Category Archives: Internet Security

AV-Comparatives tested 15 Advanced Threat Protection IT Security Products – PRNewswire

Avast Business Antivirus Plus, Bitdefender Gravity Zone Elite Security, CrowdStrike Falcon Pro, ESET PROTECT Entry, Fortinet FortiClient with FortiSandbox and FortiEDR, Kaspersky Endpoint Security for Business Select, SparkCognition DeepArmor Endpoint Protection Platform and Vipre Endpoint Security Cloud.

Link to report: https://www.av-comparatives.org/tests/enhanced-real-world-test-2020-enterprise/

Tested Consumer Internet Security Software:

Avast Free Antivirus, AVG Free Antivirus, Bitdefender Internet Security, ESET Internet Security, F-Secure SAFE, Kaspersky Internet Security and Vipre Advanced Security

Link to report: https://www.av-comparatives.org/tests/enhanced-real-world-test-2020-consumer/

The Advanced Threat Protection Test checks each security product's ability to protect a computer against targeted attacks called advanced persistent threats. These are complex, multi-stage attacks that are aimed at a specific individual or organisation. Whilst the majority of such attacks may be ultimately aimed at infiltrating enterprise networks, an obvious means of doing this is to target the personal computers of staff members within the organisation. This means that protection against such attacks should be provided by consumer security programs, as well as corporate endpoint protection software.

"Cybercriminals are getting better and better. They come up with new attacks every day. Fileless attacks, code obfuscation, and the misuse of legitimate operating-system tools are on the rise." -Peter Stelzhammer, AV-Comparatives, co-founder

All of the tested products had to defend against 15 different complex targeted attacks.

AV-Comparatives' Advanced Threat Protection Test uses a variety of different attack scenarios, which the tested programs have to defend against. Targeted attacks employ various different techniques to avoid detection by security software. These include fileless attacks, code obfuscation, and the use of legitimate operating-system tools. Disguising malicious code also makes it hard for a security program to recognise. The misuse of legitimate system programs for malicious purposes also makes it easier for cybercriminals to stay under the radar of security measures.

In the Advanced Threat Protection Tests, AV-Comparatives use hacking and penetration techniques that allow attackers to access internal computer systems. These attacks can be broken down into Lockheed Martin's Cybersecurity Kill Chain, and seven distinct phases each with unique IOCs (Indicators of Compromise) for the victims. All our tests use a subset of the TTP (Tactics, Techniques, Procedures) listed in the MITRE ATT&CK(TM) framework. A false alarm test is also included in the reports.

The Advanced Threat Protection Test is an add-on test on top of the AV-Comparatives' Business Main Test Series, which includes the Malware Protection Test, Real-World Protection Test, and Performance Test. The 2020 H2 report of the Main Test series is due for release later this month.

Also due for release in December is the report of AV-Comparatives' Endpoint Prevention and Response (EPR) Test. EPR products are expected not only to protect endpoints against targeted threats, but also to provide detailed information on the attacks, for investigation and analysis purposes. The report will include test results, an overview of functionality, and a breakdown of total cost of ownership for each tested product.

Like all AV-Comparatives' public reports, the report of the 2020 Advanced Threat Protection Test for enterprise products can be downloaded free of charge from the institute's website, http://www.av-comparatives.org. AV-Comparatives is an independent testing lab based in Innsbruck, Austria, and has been publicly testing computer-security software since 2004. It is ISO 9001:2015 certified for the scope "Independent Tests of Anti-Virus Software". It also holds the EICAR certification as a "Trusted IT-Security Testing Lab".

Logo - https://mma.prnewswire.com/media/1093032/AV_Comparatives_Logo.jpgPhoto - https://mma.prnewswire.com/media/1362243/ATP_2020_Consumer.jpg Photo - https://mma.prnewswire.com/media/1362244/ATP_2020_Enterprise.jpg

Contact: Peter Stelzhammer, e-mail: [emailprotected],phone: +43 720115542

SOURCE AV-Comparatives

Go here to see the original:
AV-Comparatives tested 15 Advanced Threat Protection IT Security Products - PRNewswire

Massachusetts Nonprofit Tech Goes Home and NETSCOUT Team Up to Expand Digital Access in Greater Boston Community – Business Wire

BOSTON, Mass.--(BUSINESS WIRE)--Tech Goes Home (TGH), a Massachusetts nonprofit dedicated to ending digital inequity, and NETSCOUT SYSTEMS, INC., (NASDAQ: NTCT), a leading provider of service assurance, security, and business analytics, are partnering to provide digital devices, internet access, and digital skills training to more than 160 households in Roxbury. Through a generous grant, NETSCOUT is sponsoring virtual Tech Goes Home courses at Roxbury partner sites Boston Central Adult High School and Vine Street Community Center.

Each course, rooted in TGHs learning model, is run by TGH instructors and NETSCOUT volunteers, and provides learners with a free computer, an online course that teaches essential digital skills, and if needed, free internet service for a year. TGH courses cover digital skills needed to apply for jobs, manage finances online, participate in telehealth appointments, access community resources, and more.

As a former longtime Roxbury resident, I understand the needs of many local community members and the value that NETSCOUT can provide, said Tracy Steele, vice president, global services operations, NETSCOUT. NETSCOUT employees jumped at the opportunity to volunteer for the Tech Goes Home courses and are delighted to support this amazing program and the resources it provides to the Roxbury community.

Over the past several months, the COVID-19 pandemic exposed and exacerbated the existing digital inequities that have left thousands of families throughout Greater Boston without the internet connectivity, devices, or digital skills necessary to access critical resources like education, work, and healthcare from home. Through the new partnership with NETSCOUT, Tech Goes Home is able to expand carefully-curated course offerings in the Roxbury community at a time when the ability to connect virtually is more important than ever.

The communities we serve are facing unprecedented challenges as a result of COVID-19, said Dan Noyes, Co-CEO of Tech Goes Home. So many students, adults, and families are without the tools they need to participate in virtual activities like remote work and learning, healthcare, and connecting with each other. Further, demand for our programs has never been higher. With NETSCOUTs support and incredible volunteers, we have already been able to empower dozens of families with access to the essential opportunities provided by the online world.

About Tech Goes Home:

In the face of deep digital inequity, Tech Goes Home empowers communities to access and use digital tools to overcome systemic barriers and advance lives. Simply put, we bring computers, internet, and training to those without so students can do homework, adults can find jobs and manage finances, seniors can connect with loved ones, and all can access telehealth.

About NETSCOUT:

NETSCOUT SYSTEMS, INC. (NASDAQ: NTCT) helps assure digital business services against disruptions in availability, performance, and security. Our market and technology leadership stems from combining our patented smart data technology with smart analytics. We provide real-time, pervasive visibility, and insights customers need to accelerate, and secure their digital transformation. Our approach transforms the way organizations plan, deliver, integrate, test, and deploy services and applications. Our nGenius service assurance solutions provide real-time, contextual analysis of service, network, and application performance. Arbor Smart DDoS Protection by NETSCOUT products help protect against attacks that threaten availability, and advanced threats that infiltrate networks to steal critical business assets. To learn more about improving service, network, and application performance in physical or virtual data centers, or in the cloud, and how NETSCOUTs performance and security solutions powered by service intelligence can help you move forward with confidence, visit http://www.netscout.com or follow @NETSCOUT on Twitter, Facebook, or LinkedIn.

Continued here:
Massachusetts Nonprofit Tech Goes Home and NETSCOUT Team Up to Expand Digital Access in Greater Boston Community - Business Wire

HTLS 2020: Assessing risks and countering security threats in the new era – Hindustan Times

The South Asia Terrorism Portal cites 2019 as the year witnessing the least number of fatalities from terrorist attacks in India since 2000. Jammu & Kashmir (J&K) and the North-east saw steep decline in such incidents and left-wing extremism shrunk appreciably both in geographical spread and intensity.

This trend has continued in 2020, but carries in its wake the warning not to lower the guard for the future. International terrorist groups such as Islamic State (IS) and al Qaeda want to extend their footprints to India. The Lashkar-e-Taiba, Jaish-e-Mohammed and Hizbul Mujahideen cadres assiduously target India, riding on the back of Pakistans sustained efforts. The year has also seen the highest number of ceasefire violations at the Line of Control, with implications for internal security.

Two major terrorist attacks in the first decade of the 21st Century displayed paradigm shifts in tactics and methodology. The 9/11 attack emanated from a global terror alliance in pursuit of a virulent fundamentalist ideology. This led to security agencies tracing the leads of non-state actors determined to carry out such attacks globally. The 26/11 attack was choreographed from across the border, with the handlers directing terrorists on Voice over Internet Protocol (VOIP) for undertaking actions on the ground. This became a template for later attacks, most notably the revenge killing by the al Qaeda in Paris on January 7, 2015, against the publishing of Charlie Hebdo cartoons.

Though lone-wolf attacks across Europe are grim reminders of the residual capability of IS and al Qaeda, security agencies are more occupied grappling with new-age threats to national security. Technology, coupled with social media, and deepening ideological fault lines constitute a potent threat to national security. The combination of these elements has led to tools of terrorism becoming cheaper, accessible and deployable. This is the ultimate nightmare for a nation, as it transits from countering conventional risks to tackling threats in the new era. The use of the internet for communication, propaganda, recruitment, planning and execution of terrorist actions has led to surveillance of the web by security agencies, spawning the debate between right to privacy and safeguarding national security. The global call for jihad through the internet lured a number of radicalised Indian youth post-2012 to go to Afghanistan and Syria to fight their ideological enemies. None of them was inspired by local issues. The return of many such disillusioned young people back home led to a wealth of information on the sophisticated use of internet-based communication by the terror groups such as al Qaeda and the IS.

Law enforcement agencies, trying to keep up with the latest technology on internet-based platforms, want to play it safe by gathering maximum data on their suspects and targets. Since encrypted data does not afford access, they seek backdoors which the service providers vehemently deny. Breaking encryption weakens the entire communication grid, making it vulnerable to outside attacks. In the case of a well-known face-off between the Federal Bureau of Investigation (FBI) and Apple, the former demanded unlocking of the phone of a dead shooter to elicit information. The matter went to court, but Apple refused to budge. Later, FBI withdrew its case citing success in breaking the code with the help of a third party. Apple stated that it owed to customers their data protection and privacy.

Technology is a double-edged sword. Great strides in technology have enhanced the quality of life and longevity, while weapons of mass destruction seek to do just the opposite. Use of drones in the fields of medical, agriculture and disaster management is proving to be highly beneficial but their deployment for terror acts is also lethal. Pakistan drones ferry across drugs and weapons regularly into India. Drones can pose a major threat to VIP security and India has taken suitable measures to counter this threat. Near impossible access to complex technology in earlier times made terrorist groups look towards benefactors such as Pakistan, which was sponsoring terrorism as a part of its avowed national agenda. But today, the internet offers cheap access to information on homemade chemicals and bombs. 3D printers are used to make revolvers, too.

Security agencies, keeping in mind the latest terror tactics, play it safe and present the worst-case scenarios for the future to structure appropriate responses. But the flip side is the immense cost involved in developing security architecture to counter these various deadly scenarios. Most attacks in the past few years are of low-tech variety, using weapons or bombs. The al Qaeda and IS cadres have reportedly been directed to keep it simple. Intelligence agencies will therefore have to take risks and project realistic threat assessments of the future, otherwise the costs of security will outweigh the gains. How does India patrol its cyberspace to ward off attacks of cyberterrorism, which is aimed at destroying its critical data infrastructure? The National Critical Information Infrastructural Protection Centre (NCIIPC) is meant for the protection of six critical sectors. Any attack on one of them is categorised as an act of cyberterrorism. India also has a programme for reporting of cyber vulnerabilities in systems or software under the Responsibility Vulnerability Disclosure Program run by NCIIPC. Greater awareness and efforts are visible in protection of our critical data to ward off cyber-attacks. Finally, for a country as diverse as India, the old adage Unity in Diversity has served as a sound security doctrine. The weakening of this doctrine, as witnessed in recently emerging social fault lines, will give rise to new security challenges. Fake news and disinformation have become potent tools of attack. Even advanced democracies are facing divisive slogans and appeals. Bot farms can create thousands of social media accounts to weaponise information by unleashing a flurry of vituperative and vicious propaganda material for causing civil strife and disruption. A robust democracy need not fear information warfare but then India should remain one to ward off such attempts at the destabilisation of its polity.

Yashovardhan Azad is a retired Indian Police Service officer who served as Special Director, Intelligence Bureau, and Secretary, Security in Government of India. He has also been a Central Information Commissioner. The views expressed are personal.

Read the rest here:
HTLS 2020: Assessing risks and countering security threats in the new era - Hindustan Times

Calix Partners With Arlo, a Leading Internet-Connected Camera Brand, Expanding the CSP’s Ability to Offer the Ultimate Home Experience With the…

SAN JOSE, Calif.--(BUSINESS WIRE)--Calix, Inc. (NYSE: CALX) today announced the addition of a leading internet-connected camera brand Arlo Technologies, Inc. (NYSE: ARLO) to the expanding ecosystem of Revenue EDGE solutions. Calix will offer the revenue-generating Arlo connected camera solution as part of EDGE Suites so communications service providers (CSP) can deliver industry-leading video monitoring and do-it-yourself (DIY) security to their subscribers. This new offering will be fully integrated into the Calix Cloud platform, meaning CSPs can quickly go to market with almost zero integration (as the new service is pre-integrated into Calix Support Cloud) and achieve the highest level of sales success through the power of real-time behavioral data with Calix Marketing Cloud. The Arlo offering is particularly exciting for CSPs that have invested in fiber networks as it allows subscribers to add a powerful service that leverages the upload potential of a symmetrical fiber offering.

Arlo is a pioneer in the industry and provides wireless connected cameras, floodlights, and video doorbells to help consumers secure people and their property. By leveraging connected camera capabilities from Arlo through the EDGE Suites, CSPs can expand their services via a fully managed experience that leverages the existing EDGE Suite offerings (such as ProtectIQ) for device security. With the addition of the Arlo offering to the Revenue EDGE solution, a CSP will be able to:

Arlos mission is to provide peace of mind and our strategic partnership with Calix will enable even wider distribution to the communities serviced by their strong network of CSPs, said Matt McRae, CEO of Arlo. Our solutions featuring award-winning devices and the SmartCloud platform provide best-in-class smart security solutions to their customers that already trust Calix and the CSPs to deliver connected and secure Wi-Fi solutions."

EDGE Suites, which are managed through the CommandIQ app, allow subscribers to control the in-home experience while ensuring CSPs easily differentiate the experiences and deliver valuable, custom services to the palm of their subscribers. The Revenue EDGE Partner Ecosytem is built on the foundation of the first two EDGE Suites, ProtectIQ and ExperienceIQ. The addition of Arlo marks a significant expansion of the community.

During the pandemic weve seen an explosion in the need for symmetrical fiber broadband to support multiple connected devices as people work and learn from home, says Michael Weening, EVP and chief operating officer for Calix. By adding Arlo to the Revenue EDGE Partner Ecosystem, were enabling our customers to tap yet another service that expands their relationship with the subscriber while demonstrating the power of their fiber broadband network. In fact, our customer WCTEL has used this strategy to delight subscribers and realize 31 percent year-over-year revenue growth. The Calix Marketing Cloud will enable CSPs to use real-time behavioral analytics to segment their broadband subscribers into those who are likely to buy and those who will not, ensuring the maximum ROI on their marketing dollar and the highest possible sales success. By partnering with the Calix Marketing Cloud Customer Success team and leveraging the brand elevating EDGE Enablement program, any CSP can launch powerful, targeted campaigns that drive upsell in days, while CommandIQ and Calix Support Cloud deliver the ultimate managed experience. That is the true power of the Revenue EDGE solution and we are very excited to bring Arlo and our CSP partners together to win in the market.

Learn more about Arlo and the Calix Revenue EDGE Partner Ecosystem as well as other EDGE Suites offerings.

About Calix

Calix, Inc. (NYSE: CALX) Innovative communications service providers rely on Calix platforms to help them master and monetize the complex infrastructure between their subscribers and the cloud. Calix is the leading global provider of the cloud and software platforms, systems, and services required to deliver the unified access network and smart premises of tomorrow. Our platforms and services help our customers build next generation networks by embracing a DevOps operating model, optimize the subscriber experience by leveraging big data analytics and turn the complexity of the smart, connected home and business into new revenue streams.

This press release may contain forward-looking statements that are based upon management's current expectations and are inherently uncertain. Forward-looking statements are based upon information available to us as of the date of this release, and we assume no obligation to revise or update any such forward-looking statement to reflect any event or circumstance after the date of this release, except as required by law. Actual results and the timing of events could differ materially from current expectations based on risks and uncertainties affecting Calix's business. The reader is cautioned not to rely on the forward-looking statements contained in this press release. Additional information on potential factors that could affect Calix's results and other risks and uncertainties are detailed in its quarterly reports on Form 10-Q and Annual Report on Form 10-K filed with the SEC and available at http://www.sec.gov.

Visit link:
Calix Partners With Arlo, a Leading Internet-Connected Camera Brand, Expanding the CSP's Ability to Offer the Ultimate Home Experience With the...

5 Ways to Choose the Right Home Security System – Security Insider Access Online – Security Insider Access Online

The founder of Heart & Home Real Estate, John Romito, shared, Every home is different, and home security systems need to be adaptable and upgradeable to meet the needs of a given family in a given home. For him, the road to finding the right security system begins by asking the right questions.

Romito added: While intruder detection is a paramount consideration, so is fire and carbon monoxide detection, as well as sprinklers and other disaster prevention precautions. Ultimately, a proper home security system encompasses these aspects, all while staying within a predetermined price range.

Weve interviewed other experts on the home security front and asked them about their opinions regarding other factors to consider when choosing the ideal residential safety system. Here are their answers:

Get one with an independent cloud system or one that does not rely on your broadband connection. This makes your security system even more secure because it can still send you alerts even if your internet connection is dead. Additionally, it prevents intruders from tampering with it.

By Oliver Baker (Co-founder and Managing Director, Intelvita)

Check out the reviews for local companies via your preferred review platform, we like Google as it seems the least biased. Also, call and ask how far out theyre scheduling their service appointments. Inquire about what brands of hardware and smartphone app control software a company uses and check in to reviews/complaints about the hardware and how reliable it is and how easy to use. Finally, compare three companiesif possibleon their pricing to make sure everythings fairly priced. You dont necessarily have to go with the lowest, but its good to know what market rates are for your area.

By Louis Wood (Home Security Expert, Law Security)

Choosing the right kind of home security system is very crucial especially in these times of crisis. They come with a huge range of benefits apart from protecting your house and yourself. So, there are various factors that you should consider while choosing your next home security system. One of those would be emergency alerts. Most security systems pride themselves in mobile access. But staying connected all the time can be frustrating, as youre not always available on-call for these alerts. So, you need a professional monitoring system that can contact the police and/or the fire department at the time of emergencies.

Jennifer Will (Editor, Etia.com)

You can choose between any number of home security packages and you can even combine them to get the best result. But before you do any of that, you need to figure out what kind of component you want to be part of your security system. For example, if you want to verify people requesting entry to your house, you can install a smart doorbell with a motion sensor. It can help you verify people who request entry to your home by activating a camera placed near your door.

Josefin Bjorklund (Topp Casino Bonus)

Decide whether you want 24/7 professional monitoring, self-monitoring, or both. Some companies require professional monitoring, while some dont offer it at all. Also, some companies charge extra for self-monitoring, so take those costs into your bottom line. Furthermore, there are some security systems that require or offer professional installation, usually for a fee of around $100. However, some systems youll be able to install yourself to save money.

By Aliza Vigderman (Content Manager, Center Field)

Visit link:
5 Ways to Choose the Right Home Security System - Security Insider Access Online - Security Insider Access Online

How Easy Is It to Hack a Smartphone on an Open Network? – MakeUseOf

You might be used to having an internet connection wherever you go. And not just cellular data: free internet is available at most restaurants, hotels, airports, and coffee shops.

Still, just because its available and free doesnt mean you should be using it. At least not without taking a few precautions. Unless, of course, you want a stranger to hack your smartphone and access all of your files.

Hacking into someones smartphone isnt as complex as you might think. One doesnt have to be a seasoned hacker, typing zeros and ones on a black screen from their basement. Nowadays, free software available online automates most of the work for them.

And while you might be thinking Im not a worthy target, hackers think the opposite. Since hacking is no longer especially hard or time-consuming, getting information from smartphones is profitable for many black-hat hackers.

Even if you dont have your bank information on your smartphone, your internet browsing data in itself is valuable.

So, how do they do it?

There are many ways hackers can infiltrate an open network and take advantage of peoples blind trust.

By far, the easiest way for cybercriminals to intercept your data isthrough an internet connection that they and their target are using. For example, that free Wi-Fi you just connected to.

Since most free Wi-Fi connections havepoor encryption, a hacker can exploit one of the weak points and access your smartphone or laptop. That way, they can see everything youre searching for and looking at, and possibly steal sensitive information that they could use against you later.

Another well-known method is when hackers impersonate a router, pretending to be a trustworthy network. If they succeed, they can reroute all of your internet traffic through their device and view it. It also lets them alter it, showing you things that arent actually on the website.

While that might seem like a harmless and funny prank to some people, hackers can use the same method to steal your passwords and personal and credit card information.

Even if you intentionally avoidsubmitting passwords or your credit card details while using an open network, hackers can still get your information. Now that they've got into your device, they can easily inject malware or spyware to collect your data wherever you go.

One place you might not expect an attack from is your homes network. After all, its password protected. But hackers have many ways of getting pastthese.

One way is using a brute-force attack: this involves specialized software trying countless combinations of passwords until they find the right one.

To protect against this, you password needs to be long, full of special characters, and frequently changed. Otherwise,you could easily fall victim to this type of attack. In fact, you're the ultimate target.

Another way they can get your password is by using social engineering. Yes, they can simply ask you for your password, andif theyre good enough and youre none the wiseryou might end up giving it out.

There's no need to swear off public Wi-Fi for good or abandon technology when it comes to finances and keeping private information. There are a few simple security measures you could implement today to stay safe online.

Here's how to protect your devices while using an open networkalthough these are good practices, no matter the type of internet connection!

If your device automatically connects to any open network you come in range of, thenyou need to disable it immediately.

Related: How to Prevent Your Devices From Auto-Connecting to Networks

If you don't, your smartphone could connect to a random network when youre walking down the street and you wouldnt even know.

One of the simplest things you could do is get a VPN and use it as often as possible. There are even free VPNs that are safe to use. That's particularly important when youre using an open network; if the router isnt properly encrypting your data, your VPN will.

Not to mention, most VPNs have a scan feature that sends out an alert when you encounter something malicious.Somealso offer a kill switch that disconnects you from the internet if your VPN app crashes. That ensures that youre never out there unprotected.

The only thing you need to do is toget into the habit of turning it onbefore you connect to the internet.

Ifyou find yourself needing to use public Wi-Fi but dont have access to a VPN, then its best to stick to HTTPS websites. Those websites tightly encrypt the traffic between the two of you. That makesdata much harder for a hacker to hijack.

Related: What Is a Website Security Certificate?

To make sure you always use secure websites, keep an eye out for the extra s in the URL or the padlock symbol that most browsers show. But if you want everything automated, there are browser extensions that notify you before you enter an unsecured website. Chrome browser does this automatically too.

If you do go into an unsecured website, dont download anything or input any passwords or private information.

If youre not very tech-savvy and think you might easily fall for a phishing scheme or download something harmful, get an antivirus for your smartphone. Antivirus software can detect incoming attacks and malware and intercept them for you. Itd also send you an alert, letting you know that what youre doing isnt safe.

Here's what you need to remember when it comes to online security: follow your instincts and stay skeptical.

Hackers are always on the lookout for new ways to hack devices and inject malware. You could be a victim to a method of attack that no one warned you about.

So, if youre on a website and something aboutjust doesn't feel right (like ifit looks old, has a lot of typos, or is insisting you sign up for something every 20 seconds), leave. You can visit it again with better security if youre still curious about it.

Image Credit: Bernard Hermant/Unsplash.

Is your internet connection secure? Here's what you need to know to stay safe and secure on any network you connect to.

Anina is a freelance technology and internet security writer at MakeUseOf. She started writing in cybersecurity 3 years ago in hopes of making it more accessible to the average person. Keen on learning new things and a huge astronomy nerd.

Join our newsletter for tech tips, reviews, free ebooks, and exclusive deals!

Please confirm your email address in the email we just sent you.

More here:
How Easy Is It to Hack a Smartphone on an Open Network? - MakeUseOf

The Top 19 Internet of Things(IoT) Security Solutions – Security Boulevard

For years, smartphones have been the epicenter of innovative technology. Is the torch being passed to IoT? If you ask consumers and enterprises alike, the answer is yes.

You can expect there to be up to 5.8 billion enterprise and automotive IoT devices in use by the end of 2020, with the adoption of utility IoT devices increasing 17% over the previous year. By 2022, the North American IoT market is expected to reach $500 billion. As businesses and their clients get comfortable with the Internet of Things, were likely to see the same explosion of new and ingenious IoT products as we did with smartphones.

However, along with the benefits and value IoT devices provide, they are also uniquely vulnerable to cyberattacks. Fraud and cybercrime is on the rise in 2020, according to security researchers and as many as 57% of IoT devices may be vulnerable to medium or high severity attacks.

For consumers, this combination may mean loss of privacy, as in the case of an incident in Singapore where hackers stole private home security camera footage and distributed it online. For enterprises and corporations, a compromised mission-critical IoT device can have serious and even life-threatening consequences.

What is it that makes IoT devices more vulnerable and attractive to attackers than servers, routers, or other types of endpoint devices? One major factor is the lack of standardization and regulation around IoT security. Moreover (and unlike smartphones), many IoT devices lack the hardware capacity needed to support robust cybersecurity applications. Human error also contributes, amplified by the relative unfamiliarity of IoT technology on behalf of many end-users and operators.

The other consideration is that IoT devices connected to sensitive or critical operations (and confidential data) in a corporate, industrial, or security context can represent extremely high-value targets for some bad actors. Attacks by sophisticated and professional cybercriminals bear the potential for highly costly or dangerous consequences.

In addition to the predictable loss of profits and privacy, breaches to IoT devices may land businesses in hot legal waters. California enacted legislation in 2019 that requires reasonable security features to be installed in all IoT devices, and the UK has proposed a similar law.

Unique vulnerabilities require different solutions. When it comes to connected Internet of Things devices, protection requires a combination of detection, prevention and mitigation solutions across multiple layers.

Weve chosen the best providers for IoT network and device security for 2021 to help you build your IoT device security tech stack.

Offices, data centers, and other facilities outfitted with IoT networks can secure their devices against hostile traffic and attempted breaches with Palo Alto Networks IoT security solution. It dubbs itself a turn-key package that includes both hardware-based and virtual firewalls, device identification tools, and other tools designed to provide visibility and protection for unmanaged IoT devices.

FirstPoint is uniquely focused on protecting cellular IoT devices from attacks that originate from within the cellular network or that communicate through the cellular network, which it does through a device-agnostic agentless security solution. This helps mobile network operators secure vulnerable cellular-connected devices from the unique threats faced by IoT devices on cellular networks including private LTE & 5G networks.

Trustwave offers managed IoT security that analyzes your network for weak points in connected devices and the servers, APIs, and cloud services that interact with them. This enables network administrators to deploy quick fixes and prepare for potential attacks ahead of time, instead of finding out about vulnerabilities only after a successful breach occurs.

Offering device-based protection for industrial IoT deployments, NanoLock aims to block malware, ransomware, denial-of-service attacks, and other cyber threats. Designed to protect devices linked to critical infrastructure, including water and energy utilities, this hardware-level solution acts as a Flash memory gatekeeper to prevent malicious access to critical code.

Critical assets in industries like healthcare, utilities, and manufacturing are the focus of Armiss agentless device security solution. By starting with a complete inventory of connected assets, Armis can then scan all data traffic to and from these devices. Armis processes all this traffic to subsequently identify vulnerabilities, execute automated security policies, and provide continuous monitoring on both managed and unmanaged devices.

This security solution offers cellular and RF threat remediation by detecting, analyzing, and classifying the devices connected to your network and giving you the tools to take the actions needed to protect yourself. Well-suited to providing device security within a specific and contained location, Bastille makes it easy to enforce no-phone policies and other physical security measures.

The physical intersections between IoT devices and human operators are frequent sources of accidental malware infections and other security breaches. Broadcom addresses this with solutions designed to scan and protect USB connections and other vulnerable interfaces. Being on both state-of-the-art deployments as well as older, legacy systems pose unique challenges.

Protected Sessions provides data security for endpoints and gateways across any type of network through a library installed locally on the IoT device. It integrates with all major IoT cloud providers and provides industry-standard encryption to secure your data in transit across private and public networks.

Trusted Objects creates unique digital identities for devices connected to your IoT cloud network. This allows you to protect those devices against both physical and cyberattacks with a combination of proven technologies and advanced security features.

Overwatch gives you active threat mitigation in real-time for all devices connected to your IoT network. Created to be scalable for use with automotive and consumer devices as well as utilities and industrial IoT, this solution uses an algorithmically-based threat assessment tool to provide immediate proactive warnings about potential dangers. With an agent installed on both the IoT device and gateway servers, Overwatch offers an API to connect to threat assessment and mitigation tools.

For airports, banks, corporate campuses, and other facilities with IoT networks that are critical to their operations, SecuriThings Horizon solution lays the groundwork of essential protection against malware, botnets, brute force attacks, internal sabotage, and other threats. Horizon offers endpoint risk detection, predictive monitoring and maintenance, as well as automated mitigation to minimize disruptions and costly downtime. Horizon pulls data from each edge device through software agents or agentless modules then scans the incoming and outgoing data to detect abnormal behaviors.

Designed to improve reliability and reduce the operational costs of your IoT system, SensorHounds suite of products offers automated monitoring for IoT networks and client devices. It traces software failures and intrusions, monitors cloud deployments, and provides forensic diagnostics for every node on your network.

Hospitals and other facilities in need of strong, easy-to-implement IoT network security have a flexible and user-friendly solution in Tempereds Airwall, which can deploy across physical, remote, cloud, or virtual networks. With trusted identities and permission controls, you can enforce security policies that effectively prevent unauthorized access attempts.

Vdoo specializes in integrated device security customized to your industry, whether thats industrial, medical, MNO, utilities, or corporate. Vdoo automatically generates an embedded runtime agent to deploy onto the IoT device that provides threat mitigation capabilities without requiring any modification of existing device code. By proactively detecting vulnerabilities and automating your security processes, Vdoo reduces the chances of hackers and bots causing harm to your operations.

The Atonomi Networks IoT security solution is blockchain-based. It works by providing immutable identities for network assets and tracking the reputations of connected devices, ensuring safe and secure transactions across platforms. Atonomi can be used for small-scale applications such as smart cars or homes as well as larger ones like healthcare systems and industrial facilities.

Designed for use in hospitals, CyberMDX protects healthcare IoT assets with inventory management, vulnerability research, and operational analytics that proactively identify threats and anomalies. With healthcare establishments under relentless threat from ransomware attacks, solutions like this can prevent bad actors from gaining a foothold through IoT endpoint devices.

Another solution created with healthcare facilities in mind is Cynerio. It protects IoT networks by providing inventory and network visualization tools as well as risk detection that takes into account the specific regulations and architecture of healthcare systems. This flexible solution can protect patient information and other sensitive data against persistent attackers.

Because of their reliance on sophisticated technology and the uniquely sensitive data they deal with, healthcare IoT networks have a wealth of options when it comes to security solutions. Medigate offers network-level monitoring and threat response built to combat todays newest and most sophisticated threats.

A scalable, embedded solution that prevents attacks in real-time, Sternum grants protection down the source code level to stop cyberattacks aimed at enterprises and manufacturers. This embedded protection has a high rate of success at stopping attacks and allows for seamless visualization and device tracking.

Securing devices across an IoT network may present new challenges and complications, even for seasoned cybersecurity teams. Because of the unique vulnerabilities of IoT devices and the devastating consequences that can follow a breach, these challenges must be met. With a comprehensive strategy backed up by the right tools, you can build an effective defense against the threats that a mission-critical IoT system needs to be able to withstand.

The post The Top 19 Internet of Things
(IoT) Security Solutions appeared first on FirstPoint.

Recent Articles By Author

*** This is a Security Bloggers Network syndicated blog from Blog FirstPoint authored by Noa Ouziel. Read the original post at: http://www.firstpoint-mg.com/blog/top-19-iot-security-solutions/

Visit link:
The Top 19 Internet of Things(IoT) Security Solutions - Security Boulevard

Minim to keep its name in merger with Boston tech company – The Union Leader

MANCHESTER Minim, an internet security platform co-founded by former Dyn CEO Jeremy Hitchcock, will keep its name after officially merging with a Boston hardware company.

The merger with Zoom Telephonics, which makes cable modems and other internet access products under the Motorola brand, was completed on Dec. 4. The merged company will be headquartered in Manchester but expects to have a nationwide footprint.

Javascript is required for you to be able to read premium content. Please enable it in your browser settings.

kAmpD A2CE @7 E96 C63C2?5:?8[ E96 4@>A2?J H:== 368:? EC25:?8 2D |x}| @? %F6D52J]k^Am

kAm(6 ?66565 E@ 492?86 E96 ?2>6 E@ |:?:> @C E@ BF@E6F?BF@E6 ?@E E92E +@@>[ D2:5 vC2J r9J?@H6E9[ ?6H=J 2AA@:?E65 rt~ @7 E96 4@>3:?65 4@>A2?J[ 2?5 7@C>6C sJ? 6I64FE:G6] +@@>[ 2 G:56@ 4@?76C6?4:?8 2AA=:42E:@? 2?5 6?E:C6=J 5:776C6?E 4@>A2?J[ 92D 364@>6 2 A@AF=2C H2J @7 4@>>F?:42E:?8 7@C >2?J 5FC:?8 E96 A2?56>:4]k^Am

kAm+@@> %6=6A9@?:4D C6A@CE65 ?6E C6G6?F6 @7 S`a >:==:@? 😕 E96 E9:C5 BF2CE6C[ :ED 9:896DE BF2CE6C=J C6G6?F6 E@ 52E6[ C6AC6D6?E:?8 2? ``T :?4C62D6 4@>A2C65 E@ E96 D2>6 BF2CE6C 😕 a_`h 2?5 2 `fT :?4C62D6 7C@> E96 D64@?5 BF2CE6C @7 a_a_[ 244@C5:?8 E@ 7:?2?4:2= 5:D4=@DFC6D]k^Am

kAm%96 8=@32= H:C6=6DD E649?@=@8J >2C<6E :D 6IA64E65 E@ 6I4665 S`c` 3:==:@? 8=@32==J 3J a_ad[ 244@C5:?8 E@ p==:65 |2C<6E #6D62C49[ 2 >2C<6E C6D62C49 2?5 25G:D@CJ 4@>A2?J]k^Am

kAm%96 4@>3:?65 4@>A2?J 3C:?8D 2? :?E68C2E65 92C5H2C6 2?5 D@7EH2C6 D@=FE:@? E@ 9@>6 (:u: ?6EH@C6?E[ r9J?@H6E9 D2:5]k^Am

kAm%6? @C `d J62CD 28@[ >2?J 9@>6D EJA:42==J @?=J 925 A9@?6D 2?5 4@>AFE6CD 9:E4965 FA E@ 9@>6 :?E6C?6E 4@??64E:@?D] }@H 56G:46D 9@@<65 FA :?4=F56 %'D[ 82>:?8 4@?D@=6D[ D64FC:EJ DJDE6>D[ G24FF>D 2?5 6G6? E@@E93CFD96D[ r9J?@H6E9 D2:5]k^Am

kAm%96? J@FG6 8@E J@FC =2AE@A @C 56D@C6 H@C< @? E9@D6 7C@> 9@>6 E92? 6G6C 367@C6[ 96 D2:5] xE 😀 23D@=FE6=J ECF6 E92E E96 9@>6 😀 364@>:?8 >@C6 4@>A=6I 😕 E6C>D @7 H92E 😀 4@??64E65 E@ J@FC ?6EH@C< 2?5 >@C6 :>A@CE2?E E@ J@FC =:76 2?5 62C?:?8 2 =:G:?8]k^Am

kAm|:?:> H2D 7@F?565 😕 a_`g] %96 :562 42>6 23@FE 27E6C 2 3@E?6E 2EE24< E92E :>A24E65 sJ?D :?E6C?6E 😕 a_`e] sJ? H2D D@=5 E@ ~C24=6 😕 =2E6 a_`e 7@C 2 C6A@CE65 Se__ >:==:@?]k^Am

kAm!6@A=6D 9@>6D ?665 E@ 36 D276[ E96J ?665 E@ 36 D64FC6[ r9J?@H6E9 D2:5] w2G:?8 D64FC6 (:u: 2?5 2 D64FC6 82E6H2J @C 423=6 >@56> 😀 ;FDE 2D :>A@CE2?E 2D 92G:?8 2 =@4< @? J@FC 5@@C]k^Am

kAm|:?:> D@7EH2C6 😀 56D:8?65 E@ 2==@H A6@A=6 E@ 36EE6C >2?286 9@>6 ?6EH@C

kAmq67@C6 E96 >6C86C[ E96 EH@ 4@>A2?:6D A2CE?6C65 E@86E96C E@ =2F?49 E96 |@E@C@=2 |wf_aa >6D9 (:u: DJDE6> E9:D BF2CE6C[ H9:49 😀 D@=5 3J C6E2:=6CD DF49 2D p>2K@? 2?5 q6DE qFJ] %96 >@3:=6 2AA 😀 42==65 |@E@|2?286 A@H6C65 3J |:?:>]k^Am

kAm%96 56>2?5 😀 FA cdT 7@C :ED AC@5F4ED 😕 C6E2:=6C :?G6?E@CJ C6BF6DED[ 244@C5:?8 E@ E96 4@>A2?J]k^Am

kAm%96 4@>A2?J H@C@C6 E92? a >:==:@? DF3D4C:36CD[ 244@C5:?8 E@ E96 4@>A2?J]k^Am

kAm|:<6 $<6=E@?[ AC6D:56?E 2?5 rt~ @7 E96 vC62E6C |2?496DE6C r92>36C[ D2:5 E96 4@>A2?JD DF446DD 😀 2 36?67:E E@ |2?496DE6C]k^Am

kAmxE 😀 2? :?5:42E@C E92E H6 4@?E:?F6 E@ 92G6 2 DEC@?8[ 6>6C8:?8 E649 D64E@C 😕 @FC 4@>>F?:EJ E92E x E9:?< :E :D 8@:?8 E@ 4@?E:?F6 DA2H?:?8 6?EC6AC6?6FCD9:A[ C64CF:E:?8 ?6H E2=6?E 2?5 DEC6?8E96?:?8 @FC H@C<7@C46[ 96 D2:5] xE :D 2 A@D:E:G6 :?5:42E@C E92E x E9:?< H:== 4C62E6 2 =@E @7 G2=F6 7@C J62CD E@ 4@>6]k^Am

kAm%96 4@>A2?J >6C865 5FC:?8 2 E:>6 H96? C6>@E6 H@C<:?8 :D @?=J 6IA64E65 E@ 8C@H[ $<6=E@? D2:5]k^Am

kAm|:?:> H:== 6>A=@J 23@FE f_ 7F==E:>6 6>A=@J66D] %96 4@>A2?J 😀 2=H2JD =@@<:?8 E@ 9:C6 H@C<6CD :? E96 vC2?:E6 $E2E6]k^Am

kAm(6 H:== 2=H2JD 92G6 2 9625BF2CE6CD 2?5 9F3 😕 E96 ?@CE962DE 2?5 😕 |2?496DE6C] (6 2C6 8@:?8 E@ 36 2 8=@32= 4@>A2?J[ r9J?@H6E9 D2:5] (6 2C6 6I4:E65 E@ 92G6 2 8=@32= H@C<7@C46 E92E 42? D@=G6 E96 AC@3=6> @7 9@>6 (:u: 7@C 4@?DF>6CD 2C@F?5 E96 H@C=5]k^Am

kAmw:E494@4< H:== D6CG6 2D |:?:>D 6I64FE:G6 492:CA6CD@?] %96 4@>A2?J 2=D@ 2??@F?465 E96 2AA@:?E>6?E @7 7:G6 ?6H 3@2C5 >6>36CD]k^Am

kAm|F49 @7 E96 E62> 😀 7C@> sJ?]k^Am

kAmx E9:?< H6 D2H H:E9 sJ? E96 :>A24E E92E :E 925 @? C6D92A:?8 |2?496DE6C 2?5 E@ 92G6 E92E D2>6 E62> 4@>:?8 E@86E96C H:E9 2?@E96C 4@>A2?J =:<6 |:?:> 😀 C62==J 6I4:E:?8[ $<6=E@? D2:5] (96E96C D@>6 @7 E96:C E2=6?E 😀 32D65 96C6 @C 2== 24C@DD E96 DE2E6 @C @E96C A2CED @7 E96 4@F?ECJ[ :E 😀 8@:?8 E@ AFE |2?496DE6C @? E96 >2A]k^Am

kAmr9J?@H6E9 28C665]k^Am

kAmxE 😀 4@@= E@ D66 E96 :>A24E @7 E92E 4@>A2?J =:G6 @? 6G6? E9@F89 :ED ?2>6 😀 ?@ =@?86C @? E96 >:== 3F:=5:?8[ 96 D2:5]k^Am

Follow this link:
Minim to keep its name in merger with Boston tech company - The Union Leader

Comcast extends COVID support with hotspots and free Internet for new customers – Vermont Biz

Vermont Business Magazine Comcast announced today that it will extend its commitments to help people connect to the Internet during the COVID-19 pandemic as millions continue to stay home while many workplaces and schools operate virtually. Comcast will continue to provide free Internet service for the first 60 days for new Internet Essentials customers, and free access to more than 1.5 million public Xfinity WiFi hotspots, the largest network of its kind in the country, through June 30, 2021. Todays announcement marks the third time Comcast has extended these commitments. Hotspots are scattered across Vermont.

Our teams have worked tirelessly to ensure our networkisoperating at peak performance andhelp our customers and our communities navigate this unprecedented crisis, said Dave Watson, Chief Executive Officer, Comcast Cable. For nearly a decade, weve been on a mission to ensure students have the resources they need to be successful. Wehave accelerated that work during COVID-19 by partnering with public schools to provide Internet for more low-income students and by working with community centers to create safe spaces for families to connect to free WiFi through Lift Zones.

Comcast has repeatedly committed to keeping its customers connected, and to make its services available to families and students who dont have Internet access. These commitments are part of Comcasts comprehensive efforts to help families and individual stay connected, and to help empower small businesses, during the COVID-19 pandemic:

For more information and updates from Comcast related to Coronavirus, visit:

http://www.comcastcorporation.com/COVID-19/

About Comcast

ComcastCorporation (Nasdaq: CMCSA) is a global media and technology company withthreeprimary businesses: ComcastCable, NBCUniversal,and Sky. ComcastCable is one of the United States largest high-speed internet, video, and phone providers to residential customers under the Xfinity brand, and also provides these services to businesses. It also provides wireless and security and automation services to residential customers under the Xfinity brand. NBCUniversal is global and operates news, entertainment and sports cable networks, the NBC and Telemundo broadcast networks, television production operations, television station groups, Universal Pictures,and Universal Parks and Resorts. Sky is one of Europe's leading media and entertainment companies, connecting customers to a broad range of video content throughits pay television services. It also providescommunications services, including residential high-speedinternet, phone, and wireless services. Sky operates the Sky News broadcast network and sports and entertainment networks, produces original content, and has exclusive content rights. Visitwww.comcastcorporation.comfor moreinformation.

Source: December 7, 2020 Comcast

Read more from the original source:
Comcast extends COVID support with hotspots and free Internet for new customers - Vermont Biz

The most important internet issue you’ve never heard of | TheHill – The Hill

As the 116th Congress comes to an end, the annual defense authorizing legislation (NDAA) is among its most important pending matters and tucked within it is the most important internet issue that youve probably never heard of.

While not as visible as COVID relief or continuing government funding, the massive Fiscal Year 2021 NDAA Conference Committee report addresses many important defense and non-defense issues, including the naming of military bases after Confederate officers, limits on the Presidents ability to withdraw troops from Germany and Afghanistan, a threatened presidential veto over the absence of a repeal of Section 230 and much more to say nothing of the roughly $740 billion in military programs the law would authorize for the current fiscal year.

Amid these, both the House and Senate bills and the Conference Report address an important internet issue that is not much discussed and not much understood outside of a small circle of industry, scholarly, military, intelligence and law enforcement experts. The resolution of the issue (which wont get the kind of attention that creating a new National Cyber Director will get) could have an enormous impact on the shape and future of the entire internet far beyond the military and defense communities. Labeled information sharing, to put it most simply, its whether the U.S. Government (or any government) should regulate and control information about cyber threats that is shared by internet (and other) companies with U.S. military, law enforcement and intelligence agencies or whether the sharing of cyber threat information by internet companies should continue to be voluntary and led by industry.

The issue is often addressed in vague terms, but at its core, it divides American industry, the tech sector and even the internet industry itself and its resolution will establish basic rules for how the internet is regulated by the U.S. government and most other governments.

The Fiscal 2021 NDAA Conference Report partly addresses this issue and partly postpones it. Thats not surprising, given its complexity and enormous implications for the shape of the internet.

Aside from the political fact that nearly everyone supports cooperation on cyber security between government agencies and internet companies, the debates over mandatory versus voluntary cooperation is further complicated by the fact that serious cyber threats to the U.S. originate not only from a foreign military attack, but also from anyone from a bored high school student to a professional crime ring. Cyber threats from any of these could jeopardize large parts of our economy or social structure. So, a major underlying issue in mandatory versus voluntary information sharing is that the problem thats being addressed is not just defending against a foreign military attack on the United States. It is, arguably, defending against any type of cyber threat from anyone.

The details are quite complex, but the core issue has been hotly debated for over a decade and even echoes policy debates over industry regulation that go back to the 1980s. Like several other cybersecurity issues, the issue of information sharing was highlighted by the recent report of the Cyberspace Solarium Commission, which looked at the full scope of cyber threats to the U.S. and set forth a wide range of proposals to improve Americas cyber security. The Commission singled out companies that are part of the defense industrial base (which could include quite a large swath of the internet industry) and concluded that they and other internet companies need some form of new, mandatory information sharing for the national security of the United States. Not everyone agrees.

Historically, there have been many mostly in intelligence, law enforcement and the military who believe that major internet companies should be legally required to rapidly share information about cyber threats with law enforcement, military and intelligence agencies. These advocates of mandatory and regulated information sharing are supported by some defense contractors and many businesses that depend on the integrity of the internet for their business. Generally, their view is that whatever drawbacks this form of regulating the internet may have are a small price to pay for the significant increase in security and stability that mandatory and regulated information sharing would offer.

On the other hand, historically, some including many internet companies have encouraged a voluntary arrangement with very few or no mandatory cyber threat reporting requirements. These advocates of voluntary information sharing are supported by some civil liberties groups and advocates of limited government regulation. Generally, their view is that if the U.S. Government regulates major internet and other companies by legally requiring them to share information about cyber threats, then this exact same requirement will be imposed on these companies by numerous other governments. Moreover, many opponents assert that new government internet regulations of this sort are clumsy, easily-outdated and subject to legalistic manipulation compared with voluntary information sharing, which is often flexible and rapidly updated.

Other opponents assert that mandatory information sharing on cyber threats is an invitation to widespread snooping by intelligence and law enforcement on innocent citizens who are simply using the Internet.

The issue has been addressed before, most recently in 2015, when Congress enacted the Cybersecurity Information Sharing Act (CISA) to deal with some major concerns about such cyber threat information sharing: confusion over what cyber threat information to share and with which agency to share it, as well as concerns over privacy protection and liability of internet companies that share cyber threat information with federal agencies. Among other things, CISA led to the establishment of a detailed definition of cyber information that could be shared, a procedure for internet companies to share it if they wished to do so and an opportunity for internet companies that properly share information to also receive cyber threat information from agencies. CISA also provided some privacy protection to individuals (by requiring participating internet companies to strip out personal information), and it provided some indemnification for fully compliant internet companies that share cyber threat information.

After five years, the voluntary information sharing program created by CISA has met with mixed reviews. A recent Homeland Security Inspector General report noted that voluntary participation in the new information sharing program has been limited (219 companies by 2018), as has the amount of cyber threat information that has been shared. Which leads us back to the central controversy over whether the sharing of cyber threat information by internet companies with federal law enforcement, military and intelligence agencies should continue to be voluntary or whether it should be mandatory.

The FY21 NDAA House and Senate conferees agreed that multiple studies of this controversial issue will be conducted but also agreed to some limited new areas of mandatory and regulated cyber threat information sharing: The Secretary of Defense will determine by next October whether a defense industrial base threat information sharing program that includes mandatory industry cyber threat reporting, is feasible and suitable and if it is, will implement the program. In addition, the CISA Director (the lead official in the Homeland Security Department responsible for infrastructure and cyber security) is given significantly expanded authority to issue administrative subpoenas to internet companies, legally requiring them to provide cyber threat information.

Many other countries will closely watch the implementation of these new authorities and evaluations. Either a continued voluntary or a new mandatory approach to information sharing has serious consequences for the nature of the internet and its relationship with governments everywhere and for the security of the internet on which our society, economy and security increasingly depend. Consequently, the issue of mandatory versus voluntary cyber threat information sharing will probably remain among the most important yet least publicized or understood internet issues facing both industry and governments.

Roger Cochettiprovides consulting and advisory services in Washington, D.C. He was a senior executive with Communications Satellite Corporation (COMSAT) from 1981 through 1994. He also directed internet public policy for IBM from 1994 through 2000 and later served as Senior Vice-President & Chief Policy Officer for VeriSign and Group Policy Director for CompTIA. He served on the State Departments Advisory Committee on International Communications and Information Policy during the Bush and Obama administrations, has testified on internet policy issues numerous times and served on advisory committees to the FTC and various UN agencies. He is the author of theMobile Satellite Communications Handbook.

Read more:
The most important internet issue you've never heard of | TheHill - The Hill