Category Archives: Internet Security
Mocana Recognized as Industry Leader in Cybersecurity and the Industrial Internet of Things – GlobeNewswire
SUNNYVALE, Calif., June 03, 2020 (GLOBE NEWSWIRE) -- Mocana Corporation,a leading provider of integrated device security solutions for IoT and control systems, has been recognized as one of the Top 10 companies to follow by Cybercrime Magazine. In another industry ranking, the company was cited by influencer research service Onalytica as a Top 50 global brand influencer for the Industrial Internet of Things (IIoT).
As hackers grow more daring and sophisticated, robust security measures are a must for any business, Cybercrime Magazine reported. The companies that provide the tools and services to fight these threats are likewise continually improving. To know how to defend your business and clients best, you need to be aware of cybersecurity industry leaders.
Mocana was lauded for its alternative approach to standard security strategies based on threat detection. Instead, the company was showcased for offering a proactive, preventative solution for a variety industrial, military, business, government, and consumer sectors.
The wider global application of IIoT in the process industries and critical infrastructure has significantly heightened our awareness of risk, said Dave Smith, president of Mocana. The threat now comes from many sources, including cybercriminals, nation-states and insiders. Reactive cybersecurity strategies are simply not enough to thwart the increasing sophistication of attack methods. Protection has to be built in to systems and devices to create an impenetrable hardened core.
In another key industry recognition, Mocana was listed among the Top 50 IIoT brands by Onalytica, a company that provides market intelligence on global influencers and brands. Onalytica analyzed 2.2 million posts on social media to identify companies that demonstrate leadership on transformative solutions for an interconnected industrial and consumer world.
Mocanas solution enables enterprises to securely scale the management of IoT and IIoT devices from inception to end-of-life, enabling self-protecting devices and systems that can be remotely managed and automatically and securely updated to address new risks.
The companys products include TrustPoint, TrustCenter and TrustCore. TrustPoint is an on-device security software solution that simplifies and lowers the cost of protecting devices and managing the security lifecycle. It works in concert with TrustCenter, the first security orchestration platform focused entirely on IoT/IIoT devices. The TrustCore development platform provides an innovative solution to empower application developers with a simple set of APIs to leverage data privacy and protection controls for safety, security and compliance without extensive re-engineering. Combined, these products ensure that devices are trusted and tamper-proof with credentials and software updates that are provisioned and managed to minimize vulnerabilities and promote scalability.
Mocanas comprehensive platform-based solution protects the entire supply chain from embedded chips to the applications that drive them. Mocana is the market leader with more than 200 customers and 100 million IoT/IIoT devices protected.
About Mocana Corporation
Mocana provides cyber protection for IoT, operational technology (OT) and mission-critical systems. The companys proven on-device cybersecurity software and life cycle management platform enable manufacturers and industrial companies to build self-defending systems that are tamper-resistant. Mocanas tightly integrated solutions help companies minimize the risk of a cyber breach, comply with industry standards, and protect intellectual property by ensuring that devices and processes are trusted end-to-end, from device manufacturing to deployment. Unlike IT network security approaches, Mocana enables devices to protect themselves and prevent malware from being installed. Founded in 2002, Mocana protects more than 100 million devices and is trusted by the worlds largest aerospace, industrial, energy, healthcare, and telecommunications companies.Learn more at mocana.com.
TrustPoint, TrustCenter and TrustCore are registered trademarks of Mocana Corporation.
Media Contact: Joel DonDigital Marketing and Communicationsjoeldon@mocana.com
Read the original post:
Mocana Recognized as Industry Leader in Cybersecurity and the Industrial Internet of Things - GlobeNewswire
SC Awards Europe 2020 – CISO/CSO of the Year – SC Magazine UK
WINNER - CISO/CSO of the Year: Becky Pinkard
The footballing metaphor for cybersecurity is that of goalkeepers, but a more apt analogy for CISOs is a player-manager and team captain - leading by example. And this year the captains armband for CISO of the year goes to Becky Pinkard - CISO at Aldermore Bank PLC, co-founder of the We Empower Diversity in Start-ups (WEDS) group, mentor at CyLon cyber security accelerator, a renowned practitioner and commentator on information security, working in the sector since 1996. Pinkard is an influencer in the Cyber Security community and a role model for women in technology. A security transformation expert, Pinkard has built and managed global information security teams, designed risk and compliance strategies, led security audits and assessments, and developed security awareness training in small and large environments. Pinkard arrived in the UK in 2008 as Global Head of Attack at Barclays. Now she is back in the financial sector at Aldermore deploying her deep technical knowledge, highly developed communication skills and business acumen to manage change securely in this highly regulated industry.She is an active advocate for promoting diversity and inclusion in business and co-founded WEDS to use, the fresh opportunity start-ups present, to change industry culture for the better, to achieve more diverse and inclusive environments.As a CyLon mentor since 2017, Pinkard provides cyber security, operations and client success guidance to entrepreneurs. She also co-hosts a monthly podcast, Cyber Warrior Princess, focused on current cyber security related commentary.As a SANS Certified Instructor for over a decade, Pinkard served as a GIAC Certified Intrusion Analyst advisory board member and on the Strategic Advisory Council for the Center of Internet Security. She co-authored "Nmap in the Enterprise" and "Intrusion Prevention and Active Response, Deploying Network and Host IPS". Pinkard has shared her expertise at numerous industry events, in publications and in live interviews globally, including: The Wall Street Journal, Forbes, BBC News, Channel 4 News, and SC publications and events.I do security because I love it, says Pinkard.
More here:
SC Awards Europe 2020 - CISO/CSO of the Year - SC Magazine UK
Spike in cryptojacking attempts on devices here, says cyber-security firm – The Straits Times
Hackers are taking over computers to mine for cryptocurrency, with cyber-security firm Kaspersky saying Singapore has had a spike in cryptojacking attempts in the first three months of this year.
The firm said it blocked more than 11,700 cryptojacking attempts on devices here between January and March - an increase of more than three times from the same period last year, when there were about 2,900 attempts.
Cryptojacking is the unauthorised use of someone else's device to mine for cryptocurrency by solving complex mathematical problems.
In a recently published report, Russia-based Kaspersky said the spike in Singapore is the highest percentage increase in South-east Asia.
Hijackers target Singapore because its information technology infrastructure offers a healthy supply of bandwidth for cyber criminals to take advantage of.
"Cyber criminals use various means to install miner programs on many people's computers, and take all of the profit from cryptocurrency mining without incurring any of the equipment or electricity costs," said Mr Yeo Siang Tiong, general manager for South-east Asia at Kaspersky.
The hackers rely on social engineering tactics, such as fake links in e-mails or on websites, to dupe victims into installing malicious code onto their devices and wider networks, which turns them into mining tools.
"Miner" computers and devices perform a job similar to a central bank, recording transactions in a ledger publicly accessible to anyone while checking the validity of these exchanges.
For their work, those behind the mining computers are awarded cryptocurrency, which can make the enterprise profitable if the miners can put in the time and energy.
Cyber criminals increasingly prefer cryptojacking to other forms of attacks as it is often more profitable and presents a lower risk of being caught.
The uptick in cryptojacking cases could be due to more people working from home amid the Covid-19 pandemic, said Mr K.K. Lim, head of cyber security, privacy and data protection at law firm Eversheds Harry Elias.
Some of the computers used at home might not have been issued by companies and their security features may not have been kept up to date.
Number of cryptojacking attempts on devices here that were blocked by cyber-security firm Kaspersky between January and March.
Number of such attempts blocked by the company in the same period last year.
Also, these computers could be shared with other household members, who could have unwittingly downloaded risky programs or visited risky sites, said Mr Lim.
Mr Yeo said many workers might not have the full support of IT security teams working remotely, leading to a lower standard of cyber hygiene during this period.
Experts say there are some signs to look out for if one suspects a device has been hijacked for cryptojacking.
"The tell-tale signs for crypto mining can include the slowing down of computer speed, higher consumption of electricity and higher usage of Internet bandwidth," said Mr Bryan Tan, a lawyer from Pinsent Masons MPillay specialising in technology law and data protection.
Mr Yeo Siang Tiong, general manager for South-east Asia at cyber-security firm Kaspersky, said the strain on a device's battery from mining could cause it to physically be deformed too, due to having its processing cores work overtime to obtain cryptocurrency.
He pointed to a recent study by Kaspersky which found that phones that were used to mine for cryptocurrency through malware for two days straight became physically deformed due to the phone batteries expanding.
"Batteries will run down much faster than before, and devices may run quite hot. If the device uses a data plan, users will see data usage skyrocket," he added.
Mr K.K. Lim, head of cyber security, privacy and data protection at law firm Eversheds Harry Elias, said having in place proper Internet browser security features, which can scan for malicious software, will go a long way towards shielding users from falling victim to cryptojacking. But he added that nothing beats practising good cyber hygiene habits such as avoiding unknown links in e-mail and having updated security features.
Here is the original post:
Spike in cryptojacking attempts on devices here, says cyber-security firm - The Straits Times
The impact of spycraft on how we secure our data – ComputerWeekly.com
The cyber security industry has come a long way since its inception. The ancestors of cyber were the men and women working at Bletchley Park during the Second World War, long before the introduction of what we would consider modern cyber security practices but even before then, humans used codes and ciphers to keep information safe for millennia. Even Julius Caesar popularised a cipher which was named after him.
More recently, developments have been driven by the intelligence and defence sectors, which have a real need to uncover as well as keep sensitive intelligence safe. Some of these innovations were showcased recently at the Science Museums Top Secret exhibition, which ran from July 2019 to February 2020 to coincide with the 100th anniversary of GCHQ, the UKs intelligence, security and cyber agency.
It also gives us the context as to where developments have originated, and the ways in which they will subsequently impact how businesses keep their data safe from cyber criminals in the future.
The threats organisations face today are varied from organised crime groups to nation-state hackers, as well as individual hackers. One of the ways organisations try to defend themselves is through encryption.
Ciphers have been around for centuries in one form or another from non-standard hieroglyphs in the walls of tombs built in ancient Egypt almost 4,000 years ago, to substitution ciphers developed 1,200 years ago by Arab mathematician Al-Kindi. The rise of electronic communications during the Cold War led to monumental developments in ciphers and encryption technology, which were used to keep phone conversations secure.
Today, the focus for many organisations and businesses is the use of encryption on mobile devices, enterprise networks and cloud services. Given the impact of mobile devices and digital communication on how organisations conduct their business with partners and customers globally, this has been a key development ensuring conversations remain private while enabling fast and secure communication.
Today, encryption is used in all sectors for medical data in healthcare, customer information in banking, and much more. This highlights the importance of all areas of industry, outside of tech and IT, learning from the intelligence communitys experience developing advanced solutions to secure communications and data.
Many technologies initially developed by the intelligence community have become commonplace in keeping our everyday communications secure, according to Elizabeth Bruton, curator of the Science Museums Top Secret exhibition.
Randomness has always been used to disguise messages, she said. Though the technology today is radically different, the basic principles of encryption using long strings of random characters letters and numbers have changed very little over the past 100 years. The Top Secret exhibition features letter tiles used by the Government Code and Cypher School staff at Mansfield College, Oxford, during the Second World War.
GC&CS staff pulled these tiles out of a bag to create long strings of random numbers or letters, she said. They were used to make encryption keys and one-time pads to keep British wartime messages secure. Today, randomness underpins some of the encryption systems we use to keep our communications secure.
Also featured in the Top Secret exhibition is a chaotic pendulum used by the internet security company Cloudflare to help keep online messages secret. Cloudflare uses readings from devices such as this pendulum and a wall of lava lamps to make long strings of random numbers, said Bruton. These random numbers help create keys that encrypt the traffic that flows through Cloudflares network.
Although its interesting to see how todays cyber security solutions have been influenced by the past, emerging technologies can also help us gaze into the future. One of the exhibits in the Top Secret exhibition consists of parts from a quantum computer. This new computing paradigm has the potential to rewrite how we use technology.
Quantum computers could significantly weaken our cyber defences by processing information in a manner completely different to that of traditional computers. Work is already underway to develop quantum-resistant encryption that is likely to become a common business practice in the next decade.
Breakthroughs such as quantum computing are a reminder that organisations should constantly be thinking about how the threats they face evolve. After all, cyber crime is set to cost businesses over $2tn this year alone. Todays new tech could be tomorrows threat, and bad actors such as organised cybercriminals and nation-state attackers will always look to exploit the latest and greatest tech.
Cyber criminals are often quick to use new technologies. Since they dont operate in regulated industries or need to consider customers and users, they can be more efficient at harnessing these technologies for harm than organisations are at harnessing them for good.
The cyber security sector is experiencing tremendous growth, driven by our dependence on technology. Global cyber security spending is expected to reach $248bn by 2026.
As such, its prudent for all organisations to look at both the past and the future if they want to remain safe from cyber criminals and invest wisely. The crossover between what technologies the intelligence sector has developed and how these have been adopted into mainstream cyber security solutions highlights the many years of research it takes to keep data safe.
As organisations face ever more threats, they should look to learn as much as they can from every sector and be open to sharing best practices to ensure robust defences.
Subject to the anticipated reopening of the UKs museums as Covid-19 pandemic restrictions ease, the Top Secret exhibition is scheduled to open at Manchesters Science and Industry Museum in October 2020.
Mark Hughes is senior vice-president of security at DXC Technology
Continued here:
The impact of spycraft on how we secure our data - ComputerWeekly.com
4 Common Online Frauds That You Need to Know – Techjaja
The Internet has become a necessity for us today. Its made our lives easier and opened opportunities for earning a living, connecting with people across the globe, and more. Unfortunately, its also drawn the attention of unsocial elements in society which is why there are all kinds of online frauds that we face today. The following are some of them that you need to know:
- Advertisement -
1. Phishing Emails
Phishing is one of the most common online frauds that we know of and its also one of the online scams you should avoid in lockdown. In this, a scamster tries to trick an email user into believing that they, the scamster, is actually a representative of a bank or a government office. They usually send an email to create a panic situation. For instance, you may receive an email from a particular bank and the message may say that your online bank account has been compromised and you have to change your password to secure it immediately. If you click the link shared in the email, then it may take you to a fake website that looks identical to the banks original website. Once you share your current password with this website, then its shared with the scamster and they can use it to transfer your money to their account.
Phishing attacks are rampant. However, if you are careful and check the authenticity of suspicious emails before you take action, then you can prevent becoming a victim in most cases.
2. Ransomware
Stay Updated
Ransomware programs are an advanced family of viruses that when active, can gain administrative rights to your computer system and lock you out. You usually get a warning from the attacker that if you have important files and documents on the device and you want to access them again, then you have to pay a ransom to the attack.
Ransomware are quite dangerous. You can prevent them from infecting your computer by using the best antivirus for Windows, downloading software from trusted sites only, and avoiding downloading attachments that are sent in suspicious emails.
3. Fake Shopping Websites
We all love shopping online. Its convenient, offers great discounts, and you get to choose from a wide range of products from the comfort of your home. However, if you arent careful, then you can fall for a fake shopping website scam.
There are thousands of online shopping websites. However, not all of them can be trusted. There are many websites that look legitimate, but they may steal your banking information or accept your payment and not deliver the products. The good news is that you can easily identify them if you are using Internet security solutions from trusted brands like Bitdefender. These companies offer Internet security software that can block malicious shopping websites for your protection.
4. Job Offer Scam
Fraud entities have not spared even the employment domain. These people send emails with lucrative job opportunities that are fake. The messages typically start with claims that the recruiter saw your resume on LinkedIn or some other job portal and you are selected for a particular job profile. They mention that you can expect to earn a monthly salary of a particular amount which is quite high. The job is in a different country and you are required to pay a certain amount as a fee for legal work. Thats the trap. If you pay this amount for the seeming dream job thats offered, then you will never see it. So, make sure that you verify the details of such emails and also do some background checking before you take any step. A rule of thumb is- if a job is offered which is too good to be true, then it probably is.
Your Safety is in Your Hands
The Internet is a wonderful place, but its also a scary place. If you are not careful, then you can easily become a victim or a fraud or even identity theft. So, make sure you stay up to date with the emerging risks on the Internet. Also, set up comprehensive online security programs on all your devices- mobiles and computers, as soon as possible. If you are looking for a recommendation, then Bitdefender is a good one. They are even running a 90-day free trial currently. So, what are you waiting for?
- Advertisement -
Read more:
4 Common Online Frauds That You Need to Know - Techjaja
This $350 "Anti-5G" Device Is Apparently Just a USB Stick – WIRED
As the Covid-19 pandemic rages on, states around the US are starting to debut contact-tracing apps built on a Bluetooth-based system engineered by Apple and Google. But a coordinated national effort is noticeably missing, creating the potential for an opaque patchwork of state-specific apps that don't work well together.
At the same time, states are also rolling out manual contact-tracing programs using trained volunteers, but scammers are piggybacking on these urgent public health efforts to send bogus SMS text messages that claim to be related to contact tracing and lure victims to click malicious links. If you don't already use a password manager, now is an excellent time to start in many ways.
On Thursday, the National Security Agency put out a warning that the notorious Russian hacking group Sandworm has been exploiting a known vulnerability in certain popular mail servers. Meanwhile, the confirmation of John Ratcliffe as director of national intelligence is problematic, given his lack of relevant experience and Trump sycophancy. And a jailbreak for the current version of iOS came out this week, delighting security researchers and hobbyists. It's one of the first of its kind in years, raising questions about whether iOS is entering a new era of jailbreaking thanks to more plentiful vulnerabilities.
In good news, the beleaguered internet security guardian Shadowserver is no longer on the brink of collapse after raising enough money to establish a new data center and sustain itself in the near term.
But wait, there's more! Every Saturday we round up the security and privacy stories that we didnt break or report on in depth but think you should know about. Click on the headlines to read them, and stay safe out there.
As 5G wireless data networks roll out around the world, conspiracy theories have exploded about their alleged deleterious health effects. One product that has emerged from the paranoia is the "5GBioShield USB Key," which claims to be a "quantum holographic catalyzer technology for the balance and harmonisation of the harmful effects of imbalanced electric radiation." The pitch is that the device creates a protective bubble around its owners at all times; you can purportedly boost the range by plugging it into a laptop or other device. The 5GBioShield claims not to block Wi-Fi, though, only 5G. One shield sells for about $350. Researchers who analyzed the device, though, say that it appears to be a simple flash drive, with no extra components and only 128MB of storage. UK Trading Standards officers are investigating the product after the Glastonbury town council's 5G advisory committee recommended it.
Years-old rumors that the social blogging platform LiveJournal had at some point suffered a breach seemed to be confirmed this week. A trove of 26 million usernames, email addresses, and plaintext passwords for the site leaked on the dark web after apparently being traded privately among hackers for years. A ZDNet analysis of the data seems to indicate that it was stolen from LiveJournal in 2014.
Amidst the Covid-19 pandemic, the Qatari government has mandated that all residents download its EHTERAZ contact-tracing app or face extremely steep fines. But researchers from Amnesty International found that the app had a major configuration flaw that exposed data of more than a million users who have downloaded the app. Amnesty reported the vulnerability and Qatari officials quickly patched it, but the bug exposed sensitive details like names, national ID numbers, location data, and information about users' health. Amnesty researchers also point out that while it's positive that the issue was fixed quickly, the app still has problematic, privacy-infringing features like GPS and Bluetooth location trackers. It is also set up to store all user data in a central repository.
A botnet for distributing malware has become so large within China that the antivirus firm Qihoo 360 and search giant Baidu have banded together to attempt to take it down. Known as DoubleGuns, the botnet has been around for more than three years and is thought to currently be infecting hundreds of thousands of victim devices. The botnet targets victims with a Windows trojan and is used for spam campaigns and to distribute malicious apps and adware. Qihoo 360 and Baidu have succeeded at temporarily disrupting the botnet, an important step in itself, but are still working to more permanently dismantle its infrastructure.
More Great WIRED Stories
See the article here:
This $350 "Anti-5G" Device Is Apparently Just a USB Stick - WIRED
Cloud DDoS Mitigation Software Market Potential Growth, Share, Demand And Analysis Of Key Players- Analysis Forecasts To 2026 – Cole of Duty
The Cloud DDoS Mitigation Software Market research report enhanced worldwide Coronavirus COVID19 impact analysis on the market size (Value, Production and Consumption), splits the breakdown (Data Status 2014-2020 and 6 Year Forecast From 2020 to 2026), by region, manufacturers, type and End User/application. This Cloud DDoS Mitigation Software market report covers the worldwide top manufacturers like (Amazon Web Services, Microsoft, Webroot, Google, Akamai Technologies, Alibaba, AT&T, CenturyLink, Imperva, Cloudflare, Cloudbric, SiteLock, StackPath, Check Point Software Technologies, DOSarrest Internet Security) which including information such as: Capacity, Production, Price, Sales, Revenue, Shipment, Gross, Gross Profit, Import, Export, Interview Record, Business Distribution etc., these data help the consumer know about the Cloud DDoS Mitigation Software market competitors better. It covers Regional Segment Analysis, Type, Application, Major Manufactures, Cloud DDoS Mitigation Software Industry Chain Analysis, Competitive Insights and Macroeconomic Analysis.
Get Free Sample PDF (including COVID19 Impact Analysis, full TOC, Tables and Figures)of Cloud DDoS Mitigation Software[emailprotected]https://www.researchmoz.us/enquiry.php?type=S&repid=2524471
Cloud DDoS Mitigation Software Market report offers comprehensive assessment of 1) Executive Summary, 2) Market Overview, 3) Key Market Trends, 4) Key Success Factors, 5) Cloud DDoS Mitigation Software Market Demand/Consumption (Value or Size in US$ Mn) Analysis, 6) Cloud DDoS Mitigation Software Market Background, 7) Cloud DDoS Mitigation Software industry Analysis & Forecast 20202026 by Type, Application and Region, 8) Cloud DDoS Mitigation Software Market Structure Analysis, 9) Competition Landscape, 10) Company Share and Company Profiles, 11) Assumptions and Acronyms and, 12) Research Methodology etc.
Scope of Cloud DDoS Mitigation Software Market:Cloud DDoS mitigation software is used to provide global protection against distributed denial of service (DDoS) attacks.
On the basis on the end users/applications,this report focuses on the status and outlook for major applications/end users, shipments, revenue (Million USD), price, and market share and growth rate foreach application.
Individual Enterprise Others
On the basis of product type, this report displays the shipments, revenue (Million USD), price, and market share and growth rate of each type.
On-premise Cloud-based
Do You Have Any Query Or Specific Requirement? Ask to Our Industry[emailprotected]https://www.researchmoz.us/enquiry.php?type=E&repid=2524471
Geographically, the report includes the research on production, consumption, revenue, Cloud DDoS Mitigation Software market share and growth rate, and forecast (2020-2026) of the following regions:
Important Cloud DDoS Mitigation Software Market Data Available In This Report:
Strategic Recommendations, Forecast Growth Areasof the Cloud DDoS Mitigation Software Market.
Challengesfor the New Entrants,TrendsMarketDrivers.
Emerging Opportunities,Competitive Landscape,Revenue Shareof Main Manufacturers.
This Report Discusses the Cloud DDoS Mitigation Software MarketSummary; MarketScopeGives A BriefOutlineof theCloud DDoS Mitigation Software Market.
Key Performing Regions (APAC, EMEA, Americas) Along With Their Major Countries Are Detailed In This Report.
Company Profiles, Product Analysis,Marketing Strategies, Emerging Market Segments and Comprehensive Analysis of Cloud DDoS Mitigation Software Market.
Cloud DDoS Mitigation Software Market ShareYear-Over-Year Growthof Key Players in Promising Regions.
What is the (North America, South America, Europe, Africa, Middle East, Asia, China, Japan)production, production value, consumption, consumption value, import and exportof Cloud DDoS Mitigation Software market?
To Get Discount of Cloud DDoS Mitigation Software Market:https://www.researchmoz.us/enquiry.php?type=D&repid=2524471
Contact:
ResearchMozMr. Rohit Bhisey,Tel: +1-518-621-2074USA-Canada Toll Free: 866-997-4948Email:[emailprotected]
Browse More Reports Visit @https://www.mytradeinsight.blogspot.com/
See the original post:
Cloud DDoS Mitigation Software Market Potential Growth, Share, Demand And Analysis Of Key Players- Analysis Forecasts To 2026 - Cole of Duty
India wants to be a ‘partner of the global economy’ in its manufacturing push, minister says – CNBC
India has the resources it needs to become a global electronics manufacturing hub and a competitive partner to the world economy, the country's technology minister said.
The government on Tuesday introduced a $6.6 billion incentive scheme for international companies to ramp up their electronics manufacturing production in India.
"This whole scheme is industry specific, to make India a big hub of electronic manufacturing," Ravi Shankar Prasad, minister for communications, electronics and information technology, told CNBC's Tanvir Gill.
Electronics manufacturing particularly the production and assembly of smartphones is a cornerstone of Prime Minister Narendra Modi's"Make In India" campaign. In recent years, that's become more prominent as global tech companies are moving out of China to diversify their supply chain, going into places like Vietnam or India.
"When we talk of 'Make In India,' it does not mean India in isolation. It means an India, which is globally becoming competitive, as a partner of the global economy India's asset in service of the global assets," he added.
Last month, Modi gave a speech underscoring the need for India to become self-reliant as the economy struggles to bounce back from the coronavirus pandemic. Some took that to mean a more protectionist India in the future.
India is one of the world's fastest-growing smartphone markets and Modi's government provided incentives for smartphone companies to set up factories in the country. Top smartphone makers including Samsung, Appleand Xiaomi have production centers and assembly lines in India for some of their handsets.
The government says India had two mobile phone factories in 2014 the year Modi's government came into power and now it is the second-largest mobile phone producer in the world.
A man talks on a mobile phone outside a medical supply store during a curfew in response to the outbreak of the Coronavirus (COVID-19) pandemic on March 27, 2020 in Mumbai, India.
Himanshu Bhatt | NurPhoto | Getty Images
According to Prasad, manufacturers can tap into a gamut of India's "IT power, the soft power, the start-up power, the human resource" that is available in abundance. That includes the relative ease of doing business in the country which has improved in recent years a competitive corporate tax rate and an "enormous" talent pool, he added.
"'Make In India' is not against any country, it's only India positive, Prasad said.
One of the initiatives announced Tuesday said the government will provide production-linked cash incentives to companies, worth 4% to 6% of incremental sales over five years, on goods manufactured locally. Up to five international smartphone makers would be selected for the scheme. The rest of the schemes were aimed at stepping up electronic components production and improving the infrastructure available to companies.
"Many of the global brands are already inIndia, making large number of mobile phones. Therefore, they've seen the work of India," Prasad said.
Prasad said the coronavirus has interrupted plans for 5G testing, whichrefers to the fifth generation of high-speed mobile internet that aims to provide faster data speeds and more bandwidth to carry growing levels of web traffic. The pandemic has affected more than 6 million people around the world and forced countries, including India, to shut down their economies temporarily.
"India is a huge market for 5G," Prasad said, explaining that the country will resume experimenting with the technology once the virus outbreak is brought under control. "We have also to address (the technology's) security concerns."
Chinese telecommunication equipment supplier Huawei, which has a presence in India, is facing pressure from countries like the U.S., which banned the firm from participating in its 5G rollout due to security concerns. Huawei has denied its products pose any security risks.
When asked what India's stance is on Huawei, Prasad said no company would be stopped from running 5G trials.
"The larger issueof who will be allowed or who will not be allowed is a question of policy and also our auction purposes. A call will have to be taken by India, consistent with our security perspective also," he said.
See the original post:
India wants to be a 'partner of the global economy' in its manufacturing push, minister says - CNBC
Amid the COVID-19 crisis and the looming economic recession, the Web Content Filtering market worldwide will grow by a projected US$3 Billion, during…
New York, June 04, 2020 (GLOBE NEWSWIRE) -- Reportlinker.com announces the release of the report "Global Web Content Filtering Industry" - https://www.reportlinker.com/p03646047/?utm_source=GNW 7 Billion by the end of the analysis period. An unusual period in history, the coronavirus pandemic has unleashed a series of unprecedented events affecting every industry. The Web Content Filtering market will be reset to a new normal which going forwards in a post COVID-19 era will be continuously redefined and redesigned. Staying on top of trends and accurate analysis is paramount now more than ever to manage uncertainty, change and continuously adapt to new and evolving market conditions.
As part of the new emerging geographic scenario, the United States is forecast to readjust to a 9.9% CAGR. Within Europe, the region worst hit by the pandemic, Germany will add over US$111.7 Million to the regions size over the next 7 to 8 years. In addition, over US$97.7 Million worth of projected demand in the region will come from Rest of European markets. In Japan, the Web Content Filtering segment will reach a market size of US$267 Million by the close of the analysis period. Blamed for the pandemic, significant political and economic challenges confront China. Amid the growing push for decoupling and economic distancing, the changing relationship between China and the rest of the world will influence competition and opportunities in the Web Content Filtering market. Against this backdrop and the changing geopolitical, business and consumer sentiments, the worlds second largest economy will grow at 15.9% over the next couple of years and add approximately US$612.5 Million in terms of addressable market opportunity. Continuous monitoring for emerging signs of a possible new world order post-COVID-19 crisis is a must for aspiring businesses and their astute leaders seeking to find success in the now changing Web Content Filtering market landscape. All research viewpoints presented are based on validated engagements from influencers in the market, whose opinions supersede all other research methodologies.
Competitors identified in this market include, among others, Alps System Integration Co., Ltd.; Barracuda Networks, Inc.; Cisco Systems, Inc.; ContentKeeper Technologies Pty. Ltd.; Digital Arts Inc.; Forcepoint LLC; Fortinet, Inc.; Kaspersky Lab; McAfee, LLC; Palo Alto Networks, Inc.; Sangfor Technologies Co., Ltd.; Sophos Ltd.; Symantec Corporation; Zscaler, Inc.
Read the full report: https://www.reportlinker.com/p03646047/?utm_source=GNW
WEB CONTENT FILTERING MCP-7MARKET ANALYSIS, TRENDS, AND FORECASTS, JUNE 2CONTENTS
I. INTRODUCTION, METHODOLOGY & REPORT SCOPE
II. EXECUTIVE SUMMARY
1. MARKET OVERVIEW The Internet Connected World and its Share of Challenges Recent Market Activity Cyber Security Tools Gain Prominence Amid Growing Online Security Issues Web Content Filtering - A Growing Segment in Cyber Security Market Market Outlook Web Filtering Solutions Find Steady Growth Prospects Amid Surging Cyberattacks Developed Markets Lead while Developing Regions to Lend Traction Corporate Information Assets - Vulnerable as Ever Ranking as per Frequency of Data Breaches by Industry Increasing Web 2.0 & E-Mail Threats Boost Demand for Content Filtering Products Industry Moves to New Approaches in Web-traffic Filtering and Categorization Content Filtering Functionality Sees Paradigm Shift Static Website Blacklists No Longer Solve the Purpose Upgradeability Capabilities Come to the Fore with Growing Bandwidth Usage Web & Spam Filtering Solutions to Prevent Ransomware Attacks Integration of Multiple Functions in Content Filtering Solutions - The Present Trend, Advantages and Issues Content Filtering an Integral Part of Unified Threat Management (UTM) XTMs Emerge as More Potential Tool Disaggregation of Filtering Administration Gains Importance Email Filtering - Largely Focused on Incoming Emails Messaging Security - A Growing Secure Content Management Solution Increasing IMing Drives Need for IM Filtering VoIP Filtering Gains Popularity Inherent Inefficiencies in On-Premise Implementations Drives Demand for Cloud Solutions Key Disadvantages of On-site Security Implementations Web Content Filtering - Concerns and Challenges Risks of Latency - A Major Challenge Ahead Global Competitor Market Shares Web Content Filtering Competitor Market Share Scenario Worldwide (in %): 2020 & 2029 Impact of Covid-19 and a Looming Global Recession 2. FOCUS ON SELECT PLAYERS Alps System Integration Co., Ltd. (Japan) Barracuda Networks, Inc. (USA) Cisco Systems, Inc. (USA) ContentKeeper Technologies Pty. Ltd. (Australia) Digital Arts Inc. (Japan) Forcepoint LLC (USA) Fortinet, Inc. (USA) Kaspersky Lab (Russia) McAfee, LLC (USA) Palo Alto Networks, Inc. (USA) Sangfor Technologies Co., Ltd. (China) Sophos Ltd. (UK) Symantec Corporation (USA) TitanHQ (Ireland) Trend Micro Incorporated (Japan) Zscaler, Inc. (USA) 3. MARKET TRENDS & DRIVERS Expanding Internet User Base Generates Significant Market Opportunities Rise in Magnitude of Cyber Crime to Drive Adoption of Web Content Filtering Increasing Prevalence of Malware to Drive Robust Demand for Web Filtering Trojan: Fastest Growing Data-Stealing Malware APTs Emerge as a New Sophisticated Threat - Create Business Case for Web Content Filtering Hactivism on the Prowl - Creates Need for Efficient Cyber Security Solutions Conflicting Web Needs Drive Need for Flexible Solutions Individual Filtering Solutions See Changes in Functionality in Response to Evolving Needs Complimentary Endpoint Web Filtering Technique Gains Favor Endpoint Web Filtering Extends Infection Risk Control Beyond Organizational Networks Growing Use of Advanced Digital Platforms Make Enterprises Highly Vulnerable to Security Threats Growing BYOD Phenomenon Drives Adoption of Web Content Filtering Solutions Growth in Adoption of Mobile End-Points in Enterprises Make Enterprise Endpoint Security a Major Necessity Security Solutions Focusing on Smartphone Security Gains Rapid Adoption Industry Still Underprepared to Tackle Mobile Security Concerns Threat from Social Networking Sites Drives Demand for Information Security Solutions Avoiding Unnecessary Costs - Key Rationale for Adoption of IT Security Solutions Small and Mid-Sized Businesses - A Lucrative Market Segment Regulatory Compliance Requirements Continue to Drive Demand for Web Filtering Solutions 4. GLOBAL MARKET PERSPECTIVE Table 1: Web Content Filtering Global Market Estimates and Forecasts in US$ Thousand by Region/Country: 2020-2027 Table 2: Web Content Filtering Global Retrospective Market Scenario in US$ Thousand by Region/Country: 2012-2019 Table 3: Web Content Filtering Market Share Shift across Key Geographies Worldwide: 2012 VS 2020 VS 2027 III. MARKET ANALYSIS GEOGRAPHIC MARKET ANALYSIS UNITED STATES Table 4: United States Web Content Filtering Market Estimates and Projections in US$ Thousand: 2020 to 2027 Table 5: Web Content Filtering Market in the United States: A Historic Review in US$ Thousand for 2012-2019 CANADA Table 6: Canadian Web Content Filtering Market Estimates and Forecasts in US$ Thousand: 2020 to 2027 Table 7: Canadian Web Content Filtering Historic Market Review in US$ Thousand: 2012-2019 JAPAN Table 8: Japanese Market for Web Content Filtering: Annual Sales Estimates and Projections in US$ Thousand for the Period 2020-2027 Table 9: Web Content Filtering Market in Japan: Historic Sales Analysis in US$ Thousand for the Period 2012-2019 CHINA Table 10: Chinese Web Content Filtering Market Growth Prospects in US$ Thousand for the Period 2020-2027 Table 11: Web Content Filtering Historic Market Analysis in China in US$ Thousand: 2012-2019 EUROPE Table 12: European Web Content Filtering Market Demand Scenario in US$ Thousand by Region/Country: 2020-2027 Table 13: Web Content Filtering Market in Europe: A Historic Market Perspective in US$ Thousand by Region/Country for the Period 2012-2019 Table 14: European Web Content Filtering Market Share Shift by Region/Country: 2012 VS 2020 VS 2027 FRANCE Table 15: Web Content Filtering Market in France: Estimates and Projections in US$ Thousand for the Period 2020-2027 Table 16: French Web Content Filtering Historic Market Scenario in US$ Thousand: 2012-2019 GERMANY Table 17: Web Content Filtering Market in Germany: Recent Past, Current and Future Analysis in US$ Thousand for the Period 2020-2027 Table 18: German Web Content Filtering Historic Market Analysis in US$ Thousand: 2012-2019 ITALY Table 19: Italian Web Content Filtering Market Growth Prospects in US$ Thousand for the Period 2020-2027 Table 20: Web Content Filtering Historic Market Analysis in Italy in US$ Thousand: 2012-2019 UNITED KINGDOM Table 21: United Kingdom Market for Web Content Filtering: Annual Sales Estimates and Projections in US$ Thousand for the Period 2020-2027 Table 22: Web Content Filtering Market in the United Kingdom: Historic Sales Analysis in US$ Thousand for the Period 2012-2019 SPAIN Table 23: Spanish Web Content Filtering Market Estimates and Forecasts in US$ Thousand: 2020 to 2027 Table 24: Spanish Web Content Filtering Historic Market Review in US$ Thousand: 2012-2019 RUSSIA Table 25: Russian Web Content Filtering Market Estimates and Projections in US$ Thousand: 2020 to 2027 Table 26: Web Content Filtering Market in Russia: A Historic Review in US$ Thousand for 2012-2019 REST OF EUROPE Table 27: Rest of Europe Web Content Filtering Market Estimates and Forecasts in US$ Thousand: 2020-2027 Table 28: Web Content Filtering Market in Rest of Europe in US$ Thousand: A Historic Review for the Period 2012-2019 ASIA-PACIFIC Table 29: Asia-Pacific Web Content Filtering Market Estimates and Forecasts in US$ Thousand by Region/Country: 2020-2027 Table 30: Web Content Filtering Market in Asia-Pacific: Historic Market Analysis in US$ Thousand by Region/Country for the Period 2012-2019 Table 31: Asia-Pacific Web Content Filtering Market Share Analysis by Region/Country: 2012 VS 2020 VS 2027 AUSTRALIA Table 32: Web Content Filtering Market in Australia: Recent Past, Current and Future Analysis in US$ Thousand for the Period 2020-2027 Table 33: Australian Web Content Filtering Historic Market Analysis in US$ Thousand: 2012-2019 INDIA Table 34: Indian Web Content Filtering Market Estimates and Forecasts in US$ Thousand: 2020 to 2027 Table 35: Indian Web Content Filtering Historic Market Review in US$ Thousand: 2012-2019 SOUTH KOREA Table 36: Web Content Filtering Market in South Korea: Recent Past, Current and Future Analysis in US$ Thousand for the Period 2020-2027 Table 37: South Korean Web Content Filtering Historic Market Analysis in US$ Thousand: 2012-2019 REST OF ASIA-PACIFIC Table 38: Rest of Asia-Pacific Market for Web Content Filtering: Annual Sales Estimates and Projections in US$ Thousand for the Period 2020-2027 Table 39: Web Content Filtering Market in Rest of Asia-Pacific: Historic Sales Analysis in US$ Thousand for the Period 2012-2019 LATIN AMERICA Table 40: Latin American Web Content Filtering Market Trends by Region/Country in US$ Thousand: 2020-2027 Table 41: Web Content Filtering Market in Latin America in US$ Thousand by Region/Country: A Historic Perspective for the Period 2012-2019 Table 42: Latin American Web Content Filtering Market Percentage Breakdown of Sales by Region/Country: 2012, 2020, and 2027 ARGENTINA Table 43: Argentinean Web Content Filtering Market Estimates and Forecasts in US$ Thousand: 2020-2027 Table 44: Web Content Filtering Market in Argentina in US$ Thousand: A Historic Review for the Period 2012-2019 BRAZIL Table 45: Web Content Filtering Market in Brazil: Estimates and Projections in US$ Thousand for the Period 2020-2027 Table 46: Brazilian Web Content Filtering Historic Market Scenario in US$ Thousand: 2012-2019 MEXICO Table 47: Web Content Filtering Market in Mexico: Recent Past, Current and Future Analysis in US$ Thousand for the Period 2020-2027 Table 48: Mexican Web Content Filtering Historic Market Analysis in US$ Thousand: 2012-2019 REST OF LATIN AMERICA Table 49: Rest of Latin America Web Content Filtering Market Estimates and Projections in US$ Thousand: 2020 to 2027 Table 50: Web Content Filtering Market in Rest of Latin America: A Historic Review in US$ Thousand for 2012-2019 MIDDLE EAST Table 51: The Middle East Web Content Filtering Market Estimates and Forecasts in US$ Thousand by Region/Country: 2020-2027 Table 52: Web Content Filtering Market in the Middle East by Region/Country in US$ Thousand: 2012-2019 Table 53: The Middle East Web Content Filtering Market Share Breakdown by Region/Country: 2012, 2020, and 2027 IRAN Table 54: Iranian Market for Web Content Filtering: Annual Sales Estimates and Projections in US$ Thousand for the Period 2020-2027 Table 55: Web Content Filtering Market in Iran: Historic Sales Analysis in US$ Thousand for the Period 2012-2019 ISRAEL Table 56: Israeli Web Content Filtering Market Estimates and Forecasts in US$ Thousand: 2020-2027 Table 57: Web Content Filtering Market in Israel in US$ Thousand: A Historic Review for the Period 2012-2019 SAUDI ARABIA Table 58: Saudi Arabian Web Content Filtering Market Growth Prospects in US$ Thousand for the Period 2020-2027 Table 59: Web Content Filtering Historic Market Analysis in Saudi Arabia in US$ Thousand: 2012-2019 UNITED ARAB EMIRATES Table 60: Web Content Filtering Market in the United Arab Emirates: Recent Past, Current and Future Analysis in US$ Thousand for the Period 2020-2027 Table 61: United Arab Emirates Web Content Filtering Historic Market Analysis in US$ Thousand: 2012-2019 REST OF MIDDLE EAST Table 62: Web Content Filtering Market in Rest of Middle East: Recent Past, Current and Future Analysis in US$ Thousand for the Period 2020-2027 Table 63: Rest of Middle East Web Content Filtering Historic Market Analysis in US$ Thousand: 2012-2019 AFRICA Table 64: African Web Content Filtering Market Estimates and Projections in US$ Thousand: 2020 to 2027 Table 65: Web Content Filtering Market in Africa: A Historic Review in US$ Thousand for 2012-2019 IV. COMPETITION
Total Companies Profiled: 65 Read the full report: https://www.reportlinker.com/p03646047/?utm_source=GNW
About ReportlinkerReportLinker is an award-winning market research solution. Reportlinker finds and organizes the latest industry data so you get all the market research you need - instantly, in one place.
__________________________
Read the original:
Amid the COVID-19 crisis and the looming economic recession, the Web Content Filtering market worldwide will grow by a projected US$3 Billion, during...
Mozilla VP of IT: How to stay secure while remote working – BusinessCloud
The world is currently undertaking the largest remote working experiment in history, and the UK is no exception. Large corporates such as Facebook and Google have already extended their telecommuting policy through to 2021.
While manufacturing and service industries focus on how to get employees to work on site safely, many businesses are implementing work-from-home policies that will be in place long after the crisis is resolved. Nine out of ten Brits now want the option to work from home at least once a week, largely driven by the desire to cut out their commutes.
Making sure employees stay connected, productive and socially distant are clear priorities, but businesses must not forget this new organisational shift poses serious privacy risks.
Without the right processes and infrastructure in place, the risk of unauthorised data transfers and sharing grows. User privacy is also under threat as employees adapt to new and unfamiliar tools needed to do their job from home. All of this is exacerbated by the simple fact that home networks are hardly ever as secure as corporate networks.
At Mozilla, weve been focusing on home office security for some time. Half of our global workforce, and 69% in the UK, were working permanently from home long before the crisis prompted this shift. Weve learnt that employers need to actively support their employees in creating a secure office environment, particularly given the shift has been sudden and without warning for many.
There are three main areas that must be prioritised when designing a home office: connection security, IT security, and data security.
Most company devices and associated software are overseen by an in-house IT expert or a specialised contractor. This means they have the right antivirus software and firewall protections set up, and these are updated regularly. Nearly every company aims to enforce strict rules around the use of private hardware such as laptops or storage devices for work because they are far less secure. However, when working from home, employees are less likely to follow guidelines particularly if theyre not set out clearly.
Thats why business devices should ideally only be used when working, and employees should avoid the temptation to plug in private USBs or visit suspicious websites; while your companys common protection software can safeguard against many threats, its not completely immune.
Moreover, be careful of checking your work and private emails as many criminals try to spread malware in inboxes. Malevolent hackers are impersonating Zoom, Microsoft Teams, and Google Meet for phishing scams, and some are even sending out emails posing as the World Health Organisation.
As we access more business resources remotely, its important to be aware of the datas location, especially given many companies expect to have access to employee's data at all times.
As peoples work and home lives increasingly blur, its imperative to create a strict separation between private devices and home devices. This includes laptops, smartphones and tablets. Sometimes this simply isnt possible, so separating where the data is stored is equally important. Most companies use cloud solutions such as Dropbox or One Drive to store their assets and have internal regulations around use - these should always be observed, especially when using a private device.
You should also only use secure, business appropriate platforms when sending data to third parties such as customers, clients or service providers. There are multiple solutions available such as Firefox Send, Smash or Google Drive to make sure data isnt leaked inadvertently.
More sensitive data is being shared from the home than ever before between colleagues. This means making sure data is transferred safely and securely is critical.
A great deal of companies use a virtual private network (VPN) which creates a private network from a public internet connection, ensuring online privacy and anonymity. This is important when accessing documents stored in the internal company network, particularly from home, as it safeguards against anyone intercepting data.
When people access the internet via their private home Wi-Fi they are vulnerable as the network is oftentimes less resilient and able to weather attacks. Many people just use the simple password provided with their modem as well as a weak Wi-Fi key - this isnt ideal for private use but becomes even more problematic in a professional setting.
There are a few ways employees can safeguard against attacks here. Making sure all firmware and software is up to date is a good first step. You should also use a WPA2 encryption for your Wi-Fi router or WPA3 if its available on your device. Remain vigilant and only access company documents and data via a VPN and never do so when connected to free, public networks in cafes and train stations; these are even more vulnerable than home networks.
While there isnt necessarily a one size fits all approach to designing a secure home office, there are multiple steps you can take to make sure you mitigate as many risks as possible. Businesses are under more pressure than ever, and dealing with online threats may not be top of their agenda, but by focusing on the above you can ensure you have the best practices in place to protect your companys data.
Read the rest here:
Mozilla VP of IT: How to stay secure while remote working - BusinessCloud