Page 1,458«..1020..1,4571,4581,4591,460..1,4701,480..»

National Science Foundation Expands Pathway to Cybersecurity … – ERAU News

Upon receiving her bachelors degree from Embry-Riddle Aeronautical University in 2020, Meagan Shivers started work as an autonomy, artificial intelligence and machine learning engineer at Lockheed Martins Skunk Works. She credits her early jump on a successful career to an Embry-Riddle program, funded by the National Science Foundation Research Experience for Undergraduates (NSF REU), that was focused on the cybersecurity of uncrewed aerial vehicles (UAVs).

My experience at the REU definitely helped set me apart from other candidates since I had hands-on experience developing an AI-based algorithm for an uncrewed aircraft system, Shivers said.

To further expand the impact of such undergraduate programs, the NSF has recently awarded Embry-Riddle another three-year grant, for a total of $676,000, to prepare students for careers in the high-demand field of cybersecurity.

The most important aspect is providing undergraduate students with hands-on research experience under the guidance of experienced faculty mentors, said Dr. Laxima Niure Kandel, principal investigator and an assistant professor in the Department of Electrical Engineering and Computer Science.

The current grant project recruits students from multiple academic institutions. It also seeks to widen the pool of candidates by targeting populations that are underrepresented in cybersecurity.

There is a shortage of cybersecurity professionals, and a lack of women and minorities in the field is not helping this shortage, said Kandel. By expanding the scope of the REU to underrepresented groups, we can build interest and confidence in pursuing a career in cybersecurity, thus aiding in reducing the shortage.

Also, the more diverse and inclusive a workforce, the broader its range of thoughts and skills, Kandel added. Diversity is critical to creating innovative solutions to tackle increasingly complex cybercrimes.

Dr. M. Ilhan Akbas, also an Embry-Riddle assistant professor, is a co-principal investigator and mentor.

During Shivers participation in the REU, she worked under the supervision of Dr. Hever Moncayo, associate professor and program coordinator for the Master of Science in Aerospace Engineering. In addition to learning how to implement an artificial intelligence-based algorithm, Shivers said she learned team dynamics and developed the critical thinking skills needed to tackle novel concept implementations.

I had multiple interviews for career opportunities, and I talked about my REU project in every single one, Shivers said. The recruiters were incredibly impressed with the work I had done.

Shivers research group also published a paper, which she referred to as a great milestone towards my future career in industry.

The REU award supports the training of 10 students for 10 weeks during the summers of 2023-2025. The goals of the program include increasing the safety and security of UAVs in personal, commercial and military applications, while also expanding the research abilities, career prospects and graduate school potential of undergraduate students. Participants will also receive lodging, meals and a stipend.

UAVs, or drones, have increasingly become the targets, and potential vectors, of cyber-attacks, cueing a greater need for qualified workers in the cybersecurity field.

Project mentors for the recent grant also include Dr. Omar Ochoa, an Electrical Engineering and Computer Science assistant professor; Dr. Eduardo Rojas, associate professor; and Dr. Radu Babiceanu, professor, interim chair and program coordinator for the Ph.D. in Electrical Engineering and Computer Science, M.S. in Systems Engineering and M.S. in Cybersecurity Engineering.

Shivers, who is currently pursuing a masters degree in Unmanned and Autonomous Systems Engineering through Embry-Riddles Worldwide Campus, would like to help develop AI-based systems that would reduce the cognitive load that pilots/operators feel while performing a mission, she said.

The concept of crewed-uncrewed teaming really interests me, so I am aiming to help develop technology that enables pilots/operators to be in control of multiple uncrewed/autonomous systems, Shivers said. Cybersecurity will play an extremely important role as more of our systems become fully autonomous, so finding a foundation at the REU has helped propel me towards pursuing this route.

Students currently enrolled in an undergraduate program in the United States and interested in cybersecurity research of uncrewed systems can apply online.

Posted In: Engineering | Security Intelligence and Safety | Uncrewed Systems

Continue reading here:

National Science Foundation Expands Pathway to Cybersecurity ... - ERAU News

Read More..

Will humans be able to upload consciousness and sensibility onto computer? – WION

A scientist has claimed that by the end of this year, humans will be able to upload consciousness onto the computer, making it sensible and being aware of and responsive to its own surroundings, but is it possible for a machine to react the way humans do?

COMMERCIAL BREAK

SCROLL TO CONTINUE READING

Tech guru Dr Pratik Desai said that with enough recorded audio and videos, people will be able to keep their loved ones forever "alive". Desai urged people to record their elderly parents and loved ones.

Desai is an expert in artificial intelligence and reports mentioned that he has also founded multiple start-ups and even created his own system similar to ChatGPT. He predicted consciousness could be uploaded onto a computer.

In a tweet on April 8, Desai wrote: "Start regularly recording your parents, elders and loved ones. With enough transcript data, new voice synthesis and video models, there is a 100% chance that they will live with you forever after leaving physical body. This should be even possible by end of the year."

"Sometimes when you see technology making it possible in your grief process and you think it is possible, you may go out of character and say something without a thinking seriously. Im not a ghoul not I have desire to make any product like this," he added.

What he said is not entirely new as several scientists have floated this idea before also. Last year, Artur Sychov, CEO and founder of Somnium Space, introduced a similar concept and decided to create a new feature called "Live Forever" mode after his father's death. Sychov had discussed how his platform may enable users to create an avatar version of themselves that will "live" forever online.

While speaking to Motherboard in 2022, Sychov said that he predicted the technology would be out in five years. However, the processing can be even faster with the recent advancements in the area of artificial intelligence.

Sychov had told Motherboard: "We can take this data and apply AI to it and recreate you as an avatar on your land parcel or inside your NFT world, and people will be able to come and talk to you".

"You will meet the person. And you would maybe for the first 10 minutes while talking to that person, you would not know that it's actually AI. That's the goal," he added.

Humans are doomed to die, but what if we can keep their life-like presence forever? Experts have divided views into all the claims and counterclaims that give a glimpse into the future of technology.

WATCH WION LIVE HERE

You can now write for wionews.com and be a part of the community. Share your stories and opinions with us here.

Read the original post:

Will humans be able to upload consciousness and sensibility onto computer? - WION

Read More..

French research institute Inria and Dutch CWI intensify their … – Centrum Wiskunde & Informatica (CWI)

Joint research and innovation agenda

CWI and Inria have already collaborated successfully over the past decades and have come to know each other as reliable research partners. Both institutes have an excellent scientific reputation. By strengthening their cooperation through a partnership agreement, both parties join forces to support their research on a European scale and thus achieve important scientific results.

This intensified collaboration will include a joint research and innovation agenda to strengthen networking, external partnership opportunities and funding. Scientific cooperation will be strengthened by creating joint projects as well as joint research teams, in areas like quantum computing, human interaction, energy, cryptography, digital health, machine learning and software engineering.

The more intensive cooperation of both institutes to create a powerful alliance within Europe, as expressed by President Macron during the state visit, fits in with a joint ambition of both institutes to to join forces to cope with major scientific and societal challenges.

Earlier today, Minister Sylvie Retailleau and Inria Chairman/CEO Bruno Sportisse visited CWI in the context of the state visit of President Macron to the Netherlands, where they received a presentation from Professor Peter Bosman about how mathematics and computer science can contribute to the treatment of cancer.

More here:

French research institute Inria and Dutch CWI intensify their ... - Centrum Wiskunde & Informatica (CWI)

Read More..

Auburn bolsters relations with German Technical Institute of Applied … – Auburn Engineering

Fostering the spirit of collaborative research and educational programs, Auburn University leadership hosted a delegation from the German Technical University of Applied Sciences at Wurzburg-Schweinfurt (THWS), March 26-31.

Strategic points of business included:

THWS President Robert Grebner said the universities fit well together.

We have an excellent opportunity to combine some of our best researchers, particularly in the areas of robotics and artificial intelligence, he said. Our work together can be very beneficial for medicine, industry and social science.

The delegation, comprised of student recruiters, professors and administrators, were given a comprehensive tour of Auburn Engineerings research laboratories, its various buildings/departments, including meetings with departmental leaders and faculty.

One year after developing the AI@AU initiative, Computer Science and Software Engineering (CSSE) Department Chair Hari Narayanan was eager to combine research efforts with THWS faculty. The department hosted Grebner and other members for an afternoon where the team was briefed about our departments educational and research programs, with a strategic focus on artificial intelligence and cybersecurity.

CSSE looks forward to working with THWS computer science faculty and AI center on student and faculty exchanges, joint research and educational programs, and joint supervision of graduate research in AI and cybersecurity, Narayanan said.

Whereas faculty research exchange was a hot topic, Chad Rose, assistant professor in mechanical engineering, has already worked with THWS Tobias Kaupp, professor in digital production and robotics, to bring two doctoral students, Fabian Schirmer and Philipp Kranz, to Auburn.

Sushil Bhavnani (professor in mechanical engineering) has been helping us navigate the process and has been providing some invaluable advice/perspective, said Rose. Fabian and Philipp are funded on a project from the Bavarian state to develop and validate algorithms for collaborative human-robot assembly/manufacturing tasks. During their six-month stint in Auburn, they'll be in my lab working on some experiments that will complement their activities in Germany and taking some Auburn classes.

For me, the project is fantastic because Tobias, Philipp, and Fabian are fantastic researchers from a close, but not exact match for the things I do in robotics, so we are both getting some crash courses in the other's areas of research.

Outside of research, other student exchange programs are available. Senior adviser Ed Lewis, whose roots run deep with the colleges Career Development and Corporate Relations program, explained why introducing Auburn students to studying abroad, where internships or co-ops are involved, is vital.

There are 90 German companies in Alabama, said Lewis. With THWS and President Grebner, we have a relationship that we can send students there for a semester and intern with a German company that has an office in the U.S. Once the students return to Auburn, they continue their education here and intern with that same company in the U.S.

We want our students to know they have an opportunity to maybe intern or co-op with one of these fine companies. Who knows? They might work for one of them, either in the United States or in Germany, after they graduate.

Dean Hendrix, associate professor in computer science and software engineering, and director of the global programs for the Samuel Ginn College of Engineering, said fostering relationships with universities worldwide elevates Auburns profile in the international community and opens doors for Auburn students and faculty.

Whether its student exchange programs, faculty exchange programs, graduate student recruiting, or joint research projects, there are opportunities that would not be possible unless we cultivate and develop these relationships, he said. Partnerships such as this are strategically important to our students, faculty, college and university.

Visit link:

Auburn bolsters relations with German Technical Institute of Applied ... - Auburn Engineering

Read More..

Cyber security: An insight into the business of keeping people safe – Euronews

Cyber security, surveillance and data storage are all sectors seeing spectacular growth. But in an increasingly tense and complex world - how secure should CEOs really feel?

Life in our internet-enabled, hyper-connected world can feel scary at times. In the last few years, we've seen a rise in geo-political tensions and reports of cyber hacks and attacks seem to occur with alarming regularity.

The job of staying safe now means much more than locking our doors at night, and for the bosses of the world's biggest companies - doing business securely has become more complicated than ever.

Throughout 2023, government privacy and protection regulations are predicted to reach more than 5 billion citizens.

Compliance with the latest data protection laws across different countries can require intricate and exhaustive planning.In fact, government regulations requiring firms to provide consumer privacy rights are estimated to cover more than 70% of global GDP.

Cyber Security expert and Managing Partner at SBS, Augusto Coriglioni,is on the front line of the fight to fend off digital threats.

Euronews asked him to describe what CEOs and their security teams are dealing with day to day.

"Generally speaking, cyber security is safe enough. Even if we are to say that cyberspace is limitless. Back to real life, [daily] life, we have to say there are thousands of attacks and accidents every day. Also, there are some others which are detected but are not reported by companies or authorities because they do not want to create panic or misinformation for their users," he explained.

"But it is also very important to understand there are some other kinds of attacks where they enter your system and stay silent for information,"Coriglioni added.

Governments also have a huge role to play in keeping us safe. Euronews spoke toAir Commodore Mark Biggadike, who was the UK Senior Representative for the FIFA World Cup 2022, andCaptain Talal Burshaidfrom the Qatari Emiri Air Force to find out how teamwork between different countries helped everyone stay safe during last year's FIFA World Cup in Qatar.

"Bringing in the other partner nations the United States, Italy, France, Turkey and Pakistan as a group we worked extremely well together. Qatar were very welcoming and open and I think that really helped in establishing a very effective security operation, keeping the event safe, secure and successful," saidAir Commodore Mark Biggadike.

"I think the military, particularly the royal air force has always had a close relationship with business and technology specifically. So, I see that only increasing as we get more complex technologies and we incorporate those into our assets. I think defence engagement is a growth area for us, we are very keen as [the] UK to work with our international allies and partners on these sorts of projects so I think its only going in one direction."

"Over many years we collaborated and worked with a number of global security partners to ensure we would be ready to host the World Cup and now it has successfully passed, all of the knowledge sharing that occurred and the experiences that were also shared will always be applied in future references in hosting any global events and any sporting events," explainedCaptain Talal Burshaid.

Its not only big businesses and governments that need to adapt to the challenges of cybersecurity. In the modern-day virtual world, members of the public also must take precautions in order to ensure they are safe whilst they surf the net.

Laurie Maclachlan from the multibillion-dollar tech company, Launch Darkly, told Euronews that even though people might be concerned, there is a huge amount of security protocol in place to combat these problems.

"I think they are quite right to be concerned, absolutely. But I think with the evolution of the cloud has come the introduction of a huge number of different safety checks and protocols adherence to data protection laws for example. They still have a choice. They certainly dont need to consume all of their services. Certainly, if 94% of all businesses are using the cloud, that tells you there is a huge amount of safety built into everything which is delivered by the cloud," LaurieMaclachlan explained.

The business of keeping us safe is booming. Decisions about our safety whether in the corporate boardroom or the cockpit of an aircraft are being made with millions of data simultaneously. It's this state of constant connection that creates the commercial opportunity - but with 5 billion people now protected by some kind of data regulation - scrutiny of those we trust to keep us safe has never been greater.

Pharmaceutical giant, Johnson & Johnson, is set to publish its first quarterly earnings of 2023. In the aftermath of the Covid-19 pandemic, pharmaceutical companies are seeking alternative methods of keeping revenue high with Johnson and Johnson pinning hopes on a new drug to treat the Dengue virus which if successful, could be ground-breaking in tackling the disease.

From Pharma Giants to Banking giants, JP Morgan is also set to unveil their first quarterly results of the year. The American banking behemoth will publish its results during a time of concern for the US banking system with the collapse of SVB.

And will it be refreshing news for Coca-Cola shareholders as they meet this week for their first annual conference of the year? The soft drink company is preparing to release their quarterly results after a strong finish to 2022. Their shareholders will be hoping that their stock market performance continues to sparkle.

See more here:
Cyber security: An insight into the business of keeping people safe - Euronews

Read More..

How can we Secure the Internet of Things (IoT)? – Security Boulevard

Strategies for Preventing Compromised Devices:An introduction, for security professionals, to IoT protection and the current smart device landscape.

The rapid expansion of the Internet of Things (IoT) has given rise to an increasingly interconnected world, permeating both consumer and enterprise landscapes. The inherent complexity of IoT ecosystems from smart security systems and kitchen devices to medical sensors and fire alarms has spawned a plethora of new vulnerabilities and attack vectors, placing the security of these devices at the forefront of cybersecurity concerns.

In this post, we will look at the current IoT security landscape, provide real-world examples of IoT breaches, and discuss strategies to mitigate risks, including visibility into device relations, lateral movement protection, microsegmentation, and Zero Trust.

To understand the magnitude of IoT security challenges, consider the following notable incidents:

To effectively address IoT security risks, it is crucial first to comprehend the challenges they pose:

Mitigating IoT security risks

A comprehensive approach to IoT security should encompass the following strategies:

An in-depth understanding of the relationships between IoT devices and their associated networks is crucial for effective security. To achieve this:

Relevant Link: NISTs Guidelines for Managing IoT Cybersecurity and Privacy Risks

Restricting lateral movement within a network can significantly reduce the potential impact of a compromised IoT device. To achieve this:

Relevant Link: Lateral Movement Protection Best Practices

Segmentation provides granular control over network traffic, enabling the enforcement of security policies at the device level. To implement microsegmentation:

Relevant Link: Microsegmentation Made Easy

Adopting a Zero Trust security model requires the verification of all applications, users and devices attempting to access resources, regardless of their location. To implement zero trust for IoT:

Relevant Link: Zero Trust and Your Organization: What It Will Take to Put Theory into Practice?

The ever-increasing reliance on IoT devices brings an expanding attack surface and the potential for significant security breaches. Security professionals can effectively safeguard their organizations from IoT-related threats by implementing comprehensive strategies that include visibility into device relations, lateral movement protection, microsegmentation, and zero trust. As the IoT landscape evolves, cybersecurity professionals must remain vigilant and adaptable, ensuring that security measures keep pace with technological advancements.

Working towards securing IoT

At TrueFort, we specialize in lateral movement protection and have formed strategic alliance with Armis, major asset visibility and security provider. This joint effort enhances our customers ability to discover, comprehend, and implement security policies across IT, Internet of Things (IoT), and operational technology (OT) settings.

The post How can we Secure the Internet of Things (IoT)? appeared first on TrueFort.

*** This is a Security Bloggers Network syndicated blog from TrueFort authored by Nik Hewitt. Read the original post at: https://truefort.com/securing-the-internet-of-things/

More here:
How can we Secure the Internet of Things (IoT)? - Security Boulevard

Read More..

Why IT leaders are putting more business spin on security spend – CIO

Gartner projects that spending oninformation security and risk managementproducts and services will grow 11.3% to reach more than $188.3 billion this year. But despite those expenditures, there have already been at least 13 major data breaches, including at Apple, Meta and Twitter.

To better focus security spend, some chief information security officers (CISOs) are shifting their risk assessments from IT systems to the data, applications, and processes that keep the business going.

If you look at security from a purely technical perspective, its easy to get lost in, `I need to have this shiny object because everyone else has it, says David Christensen, VP and CISO at benefits administration software provider PlanSource. The reality is often the most popular or well-known new security solution can waste money and slow the business, especially if it doesnt align with business goals. And even if it helps secure one part of the business, it may not be the part of the business or business process that creates the most risk or is most important.

Don Pecha, CISO at managed services provider FNTS, agrees, adding: Each business unit of the company might have unique considerations, and unique compliance, regulatory, or privacy applications, and each business may have unique risks for the board or C-suite to consider.

Frank Kim, CISO-in-residence at venture capital firm YL Ventures, and fellow at the SANS Institute, cites the case of one CISO who was fired after suggesting costly endpoint detection, and response and incident response programs considered not stage appropriate for such a startup. Their focus was on survival and revenue growth, Kim says. He didnt realize his job was not just to suggest a bunch of new security capabilities, but business enablement.

Aligning security with the business goes beyond traditional methods of justifying security spend, such as warning of consequences from hacks or trying to prove ROI. For internal enterprise security teams, Kim says to accept that security is a cost center and demonstrate how the CISO manages total cost of ownership over time. This might include updating CFOs and CEOs on specific cost reduction, such as reducing spend with a security vendor, finding a less expensive product to fill a security need, or improving internal metrics such as the average cost to mitigate a vulnerability, adds Tyson Kopczynski,SVP and CISO at financial services provider Oportun.

Christensen further suggests explaining how security can cut costs or increase productivity. For example, he says, web application firewalls dont only protect applications but cut networking costs by reducing spurious and malicious traffic. Also, adopting zero-trust architecture and secure access service edge technologies can help boost productivity by freeing users from manually deploying virtual private networks to access resources or interrupt meetings when their VPN fails.

Kopczynski adds that CISOs can uncover such improvements with questions such as whether their organization is using all the functions in a security tool, if those features overlap with other tools, and whether the organization is paying too much for licenses or for too many licenses. Ways to maximize value include considering tools that perform multiple security functions, or running penetration tests, attack simulations, or offensive security campaigns that prove a tool can repel high impact attacks, he says. For example, he uses the Titaniam encryption engine to support several data protection use cases, as well as security tools provided by cloud providers such as Amazon and Microsoft. We also look at generic cloud security solutions that provide multiple sets of protections, versus addressing one particular use case, he says.

At global marketing agency and consulting firm The Channel Company, security considerations are deeply embedded in business strategy and budgeting, says CIO Rik Wright. This ranges from the need to meet the European Unions GDPR to complying with security requirements from customers.

Averting threats is also part of the security value equation at the firm, which uses managed services provider GreenPages both for infrastructure and to help meet its security needs. Wright says hes seen some companies spend potentially business threatening amounts up to $20 million after a ransomware attack, so preventing such losses, he says, represents very real value.

Aligning security spend with business needs starts with understanding what is most important to business managers.

Kim recommends using a risk = impact x likelihood formula, and understanding on a scale of 1 to 10 what your most important processes and assets are. Your financial data might be a 10 but your HR data might be a seven as its not a business differentiator, he says. Just using a simple scoring rubric to your risk calculation helps to bubble up what the priorities are.

Besides business, Christensen says CISOs must also consult IT to understand the administrative burden a new security technology might impose, and all the areas in which a security tool could be used to maximize its value. He uses the Secure Web Gateway from dope.security to not only control access, but to understand what information and Web sites users are accessing, and the potential risks they expose the business to.

Industry standard frameworks can also provide a common language and structure for risk assessment, like the NIST (National Institute of Standards and Technology) cybersecurity framework. Its simple enough that its not necessary to be a security practitioner to understand it, but it models your maturity and helps to relate that to business stakeholders, says Christensen, adding its also based on industry standards rather than the CISOs opinions, and is continually updated to reflect new risks.

Different security frameworks are best for different industries, says Pecha. If Im in government, Im going to align with NIST, he says. If youre a global business, use the ISO/IEC27000 family of standards. Its not necessary to be certified, but be compliant and understand what the controls are in order to understand your partners security needs as well as your own.

Scott Reynolds, senior security and network engineering manager for manufacturer Johns Manville, uses the ISA/IEC 62443 standard to create a common understanding between business managers, security experts and suppliers about common terms such as the zones of assets that share common security needs. This process also shows we agree on the same level of risk for the entire zone, and not just each asset in the zone, he says. The weakest link in the zone will impact all the assets within it.

Over at media creation and editing technology provider Avid Technology, Dmitriy Sokolovskiy, its CISO and CSO, uses NISTs Cybersecurity Framework to measure the maturity of his security processes, and the Center for Internet Securitys top security controls for specific tactical guidance,which, he says, highlight, low-hanging fruit that businesses can easily address in their infrastructure.

Several CISOs were skeptical about using benchmarks to compare their security spend with others. Thats because, they say, companies may define security spend differently or have different needs. They also say benchmarks often dont describe how and why organizations allocate their security budgets. As a result, they use benchmarks as a rough guide to budgeting, relying primarily on their own risk assessments.

But Kim warns CISOs against refusing C-level requests for benchmarking. Its not unreasonable to ask for a benchmark, he says. A chief financial officer couldnt say, We cant compare our earnings-per-share with others in the industry. Provide benchmarks, he says, but as one part of a wider explanation of how your security spend compares with others, the challenges the organization faces, and how youre reducing the total cost of ownership of security over time.

CISOs should describe current threats and attacks, says Pecha, and supply alternatives to remediate them. Its then up to the board and the C-suite to decide whats acceptable and what needs to be done to manage the overall risk to the business, he says, because only they have the clout to drive change.

Insisting a business executive formally accept a business risk, even in writing, often convinces them to agree instead to the proposed security spend. When Sokolovskiy has insisted such signoff, Without fail, so far the business unit was actually driven to lower the risk themselves because they own it, he says.

A business-focused approach can also spur efforts by security and business teams to identify opportunities to increase efficiency and save money, says Christensen, such as by eliminating redundant systems and processes. With business alignment, you have no choice but to find unique and innovative ways to solve problems that are generated by how the business operates, he says.

Read more:
Why IT leaders are putting more business spin on security spend - CIO

Read More..

DirectDefense, Claroty Partner for Extended Internet of Things (XIoT … – MSSP Alert

by Dan Kobialka Apr 12, 2023

MSSP DirectDefense has added Claroty eXtended internet of things (XIoT) and cyber-physical security capabilities to its services offering, the companies said.

In doing so, DirectDefense customers can use the Claroty Platform to secure cyber-physical systems across their industrial, healthcare and commercial environments.

Jim Broome, DirectDefenses president and CTO, commented on the addition of the Claroty Platform to his companys services offering:

By adding Claroty to our services offering, customers in the industrial, healthcare and commercial industries can better secure their XIoT environments Time and time again we hear the challenges these industries face with the proliferation of connected devices and the difficulty managing and securing them.

The Claroty platform provides the required visibility and protection and with our 247 SOC managing those alerts in partnership with our Connected Systems team, customers will elevate their security posture and increase their cyber resiliency.

The Claroty Platform integrates with an organizations existing infrastructure to provide controls for visibility, risk and vulnerability management, threat detection and secure remote access, the company noted.

Key features of the Claroty Platform include:

The Claroty Platform drives cyber and operational resilience, said CJ Radford, Clarotys global vice president of channel and alliances. As such, DirectDefense customers can utilize the Claroty Platform to secure their XIoT assets and devices, respond to and recover from incidents and preserve operational continuity and safety across their XIoT environments.

The Claroty partnership comes after DirectDefense in February 2023 appointed Christopher Walcutt as its chief security officer. Walcutt is responsible for DirectDefenses security management, the company said. He previously served as DirectDefenses president of strategy.

DirectDefense offers managed security services, risk assessments and penetration testing to global organizations. Along with Claroty, DirectDefense has established partnerships with anti-ransomware platform provider Halcyon and other cybersecurity companies.

The company also offers a partner program that allows MSSPs, MSPs and other technology providers to deliver managed detection and response (MDR) and other security services.

Read more:
DirectDefense, Claroty Partner for Extended Internet of Things (XIoT ... - MSSP Alert

Read More..

Leonardo and Cisco partner up to develop joint technology projects – Leonardo

The MoU will boost cooperation between the two players in various areas, with the aim of co-developing solutions in specific technology fields such as quantum cryptography, the green transition and secure solutions for logistics and transportation markets

Leonardo, one of the worlds leading players in the Aerospace, Defence & Security sector, and Cisco Systems, a global leader in the networking and IT sectors, have signed a Memorandum of Understanding (MoU) with the aim of scaling up their mutual business relations and launching a structured collaboration in the civil and defense industry domains.

Within the framework of the MoU, activities will be carried out with the aid of dedicated working groups to periodically and jointly identify business opportunities and areas of technical cooperation that can meet market demands, particularly in the sectors of cyber security, secure networking, Internet-of-Things, the digital workplace and cloud edge computing.

Amongst other things, the agreement provides for the development of potential integrated solutions based on the two players specific and distinctive technological capabilities, with a view to proposing appropriate solutions for market needs. Detailed roadmaps will be drawn up for specific technology areas, such as quantum cryptography, the green transition and security solutions for logistics and transport, enabled using drones and advanced urban security systems.

The MoU also embraces the possibility of joint commercial offerings, via a process of analyzing existing products and solutions aimed at national and international markets, in order to broaden the business opportunities and the audience of potential customers for both players. Finally, under the agreement, Leonardo and Cisco commit to guaranteeing each other reciprocal commercial advantages on proposals previously identified by the two companies that will be finalized in a series of strategic programs.To optimize the joint activity governed by the MoU, a steering committee will be set up to monitor the progress of the partnership and evaluate the overall performance of the collaboration. In turn, the steering committee will set up specific working groups to concretely pursue the joint business opportunities that have been identified.

****

Leonardo, a global high-technology company, is among the top world players in Aerospace, Defense and Security and Italys main industrial company. Organized into five business divisions, Leonardo has a significant industrial presence in Italy, the United Kingdom, Poland and the USA, where it also operates through subsidiaries that include Leonardo DRS (defense electronics), and joint ventures and partnerships: ATR, MBDA, Telespazio, Thales Alenia Space and Avio. Leonardo competes in the most important international markets by leveraging its areas of technological and product leadership (Helicopters, Aircraft, Aerostructures, Electronics, Cyber & Security Solutions and Space). Listed on the Milan Stock Exchange (LDO), in 2021 Leonardo recorded consolidated revenues of 14.1 billion and invested 1.8 billion in Research and Development. The company has been part of the Dow Jones Sustainability Indices (DJSI) since 2010 and has been confirmed among the global sustainability leaders in 2022. Leonardo is also included in the MIB ESG index.

Cisco (NASDAQ: CSCO) is the worldwide leaderin technologythat powers the Internet. Cisco inspires new possibilities by reimagining your applications, securing your data, transforming your infrastructure, and empowering your teamsfor a global and inclusive future. Discover more onThe Networkand follow us on Twitter at@Cisco.Cisco and the Cisco logo are trademarks or registered trademarks of Cisco and/or its affiliates in the U.S. and other countries. A listing of Ciscos trademarks can be found at http://www.cisco.com/go/trademarks. Third-party trademarks mentioned are the property of their respective owners. The use of the word partner does not imply a partnership relationship between Cisco and any other company.

Press contacts:

Leonardo

Tel: +39 06 32473313

leonardopressoffice@leonardo.com

CISCO

Tel: + 39 02 91339811

pressit@external.cisco.com

Follow this link:
Leonardo and Cisco partner up to develop joint technology projects - Leonardo

Read More..

Wazuh launches version 4.4 with a suite of new capabilities – CSO Online

Open source security provider Wazuh has launched the latest version of its unified extended detection and response (XDR) and security information and event management (SIEM) platform with a suite of upgraded capabilities.

Wazuh 4.4 adds a string of new features to Wazuh agents and managers, which users deploy on endpoints and servers respectively. These features include support for IPv6 for agent-manager connections, search upgrade to OpenSearch v2.4.1, vulnerability detection for Suse Linux, updates to Linux software composition analysis (SCA) policies, and Azure integrations in Linux agents.

The 4.4 launch implies that all the packages and images for the version such as the AMI, OVA, and Docker images for the Wazuh central components, and the Windows, macOS, Linux, and other operating systems packages for the Wazuh agent are immediate and publicly available, said Santiago Bassett, CEO of Wazuh.

Amazon Machine Images, Open Virtualization Appliance, and Docker images are all pre-configured virtual machine images made available by AWS, VMware, and public docker registries to help users download and deploy across various virtualization platforms.

Wazuhs free and open source managed security platform can be accessed both as an on-premises as well as SaaS-based offering providing detection, incident response, and compliance management capabilities to its customers. The SaaS-based offering is called the Wazuh Cloud.

In order to keep up with the networking standards, Wazuh has updated its platform to add the latest internet protocol version 6 (IPv6) supportto allow agents to register and connect to managers through an Ipv6 address.

It means customers can leverage the benefits of the IPv6 protocol with better security and performance in the agent-server communication, Bassett said. Connecting through IPv4 is still possible, but now its users can opt to set IPv6 parameters for the connections.

Wazuh indexer and dashboard have been reworked to run the latest version of OpenSearch, Amazons open source search and analytics engine. Wazuh now integrates with OpenSearch 2.4.1 to provide a scalable and centralized solution for indexing and analyzing security events and logs collected by its endpoint agents.

Wazuh has also updated the SCA policies for Ubuntu Linux 20.04 and 22.04 because the existing version had some errors, the company said. As part of this task, it has used the Center for Internet Securityguidelines for Ubuntu Linux 22.04 LTS systems.

Previously, the SCA policy for Ubuntu 20.04 systems didnt work as expected. In particular cases, the Wazuh agent didnt report the actual system state correctly using the SCA policy file for this operating system. Wazuh would report some particular configuration test results as failed when they should have actually been reported as passed, Bassett added.

Wazuh 4.4 now supports vulnerability detection in the Suse Linux systems. This was previously available for select Linux systems and other operating systems including Windows, macOS, and FreeBSD.

The company has also added support for Azure integration on its Linux-based agents. This is done by modifying the package generation process to add Azure support on agents installed using Windows Packaging Project (WPK) packages, a distribution format for Windows applications.

Each new WPK package will contain all the updated binaries and source code, and the installer will update all files and binaries to support Azure integration.

Previously, users needed to set up the Azure integration in the Wazuh server but now its possible to configure the very Linux agents to set up the Azure integration, Bassett added.

See the article here:
Wazuh launches version 4.4 with a suite of new capabilities - CSO Online

Read More..