Share this article

You might also like:

Mergers, acquisitions, and divestitures (M&A/D) offer opportunities for businesses to grow, streamline operations, and enter new markets. However, strategic planning and financial negotiations can overshadow a crucial element: information security.   This blog post dives into the critical security considerations for M&A/D activities, exploring the importance of information security, potential risks,

AI and Data Security

The advent of artificial intelligence (AI) brings transformative potential across industries while also introducing significant data security challenges. As AI systems become integral to operational and decision-making processes, safeguarding sensitive information against sophisticated threats is paramount. This exploration sheds light on the complexities of AI and data security and proposes

Transport layer security (TLS)

Transport layer security (TLS) is one of the most common tools for keeping users safe on the internet. When automated, TLS certification management can help organizations ensure more reliable and consistent use of TLS, reducing the need for human intervention and risk of human error. In fact, over the years,