Category Archives: Internet Security
ITOCHU Techno-Solutions Corporation to Deliver Intertrust Platform Based Solutions to Japanese Market and Beyond – PR Newswire
Japanese system integration leader builds center-of-excellence in secure multi-party interoperable data operation solutions
SAN FRANCISCO and TOKYO, May 31, 2022 /PRNewswire/ --ITOCHU Techno-Solutions Corporation,a leading Japanese systems integration company, and Intertrust, a leading provider of trusted distributed computing technologies, today announced a partnership agreement to deliver solutions based on Intertrust Platform for interoperable, secure data to ITOCHU Techno-Solutions Corporation's core markets.
Intertrust Platform provides enterprises with secure interoperability for distributed data services that allows diverse data management systems to interoperate as one.ITOCHU Techno-Solutions Corporationplans to initially deliver solutions in various target verticals including energy, telecommunications, health, manufacturing, and eventually, cross-vertical enterprise computing settings. Intertrust Platform allows enterprises running diverse cloud, data warehouses, databases, etc. to operate them as one system, but also to interoperate with other enterprises seamlessly. The technology allows for code-once, run anywhere capabilities, compliance with regulatory requirements, and faster time to AI. The Platform's ability to provide consistent scalable security for IoT and data operations is unique and essential on today's Internet.
"As enterprises move to the cloud, they are adopting integrated data operation solutions under secure systems management environment," said Masanori Tanaka, General Manager of Enterprise Business Planning Division, ITOCHU Techno-Solutions Corporation. "Intertrust Platform allows customers to build solutions that bridge diverse systems within and between enterprises, in a way that delivers interoperability for distributed data services securely with data governance control."
ITOCHU Techno-Solutions Corporationis the leading system integration solution provider in Japan and operates in six countries. Their force of over 6,700 experts deliver world-class solutions to top enterprises in these regions. Working with Intertrust, they will deliver solutions starting immediately.
"We are honored to work with ITOCHU Techno-Solutions Corporationto deliver strategic platform technology to major Japanese enterprises," said Talal G. Shamoon, Intertrust CEO. "ITOCHU Techno-Solutions Corporation's mastery in delivering top quality enterprise solutions means that corporations across Japan and East Asia can benefit from working with a trusted solutions provider who can deliver cutting edge technology to support data-driven businesses across the region."
About ITOCHU Techno-Solutions Corporation
ITOCHU Techno-Solutions Corporation is a comprehensive IT services company that partners with its customers. From consulting to design, development and construction, operational and maintenance support, ITOCHU Techno-Solutions Corporation combines sophisticated IT solutions and cloud services to find solutions to customer issues. Providing optimum services in all fields including communication, broadcasting, manufacturing, finance, logistics and retail, public services, life sciences, science and engineering.
About Intertrust
Intertrust provides trusted computing products and services to leading global corporationsfrom mobile, consumer electronics and IoT manufacturers, to service providers. These products include ExpressPlay, the world's leading provider of digital rights management (DRM) and anti-piracy services optimized for rights owners and distributors of broadcast, live and VOD content. Founded in 1990, Intertrust is headquartered in Silicon Valley with regional offices in London, Tokyo, Mumbai, Bangalore, Beijing, Seoul, and Tallinn. The company has a legacy of invention, and its fundamental contributions in the areas of computer security and digital trust are globally recognised. Intertrust holds hundreds of patents that are key to Internet security, trust, and privacy management components of operating systems, trusted mobile code and networked operating environments, web services, and cloud computing. Additional information is available at intertrust.com, Twitter or LinkedIn.
Media Contacts
For ITOCHU Techno-Solutions CorporationCorporate Communications Dept.[emailprotected]
For IntertrustJordan SladeMSR Communications[emailprotected]+1 757-876-5809
SOURCE Intertrust
See the original post:
ITOCHU Techno-Solutions Corporation to Deliver Intertrust Platform Based Solutions to Japanese Market and Beyond - PR Newswire
Dexter High School’s Publication The Squall Wins Spartan Award for 15th Year – thesuntimesnews.com
By Andy Nixon, STN Reporter
Students at Dexter High School continue their passion for award-winning journalism, adding another plaque on the wall.
English/Journalism teacher Christopher Mackinder pushes students to find their own voice by writing about their passions and interests. At Dexter, this could be investigative journalism, sports, food reviews, or even a story about shoe collectors. When asked about the journey this year, Mr. Mackinder stated This award is a testimonial of the students adaptability, he said. With Covid, wearing masks, kind of wearing masks, and the change to block scheduling, they have dealt with many changes and still come out on top. With block scheduling, the kids attend a class every other day, which is tough in the journalism world. Mr. Mackinder also mentioned the push towards less and less homework, making after-school interviews and event attendance more challenging.
Meeting two of Mr. Mackinders students, Aiden Naughton and Ryan Capobianco, I had a chance to learn more about the publications history, class goals, and what they find interesting in the journalism world. Aiden enjoys in-depth interviews with school officials and diving into real-world issues such as the labor shortage around the area. With a background in internet security, Ryan was a valuable addition to the team, handling the I.T. and web design portion of the publication. I began learning internet security through a family friend, and Ive stuck with it, bringing what knowledge I can to The Squall. Thanks to Ryans hard work you can find many of the stories on the website dextersquall.com.
Hosted by Michigan Interscholastic Press Association, the Spartan Critique competition allows member newspapers, magazines, and other media forms to receive feedback from national leaders in their field. Dexter was one of thirteen schools in the state to win an award. This year marked the 15th Spartan Award for The Squall, which began in the 1990s in newsletter format. In the early 2000s, the school began printing the paper, but over the past six years, the publication has been in a magazine-style format.
To offset printing costs, the students work to sell advertising space in the publication. Sales and communication are essential in many of todays career fields, and this exercise provides a well-rounded set of skills to run a small business. Viewing the advertising section, its evident the students do a great job with this task. The Squall is printed four times each school year.
Mr. Mackinders media class is available to students after completing introduction to journalism, or photojournalism. Once the prerequisite is complete, students can then enroll and participate in the writing, editing, and publishing of The Squall. The class typically has around 60 students each semester.
Most students take the course for one year, but Mr. Mackinder notes how much of a blessing it is for a student to remain in the class for a second year, adding someone who knows how the process works will help things run smoothly, without additional training.
Writing in a clear and concise manner is a valuable life skill. Whether through email, social media, or presentations, a good writer can transform ideas and thoughts into meaningful prose. In many fields, this means conveying your ideas and vision to others. Students with or without journalism aspirations will benefit from this media course and carry the teachings to whichever career field they choose.
The next round of journalism students will have big shoes to fill after this year's seniors fulfill the next step of their journey. The class will look be looking to add yet another plaque to the wall during the upcoming school year.
Read more:
Dexter High School's Publication The Squall Wins Spartan Award for 15th Year - thesuntimesnews.com
Why we can expect more hacking of politicians’ phones – POLITICO
Pegasus can infect a targets device without the victim knowing and allow a government or organization to access personal data, including turning on cameras and microphones. Activists against surveillance have called on governments to ban or at least heavily regulate spyware companies. And the United Nations human rights office called on governments last year to regulate the sale and use of spyware technologies.
Yet there are still no international accords restricting spyware and even governments that ban Pegasus still face a whack-a-mole problem of other less visible and less regulated spyware companies popping up. As a result, officials are stuck employing low-tech solutions to protect themselves. Macron reportedly replaced his phone and changed his phone number last year after his number was found on a list of 50,000 allegedly targeted by NSO clients using Pegasus.
After researchers reported in April that Pegasus had infected the phones of dozens of Spanish officials including Catalan president Pere Aragons, he started leaving his phone outside the room when he goes into important policy meetings and has sensitive conversations.
When you are having to acknowledge or that someone is listening to you, you are very reluctant to talk privately with your partner or your relatives, Aragons said in an interview a few weeks after the hacks were discovered.
Citizen Lab, a research lab based at the University of Toronto, found strong circumstantial evidence tying the Spanish government to the hacks of Catalan officials (Catalonia has long fought for more autonomy) a charge Spain has denied. It was two weeks later that Spains Prime Minister became a victim himself.
In the U.S. officials have confirmed that the FBI acquired Pegasus technology, though only for testing. And some lawmakers argue that privacy has to be balanced against the need to use all tools available to protect national security.
It is a very tricky area, because we want to protect peoples privacy, but on the other hand, we want to be sure we have the tools to find terrorists and those kind of things, Sen. Angus King (I-Maine), a member of the Senate Intelligence Committee, said in an interview.
Senate Intelligence Committee Vice Chair Marco Rubio (R-Fla.) argued that it isnt a matter of whether governments should go after the groups, but whether they can. They operate in the shadows, largely outside of government control and without set addresses.
Its an enormous challenge, and there is no easy answer to it, Rubio said.
Asked how he approaches the danger of his own phone getting hacked, Rubio said: I tell everybody you should assume anything you do on a mobile device or that is connected to the internet is vulnerable. And no matter how many steps you take, these people, their full-time job is to figure out how to get into things they are not supposed to see.
That is a big part of the conundrum: Even the most sophisticated governments have had trouble finding ways to defend themselves against these phone hacks. Pegasus works by exploiting undisclosed vulnerabilities in iOS and Android operating systems, and NSO has deployed massive resources into finding new vulnerabilities before software makers are aware of them. Pegasus is also virtually invisible: It can be installed with zero clicks, including through a text message just being sent to a user.
Pegasus has become the poster child for an industry that is among the most secretive in the world, but is increasingly widespread. Governments will rarely confirm using spyware against targets, but a spokesperson for NSO claimed to POLITICO this month that Pegasus had been key to a number of governments stopping big terror attacks.
Even so, governments are taking some steps to rein in the use of Pegasus. The Biden administration last year effectively blacklisted both NSO Group and Candiru, another Israeli spyware company, by adding them to the Commerce Departments list of companies considered a threat to U.S. national security.
Sen. Ron Wyden (D-Ore.), a member of the Senate Intelligence Committee, joined more than a dozen other House and Senate Democrats in December in calling for State and Treasury to sanction NSO and three other spyware companies for alleged human rights offenses. The lawmakers argued in a letter that sanctioning NSO Group along with other surveillance companies DarkMatter, Nexa Technologies, and Trovicor would be a significant financial blow to the spyware industry through cutting off access to the U.S. stock market.
The commercial surveillance industry is a threat to the national security of the United States and other democracies, because it basically makes it possible for a dictator that has a fat checkbook, they can acquire a whole bunch of sophisticated tools, Wyden said in an interview.
On the other side of the Atlantic, Aragons called for the EU to take steps to regulate the spyware industry, stressing that we need public transparency or public supervision by the parliaments to the governments that are the owners of this software.
If the Spanish government could do this, any other government could also do this against its citizens, Aragons said.
Some governments are beginning to take some steps. The European Parliament in March approved the creation of a 38-member committee to investigate Pegasus and whether the use of the spyware had broken EU laws. France is investigating the impact of Pegasus on government officials following last years allegations that Macrons phone was infected with Pegasus spyware. NSO Group denies that Macron was targeted by Pegasus.
The security of the presidents means of communication is constantly monitored with the utmost care, a spokesperson for the president said, adding that incoming ministers and their cabinets would be made aware of this type of risk as soon as they take office.
Still, many governments are moving slowly as they attempt to balance competing interests. A complete ban on spyware would complicate investigations and classified intelligence operations, and could lead to the growth of the surveillance black market. Banning NSO specifically could also complicate many countries relations with Israel, given its ties to the Israeli government. And without an international agreement to halt the use of spyware, governments may try to out-compete the other through using the technology.
As outcry has increased, NSO has been working to improve its image. The organization released a transparency report last year detailing how Pegasus is licensed, which underlined that Pegasus is not a mass surveillance technology, and only collects data from the mobile devices of specific individuals, suspected to be involved in serious crime and terror. The Israeli government regulates Pegasus, with an export license required before NSO can sell Pegasus to a new customer; the company claims to only license the software to governments after investigating their intentions.
NSO continues to evolve as a company and improve its technological and contractual safeguards, customer vetting process and ability to investigate misuse, Ariella ben Abraham, an NSO spokesperson, said during a sit down interview with POLITICO earlier this month. We believe there is no other alternative to prevent terror and crime, and we continue to call for global regulation.
NSO has also claimed that Pegasus cannot be used to target American phone numbers. This does not stop the targeting of Americans using foreign numbers.
As NSO fights back, government officials are not the only individuals in the crosshairs, and journalists, dissidents and their family members are among other targets of spyware. The Guardian and more than a dozen other media outlets reported last year that 50,000 phone numbers may have been targeted by governments using Pegasus since 2016, including a number of journalists and pro-democracy activists along with suspected criminals.
A consortium of 90 human rights groups, including Amnesty International and Human Rights Watch, urged top EU officials last year to sanction NSO Group due concerns over human rights abuses.
Is there a global fairness that requires that every country in the world have the ability to hack the head of state of every country? That sounds to me like a terrifying outcome, said John Scott-Railton, a senior researcher at Citizen Lab. Seems like it will make us all less secure and less safe, but thats exactly the road that NSO has set us on.
Read more:
Why we can expect more hacking of politicians' phones - POLITICO
The Evolving Face of Cyber Conflict and International Law: A Futurespective – Lawfare
Since the inception of the internet, criminals, non-state actorsand states have leveraged the inherent insecurities and vulnerabilities ofcyberspace at an ever-increasing rate and with ever-more harmful impact.Data theft, ransomware attacks and criticalinfrastructure disruptions, to name a few, are now near daily occurrences.Notwithstanding the immense societal risksthese activities present, a growing number of states have fully embraced cyberoperations as a staple of bothstatecraft andwarfarea reality playing out to dangerous effect in the Russia-Ukraine war.
At the same time,until recently states have remained relatively silent on their views of howinternational law regulates their cyber activities.That has begun to change, however, with anincreasing number of states making official pronouncements oftheiropiniojuris, either independently or through established multilateral processeslike the UNGGE and OEWG.While this is apositive trend, it has also highlighted several disparate views on criticalissues and the difficulty in achieving anything morethan limited clarity andconsensus.What can we discern fromthese state pronouncements?What is thepresent state of the law governing state cyber activities, and where is itheaded?
To explore these questions and more, the Technology, Law & Security Program at The American University Washington College of Law (WCL), in partnership with the Lieber Institute at West Point; the Federmann Cyber SecurityResearch Center Cyber Law Program at the Hebrew University of Jerusalem; the Centre of Excellence for NationalSecurity at S. Rajaratnam School of International Studies at Nanyang TechnologicalUniversity; and the NATOCooperative Cyber Defense Centre of Excellence in Tallinn, Estonia will convene an in-person symposium at WCL from Wednesday, June 15 through Friday, June 17, 2022.
The event will bring together more than fifty leading academics and practitioners from across the globe to assess the present and future role of international law in regulating state cyber operations. You can see a list of the speakers and the agendahere.There will also be a dinner at which Lt. Gen. Jack Shanahan, USAF (ret.), will speak about the interplay of artificial intelligence and cyber operations in discussion with Professor Rain Liivoja from the University of Queensland Law School.
Register soon as seats are filling up. You can registerhere.
See the original post here:
The Evolving Face of Cyber Conflict and International Law: A Futurespective - Lawfare
Explained: CERT-Ins new cybersecurity norms, and why it is likely to issue a clarification about them – The Indian Express
CERT-In is learnt to be working on releasing more details of the cybersecurity directive issued in April, which has been opposed by industry stakeholders. According to sources, the agency could clarify that the norms apply only to VPN providers who offer Internet proxy like services to general Internet subscribers, and not to corporate VPN service providers.
What are these norms that CERT-In is clarifying?
The norms, released on April 28, asked VPN service providers along with data centres and cloud service providers, to store information such as names, email IDs, contact numbers, and IP addresses (among other things) of their customers for a period of five years. Entities are also required to report cybersecurity incidents to CERT-In within six hours of becoming or being made aware of them.
The norms have triggered concerns over privacy, and CERT-In is expected to clarify that private information of individuals will not be affected by the directions.
These directions do not envisage seeking of information by CERT-In from service providers on a continual basis as a standing arrangement. CERT-In may seek information from service providers in case of cyber security incidents and cyber incidents, on a case-to-case basis, for discharge of its statutory obligations to enhance cyber security in the country, according to a person aware of the clarifications that CERT-In is in the process of finalising.
The agency is also likely to include in its clarifications that the April 28 directive to store such information and share it with CERT-In will override any contractual obligation VPN providers may have with their customers of not disclosing such information.
Queries sent to the IT Ministry and CERT-In Director General Sanjay Bahl were not immediately answered.
But why has CERT-In felt the need to issue a clarification?
Prominent VPN providers, a large part of whose value proposition is ensuring anonymity of their users on the Internet, have questioned the directives, and some providers like NordVPN are even considering pulling their servers from India should the directive be enforced on them.
At the moment, our team is investigating the new directive recently passed by the Indian government and exploring the best course of action. As there are still at least two months left until the law comes into effect, we are currently operating as usual. We are committed to protecting the privacy of our customers, therefore, we may remove our servers from India if no other options are left, Laura Tyrylyte, head of public relations at Nord Security, said.
VPN providers like Surfshark have claimed that their technology does not allow the logging of users information. Surfshark has a strict no-logs policy, which means that we dont collect or share our customer browsing data or any usage information, Gytis Malinauskas, head of the legal department at Surfshark, said.
Newsletter | Click to get the days best explainers in your inbox
Moreover, we operate only with RAM-only servers, which automatically overwrite user-related data. Thus at this moment, we would not be able to comply with the logging requirements even technically. We are still investigating the new regulations and its implications for us, but the overall aim is to continue providing no-logs services to all of our users, Malinauskas said.
How has the government responded to these concerns?
Speaking to The Indian Express earlier this month, IT Minister Ashwini Vaishnaw had said there was nothing to worry about CERT-Ins norms. There is no privacy concern. Suppose somebody takes a mask and shoots, wouldnt you ask them to remove that mask? It is like that, Vaishnaw had said during an interview.
Explaining the need for the rules, he had said, Cybersecurity is something which is continuously evolving. So we have issued very comprehensive guidelines from CERT-In. Ultimately, if there is a threat to you, the police and you would both have to work together.
The basic concept (of the guidelines) is that the people who are actually running the infrastructure should take all possible steps to make sure that things are in place and if there is any breach, immediately inform us so that we can take action, Vaishnaw said.
See more here:
Explained: CERT-Ins new cybersecurity norms, and why it is likely to issue a clarification about them - The Indian Express
In India, kids exposed to online risks more than any country: Report – Hindustan Times
Children have spent more and more time on the internet since the beginning of the Covid-19 pandemic and, with online education for even lower classes becoming popular, exposure to the internet is also beginning at an early age, which leaves kids vulnerable to cyberbullying and other dangers. According to a report by internet security company McAfee -- Life Behind the Screens of Parents, Tweens, and Teens -- children hit their online stride when they are between 15 and 16, at which point mobile usage jumps so much it approaches levels they will carry into adulthood.
Research by McAfee, an American computer security software firm, surveyed 15,500 parents and more than 12,000 of their children in ten countries, including the United States, the United Kingdom, Mexico and India, to understand how they protect themselves and their loved ones on the internet.
Worldwide, 90 per cent of teens between 15 and 16 said they used a smartphone or mobile device. This marked a noteworthy 14 per cent spike in usage when compared to children 10 to 14 years old, 76 per cent of whom said they use a smartphone or mobile device, the May 12 report stated.
Indian kids exposed to online risks more than any country
Researchers also found the US has the highest cyberbullying rate (28 per cent) and high exposure to online risks, while India had the highest exposure to online risks out of any country. India also had some of the earliest mobile maturity, as per the data.
Global trends on cyberbullying
By the age of 17 or 18 reports of cyberbullying increased to 18 per cent, attempted theft of online accounts to 16 per cent, and unauthorised use of personal data to 14 per cent, data showed.
Data also showed that 73 per cent of children look to parents - more than any other resource - for help in terms of online safety. Parents, however, seem to lag behind a bit in actually taking active steps to secure their child from cyberbullying.
The report noted: "Parents take more precautions, such as installing antivirus software, using password protection, or sticking to reputable online stores when shopping, on their own devices than they do on their childrens connected devices."
Secret lives of teens and tweens online
According to the research, more than half of the surveyed children (59 per cent) act to hide their online activity - from clearing browser history to omitting details about what they are doing online
Do girls experience more dangers online?
According to the research, there is a gender bias when it comes to parents protecting kids from online threats. Data shows girls are more protected than boys, but it is the boys who encounter more issues online.
Girls aged 10-14 were more likely than boys of the same age to have parental control on personal computers or laptops in almost every country surveyed, while boys were more likely to hide their activity from parents.
23 per cent of parents said they would check the browsing and email history on the PCs of their daughters aged 10 to 14. But for boys aged 10 to 14, this is only 16 per cent.
22 per cent of parents restrict access to certain sites for girls. For boys this is just 16 per cent.
Follow the latest breaking news and developments from India and around the world with Hindustan Times' newsdesk. From politics and policies to the economy and the environment, from local issues to national events and global affairs, we've got you covered....view detail
Original post:
In India, kids exposed to online risks more than any country: Report - Hindustan Times
Satellites, the first line of defence – Capacity Media
The agencies, one from each of the Five Eyes countries that have worked on intelligence since World War Two, were the UKs National Cyber Security Centre, the Cybersecurity and Infrastructure Security Agency (CISA) in the US, National Cyber Security Centre New Zealand, the Canadian Centre for Cyber Security, and the Australian Cyber Security Centre,
But what this will mean for the wholesale telecoms/ICT community that protect not only the infrastructure, but the network layer and in some cases the application layer as well?
According to Alp Toker, founder and director of NetBlocks, a global internet monitor, Ukraine has been a huge wake-up call for the telecoms community in terms of security, but there are also other factors to consider.
Firstly, the pandemic has caused a blurring of lines between business infrastructure and home infrastructure, so you already have this need for resilience that is much more widespread than to the office or to the data centre, says Toker.
At the same time there has been a growing awareness of physical infrastructure and threats to physical infrastructure, including both kinetic attacks and sabotage, so, along with awareness of telecommunications, theres also an awareness of how to disrupt telecommunications.
But by his own admission there is no silver bullet. Instead telcos must adopt a holistic approach with information officers encouraged to track the news and keep up to date with whats going on according to their own processes.
Theres the hardware threat, the software threat, as well as a piggybacking of business infrastructure, increasingly on consumer networks creating this need for increased reliability across the board, added Toker.
Telcos are going to need to improve security by themselves. They cant rely on government or local authorities. Its a task for the entire business.
Despite the need for a holistic approach, a month prior to the publication of the joint Cybersecurity Advisory, the CISA and the Federal Bureau of Investigation (FBI) published an alert on the need for US and international satellite operators to strengthen their cybersecurity citing the current geopolitical situation.
Satellite
In its advisory the Cybersecurity Advisory writes that it strongly encourages critical infrastructure organisations and other organisations that are either satcomm network providers or customers to review and implement the mitigations outlined in this CSA to strengthen satcomm network cybersecurity.
Toker said: Satellite communications have played a significant role in the conflict, despite Ukraine being very well connected via land.
One such incident that supports this need is the attack on the Viasat satellite network in Europe on the morning of the Russian invasion.
It shows you that this kind of instruction will be targeted as a means of preparing the battlefield and as a means of limiting communications, he added.
Further, the introduction of low earth orbit satellites like Starlink brings with it new technological opportunities as it no longer requires bulky equipment and in theory, a receiver and transmitter can be minimised and put on a phone: it can even be scaled down to the size of a wristwatch.
This has been part of what Toker calls the information warfare field. The first is that the technology itself has been classified as a risk by the Russian government, which sees independent communication lines as a threat.
Next, he says is the use of jamming, which refers to the intentional disruption of wireless communications with signal interference to limit the use of devices such as handsets.
The most interesting thing here is this new ability that Starlink has developed to dynamically mitigate these risks, which really speaks to needs that the whole industry faces not just in satellite. When there is a threat, you need to be able to counter it dynamically and in real time.
This functionality enables operators to push updates, including firmware updates and dynamic frequency updates to mitigate these threats because otherwise your device is going to be incapacitated and stuck in the field.
This leads onto another emergent threat: firmware attacks, another type of assault believed to have happened during the Russia-Ukraine war.
This is every telcos nightmare, because once a device is bricked that device is very difficult or impossible to repair, says Toker.
If hackers can push fake firmware or can incapacitate devices, they can knock out significant parts of the network, without even needing to perform a more sophisticated attack or supply chain attack. The more remote the devices, the more of a nightmare it is for the operator to resolve the issue, with the ultimate fear being that satellites themselves could be bricked through remote firmware.
One such example includes the story of Russian looters who, while working with the Russian military, stole 27 pieces of John Deere farm equipment, valued at approximately $5,000,000 from a dealership in Melitopol, Ukraine.
The group attempted to take the equipment back to Chechnya, Russia in an attempt to sell it on, but the John Deere dealership used the internet and bricked the tractors, using an in-built kill-switch.
Security and tech
With so many companies monitoring the situation, Quad9, a global public recursive DNS resolver, intercepted more than 4.6 million attacks against computers and phones in Ukraine and Poland since March of this year.
Bill Woodcock, executive director of Packet Clearing House, said: Theyre being targeted by a huge amount of phishing, and a lot of malware that is getting onto machines is trying to contact malicious command-and-control infrastructure.
Toker says that, due to the varied nature of these attacks, securing the home, and building networking structure that is as reliable as the office, in peoples homes, has really become the new challenge.
AI and machine learning continue to be the biggest technologies to invest in for their ability to monitor and mitigate network activity. As for things like quantum cryptography, Toker says it holds a lot of potential but but there are also questions about how to make it attractive as an investment. There needs to be an increased awareness and desire to protect users data, so that there can be investment in technologies like quantum cryptography.
While blockchain continues to grow in use cases, he says we havent yet seen the real-world applications agreed for the technology.
Tokers advice is to decentralise as much as you can, while increasing peering and reducing choke points that can be targeted by threat actors.
If a telco isnt automating their threat analysis, they really need to get involved with that now, he said. You need to know what attacks are coming in, and you need to be able to automate that, so machine learning would be a deployment that I would prioritise.
Read this article:
Satellites, the first line of defence - Capacity Media
Mitigating cyber threats post pandemic – Capacity Media
The disruption caused by Covid-19 has left companies struggling to maintain security and business continuity.
The working from home culture adopted by millions as a result of the pandemic meant a heightened risk of cyber threats for businesses. However, this sudden shift meant many companies were still ill-prepared for breaches to their systems.
What we saw, at the beginning of the pandemic at least, was that organisations were not prepared for the quick shift to offsite working, says Max Rttgermann, senior product manager of IP transit and DDoS defence at Deutsche Telekom.
He adds that companies did not have the security processes in place to ensure their data was secure as a growing number of employees began to work from home.
And as many employees worked from their own personal computers, the risk of cybercrimes was greater than ever before, according to Rttgermann.
We were faced with providing quick solutions to a large number of clients all at the same time, and many organisations have still not enabled satisfactory security procedures, he says.
Simultaneously, more organisations had limited staff on site, meaning there were fewer employees available to keep an eye on fraud controls as meticulously as they may have done previously.
This all provided and continues to provide fertile ground for fraudsters.
Mitigating the risk
Deutsche Telekom itself faces the same risks that any organisation faces. Having said that, Rttgermann acknowledges that being a major telco provider makes the company an attractive target for those attempting to affect or influence businesses or even political agendas.
However, the firm has a comprehensive series of mitigation solutions in place to neutralise those risks.
We continually launch innovations and strengthen our defence offerings to the benefit of our clients as well as ourselves, Rttgermann says.
Additionally, we automatically analyse immense amounts of data every day to protect our own infrastructure.
One such solution is its 360 Defense Strategy, which takes a holistic approach to protection with the intention of stopping fraud and cyberattacks before they have a chance to cause any damage.
Part of that includes its automated fraud monitoring system, which screens all international voice traffic and can independently take mitigation steps in case of anomalies or suspicious traffic.
Deutsche Telekom has a team of security and fraud experts who look into identifying possible cyberattacks and fending them off and making sure the company is best prepared to deal with one, should it occur.
Rttgermann says that there are programmes that help the company to determine where the next possible attacks may be coming from, so that they can be stopped before they have a chance to do damage.
This is a continuous effort, and one we successfully maintain, he says.
Through our co-operation with the best partners in the industry, we have developed a whole regiment of troops to battle even the toughest of cyber enemies.
IoT security
With the rapid evolution of Internet of Things (IoT) devices and the swift adoption of IoT as an industry, security will become increasingly important. The total number of IoT devices is expected to jump to 30.9 billion units by 2025, according to numbers from Statista. This means, according to Rttgermann, that greater emphasis must be placed on IoT security.
If you think about use cases such as remote surgery, autonomous cars, smart medical implants, or even governments promoting smart cities they all need not only fast and reliable connectivity but also strong security, Rttgermann says.
He adds that Deutsche Telekom Global Carrier already has one of the most comprehensive security portfolios on the market something that will strengthen IoT security.
Additionally, the company has initiated developments that bring continual advancements to enhance connectivity security. They includes its Regional Packet Gateway platform, which installs gateways at strategic locations around the world instead of sending data back to a home country that could be in a remote location.
Alongside this, Rttgermann says, Deutsche Telekom led an ITW Global Leaders Forum (GLF) working group to publish a Code of Conduct for the direct peering of critical, transnational IoT traffic.
Its purpose was to define a protocol among global carriers providing IPX-based traffic in order to assure quality of service for critical IoT applications.
Without initiatives like this, enterprise customers would not be able to guarantee the stability of their products to end users, he adds.
At Deutsche Telekom Global Carrier, we are more than ready to take on any cybersecurity fraudsters or criminals.
Go here to see the original:
Mitigating cyber threats post pandemic - Capacity Media
Noteworthy Information in the French Data Protection Authority’s (CNIL) Newly Published 2021 Annual Report – Lexology
The French data protection authority, the CNIL, has published its annual report for 2021 (in French) which contains some useful information and figures notably on complaints, investigations and sanctions as well as standards of references issued by the CNIL in relation to specific processing activities.
Complaints
In 2021, the CNIL received 14,143 complaints (an increase of 7% compared to 2020 but similar to 2019) out of which:
Some complaints have been transferred to another lead authority under the one stop shop and cooperation rules.
The CNIL has also received 5,882 indirect data subject action requests (the indirect action is the only one available for certain data basis such as the one for the police or secret services).
The CNIL reports that many complaints have been made about organizations that are established outside of the EU (UK, Switzerland, United States of America, Canada, Russia, Australia, South Korea and China) mainly in relation to the publication of data on the Internet.
Investigations
It carried out 384 investigations, 31% of which followed from complaints or reports.
The CNIL highlights:
Cookie compliance has been one of the priority themes set by the CNIL for 2021 and the CNIL has launched an unprecedented control campaign.
The CNIL also continued its control activities on the security of health data by investigating 30 medical analysis laboratories, hospitals, service providers and data brokers, notably in relation to COVID-19 pandemic related data. Some of these procedures are still ongoing.
It controlled 22 organizations, 15 of which are public with respect to the level of internet security. The investigations revealed obsolete cryptographic suites making websites vulnerable to attacks, shortcomings concerning passwords and, more generally, insufficient means with regard to current security issues.
Sanctions
The CNIL issued:
Out of the 18 sanctions,
The most frequent breaches include:
The CNIL also issued two public sanctions against the Ministry of the Interior, concerning the illicit use of drones and poor management of the automated fingerprint file (FAED).
Investigation program for 2022
In February, the CNIL published its priority focuses for investigation in 2022 investigation program, which accounts for around one third of its investigations, on the following three major topics:
This follows the numerous complaints received on this topic and the publication in February 2022, a new commercial management reference framework, in particular framing the carrying out of commercial prospecting. The CNIL intends to investigate data brokers and other intermediaries.
The significant shift to teleworking has led to the development of specific tools, including tools allowing employers to ensure closer monitoring of the daily tasks and activities of employees. The CNIL considers it necessary to check the employers practices in this field.
The CNIL intends to explore issues relating to data transfers and the management of contractual relations between data controllers and cloud solution provider subcontractors.
The CNIL has received 5,037 data breach notifications (a 79% increase compared to 2020) out of which, 63% were due to an external cause (accident or malicious act). The CNIL considers that this figure is still too low compared to actual data breaches which may have occurred.
The CNIL responded to 22 parliamentary hearings and issued 121 opinions on bills and decrees. 16 of these opinions concerned how data processing was implemented in the context of the fight against the COVID-19 pandemic.
The CNIL also handled 576 health authorization applications in 2021 and issued 54 research authorizations on COVID-19.
In 2021, the CNIL adopted several standards of reference and sectorial recommendations. These included:
It has also developed tools to enable the development of virtuous digital innovation, in particular through its start-up strategy deployed in 2017. This year, this has resulted in the implementation of a first personal data sandbox for health. As a result, 12 projects have been supported by the CNIL, including 4 in a reinforced way.
Read this article:
Noteworthy Information in the French Data Protection Authority's (CNIL) Newly Published 2021 Annual Report - Lexology
How Singapore is shaping its cyber defence with international collaboration – GovInsider
If you see your neighbours house burning, do not point and laugh, because yours will be next. These words of warning, shared by a foreign diplomat, summarise the importance of collaboration in the cyber sphere, said Gaurav Keerthi, Deputy Chief Executive (Development), Cyber Security Agency, Singapore.
Teamwork makes the dream work, and thats no exception for protecting against cyber threats. Having channels of communication between nations allows them to tackle cross-border cyber attacks together, Keerthi shared at GovInsiders AI x GOV panel on cyber diplomacy.
He discussed how Singapore is working with the international community to fortify cyber defences. Keerthi also shared how governments can build cyber capabilities even among non-IT skilled citizens by providing greater convenience and incentives.
International cyber cooperation
Why should governments work with one another on cybersecurity issues? A cyber threat, like a fire, will spread, shared Keerthi. If theres a cybersecurity incident in another nation in Southeast Asia, we have to lean forward and help each other, he said.
When vulnerabilities emerge, it is now instinctive for Southeast Asian nations to pick up the phone and ask are you seeing this too?, Keerthi shared. Nations are building both regional and global agreements on cybersecurity, GovInsider reported.
On a worldwide level, Singapore chairs an Open Ended Working Group, an international team within the UN, to look at the use of information and communications. The hope is that this group will help implement international norms on responsible cyber behaviour.
For example, representatives from Singapore suggested nations practice for emergency situations. This includes making sure different countries know who to call when they require assistance or have valuable information, Keerthi explained.
Another example of collaboration is Singapores cyber labelling scheme, where IoT devices are given a sticker to rate them according to their level of cybersecurity protections. Finland and Singapore have agreed to recognise labels from each other, Keerthi shared.
This means that IoT manufacturers can apply for a labelling rating and have their products cybersecurity protections recognised in both countries, wrote Singapores Cyber Security Agency.
Cybersecurity and the average person
Keerthi discussed how citizens and public servants without significant IT training could play their part in cybersecurity. First, he shared that you should not need to be a computer science student to operate a computer.
When he first learned to drive, Keerthi had to learn the parts of a car engine, such as the carburetor. But today, drivers just need to know where the start button is, he said. This can be applied to cybersecurity, explaining that technology can make it easier for non-experts.
One example of how governments can develop cyber safety among citizens is through a mobile app where citizens can use biometrics to access government e-services, Keerthi shared.
Rather than having to remind citizens about two factor authentication and strong passwords, its actually cheaper and more effective to just build an authentication platform for them, Keerthi highlighted.
Defending Singapore includes small businesses and citizens Singapores uncles and aunties, he shared. The government has a duty to provide clean drinking water in the form of reliable and clean internet access to its citizens, he highlighted.
Second, regulations can help ensure cyber safety, comparing cyber security tools with cars. Cars in the past were less safe than they are today, but then regulations required automobiles to be built with seatbelts.
Now automobile manufacturers have moved beyond seatbelts, and are developing new safety measures on their own, Keerthi continues. Cybersecurity tools have not yet reached this level of advancement, but the role of these regulations is something to keep in mind, he shared.
Third, he shared that market forces are a method of developing cybersecurity protections, without IT knowledge. The cyber labelling scheme mentioned previously is an example of this.
The simple sticker on IoT devices immediately changes behaviour among consumers as they can easily evaluate a products security, Keerthi said. But it also alters the behaviour of manufacturers as they will compete with each other to provide this improved security, he explained.
This is not a technology solution, but understanding human behaviour, understanding dynamics of market competition, and trying to incentivise market competition in security, he summarised.
To stop a spreading fire, people form a human chain to ferry water to the flames. Governments can similarly work together to stop cyber attacks, setting out cyber norms and instinctively sharing information with one another, to protect their citizens.
See original here:
How Singapore is shaping its cyber defence with international collaboration - GovInsider