Page 1,369«..1020..1,3681,3691,3701,371..1,3801,390..»

Does macOS need third-party antivirus in the enterprise? – TechTarget

Cybersecurity threats require organizations to employ comprehensive data protection tactics and software such as antivirus, but Apple administrators may see Apple devices as sufficiently protected by the native security features.

Apple devices historically have a reputation for strong security, and macOS has a built-in antivirus tool, XProtect, so third-party antivirus might seem unnecessary to some Mac administrators. However, that reputation isn't necessarily accurate today, and malware such as viruses can cause serious issues if they're able to slip through the cracks. Additional antivirus protection is one important part of an effective cybersecurity strategy for Mac devices in the enterprise.

There are a few reasons why Macs have been seen as especially secure devices over the years. In the past, Apple had a much smaller share of the business computing market compared to Windows. There were more users to reach within the Windows OS, so hackers focused on writing malicious code to target Windows devices. Today, however, plenty of people use Macs, so they're a more appealing target for cyber attacks than they used to be.

Another reason for this security reputation is Apple's walled garden approach, where any software or service must be reviewed and approved by Apple before it can run within macOS, iOS or iPadOS. With the App Store, Apple carefully vets third-party software before making it available for download, so it's harder for users to unwittingly install malicious software onto their devices. While this approach can strengthen device security, it has been the subject of criticism and antitrust charges in recent years, so Apple might have to allow third-party app stores on its devices in the future.

New threats emerge constantly, and XProtect isn't as up to date on those threats as third-party antivirus providers tend to be.

Still, there are some aspects of macOS that give the operating system an edge when it comes to security. XProtect is macOS' built-in antivirus protection tool, which scans all applications and files to detect and block the download of malware. Another built-in security tool is Gatekeeper, which verifies that any app users try to open or install has come from a certified developer. These native Mac security tools also receive silent automatic updates, keeping them effective as threats evolve.

Even with these security strengths, viruses and other malware infections can and do affect Mac devices, with new vulnerabilities coming out every year. Their reputation for security can also contribute to cybersecurity risks, as users might be more careless when dealing with phishing attempts and other threats in a Mac environment. To stay on top of any potential vulnerabilities, organizations should supplement macOS' native security features with third-party antivirus software.

Antivirus software typically runs in the background to scan devices for malware and vulnerabilities, detecting and blocking threats such as ransomware, spyware and adware in real time. While XProtect can do this fairly well, it only scans for the malicious software that Apple is already aware of. New threats emerge constantly, and XProtect isn't as up to date on those threats as third-party antivirus providers tend to be. Plus, many antivirus products offer advanced features to further enhance protection, such as built-in VPN, malicious traffic detection, data loss prevention and patch management.

Third-party antivirus can fill in some of the gaps that macOS doesn't cover for security, making it a necessity for organizations that have to deal with sensitive corporate and end-user data. It should be just one part of a malware protection strategy, however. In addition to third-party antivirus software, organizations should invest in security awareness training for end users.

User behavior plays a major role in cybersecurity, with the Verizon "2022 Data Breach Investigations Report" finding that 82% of breaches in 2021 involved human error. Users don't always recognize the signs of a malware attack or know how to react to pop-ups and other suspicious activity. And while one of Apple's security strengths is that it issues regular security updates, users aren't always quick to install updates, allowing vulnerabilities to cause serious issues for even longer. Ensuring that users know the importance of software updates and other cybersecurity best practices is vital to effectively secure Macs in the enterprise.

There is a wide range of Mac antivirus providers on the market today. To choose from the available options, organizations should consider a few factors. Some tools, such as Intego Mac Internet Security X9, only support macOS, but most antivirus vendors can accommodate both macOS and Windows systems. Vendors such as Bitdefender and ESET include Linux support as well. Implementing security platforms that can support all of an organization's systems is a good way to reduce administrative overhead and licensing costs.

Similarly, organizations should look for antivirus software that's compatible with other IT tools and won't significantly impact device performance or the end-user experience. Some vendors, including Malwarebytes and Avast, offer a few different antivirus products and editions to choose from. It's important to sort through all of the available features to find the best fit among all of the vendors and their offerings. Some features that organizations should opt for include ransomware protection, adware detection and centralized management. Other popular vendors to consider include Norton, McAfee, TotalAV and Kaspersky.

See the rest here:
Does macOS need third-party antivirus in the enterprise? - TechTarget

Read More..

Apple’s first iPhone Rapid Security Response patch had a problem … – The Verge

Apple announced the new Rapid Security Response updates for iPhones, iPads, and Macs last year at WWDC, and today, the first publicly released patch on the system started to roll out. After rough going initially when the new update claimed every iPhone was offline, the new patch is now installed on our devices without a problem.

The Rapid Security Response system is supposed to make things easier, adding security fixes in between larger system updates that could install on some devices without a reboot as well as allowing users to opt out of receiving them entirely or uninstall them if they caused any issues.

Every iPhone we checked among Verge staffers running the latest iOS software (iOS 16.4) showed a notification that the 85MB patch was available after the rollout started at 1PM ET.

The only problem is that, as soon as we tried to install it, all we got was an error message that read Unable to Verify Security Response. It continued, saying, iOS Security Response 16.4.1(a) failed verification because you are no longer connected to the internet.

A quick scan of comments across Twitter, Reddit, and other platforms reveals a lot of other people experienced the same problem.

However, by around 3:30PM ET, the process started working smoothly, applying the update within about 30 seconds on all available devices. Apple hasnt yet updated its security page for iOS or other platforms to explain what problems the patch fixes.

Apple did not immediately respond to a request for comment, and so far, its unclear why the error messages were popping up. According to the support page, the first security updates are available now on iOS 16.4.1, iPadOS 16.4.1, and macOS 13.3.1.

Read the rest here:
Apple's first iPhone Rapid Security Response patch had a problem ... - The Verge

Read More..

Heads up! Avast One is 70% off for Tom’s Guide readers in the UK – Tom’s Guide

The Avast One internet security suite recently earned perfect scores for malware protection from the two biggest independent security software labs, AV-Comparatives, and AV-Test. But it also has several advanced security tools, like a system cleaner, network protections, and unlimited VPN access.

For our UK Tom's Guide readers only, Avast has a special introductory offer. For only 23.99 (that's a 70% savings) you can protect up to 5 devices for a whole year!

Here's a quick look at some of the cool features of Avast One:

Firewall: Especially important when connected topublic Wi-Fi, the Avast firewall keeps tab on your connection to make sure snoops and hackers can't sneak in this way. The firewall also works alongside Avast's network security so your system is clear of threats that don't originate from the web.

System cleaner: As you download apps and save files, your devices tend to run slower. Even after files have been deleted small remnants are left behind. Avast's system cleaner looks for these small bits, and anything else causing system slowdown and removes them.

VPN: A virtual private network hides your online activity by using encryption, so your activity can't be intercepted. There's also no proof linking your online movements to you. Even your IP address is hidden. Avast's VPN will kill your internet access automatically if your connection is ever compromised while using it.

ID monitoring: Because of how easy it is to lose personal information due to data breaches, using the ID monitoring that comes with Avast One is very helpful. It will keep watch for your passwords, email addresses, and other login credentials being used on the dark web.

Today's best Avast Mobile Security deals

The rest is here:
Heads up! Avast One is 70% off for Tom's Guide readers in the UK - Tom's Guide

Read More..

Fallston Man Sentenced to 15 Years in Federal Prison for … – Department of Justice

Baltimore, Maryland - U.S. District Judge Stephanie A. Gallagher today sentenced Robert Jackson Wyatt, Jr., age 54, of Fallston, Maryland, to 15 years in federal prison, followed by lifetime supervised release, for distribution of child pornography. Wyatt had a previous federal conviction for possession of child pornography. Judge Gallagher ordered that, upon his release from prison, Wyatt must register as a sex offender in the places where he resides, where he is an employee, and where he is a student, under the Sex Offender Registration and Notification Act (SORNA).

The sentence was announced by United States Attorney for the District of Maryland Erek L. Barron; Special Agent in Charge James C. Harris of Homeland Security Investigations (HSI) Baltimore; Colonel Roland L. Butler, Jr., Superintendent of the Maryland State Police; Harford County Sheriff Jeffrey R. Gahler and Harford County States Attorney Alison Healey.

According to his guilty plea, on August 31, 2021, members of the Maryland State Police (MSP) were conducting an investigation into offenders sharing child pornography using a communication protocol for peer-to-peer file sharing that enables users to distribute data and electronic files over the Internet in a decentralized manner. An IP address that was sharing suspected child pornography was identified as belonging to Wyatt and a search warrant for his home was executed on October 1, 2021. Investigators learned that Wyatt was not home but was at a nearby marina on his boat where he often spent time. Investigators went to the marina and watched as Wyatt walked from his boat to his car. Wyatt then drove back to his residence, where he was confronted by investigators.

Wyatt consented to a search of his cell phone and an MSP digital forensic examiner found several files of child pornography on the phone. A peer-to-peer filesharing program was installed on the phone, as well as a virtual private network application and an anti-forensic application. On a chat application, Wyatt belonged to chat groups including Incest and Little Girl and mommy and daughter. On October 26, 2022, a search warrant was executed on Wyatts boat. Two thumb drives were found with multiple images and videos of child pornography, including several known series involving depictions of babies, toddlers, and sadomasochistic abuse of children. Several of the files located on Wyatts devices matched those that were distributed during the MSP investigation via the peer-to-peer file sharing originating from the suspect IP address.

Wyatt admitted that he was the person who shared the files with the MSP investigator on August 31, 2021. In total, over 1170 images files and over 170 video files were located on Wyatts devices.

This case was brought as part of Project Safe Childhood, a nationwide initiative launched in May 2006 by the Department of Justice to combat the growing epidemic of child sexual exploitation and abuse. Led by the United States Attorneys Offices and the Criminal Divisions Child Exploitation and Obscenity Section, Project Safe Childhood marshals federal, state, and local resources to locate, apprehend, and prosecute individuals who sexually exploit children, and to identify and rescue victims. For more information about Project Safe Childhood, please visit http://www.justice.gov/psc. For more information about Internet safety education, please visit http://www.justice.gov/psc and click on the Resources tab on the left of the page.

United States Attorney Erek L. Barron commended HSI, the Maryland State Police, the Harford County Sheriffs Office and the Harford County States Attorneys Office for their work in the investigation and prosecution. Mr. Barron thanked Assistant U.S. Attorney Colleen E. McGuinn, who prosecuted the case.

For more information on the Maryland U.S. Attorneys Office, its priorities, and resources available to help the community, please visit http://www.justice.gov/usao-md/project-safe-childhood and https://www.justice.gov/usao-md/community-outreach.

# # #

See the rest here:
Fallston Man Sentenced to 15 Years in Federal Prison for ... - Department of Justice

Read More..

3 Best Software Stocks to Buy in 2023 and Beyond – The Motley Fool

Looking to add some excitement to your portfolio? Investing in software stocks could give you that jolt, while also setting up your portfolio to make money in the long run. And if you're looking for some solid picks in this sector, I've got your back.

Read on to dive into three software stocks that are worth your attention: software giant Microsoft (MSFT -0.55%),programmatic advertising platform The Trade Desk (TTD -2.18%), and cloud-based security provider Cloudflare (NET -4.95%). Get ready to learn why these three companies could be great additions to your portfolio this year.

You can't beat the classics sometimes. Microsoft is an excellent investment after dominating the software industry for decades. The market opportunities might have changed, but the company's growth prospects remain enormous, even now.

For example, the tech giant's revenue rose by 10% in constant currency in the recently reported third quarter of 2023. If that jump doesn't impress you much, maybe you didn't notice that the global economy is waist-deep in an inflation-based crisis. Any growth should be seen as good news in this market, especially if the growing business was large and established in the first place.

And that's for the whole shebang, including underperforming businesses such as Windows licenses and Microsoft-branded hardware devices. Balancing out those weak spots, the Redmond, Washington, company is pulling off some truly remarkable growth in cloud computing and productivity software. Strong demand for Windows Azure and other cloud-based services is driving that train.

Of course, no investment is a sure thing, but Microsoft seems well positioned for continued growth in the years to come. It's no surprise that as a leading cloud-computing platform with a keen eye on the artificial intelligence (AI) space, the stock is up by more than 27% year to date in this AI-flavored economy.

But wait -- there's more. In the third quarter, Microsoft returned $9.7 billion of spare cash to shareholders through buybacks and dividends. That stockholder-friendly move was based on $17.8 billion in free cash flows. Microsoft is putting those deep pockets to good use.

You'll want to take a closer look at The Trade Desk in the digital advertising space.

The company's programmatic advertising platform is gaining market share, and its advertising business is snowballing. In the fourth quarter of 2022, The Trade Desk reported revenue growth of 24% year over year.

Remember what I said about any growth being good news? That's even more true in the advertising sector, which has taken the inflation-based downturn on the chin. Ad buyers are holding their purse strings tightly since their prospective customers generally aren't ready to buy stuff. A 24% revenue jump against that backdrop is nothing short of stunning.

Like Microsoft, The Trade Desk's ongoing success has caught the attention of hungry investors lately. Share prices are up by 40% year to date.

For a software stock with strong growth potential in the advertising space, consider adding The Trade Desk to your portfolio. When this company does a good job, it makes ad campaigns more effective with a lower budget. This programmatic advertising platform looks like a great addition to your holdings.

And when you're looking for ideas in internet security and performance services, look no further than Cloudflare. The company is gaining market share, and its customer base is growing rapidly. It added 114 large customers in the first quarter of 2023, with annual contracts worth $100,000 or more. That customer group now has 2,156 members.

Cloudflare is also expanding its product portfolio and growing its global footprint. In the first quarter, the company reported revenue growth of 37% year over year. I don't need to remind you of the challenging market environment, right? The gains are only getting bigger.

The last quarter was tough, with customers scrutinizing every penny of their operating budgets. On last week's first-quarter earnings call, CEO Matthew Prince likened it to the grimmest days of the pandemic. Still, Prince emphasized that his company remains indispensable, not just an expendable luxury. As he put it, "Thankfully, we continue to be a must-have, not a nice-to-have."

So stop me if you've heard this before, but Cloudflare is a software stock with explosive growth potential. You should consider adding this promising company to your portfolio, giving you a healthy exposure to the internet security and performance markets. Like Microsoft and The Trade Desk, Cloudflare should serve your wealth-building investment goals well for the long haul.

View post:
3 Best Software Stocks to Buy in 2023 and Beyond - The Motley Fool

Read More..

Internet 2.0 Conference Reviews The Need To Invest In Cybersecurity Technology To Avoid Growing Fraud In The – EIN News

One of the fireside chats of the Internet 2.0 Conference sheds light on the need to invest and include cybersecurity technology in order to stay safe online.

Cybercrime is on the rise, with scam offenses, fraudulent activities, and online scams becoming increasingly sophisticated. Experts shared that over $3.3 billion was lost to fraud in 2020, and the trend shows no signs of slowing down. Many people have fallen victim to these scams and some have even lost their life savings. Therefore, addressing this issue and taking preventative measures to protect against fraud is imperative.

Speakers at the Internet 2.0 Conference shared that cybercriminals use various tactics to scam and defraud unsuspecting internet users. One of the most common scams involves enticing users to share personal information or downloading harmful software through fake websites and fraudulent emails. Cybercriminals sometimes even impersonate well-known businesses to lure users into sharing confidential information. These scammers operate under pretenses and fake identities and use reviews to dupe unsuspecting victims. Online review platforms are rife with fake reviews, which can lure customers into trusting illegitimate businesses. Consumers should, therefore, remain vigilant when reading reviews, especially on unfamiliar sites.

As we usher in the new era of technology, there is a pressing need to invest in cybersecurity technology. In the past, internet security was reactive, with developers only focusing on mitigating cyber-attack effects. However, with the increase in data breaches and fraud, developers must adopt a proactive approach to cybersecurity. By doing so, they can help prevent fraudulent activities before they occur, ensuring that the internet remains a safe space for all users.

You can join this upcoming tech event, the Internet 2.0 Conference, and explore the limitless possibilities of discussing, debating, and exhibiting your effective solutions against the prevailing fraud, spam, and other scam offenses, before the global audience. To learn more about its upcoming Dubai and Las Vegas editions, feel free to visit http://www.internet2conf.com.

Internet 2.0 ConferenceInternet 2.0 Conference+1 346) 226-8280email us hereVisit us on social media:FacebookTwitterLinkedIn

More here:
Internet 2.0 Conference Reviews The Need To Invest In Cybersecurity Technology To Avoid Growing Fraud In The - EIN News

Read More..

Advancing The Security Operations Center (SOC): New Technologies and Processes Can Help Mitigate Cyber Threats – Forbes

Work on a Big Interactive Map. Facility is Full of Screens Showing Technical Data.getty

We are in a state of cyber-flux with new and many asymmetrical challenges to cybersecurity. As cybersecurity gaps abound, a new urgency in both industry and government has arisen on how to better protect the cyber landscape.

The digital attack surface has vastly expanded from the transitions by many companies and organizations to remote work, and from more interconnectivity of PCs and smart devices coming online from around the globe. For many companies and institutions, the overall IT perimeter is now more complex and dispersed with on-premises systems, cloud, and edge computing that necessitates more visibility, and a need for better threat detection, analysis, and incident response.

The cyber ecosystem is in a precarious situation. Emerging technologies such as the Internet of Things, Machine learning & artificial intelligence, and 5G are creating operational shifts that require new and more robust cybersecurity strategies. Exacerbating the cybersecurity challenge is the global dearth of qualified cybersecurity workers and expertise available to help defend the data at risk.

Finally, but not least of concern is the fact that criminal enterprises and state actors are posing a much more sophisticated and capable threat. They are sharing resources and tactics over Dark Web forums and using advanced hacking tools that enable them to discover vulnerable targets to infiltrate malware and automate attacks.

One vital and important development to meet these numerous cyber-threat challenges is the development of enhanced capabilities in Security Operations Centers (SOCs) used by companies, government, and organizations. SOCs provide an operational risk management structure for organizations to organize, monitor and respond to cybersecurity threats.

An effective SOC can manage corporate systems, control systems, and physical security. It is designed to deliver continuous prevention, protection, detection, and mitigation of threats to systems. SOC teams also uncover vulnerabilities, respond to threats, and handle incidents that may be in progress on your networks or systems. A SOCs success quotient depends on the rapid and accurate interpretation and response to threats by analysts and the security team. Please see my article on the key functions and operations of SOCs in Homeland Security Today at: Using SOCs and Cybersecurity Hubs to Prioritize Security Operations in a Critical Era - HS Today

Also, security operations center benefits are well defined in an article called Security Operations Center Trends for 2023 by Gilad David Maayan:

Improved Security Posture: A SOC helps to improve an organization's security posture by continuously monitoring for security threats and vulnerabilities and taking appropriate action to address them. This can help prevent security incidents and protect the organization's assets.

Enhanced Visibility: A SOC provides a centralized view of the organization's security posture, allowing security professionals to easily see what is happening across the organization's networks, systems, and applications.

Please see: Security Operations Center Trends for 2023 - DZone

Every year the RSA conference in San Francisco operates as a venue where many new cyber technologies are introduced for consideration to IT and security teams. SOC technologies have become a significant focus of those seeking improved cybersecurity. Other venues and conferences are also discussing the important role of SOCS for cybersecurity as the threat matrix grows. I have selected a few examples of solutions and products in different areas of SOC operations that can help advance SOCs and their operators for the years ahead.

IBM, a historical leader in developing tools for SOCs, has responded to new SOC challenges with an array of AI and security solutions designed to unify and accelerate the security analyst experience across their entire process of threat detection, investigation and response The IBM QRadar Suite offers a comprehensive set of security software built around a new user interface that is embedded with AI, and connects security data and response workflows between SOC analyst toolsets. It is delivered as SaaS and is designed so businesses small, medium, and large can select and customize products from the suite that specially fit their unique situations.

Specifically for SOC operators these products include AI/automation innovations for:

Alert triage; contextualizing threats, reducing false positives, and automatically prioritizing or closing alerts with AI trained on prior analyst response patterns,

Threat investigation; with the system automatically conducting early investigation steps that analysts would normally do manually, such as searching across systems for other evidence related to the security incident, and compiling results into easy to digest format for analysts to review and respond.

According to IBMs press release from the RSA conference, there are three core design elements of the QRadar Suite that immediately garnered my attention that bring immediate advantages to SOC operators to help ameliorate cyber-threats:

Please see RSA Press Release:

For more information also for a deeper dive on QRadar see:

Peripherals

Fibernet

An Israeli company called Fibernet LTD. known for their data center expertise (including for the CERN particle reactor), and has developed of a line of products for SOCs to keep secure USB, HDMI, and similar data lines. Their solutions allow companies to protect high-level secured environments, including multi-media peripherals that connect to SOCs, by separating source and data. Their new products can secure and simplify the aggregation of audio/visual data from multiple sources that may feed into a SOC. Fibernet restrings, emulates and separate signals, keeping functionality and avoiding any possibility of hacking through these lines.

Cybersecurity at the signal level is an interesting approach as physical security is based on the laws of physics it makes it physically impossible to transfer data in the wrong direction, denying an attacker access to your system.

For more information, please see:

Following The Audit and Log SOC Trail

A Canadian company called Datex created a technology called DataStealth that is beneficial for SOC operators performing audits. DataStealth is deployed between 2 endpoints: User to Application or Application to a database or even an On-Premises environment to a SaaS Service. Their platform then creates an audit record for everything that passes between.

The uniqueness of this approach is that the collection is performed at the transport layer enabling DataStealth to sit between any source and target, without any installation of collectors or agents. By collecting and reviewing audit logs, system administrators can achieve unparalleled granularity in tracking user activity, while security teams can easily and quickly investigate any security incidents to ensure full compliance with regulations, privacy laws, and governance requirements.

Please see: DataStealth Audit and Logging Use Case

While technologies are very important, there is no substitute for the human factor in cybersecurity and in especially managing the operations of a security operations center. There are a variety of organization that specialize in SOC certifications, two of them are described below.

SANS Institute

The SANS Institute was launched in 1989 as a cooperative for information security thought leadership. SANS ongoing mission to empower cyber security professionals with the practical skills and knowledge they need to make our world a safer place. SANS offers the latest SOC training certification and resources for SIEM, Elastic Stack, and modern detection techniques to help equip Blue Teamers with the right knowledge and ability that is needed to safeguard their organizations and drive security operations with actionable intelligence.

Please see: Security Operations Center | SANS Institute

CompTIA is another certification organization that offers excellent training for potential SOC analysts. The Computing Technology Industry Association (CompTIA) is a leading voice and advocate for the $5 trillion global information technology ecosystem; and the estimated 75 million industry and tech professionals who design, implement, manage and safeguard the technology that powers the worlds economy.

Please see: What Is a Security Operations Center | Cybersecurity | CompTIA

The State of The SOC

CompTia

The adage is that people, processes, and technologies are essential for holistic cybersecurity. I have discussed some interesting technology applications, but there are also newer processes that SOCs need to implement. While models can differ, below is a glimpse of the basic elements usually found in operating an SOC:

In the past, three significant risk management themes have been put forward to help ameliorate the digital risk ecosystem including: security by design, defense in depth, and zero trust. They are a triad, or three strong pillars of risk management needed for a successful cybersecurity strategy.

Security by Design is well defined in an article in United States Cybersecurity magazine, cybersecurity expert Jeff Spivey provided an excellent working definition: Security by Design ensures that security risk governance and management are monitored, managed, and maintained on a continuous basis. The value of this holistic approach is that it ensures that new security risks are prioritized, ordered, and addressed in a continual manner with continuous feedback and learning. Security by Design | United States Cybersecurity Magazine (uscybersecurity.net)

Security by Design is really the initiation point of a risk management processespecially if you are a software or hardware developer concerned with security. In fact, DHS CISA recently came out with a strategy for both the private and public sectors making security by designing a preferred course of action. Please see: Secure by Design, Secure by Default | CISA

Defense in Depth. A variety of strong definitions exist for defense in depth in the security community. A NIST publication defines the Defense-in-depth concept as an important security architecture principle that has significant application to industrial control systems (ICS), cloud services, storehouses of sensitive data, and many other areas. We claim that an ideal defense-in-depth posture is 'deep', containing many layers of security, and 'narrow', the number of node independent attack paths is minimized. Measuring and Improving the Effectiveness of Defense-in-Depth Postures | NIST

Zero trust (ZT) is the term for an evolving set of cybersecurity paradigms that move defenses from static, network- based perimeters to focus on users, assets, and resources. A zero-trust architecture (ZTA) uses zero trust principles to plan industrial and enterprise infrastructure and workflows. Zero trust assumes there is no implicit trust granted to assets or user accounts based solely on their physical or network location (i.e., local area networks versus the internet) or based on asset ownership (enterprise or personally owned). Authentication and authorization (both subject and device) are discrete functions performed before a session to an enterprise resource is established. Zero trust is a response to enterprise network trends that include remote users, bring your own device (BYOD), and cloud- based assets that are not located within an enterprise-owned network boundary. Zero trust focuses on protecting resources (assets, services, workflows, network accounts, etc.), not network segments, as the network location is no longer seen as the prime component to the security posture of the resource. This document contains an abstract definition of zero trust architecture (ZTA) and gives general deployment models and use cases where zero trust could improve an enterprises overall information technology security posture. Zero Trust Architecture | NIST

Frameworks, processes, strategies, operational SOC are elements that should be prioritized in industry and government. I provided a working checklist in a recent article in Homeland Security Today on the topic that can be found at the following link: Using SOCs and Cybersecurity Hubs to Prioritize Security Operations in a Critical Era - HS Today

A useful publication to better understand the importance of the role of SOCs that was written in 2021 is The Evolution of Security Operations and Strategies for Building an Effective SOC by Lakshmi Narayanan Kaliyaperumal. The author noted that cybersecurity threats are becoming increasingly complex, sophisticated, malicious, well organized, and well-funded. The widespread adoption of artificial intelligence (AI)-powered tools and technologies will lead to customized; high-impact cyberattacks. Addressing the complexity and sophistication of such attacks requires an empowered security operations center (SOC). And that extended detection and response (XDR) and the integration of IT/operational technology (OT)/industrial control systems (ICS) are likely the next advancements in the SOC evolution. XDR evolved from current reactive threat detection and response solutions and integrates security technologies signals to extract threat events across identity, endpoints, the cloud, and the network. XDR capabilities include identity analytics, network analysis, integrated threat intelligence, AI/ML-based detection, and automated and orchestrated investigation response.

Please see: The Evolution of Security Operations and Strategies for Building an Effective SOC (isaca.org)

The Importance of SOCs is a global issue and the importance of the SOC role is recognized in new legislation by the European Community. The proposed EU Cyber Solidarity Act, aims to strengthen cybersecurity by creating better detection, preparedness, and response to significant or large-scale incidents. This involves creating a European Cybersecurity Shield and a Cyber Emergency Mechanism, using national and cross-border state-of-the-art Security Operations Centers (SOCs) tasked with detecting and acting on cyberthreats. The EUs Cyber Solidarity Act: Security Operations Centers to the rescue! | WeLiveSecurity

In summary, innovative technologies, (some of which I have highlighted) and which are being introduced in 2023 at RSA and other venues are focused on those capabilities and will significantly assist SOC operators with cybersecurity challenges. Being aware of the resources available and operational requirements for SOC cybersecurity is a starting point for business, government, and many organizations. The cyber threats and risks are too high not to be proactive in advancing the capabilities of security operations centers.

Chuck Brooks

Top Cyber News Magazine

Chuck Brooks is a globally recognized thought leader and subject matter expert Cybersecurity and Emerging Technologies. Chuck is also an Adjunct Faculty at Georgetown Universitys Graduate Cybersecurity Risk Management Program where he teaches courses on risk management, homeland security technologies, and cybersecurity. LinkedIn named Chuck as one of The Top 5 Tech People to Follow on LinkedIn. He was named Cybersecurity Person of the Year for 2022 by The Cyber Express, and as one of the worlds 10 Best Cyber Security and Technology Experts by Best Rated, as a Top 50 Global Influencer in Risk, Compliance, by Thompson Reuters, Best of The Word in Security by CISO Platform, and by IFSEC, and Thinkers 360 as the #2 Global Cybersecurity Influencer. He was featured in the 2020, 2021, and 2022 Onalytica "Who's Who in Cybersecurity" He was also named one of the Top 5 Executives to Follow on Cybersecurity by Executive Mosaic, He is a GovCon Expert for Executive Mosaic/GovCon Wire, He is also a Cybersecurity Expert for The Network at the Washington Post, Visiting Editor at Homeland Security Today, and a Contributor to Skytop Media, and to FORBES. He has an MA in International relations from the University of Chicago, a BA in Political Science from DePauw University, and a Certificate in International Law from The Hague Academy of International Law.

Chuck Brooks, President of Brooks Consulting International, is a globally recognized thought leader and subject matter expert Cybersecurity and Emerging Technologies. Chuck is also Adjunct Faculty at Georgetown Universitys Graduate Applied Intelligence Program and the Graduate Cybersecurity Programs where he teaches courses on risk management, homeland security, and cybersecurity.

LinkedIn named Chuck as one of The Top 5 Tech People to Follow on LinkedIn. He was named as one of the worlds 10 Best Cyber Security and Technology Experts by Best Rated, as a Top 50 Global Influencer in Risk, Compliance, by Thompson Reuters, Best of The Word in Security by CISO Platform, and by IFSEC and Thinkers 360 as the #2 Global Cybersecurity Influencer. He was featured in the 2020, 2021, and 2022 Onalytica "Who's Who in Cybersecurity" as one of the top Influencers for cybersecurity.

Chuck has served at executive levels in both government and industry. He is a two-time Presidential Appointee and was one of the group of initial people hired to helped set up the Department of Homeland Security, including the Science & Technology Directorate.

Chuck has written over 300 articles and has keynoted dozens of conferences worldwide. He has over 82,000 followers on LinkedIn and almost 18,000 followers on Twitter.

Chuck has an MA in International relations from the University of Chicago, a BA in Political Science from DePauw University, and a Certificate in International Law from The Hague Academy of International Law.

Follow Chuck on social media:

LinkedIn:https://www.linkedin.com/in/chuckbrooks/

Twitter:@ChuckDBrooks

See the rest here:
Advancing The Security Operations Center (SOC): New Technologies and Processes Can Help Mitigate Cyber Threats - Forbes

Read More..

Luukas Ilves, Gulsanna Mamediieva, and David Eaves, with Vice … – The Rockefeller Foundation

David: Ukraine offers a window into a collective future about how we might face the coming crises. Ukraine happens to be facing an existential crisis created by an illegal war committed by its neighbor, but all countries are facing climate change crises, financial crises, and possible future pandemics. So, a countrys responsive capacity Sana talked about her governments resilience to those things is going to be core to determining trust in government. If we want democracies to survive, they have to perform well. We need digital-era governments to respond to 21st-century problems. That means having the flexibility and the capacity to be able to do that. Thats what the Estonians have and its what the Ukrainians are showing us: how digital fits into that capacity building. For me, a big takeaway from the convening was how much climate change is going to drive this need. If there are going to be 10 million internationally displaced people in 50 countries around the world over the next 20 years, were going to need some capacity to serve those people when they lose their houses and are roaming around your country. The only way a country is going to be able to do that is if it has a digital solution.

Luukas: We hope these stories are inspiring for people interested in digital public infrastructures.Many countries in the world tend to be very pessimistic about the public sectors capacity to do these things. That becomes a self-fulfilling prophecy. The most important thing is, whatever your position, be demanding of your government. Because theres no inherent law that says the government has to be bad at technology. The more positive pressure there is from the people to do better, the greater the countrys chances of success.

Sana: Id encourage people to find energy and inspiration in democracy. Citizens should have higher expectations from the government for the services that they receive. Especially in terms of convenience and user experience. But for those people who work specifically in this sphere, it requires a lot of energy, persistence, and flexibility to overcome obstacles. What I took from the convening was that everyone, on every level, has to deal with some form of resistance. Its the nature of what were doing in reforms and transformation, that the system in place will resist our efforts. Thats why its good to have peers from other countries. As you share information, you understand that you are not alone in this. Never underestimate the impact of persistence.

*Read the transcript of Vice Prime Minister Fedorovs full statement.

This has been edited for brevity and clarity.

How should we shape our collective digital future? The Bellagio convening, attended by Sana and others, created space to discuss real-world implications for digital government as influenced by these ideas.

I believe that we should start to think of a collective digital future in terms of working together on a joint cyber agenda. Ukraine now has a unique experience of surviving a cyber war reeling from thousands of cyberattacks while keeping the state running. Since February 24th, 2022, everything has been working well: the tax system, banking, government agencies, and critical infrastructure. There was not a single day that something stopped. We have to build digitally resilient countries. Together we can do it even better.

Vice Prime Minister Fedorov, in your conversation with the Atlantic Council in December 2022, you described Ukraine as a young country, central to Europe, with the energy to implement quick changes. Could you elaborate on the ways Ukraine is uniquely positioned as a country to fight for democracy?

Ukraine has been fighting for its freedom for almost a year in a full-scale war with a cruel Russian aggressor. Its the biggest war since World War II and the most technological at the same time. We have a significant technological advantage. The key weapons of modern warfare are not 1960s tanks or artillery as Russia thinks, but data and technology. While Russia is losing hundreds of thousands of people on the battlefield, Ukraine is looking for revolutionary ideas to fight back efficiently and in life-saving mode.

Ukraine is quite a young country and this lets us develop and implement the newest creative solutions. The war requires taking quick decisions with the help of breakthrough, innovative technology. And this is exactly what we are doing now. For three years now, the Ministry for Digital Transformation has been changing the entire state and implementing business approaches in government. Thats why we are so efficient. I can say that our Ministry works as a startup: fast, efficient, and ambitious.

Its the 21st century, and its the time of AI, UAVs, neural networks, Starlinks, and swift information exchange. Artificial intelligence helps us to identify Russian soldiers. Chatbots make it possible to inform the armed forces in real time about the movement of enemy troops and hardware. Starlinks instantly restore communication in liberated territories. UAVs became the eyes of the military, providing complete information awareness on the battlefield, an understanding of where the enemy is, its numbers, combat capability, etc.

After all, our team has a big vision for turning Ukraine into a top-tech country. Strong security and military solutions could become our main export and expertise.

Why is digitization the solution?

This war proved that the digital state is the most resilient one. The digital state ensures the operation of public services and the economy. Ukraine has been quite a digitized country since before the war. Since 2019, with the establishment of the Ministry of Digital Transformation, weve managed to build a strong digital infrastructure. We were preparing to become a Digital Tiger, but it turned out weve built a digital war machine, which can operate even under conditions of a full-scale invasion. Reforming and securing the state registries system, improving cybersecurity and digital skills for citizens, ensuring easy access to high-speed internet, and launching Diia (our one-stop shop for public services): all of these things made it possible for us to stand through the first months of the war. And for the digital to become an essential part of Ukraines resistance.

When I say that Ukraine is a digitized country, I mean that we are a country with convenient online services, digital documents, a high level of cyber security. A country with a mobile-first approach. A country where services are designed for online access first and offline as an option. Now, by using the Diia app, every citizen can: open a business in a few minutes; register a newborn; report on the movement of Russian tanks & troops; apply for social benefits of unemployment assistance; sign documents; even watch TV news or listen to the radio. In 2022, during the full-scale invasion, we launched 39 new services and products for citizens.

The Ukrainian experience shows that in order to stay resilient in the 21st century and to deal with the most unexpected circumstances, its important for all countries to go digital, and invest in digital infrastructure and cybersecurity. A strong and diversified internet connection is a must. As well as strong databases and state registers. The digital economy is the most resilient one, as it cant be easily destroyed by cruise missiles.

How do the benefits of digital democracy, of digital governance, outweigh the positive repercussions of the old order?

We are convinced that the future is digital, and it belongs to governments that operate like IT companies. Which are quick, efficient, and agile. Digital democracy will let us include more citizens in the process. Meanwhile, digital governance simplifies the communication between a person and the state, making the services convenient and clear, destroying any possibility of corruption.

Explore More

You can read more about the work explored during this Bellagio convening in David Eavess The Narrow Corridor and the Future of Digital Government, shared in advance of the convening, and Shaping our Collective Digital Future Convening: Why Digital Government Matters Now, a post-event reflection. Learn how Diia is helping Ukraine during the war.

See the original post here:
Luukas Ilves, Gulsanna Mamediieva, and David Eaves, with Vice ... - The Rockefeller Foundation

Read More..

Internet of Things Security Market Next Big Thing | Major Giants- Cisco Systems, IBM, Intel, Infineon – openPR

Internet of Things Security Market

Get Free Exclusive PDF Sample Copy of This Research @ https://www.advancemarketanalytics.com/sample-report/21079-global-internet-of-things-security-market#utm_source=OpenPR/Suraj

Some of the key players profiled in the study are:Cisco Systems (United States), IBM Corporation (United States), Intel (United States), Infineon (Germany), Symantec (United States), Siemens (Germany), Gemalto (Netherlands), Allot (Israel), Fortinet (United States), Zingbox (United States), Mocana (United States), Securithings (Israel), Centri (United States).

Scope of the Report of Internet of Things SecurityThe risk of cyber-attacks is raised by increasing the use of 3 G and 4 G long-term evolution ( LTE), as well as broadband networks and innovations. Via these cellular networks, real-time information, and transaction-related information, which are critical to users, is exchanged; thereby, giving rise to the need for IoT protection. In areas such as health sensors, smart home appliances, smart city ventures, and smart retail, the deployment of the internet is rapidly growing rapidly, raising the need for IoT protection. Thus this enables the market of Internet of Things Security across the world.

The titled segments and sub-section of the market are illuminated below:by Type (Network Security, Endpoint Security, Application Security, Cloud Security, Others (web security and email security)), Application (Smart Retail, Connected Vehicles, Smart Government and Defense, Connected Healthcare, Consumer Wearables, Connected Logistics, Smart Energy and Utilities, Smart Manufacturing), Services type (Professional Services, Integration Service, Consulting Service, Support and Maintenance, Managed Services), Solution type (Identity and Access and Management, Data Encryption and Tokenization, Intrusion Detection System and Intrusion Prevention System, Device Authentication and Management, Secure Communications, Public Key Infrastructure and Lifecycle Management, Distribute Denial of Service Protection, Security Analytics, Others)

Market Drivers:Hackers attack IoT devices and take advantage of known bugs, such as default usernames, passwords, and backdoor static code.

Market Trends:The use of cloud computing for the collection of sensitive data by separate organizations results in the possibility of unwanted access to data.

Opportunities:IoT protection allows both the private and public sectors to be secure from trained cybercriminals and advanced IoT attacks. In order to track the information and financial aspects of people, companies, and even countries, cybercriminals use multi-layered cyber attacks. Organizations are, however, searching for streamlined strategies for defense.

Challenges:Currently, there are no globally accepted set of technical standards for IoT, especially in terms of communications. IoT is extensively used by smart cars to smart manufacturing and connected homes and building automation solutions. However, with heterogeneous IoT networks and its protocols, it becomes difficult for devices connected in one IoT system to communicate with devices in another system.

Region Included are: North America, Europe, Asia Pacific, Oceania, South America, Middle East & Africa

Country Level Break-Up: United States, Canada, Mexico, Brazil, Argentina, Colombia, Chile, South Africa, Nigeria, Tunisia, Morocco, Germany, United Kingdom (UK), the Netherlands, Spain, Italy, Belgium, Austria, Turkey, Russia, France, Poland, Israel, United Arab Emirates, Qatar, Saudi Arabia, China, Japan, Taiwan, South Korea, Singapore, India, Australia and New Zealand etc.

Have Any Questions Regarding Global Internet of Things Security Market Report, Ask Our Experts@ https://www.advancemarketanalytics.com/enquiry-before-buy/21079-global-internet-of-things-security-market#utm_source=OpenPR/Suraj

Strategic Points Covered in Table of Content of Global Internet of Things Security Market:Chapter 1: Introduction, market driving force product Objective of Study and Research Scope the Internet of Things Security marketChapter 2: Exclusive Summary - the basic information of the Internet of Things Security Market. Chapter 3: Displaying the Market Dynamics- Drivers, Trends and Challenges & Opportunities of the Internet of Things SecurityChapter 4: Presenting the Internet of Things Security Market Factor Analysis, Porters Five Forces, Supply/Value Chain, PESTEL analysis, Market Entropy, Patent/Trademark Analysis.Chapter 5: Displaying the by Type, End User and Region/Country 2015-2020Chapter 6: Evaluating the leading manufacturers of the Internet of Things Security market which consists of its Competitive Landscape, Peer Group Analysis, BCG Matrix & Company ProfileChapter 7: To evaluate the market by segments, by countries and by Manufacturers/Company with revenue share and sales by key countries in these various regions (2021-2027)Chapter 8 & 9: Displaying the Appendix, Methodology and Data Source

finally, Internet of Things Security Market is a valuable source of guidance for individuals and companies.

Read Detailed Index of full Research Study at @ https://www.advancemarketanalytics.com/reports/21079-global-internet-of-things-security-market#utm_source=OpenPR/Suraj

Thanks for reading this article; you can also get individual chapter wise section or region wise report version like North America, Middle East, Africa, Europe or LATAM, Southeast Asia.

Contact Us: Craig Francis (PR & Marketing Manager) AMA Research & Media LLPUnit No. 429, Parsonage Road Edison, NJ New Jersey USA - 08837 Phone: +1(201) 7937323, +1(201) 7937193sales@advancemarketanalytics.com

About Author: Advance Market Analytics is Global leaders of Market Research Industry provides the quantified B2B research to Fortune 500 companies on high growth emerging opportunities which will impact more than 80% of worldwide companies' revenues.Our Analyst is tracking high growth study with detailed statistical and in-depth analysis of market trends & dynamics that provide a complete overview of the industry. We follow an extensive research methodology coupled with critical insights related industry factors and market forces to generate the best value for our clients. We Provides reliable primary and secondary data sources, our analysts and consultants derive informative and usable data suited for our clients business needs. The research study enables clients to meet varied market objectives a from global footprint expansion to supply chain optimization and from competitor profiling to M&As.

This release was published on openPR.

Read more:
Internet of Things Security Market Next Big Thing | Major Giants- Cisco Systems, IBM, Intel, Infineon - openPR

Read More..

Minister warns of threat of cyber attack at Gibraltar conference featuring UK law enforcement agents – The Olive Press

THE threat of cyber attack is growing for both private and public sectors, a government minister said at a recent internet security conference.

Minister for Digital and Financial Services Albert Isola gave the welcoming address at the conference at Grand Battery House this week.

Today, all Government organisations and private businesses live with the threat of a cyber attack irrespective of their size, he told delegates.

Gibraltar Finance and the UK law firm Weightmans co-hosted the cyber security meet last Wednesday.

Speakers from the UKs National Cyber Security Centre, the UKs National Crime Agency and Londons specialist cyber security team at Price Waterhouse Coopers shared their knowledge.

Isola pre-recorded his address as he travelled back from Poland.

The threat of a cyber attack is growing and it is important that we continue to seek ways to stop future attacks, the minister said.

Equally important is how we react to an attack when it is occurring and how we deal with the consequences of an attack after the event.

He emphasized the how the participation of UK law enforcement agencies had influenced the Rocks approach too.

In Gibraltar we recently established a National Cyber Command to develop Gibraltars cyber security strategy, Isola said.

I am pleased that some of the people involved in this initiative together with members of the Governments IT Department attended the conference.

Michael Ashton, Senior Executive represented Gibraltar Finance at the conference.

The British overseas territory has a strong IT department that has made sure to keep it safe from serious cyber attacks so far.

But the danger is always close by as Chief Minister Fabian Picardo found out recently when his Twitter account was hacked.

ALSO READ:

See more here:
Minister warns of threat of cyber attack at Gibraltar conference featuring UK law enforcement agents - The Olive Press

Read More..