President Putin Addresses The Russian Tech Gap

President Vladimir Putin’s has been speaking out on new constitutional  arrangements that may extend his period in power and at the same time announced various measures meant to foster Russia’s technological efforts.

In a recent parliamentary speech, he  urged the Russian legislature to pass a “technological legislative package” intended to launch a flexible mechanism of experimental legal regimes for the development and implementation of new technologies in Russia. These inlude a focus on artificial intelligence, to establish modern regulation of big data turnover based on the best world standards, as well as establish mechanisms for state support and financing, using both direct and venture instrumnets.

Although offering no details, yet his speech marks a mid-point, of sorts, in national efforts to spur innovation. In the speech, Putin alluded to the difficulties Russian researchers, engineers, and entrepreneurs face, particularly in the realm of finance. While Western entrepreneurs can obtain venture capital, miss their goal, and move on to a new project, Russia lacks a similar ecosystem. 

President Putin also called for reshaping legal and financial conditions “so that as many startups and innovative teams as possible can become strong, successful innovative companies.” He also called for an effort to help Russian industry export its products and meet domestic demand.

The day after Putin’s speech, he appointed a replacement for Prime Minister Dmitri Medvedev, who resigned, apparently, to facilitate the Russian president’s transition plan. The replacement is Mikhail Mishustin, who has a degree in information technology, and who has led national initiatives involving data centers and online services for the national tax collection agency. Among other things, Mishustin will oversee Russia’s “Digital Economy” national project, having an IT-capable technocrat at the highest levels of national power will probably help.

The Russian STEM community was quick to comment on Putin’s speech. Konstantin Vorontsov, who leads the machine intelligence laboratory at the Moscow Institute of Physics and Technology, or MIPT, reiterated the need for a Russia-wide platform where scientists, researchers, engineers, and entrepreneurs could share their work and cooperate, and said that the country’s tech drive urgently needed more engineers, researchers, and computer programmers.

In his speech, Putin a;so addresed the worldwide skills shortge, saying, “The ability to work with unique equipment, to take on the most ambitious tasks, is an incentive for young people to enter the science field. This is already happening. It is estimated that by the middle of the decade, every second scientist in Russia will be under 40,” 

In 2019 President Putin  said that his country had "unique" advances in hypersonic weaponry, saying other countries were "trying to catch up with us." He made these remarks at a Russian Defense Ministry board meeting, adding that "not a single country possesses hypersonic weapons, let alone continental-range hypersonic weapons," according to a transcript released by the Kremlin. Both the US and China are also working on hypersonic technology and Chian is understood to be testing  a hypersonic aircraft, and the US Air Force has awarded a contract to Lockheed Martin to develop a missile.

While Russia and China are the first nations to have announced the operational deployment of hypersonic weapons systems, other nations have had hypersonic programs for decades, and some of those have successfully tested these weapons as early as in 2011.

The Congressional Research Service  reported in September 2019 that at least seven countries have been developing hypersonic weapons technology for over a decade. These include the United States, Russia, China, Australia, India, France and Germany.

CNN:           Defense One:       Polygraph:      OECD

You Migh Also Read:

Russia’s AI Mission Is State-Driven:

 

« Top Cyber Threats For Business In 2020
The Worst Corporate Hacks In 2019 Could Have Been Prevented »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Caliber Security Partners

Caliber Security Partners

Caliber Security Partners is a full-service information security company, with a wide range of security services for clients with varying levels of security maturity.

LEXFO

LEXFO

LEXFO specializes in the security of information systems, assisting clients in protecting information assets using an offensive and innovative approach.

Global Station for Big Data & Cybersecurity (GSB)

Global Station for Big Data & Cybersecurity (GSB)

GSB is an interdisciplinary research hub to cover big data, information networks, and cybersecurity.

Honeynet Project

Honeynet Project

The Honeynet Project is a leading international non-profit security research organization, dedicated to investigating the latest attacks and developing open source security tools.

Axiad IDS

Axiad IDS

Axiad IDS is a Trusted Identity solutions provider for enterprise, government and financial organizations.

Xage Security

Xage Security

Xage is the world’s first blockchain-protected security platform for Industrial IoT.

Maven Technologies

Maven Technologies

Maven Technologies specialize in secure data destruction, electronics recycling, asset management, and highly detailed reporting.

Granted Consultancy

Granted Consultancy

Granted Consultancy is a business consultancy that specialises in securing funding to support companies with the development and commercialisation of new and innovative products and technologies.

Seavus Accelerator

Seavus Accelerator

Seavus Accelerator's goal is to create an enabling and stimulating environment for start-ups growth and provide continuous high quality acceleration and investment support.

Mphasis

Mphasis

Mphasis is a leading applied technology services company applying next-generation technology to help enterprises transform businesses globally.

Cirosec

Cirosec

Cirosec is a specialized company with a focus on information security. We carry out pentests & audits and advise our customers in the German-speaking countries on information and IT security issues.

Astrix Security

Astrix Security

Astrix enables security teams to instantly see through the fog of connects and detect redundant, misconfigured and malicious third-party exposure to their critical systems.

Valeo Networks

Valeo Networks

Valeo Networks is a full-service Managed Security Service Provider (MSSP). We partner with organizations to remove the burden of technology so that they can focus on growing their business.

Unit 42

Unit 42

Unit 42 brings together world-renowned threat researchers, incident responders and security consultants to create an intelligence-driven, response-ready organization.

SolidityScan

SolidityScan

SolidityScan is an advanced smart contract scanning tool designed to uncover vulnerabilities and proactively address risks within your code.

Oasis Security

Oasis Security

Oasis is the market leading platform for non-human identity management. Our mission is to fortify cybersecurity defenses by enabling enterprises to efficiently secure non-human identities.