Page 2,173«..1020..2,1722,1732,1742,175..2,1802,190..»

WhatsApp gets ready to remind everyone why end-to-end encryption matters – iMore

Source: Harish Jonnalagadda / iMore

WhatsApp is readying an update that will remind people why end-to-end encryption is so important to them, according to a new report. A new screen will show what end-to-end encryption means and what benefits it offers.

The new WhatsApp screen is now being tested in beta form and was first spotted by beta watchers WABetaInfo. The page will appear when people tap another new addition the end-to-end encryption indicators that we reported on recently.

As you can see in this attached screenshot, a new security page shows up that gives some information about end-to-end encryption. The new page informs the user that text and voice messages, audio and video calls (including group calls), media, location sharing, and status updates are secured by end-to-end encryption, so your conversations are always private.

End-to-end encryption ensures that all communications are private, something that is vital to WhatsApp users and one of the reasons it's one of the best iPhone apps for private communications although there are plenty of WhatsApp alternatives available in the App Store.

This latest change is currently available to those on the WhatsApp TestFlight beta although it is surely only a matter of time before it is rolled out to everyone. WhatsApp continues to tweak its app via those beta releases before making the updates available via the App Store for all users. The Meta-owned instant messaging service is also testing a change that will add an ETA to file transfers, too.

View post:
WhatsApp gets ready to remind everyone why end-to-end encryption matters - iMore

Read More..

Whether The Technical Solutions Corresponding To The Refuted Patent Application Can Also Apply For Patent – Intellectual Property – China – Mondaq

A technical solution has been patented, but is refuted. Thetechnical solution is important to the applicant. With regard towhether the technical solution canbepatented again or not?There have recently been differentcustomers who present such questions.

It should be noted that, the applicant can start areexaminationprogram for incompliancewith the rejection determination, and can also complain aboutincompliance with the reexamination determination of the patent ofthe invention in the case that the reexamination program maintainsthe rejection determination. If the applicant does not use, or doesnot intend to use, the described rescue means, or the final officeafter using the described rescue means decides to be the backbackedpatent application, it is advised whether to apply for patent nolonger for the technical solution?

If the technical solution is greatly improved, a new solution isformed, which does not belong to the prior art, and the patentapplication may be considered. If the technical solutionessentially does not change, only the description manner ischanged, and the earlier application affects the novelty of thelater application, and the patent application is not advised.

If the technical solution itself is not greatly improved,however, since the original application text of the earlierapplication does not highlight the point of the invention which theapplicant wants to emphasize this time, the applicant wishes toapply for a patent again, and whether to apply for a patent againis advised; and if it is advised to apply for a patent, it isnecessary to pay attention to what kind of patent?

In recent years, the writer has encountered such a case. Thetechnical solution provided by the applicant relates to the fieldof communications, and relates to a method forencrypting/decrypting data by means of a network device without anIP address and a MAC address. The prior application is proxied byother agency. The independent method claims of the priorapplication are as follows:

intercepting a target data packet transmitted by a data packetsending device to a data packet receiving device;

Performing preset processing on the target data packet, andgenerating a processed data packet of which the data amount is lessthan the MTU amount of a communication network;

Transmitting the processed data packet to the data packetreceiving apparatus.

The applicant is of the opinion that the earlier applicationdoes not highlight that the encryption/decryption operation isrealized by a network device without IP address and MAC addresses,and wishes to apply for a patent again with regard to the technicalsolution. In this case, the applicant has the followingthought:

(1)Re-applying a patent for thistechnical solution?

Firstly, it is necessary to compare the technical solution withthe full text of the initial application documents of the earlierapplications, The earlier application only discloses processing adata packet as a data packet less than an MTU amount via anintermediate device, but does not disclose that a communicationintermediate device is a device without IP address and MACaddresses, also does not disclose respectively encrypting anddecrypting same by two encryption/decryption devices between a datapacket sending device and a receiving device, That is, the featuresof the encryption/decryption device in the technical solution andthe application scenario of the technical solution are notdisclosed.

Secondly, the present technical solution needs to be comparedwith the prior art closest to the earlier application (D1 providedby the examiner), Reference document D1 discloses that nodes A andB can actively send a test message, and the length of an MTU isset, However, a network device without the IP address and the MACaddress does not have the capability of actively sending a datapacket, and cannot control the length of the sent data packet incommunication, Accordingly, the characteristics of the node in D1are completely different from those of the network device in thepresent application.

Further, it is also required to search for whether there is acloser prior art after the earlier application, and by means of thesearch, if no closer prior art is found, it can be preliminarilyjudged that the present technical solution is novel.

By means of evaluation, the present technical solution, by meansof a method for performing encryption/decryption on a networkdevice without an IP address and a MAC address, not only can ensurethat the length of a data packet after an encryption/decryptionoperation does not change with the length of an original datapacket, but also can ensure the synchronization and security ofparameter data required for data encryption/decryption; preliminaryjudgement involves an inventive step; therefore, the presenttechnical solution is advised to make a patent applicationagain.

(2)With regard to the technical solution application, attentionneeds to be paid to something?

First of all, an application scenario of performingencryption/decryption by using a network device without an IPaddress and a MAC address is the largest inventive point, a set ofsystem claims can be laid out, and the system independent claimslaid out are as follows:

A first network device, configured to send to a second networkdevice to-be-processed data;

A first encryption and decryption device connected to the firstnetwork device and used for receiving the data to be processed,encrypting the data to be processed to obtain encrypted data havingthe same length as the data to be processed, and transmitting theencrypted data to the second network device via a network, whereinthe first encryption and decryption device is a network devicewithout an IP address and a MAC address;

A second encryption and decryption device, connected to thesecond network device, and configured to receive the encrypted datathrough the network, decrypt the encrypted data to obtain decrypteddata, and transmit the decrypted data to the second network device,wherein the second encryption and decryption device is a networkdevice having no IP address and MAC address;

a second network device, configured to receive the decrypteddata.

Secondly, the encryption method and the decryption method inthis application scenario are also inventive points, andcorresponding method claims may be respectively arranged from bothsides of the encryption end and the decryption end.

Further, the layout of dependent claims is in communication withthe inventor, the encryption algorithm in the present technicalsolution is the same as the encryption algorithm in the earlierapplication, the instructor guides the inventor to improve andextend the encryption algorithm, proposes an encryption algorithmdifferent from the earlier application, and is deployed independent claims.

Finally, the patent application corresponding to the technicalsolution is granted a patent.

In conclusion, a patent application corresponding to onetechnical solution is refuted, but the technical solution has agreat value to the applicant, and a patent attorney can beconsulted about whether the technical solution can perform a patentapplication again. With regard to a patent agent, on the onehand,the technical solution can be compared with the prior art atfirst (including, but not limited to, the technical solutiondisclosed in the earlier application and the reference document ofthe earlier application), Insofar as the technical solution differsgreatly from the prior art, the applicant can be advised to make apatent application again. On the other hand, the inventor can beguided to mine and extend the technical solution,and re-determiningthe technical problem and the necessary technical features forsolving the technical problem, and reasonably performing patentlayout, The patent application for this technical solution also hasthe opportunity to obtain patent rights.

The content of this article is intended to provide a generalguide to the subject matter. Specialist advice should be soughtabout your specific circumstances.

See more here:
Whether The Technical Solutions Corresponding To The Refuted Patent Application Can Also Apply For Patent - Intellectual Property - China - Mondaq

Read More..

Scrubbed offline forever? An internet security company wants to know – CBS News 8

Nord VPN surveyed a thousand people and more than half wished to be completely erased from the internet.

SAN DIEGO In its early days, the internet seemed harmless. It was a fun way to keep in touch through email, share photos on your personal blog, and watch the hottest videos before the term viral was a thing.

But now its 2022, and the internet is firmly apart of our lives.

Today, over 90% of all Americans go online and many couldnt imagine a world without it. Its how we work, get entertainment and most importantly, the internet is the way we connect with the world around us.

For people like me, whos been connecting and sharing things to the worldwide web since I was a teenager. Its safe to say its not hard to find an unflattering picture from those days.

"If it's on the internet, it's there forever," said David Nuti, the Senior Vice President in North America for Nord Security, a web-based company with Internet safety tools.

After surveying over a thousand people, Nord found that 55% of users would completely delete themselves from the internet if they could, 26% would want old dating and social media profiles deleted, and 23% would want previous employment history scrubbed.

"It's a promising sign," said Nuti. "Not from a viewpoint of paranoia, but that people are becoming more aware of having good hygiene when they're moving around the internet, and taking some caution on to where their personal information is,"

Once its on the web, its not coming off, but there are several things you can do to make sure photos, data, and personal information dont fall into the wrong hands.

Go through your social media and make sure youre comfortable with what others are seeing, pick a complex password to prevent your accounts from being hacked. And for more security, add a VPN to your browser. Its a way to hide all your web traffic from advertisers and hackers.

"There's no reason to be afraid of the internet," said Nuti. "Just pay attention to what you're doing and utilize the service that allows you to move around the internet safely and anonymously."

The internet has certainly evolved from what it once was, and our lives will continually be more connected by the worldwide web. Stories about trolls or other bad actors online are causing people to rethink how they navigate the web.

WATCH RELATED: Ukraine hit with Russian cyberattack during invasion, is the U.S. next? (February 2022)

Read the original here:
Scrubbed offline forever? An internet security company wants to know - CBS News 8

Read More..

First Malware Running on AWS Lambda Discovered The New Stack – thenewstack.io

Amazon Web Services (AWS) Lambda, serverless computings poster child, is over seven years old. So, perhaps whats amazing isnt that the first malware specifically targeting Lambda, Denonia is here, its that it took so long for one to arrive.

Oh well. It had to happen eventually.

Its important to note, though, that while Denonia runs on Lambda, its not a Lambda-specific program. Instead, its a Linux 64-bit ELF executable, which uses several third-party libraries, including one that enables it to run inside AWS Lambda environments.

According to Matt Muir, a security researcher with Cado Security, a cloud-security company, who discovered it, while the program has the filename python, its actually written in Go. This nasty bit of software contains a customized variant of the open source XMRig mining software.

Denonia, Muir said, is clearly designed to execute inside of Lambda environments we havent yet identified how it is deployed. It may simply be a matter of compromising AWS Access and Secret Keys then manually deploying into compromised Lambda environments, as weve seen before with more simple Python scripts.

It appears that this is how Denonia is spread. It cant spread itself. It requires an already compromised user account.

As AWS pointed out in a statement, Denonia does not exploit any weakness in Lambda or any other AWS service. It gets through AWSs doors by relying on fraudulently obtained account credentials. Therefore, AWS concludes, Denonia isnt really malware since it lacks the ability to gain unauthorized access to any system by itself.

Actually, while malware that spreads itself is far more dangerous than malware that doesnt, most security experts would agree that its still malware. Still, AWS asserts that Calling Denonia a Lambda-focused malware is a distortion of fact, as it doesnt use any vulnerability in the Lambda service. That last part is certainly true. But you still dont want it running on your Lambda services.

Denonia can also run outside of Lambda. It will run on generic 64-bit Linux, as well.

Another factor that makes Denonia dangerous is that instead of using DNS to contact its controller, it uses DNS over HTTPS (DoH). DoH encrypts DNS queries and sends the requests out as regular HTTPS traffic to DoH resolvers. For attackers, Muir comments it provides two advantages:

There have long been serious security concerns with DoH. As Paul Vixie, DNSs creator tweeted in 2018, RFC 8484 (The Request for Comment that defined DoH) is a cluster duck for internet security. Sorry to rain on your parade. The inmates have taken over the asylum.

Vixies far from the only one. The SANS Institute, one of the worlds largest cybersecurity training organizations, said that the unmitigated usage of encrypted DNS, particularly DNS over HTTPS, could allow attackers and insiders to bypass organizational controls. Denonias use of DoH underlines that theres a real danger in what has heretofore been theoretical concerns.

Still, while Lambda itself is safer than other compute environments, keep in mind that as Amazon warns under the AWS Shared Responsibility Model, AWS secures the underlying Lambda execution environment but it is up to the customer to secure functions themselves. In other words, if you open the door to a program like Denonia, its your security problem, not AWSs.

So, as always, be careful out there people! AWS has an excellent white paper on securing Lambda environments, youd be well advised to use its recommendations. Lambda may well be safer than most compute platforms, but, as ever, security is a process, not a product. You must do your part as well.

Continue reading here:
First Malware Running on AWS Lambda Discovered The New Stack - thenewstack.io

Read More..

Zen Internet partners with Kroll to enhance cybersecurity strategies for businesses across the UK – Help Net Security

Zen Internet announced a new strategic partnership with Kroll to enhance online protection for businesses across the UK.

Zen will offer Krolls flagship managed detection and response solution, Kroll Responder, and its penetration testing, attack simulation and protection services. Zens customers will benefit from Krolls front-line threat intelligence and experienced team of accredited analysts, threat hunters and incident response experts who handle more than 3,200 incidents every year.

With more robust and resilient cyber security in place, organizations cyber risk will be minimised and their ability to quickly identify and respond to threats in real-time will be improved, a critical capability given that digital communications and therefore the potential opportunities for attack are accelerating at pace.

Mark Nicholls, Chief Research Officer in Krolls Cyber Risk practice comments: With the UKs Information Commissioners Office only recently saying that weve entered a new era of security and our research finding that there was a 140 percent increase in data breach cases reported between 2019 and 2020, its clear that businesses in the UK need to invest in their protection against cyber attacks.

Were looking forward to working with Zen to bring our security solutions to more businesses in the UK market. It will allow organizations to not only improve their cyber resilience through better detection and response but also allow them to assess the effectiveness and maturity of these measures something which is essential in the current threat environment.

Dave Barber, Portfolio Management Director at Zen Internet, comments: With the number of cyberattacks rising sharply, businesses are feeling the pressure to ensure their security measures are up to scratch, whilst simultaneously accelerating their digital transformation journey post-covid. With the skills gap in the cybersecurity industry ongoing, businesses are increasingly outsourcing services to experts in the field who can provide a one-stop shop for holistic security solutions.

Our partnership with Kroll is fundamental in enhancing our clients cybersecurity strategies; it brings a comprehensive approach to cybersecurity and risk management, providing UK businesses with round the clock access to qualified analysts to support their digital transformation and protect their business.

Krolls Penetration Testing Services offer Zens clients cyber assessments of computer networks, systems, and applications to identify and address security weaknesses. The range of penetration testing engagements helps organizations to effectively manage cybersecurity risk by identifying, safely exploiting, and helping to remediate vulnerabilities that could otherwise lead to data and assets being compromised by malicious attackers. Given the scale of increasingly sophisticated breach attacks being encountered by businesses, this will enhance the overall cyber resilience of organizations.

A managed detection and response (MDR) solution, Kroll Responder merges frontline threat intelligence and incident response experience with proprietary forensic tools and rich telemetry from endpoints, network, cloud and SaaS providers. It delivers enhanced visibility to enable organizations to rapidly shut down cyber threats.

This new portfolio of security products is available now.

Continue reading here:
Zen Internet partners with Kroll to enhance cybersecurity strategies for businesses across the UK - Help Net Security

Read More..

New Windows 11 Security Requires Reinstallation Of The System – KHTS Radio

An upcoming Windows 11 s feature will require the re-installation of the system for all PC users that have already upgraded to Windows 11. The underlying factor that prompted the invention of Windows 11 is security. Windows 11 will bring in more security features in the future that will add even more security from chip to the secure cloud by merging current hardware plus software.

One unique security feature that is a significant improvement of the Windows 11 is the Smart App Control. The smart App Control is akin to a smart screen as they operate using similar techniques. It is embedded in Windows 11 Operating System to protect by sounding an alarm when you are about to download malicious software into your device, not aware of its safety status. Thus, every application that runs through Windows 11 is put through the Smart App Control to ascertain their potential harm or safety.

Novel computers with already installed Windows 11, the smart app control gets automatically installed. However, old devices with the previous form of Windows 11 must be reset and a new Windows 11 reinstalled to benefit from the Smart App Control.

Another critical security measure against the invasion of privacy is the WireGuard VPN. It is a remarkable internet security feature, with a quicker communication procedure than an open VPN. Also, WireGuard is an extremely simple yet fast and modern VPN that utilizes 15% less internet data. It ensures zero data leaks and protection from cyberattacks.

In addition to the Smart App Control and WireGuard VPN, Windows 11 has other very unique security features, which are as follows.

The number of features that will be on by default has increased, which is an improvement from windows10 security, which incorporated options for security features such as VBS. Businesses were forced to set them on operation physically.

However, with windows 11, the manually turned on features in Windows 10 will be automatically turned on, which explains the heightened CPU requirement. Making security features on by default makes security somewhat less optional for all PC users.

Some of the windows 11 security features that will be automatically turned on include Virtual Based Security (VBS), windows sandbox, Kernel Data Protection (KDP), secure boot, Trusted Platform Module (TPM) encryption, and Mode-based execution control.

Microsoft has advertised windows 11 as being a zero-trust set. That means that cybersecurity incidences are bound to reduce significantly, hence improving response time by cyber security professionals.

Also, zero trust ready implies windows 11 affords the ability to ascertain whether a device has security structures enabled or not. Hence, a device must show it is safe before access to data. Windows 11 affords zero trust security to both the hardware and software thanks to the Microsoft Azure Attestation (MAA). MAA can remotely sanction the honesty of hardware and software wanting to access delicate cloud resources.

Virtualization is a significant security feature that enables Windows 11 developers to try out application features from their computers prior to rollout to the public. VBS utilizes virtualization to layer up more protection to security aspects and protect them from malware infection.

Windows sandboxing provides PC users with a secure environment distinct from their PC for running applications. Everything within the sandbox gets erased once the PC user closes the application. This layer of protection ensures that any malware within an application does not find its way to the files plus other applications within the computer.

Microsoft has witnessed a significant uptake of the sandboxing security feature by personal users and is currently still accessing the balance between usability and security.

Windows 11 provides passwordless right of entry for your devices, using only the PIN, fingerprint, or facial recognition. Passwordless access is by default for consumers, whereas businesses will have the ability to set up simple passwordless models.

The passwordless access heightens security and diminishes operating expenditures for IT operators since the time for helping with password set-up reduces.

Windows 11 uses at least 8th generation intel CPU to enable default security elements it wants to include. The 8th generation devices support the default features and optimize performance such that users do not trade in usability for security.

Windows 11 certified devices are equipped with TPM 2.0 chips, which guard credentials plus credential keys to the back of the hardware. Such protection is not hackable.

Windows 11 promises heightened security in todays world, where hacking, phishing, and ransomware are rampant. However, if you are using a previously installed Windows 11 and want to take advantage of new Windows 11 features, you will have to reinstall your system to benefit.

See the original post:
New Windows 11 Security Requires Reinstallation Of The System - KHTS Radio

Read More..

The security conversation on connected medical devices is far from over – Digital Health

Our cyber security columnist, Davey Winder, explains why security conversations surrounding connected medical devices are not over yet.

Ive been warning about the Internet of Medical Things (IoT) from the threat-mapping perspective since I first started writing on cybersecurity for Digital Health six years ago.

A lot has changed since 2016 and, sadly, much has stayed the same. On the positive side of the connected-device security landscape fence sits the Product Security and Telecommunications Infrastructure (PSTI) Bill which, as of 23 March 2022, according to the parliamentary bills status site remains at the report stage. Assuming this passes into law before the end of the year, this would prohibit the use of factory set weak default passwords for IoT devices. Thats a really good move. Hop to the other side of the fence and you quickly learn that the PSTI Bill is consumer legislation and wont cover medical devices. OK, lets try and find some positives in that.

Is existing legislation enough?

At the end of last year, I interviewed David Rogers MBE for a Forbes article about the PSTI Bill. Rogers, as well as being CEO of IoT security outfit Copper Horse is also chair of the GSM Association (GSMA) Fraud and Security Group as well as sitting on the executive board of the Internet of Things Security Foundation. Most notably, however, he drafted a set of technical requirements that eventually became what is now the UK Code of Practice for Consumer IoT Security. In other words, hes an IoT security expert of the highest calibre. So, why was he not too concerned about medical devices not being included in the proposed legislation? Rogers spoke to the clear sectoral differences and already existing regulation, particularly in the medical sector, which cover safety aspects and go above and beyond where we are here, and it doesnt seem to make sense to land grab those spaces.

Indeed, the Medicines and Medical Devices Act 2021 was granted Royal Assent last year and built upon the Medical Devices Regulations 2002 to update the regulatory system for medical devices as and when required, according to the Department of Health and Social Care. Whether this actually does ensure an effective system for regulating medical devices remains to be seen. Im skeptical not least because while the Medicines and Healthcare products Regulatory Agency (MHRA) has oversight when it comes to the safety, quality and performance of medical devices, theres a world of difference between measuring clinical effectiveness and potential cybersecurity vulnerability. Im inclined to think that excluding these devices from the PSTI Bill is, actually, regrettable.

Research found 75% of medical IoT devices had known security gaps

As we all know how vulnerable medial IoT devices can be. If you want some examples of what happens when they are, look no further (although this particular research was US-based so it is admittedly a fair way) than a recent study by Unit 42 researchers with Palo Alto Networks of data from 200,000 healthcare network-connected medical infusion pumps that found:

As the NHS urges hospitals to reinforce cybersecurity amid the current international conflict, many in healthcare will remember the devastating effects of the WannaCry ransomware attacks, says Keiron Holyome, VP UK, Ireland, and Middle East, at BlackBerry.

Poorly protected endpoints are a major red flag when it comes to ransomware, a threat that most certainly has not gone away although efforts by NHS Digital and individual trusts have certainly reduced the risk.

To prevent attacks, healthcare organisations must ensure that every device is safe, reliable, secure and safety certifiable, Holyome continues, and that includes IoT-connected medical devices such as ventilators or robotic surgery arms. T

he problem there being, amongst others, that much of this medical device footprint will be legacy-based and cost-issues will prohibit replacement, and patching isnt even doable for many bits of IoT kit.

Are we shouting loudly enough?

This is a very complex conversation, theres no doubt about it, and one that NHS Digital is absolutely engaged in. The latest security guidance for healthcare providers when it comes to procuring and deploying connected medical devices (CMDs) includes legacy devices with inadequate support.

Top of the list of resources is the Data Security and Protection Toolkit (DSPT). At the end of last year this was updated to include a requirement for up-to-date records of such CMDs. While this doesnt solve the problem, there are no silver bullets, it does mean the conversation is being had loud and clear at trusts and providers who understand what DSPT compliance really means. Anything that helps focus attention on this particular piece of an overall security posture gets two thumbs up from me. Is it enough? No, no way.

Allow me to finish where I began, straddling that connected-device security landscape fence. The NHS Digital guidance makes it very clear that the guidance is more applicable to large devices and this represents a gap in the guidance currently available.

The kind of CMD referred to include low-cost and legacy ones where risk-reduction measures are not viable as well as those devices with inflexible supporting network architecture. I have the feeling that both the threats and the conversation will be continuing for some time to come.

Read the original post:
The security conversation on connected medical devices is far from over - Digital Health

Read More..

Australian cyber: What’s Redspice for? | The Interpreter – The Interpreter

Canberra is significantly boosting the cyber capabilities of the Australian Signals Directorate (ASD) the government agency responsible for signals intelligence, support to military operations, cyber warfare and information security. Project Redspice, announced in March, will increase ASDs budget by almost $10 billion over 10 years.

Unfortunately, ASDs 21-page Blueprint offers few insights into how the new money will be spent. In essence, we know only that the organisations staffing will almost double, its persistent cyber hunt activities will expand at the same rate, and its offensive cyber capability will grow even faster; tripling over the same period.

Hardly shy of criticising China, the government remains peculiarly leery of identifying Beijing as the source of constant cyber operations against Australia.

Prime Minister Scott Morrison has explained this move as necessary in order to be prepared for war: the first shot fired in any conflict that Australia might be involved in won't be in a metal casing, it'll be in bits and bytes. According to Defence Minister Peter Dutton, that was most recently demonstrated by offensive cyber activity against Ukraine.

Thats all true, but the cyber threat is more immediate and its coming from China. Hardly shy of criticising China, the government remains peculiarly leery of identifying Beijing as the source of constant cyber operations against Australia. Canberra joined allies to name China as the perpetrator of a Microsoft Exchange hack identified in January 2021, but still generally prefers euphemisms such as state-based actor (or allusions like Redspice).

Canberras focus on a future war is also misleading. Chinas aggressive actions in cyberspace are part of a growing competition short of war in what is often, if unhelpfully, described as the grey zone. Australias goal in this contest is not simply to win cyber battles by having superior offensive capabilities but to prevent cyberspace being transformed into a battlespace.

Australia wants an open and secure global internet in which states behave according to accepted rules. So Canberra must use its growing offensive cyber capability strategically to avoid undermining this greater goal.

Public messaging is an essential part of this strategic approach, not least because the opacity of cyberspace can foster misunderstanding. Clear communication is essential to both deter adversaries and reassure international partners.

There are, of course, limits on what the government can say about the activities its intelligence organisations perform. But in 2016, Australia was among the first countries to reveal its offensive cyber capability. In doing so, then Prime Minister Malcolm Turnbull said this would add a level of deterrence [and] adds to our credibility as we promote norms of good behaviour on the international stage.

ASDs leaders have since then slowly added to the picture. Theyve explained that offensive cyber (which doesnt include reconnaissance or espionage) encompasses anything from sabotage of critical infrastructure down to subtle manipulation of data. ASDs former Director-General Mike Burgess has emphasised that most of the agencys operations are low key: our targets may find their communications dont work at a critical moment rather than being destroyed completely. Burgess and his successor Rachel Noble have described ASDs operations against non-state actors (terrorists and criminals), but not other states.

Still, its clear that ASD is legally able to undertake offensive cyber activity against other states in situations short of war. ASD may conduct offensive cyber operations to disrupt criminal activity. Cybercrime is defined broadly enough to include other states cyber intrusions. ASD Director-General Rachel Noble last year underscored that we consider both state actors and serious and organised criminals to be undertaking criminal activity when going after Australian networks.

Canberra often emphasises that its offensive cyber operations accord with international and domestic law. The bigger question is whether Australia should use its offensive cyber capabilities against other states and, if so, how?

US public discussion of these issues has evolved faster than Australias in recent years. When Turnbull revealed Australias capability, President Barack Obama was still keeping tight control over US cyber operations. President Donald Trump reversed this approach in 2018, partly because that was his modus operandi and partly because cyber security agencies argued for a new approach.

Advocates argue that America can only counter its adversaries continual cyberattacks by operating in their networks.

President Joe Biden appears to have maintained the policy of defend forward, articulated in Trumps2018 Department of Defense Cyber Strategy. Washingtons current approach to competition in cyberspace is described as persistent engagement by Paul Nakasone, the dual-hatted head of the National Security Agency (NSA) and Cyber Command (both of which are ASDs close American counterparts.)

Still, the US debate about persistent engagement continues. Advocates argue that America can only counter its adversaries continual cyberattacks by operating in their networks. Opponents maintain that the risks of unintended consequences and escalation are too great. But most of them would acknowledge that those risks are at least mitigated by Washingtons relatively transparent discussion of cyber strategy.

Australias offensive cyber capability is now growing faster than its public discussion about why these tools are needed and how they should be used. Because Australian cyber competition with China will almost inevitably intensify, so too will the need to publicly air the complex questions of strategy and values that this raises. At minimum, Canberra should say whether ASD has also adopted persistent engagement.

Read more:
Australian cyber: What's Redspice for? | The Interpreter - The Interpreter

Read More..

Healthcare Internet of Things Security Market Scope and overview, To Develop with Increased Global Emphasis on Industrialization 2029 | Cisco Systems…

California (United States), April 13 The Healthcare Internet of Things Security Market Research Report is a professional asset that provides dynamic and statistical insights into regional and global markets. It includes a comprehensive study of the current scenario to safeguard the trends and prospects of the market. Healthcare Internet of Things Security Research reports also track future technologies and developments. Thorough information on new products, and regional and market investments is provided in the report. This Healthcare Internet of Things Security research report also scrutinizes all the elements businesses need to get unbiased data to help them understand the threats and challenges ahead of their business. The Service industry report further includes market shortcomings, stability, growth drivers, restraining factors, and opportunities over the forecast period.

Get Sample Report with Table and Graphs:

https://www.a2zmarketresearch.com/sample-request/551752

Healthcare Internet of Things Security is growing at a goodCAGR over the forecast period. Increasing individual interest in Service industry is a major reason for the expansion of this market.

Top Companies in this report are:

Cisco Systems Inc., Oracle Corporation, Intel Corporation, Trend Micro Inc., Kaspersky Lab, Deutsche Telekom AG, Dell Corporation, Inside Secure SA, Agile Cyber Security Solutions, LLC., Symantec Corporation.

Report overview:

* The report analyses regional growth trends and future opportunities.

* Detailed analysis of each segment provides relevant information.

* The data collected in the report is investigated and verified by analysts.

* This report provides realistic information on supply, demand and future forecasts.

Healthcare Internet of Things Security Market Overview:

This systematic research study provides an inside-out assessment of the Healthcare Internet of Things Security market while proposing significant fragments of knowledge, chronic insights and industry-approved and measurably maintained Service market conjectures. Furthermore, a controlled and formal collection of assumptions and strategies was used to construct this in-depth examination.

During the development of this Healthcare Internet of Things Security research report, the driving factors of the market are investigated. It also provides information on market constraints to help clients build successful businesses. The report also addresses key opportunities.

Get Special Discount:

https://www.a2zmarketresearch.com/discount/551752

This report provides an in-depth and broad understanding of Healthcare Internet of Things Security. With accurate data covering all the key features of the current market, the report offers extensive data from key players. An audit of the state of the market is mentioned as accurate historical data for each segment is available during the forecast period. Driving forces, restraints, and opportunities are provided to help provide an improved picture of this market investment during the forecast period 2022-2029.

Some essential purposes of the Healthcare Internet of Things Security market research report:

oVital Developments: Custom investigation provides the critical improvements of the Healthcare Internet of Things Security market, including R&D, new item shipment, coordinated efforts, development rate, partnerships, joint efforts, and local development of rivals working in the market on a global scale and regional.

oMarket Characteristics:The report contains Healthcare Internet of Things Security market highlights, income, limit, limit utilization rate, value, net, creation rate, generation, utilization, import, trade, supply, demand, cost, part of the industry in general, CAGR and gross margin. Likewise, the market report offers an exhaustive investigation of the elements and their most recent patterns, along with Service market fragments and subsections.

oInvestigative Tools:This market report incorporates the accurately considered and evaluated information of the major established players and their extension into the Healthcare Internet of Things Security market by methods. Systematic tools and methodologies, for example, Porters Five Powers Investigation, Possibilities Study, and numerous other statistical investigation methods have been used to analyze the development of the key players working in the Healthcare Internet of Things Security market.

oConvincingly, the Healthcare Internet of Things Security report will give you an unmistakable perspective on every single market reality without the need to allude to some other research report or source of information. This report will provide all of you with the realities about the past, present, and eventual fate of the Service market.

Buy Exclusive Report: https://www.a2zmarketresearch.com/checkout

Contact Us:

Roger Smith

1887 WHITNEY MESA DR HENDERSON, NV 89014

sales@a2zmarketresearch.com

+1 775 237 4147

Read the original post:
Healthcare Internet of Things Security Market Scope and overview, To Develop with Increased Global Emphasis on Industrialization 2029 | Cisco Systems...

Read More..

Why legal intervention is the way forward for safe digital public infrastructure – Hindustan Times

India ranks third in global data breaches in 2021, a 356% increase from the previous year. Since we do not currently have a national data protection or data privacy law, such cybersecurity failures pose massive threats of financial fraud and identity thefts on citizens. There needs to be a better mechanism that incentivises organisations that are collecting and storing citizen data to maintain stronger internet security measures.

Neither the proposed Data Protection Bill nor the amendment to the Information Technology Act, speaks about the responsibility of cybersecurity compromises. The Data Protection Bill mandates that companies need to report breaches within 72 hours of the occurrence, but there is no requirement for companies to secure citizen data. India had also introduced the National Cybersecurity Policy in 2013 which suggested several broad strategies including the provision of fiscal schemes and incentives to encourage entities to install, strengthen and upgrade information infrastructure for cybersecurity. As the government changed in 2014, not much has been done to implement the policy or to extend it to legal accountability and enforcement.

Indias e-commerce sector has witnessed tremendous growth in recent years. It is expected to grow to $188 billion by 2025. The Fintech market in the country is estimated to be the third-largest in the world. India is also the worlds second-largest telecommunication market.

This rapid and accelerated digitisation over the past few years has meant personal data collection at an equally rapid, yet unregulated, pace. The data collected online ranges from basic information (such as name, address, age, gender and phone number) to sensitive details (such as bank account numbers, credit/debit card numbers, government ID numbers, and so on). Added to this information that is directly collected and stored, there is metadata that can reveal deeper insights about customers (such as personality types, spending patterns, personal interests, political inclinations, food preferences, schedules, physical and mental health). However, other than the informal trust that the customer puts into these companies, there is no legal or policy promise requiring these companies to ensure customer data is safe, secure, and only used for purposes informed to the customer.

For a solution, we can look to banking regulation. There, policies of zero liability and limited liability for cards and online financial frauds made the banks responsible for unauthorised financial transactions. Similarly, we need to push accountability for data security on all companies collecting and storing citizen data.

The need for economic growth, and hopes for foreign investments, should not deter us from enforcing internet security. All companies, public and private, should be required to report to the government the measures taken by them to ensure data security and information regarding potential threats and targets. There needs to be a channel to facilitate information exchange between companies facing similar threats. For companies that fail to show serious efforts for internet security or lack compliance with standards set by the government, customers should be actively notified of the risks while sharing their data with them. The required standards of internet security measures can also vary basis the sensitivity of the data being collected.

This added accountability is often seen as an additional cost, especially for small and medium enterprises. But this can also be an opportunity where the government guides and assists SMEs to choose cloud services wisely, safeguard their websites and portals, and ensure that they are protected from ransomware attackers as well as other threats over the internet.

Over the last decade, many countries have established agencies to focus on cybersecurity and a safe national digital infrastructure: Singapore, the United States, and Israel are examples. India does have the National Cyber Coordination Centre, but this agency is an internet scanning agency for real-time assessments of cyber threats and report generation. It lacks real-time partnerships with domestic and international private and government agencies. It also does not act as a mentor on matters of cybersecurity or enforce guidelines around data protection and overreach. Without proactive measures, partnership with private enterprises, collaborative efforts and legal accountability, effective execution and results may prove difficult.

Government guidance and support are not interchangeable with government surveillance or government overreach. The Indian government needs to put in place standards to protect citizen privacy and digital security, from all domestic and international malicious players online, and itself.

Data is the new oil, the new weapon of war, and the new gold. 54% of Indias 1.2 billion population is estimated to have access to the internet. A large push to Indias growth has been from its accelerated development and adoption of digital public infrastructure and digital public goods. Internet security has been an elephant in the room and it's time it is seen as urgent and crucial for continued growth propelled by digitisation, internet penetration, and innovation.

Avni Sinha is at the Harvard Kennedy School of Government

The views expressed are personal

More:
Why legal intervention is the way forward for safe digital public infrastructure - Hindustan Times

Read More..