{"id":6604,"date":"2022-06-01T18:01:00","date_gmt":"2022-06-01T09:01:00","guid":{"rendered":"https:\/\/www.filingbox.com\/?p=6604"},"modified":"2022-12-06T22:38:34","modified_gmt":"2022-12-06T13:38:34","slug":"filingbox-opened-a-new-cybersecurity-paradigm-called-storage-protection-in-itu-t","status":"publish","type":"post","link":"https:\/\/www.filingbox.com\/en\/blog\/filingbox-opened-a-new-cybersecurity-paradigm-called-storage-protection-in-itu-t\/","title":{"rendered":"FilingBox opened a new cybersecurity paradigm called &#8216;storage protection&#8217; in ITU-T."},"content":{"rendered":"\n<p>FilingBox proposed the new work item to the ITU-T which is the international technology standard organization under the U.N.&nbsp; New proposal was selected as X.spmoh (storage protection framework against malware running on the host)<\/p>\n\n\n\n<figure class=\"wp-block-image aligncenter size-full\"><img decoding=\"async\" width=\"102\" height=\"112\" src=\"https:\/\/www.filingbox.com\/wp-content\/uploads\/image-2.png\" alt=\"\" class=\"wp-image-6610\"\/><\/figure>\n\n\n\n<p>Existing network protection and end-point protection technologies are not enough to protect data because they work as black list-based detection mechanisms. If a new variant comes in, they couldn&#8217;t detect it well.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img fetchpriority=\"high\" decoding=\"async\" width=\"962\" height=\"380\" src=\"https:\/\/www.filingbox.com\/wp-content\/uploads\/image.png\" alt=\"\" class=\"wp-image-6606\" srcset=\"https:\/\/www.filingbox.com\/wp-content\/uploads\/image.png 962w, https:\/\/www.filingbox.com\/wp-content\/uploads\/image-300x119.png 300w, https:\/\/www.filingbox.com\/wp-content\/uploads\/image-768x303.png 768w\" sizes=\"(max-width: 962px) 100vw, 962px\" \/><\/figure>\n\n\n\n<p>But storage protection is different because it protects data with a white list based detecting mechanism. Storage protection knows what application will access what file already.&nbsp; So it makes only the preregistered applications can read, modify and delete files and others can not modify, delete or read files except by creating files.&nbsp;<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" width=\"962\" height=\"380\" src=\"https:\/\/www.filingbox.com\/wp-content\/uploads\/image-1.png\" alt=\"\" class=\"wp-image-6608\" srcset=\"https:\/\/www.filingbox.com\/wp-content\/uploads\/image-1.png 962w, https:\/\/www.filingbox.com\/wp-content\/uploads\/image-1-300x119.png 300w, https:\/\/www.filingbox.com\/wp-content\/uploads\/image-1-768x303.png 768w\" sizes=\"(max-width: 962px) 100vw, 962px\" \/><\/figure>\n\n\n\n<p>Now FIlingBox&#8217;s framework became the draft recommendation in ITU-T SG17 for preventing ransomware and data breach malware.&nbsp; For more infor, check out ITU-T website.&nbsp; <a href=\"https:\/\/www.itu.int\/itu-t\/workprog\/wp_item.aspx?isn=18345\">https:\/\/www.itu.int\/itu-t\/workprog\/wp_item.aspx?isn=18345<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>FilingBox proposed the new work item to the ITU-T which is the international technology standard organization under the U.N.&nbsp; New proposal was selected as X.spmoh (storage protection framework against malware running on the host) Existing network protection and end-point protection technologies are not enough to protect data because they work as black list-based detection mechanisms. [&hellip;]<\/p>\n","protected":false},"author":14,"featured_media":7499,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[9,10],"tags":[],"class_list":["post-6604","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-filingbox-insights","category-industry-news"],"jetpack_featured_media_url":"https:\/\/www.filingbox.com\/wp-content\/uploads\/4567.jpg","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/www.filingbox.com\/en\/wp-json\/wp\/v2\/posts\/6604","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.filingbox.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.filingbox.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.filingbox.com\/en\/wp-json\/wp\/v2\/users\/14"}],"replies":[{"embeddable":true,"href":"https:\/\/www.filingbox.com\/en\/wp-json\/wp\/v2\/comments?post=6604"}],"version-history":[{"count":5,"href":"https:\/\/www.filingbox.com\/en\/wp-json\/wp\/v2\/posts\/6604\/revisions"}],"predecessor-version":[{"id":6622,"href":"https:\/\/www.filingbox.com\/en\/wp-json\/wp\/v2\/posts\/6604\/revisions\/6622"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.filingbox.com\/en\/wp-json\/wp\/v2\/media\/7499"}],"wp:attachment":[{"href":"https:\/\/www.filingbox.com\/en\/wp-json\/wp\/v2\/media?parent=6604"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.filingbox.com\/en\/wp-json\/wp\/v2\/categories?post=6604"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.filingbox.com\/en\/wp-json\/wp\/v2\/tags?post=6604"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}