Category Archives: Internet Security

Luukas Ilves, Gulsanna Mamediieva, and David Eaves, with Vice … – The Rockefeller Foundation

David: Ukraine offers a window into a collective future about how we might face the coming crises. Ukraine happens to be facing an existential crisis created by an illegal war committed by its neighbor, but all countries are facing climate change crises, financial crises, and possible future pandemics. So, a countrys responsive capacity Sana talked about her governments resilience to those things is going to be core to determining trust in government. If we want democracies to survive, they have to perform well. We need digital-era governments to respond to 21st-century problems. That means having the flexibility and the capacity to be able to do that. Thats what the Estonians have and its what the Ukrainians are showing us: how digital fits into that capacity building. For me, a big takeaway from the convening was how much climate change is going to drive this need. If there are going to be 10 million internationally displaced people in 50 countries around the world over the next 20 years, were going to need some capacity to serve those people when they lose their houses and are roaming around your country. The only way a country is going to be able to do that is if it has a digital solution.

Luukas: We hope these stories are inspiring for people interested in digital public infrastructures.Many countries in the world tend to be very pessimistic about the public sectors capacity to do these things. That becomes a self-fulfilling prophecy. The most important thing is, whatever your position, be demanding of your government. Because theres no inherent law that says the government has to be bad at technology. The more positive pressure there is from the people to do better, the greater the countrys chances of success.

Sana: Id encourage people to find energy and inspiration in democracy. Citizens should have higher expectations from the government for the services that they receive. Especially in terms of convenience and user experience. But for those people who work specifically in this sphere, it requires a lot of energy, persistence, and flexibility to overcome obstacles. What I took from the convening was that everyone, on every level, has to deal with some form of resistance. Its the nature of what were doing in reforms and transformation, that the system in place will resist our efforts. Thats why its good to have peers from other countries. As you share information, you understand that you are not alone in this. Never underestimate the impact of persistence.

*Read the transcript of Vice Prime Minister Fedorovs full statement.

This has been edited for brevity and clarity.

How should we shape our collective digital future? The Bellagio convening, attended by Sana and others, created space to discuss real-world implications for digital government as influenced by these ideas.

I believe that we should start to think of a collective digital future in terms of working together on a joint cyber agenda. Ukraine now has a unique experience of surviving a cyber war reeling from thousands of cyberattacks while keeping the state running. Since February 24th, 2022, everything has been working well: the tax system, banking, government agencies, and critical infrastructure. There was not a single day that something stopped. We have to build digitally resilient countries. Together we can do it even better.

Vice Prime Minister Fedorov, in your conversation with the Atlantic Council in December 2022, you described Ukraine as a young country, central to Europe, with the energy to implement quick changes. Could you elaborate on the ways Ukraine is uniquely positioned as a country to fight for democracy?

Ukraine has been fighting for its freedom for almost a year in a full-scale war with a cruel Russian aggressor. Its the biggest war since World War II and the most technological at the same time. We have a significant technological advantage. The key weapons of modern warfare are not 1960s tanks or artillery as Russia thinks, but data and technology. While Russia is losing hundreds of thousands of people on the battlefield, Ukraine is looking for revolutionary ideas to fight back efficiently and in life-saving mode.

Ukraine is quite a young country and this lets us develop and implement the newest creative solutions. The war requires taking quick decisions with the help of breakthrough, innovative technology. And this is exactly what we are doing now. For three years now, the Ministry for Digital Transformation has been changing the entire state and implementing business approaches in government. Thats why we are so efficient. I can say that our Ministry works as a startup: fast, efficient, and ambitious.

Its the 21st century, and its the time of AI, UAVs, neural networks, Starlinks, and swift information exchange. Artificial intelligence helps us to identify Russian soldiers. Chatbots make it possible to inform the armed forces in real time about the movement of enemy troops and hardware. Starlinks instantly restore communication in liberated territories. UAVs became the eyes of the military, providing complete information awareness on the battlefield, an understanding of where the enemy is, its numbers, combat capability, etc.

After all, our team has a big vision for turning Ukraine into a top-tech country. Strong security and military solutions could become our main export and expertise.

Why is digitization the solution?

This war proved that the digital state is the most resilient one. The digital state ensures the operation of public services and the economy. Ukraine has been quite a digitized country since before the war. Since 2019, with the establishment of the Ministry of Digital Transformation, weve managed to build a strong digital infrastructure. We were preparing to become a Digital Tiger, but it turned out weve built a digital war machine, which can operate even under conditions of a full-scale invasion. Reforming and securing the state registries system, improving cybersecurity and digital skills for citizens, ensuring easy access to high-speed internet, and launching Diia (our one-stop shop for public services): all of these things made it possible for us to stand through the first months of the war. And for the digital to become an essential part of Ukraines resistance.

When I say that Ukraine is a digitized country, I mean that we are a country with convenient online services, digital documents, a high level of cyber security. A country with a mobile-first approach. A country where services are designed for online access first and offline as an option. Now, by using the Diia app, every citizen can: open a business in a few minutes; register a newborn; report on the movement of Russian tanks & troops; apply for social benefits of unemployment assistance; sign documents; even watch TV news or listen to the radio. In 2022, during the full-scale invasion, we launched 39 new services and products for citizens.

The Ukrainian experience shows that in order to stay resilient in the 21st century and to deal with the most unexpected circumstances, its important for all countries to go digital, and invest in digital infrastructure and cybersecurity. A strong and diversified internet connection is a must. As well as strong databases and state registers. The digital economy is the most resilient one, as it cant be easily destroyed by cruise missiles.

How do the benefits of digital democracy, of digital governance, outweigh the positive repercussions of the old order?

We are convinced that the future is digital, and it belongs to governments that operate like IT companies. Which are quick, efficient, and agile. Digital democracy will let us include more citizens in the process. Meanwhile, digital governance simplifies the communication between a person and the state, making the services convenient and clear, destroying any possibility of corruption.

Explore More

You can read more about the work explored during this Bellagio convening in David Eavess The Narrow Corridor and the Future of Digital Government, shared in advance of the convening, and Shaping our Collective Digital Future Convening: Why Digital Government Matters Now, a post-event reflection. Learn how Diia is helping Ukraine during the war.

See the original post here:
Luukas Ilves, Gulsanna Mamediieva, and David Eaves, with Vice ... - The Rockefeller Foundation

Internet of Things Security Market Next Big Thing | Major Giants- Cisco Systems, IBM, Intel, Infineon – openPR

Internet of Things Security Market

Get Free Exclusive PDF Sample Copy of This Research @ https://www.advancemarketanalytics.com/sample-report/21079-global-internet-of-things-security-market#utm_source=OpenPR/Suraj

Some of the key players profiled in the study are:Cisco Systems (United States), IBM Corporation (United States), Intel (United States), Infineon (Germany), Symantec (United States), Siemens (Germany), Gemalto (Netherlands), Allot (Israel), Fortinet (United States), Zingbox (United States), Mocana (United States), Securithings (Israel), Centri (United States).

Scope of the Report of Internet of Things SecurityThe risk of cyber-attacks is raised by increasing the use of 3 G and 4 G long-term evolution ( LTE), as well as broadband networks and innovations. Via these cellular networks, real-time information, and transaction-related information, which are critical to users, is exchanged; thereby, giving rise to the need for IoT protection. In areas such as health sensors, smart home appliances, smart city ventures, and smart retail, the deployment of the internet is rapidly growing rapidly, raising the need for IoT protection. Thus this enables the market of Internet of Things Security across the world.

The titled segments and sub-section of the market are illuminated below:by Type (Network Security, Endpoint Security, Application Security, Cloud Security, Others (web security and email security)), Application (Smart Retail, Connected Vehicles, Smart Government and Defense, Connected Healthcare, Consumer Wearables, Connected Logistics, Smart Energy and Utilities, Smart Manufacturing), Services type (Professional Services, Integration Service, Consulting Service, Support and Maintenance, Managed Services), Solution type (Identity and Access and Management, Data Encryption and Tokenization, Intrusion Detection System and Intrusion Prevention System, Device Authentication and Management, Secure Communications, Public Key Infrastructure and Lifecycle Management, Distribute Denial of Service Protection, Security Analytics, Others)

Market Drivers:Hackers attack IoT devices and take advantage of known bugs, such as default usernames, passwords, and backdoor static code.

Market Trends:The use of cloud computing for the collection of sensitive data by separate organizations results in the possibility of unwanted access to data.

Opportunities:IoT protection allows both the private and public sectors to be secure from trained cybercriminals and advanced IoT attacks. In order to track the information and financial aspects of people, companies, and even countries, cybercriminals use multi-layered cyber attacks. Organizations are, however, searching for streamlined strategies for defense.

Challenges:Currently, there are no globally accepted set of technical standards for IoT, especially in terms of communications. IoT is extensively used by smart cars to smart manufacturing and connected homes and building automation solutions. However, with heterogeneous IoT networks and its protocols, it becomes difficult for devices connected in one IoT system to communicate with devices in another system.

Region Included are: North America, Europe, Asia Pacific, Oceania, South America, Middle East & Africa

Country Level Break-Up: United States, Canada, Mexico, Brazil, Argentina, Colombia, Chile, South Africa, Nigeria, Tunisia, Morocco, Germany, United Kingdom (UK), the Netherlands, Spain, Italy, Belgium, Austria, Turkey, Russia, France, Poland, Israel, United Arab Emirates, Qatar, Saudi Arabia, China, Japan, Taiwan, South Korea, Singapore, India, Australia and New Zealand etc.

Have Any Questions Regarding Global Internet of Things Security Market Report, Ask Our Experts@ https://www.advancemarketanalytics.com/enquiry-before-buy/21079-global-internet-of-things-security-market#utm_source=OpenPR/Suraj

Strategic Points Covered in Table of Content of Global Internet of Things Security Market:Chapter 1: Introduction, market driving force product Objective of Study and Research Scope the Internet of Things Security marketChapter 2: Exclusive Summary - the basic information of the Internet of Things Security Market. Chapter 3: Displaying the Market Dynamics- Drivers, Trends and Challenges & Opportunities of the Internet of Things SecurityChapter 4: Presenting the Internet of Things Security Market Factor Analysis, Porters Five Forces, Supply/Value Chain, PESTEL analysis, Market Entropy, Patent/Trademark Analysis.Chapter 5: Displaying the by Type, End User and Region/Country 2015-2020Chapter 6: Evaluating the leading manufacturers of the Internet of Things Security market which consists of its Competitive Landscape, Peer Group Analysis, BCG Matrix & Company ProfileChapter 7: To evaluate the market by segments, by countries and by Manufacturers/Company with revenue share and sales by key countries in these various regions (2021-2027)Chapter 8 & 9: Displaying the Appendix, Methodology and Data Source

finally, Internet of Things Security Market is a valuable source of guidance for individuals and companies.

Read Detailed Index of full Research Study at @ https://www.advancemarketanalytics.com/reports/21079-global-internet-of-things-security-market#utm_source=OpenPR/Suraj

Thanks for reading this article; you can also get individual chapter wise section or region wise report version like North America, Middle East, Africa, Europe or LATAM, Southeast Asia.

Contact Us: Craig Francis (PR & Marketing Manager) AMA Research & Media LLPUnit No. 429, Parsonage Road Edison, NJ New Jersey USA - 08837 Phone: +1(201) 7937323, +1(201) 7937193sales@advancemarketanalytics.com

About Author: Advance Market Analytics is Global leaders of Market Research Industry provides the quantified B2B research to Fortune 500 companies on high growth emerging opportunities which will impact more than 80% of worldwide companies' revenues.Our Analyst is tracking high growth study with detailed statistical and in-depth analysis of market trends & dynamics that provide a complete overview of the industry. We follow an extensive research methodology coupled with critical insights related industry factors and market forces to generate the best value for our clients. We Provides reliable primary and secondary data sources, our analysts and consultants derive informative and usable data suited for our clients business needs. The research study enables clients to meet varied market objectives a from global footprint expansion to supply chain optimization and from competitor profiling to M&As.

This release was published on openPR.

Read more:
Internet of Things Security Market Next Big Thing | Major Giants- Cisco Systems, IBM, Intel, Infineon - openPR

Minister warns of threat of cyber attack at Gibraltar conference featuring UK law enforcement agents – The Olive Press

THE threat of cyber attack is growing for both private and public sectors, a government minister said at a recent internet security conference.

Minister for Digital and Financial Services Albert Isola gave the welcoming address at the conference at Grand Battery House this week.

Today, all Government organisations and private businesses live with the threat of a cyber attack irrespective of their size, he told delegates.

Gibraltar Finance and the UK law firm Weightmans co-hosted the cyber security meet last Wednesday.

Speakers from the UKs National Cyber Security Centre, the UKs National Crime Agency and Londons specialist cyber security team at Price Waterhouse Coopers shared their knowledge.

Isola pre-recorded his address as he travelled back from Poland.

The threat of a cyber attack is growing and it is important that we continue to seek ways to stop future attacks, the minister said.

Equally important is how we react to an attack when it is occurring and how we deal with the consequences of an attack after the event.

He emphasized the how the participation of UK law enforcement agencies had influenced the Rocks approach too.

In Gibraltar we recently established a National Cyber Command to develop Gibraltars cyber security strategy, Isola said.

I am pleased that some of the people involved in this initiative together with members of the Governments IT Department attended the conference.

Michael Ashton, Senior Executive represented Gibraltar Finance at the conference.

The British overseas territory has a strong IT department that has made sure to keep it safe from serious cyber attacks so far.

But the danger is always close by as Chief Minister Fabian Picardo found out recently when his Twitter account was hacked.

ALSO READ:

See more here:
Minister warns of threat of cyber attack at Gibraltar conference featuring UK law enforcement agents - The Olive Press

What is TCP/IP? – Check Point Software

What is TCP?

IP addresses come in two forms: IPv4 and IPv6. IPv4 addresses have the format X.X.X.X, where each X is a value in the range 0-255. Due to concerns about depleting the pool of available IPv4 addresses, the IPv6 protocol was created. Instead of the 32 bits used by IPv4, IPv6 uses 128 bits, giving it a much larger pool of potential addresses. While IPv4 is still the standard for Internet routing, a computer can have both an IPv4 and IPv6 address and be reached via either.

IP is designed to get a network packet to the intended destination computer. However, a computer might have many different applications running on it. After a packet reaches its destination, it must be directed to the right application.

The Transport Control Protocol (TCP) and the User Datagram Protocol (UDP) accomplish this via the use of ports. Each port is associated with a particular application, so the combination of IP address and port uniquely identifies a particular application on a certain computer.

TCP and UDP packets are encapsulated within an IP packet. This means that a packet will include an IP header followed by the TCP or UDP header and any data that the TCP or UDP packet is carrying.

TCP/IP is one of the foundational protocols of the Internet and underpins many common network protocols, such as HTTP which is used for web applications.

The TCP/IP model encompasses these four layers of the network stack:

TCP and UDP perform similar roles, ensuring that packets are transported to the destination application. However, they have different areas of focus and methods of operation.

TCP is a connection-oriented protocol designed to ensure that packets reach their destination in the correct order and that no data is lost in transit. A TCP connection starts with the TCP handshake, which includes the following three steps:

After the handshake is complete, the client and server can send data to each other over the established connection. Each data packet in the communication is acknowledged by the recipient with an ACK packet, verifying that nothing was lost in transit. TCP also includes the ability to reorder out-of-order packets and re-send any dropped packets. This makes TCP well-suited to use cases where preventing data loss is more important than efficiency.

In contrast, UDP is a connectionless protocol. In UDP, the client sends a request, and the server replies. UDP cant detect if packets are dropped or perform any other error handling. UDP is designed to prioritize efficiency at the cost of potential data loss or errors.

The other major network model in common use is the Open Systems Interconnection (OSI) model. The OSI model describes seven layers instead of the four used in TCP/IP. The OSI model is more of a theoretical model of the network, which breaks out various functions. The TCP/IP model reflects the actual structure of a network packet.

TCP/IP is a foundational network protocol and underlies many of the core protocols and applications in common use today. Check Point has offered network security solutions for over thirty years, beginning with on-prem firewalls and expanding as technologies evolve to include cloud, endpoint, mobile, and IoT security.

Check Point firewalls provide security at multiple layers of the TCP/IP model, including enforcing zero-trust policies and ensuring packets comply with the TCP/IP protocol standards. Additionally,

Check Points IPsec and SSL Virtual Private Networks (VPNs) ensure that content in TCP/IP packets is private and protect against man-in-the-middle (MitM) attacks.

In addition Check Point Quantum SD-WAN ensures corporate Wide Area Networks (WANs) are used optimally. This includes steering packets by application over multiple links, ensuring link stability and performance, and rerouting when the link performance falls below a configurable SLA. Learn more about SD-WAN must-haves in this ebook. Then, see the capabilities of Quantum SD-WAN for yourself with a free demo.

Visit link:
What is TCP/IP? - Check Point Software

In the (woman) face of it all: In conversation with Barbi Ghanoush – Honi Soit

Barbi Ghanoush is the alter ego of a self-proclaimed staunch dyke and theatre kid. Featured on the cover of the Mardi Gras edition of Honi Soit, her drag is big, stunning, and provocative (if you want to see its effect, read the Catholic Societys review).

The Auckland stop of UK transphobe Posie Parker was met with a strong counter protest where protesters sprayed the speaker with tomato soup. Barbi went viral for parodying the speech dressed in what she called Posie Parker drag a large, neatly coiffed blonde wig with a bejewelled shirt that read ADULT HUMAN DRAG QUEEN and had viewers spray her with ketchup.

I sat down with Barbi to chat about drag, politics, and the night when she went viral.

[The following conversation has been edited for clarity.]

Why did you decide to do drag?

My introduction to drag actually happened when I was really quite young. The first time I saw drag was at my grandfathers 75th birthday, so Im incredibly blessed to have had a grandfather who came out as openly gay in the eighties. Hes an incredible man. Theres a bit of sadness to that story, because unfortunately he did pass away before I had the opportunity to come out to him.

Were in the local community hall, and my grandfathers the campest man alive. His birthday theme was getting his closest friends and family to stage individual performances for him.

It was forties themed, so we all dressed up and did a little boogie woogie bugle boy number, my mum and all my aunts did a little flapper dance. And then, into the middle of the hall, comes the most beautiful creature Id ever seen in my life.

She was tall and straight out of the forties; glamour, the beautiful hair, the sequins everything and she performs this insanely glamorous number where shes just kind of crooning, and theres feathers and theres a fan at some point.

I didnt know what the fuck drag was. And it literally wasnt until my parents recounted this story later and said that halfway through this performance, my younger brother had gone Mom, I dont think thats a girl, cause she has hairy legs. And my mum said, Well, thats because its a drag queen. And I just went, oh, what? This is a thing.

So I guess drag has been in my blood ever since I was a little kid. Barbi herself only came to lifeit will be one year ago on the 6th of May this year. Im 11 months old.

It does sound like performance was a big part of your childhood. Was your upbringing surrounded in doing performances for your loved ones, doing dance classes, things like that?

I was gonna say dont tell anyone, but this is literally an interview. I was a theatre kid in high school. I was in all of those stupid, bloody community pantomimes and I did drama and basically whatever I could do to get eyes on me. But drag itself, as a form of my personal expression, is just the latest iteration.

Why be a drag queen as opposed to being a drag king? Was it this idea of glamour?

Drag kings intimidate me. Theyre so good at what they do. I dunno. Being a queen felt like a very natural path for me. In terms of when Im out of drag, what my gender ishmm, thats a big question mark. I dont really know her, but as anyone who had the experience of being assigned a woman as a child and the socialisation that you go through for a long time, I really, as a part of my gender identity and as a part of my queer identity as well, rejected a lot of traditional femininity.

I thought, all those ridiculous entry level messages you get as a kid, you know, like you cant be smart and pretty. This is a roundabout way of me saying I was a huge pick-me for many, many, many years.

So Ive found that Barbi is a really fun way for me to explore these aspects, to explore makeup artistry, and being a big bimbo, and the colour pink, and calling myself Barbi for Gods sake. Its a really fun outlet for me to just fuck around with gender and fuck around with womanhood.

Also, before we move on, I wanna clarify. Its definitely because Im not good enough at painting to be a drag king.

You are quite politically and socially involved, so how would you see your drag identity interacting with your activism?

For me there are a lot of places where the person, me as Jasmine, and the character Barbi separate, like there is a clear distinct difference between me when Im in human mode and the character of Miss Barbi.

But one thing that I dont like to compromise on is my politics. So whatever my politics are as a human person, thats what the politics of Barbi also are. So for me, you know, like I mentioned a big gender question mark, but staunchly, staunchly queer and a staunch dyke. As a unionist, as a Lebanese person, as a, you know, child of immigrants living on stolen Aboriginal land, Im not gonna separate out between the person and the character.

So a lot of that does come up in things Im talking about, but it can also pop up in performances, which is something Ive always admired in performers that Ive watched.

So how did the Posie Parker performance come about as an extension of activism and your community as a queer person?

Quite honestly, its been really hard to avoid news about Posie Parker. Particularly for queer people, its very present, its very much on the mind. It does pose a really serious threat to our lives and to our safety. But the way that the performance unfurled was very much just a few different pieces falling into place.

I, for quite a while, had been thinking that someone should do an imitation of Parker in drag because she is likewhatever shes doing is just drag, right? The hair, the power suits, everything about it is just ripe for parody.

And then that very night I got a message from the gorgeous drag artist, Baby Doll, who runs the night with Michelle Mayhem pop at Ching-a-Lings where I ended up performing this, she messaged me and said, Hey, weve got a slot open on Thursday, do you wanna come and perform? And I just went, well, this is perfect. Ran to Kmart to get some rhinestones and a pink turtleneck and the rest is history!

What were then the next steps of going viral?

It was genuinely, completely unexpected. I think the best moment of the whole fiascoI was best summed up by a comment from a terf under the video that said she probably performed this in front of a room of four weirdos. And I read that and I was like, well, kind of.

Its really hard to get crowds on Oxford Street right now, cost of living and everything, so I was like, this is gonna be such a funny, like, thing for me to do at my favourite bar with my friends watching full stop. Thats the end of it, but one of them recorded it.

The next thing I know, a journalist in New Zealand picked it up, and then Posie Parker herself has retweeted it, with the caption Misogyny can be such a drag. Like I had a little giggle, Im not gonna lie to you. She clearly worked quite hard on that one for quite some time.

Ive never had an experience like that before, virality to whatever degree, I suppose. The amount of commentary, the amount of contact I was getting from total strangers was incredible, especially when it got into like fashy, transphobic circles. I will say that, emotionally, I managed to remain relatively unaffected just because not one of these dumb, dumb dummies could figure out what the fuck my gender was.

I cannot count the number of times Ive now been accused of woman-face; the man in the dress allegation will never be defeated apparently. So there was a nice level of distance in a sense.

It was very intense, but thats why we have the mute, and block, and notifications off buttons.

Has much changed about what youre doing now or how youre managing your platforms in light of that?

I mean, modern day drag characters always come with social media on the side. Theres definitely been quite a rapid change in the way that thats handled, just in terms of ensuring that your identity is safeguarded.

You know, making sure that people who might be pissed off at my drag, dont let that get in the way with work or anything like that cause I also work full-time. So that was a bit of a rude awakening, but its always good to double check your internet security, right?

In terms of drag itself, the only thing its really made me do is become even more determined to piss people off.

Read more here:
In the (woman) face of it all: In conversation with Barbi Ghanoush - Honi Soit

Center for Internet Security Fights Cyber Threats With Education – Government Technology

(TNS) In 2000, a 15-year-old Canadian hacker with the handle of "MafiaBoy" set off a series of distributed-denial-of-service attacks on the websites of several large companies, including Amazon, Dell, CNN, eBay, E*TRADE and Yahoo!.

The incident caused a minor blip in the global economy, but shone a light on the vulnerabilities of the Internet and led to the past two decades of increased online security and innovations.

That same year, the Center for Internet Security was born.

CIS has also ridden every wave of the ever-involving and light-speed changes in the online world of the 21st century.

Recognizing that keeping pace means "employees are increasingly expected to have a diverse and adaptable range of skills," and that those skills need to continually develop as new technologies and processes come and go, CIS has "prioritized the importance of creating a culture of learning" to meet the challenges.

In 2022, CIS established a new Learning and Development department to address organizational learning needs through "personalization, technology and various learning opportunities." It's part of the company's overall mission to support that learning culture and to provide impactful solutions.

One new innovation was the creation of CIS Learning Champions. These individuals hold various roles within the organization and "act as subject matter experts on technology, business trends and specialized skills needed for their respective organizations."

"At CIS, we believe that learning is a priority and a shared responsibility throughout the organization," said Jennifer Myers, senior director of learning and development. "Employees are empowered to drive their own development through formal and informal experiences. The Learning Champions are there to provide coaching and support."

Andrew Dannenberger, a product support specialist and learning champion, said, "All the companies I have previously worked for have not put this kind of priority on learning, so this is a first for me. It's a privilege to play such an important role in learning."

The impact of these educational opportunities is reflected in a workplace survey where CIS employees relayed what they loved most about their job and their company. One wrote, "They provide excellent resources for continued learning and encourage employees to take advantage of them."

Another said, "I can learn new things every day that would benefit the company as well as my career."

2023 the Times Union (Albany, N.Y.). Distributed by Tribune Content Agency, LLC.

Read more here:
Center for Internet Security Fights Cyber Threats With Education - Government Technology

Germanys Reluctant Approach to Space Security Policy – War On The Rocks

On Oct. 26, 2022, eight months after the Russian invasion of Ukraine, reading the news felt something like watching a Star Wars movie. At the United Nations, Russia, represented by a senior Russian foreign ministry official, was threatening to attack commercial Western satellites. Providing intelligence or communication services to the Ukrainian army, the official said, could make any satellite a legitimate target for retaliation. Of all of Ukraines Western allies, the United States was the only country to respond, saying that any damage to U.S. space infrastructure would result in an appropriate response. Moscows focus on the commercial space sector, no matter how surreal, is no surprise commercial providers such as Starlink have played an enormous role in the conflict.

Since the 1950s, space has been increasingly important to militaries around the world. This is particularly true now, as the rapid development of space technology has allowed both public and private actors access to the cosmos. The war in Ukraine has shown how satellite internet can connect armed forces and help bring information from sensors, such as drones, to shooters, like heavy artillery, much quicker than before.

Despite these trends, the German government has maintained a passive approach to space and does not consider it a security priority. Germans take for granted free access to space and the uninhibited use of space systems, including infrastructure and vehicles, such as satellites, that collaborate to perform tasks such as communication, provision, and Earth observation. These systems can be civil, scientific, or military and always entail related ground-control services. Given that both private companies and Germanys adversaries have made space a security priority, the German government should develop its own space security strategy, build a European coalition in space, and consider the development of offensive capacities in the cosmos.

Space Is the Antechamber to Connectivity on Earth

Since the early 1960s, space has been a breeding ground for military activities. This began during the Cold War, when both the United States and the Soviet Union used spy satellites for intelligence activities. In recent years, the number of players and the number of objects in the atmosphere have both risen. Today, several thousand satellites orbit the Earth, with estimates varying from 4,500 to 7,400. This could rise to 70,000 within the next 10 years. The private sector has entered the space age with companies like SpaceX or Blue Origin that provide services, such as satellite launches, that until recently could only be provided by nation-states. This increasing number of actors and advances in space technology mean that space is more critical than ever to security policy.

Satellites are also getting smaller and launches are getting cheaper this has made it easier than ever to get objects into orbit. Companies like Amazon and OneWeb, as well as governments around the world, are planning to create so-called mega-constellations of satellites. The largest of these is the Starlink constellation run by SpaceX, which already consists of more than 3,250 small satellites, comprising roughly half of all satellites in space.

This proliferation has led to an increase in both space traffic and reliance on satellites services. Satellites comprise critical infrastructure necessary for the provision of numerous digital services on Earth, both for civilian and military applications. These critical provisions range from simple banking transactions to the provision of the internet in remote places such as cruise ships. The satellites that provide these capabilities are potential targets for military aggression and are increasingly threatened by the risk of collision with other satellites and objects.

Conflicts on Earth are now carried on in space, too. In Ukraine, for instance, where Elon Musk and his company, SpaceX, provided Starlink services, satellites are vital for coordination and communication among soldiers. The advanced industrialized armies that fought in Iraq and Afghanistan had trouble getting relevant information to where it was needed Ukraine has no such problems now. The Starlink system is also surprisingly resilient and resistant against everything from jamming to cyberattacks. However, the satellites themselves remain vulnerable. On the first day of Russias invasion of Ukraine, hackers attacked a communication satellite from American provider Viasat. The repercussions were felt in Germany when almost six thousand wind turbines were no longer accessible over the internet.

Competitive, Congested, and Contested

Free access to space today is endangered by the renewed development of military counter-space capabilities. These capabilities are primarily intended to prevent other nations access to space while ensuring ones own control. The development of counter-space capabilities might sound like something out of a science fiction film, but it is not a new phenomenon. Rather, it represents a return to the mid-Cold War paradigm. Between the 1960s and 1990s, the United States and the Soviet Union conducted over 50 anti-satellite tests in space. These decreased after the end of the Cold War about 20 tests were recorded from the early 2000s until 2021. What has changed since then is the rising number of actors in space and the technological evolution of counter-space capabilities. Launches have also become cheaper, which has made space far more accessible but also less safe if some players have malicious intent.

Attacks in space come in several forms, each of which have unique risks and advantages. A kinetic physical attack is a direct hit on a target (a satellite or a ground station) by a missile launched from the Earth or another satellite. While direct, these are easily trackable, and the impacts create space debris. This was demonstrated most recently by Russias anti-satellite test on one of its own satellites in November 2021.

A non-kinetic physical offensive, such as dazzling blinding a satellites sensors so that for the duration of the attack it cannot take any photos deteriorates the physical functions of a satellite without destroying it, using high-powered lasers or microwaves. These attacks are often launched to make a satellite physically inoperable, either temporarily or permanently, while leaving very little trace of the attackers identity. However, the success rate of these attacks is difficult to assess. The same holds for electromagnetic attacks, when the transmission of data through radio frequency signals is temporarily disabled. Finally, counter-space cyber-attacks target the data provided or used by a satellite or a ground station.

Based on an annual report by the Secure World Foundation in 2022, many countries are investing in the research and development of offensive and defensive counter-space capabilities. The states making these investments claim that they only plan to use these capabilities for defensive purposes in a peaceful and sustainable way, but these technologies can be misused to damage space systems as well. As a result, the line between offensive and defensive capabilities is blurred. Anyone who possesses these weapons for defense purposes can harm others.

Four countries so far have managed to develop advanced counter-space capabilities: the United States, Russia, China, and India. The United States has always been a key player in space and is trying to maintain its supremacy against Russia and China, who are also trying to achieve superiority. India has begun to develop a military space arsenal, including offensive capabilities, though it claims to be against the militarization of space.

France, Japan, Australia, South Korea, and the United Kingdom only have basic space capabilities, but some of them seem willing to move toward the development of offensive assets that can target other satellites or ground systems. By contrast, Germany has adopted a more preventive military strategy that opposes the development and use of offensive capabilities.

Current German Thinking on Space

Despite these developments, space is very rarely examined from a security policy perspective in German public political discourse. It is neither seen as a military concern nor as something that has much to do with warfare. The current governments coalition agreement does stress Germanys intention to strengthen national space programs and the European Space Agency in order to promote and guarantee the sustainable use of space. However, it makes no reference to security policy. Germany has a Federal Government Coordinator of German Aerospace Policy, but its functions are clearly focused on the civilian side of space policy, areas such as climate change, sustainability, and research and education.

In a recent analysis, Dr. Christian Mlling, deputy director of the German Council on Foreign Relations, said, Thus far, the Federal Government shows little commitment to taking space policy beyond the current infrastructure. This is problematic. Germanys space infrastructure was originally created in a time when there was unhindered access to space, but this no longer holds true.

Currently, the German armed forces have the capacity for global imaging reconnaissance and satellite communication and are investigating the possibility of developing satellite-based early warning systems. However, there has been no work toward developing defense systems for satellites. Instead, the German military relies heavily on American assets to gain space situational awareness. Since the German government rejects the use of debris-generating systems in space, it is unlikely that its armed forces will develop kinetic physical anti-satellite weapons, such as missiles, in the foreseeable future. In fact, they currently rule out any offensive means in space, even those that would not result in more debris.

The reasons for Germanys reluctant approach are complex. Germany has a generally careful strategic culture in which security policy does not win elections. To this day, Germanys politicians have trouble talking about the use of military force from a strategic, national interest-dominated standpoint ideological arguments abound. Military might, for example, is instead often framed as enabling economic development.

This reluctant strategic culture has translated into space. The to German eyes martial American approach to space in the 1980s, particularly President Ronald Reagans Strategic Defense Initiative (also dubbed Star Wars), made it difficult to sell space security policy to an already hesitant German population. The American initiative was a space-based missile defense program and aimed to make the doctrine of mutually assured destruction and by extension nuclear weapons obsolete. Many European allies, led by France, feared a new arms race and had concerns about the technological feasibility of the system and its efficiency in the European area.

Germany was divided. While the government led by Chancellor Helmut Kohl supported the American project, expecting it to provide access to innovative technology, the Social Democratic Party , a left-leaning party not known for an active and forward-looking security policy, was against it. More than 350 scientists wrote an open letter to Kohl opposing participation because stationing weapons systems in space would destroy any hope for disarmament. Germanys current chancellor, Olaf Scholz, joined the Social Democrat Party in 1975. He is currently criticized for not stepping up enough to the changes in Europes security brought about by the war in Ukraine.

Germany has not always been this passive. The previous government, a grand coalition of the Christian Democratic Union, its sister party, the Christian Social Union of Bavaria, and the Social Democratic Party, took various measures to highlight the importance of space for the German army. In 2017, for instance, the Ministry of Defense published a strategy paper on space, stressing, among other things, the need to develop further capabilities necessary for the planning and command of military missions abroad. In 2021, the German armed forces even created their own space command, run by the German air force. The German Space Situational Awareness Center, which aims to provide the armed forces with an understanding of what is happening in space, was integrated into the space command, and a project was initiated to update its hardware and software. However, there are currently no ambitious plans to build on these initiatives because of a lack of political will by the current government.

How Can Germany Take Space More Seriously?

The German government should, instead, consider space from a security-policy perspective. Germany is currently developing its own national security strategy, the first of its kind for the Federal Republic. Originally planned to be unveiled at the Munich Security Conference in February, its release was delayed, and it has not yet been published. Any strategy should consider the fact that space, especially lower earth orbit (below an altitude of 1,200 miles), has become more crowded and congested of late and that fact should inform Germanys strategic interests. Critically, the German government should consider to what extent it wants to depend on others, including for the launch of satellites the last satellite owned and operated by the German army was brought into orbit by SpaceX. Ideally, a more detailed space security strategy would follow this broader security strategy, which would make it easier to allocate resources.

Strategy, however, is moot without subsequent action. Once Germany has defined its goals, there are two things that need to be done. First, Germany should spearhead the formation of a European coalition to collectively develop space assets, gain independence, and ensure Europes access to space. Germany does not have the same means that the United States or China has it needs its European allies for grander ambitions, such as a European mega-constellation of small satellites. The window for building such a network, however, is closing players such as Starlink are rapidly securing usage rights for the limited number of radio frequencies available for signal transmission in space for their own mega-constellations.

The government should also build a national coalition between the government, academia, and the private sector, including both start-ups as well as established industry players, with the aim of reducing dependence on foreign space companies. This would nurture innovation in Germany and Europe and advance the countrys strategic interests. There is a vibrant space tech scene in Germany and many start-ups have developed innovative and intelligent solutions to developments in space, such as a means of traveling into space without a rocket or new approaches to space traffic management. A lack of funding and interest in these projects, however, could result in a brain drain. German universities are also home to renowned engineers and researchers who are developing important solutions for problems in space. The government needs to reverse its traditionally reluctant approach to collaboration with the private sector and initiate ties with players in both the private sector and academia to collectively develop space infrastructure.

Finally, the German military also needs to invest more in analyzing and developing its own offensive capabilities. Currently, the government says that it does not want any offensive capabilities in space. However, there is a twofold rationale for Germany to reconsider. First, these capabilities can act as a deterrent against attempts to interfere with Germanys space-based infrastructure. Second, Germany can hardly maintain its stated aspiration of becoming the best equipped armed force in Europe without protecting itself in space. Instead of targeting satellites, offensive capabilities could target ground-based control systems for adversarial space infrastructure. In cyber security, its accepted that the lines between defense and offense are blurred the same goes for space.

There are also several technologies that Berlin should consider investing in that would make for more resilient satellites. One is laser communication, which could replace radio waves. This would allow more data to be transmitted in less time. There are also satellites that are able to observe their near environment, which could help to avoid collisions in increasingly crowded orbits. The government could also consider investing in sensors that screen the Earth for missile launches. Such early-warning capabilities would be a contribution to both German and broader European security.

There is no time to lose. SpaceX is launching several mini-satellites regularly. Already, the company possesses the power to intervene in an ongoing conflict: If Elon Musk decided to cut his services, the Ukrainian army would lose a serious warfighting advantage. The German government is uniquely positioned to take the lead in space security policy in Europe, but it should start being ambitious now.

Dr. Carolin Busch is a senior manager and Lorne Slous is a junior consultant at Eviden, an Atos business and multinational company that focuses on high-tech, cloud, big data, and cyber security services. Carolin holds a Ph.D. from the University of the Federal Armed Forces in Munich and specializes in military capability development. Lorne has studied and worked in both Paris and Berlin and is currently working in IT projects that deal with space situational awareness.

Image: German Space Agency

Originally posted here:
Germanys Reluctant Approach to Space Security Policy - War On The Rocks

VIPRE Security Group Named Winner In the Coveted Global InfoSec … – PR Newswire

VIPRE wins awards in 6 categories at the 11th Annual Global InfoSec Awards at RSAC 2023.

SAN FRANCISCO, April 25, 2023 /PRNewswire/ -- VIPRE Security Group, an industry-leader and award-winning global cybersecurity, privacy, and data protection company, announced today that it has received the following Global InfoSec Awards from Cyber Defense Magazine (CDM), the industry's leading electronic information security magazine:

"With a rich history dating back nearly 30 years, VIPRE Security Group has been defending consumers from online security threats since the internet was in its infancy, gaining recognition for our ability to do that while being considered innovative and best of breed by Cyber Defense Magazine is testament to our success." said Usman Choudhary, chief product and technology officer at VIPRE. "We are proud to deliver unmatched protection against even the most aggressive online threats for our global customers and partners. Our VIPRE and Inspired eLearning Powered by VIPRE solutions have yet again proven that they are best in class."

VIPRE Endpoint Detection and Response (EDR) is designed to help small and medium-sized businesses and the IT partners that serve them navigate the complexities of EDR management from a single, easy-to-use console. The solution delivers the sophistication of a high-performing, cloud-based protection without the complexity that users might expect in an EDR solution.

Inspired eLearning Security Awareness Training reduces human-related security incidents by educating with engaging content designed for adult learning. This content drives employees to become an active part of an organization's security efforts in recognizing and preventing cyber-attacks.

"We scoured the globe looking for cybersecurity innovators that could make a huge difference and potentially help turn the tide against the exponential growth in cyber-crime. VIPRE is absolutely worthy of these coveted awards and consideration for deployment in your environment," said Yan Ross, Editor of Cyber Defense Magazine.

VIPRE joins an elite group of organizations working to reinforce good cyber behavior leveraging all aspects of the people, process and technology trinity in their protection of users across the globe. The list of winners is published here:http://www.cyberdefenseawards.com/

About CDM InfoSec Awards

This is Cyber Defense Magazine's tenth year of honoring InfoSec innovators from around the Globe. Our submission requirements are for any startup, early stage, later stage, or public companies in the INFORMATION SECURITY (INFOSEC) space who believe they have a unique and compelling value proposition for their product or service. Learn more atwww.cyberdefenseawards.com

About the Judging

The judges are CISSP, FMDHS, CEH, certified security professionals who voted based on their independent review of the company submitted materials on the website of each submission including but not limited to data sheets, white papers, product literature and other market variables. CDM has a flexible philosophy to find more innovative players with new and unique technologies, than the one with the most customers or money in the bank. CDM is always asking "What's Next?" so we are looking for best of breed, next generation InfoSec solutions.

About Cyber Defense Magazine

Cyber Defense Magazine is the premier source of cyber security news and information for InfoSec professions in business and government. We are managed and published by and for ethical, honest, passionate information security professionals. Our mission is to share cutting-edge knowledge, real-world stories and awards on the best ideas, products, and services in the information technology industry. We deliver electronic magazines every month online for free, and special editions exclusively for the RSA Conferences. CDM is a proud member of the Cyber Defense Media Group. Learn more about us athttps://www.cyberdefensemagazine.com and visit https://www.cyberdefensetv.com and https://www.cyberdefenseradio.com to see and hear some of the most informative interviews of many of these winning company executives. Join a webinar at https://www.cyberdefensewebinars.comand realize that infosec knowledge is power.

About VIPRE Security Group

VIPRE Security Group is a leading provider of internet security solutions purpose-built to protect businesses, solution providers, and home users from costly and malicious cyber threats. With more than 25 years of industry expertise, VIPRE is one of the world's largest threat intelligence clouds, delivering exceptional protection against today's most aggressive online threats. Its award-winning software portfolio includes next-generation antivirus endpoint cloud solutions, advanced email security products, along with threat intelligence for real-time malware analysis, and security awareness training for compliance and risk management. VIPRE solutions deliver easy-to-use, comprehensive layered defense through cloud-based and server security, with mobile interfaces that enable instant threat response. VIPRE is a proud Advanced Technology Partner of Amazon Web Services operating globally across North America and Europe. The group operates under various brands, including VIPRE, StrongVPN, IPVanish, Inspired eLearning, Livedrive, and SugarSync. http://www.VIPRE.com

Press Contact: Scott E. Rupp941-448-7566https://millerrupp.com/

SOURCE VIPRE Security Group

Continued here:
VIPRE Security Group Named Winner In the Coveted Global InfoSec ... - PR Newswire

More than 2K organizations at risk of major attacks linked to SLP … – Cybersecurity Dive

Dive Brief:

SLP was originally developed in 1997 as a mechanism for systems on a network to communicate with each other. However, researchers say SLP was never designed to be exposed to the public internet.

VMware has disabled SLP by default since 2021 after issuing prior warnings about vulnerabilities in ESXi products. The company warned customers in February to apply security updates and disable OpenSLP after a series of ransomware attacks.

Researchers warn such an attack using this vulnerability could result in one of the most powerful DoS attacks ever committed.

This flaw is easily exploitable and should be considered particularly dangerous to the global community given the large-scale amplification that can be achieved, Pedro Umbelino, principal security researcher at BitSight, said via email.

VMware said in a blog post that earlier unsupported releases of ESXi, have been shown to be affected by the vulnerability.

As noted by the researchers, many SLP services visible to the internet appear to be older and likely abandoned services, a spokesperson said via email.

Currently supported services, including ESXi 7.x and 8.x lines are not impacted by the amplification attack, according to VMware.

View post:
More than 2K organizations at risk of major attacks linked to SLP ... - Cybersecurity Dive

How AIoT Will Reshape the Security Industry in 2023 – Security Intelligence

The Internet of Things (IoT) has been around since 1990 ever since John Romkey created a toaster that could be switched on over the internet. Today, 66% of North American homes have at least one IoT device, such as a smart speaker, bulb or watch.

But for all their conveniences, many IoT devices are limited in functionality and performance. Moreover, they have notable security flaws that could compromise public safety, consumer data or entire company databases.

The key to unlocking the full potential of these devices and improving security in the IoT industry as a whole may lie with another rapidly rising force in modern technology: artificial intelligence.

IBM defines artificial intelligence as software that leverages computers and machines to mimic the problem-solving and decision-making capabilities of the human mind.

Since Alan Turing asked, Can machines think? the world has been fixated on finding the answer. Just a decade ago, AI was still relatively unproven in the mainstream. But progress has been exponential, with investment in AI startups increasing sixfold since 2000.

During the COVID-19 pandemic, many organizations adapted to remote work environments by embracing the subfields of AI automation, machine learning, data science and deep learning.

Here are three of the most common uses of AI:

Speech recognition uses natural language processing (NLP) to translate human speech into text. Most modern mobile devices have built-in speech recognition software for voice search and text messaging features.

Customer service chatbots have replaced many human support representatives. From FAQs to handling complaints, AI-driven messaging bots offer tailored assistance depending on the needs of each customer.

Recommendation engines on e-commerce stores use AI algorithms to study consumer shopping data trends and offer targeted upsells and cross-sells to enhance the online shopping experience.

In The State of AI in 2022, McKinsey reported that the adoption of AI has more than doubled in the past five years. However, the proportion of organizations using artificial intelligence has plateaued settling between 50% and 60%. As we move into 2023, we can expect AI to tackle a long-standing problem IoT security.

The Internet of Things (IoT) is the collective network of sensors, tools and physical objects that contain software and technology that enable internet connectivity, data exchange and communication with other connected devices and systems.

Some popular IoT devices include:

While IoT has always been an innovative space, there are undeniable drawbacks to the technology. Many products suffer from common issues such as disconnecting or delayed responses. But thats not the biggest concern.

Because IoT devices transmit large amounts of data, they naturally attract the attention of cyber criminals.

Whether its an identity thief snooping for personal information on public Wi-Fi networks or state-sponsored hacking groups looking to breach government entities, IoT devices are vulnerable points in any security posture.

Here are a few of the main security issues with IoT:

Lack of visibility. Most manufacturers have no way to monitor their devices after they are shipped to users. Without oversight for maintenance and security, a single malfunction could expose the device to a data breach.

Code vulnerabilities. Developers of IoT devices typically use open-source software, which is prone to bugs and security vulnerabilities.

Poor security integration. Security is often an afterthought in IoT. In 2021, Forescout reported at least 100 million IoT devices were not adequately secured. Many of these vulnerable devices are in key industries, including medical services.

Weak passwords. Many users dont change the default passwords on smart home devices, leaving them at risk of being compromised by hackers.

The lack of visibility and testing in IoT is an ongoing issue. Many devices have unpatched vulnerabilities, making it a question of when rather than if they will be hacked.

But now, thanks to the rapid advances in AI technology, there is a solution that could revolutionize security in the IoT industry.

Artificial Intelligence of Things (AIoT) combines the data-driven knowledge of artificial intelligence technologies with the connected devices from IoT infrastructure.

AI technology can improve the efficiency of IoT devices through two major subfields:

With artificial Intelligence, IoT devices can collect and analyze data. Moreover, these devices can then use the learned information to simulate smart behavior, such as making autonomous decisions to switch on a bulb or reduce the heat on a thermostat.

But how can this union of AI and IoT tackle the major security problems in IoT devices? Here are several use cases of AIoT that offer better security for people, data and property.

Better Data Security

Developers can incorporate AI technologies like decision trees, linear regression and neural networks to create more effective IoT cybersecurity applications that are able to identify and nullify threats quicker.

Improved Visibility and Analysis

As AI facilitates high-speed analysis with large data sets, we can improve how IoT devices manage and monitor data. Companies that integrate IoT with AI and ML technologies benefit from continuous monitoring and analyses and real-time situational awareness. Ultimately, this approach leads to accurate decision-making with minimal human interference.

More Robust Access Control With Smart Locks

AIoT can improve access control in multiple industries. For example, banks and healthcare institutions can use AIoT-enabled devices equipped with biometric technology to restrict access to specific rooms, vaults or equipment storage compartments.

Safer Workplaces With Smart Factory Robots

AI and IoT have been embedded in manufacturing for years. Now, as the technologies converge, smart factory robots with implanted sensors can facilitate data exchange. Not only will this transformation save time and money, but it will also reduce human error and injuries as manufacturing operations become more automated.

Creating Safer Self-Driving Vehicles

AIoT enables autonomous vehicles to analyze weather, road conditions and speed and adjust accordingly. Despite several setbacks, Tesla looks destined to create automobiles that are capable of detecting animal and pedestrian activity and safely navigating journeys without the need for human drivers.

Digital twins use sensors to collect real-time data about a physical object and create a digital duplicate that analysts can review, optimize and learn from. This use of AIoT can be applied to large retail outlets or industrial environments, allowing managers to analyze the activity of the real environment and respond to changes or incidents quickly.

Improve Traffic Management in Smart Cities

Over 50% of smart cities have adopted 5G technology, which makes communication between connected devices faster and more reliable. One example is the rise of AIoT-based drones. These devices transmit and analyze real-time traffic data and make decisions to control traffic lights and reduce congestion.

As smart cities, offices and homes embrace the global rollout of 5G, we can expect AIoT adoption to grow at scale in 2023.

Artificial intelligence unlocks more potential in the internet of things by enabling connected devices to analyze and learn from past data, predict future activities and make smarter, data-driven decisions. In return, IoT adds value to AI technology through increased connectivity and data exchange.

While AIoT devices bridge the security gap in IoT, we can get more peace of mind knowing personal and company data is safer with these devices. The growth of AIoT paves the way for more effective, secure, future-proof systems and applications for companies and consumers in 2023.

Tech Writer

With a passion for creative writing and an unquenchable thirst to learn about futuristic tech, Christopher John Haughey segued from a journalism degree into ...

Continue Reading

Go here to see the original:
How AIoT Will Reshape the Security Industry in 2023 - Security Intelligence