Page 3,529«..1020..3,5283,5293,5303,531..3,5403,550..»

Frost & Sullivan Report Finds BlackBerry Solutions Address 96% of the Enterprise Threat Landscape – PRNewswire

WATERLOO, ON, June 23, 2020 /PRNewswire/ --BlackBerry Limited (NYSE: BB; TSX: BB) today announced findings from an independent Frost & Sullivan report which concludes that BlackBerry can secure all IoT endpoints, and upwards of 96% of all cyberthreats.

The report reviews the cyberthreat landscape and the proportion of risks that BlackBerry's suite of solutions protect enterprises against. After quantifying the overall market in terms of number of attacks and categorizing those attacks as more preventable by either network- or endpoint-based security, Frost & Sullivan determined that comprehensive endpoint-based security tools from BlackBerry protect against upwards of 96% of attacks, noting that the percentage is likely to increase because of the growing proliferation and importance of Internet of Things (IoT) devices.

"With the pace of technological innovation, enterprise endpoints and the amount of data shared at the edge growing exponentially, and expanding device interconnectivity creating vulnerabilities at a rate few organizations can handle, today's business environment is widespread with cyber chaos," said John Chen, Executive Chairman and CEO of BlackBerry. "Cyberattacks are a serious threat to everything from our personal data and privacy to an enterprise's intellectual property and a nation's critical infrastructure. To be recognized by Frost & Sullivan further validates our strategy to connect, secure, and manage every endpoint in the Internet of Things. And, with BlackBerry Spark, businesses now have a comprehensive AI-powered Zero-Trust platform whose continuous authentication mechanisms provide ongoing validation and security confidence to manage these environments."

In addition to the overall enterprise need, Frost & Sullivan assessed the potential for BlackBerry to address business security by major industry or application see here. The report found BlackBerry provides broad coverage for any industry that relies on endpoints, noting that industries with a higher proportion of new endpoints and devices, such as connected cars, would be fully within BlackBerry's capabilities.

"For enterprises, we predict global cyber-crime related costs to hit $5 trillion (USD) in 2020 and the number of new connected devices to rise to 67 billion devices by 2025, an increase of 167% from 2019. Indeed, the swift pace of technological innovation, combined with companies and individuals' ever-increasing demand for mobility, means that the attack surface area will expand by an overwhelming amount," said Roberta Gamble, Partner and Vice President, Frost & Sullivan. "For almost any organization, the question will no longer be if it will face a cyberattackbut rather, when. It is an imperative that all businesses ensure that endpoint security is the foundation of their strategy. Partnering with a solution provider like BlackBerry that has the technologies to comprehensively secure an enterprise's data and communication is the most effective way to ensure security, resilience, and uninterrupted business continuity."

To download a full copy of the report and summary brief, visit http://www.BlackBerry.com/iot-threat-landscape.

About BlackBerryBlackBerry (NYSE: BB; TSX: BB) provides intelligent security software and services to enterprises and governments around the world.The company secures more than 500M endpoints including over 175M cars on the road today.Based in Waterloo, Ontario, the company leverages AI and machine learning to deliver innovative solutions in the areas of cybersecurity, safety and data privacy solutions, and is a leader in the areas of endpoint security management, encryption, and embedded systems. BlackBerry's vision is clear - to secure a connected future you can trust.

BlackBerry. Intelligent Security. Everywhere.

For more information, visit BlackBerry.com and follow @BlackBerry.

Trademarks, including but not limited to BLACKBERRY and EMBLEM Design are the trademarks or registered trademarks of BlackBerry Limited, and the exclusive rights to such trademarks are expressly reserved. All other trademarks are the property of their respective owners. BlackBerry is not responsible for any third-party products or services.

About Frost & Sullivan

For over five decades, Frost & Sullivan has become world-renowned for its role in helping investors, corporate leaders and governments navigate economic changes and identify disruptive technologies, Mega Trends, new business models and companies to action, resulting in a continuous flow of growth opportunities to drive future success. Contact us: Start the discussion.

Media Contact:BlackBerry Media Relations+1 (519) 597-7273[emailprotected]

SOURCE BlackBerry Limited

https://www.blackberry.com

Read the original post:
Frost & Sullivan Report Finds BlackBerry Solutions Address 96% of the Enterprise Threat Landscape - PRNewswire

Read More..

OPAQ Webinar to Share Lessons Learned and Best Practices from Zero Trust Migration Project with TTX Company – Business Wire

HERNDON, Va.--(BUSINESS WIRE)--OPAQ, the SASE network company, announced today that Stephan Hundley, AVP Digital Risk, Governance and Chief Information Security Officer for TTX Company and OPAQ CTO Tom Cross will co-present an educational webinar on deploying Zero Trust security using a secure access service edge or SASE architecture. The presentation will discuss the lessons learned and best practices from the TTX enterprise migration project to a Zero Trust model using the OPAQ platform.

WHO:

Tom Cross, CTO of OPAQ is a recognized expert in cyber security, cyber conflict, malware and vulnerability research. Previously, he co-founded and was CTO of Drawbridge Networks, a pioneer of network microsegmentation technology. Tom also served as Director of Security Research at Lancope and was Manager of IBM Internet Security Systems X-Force Advanced Research team.

Stephan Hundley, AVP Digital Risk, Governance and Chief Information Security Officer for TTX Company is responsible for optimizing risk and resources while adding measurable and strategic value to core business processes, and contributing to the recognition of TTX as a rail industry leader. He is also currently serving as the FBI Infragard Transportation Sector Chief for the Chicago IMA. Stephan has more than 20 years of IT and Security experience in the financial services, telecommunications, and freight rail industries.

WHAT:

TTX Company provides freight cars and freight car management to the rail industry, and as such plays an integral role in the supply chain of virtually every industry. In this webinar Stephan and Tom will discuss how TTX partnered with OPAQ to implement zero trust security on an enterprise scale by deploying a SASE architecture that combines comprehensive WAN capabilities with network security functions including Firewall as a Service (FWaaS), Endpoint Protection as a Service (EPPaaS) and Web Application Firewall as a Service (WAFaaS). They will explain how the project enabled TTX to seamlessly transition overnight to a 100% work from home model in response to COVID-19, without any impact on operations and service delivery. The webinar will also cover how:

WHEN:

Thursday, June 25th at 2pm ET.

WHERE:

Delivered to your device with confirmed registration.

HOW:

To register, visit https://bit.ly/3hy0Vok. To schedule a conversation with Tom Cross contact Marc Gendron at marc@mgpr.net or +1 781.237.0341.

About OPAQ

OPAQ is the premier networking and security cloud company. The OPAQ cloud is a Secure Access Service Edge (SASE) platform that protects an organizations entire distributed network data centers, branch offices, remote users, and IoT devices across all ports and protocols. OPAQ delivers zero trust security-as-a-service using an infrastructure optimized for security and hyperscale performance. With OPAQ, organizations can implement and enforce consistent zero trust security policies, centrally monitor network and security performance, generate reports, and manage security infrastructure all through a single cloud console. This enables customers to maintain secure access to systems and data no matter how the network evolves. To learn more, visit http://www.opaq.com.

Read the original:
OPAQ Webinar to Share Lessons Learned and Best Practices from Zero Trust Migration Project with TTX Company - Business Wire

Read More..

Global IT Security Spending Market Projected to Reach USD XX.XX billion by 2025- Check Point Software Technologies, Cisco Systems, EMC, Fortinet,…

This well versed report is thoughtfully crafted to arm report readers with convincing market insights on the mettle of all aforementioned factors that propel relentless growth despite significant bottlenecks in the IT Security Spending Market.

This recent research compilation on the IT Security Spending market presents a deep analytical review and a concise presentation of ongoing market trends that collectively inculcate a strong influence on the growth trajectory of the aforementioned IT Security Spending market.

This study covers following key players:Check Point Software TechnologiesCisco SystemsEMCFortinetJuniper NetworksMcAfeePalo Alto NetworksSymantecTrend MicroAkamai TechnologiesAvast SoftwareAVG TechnologiesBarracuda NetworksCitrix SystemsDell SonicWALLF5 NetworksHewlett-PackardIBMImpervaMicrosoftPanda SecurityRadwareSophosTrustwave Holdings

Request a sample of this report @ https://www.orbismarketreports.com/sample-request/80103?utm_source=Pooja

This illustrative research report on the IT Security Spending market is an all-in-one, ready to use handbook of market dynamics that upon mindful inference lends valuable insights on market developments, growth trajectory, dominant trends as well as technological sophistication as well as segment expansion and competition spectrum that have a strong bearing on the growth probabilities of the IT Security Spending market. The report is so designed as to direct concrete headways in identifying and deciphering each of the market dimensions to evaluate logical derivatives which have the potential to set the growth course in the aforementioned IT Security Spending market.

This high-end research comprehension on the IT Security Spending market renders major impetus on detailed growth facets, in terms of product section, payment and transaction platforms, further incorporating service portfolio, applications, as well as a specific compilation on technological interventions that facilitate ideal growth potential of the market.

Access Complete Report @ https://www.orbismarketreports.com/global-it-security-spending-market-growth-analysis-by-trends-and-forecast-2019-2025?utm_source=Pooja

Market segment by Type, the product can be split into Internet securityEndpoint securityWireless securityNetwork securityCloud security

Market segment by Application, split into CommercialIndustrialMilitary and Denfense

Besides presenting notable insights on market factors comprising above determinants, this specific, innately crafted research report offering further in its subsequent sections states information on regional segmentation, as well as thoughtful perspectives on specific understanding comprising region-specific developments as well as leading market players objectives to trigger maximum revenue generation and profits. This particular section of the IT Security Spending market report specifically stresses upon various indigenous tactical discretion that eventually contributed towards soliciting heralding market consolidation, impeccable stability and sustainable revenue pools, the ultimate touchstone to judge the potency of the IT Security Spending market.

The report further unveils pertinent details about segment contribution in coining ample revenue flow, sustainability and long term growth in global IT Security Spending market. A thorough knowledge base of market facets remains integral and indispensable to decode IT Security Spending market prognosis.

Some Major TOC Points:1 Report Overview2 Global Growth Trends3 Market Share by Key Players4 Breakdown Data by Type and ApplicationContinued

In addition to all of the above stated inputs, discussed at length in the report, the report sheds tangible light on dynamic segmentation based on which the market has been systematically split into prominent segments inclusive of type, end use technology, as well as region specific diversification of the IT Security Spending market to encourage highly remunerative business discretion. The report sheds light on the particular segment that sets revenue maximization, rolling, thus incurring steady growth in revenues and contributing towards steady sustenance of the IT Security Spending market.

For Enquiry before buying report @ https://www.orbismarketreports.com/enquiry-before-buying/80103?utm_source=Pooja

About Us : With unfailing market gauging skills, has been excelling in curating tailored business intelligence data across industry verticals. Constantly thriving to expand our skill development, our strength lies in dedicated intellectuals with dynamic problem solving intent, ever willing to mold boundaries to scale heights in market interpretation.

Contact Us : Hector CostelloSenior Manager Client Engagements4144N Central Expressway,Suite 600, Dallas,Texas 75204, U.S.A.Phone No.: USA: +1 (972)-362-8199 | IND: +91 895 659 5155

View original post here:
Global IT Security Spending Market Projected to Reach USD XX.XX billion by 2025- Check Point Software Technologies, Cisco Systems, EMC, Fortinet,...

Read More..

Global Internet of Things (IoT) Security Technology Market 2020 Analysis, Types, Applications, Forecast and COVID-19 Impact Analysis 2025 – NJ MMA…

Global Internet of Things (IoT) Security Technology Market 2020 by Company, Regions, Type and Application, Forecast to 2025 offers knowledgeable information on the market strategy, market orientation, and expert opinion. The report provides the tactical analysis of the market share, growth factors, demand, industry size, regional segmentation, dynamics as well as prices variant for its forecast year from 2020 to 2025. The report delivers a brief overview of the global Internet of Things (IoT) Security Technology market focusing on product specifications, manufacturing processes, cost structures, market segmentation, and end-user applications. The research study covers industry trends and recent developments in the market. It showcases potential, most recent patterns, and the difficulties and challenges that the market is facing.

Competitive Structure:

Competitive and company share analysis has been given in the report. The study focuses on the presence of several major and leading vendors in the Internet of Things (IoT) Security Technology market. The key players are included in the report with analysis with coverage of price, revenue, cost, company profile, contact credentials, and among others. The report also gives future demand, the quantity of production, required raw material, and the health of the organization. Important strategies such as acquisitions, mergers, and R&D collaborations are highlighted to help major players expand their distribution channels and develop products competitive pricing.

DOWNLOAD FREE SAMPLE REPORT: https://www.researchstore.biz/sample-request/33602

NOTE: This report takes into account the current and future impacts of COVID-19 on this industry and offers you an in-dept analysis of Internet of Things (IoT) Security Technology market.

Some are the key players taken under coverage for this study are: Cisco , HP Enterprise Company , Intel , IBM , Symantec Corporation , Infineon , Trend micro , Allot , Gemalto , AT&T Inc

The regional category includes major regions such as North America (United States, Canada and Mexico), Europe (Germany, France, United Kingdom, Russia and Italy), Asia-Pacific (China, Japan, Korea, India, Southeast Asia and Australia), South America (Brazil, Argentina), Middle East& Africa (Saudi Arabia, UAE, Egypt and South Africa).

Market segment by product types considering production, revenue (value), price trends: Network, Endpoint, Application, Cloud, Others

Market segment by applications considering consumption growth rate and market share: Smart Manufacturing, Connected Logistics, Smart Home and Consumer Electronics, Connected Healthcare, Smart Transportation, Smart Retail, Others

Moreover, the report set up beneficial Internet of Things (IoT) Security Technology counter approaches to deliver competitive benefits. The report addresses the needs of the customers in terms of data availability, analytics, statistical analysis, and accurate forecast of the industry. The report investigates potential and niche segments/regions exhibiting promising growth and information for market players to sustain and enhance their footprint in the industry. The researchers behind this research study have exposed some of the significant trends of marketing channel development, indirect marketing, and direct marketing.

ACCESS FULL REPORT: https://www.researchstore.biz/report/global-internet-of-things-iot-security-technology-market-33602

Crucial Aspects of Internet of Things (IoT) Security Technology Market Report:

Various analytical tools are employed to present SWOT analysis, a feasibility check, investment return study, and growth trend of Internet of Things (IoT) Security Technology players. An outlook market perspective states various growth driving and restraining factors. Based on historic and present data the market growth is presented in this report. Various company segments like applications, regions, manufacturers, and product types are covered. The competitive scenario analyzed in this report will help other players in studying the development scope and opportunities with market potential.

Customization of the Report:This report can be customized to meet the clients requirements. Please connect with our sales team (sales@researchstore.biz), who will ensure that you get a report that suits your needs. You can also get in touch with our executives on +1-201-465-4211 to share your research requirements.

About Us

Researchstore.biz is a fully dedicated global market research agency providing thorough quantitative and qualitative analysis of extensive market research.Our corporate is identified by recognition and enthusiasm for what it offers, which unites its staff across the world.We are desired market researchers proving a reliable source of extensive market analysis on which readers can rely on. Our research team consist of some of the best market researchers, sector and analysis executives in the nation, because of which Researchstore.biz is considered as one of the most vigorous market research enterprises. Researchstore.biz finds perfect solutions according to the requirements of research with considerations of content and methods. Unique and out of the box technologies, techniques and solutions are implemented all through the research reports.

Contact UsMark StoneHead of Business DevelopmentPhone: +1-201-465-4211Email: sales@researchstore.bizWeb: http://www.researchstore.biz

See the rest here:
Global Internet of Things (IoT) Security Technology Market 2020 Analysis, Types, Applications, Forecast and COVID-19 Impact Analysis 2025 - NJ MMA...

Read More..

NetNumber Expands Industry Recognized Signaling Firewall to Protect SIP Connections – GlobeNewswire

NetNumber Chief Revenue Officer Matt Rosenberg

Lowell, MA, June 24, 2020 (GLOBE NEWSWIRE) -- NetNumber today announced comprehensive SIP security enhancements to its award-winning multi-protocol signaling firewall. This follows growing concerns about the protection of SIP connections and expected growth of SIP traffic by 25% over the next several years.

NetNumber introduced the industrys first signaling firewall on its carrier-grade TITAN Platform in 2015 to protect SS7 connections. Soon thereafter, the Diameter Firewall was introduced as an integrated product on TITAN. The NetNumber multi-protocol Signaling Firewall has been recognized for excellence several times including recently by the 2020 Cybersecurity Excellence Awards in the SDN / NFV Security category and the Network Transformation Award for Best Network Security Solution at the 2019 SDN NFV World Congress. The extension of the NetNumber SIP Signaling Firewall provides now an industry unique intergenerational (2G-3G-4G-5G) signaling security solution for all operators.

NetNumber has been at the forefront of developing signaling security solutions that enable telecom operators to protect the data of their customers,explained Matt Rosenberg, chief revenue officer, NetNumber. Given our participation in the GSMA working groups,we take very seriously the trust our customers have placed in us.As threats have become increasingly sophisticated, the costs to operators in terms of revenue, impact to reputation, and possible fines have also increased. In 2015, signaling firewalls were considered innovative and today they have become an essential asset of an operators overall security strategy. We continue to innovate security and fraud solutions that enable operators to swiftly and efficiently respond to the changing threat landscape.

The security of the telecom operators signaling network is constantly on the lookout for new risks that may appear, including a new wave of vulnerabilities with mobile roaming via SS7/Diameter and security and fraud issues using SIP interconnections. With up to 20-30 billion network connected devices, applications and sensors predicted this year, the Internet of Things (IoT) represents a critical challenge for operators in terms of signaling and security. Consequently, telecom operators need a new, highly secure signaling architecture protected by a robust multi-protocol signaling firewall. The new expansion of the NetNumber Signaling Firewall with its advanced SIP inspection capabilities fully aligns with the guidelines in the new GSMA standards FS.38 SIP network security and FS.39 5G Fraud Risks Guide.

As is native with our intergenerational platform and all domain applications, the NetNumber Signaling Firewall can be combined seamlessly with other network functionality such as STP, DSC, HLR, HSS and ENUM and more. With TITAN, telecom operators have an unprecedented level of multi-protocol signaling protection, flexibility and operational uniformity in a platform that can reduce OPEX and CAPEX costs and improve efficiency.

AcomprehensivemonitoringfunctioncompletestheNetNumbermulti-protocolSignalingFirewalltooffloaddatatoexternal systems for analytics, reporting, statistics and other auxiliary functions used by telecom operators to build complete, next-generation signaling protection capabilities in todays complex and geo-dispersednetworks.

Learn more about NetNumber solutions at http://www.netnumber.com or by contactingsales@netnumber.com.

About NetNumber

NetNumber, Inc. brings 20 years of experience delivering platforms that power global telecom and enterprise networks.Our software-based signaling-control solutions accelerate delivery of new services like Private LTE and IoT/M2M solutions across multi-gen networks, dramatically simplifying the core and reducing opex.These solutions span a range of network types from 2G-3G-4G-5G to future G delivered on the industrys most robust signaling platform. NetNumber Data Services are essential for globalinter-carrier routing, roaming, voice and messaging. Data powers fraud detection and prevention solutions and enables enterprise B2B and B2C communications platforms.NetNumber multi-protocol signaling firewall, fraud-detection, and robocalling solutions help secure networks against current/emerging threats.

View post:
NetNumber Expands Industry Recognized Signaling Firewall to Protect SIP Connections - GlobeNewswire

Read More..

Put Your Risk on Mute: Using PKI to Simplify Remote Workforce Security – Hashed Out by The SSL Store – Hashed Out by The SSL Store

With 74% of surveyed CFOs saying they intend to move at least 5% of their on-site workforces to remote positions after the current pandemic, properly managed PKI is more important than ever

Disney World may have closed its doors, but theres a new fantasy land that opened up and its making many hackers dreams come true.

Thousands of fresh-faced wait, I dont have a desk or chair at home; how long are we going to be out of the office; hey, youre on mute; sorry, my dog is barking employees suddenly need remote access to applications and networks from laptops, smartphones, and employee-owned devices.

That means a more opportunities for malicious actors to target. So, how can PKI ruin their good time and help secure this new remote workforce?

Lets hash it out.

Public key infrastructure (PKI) doesnt have fancy LEDs or logos on it. You cant walk into the data center and see how it was clearly worth the money the way it shines in your 48U server rack. But PKI is like that: its quiet, unassuming and 100% critical to your success.

The enterprise security world is no longer just a firewalled network stack. Zero Trust is what the cool kids are doing, and according to the National Institute of Standards and Technology (NIST), PKI is a key component of a properly managed security environment.

Globally, many employees have been deemed nonessential and organizations have shuttered brick-and-mortar office spaces. Consequentially, both employees and organizations see benefits in having a larger remote workforce on a permanent basis. Theres a laundry list of studies done on remote work cost savings (probably a few funded by the global sweatpants manufacturer association) covering everything from office space to sick leave.

Over the past few months, many IT departments have been tasked (with less than a weeks time in many cases) with scaling networks and providing remote access to the applications and services that employees needed to do their job effectively. But are they secure?

There are some key weaknesses we can address right now:

Lets go over each step in more detail

Passwords are the most well-known layer of internet security, but theyre failing in several ways, including:

PKI authentication succeeds where password authentication fails because:

Pratik Savla, Senior Security Engineer at Venafi, did a great job summarizing the benefits of certificate-based authentication:

Certificate-based authentication is based on the X.509 public key infrastructure (PKI) standard. It offers stronger security compared to other forms of authentication by mutually authenticating both the client, (via a trusted party CA Certificate Authority) and the server during the SSL/TLS handshake. In other words, both sides involved in the communication have to identify themselves, whether that is for user-to-user, user-to-machine, or machine-to-machine communication.

As this design involves exchange of digital certificates instead of a username and password, it helps in preventing phishing, key-logging, brute force as well as MITM (Man-in-the-middle) attacks amongst other risks commonly associated with a password-based design.

The estimated cost of both time and loss for organizations annually just on password issues is $5.2 million, according to the aforementioned Ponemon Institute report. Using PKI-based identity certificates changes the entire organizations burden of remembering, updating, and managing passwords.

Multifactor authentication: pretty spectacular and very, very secure, right? Not if you ask Twitter CEO Jack Dorsey. Malicious actors gained access to his personalTwitter account. Hackers used a SIM swap scam to spoof his account and receive the second layer of the MFA.

If youve ever signed into Gmail or attempted to access a secure banking site from an unrecognized browser that requires you to input a pin number sent through SMS, youve seen and used multi factor authentication. In many cases, this process reduces the chance of stolen identity, but in the case of remote working, it also adds an additional application, making things more complex for IT admins.

But you might be wondering, how much better are user ID certificates than phone-or token-based multi-factor authentication? Lets take a look at this comparison chart from Sectigo:

As this chart highlights, PKI is significantly better than passwords. Heres how Tim Callan, Senior Fellow at Sectigo, explains it:

A certificate in conjunction with a TPM is stronger than a shared secret with phone-based MFA.So changing from password plus phone-based MFA to client certificates (especially when TPMs are present, as they go a long way in securing the key from theft), is a definite step up Remember, the device itself (laptop, phone, tablet) can and should require a password to unlock.By mandating that requirement for devices attaching with certificates, the IT department has enforced a thing-you-have (certificate) and thing-you-know (device password) scheme.

Besides PKI-based certificates offering the strongest form of identity authentication, they also make connecting simple and easy for the remote workforce. An employees private key is stored directly in their device (ideally via a trusted platform module, or TPM), whether thats a laptop, smartphone, or tablet. The employee can open the needed applications and just work. What a novel concept right? Theyre authenticated with no extra steps!

Using manual processes to manage the certificates for even a few employees can be labor-intensive, technically demanding, and error prone. PKI is often underutilized and feared because of these exact issues.

In the words of the immortal Michael Scott: Why dont you explain it to me like Im 5? Can do. Heres how certificate-based authentication works in the work-at-home scenario were currently seeing:

During the SSL/TLS handshake between the device at home (or the beach, you rascal!) and the server at corporate, the device and server exchange pleasantries. This is just like a normal TLS handshake but with a couple extra steps:

The server will reject connection requests from any device that doesnt provide a valid, verified, and authorized client certificate.

The major certificate authorities all offer certificates that are suitable for use within a remote work PKI environment. Theyre referred to by a few names, such as:

Sectigo/Comodo Personal Authentication Certificates are a perfect example of the type of certificates that can be used for certificate-based authentication.

Managing PKI at scale is usually not viewed as an easy process, but, fortunately, there are tools that enable automation across the certificate lifecycle. Properly managed automation permits your IT security group to issue, revoke, and replace certificates with ease. This can be done at scale both rapidly and dependably.

Equifax was the target of one of the largest data breaches in history. This breach almost assuredly could have been avoided with the use of properly managed PKI automation. After a thorough investigation, the Government Accountability Office determined:

Equifax did not see the data exfiltration because the device used to monitor [the vulnerable servers] network traffic had been inactive for 19 months due to an expired security certificate.

It apparently took them a couple more months to fix the issue, after which they immediately noticed suspicious web traffic. Because of user error, the breach cost Equifax $1.14 billion in 2019 alone.

The total cost of implementing PKI automation not only saves you the headaches and costs associated with downtime and noncompliance, but it also gives your IT team back the valuable time that they need to work on higher-level tasks that will benefit your company in other ways. When you understand and can quantify revenues, costs, compliance and risk, PKI automation becomes a valuable tool without equal.

Manage Digital Certificates like a Boss

14 Certificate Management Best Practices to keep your organization running, secure and fully-compliant.

The global situation is changing rapidly, and its difficult to predict what will come in the coming weeks or months. On March 16, 2020 the U.S. government issued a set of guidelines for 15 days to slow the spread of a pandemic virus. Almost 90 days later, Im completing this article and have yet to go back to my office.

There are many companies who assume they may never go back to a regular office setting. There are reports daily that malicious activity targeting remote workforces is increasing exponentially. Unfortunately, economies are still teetering on edge, the food supply chain is being drastically affected, and there is growing sense of desperation.

But in the midst of all this, cybercriminals arent taking a vacation. In fact, theyre using Coronavirus-themed scams to target potential victims. A few weeks into the pandemic, major dark web hacking groups were promising not to hit healthcare targets. But as of the writing of this article, the U.S. Department of Health and Human Services Office for Civil Rights Breach Portal lists 2,961,860 individuals whose personal information has been affected by hacking or unauthorized access since the first reported case of COVID-19 in the U.S. (The first reported case in the U.S. was dated Jan. 20, 2020.)

While the topic of this article is placing the pandemic as top of mind, these are tools that can protect organizations no matter what the outside environment looks like. The sooner that organizations can deploy properly managed PKI authentication to users and devices in the network, the sooner their remote workforces can have peace of mind. Even if that peace of mind is wearing sweatpants and hasnt had its nails done or a haircut in three months.

Read more from the original source:
Put Your Risk on Mute: Using PKI to Simplify Remote Workforce Security - Hashed Out by The SSL Store - Hashed Out by The SSL Store

Read More..

How to fight back against Covid-19 scams – Global Banking And Finance Review

By Koen Vanpraet, CEO at PXP Financial

Online crime gangs were quick to capitalise on Coronavirus. So much so that almost 3% of global spam is estimated to be Covid-19 related, according to internet security company Sophos, and36% of people in the UK have been contacted by scammers since the start of the pandemic, according to Citizens Advice.

So, in this dangerous era its important to be aware of the most familiar scams that have been re-booted over the last few months so that you can keep yourself and your business safe.

Push payment fraud

Push payment fraud is known by a variety of names, including CEO fraud, bogus boss fraud or business e-mail compromise. Its when criminals impersonate company executives to trick employees into making payments to accounts they control. And it cost UK businesses alone nearly 140 million in 2019, says UK Finance.[1]

Criminals are putting a Covid-19 spin on the fraud by asking businesses to transfer money to accounts supposedly at the Bank of England. Wed advise verifying all requests for transfers, bank or personal details with the organisation or individual making the request using established contact details. Do not reply to the e-mail or use the telephone numbers provided they may be fake.

Consider introducing two-factor authentication for the corporate e-mail system to raise the bar against criminals. And be wary of what you post to social media, company websites and out-of-the-office messages. Its easy for fraudsters to create a targeted e-mail from such information.

Advance fee fraud

Victims are asked to pay a fee upfront before receiving stock, refunds, rebates etc. The scammer collects the money and disappears. Covid-19 related advance fee frauds include selling non-existent medical supplies, landlords purporting to offer retailers a rent deferral in return for a 10% down payment, and fake offers of government assistance, grants and tax rebates.

Know the habits of your suppliers and business partners. Then youll stand a better chance of spotting out-of-the-ordinary requests or sudden changes to business practices. If in doubt, double-check with a colleague even when working from home. Check sender e-mail addresses by hovering the mouse cursor over them. Also check they are spelt correctly and come from a corporate account rather than a free e-mail service, such as Gmail or Yahoo.

Tech support, software and fake anti-virus scams

With more employees now working from home, businesses face a higher risk of being defrauded by phishing and malware attacks. This is when criminals send e-mails that look like they come from trusted sources, such as the IT department.

The e-mails claim that its time to upgrade software or anti-virus protection. But really, the criminals want recipients to click on links or open documents that contain viruses or divulge login details or passwords.

Awareness that such scams exist is half the battle. If youre not expecting the e-mail or dont know the sender, delete it without reading. Dont click on links or open attachments. If youre responsible for IT network security, consider e-mail filtering, network segmentation to protect against compromised devices and strong authentication for more secure areas.

Unusually large orders, new customers, fake creditors

We live, work and trade in unusual times. Nonetheless, be on your guard for new customers placing large repeat orders. Fake creditors are also making the most of Coronavirus cash flow issues. They contact businesses claiming that they are owed money or chasing late payment. They may even threaten legal action, arrest or removal of goods to cover the value of the debt for good measure.

Criminals are unscrupulous. In uncertain times, they prey on peoples emotions, whether thats fear, desperation, generosity or greed. Being aware of their techniques to guard against them is half the battle in protecting yourself and your business.

Read this article:
How to fight back against Covid-19 scams - Global Banking And Finance Review

Read More..

What Will The Crypto Market Look Like In A Post COVID-19 Economy? | Coin Insider – Coin Insider

The COVID-19 pandemic has, among other things managed to throw a monkey wrench into the gearbox of the world economy. Some experts claim that it will take years, if not decades, to recover from the screeching halt it caused globally. Everything, from education to travel, has been put on hold. Billions of people have spent months in quarantine, unable to go to work or earn. The financial markets are being hit the hardest. The S&P 500 index is at its lowest since the 2008 meltdown. However, everything isnt as bleak as these facts would suggest. There is some silver lining that can prove quite beneficial to the world economy. One of those is the effects these events have on the crypto market.

There is a slow, but steady trend of people increasing trust in cryptocurrencies to the detriment of traditional investments like stocks, real estate, and even gold. The COVID-19 pandemics has drastically increased this tendency. The biggest beneficiary of this will be Bitcoin, but all other cryptos stand to gain a lot, once the dust has settled. For instance, according to a survey done by The Tokenist, 12% of people would prefer $1,000 in Bitcoin to 1,000 in stocks. Around 16% would prefer Bitcoin to gold, while 17% would prefer bitcoin to real estate investment. The biggest difference is with government bonds, with 38% of people who would prefer bitcoin over them. When compared to a similar study done in 2017, the trust in bitcoin over traditional investment has increased by 13%. This is to be expected, as Bitcoin was founded partly as a response to the 2008 financial crisis. As we are officially in recession, it is only logical that it will gain in value in the future.

As COVID-19 continues its rampage across the globe, European stocks have reached the lowest point since 2012. The disruption of the supply chains, rising unemployment, and uncertain prospects have caused world markets to shrink to dangerously low levels. At moments, it seems that all the progress made in the previous decades over establishing a truly global economy may come undone due to a viral breakout. All this has forced investors to seek low-risk vessels for their capital. As we have seen, traditional investments have been losing ground to cryptocurrencies, and bitcoin profits have been a tempting alternative. Many experts agree that in the near future we will see massive value increase for bitcoin, with some sources claiming that it could reach $50,000 by the end of 2020 and possibly $350,000 by 2045. While these claims have yet to be proven true, it is clear that the crypto market may very well be immune to coronavirus.

With rising risk attached to fiat currencies, we are witnessing a surge in interest for cryptocurrency coins. People are trying to learn more about them. Fortunately, there are plenty of resources on the Internet that they can use, like the one teaching you how to buy bitcoin in the UK successfully. This increasing interest generates a lot of attention and is positively affecting the value of crypto markets, as more and more people are getting involved. This is confirmed by the prediction Nexo co-founder Antoni Trenchev made, claiming that bitcoin could easily reach $50,000 in 2020. With the upcoming halving event, this could easily happen. For comparison sake, when the last halving happened, bitcoin skyrocketed some 4,000% in value. While that is hard to imagine happening now, some value gains can certainly be expected, despite the overall economic situation.

According to the Deutsche Bank, the COVID-19 pandemic may very well be a critical point for the adoption of digital currencies. The true extent of the effects the pandemic will have on the global economy is still unknown, but cryptos will definitely benefit from it. Many central banks see cash as a potential danger, which will force them to hasten the adoption of bitcoin and other cryptocurrencies. The abandonment of fiat currencies will in short term destabilize the market and increase the use of digital currencies, creating a spiral that will lead to wide-spread adoption of digital cash. As with all new technologies and ideas, some will not adapt as fast as the others. This alone will create instability in the system, but in the long run, it will smooth out, a majority of banks come on board with the idea. Some of them have already started issuing their digital currencies, a trend that will be massively followed in the future.

One of the main reasons for the popularity of cryptocurrencies is that they are immune to government manipulation we often see in fiat money. That doesnt mean that the market itself cant be manipulated, but at least it isnt left on the mercy of some power-hungry politician. Central banks or international financial institutions hold no sway over it. For instance, Bitcoin protocols are independent and arent controlled by anyone but the market itself. In some ways, it is a libertarian fantasy that comes true. The lack of government regulation, however, wont last forever. EU has already issued directives to its member-states on new regulations and some, like Germany, have put them in practice. The others will follow suit. Some investors, like Tim Draper, go as far as to claim that the crypto market will play a more important role than banks or even governments in the post-COVID-19 world.

The crypto market will play a much larger role in the post-COVID-19 economy than it did in the past. It is a logical consequence of the limitations pandemic imposed on us. There is no doubt that this change can bring many benefits. However, it can be a double-edged sword, as we as a society increase our dependency on the digital world. As with everything else that relies on the Internet, security is the number one concern. Hopefully, it will also evolve and be able to guarantee safety for both people and their investments.

Link:
What Will The Crypto Market Look Like In A Post COVID-19 Economy? | Coin Insider - Coin Insider

Read More..

Increasing election security monitoring in cloud computing – Microsoft on the Issues – Microsoft

Today, we have an exciting announcement we believe will help increase election security while enabling election officials to take advantage of the advanced capabilities of cloud computing.

For years, the Department of Homeland Securitys Cybersecurity and Infrastructure Security Agency and state and local governments throughout the United States have worked with the non-profit Center for Internet Security, Inc. (CIS) to monitor the security of election-related data. This is enabled by Albert Network Monitoring, which examines internet traffic and connection attempts on networks owned and run by election officials including voter registration systems, voter information portals and back-office networks.

Albert provides network security alerts for both basic and advanced network threats, helping organizations identify malicious activity such as attempted intrusions by foreign adversaries or cybercriminals. Data from these sensors is sent in near-real-time to the CIS Security Operations Center, which is monitored around the clock every day by expert cybersecurity analysts.

To date, cloud computing providers, such as Microsoft Azure, have not been compatible with Albert sensors. This presented election officials with the difficult choice of selecting powerful, secure and cost-effective cloud computing options, or hosting the data on local servers if they wanted to take advantage of the added security of Albert. Today, through a partnership with CIS, were providing a new choice by making Microsoft Azure compatible with Albert for the first time.

Were starting this journey through a pilot, which will begin this week, with 14 county Supervisors of Elections in Florida. Moving forward, Microsoft and CIS will look to open the capability to states and jurisdictions across the United States.

Todays announcement is the result of collaborative work between Microsofts Azure Global engineering team and CISs engineering team, in partnership with Microsofts Defending Democracy Program. In the coming months, we look forward to sharing more details about our work to help secure the 2020 elections and future elections in the U.S. and around the world.

Tags: Azure, cybersecurity, Defending Democracy Program, elections, Microsoft Azure

See original here:
Increasing election security monitoring in cloud computing - Microsoft on the Issues - Microsoft

Read More..

Cloud Computing Technologies and Its Legal Dimension – Lexology

I. INTRODUCTION

Cloud database is the system where the data is stored by means of the hardware (such as computers, storage units, etc.) through the system located in a remote place from the computer that generates the data. Those data become available for the re-access of the user from the place where the data is stored over the internet, regardless of device and location. Technological developments related to cloud computing are occurring much faster abroad and the companies providing the service are mainly based abroad. Because of that, people or companies that receive cloud database services receive these services through hardware systems located abroad. Nevertheless, it can be said that important technical innovations have been provided in this field and the legal infrastructure has started to be established In Turkey. In this article, the legal dimension of cloud computing technology and its legal regulations are discussed.

II. CONCEPTS ON CLOUD COMPUTING SYSTEMS

Before going to the legal examination of cloud computing systems, it will be useful to briefly explain the types of the system in order to better understand the technical dimension of cloud computing. In this context, it is possible to mention about three types of cloud computing systems.

It will be more informative to mention about the service items offered to the user by the cloud service provider through the above-mentioned cloud computing systems. In this context, three types of services can be mentioned.

III. LEGAL DIMENSION OF CLOUD COMPUTING SYSTEMS

The parties of the cloud computing system explained in detail above or the services and the service method which are used in these systems shall be known in order to understand legal aspect of cloud computing systems that are the subject of this article. The legal dimension of cloud computing shall be examined multilaterally. On one hand there is a contractual relation between user and service provider; on the other hand, the data stored in the cloud system have legally importance with respect to The Law on The Protection of Personal Data (KVKK) numbered 6698.

Furthermore, it shall be taken into consideration that special regulation which came into force in field of banking and capital markets related to cloud computing systems.

When the contractual relationship established between the user and the service provider regarding cloud computing systems are examined, classification of such contracts as service contracts due to their characteristics will be a very general qualification. There is fundamentally a service provided by service provider to the users but keeping and saving of data that belong to users also is a part of the contractual relation.

Contracts related to cloud computing systems also contains similarities with safekeeping contract which is regulated in the article 561 of Turkish Law of Obligation (TBK) numbered 6098. However, describing these types of contracts as merely safekeeping (contract of mandate) contracts does not fully provide the content of the contract. Safekeeping contract include the physical storage of a movable property, not being used by the safekeeper, and returning it in accordance with the terms of the TBK. However, data storage is quite different from condition of keeping movable properties.

In context of the reasons that are indicated above, it can be said that the contract regarding the cloud system services made between the user and the service provider is an atypical contract. In the arrangement of these contracts, data storage process and the unique features of cloud computing should be taken into consideration. Additionally; the service to be provided to the user, details of the rights and obligations of the parties, the privacy clauses and protection of personal data should be evaluated within this framework.

It is obvious that the provisions of KVKK are of great importance in terms of the legal legislation of cloud computing systems. Some points of cloud computing such as data logging, keeping and protecting personal data or data transfer brings obligation of data officer regarding KVKK. Cloud storage service provider and its user are responsible for assessing whether the security measures taken by the cloud storage service provider are sufficient and appropriate in accordance with the decision and precedent review of Personal Data Protection Authority(Authority).

In this context, it is recommended by the Authority to know in detail what the personal data stored in the cloud are, to back up data, to ensure synchronization and to perform two-step authentication control for remote access if this personal data is required. During the storage and use of personal data in cloud systems as a means of data protection, it is recommended to encrypt with cryptographic methods, sending them in cloud environments with crypts and using separate encryption keys where possible for personal data. In particular, it is recommended to use encryption keys separately for each cloud solution.[1]

The principles regarding the legal dimension of cloud computing systems are determined by special legislation regulations beside of the basic legal dimensions aforementioned above.

In terms of banking legislation, the Guideline on the Information Systems and Electronic Banking Services of Banks (Guideline) was issued by the Banking Regulation and Supervision Board (BRSA). The enforcement date of the Regulation has been determined as 1 July 2020.Within the scope of the Guideline, regulations have been made regarding the use of private and public cloud services to enable banks to avoid the risks while benefiting from the cloud service model.

Another legislation are Information System Management Citation and Information System Independent Audit Citation which were put into force by Capital Markets Board (CMB). The citations include requirements of cloud computing system for companies which are under audition of CMB. If the data called the primary or secondary systems will be uploaded to the cloud database by these companies, the data storage center (hardware which are physical equipment that stores data) of the selected cloud database must be available in Turkey. For instance, if there is desire to use cloud computing for e-mail services, the data center of this cloud computing services should be available in Turkey.

IV. CONCLUSION

Cloud computing systems, which bring practical solutions to many problems encountered in business and business world, continue to develop rapidly. Besides the advantages of cloud computing services, there are some critical points to pay more attention such as possibility of personal data leaks.

In addition to general legislation, legal regulations in special fields such as banking or capital markets are mentioned. It is important to comply with the rules and procedures that is related to cloud computing systems.

All regulation that are explained above are still new and in the initial phase. Because of that, cloud computer systems still need some detailed legislations. For all those reasons, it is clearly seen that the highest importance should be given for this area to prevent failures and legal mistakes.

See the article here:
Cloud Computing Technologies and Its Legal Dimension - Lexology

Read More..