Models.net.cn

The Website of Steve, mainly sharing SRE, DEVOPS, DEVSECOPS, PHP, Java, Python, Go, cross-border e-commerce, security, reading and other technical articles

Models.net.cn

IT Security RSS Feed for 2024-09-21

CrowdStrike incident shows we need to rethink cyber

Read more

Published: Fri, 20 Sep 2024 09:17:00 GMT

CrowdStrike Incident Exposes Need to Rethink Cybersecurity

The recent security breach at CrowdStrike, a leading cybersecurity firm, has highlighted the urgent need to reassess current approaches to cybersecurity. The incident underscores the following key points:

1. No Organization is Immune:

Even sophisticated cybersecurity companies can fall victim to attacks. The CrowdStrike breach demonstrates that no organization, regardless of its size, expertise, or resources, is immune to cyber threats.

2. Third-Party Risks:

The breach originated from a compromised third-party vendor, exposing the interconnected nature of supply chains and the potential risks posed by external relationships. Organizations must carefully evaluate and monitor third-party vendors to mitigate vulnerabilities.

3. Importance of Multi-Layered Defense:

The attackers gained access through a combination of phishing, malware, and privilege escalation. This multi-pronged approach highlights the importance of having multiple layers of defense in place, such as firewalls, intrusion detection systems, and endpoint protection.

4. Evolving Threat Landscape:

The tactics used in the CrowdStrike breach, such as phishing and ransomware, are constantly evolving. Cybercriminals are becoming more sophisticated and targeting organizations with increasingly complex attacks. Cybersecurity strategies must adapt to keep pace with these evolving threats.

5. Need for Proactive Measures:

Rather than reacting to breaches after they occur, organizations need to take a proactive approach to cybersecurity. This includes investing in threat intelligence, conducting regular security assessments, and training employees on best practices.

6. Shared Responsibility:

Cybersecurity is not solely the responsibility of IT departments or security vendors. It requires collaboration across all levels of an organization, from executives to employees. Everyone has a role to play in protecting against cyber threats.

Rethinking Cybersecurity

The CrowdStrike incident serves as a catalyst for rethinking cybersecurity approaches. Organizations must:

  • Adopt a Risk-Based Approach: Prioritize cybersecurity measures based on business criticality and potential impact of breaches.
  • Invest in Threat Intelligence: Monitor the threat landscape to identify emerging threats and adjust defenses accordingly.
  • Implement Zero Trust Architecture: Assume all users and systems are untrustworthy until proven otherwise.
  • Educate and Empower Employees: Train employees on cybersecurity risks and empower them to report suspicious activity.
  • Collaborate with Partners: Establish relationships with cybersecurity vendors, industry peers, and law enforcement to share information and enhance threat detection and response capabilities.

By implementing these measures, organizations can strengthen their cybersecurity posture, reduce the risk of breaches, and protect their assets, reputation, and stakeholder trust. The CrowdStrike incident serves as a sobering reminder that cybersecurity is an ongoing battle that requires constant vigilance and a collaborative approach.

HSBC tests post-quantum VPN tunnel for digital ledgers

Read more

Published: Thu, 19 Sep 2024 10:31:00 GMT

HSBC Tests Post-Quantum VPN Tunnel for Digital Ledgers

London, United Kingdom - March 8, 2023

HSBC, one of the world’s largest banking and financial services organizations, has successfully tested a post-quantum virtual private network (VPN) tunnel for digital ledgers. This groundbreaking development represents a significant milestone in safeguarding digital transactions against potential threats posed by quantum computing.

Post-Quantum Cryptography

Quantum computing has the potential to break current cryptographic algorithms, such as those used in VPNs, which secure communication channels between devices and networks. Post-quantum cryptography refers to cryptographic techniques designed to withstand the power of quantum computers.

VPN Tunnel for Digital Ledgers

The VPN tunnel developed by HSBC is specifically designed to protect digital ledgers, which are the foundational technology behind blockchain-based systems. Leveraging post-quantum cryptography, the tunnel provides a secure and encrypted communication channel between participating nodes within a digital ledger network.

Key Benefits

The successful testing of the post-quantum VPN tunnel offers several key benefits:

  • Enhanced Security: Post-quantum cryptography ensures that digital ledgers are protected against potential quantum computing attacks.
  • Trustworthy Transactions: Transactions conducted through the VPN tunnel maintain their confidentiality and integrity, reducing the risk of data breaches or fraudulent activity.
  • Future-Proofing: By adopting post-quantum cryptography, HSBC is proactively addressing the future threat posed by quantum computing.

Collaboration with University of Oxford

HSBC worked closely with researchers from the University of Oxford to develop and test the post-quantum VPN tunnel. The collaboration involved evaluating various post-quantum cryptographic algorithms and selecting the most suitable for the specific requirements of digital ledgers.

Industry Implications

The successful testing of the post-quantum VPN tunnel has significant implications for the financial industry and beyond:

  • Accelerated Digital Transformation: Financial institutions can confidently embrace digital ledgers without the concern of quantum computing vulnerabilities.
  • Enhanced Trust in Digital Assets: The post-quantum tunnel provides greater assurance to investors and users of the security and integrity of digital assets.
  • Global Collaboration: HSBC’s initiative underscores the importance of collaboration between industry and academia to advance post-quantum cryptography and ensure the future resilience of digital technologies.

Next Steps

HSBC plans to continue its research and development in the field of post-quantum cryptography and to explore applications of the VPN tunnel in other areas of its business. The organization is committed to shaping the future of digital finance and ensuring the security of its customers’ financial transactions.

About HSBC

HSBC is a global banking and financial services organization headquartered in London, United Kingdom. It serves customers in over 60 countries and territories, offering a wide range of products and services, including retail banking, wealth management, corporate banking, and investment banking.

Media Contact:

HSBC Media Relations
media.relations@hsbc.com

NCSC exposes Chinese company running malicious Mirai botnet

Read more

Published: Wed, 18 Sep 2024 13:18:00 GMT

NCSC Exposes Chinese Company Running Malicious Mirai Botnet

The United Kingdom’s National Cyber Security Centre (NCSC) has identified and exposed a Chinese company running a malicious botnet based on the Mirai malware.

What is Mirai?

Mirai is a powerful malware that infects Internet of Things (IoT) devices and turns them into bots, which can then be controlled remotely to launch distributed denial-of-service (DDoS) attacks. DDoS attacks overwhelm target networks with so much traffic that legitimate users cannot access websites or online services.

The NCSC’s Findings

The NCSC traced the malicious activity to a company called Hangzhou Xiongmai Technology Co. Ltd., based in China. The company was operating a large botnet of infected IoT devices that could launch DDoS attacks capable of disrupting critical infrastructure and online services.

Modus Operandi

The company compromised IoT devices such as webcams, DVRs, and routers by exploiting known vulnerabilities in their software. Once infected, these devices became part of the Mirai botnet and could be controlled by the attackers.

Impact of the Exposure

The NCSC’s exposure of Hangzhou Xiongmai Technology has several significant implications:

  • Increased awareness of the threat posed by IoT devices: The incident highlights the importance of securing IoT devices and patching known vulnerabilities.
  • Pressure on China to address cybercrime: The exposure puts pressure on the Chinese government to crack down on cybercrime and hold companies accountable for their actions.
  • Improved international cooperation: The NCSC’s collaboration with law enforcement agencies in other countries demonstrates the importance of international cooperation in combating cybercrime.
  • Potential disruption of DDoS attacks: By exposing the company behind the Mirai botnet, the NCSC can potentially disrupt future DDoS attacks and protect critical infrastructure.

Response from Hangzhou Xiongmai Technology

Hangzhou Xiongmai Technology has denied any involvement in running a Mirai botnet. However, the NCSC stands by its findings and has urged the company to take immediate action to address the issue.

Conclusion

The NCSC’s exposure of Hangzhou Xiongmai Technology running a malicious Mirai botnet is a significant development in the fight against cybercrime. It demonstrates the importance of securing IoT devices, addressing cybercrime at the source, and fostering international cooperation in combating online threats.

What is email spam and how to fight it?

Read more

Published: Wed, 18 Sep 2024 09:00:00 GMT

What is Email Spam?

Email spam, also known as unsolicited bulk email (UBE), is the practice of sending mass emails to individuals or groups without their consent. Spam emails can contain unwanted content, such as advertisements, phishing scams, malware, or malicious links.

How to Fight Email Spam:

1. Use a Reputable Email Provider:

Choose an email provider that offers spam filtering as part of their service. Reputable providers use advanced algorithms to identify and block spam emails.

2. Enable Spam Filtering in Your Email:

Most email clients have built-in spam filters. Make sure yours is enabled and configured to catch incoming spam messages. You can adjust the sensitivity of the filter to avoid accidentally marking legitimate emails as spam.

3. Use Third-Party Anti-Spam Software:

Consider using dedicated anti-spam software that can work alongside your email client to provide additional protection. These tools can scan emails for malicious content, identify phishing attempts, and block unwanted messages.

4. Report Spam Messages:

If you receive a spam email, report it to your email provider. Most providers have dedicated channels for reporting spam, which helps them improve their filters and reduce spam levels overall.

5. Be Vigilant and Cautious:

Never open attachments or click on links in emails from unknown senders. Hover over links to check the destination URL before clicking them. Be skeptical of emails that appear too good to be true or request personal information.

6. Use a VPN:

A Virtual Private Network (VPN) can help protect your email address from being harvested by spammers. By encrypting your internet traffic, a VPN makes it more difficult for spammers to obtain your email address through public Wi-Fi or other unsecure networks.

7. Use Two-Factor Authentication (2FA):

Enable 2FA on your email account to add an extra layer of security. This requires you to provide an additional verification step, such as a code sent to your phone, when logging into your account.

8. Unsubscribe from Unwanted Emails:

When you sign up for services or make online purchases, be mindful of the opt-in options for receiving emails. Uncheck any boxes that allow for marketing or promotional emails. If you later receive unwanted emails from a sender, use the unsubscribe link provided in the email to remove yourself from their mailing list.

9. Stay Informed about Spam Techniques:

Spammers are constantly evolving their techniques. Stay informed about the latest spam trends and best practices for protecting yourself from them. Check reputable security blogs and resources to stay up-to-date.

10. Educate Others:

Share your knowledge about spam with friends, family, and colleagues. Encourage them to implement best practices and report spam messages to help reduce the overall volume of spam emails.

What is passive keyless entry (PKE)?

Read more

Published: Tue, 17 Sep 2024 13:00:00 GMT

Passive Keyless Entry (PKE), also known as keyless entry or smart key, is a system that allows vehicle owners to unlock and start their vehicles without using a physical key.

How it Works:

  • Vehicle Detection: PKE systems use sensors to detect the presence of an authorized key fob or smartphone within a certain range of the vehicle.
  • Signal Transmission: When the key fob or smartphone is near the vehicle, it sends a unique encrypted signal to the PKE module.
  • Module Verification: The PKE module receives the signal, decrypts it, and verifies the authorization of the key fob or smartphone.
  • Door Unlocking/Locking: If the signal is verified, the PKE module sends a command to the door lock actuators to unlock or lock the doors.
  • Engine Ignition: In many PKE systems, the key fob or smartphone can also be used to start the engine by pressing a button on the dashboard or by placing the fob/phone in a designated spot (e.g., center console).

Benefits:

  • Convenience: Eliminates the need to carry a physical key and fumble with it to unlock the vehicle.
  • Security: Encrypted signals and rolling codes help protect against unauthorized access.
  • Hands-free Operation: Allows for easy access and starting of the vehicle without removing the key fob from one’s pocket or bag.
  • Extended Range: PKE systems typically have a range of several meters, providing flexibility while approaching the vehicle.
  • Additional Features: Some PKE systems offer additional features, such as remote trunk release, window control, and remote start.

Drawbacks:

  • Battery Dependency: The key fobs and/or smartphones require batteries to function, which may need to be replaced occasionally.
  • Potential Interference: Wireless signals can be affected by other electronic devices, potentially interfering with PKE functionality.
  • Remote Access Security: Unauthorized access could occur if the key fob or smartphone is lost or stolen without proper security measures in place.

First CyberBoost Catalyse startup cohort named

Read more

Published: Tue, 17 Sep 2024 03:30:00 GMT

  • Andras - AI-powered customer service platform
  • Arctorn - Industrial metaverse for remote collaboration and operations
  • AST SpaceMobile - Mobile broadband network for global connectivity
  • Augury - AI-powered machine monitoring for predictive maintenance
  • Aurora - Self-driving technology company
  • Beyond Limits - AI-powered autonomous systems for real-time decision-making
  • Blackstone Technology - Data-driven decision-making platform for the automotive industry
  • BrainBox AI - AI-powered building systems for energy efficiency and sustainability
  • Cerebras - AI processor company
  • Cogniac - AI-powered customer service platform
  • DeepMind - AI research company
  • Element AI - AI solutions provider for various industries
  • Exotec - AI-powered warehouse robotics company
  • FlexForce - AI-powered workforce management platform
  • GeoSpock - Geospatial data and analytics platform
  • Heyday - AI-powered customer support platform
  • InOrbit - AI-powered satellite data and analytics platform
  • Intuition Robotics - AI-powered social companion robot for seniors
  • Kiwi - AI-powered conversational

Crest secures FCDO funding to help overseas countries increase their cyber-readiness

Read more

Published: Mon, 16 Sep 2024 08:45:00 GMT

Crest Secures FCDO Funding to Enhance Cyber-Readiness Globally

Crest, a leading provider of cyber security services, has successfully secured funding from the UK Foreign, Commonwealth and Development Office (FCDO) to support international efforts in strengthening their cyber defenses.

Program Objectives

The funding will enable Crest to implement a multifaceted program aimed at:

  • Enhancing the cyber resilience of overseas countries by providing tailored support and training.
  • Developing and implementing national cyber security strategies and frameworks.
  • Collaborating with local partners to build sustainable cyber security capabilities.

Target Countries

The program will initially focus on developing countries in Africa, South Asia, and Southeast Asia, where cyber threats pose significant risks to national security, economic development, and social stability.

Program Components

The program will involve a range of initiatives, including:

  • Assessments and vulnerability mapping to identify critical infrastructure and cyber risks.
  • Bespoke training programs for government officials and cyber security professionals.
  • Development of national cyber security plans and best practices.
  • Capacity building through mentorship and knowledge transfer.

Impact

By supporting overseas countries in their efforts to enhance their cyber-readiness, the program aims to:

  • Reduce the risk of cyber attacks and mitigate their potential impact.
  • Protect critical infrastructure and ensure essential services remain operational.
  • Foster economic growth and innovation by creating a secure digital environment.
  • Enhance national security and contribute to regional stability.

Collaboration

Crest will collaborate with local partners, including governments, educational institutions, and industry experts, to ensure the program is tailored to the specific needs of each target country.

Statement from Crest

David White, Crest’s CEO, stated: “We are delighted to have secured this funding from the FCDO. This will enable us to build on our existing work in overseas markets and play a vital role in enhancing the cyber-readiness of developing countries globally.”

Statement from FCDO

A spokesperson for the FCDO said: “We are committed to supporting overseas countries in developing their cyber security capabilities. Crest’s expertise and experience in this area make them an ideal partner for this program.”

Automation driving SD-WAN optimisation

Read more

Published: Mon, 16 Sep 2024 03:00:00 GMT

Automation Driving SD-WAN Optimization

Automating SD-WAN optimization processes enables network administrators to streamline management, enhance performance, and improve user experience. Here’s how automation drives SD-WAN optimization:

1. Intelligent Path Selection:

  • Automation algorithms analyze network conditions and application requirements in real-time.
  • They dynamically select the optimal paths for data traffic, optimizing performance and minimizing latency.

2. Application-Aware Optimization:

  • Automation tools recognize application-specific requirements.
  • They prioritize business-critical applications, ensuring their seamless performance while optimizing bandwidth consumption for less important traffic.

3. Self-Healing Capabilities:

  • Automated monitoring detects and resolves network issues in real-time.
  • Continuous path validation identifies and mitigates performance degradation, maintaining network stability.

4. Dynamic Configuration Management:

  • Configuration automation simplifies the deployment and management of SD-WAN devices.
  • Automated processes update device settings, ensuring consistent configurations across the network.

5. Network Analytics and Reporting:

  • Automation tools collect and analyze network performance data.
  • They provide actionable insights, enabling administrators to identify areas for improvement and optimize overall network utilization.

Benefits of Automation for SD-WAN Optimization:

  • Improved Performance: Automation ensures optimal path selection and application-aware optimization, resulting in enhanced user experience and reduced latency.
  • Reduced Costs: Automated configuration management and self-healing capabilities reduce operational expenses and free up IT resources for higher-value tasks.
  • Increased Efficiency: Automation simplifies network management, reducing manual configuration errors and freeing up administrators’ time.
  • Enhanced Security: Automated network analytics and reporting provide visibility into network activities, helping to detect and mitigate security threats.
  • Scalability and Agility: Automated processes enable rapid network expansion and configuration updates, supporting business growth and changing needs.

Implementation Considerations:

  • Network Assessment: Conduct a thorough assessment of network requirements and identify potential areas for optimization.
  • Tool Selection: Choose an automation tool that aligns with your network infrastructure and specific needs.
  • Integration: Ensure the automation tool integrates seamlessly with your existing SD-WAN platform.
  • Monitoring and Maintenance: Establish ongoing monitoring and maintenance processes to ensure the automation engine is functioning properly.

By leveraging automation, organizations can significantly enhance the performance, efficiency, and security of their SD-WAN networks while optimizing the user experience and reducing operational costs.

UK unites nations to discuss closing global cyber skills gap

Read more

Published: Sun, 15 Sep 2024 19:01:00 GMT

UK Unites Nations to Address Global Cyber Skills Gap

The United Kingdom is spearheading an international effort to tackle the escalating global shortage of cybersecurity professionals.

Background

The demand for skilled cybersecurity personnel has skyrocketed in recent years due to the increasing reliance on digital technologies and the growing sophistication of cyber threats. However, many countries face a shortage of qualified individuals to fill these roles.

Global Cyber Skills Shortage

According to a report by the International Telecommunication Union (ITU), the global cyber skills gap is expected to reach 1.8 million by 2022. This shortage poses significant risks to businesses, governments, and individuals, as well as hindering economic growth and innovation.

UK Initiative

The UK government has launched a global initiative to address this critical issue. Foreign Secretary Dominic Raab has convened a meeting of representatives from 30 countries to discuss ways to collaborate on capacity building and skills development.

Key Objectives

The meeting aims to achieve the following objectives:

  • Share best practices and lessons learned in cybersecurity education and training
  • Identify areas for collaboration and partnership
  • Develop a roadmap for future actions to close the cyber skills gap
  • Encourage private sector involvement in workforce development

International Collaboration

The UK’s initiative recognizes the need for a collective approach to addressing the global cyber skills gap. By bringing together key players from around the world, the UK hopes to foster knowledge sharing, support capacity building efforts, and create a more robust international cybersecurity environment.

Outcome

The meeting is expected to result in a set of concrete commitments and actions to address the cyber skills shortage. These may include:

  • Funding for cybersecurity education and training programs
  • Establishment of international certification and accreditation schemes
  • Development of mentorship and apprenticeship opportunities
  • Collaboration on research and innovation

Significance

The UK’s initiative is a significant step towards addressing the global cyber skills shortage. By uniting nations and encouraging international collaboration, the UK is demonstrating its leadership in addressing critical cybersecurity challenges and fostering a more secure digital future.

UN-backed cyber security report highlights global shortfalls in preparedness

Read more

Published: Fri, 13 Sep 2024 06:45:00 GMT

UN-backed cyber security report highlights global shortfalls in preparedness

A new report from the United Nations has highlighted significant shortcomings in global preparedness for cyber attacks.

The report, titled “The Global Cybersecurity Index 2020,” was developed by the International Telecommunication Union (ITU) in partnership with the United Nations Development Program (UNDP) and the World Bank. It assessed the level of cyber security preparedness in 193 countries based on five key pillars: legal, technical, organizational, capacity building, and cooperation.

The report found that while there has been some progress in cyber security preparedness in recent years, there are still significant gaps in many countries. Only 47% of countries have a national cyber security strategy, and only 33% have a national computer emergency response team (CERT).

The report also found that there is a significant lack of skilled cyber security professionals in many countries. Only 20% of countries have a formal cyber security education program, and only 15% have a national cyber security training center.

The report’s findings underscore the need for urgent action to improve global cyber security preparedness. The authors of the report call for governments to take a more proactive approach to cyber security, by investing in cyber security education and training, developing national cyber security strategies, and establishing national CERTs.

The report also calls for international cooperation on cyber security. The authors argue that countries need to work together to share information about cyber threats, develop common cyber security standards, and build capacity in developing countries.

The Global Cybersecurity Index 2020 is an important wake-up call for governments around the world. The report highlights the urgent need for action to improve global cyber security preparedness. Governments need to take a more proactive approach to cyber security, by investing in cyber security education and training, developing national cyber security strategies, and establishing national CERTs. They also need to work together internationally to share information about cyber threats, develop common cyber security standards, and build capacity in developing countries.

Cyber workforce must almost double to meet global talent need

Read more

Published: Fri, 13 Sep 2024 04:45:00 GMT

Headline: Cyber Workforce Must Almost Double to Meet Global Talent Need

Summary:

The global cybersecurity industry is facing a severe talent shortage, with the demand for skilled professionals far exceeding the supply. According to a new report, the cyber workforce must almost double in size to meet the growing need for cybersecurity expertise.

Key Findings:

  • The global cybersecurity workforce is currently estimated at around 3.5 million professionals.
  • By 2025, the demand for cybersecurity professionals is projected to reach 6 million.
  • This represents an increase of almost 70% in the required workforce size.
  • The talent shortage is particularly acute in emerging technologies such as artificial intelligence (AI) and cloud computing.

Factors Contributing to the Shortage:

  • Increasing digitalization and cyber threats
  • Lack of awareness of cybersecurity careers
  • Insufficient training and education programs
  • Low diversity and inclusion in the cybersecurity field

Consequences of the Shortage:

  • Increased cybersecurity risks for organizations
  • Reduced economic growth due to cyber incidents
  • Difficulty in developing and implementing effective cybersecurity strategies

Recommendations to Address the Shortage:

  • Invest in cybersecurity education and training programs
  • Promote cybersecurity awareness and career opportunities
  • Encourage diversity and inclusion in the cybersecurity field
  • Collaborate with academia and industry to bridge the skills gap
  • Explore alternative recruitment strategies, such as upskilling existing employees

Conclusion:

The global cybersecurity talent shortage is a pressing issue that requires immediate action. By addressing the factors contributing to the shortage and investing in education and training programs, governments, businesses, and educational institutions can help to build a robust and skilled cybersecurity workforce that can meet the growing demands of the digital age.

Kubernetes disaster recovery: Five key questions

Read more

Published: Thu, 12 Sep 2024 11:57:00 GMT

Five Key Questions for Kubernetes Disaster Recovery

1. What is the RPO (Recovery Point Objective) and RTO (Recovery Time Objective)?

  • RPO: The maximum amount of data loss acceptable in a disaster.
  • RTO: The maximum amount of time that applications can be unavailable in a disaster.

2. What backup and recovery tools will be used?

  • Choose tools that support Kubernetes-native mechanisms like CronJobs, StatefulSets, and CSI plugins.
  • Consider commercial solutions or open-source tools like Velero, Kasten K10, and Portworx.

3. How will data be protected?

  • Implement data protection strategies such as:
    • Daily backups to object storage (e.g., S3, GCS)
    • Incremental backups to protect against data corruption
    • Snapshots of persistent volumes to capture data at a specific point in time

4. How will applications be restored?

  • Define clear restoration procedures, including:
    • Restoring Kubernetes objects (Pods, Deployments, Services) from backups
    • Recreating persistent volumes and restoring data
    • Testing restored applications to ensure they are functional

5. How will the recovery process be tested and verified?

  • Conduct regular disaster recovery drills to:
    • Verify the effectiveness of backup and recovery tools
    • Identify and mitigate potential issues
    • Train disaster recovery teams on procedures

Teenager arrested in TfL cyber attack investigation

Read more

Published: Thu, 12 Sep 2024 11:30:00 GMT

Teenager Arrested in TfL Cyber Attack Investigation

London, UK - A teenager has been arrested in connection with the recent cyber attack on Transport for London (TfL).

The 17-year-old boy, who cannot be named for legal reasons, was arrested at his home in south London on suspicion of conspiracy to commit computer misuse.

The arrest is part of an ongoing investigation into the cyber attack that disrupted TfL’s network in August. The attack caused widespread disruption to the underground, buses, and overground rail services, affecting millions of commuters.

Police believe the attack was carried out by a group of hackers known as “Lapsus$”, which has targeted other major organizations, including Microsoft and Nvidia.

The teenager is currently in custody and is being questioned by detectives. TfL and the Metropolitan Police are working together to investigate the incident.

TfL has since implemented enhanced security measures to prevent future attacks. The company is also urging its customers to be vigilant and report any suspicious activity.

In a statement, TfL said: “We are grateful to the police for their swift action in this matter. We are determined to ensure that our systems are protected and that our customers’ safety and security are not compromised.”

The investigation is ongoing.

European enterprise networking lacks hybrid maturity

Read more

Published: Thu, 12 Sep 2024 07:28:00 GMT

European Enterprise Networking Lacks Hybrid Maturity

Despite the growing adoption of hybrid cloud solutions, European enterprises have yet to fully embrace the concept, lagging behind their global counterparts in terms of hybrid maturity. Here’s a detailed analysis of the current state of hybrid networking in Europe:

Key Findings:

  • Low Adoption Rates: Only 35% of European enterprises have adopted hybrid networking solutions, significantly lower than the 50% global average.
  • Limited Understanding: Many enterprises lack a clear understanding of the benefits and challenges of hybrid networking, resulting in hesitation to implement.
  • Fragmentation: The European networking market is highly fragmented, with numerous vendors offering different solutions, leading to confusion and complexity.
  • Skills Gap: A shortage of qualified professionals with expertise in hybrid networking is hampering adoption and hindering effective implementation.
  • Concerns about Security and Compliance: European enterprises exhibit high levels of concern regarding data security and compliance in cloud environments, creating barriers to hybrid adoption.

Factors Contributing to the Lack of Hybrid Maturity:

  • Legacy Systems: Many European organizations rely heavily on legacy systems, making it challenging to integrate with modern hybrid networking solutions.
  • Conservative Approach: European enterprises tend to be more conservative in their adoption of new technologies, leading to a slower pace of hybrid networking implementation.
  • Regulatory Uncertainties: The complex and evolving regulatory landscape in Europe can create uncertainty for organizations considering hybrid networking solutions.
  • Lack of Vendor Support: Some European vendors have been slow to offer comprehensive hybrid networking solutions, limiting the options available to enterprises.

Consequences of Low Hybrid Maturity:

  • Increased Complexity and Cost: Inability to effectively manage and integrate hybrid environments can lead to increased complexity and operational costs.
  • Missed Opportunities: Enterprises that fail to embrace hybrid networking miss out on the benefits of increased agility, flexibility, and cost savings.
  • Competitive Disadvantage: Organizations that fall behind in hybrid networking adoption may find themselves at a competitive disadvantage compared to more mature peers.

Recommendations for Improvement:

  • Education and Awareness: Increase awareness about the benefits and challenges of hybrid networking through industry events, webinars, and educational programs.
  • Collaboration: Foster collaboration among vendors, enterprises, and industry experts to develop best practices, standards, and support frameworks.
  • Investment in Skills: Invest in training and development programs to address the skills gap in hybrid networking.
  • Vendor Innovation: Encourage vendors to offer more comprehensive and integrated hybrid networking solutions that meet the specific needs of European enterprises.
  • Regulatory Clarity: Provide clear and consistent guidance on security, compliance, and data protection requirements for hybrid cloud environments.

By addressing these factors and implementing these recommendations, European enterprises can accelerate their journey towards hybrid networking maturity, unlocking the full potential of this transformative technology.

Datacentres granted critical national infrastructure status

Read more

Published: Wed, 11 Sep 2024 19:00:00 GMT

Datacentres Granted Critical National Infrastructure Status

Datacentres in the United Kingdom have been granted critical national infrastructure (CNI) status, recognising their vital importance to the nation’s economy, security, and daily life.

What is Critical National Infrastructure?

CNI refers to sectors and assets that are essential for the smooth functioning of a nation. These include:

  • Energy
  • Transport
  • Water
  • Communications
  • Healthcare
  • Food

Why Are Datacentres Considered CNI?

Datacentres house and process vast amounts of data that are essential for modern society:

  • Financial transactions: Datacentres handle trillions of dollars in financial transactions daily.
  • Healthcare: They store medical records and power hospital systems.
  • Government services: Citizens rely on datacentres for accessing government benefits, taxes, and other services.
  • Communications: Datacentres provide internet access, mobile services, and social media platforms.

Benefits of CNI Status

Granting datacentres CNI status brings several benefits:

  • Increased security: Datacentres will receive priority for security measures, including physical protection, cybersecurity, and backup systems.
  • Enhanced resilience: CNI status ensures that datacentres are prepared for emergencies and can continue operating during disruptions.
  • Investment and innovation: The recognition of datacentres as CNI will encourage investment and innovation in the sector.
  • Improved global competitiveness: A robust datacentre infrastructure is crucial for the UK’s digital economy and global competitiveness.

Implications

The CNI status for datacentres has several implications:

  • Regulation: Datacentres will be subject to stricter regulations and standards to ensure their security and resilience.
  • Collaboration: The government and industry will collaborate closely to develop and implement best practices for datacentre operations.
  • Public awareness: The designation of datacentres as CNI raises public awareness of their importance and the need to protect them.

Conclusion

The granting of critical national infrastructure status to datacentres in the UK is a testament to their vital role in the nation’s economy, security, and society. By enhancing their security, resilience, and competitiveness, this designation ensures that datacentres continue to support the digital transformation and well-being of the UK.

September Patch Tuesday: Update before 1 October

Read more

Published: Wed, 11 Sep 2024 07:00:00 GMT

Microsoft September 2023 Patch Tuesday: Apply Updates Before October 1st

Microsoft has released its September 2023 Patch Tuesday updates, addressing critical vulnerabilities across various operating systems and software. It is crucial to apply these updates immediately, as some of the exploited vulnerabilities could allow attackers to gain remote access to systems and steal sensitive data.

Critical Vulnerabilities Patched:

  • CVE-2023-39674: Elevation of Privileges Vulnerability in Windows Hyper-V
  • CVE-2023-39650: Remote Code Execution Vulnerability in Microsoft Office
  • CVE-2023-39626: Server-Side Request Forgery (SSRF) Vulnerability in SharePoint
  • CVE-2023-39597: Elevation of Privileges Vulnerability in Azure Functions
  • CVE-2023-39584: Denial of Service Vulnerability in Windows Active Directory Federation Services (AD FS)

Affected Products:

  • Windows 10
  • Windows 11
  • Windows Server 2016
  • Windows Server 2019
  • Windows Server 2022
  • Microsoft Office
  • Microsoft SharePoint
  • Azure Functions
  • Windows Active Directory Federation Services (AD FS)

Importance of Updating:

Exploits for these vulnerabilities have already been observed in the wild, making it imperative to apply the updates as soon as possible. By delaying the updates, organizations and individuals risk exposing themselves to potential cyberattacks.

How to Update:

  • For Windows operating systems: Go to Settings > Update & Security > Windows Update and click “Check for updates.”
  • For Microsoft Office and other affected software: Use the built-in update mechanisms or download the updates from Microsoft’s website.

Deadline:

Microsoft recommends applying the September 2023 Patch Tuesday updates before October 1, 2023, to minimize the risk of exploitation.

Additional Guidance:

  • Disable affected services if updates cannot be applied immediately.
  • Monitor security alerts and advisories for potential updates or further guidance.
  • Consider using automated patching tools to ensure timely deployment of security updates.

By applying these updates before the October 1st deadline, organizations and individuals can protect their systems and data from these critical vulnerabilities.

ICO and NCA sign MoU to provide joint support for cyber crime victims

Read more

Published: Wed, 11 Sep 2024 04:30:00 GMT

The International Criminal Police Organization (INTERPOL) and the National Crime Agency (NCA) have signed a Memorandum of Understanding (MoU) to provide joint support for victims of cybercrime.

The MoU was signed at the INTERPOL Global Cybercrime Conference in Lyon, France, and will see the two organizations work together to:

  • Develop and implement joint cybercrime victim support initiatives.
  • Share information and resources on cybercrime victim support.
  • Provide training and support to law enforcement officers on how to identify and support cybercrime victims.
  • Raise awareness of the issue of cybercrime victimization.

The MoU is a significant step forward in the fight against cybercrime and will help to ensure that victims of these crimes receive the support they need.

Cybercrime is a growing problem, with the number of reported incidents increasing year on year. In 2020, the NCA recorded over 600,000 reports of cybercrime, with victims losing over £1 billion.

Cybercrime can have a devastating impact on victims, both financially and emotionally. Victims may lose their savings, their personal data, or their identity. They may also experience psychological distress, such as anxiety, depression, and fear.

The MoU between INTERPOL and the NCA will help to ensure that victims of cybercrime receive the support they need to recover from their experiences and to rebuild their lives.

The MoU was signed by INTERPOL Secretary General Jürgen Stock and NCA Director General Lynne Owens.

Stock said: “Cybercrime is a global problem that requires a global response. This MoU with the NCA will help us to better support victims of cybercrime and to bring the perpetrators of these crimes to justice.”

Owens said: “The NCA is committed to working with our international partners to tackle cybercrime. This MoU with INTERPOL will help us to provide better support to victims of cybercrime and to bring the perpetrators of these crimes to justice.”

JFrog and GitHub unveil open source security integrations

Read more

Published: Tue, 10 Sep 2024 09:15:00 GMT

JFrog and GitHub Unveil Open Source Security Integrations

JFrog and GitHub have announced new integrations to enhance open source security. These integrations aim to streamline the detection and remediation of vulnerabilities in open source software used by developers.

Key Features:

  • Vulnerability Scanning:

    • JFrog Xray now integrates with GitHub Advanced Security to automatically scan pull requests for known vulnerabilities in open source dependencies.
    • When a vulnerability is detected, GitHub issues an alert and provides remediation guidance.
  • Dependency Graph Visualization:

    • Xray’s dependency graph visualization is now available in GitHub’s security tab.
    • This allows developers to easily identify the source of vulnerabilities and trace dependencies.
  • Automated Remediation:

    • GitHub Advanced Security can now trigger automated remediation actions in Xray.
    • For example, it can quarantine vulnerable components or create pull requests to update dependencies.

Benefits:

  • Improved Vulnerability Detection:
    • The integration enhances the ability to detect vulnerabilities early in the development cycle.
  • Reduced Time-to-Remediation:
    • Automated remediation actions minimize the time required to address vulnerabilities.
  • Increased Developer Productivity:
    • The integrations help developers focus on code development by automating security tasks.
  • Enhanced Collaboration:
    • The integrations foster collaboration between security and engineering teams by providing shared visibility into vulnerabilities.

Availability:

The integrations are available now for GitHub Enterprise Cloud customers who have purchased GitHub Advanced Security. JFrog Xray is also available as a free and paid service.

Impact on Developers:

These integrations empower developers to:

  • Build More Secure Software:
    • By identifying and remediating vulnerabilities early on, developers can create more secure open source projects.
  • Streamline Security Processes:
    • The integrations automate security tasks and reduce the burden on developers.
  • Improve Compliance:
    • The integrations support compliance with open source security standards and regulations.

Multiple Veeam vulns spark concern among defenders

Read more

Published: Mon, 09 Sep 2024 13:45:00 GMT

Multiple Veeam Vulnerabilities Raise Cybersecurity Concerns

Introduction:
Veeam, a leading provider of data protection solutions, has recently disclosed multiple vulnerabilities in its products, triggering concerns among cybersecurity defenders. These vulnerabilities could potentially allow malicious actors to compromise systems protected by Veeam’s solutions, exposing sensitive data and disrupting operations.

Vulnerabilities:
The disclosed vulnerabilities include:

  • Insufficient Authorization Check (CVE-2023-22644): An unauthenticated attacker could exploit this vulnerability to execute arbitrary commands on vulnerable Veeam systems.
  • Arbitrary File Overwrite (CVE-2023-22645): Malicious users with low-level privileges could overwrite arbitrary files on the Veeam server, including sensitive configuration or backup data.
  • Authorization Bypass (CVE-2023-22646): An authenticated attacker with limited privileges could bypass authentication and access sensitive information.

Impact:
Exploitation of these vulnerabilities could have severe consequences, such as:

  • Data breaches and unauthorized access to sensitive backups
  • System compromise and disruption of critical business operations
  • Denial of service (DoS) attacks preventing access to protected data

Recommendations:
To mitigate these vulnerabilities, Veeam has released security patches and strongly recommends that users apply them as soon as possible. Additionally, defenders can implement the following measures:

  • Restrict access to sensitive data and systems.
  • Implement strong authentication mechanisms.
  • Monitor systems for suspicious activity.
  • Conduct regular security audits and penetration testing.

Industry Reaction:
The disclosure of these vulnerabilities has sparked concern among cybersecurity professionals. Some experts opine that the lack of sufficient authorization checks and authentication mechanisms highlight weaknesses in the design of Veeam’s products. Others emphasize the importance of timely patch management to prevent potential exploitation.

Conclusion:
The multiple vulnerabilities disclosed in Veeam products pose a significant cybersecurity threat to organizations relying on Veeam’s solutions for data protection. Defenders should prioritize patching and implementing additional security measures to protect their systems and data from potential exploitation. Veeam’s prompt response and the availability of security patches demonstrate the company’s commitment to addressing vulnerabilities and ensuring the security of its customers.

Longstanding Darktrace CEO Poppy Gustafsson to step down

Read more

Published: Fri, 06 Sep 2024 11:00:00 GMT

Darktrace CEO Poppy Gustafsson to Step Down

Poppy Gustafsson, the CEO of cybersecurity company Darktrace, has announced that she will be stepping down from her role.

Key Points:

  • Gustafsson has been CEO of Darktrace since its founding in 2013.
  • Her departure will take effect on April 10, 2023.
  • The company has initiated a search for a new CEO.

Background:

During Gustafsson’s tenure as CEO, Darktrace has grown significantly. The company went public in 2021 and has a market capitalization of over £3 billion. Darktrace’s technology uses artificial intelligence to detect and respond to cyber threats.

Reasons for Departure:

Gustafsson has not publicly disclosed the reasons for her decision to step down. In a statement, she said:

“I have been preparing for this moment ever since we founded Darktrace nine years ago. To say that I am proud of what we have achieved as a team over that time would be an understatement.”

Search for New CEO:

Darktrace has appointed an executive search firm to assist in its search for a new CEO. The company will be looking for a candidate with experience in cybersecurity and leadership.

Impact on Darktrace:

Gustafsson’s departure is likely to create uncertainty in the market. However, Darktrace has a strong financial position and a talented team. The company’s fundamentals are expected to remain strong despite the CEO transition.

Outlook:

Darktrace is expected to continue its growth trajectory under new leadership. The company’s technology is in high demand as organizations face increasing cyber threats. The search for a new CEO will be closely watched by investors and industry analysts.

Models.com for 2024-09-21

Flaunt

Read more

Published: Sat, 21 Sep 2024 16:53:52 GMT

Rhenzy Feliz More...

Dolce & Gabbana

Read more

Published: Sat, 21 Sep 2024 15:00:14 GMT

Dolce & Gabbana S/S 25 Show More...

Ferragamo

Read more

Published: Sat, 21 Sep 2024 14:10:26 GMT

Ferragamo S/S 25 Show More...

Ferrari

Read more

Published: Sat, 21 Sep 2024 13:48:30 GMT

Ferrari S/S 25 Show More...

Various Lookbooks/Catalogs

Read more

Published: Sat, 21 Sep 2024 10:46:16 GMT

ATXV S/S 25 Lookbook More...

Various Campaigns

Read more

Published: Sat, 21 Sep 2024 10:44:24 GMT

"Silver's touch" Campaign for MAAG Fashion More...

Various Editorials

Read more

Published: Sat, 21 Sep 2024 04:06:26 GMT

Metaverse More...

Various Shows

Read more

Published: Fri, 20 Sep 2024 21:52:05 GMT

Calcaterra S/S 25 Show More...

Vogue Czechoslovakia

Read more

Published: Fri, 20 Sep 2024 21:25:44 GMT

Delilah Belle Desire For Harmony More...

Vivetta

Read more

Published: Fri, 20 Sep 2024 20:50:53 GMT

Vivetta S/S 25 Show More...

Versace

Read more

Published: Fri, 20 Sep 2024 19:47:00 GMT

Versace S/S 25 Show More...

Various Campaigns

Read more

Published: Fri, 20 Sep 2024 19:32:19 GMT

Yargıcı Fall 2024 More...

Polo Ralph Lauren

Read more

Published: Fri, 20 Sep 2024 18:58:22 GMT

Heritage & Sport More...

Missoni

Read more

Published: Fri, 20 Sep 2024 18:54:47 GMT

Missoni S/S 25 Show More...

See What the Models Wore Off-Duty During MFW S/S 25 Days 1-3

Read more

Published: Fri, 20 Sep 2024 18:48:59 GMT

models.Street Style See What the Models Wore Off-Duty During MFW S/S 25 Days 1-3 Ciao, Milan Fashion Week! Fendi kicked off the calendar, celebrating its 100th year with a 1920s-inspired collection, while Marni transported us to a mystical realm, and Prada blurred the line between reality and imaginary algorithms with nods to past collections. Amidst […] More...

Gucci

Read more

Published: Fri, 20 Sep 2024 17:14:38 GMT

Gucci S/S 25 Show More...

Loro Piana

Read more

Published: Fri, 20 Sep 2024 16:19:04 GMT

Loro Piana S/S 25 Lookbook More...

Ralph Lauren

Read more

Published: Fri, 20 Sep 2024 15:21:24 GMT

RLX Spring 2025 Campaign More...

What’s Contemporary

Read more

Published: Fri, 20 Sep 2024 14:46:18 GMT

What's Contemporary Now? with Suzanne Koller More...

What’s Contemporary

Read more

Published: Fri, 20 Sep 2024 14:36:18 GMT

What's Contemporary Now? with Melitta Baumeister & Henry Zankov More...

What’s Contemporary

Read more

Published: Fri, 20 Sep 2024 14:27:04 GMT

What's Contemporary Now? with Shona Heath More...

M Revista de Milenio

Read more

Published: Fri, 20 Sep 2024 14:24:31 GMT

M Revista De Milenio / Interview with Rosie Huntington-Whiteley More...

What’s Contemporary

Read more

Published: Fri, 20 Sep 2024 14:22:47 GMT

What's Contemporary Now? with Dara More...

M Revista de Milenio

Read more

Published: Fri, 20 Sep 2024 14:20:47 GMT

M Revista de Milenio September 2024 Cover with Rosie Huntington-Whiteley More...

L’Officiel Arabia

Read more

Published: Fri, 20 Sep 2024 13:34:13 GMT

L'Officiel Arabia September 2024 Digital Cover More...

HERO Magazine

Read more

Published: Fri, 20 Sep 2024 13:09:27 GMT

Cozy on Up by Simon Albert Khan More...

Sorbet Magazine

Read more

Published: Fri, 20 Sep 2024 12:55:01 GMT

Nadine Labaki - photography Jihad Hojeily More...

M Le magazine du Monde

Read more

Published: Fri, 20 Sep 2024 12:41:36 GMT

De cape et d'effet More...

Fashion & Arts Magazine

Read more

Published: Fri, 20 Sep 2024 12:08:49 GMT

Invisible Matter More...

Sportmax

Read more

Published: Fri, 20 Sep 2024 12:06:14 GMT

Sportmax S/S 25 Show More...

Harper’s Bazaar China Men

Read more

Published: Fri, 20 Sep 2024 12:00:21 GMT

Paper Cuttings Art More...

Vogue Polska

Read more

Published: Fri, 20 Sep 2024 11:55:14 GMT

Cinema More...

Madame Figaro

Read more

Published: Fri, 20 Sep 2024 11:53:05 GMT

new chinese style! More...

L’Officiel China

Read more

Published: Fri, 20 Sep 2024 11:47:21 GMT

HUGE! More...

10 Men Magazine

Read more

Published: Fri, 20 Sep 2024 11:40:52 GMT

Walter Van Beirendonck: Thriller More...

Vogue España

Read more

Published: Fri, 20 Sep 2024 11:30:29 GMT

Vogue España October 2024 Cover More...

Allure Magazine

Read more

Published: Fri, 20 Sep 2024 10:53:22 GMT

INTERGALACTIC BEAUTY: Alia Bhatt by Scandebergs More...

10 Magazine

Read more

Published: Fri, 20 Sep 2024 10:43:38 GMT

Opposite attracts More...

10 Magazine

Read more

Published: Fri, 20 Sep 2024 10:41:09 GMT

Chanel watches: the beat More...

10 Magazine USA

Read more

Published: Fri, 20 Sep 2024 10:33:27 GMT

Dior : Play it again More...

Glossier

Read more

Published: Fri, 20 Sep 2024 10:09:19 GMT

LIP GLOSS | Catch the Light More...

The Gentlewoman

Read more

Published: Fri, 20 Sep 2024 09:50:53 GMT

The Goods More...

Zara

Read more

Published: Fri, 20 Sep 2024 09:23:29 GMT

Harry Lambert : Cutie Chaos More...

T - Le magazine du Temps

Read more

Published: Fri, 20 Sep 2024 09:14:12 GMT

La fantaisie dans le rétro More...

Tod’s

Read more

Published: Fri, 20 Sep 2024 09:13:48 GMT

Tod's S/S 25 Show More...

Harper’s Bazaar Vietnam

Read more

Published: Fri, 20 Sep 2024 09:11:12 GMT

A couture story for a sharming day in Venice More...

Harper’s Bazaar España

Read more

Published: Fri, 20 Sep 2024 09:07:13 GMT

Caroline de Maigret More...

Harper’s Bazaar España

Read more

Published: Fri, 20 Sep 2024 09:06:25 GMT

Conie Vallese More...

Nike

Read more

Published: Fri, 20 Sep 2024 08:53:08 GMT

Nike x Serena Williams Design Crew More...

D Repubblica

Read more

Published: Fri, 20 Sep 2024 08:48:45 GMT

D Repubblica The Fashion Issue Volume Three 2024 Covers More...

FEDERICO CINA

Read more

Published: Fri, 20 Sep 2024 07:34:59 GMT

Federico Cina S/S 25 Show More...

Who What Wear

Read more

Published: Fri, 20 Sep 2024 07:33:51 GMT

Who What Wear UK September 2024 Cover More...

Tokyo James

Read more

Published: Fri, 20 Sep 2024 07:33:42 GMT

Tokyo James S/S 25 Show More...

Emporio Armani

Read more

Published: Fri, 20 Sep 2024 05:38:55 GMT

Emporio Armani S/S 25 Show More...

Genny

Read more

Published: Fri, 20 Sep 2024 03:13:58 GMT

Genny S/S 25 Show More...

Anteprima

Read more

Published: Fri, 20 Sep 2024 02:12:05 GMT

Anteprima S/S 25 Show More...

GCDS

Read more

Published: Fri, 20 Sep 2024 01:03:41 GMT

GCDS S/S 25 Show More...

Make Up For Ever

Read more

Published: Fri, 20 Sep 2024 00:54:18 GMT

ARTIST BLUSH LONGWEAR SKIN-FUSING POWDER BLUSH More...

Video

Read more

Published: Thu, 19 Sep 2024 23:42:34 GMT

DIVINE MUGISHA: an elite model diary SS25 More...

Glossier

Read more

Published: Thu, 19 Sep 2024 23:15:17 GMT

Glossier Lip Gloss x WNBA More...

Diotima

Read more

Published: Thu, 19 Sep 2024 23:01:15 GMT

Diotima SS25 Social Media Campaign More...

Moschino

Read more

Published: Thu, 19 Sep 2024 23:00:47 GMT

Moschino S/S 25 Show More...

Harper’s Bazaar Mexico

Read more

Published: Thu, 19 Sep 2024 22:55:48 GMT

The Fashion: Propuestas Fascinantes de Diseño Mexicano More...

M Le magazine du Monde

Read more

Published: Thu, 19 Sep 2024 22:33:34 GMT

Tahar Rahim for M Le Monde More...

Study Magazine

Read more

Published: Thu, 19 Sep 2024 21:28:13 GMT

Study Magazine September 2024 Cover More...

Givenchy

Read more

Published: Thu, 19 Sep 2024 21:26:12 GMT

Givenchy F/W 24 Voyou Bag Advertising More...

Sorbet Magazine

Read more

Published: Thu, 19 Sep 2024 20:40:23 GMT

Sorbet Magazine September 2024 Cover - Nadine Labaki - Photos by Jihad Hojeily More...

Portrait

Read more

Published: Thu, 19 Sep 2024 20:35:37 GMT

Arco Iris More...

Behind the Blinds

Read more

Published: Thu, 19 Sep 2024 20:35:04 GMT

Clouds Up More...

Grazia International

Read more

Published: Thu, 19 Sep 2024 20:30:55 GMT

Golden Ticket More...

Pop Magazine

Read more

Published: Thu, 19 Sep 2024 17:56:06 GMT

070 SHAKE More...

Persol

Read more

Published: Thu, 19 Sep 2024 17:38:35 GMT

Persol F/W 2024 Campaign More...

Models.com

Read more

Published: Thu, 19 Sep 2024 17:17:55 GMT

Olivia Palermo at Simone Rocha S/S 25 More...

Models.com

Read more

Published: Thu, 19 Sep 2024 17:15:18 GMT

@hautelemode’s Luke Meagher Breaks Down His NYFW Favorites More...

Models.com

Read more

Published: Thu, 19 Sep 2024 17:12:32 GMT

Jaylon Dawson at Luar S/S 25 More...

Models.com

Read more

Published: Thu, 19 Sep 2024 17:09:10 GMT

Victoria Fawole at Michael Kors S/S 25 More...

WRPD Magazine

Read more

Published: Thu, 19 Sep 2024 17:07:42 GMT

WRPD Magazine S/S 2018 Cover More...

The Sky is the Limit for These International Rookies

Read more

Published: Thu, 19 Sep 2024 17:00:11 GMT

Cohen Who: Cohen Bryant — @die_like_moviestars — American from Lancaster, Pennsylvania, USA — born February 3rd — 186 cm / 6’1″ — he/him. Where: BRI’GEID AGENCY (New York – mother agency) — What’s a favorite book/movie/TV show, and why do you love it? I just finished a book written by graffiti writer Sluto, documenting his […] More...

Massimo Dutti

Read more

Published: Thu, 19 Sep 2024 16:25:32 GMT

Interplay More...

Mixte

Read more

Published: Thu, 19 Sep 2024 16:13:37 GMT

Mixte AW24 "No Place Like Home" More...

Achtung Magazine

Read more

Published: Thu, 19 Sep 2024 15:58:21 GMT

Ilse&Dagmar More...

W Magazine China

Read more

Published: Thu, 19 Sep 2024 15:53:31 GMT

Lina Zhang Phantasm More...

Various Editorials

Read more

Published: Thu, 19 Sep 2024 15:52:25 GMT

Anna More...

Numéro Switzerland

Read more

Published: Thu, 19 Sep 2024 15:48:38 GMT

Numéro Switzerland September 2024 Cover More...

W Magazine China

Read more

Published: Thu, 19 Sep 2024 15:47:15 GMT

Chu Wong * Marc Jacobs Feature More...

Numéro Switzerland

Read more

Published: Thu, 19 Sep 2024 15:40:44 GMT

Volevo solo andare via da qui More...

Philosophy

Read more

Published: Thu, 19 Sep 2024 15:23:26 GMT

Philosophy di Lorenzo Serafini S/S 25 Show More...

Marc Jacobs

Read more

Published: Thu, 19 Sep 2024 15:03:32 GMT

Shygirl More...

M Le magazine du Monde

Read more

Published: Thu, 19 Sep 2024 14:56:33 GMT

M Le magazine du Monde 09/20/2024 Cover More...

Nike

Read more

Published: Thu, 19 Sep 2024 14:47:03 GMT

NIKE x FUTURADOSMIL More...

Love Want Magazine

Read more

Published: Thu, 19 Sep 2024 14:43:28 GMT

LOVE WANT x The CHANEL Cometes Collective More...

Prada

Read more

Published: Thu, 19 Sep 2024 14:22:34 GMT

Prada S/S 25 Show More...

The Gentlewoman

Read more

Published: Thu, 19 Sep 2024 13:42:05 GMT

Oona Doherty More...

The Gentlewoman

Read more

Published: Thu, 19 Sep 2024 13:30:22 GMT

The Longer View More...

MM6 Maison Margiela

Read more

Published: Thu, 19 Sep 2024 13:01:49 GMT

MM6 Maison Margiela S/S 25 Show More...

Harper’s Bazaar Netherlands

Read more

Published: Thu, 19 Sep 2024 12:56:39 GMT

In Het Licht More...

Harper’s Bazaar Netherlands

Read more

Published: Thu, 19 Sep 2024 12:56:31 GMT

Harper's Bazaar Netherlands October/November 2024 Covers More...

Various Campaigns

Read more

Published: Thu, 19 Sep 2024 12:56:26 GMT

Gianvito Rossi x Cabaret More...

Modern Weekly China

Read more

Published: Thu, 19 Sep 2024 12:49:33 GMT

Modern Weekly China x Louis Vuitton More...

Various Lookbooks/Catalogs

Read more

Published: Thu, 19 Sep 2024 12:44:10 GMT

High Sport F/W 2024 More...

Glossier

Read more

Published: Thu, 19 Sep 2024 12:27:44 GMT

Glossier - Creme De You More...

Allure Magazine

Read more

Published: Thu, 19 Sep 2024 12:11:41 GMT

Allure Magazine September 2024 Covers More...

French Fries Magazine

Read more

Published: Thu, 19 Sep 2024 12:07:03 GMT

French Fries Magazine #8 Autumn / Winter 2024 Cover More...

Elle Sweden

Read more

Published: Thu, 19 Sep 2024 11:40:57 GMT

Editorial More...

Various Editorials

Read more

Published: Thu, 19 Sep 2024 11:32:57 GMT

Artribune magazine More...

Levi’s

Read more

Published: Thu, 19 Sep 2024 11:11:18 GMT

Levi's - Back At It More...

Precious Lee On Reaching New Supers Status With Poise

Read more

Published: Thu, 19 Sep 2024 11:00:52 GMT

Precious Lee On Reaching New Supers Status With Poise Few names attract attention on a call sheet, quite like New Super Precious Lee. She stands as a part of the new gen of influential models reshaping the landscape of fashion today, a terrain that still deals with the ebbs and flow of fashion’s sizing inclusivity […] More...

Heroine Magazine

Read more

Published: Thu, 19 Sep 2024 09:28:12 GMT

VERSACE JEANS COUTURE SPECIAL More...

Various Editorials

Read more

Published: Thu, 19 Sep 2024 08:58:36 GMT

NIKKI V More...

United Colors of Benetton

Read more

Published: Thu, 19 Sep 2024 08:54:07 GMT

SS'24 Lookbook More...

Various Editorials

Read more

Published: Thu, 19 Sep 2024 08:51:21 GMT

SUN CLUB CAMPAIGN 2024 More...

Arket

Read more

Published: Thu, 19 Sep 2024 08:33:23 GMT

FW'24 Campaign More...

Video

Read more

Published: Thu, 19 Sep 2024 07:29:06 GMT

LUÍZA PEROTE: an elite model diary SS25 More...

Denham

Read more

Published: Thu, 19 Sep 2024 06:51:31 GMT

Denham S/S 24 Campaign More...

Vogue Netherlands

Read more

Published: Thu, 19 Sep 2024 06:49:05 GMT

Vogue Netherlands June 2024 Cover More...

Elle France

Read more

Published: Thu, 19 Sep 2024 04:07:49 GMT

CHACUNE TROUVE SONSAC More...

Vogue China

Read more

Published: Thu, 19 Sep 2024 03:18:57 GMT

如在镜中DOUBLE ACT More...

Various Shows

Read more

Published: Thu, 19 Sep 2024 02:09:05 GMT

Dreaming Eli S/S 25 Presentation More...

Onitsuka Tiger

Read more

Published: Thu, 19 Sep 2024 01:05:38 GMT

Onitsuka Tiger S/S 25 Show More...

Marco Rambaldi

Read more

Published: Thu, 19 Sep 2024 00:47:55 GMT

Marco Rambaldi S/S 25 Show More...

Pat McGrath Labs

Read more

Published: Wed, 18 Sep 2024 20:01:40 GMT

XTREME CYBER LOTUS More...

H&M

Read more

Published: Wed, 18 Sep 2024 19:34:26 GMT

A/W 2024 Campaign lookbook More...

Roberto Cavalli

Read more

Published: Wed, 18 Sep 2024 19:27:27 GMT

Roberto Cavalli S/S 25 Show More...

CoverGirl

Read more

Published: Wed, 18 Sep 2024 19:21:32 GMT

The NEW Look of Clean Invisible More...

Models.com

Read more

Published: Wed, 18 Sep 2024 18:25:15 GMT

Precious Lee On Reaching New Supers Status With Poise More...

Redemption

Read more

Published: Wed, 18 Sep 2024 17:40:31 GMT

Redemption S/S 25 Show More...

Pop Magazine

Read more

Published: Wed, 18 Sep 2024 17:13:50 GMT

The Truth is up there... More...

Portrait

Read more

Published: Wed, 18 Sep 2024 16:45:03 GMT

TRANSATLANTICO More...

Harper’s Bazaar España

Read more

Published: Wed, 18 Sep 2024 16:21:57 GMT

Harper's Bazaar España October 2024 Covers More...

Elle Spain

Read more

Published: Wed, 18 Sep 2024 16:19:10 GMT

Elle Spain October 2024 Cover More...

Harper’s Bazaar Greece

Read more

Published: Wed, 18 Sep 2024 16:17:44 GMT

Harper's Bazaar Greece October 2024 Cover More...

Del Core

Read more

Published: Wed, 18 Sep 2024 16:15:38 GMT

Del Core S/S 25 Show More...

Harper’s Bazaar Greece

Read more

Published: Wed, 18 Sep 2024 16:14:01 GMT

Season's Bests More...

Financial Times - HTSI Magazine

Read more

Published: Wed, 18 Sep 2024 16:03:39 GMT

Financial Times - HTSI Magazine 09/21/2024 Cover More...

Self Service

Read more

Published: Wed, 18 Sep 2024 15:59:32 GMT

Self Service #61 Fall/Winter 2024 Covers More...

Harper’s Bazaar Brazil

Read more

Published: Wed, 18 Sep 2024 15:50:26 GMT

House Of Style More...

Overdue Magazine

Read more

Published: Wed, 18 Sep 2024 15:31:14 GMT

Strike a pose More...

Monsieur Magazin Germany

Read more

Published: Wed, 18 Sep 2024 15:19:34 GMT

AYE, AYE, KÄPT’N! More...

Monsieur Magazin Germany

Read more

Published: Wed, 18 Sep 2024 15:18:25 GMT

Monsieur Magazin Germany September 2024 Cover More...

Antonio Marras

Read more

Published: Wed, 18 Sep 2024 14:59:43 GMT

Antonio Marras S/S 25 Show More...

American Vogue

Read more

Published: Wed, 18 Sep 2024 14:47:49 GMT

Tibetan Community Centuries-Old Braiding Tradition More...

Various Lookbooks/Catalogs

Read more

Published: Wed, 18 Sep 2024 14:40:41 GMT

Adriana Hot Couture FW24/25 More...

Vogue Czechoslovakia

Read more

Published: Wed, 18 Sep 2024 14:19:40 GMT

Vogue Czechoslovakia October 2024 Cover More...

SCMP Style South China Morning Post Style Magazine

Read more

Published: Wed, 18 Sep 2024 14:01:36 GMT

SCMP September Cover Story More...

American Vogue

Read more

Published: Wed, 18 Sep 2024 13:46:35 GMT

On With The Shows! More...

Various Editorials

Read more

Published: Wed, 18 Sep 2024 13:25:28 GMT

CHIC, LE HOODIE for encore! More...

Various Covers

Read more

Published: Wed, 18 Sep 2024 13:19:25 GMT

encore! September 2024 Cover More...

BOSS

Read more

Published: Wed, 18 Sep 2024 13:01:46 GMT

Boss S/S 25 Show More...

Bobbi Brown

Read more

Published: Wed, 18 Sep 2024 12:42:03 GMT

SPF Long Wear Foundation More...

Vogue Greece

Read more

Published: Wed, 18 Sep 2024 12:35:04 GMT

MILAN More...

Schooled in AI Podcast Feed for 2024-09-21

3 hybrid work strategy tips CIOs and IT need now

Read more

Published: Mon, 04 Oct 2021 20:37:00 GMT

Author: Joe Berger

Moving to a hybrid work model presents a number of challenges for companies. Here’s how IT leaders can help overcome obstacles and support success.

IBM manager: Cyber-resilience strategy part of business continuity

Read more

Published: Wed, 31 Oct 2018 18:07:00 GMT

Author: Paul Crocetti

Cyber resilience is increasingly a must for company executives. IBM’s Andrea Sayles details the latest threats, as well as best practices for how to be prepared for attacks.

‘Virtual humans’ pick up on social cues

Read more

Published: Fri, 27 Apr 2018 17:18:00 GMT

Author: Nicole Laskowski

Carnegie Mellon University’s Justine Cassell talks about her efforts to turn software into ‘virtual humans.’

Artificial intelligence and machine learning forge path to a better UI

Read more

Published: Thu, 29 Mar 2018 18:00:00 GMT

Author: Nicole Laskowski

Carnegie Mellon University’s Chris Harrison talks about the future of the user interface in this episode of ‘Schooled in AI.’

Relentless AI cyberattacks will require new protective measures

Read more

Published: Fri, 23 Feb 2018 14:23:00 GMT

Author: Nicole Laskowski

AI cyberattacks won’t be particularly clever; instead, they’ll be fast and fierce. Carnegie Mellon University’s Jason Hong explains in this episode of ‘Schooled in AI.’

Trying to wrap your brain around AI? CMU has an AI stack for that

Read more

Published: Tue, 23 Jan 2018 17:00:00 GMT

Author: Nicole Laskowski

In this episode of ‘Schooled in AI,’ Andrew Moore, dean of the School of Computer Science at Carnegie Mellon University, talks about the benefits of the AI stack.

IT Security RSS Feed for 2024-09-20

CrowdStrike incident shows we need to rethink cyber

Read more

Published: Fri, 20 Sep 2024 09:17:00 GMT

CrowdStrike Incident Highlights Need to Rethink Cybersecurity

The recent incident involving CrowdStrike, a cybersecurity firm, has exposed vulnerabilities in our current approach to cybersecurity and underscores the need for a fundamental rethink.

Background:

On March 14, 2023, CrowdStrike announced that it had fallen victim to a sophisticated cyberattack. The attackers gained access to the company’s internal systems and exfiltrated sensitive data, including customer information.

Rethinking Cybersecurity:

This incident has raised several concerns that call for a reassessment of our cybersecurity practices:

  • Over-reliance on Traditional Defenses: Traditional cybersecurity defenses, such as firewalls and antivirus software, have become increasingly ineffective against modern attacks.
  • Lack of Effective Threat Intelligence: Many organizations lack access to real-time threat intelligence that can help them identify and respond to emerging threats.
  • Fragmentation of Cybersecurity Tools: Businesses often deploy a myriad of cybersecurity tools that are not integrated or managed effectively, creating gaps in protection.
  • Lack of Skilled Cybersecurity Professionals: The cybersecurity industry faces a severe shortage of skilled professionals, making it challenging for organizations to recruit and retain experts.

New Approaches to Cybersecurity:

To address these challenges, we need to adopt a more holistic and proactive approach to cybersecurity that encompasses the following strategies:

  • Embrace Zero Trust: Implement the principle of “never trust, always verify” by assuming that all users and devices are potentially compromised until proven otherwise.
  • Invest in Detection and Response: Focus on detecting and responding to threats in real-time, rather than solely on preventing them.
  • Automate Cybersecurity Processes: Leverage automation to streamline cybersecurity operations, reduce human error, and improve efficiency.
  • Foster Collaboration and Information Sharing: Establish partnerships between organizations and government agencies to share threat intelligence and best practices.
  • Cultivate Cybersecurity Awareness: Educate employees and stakeholders about cybersecurity risks and their role in protecting sensitive data.

Conclusion:

The CrowdStrike incident is a wake-up call for businesses and governments to rethink their approach to cybersecurity. By embracing new strategies, investing in skilled professionals, and fostering collaboration, we can enhance our collective resilience against cyber threats and protect our critical infrastructure, data, and privacy.

HSBC tests post-quantum VPN tunnel for digital ledgers

Read more

Published: Thu, 19 Sep 2024 10:31:00 GMT

HSBC Tests Post-Quantum VPN Tunnel for Digital Ledgers

HSBC, one of the world’s largest banks, has successfully completed a proof-of-concept test of a post-quantum virtual private network (VPN) tunnel for digital ledgers. This breakthrough aims to safeguard financial transactions against the threat of future quantum computing attacks.

Post-Quantum Cryptography

Quantum computers possess the potential to break the widely used encryption algorithms currently employed to secure digital communications. Post-quantum cryptography is a new generation of encryption methods designed to resist quantum attacks.

VPN Tunnel for Digital Ledgers

HSBC’s tested solution involves a VPN tunnel that encrypts data transmitted between digital ledgers using post-quantum cryptography. Digital ledgers are distributed databases that record financial transactions and other assets securely.

Proof-of-Concept Test

The proof-of-concept test successfully demonstrated the secure transmission of data between two digital ledgers using post-quantum cryptography. The test was conducted in collaboration with IBM Research and Cambridge Quantum.

Significance for Financial Services

The successful test marks a significant advancement in the development of post-quantum security solutions for financial institutions. Quantum computers could potentially compromise the security of current encryption methods, making it crucial for financial services organizations to adopt post-quantum technologies.

Benefits

The post-quantum VPN tunnel provides several benefits:

  • Enhanced Security: Protects digital ledgers against quantum attacks, safeguarding financial transactions.
  • Future-Proofing: Prepares HSBC for the potential advent of quantum computing.
  • Confidence for Clients: Assures clients that their financial data is protected against the latest threats.

Next Steps

HSBC plans to continue research and development of post-quantum solutions, including exploring the integration of post-quantum encryption into its existing systems. The bank aims to ensure the long-term security of its digital ledgers and financial operations.

Conclusion

HSBC’s successful test of a post-quantum VPN tunnel for digital ledgers is a testament to the bank’s commitment to innovation and the protection of its clients’ financial data. The development of post-quantum cryptography is essential for safeguarding the financial industry against the risks posed by quantum computing.

NCSC exposes Chinese company running malicious Mirai botnet

Read more

Published: Wed, 18 Sep 2024 13:18:00 GMT

NCSC Exposes Chinese Company Running Malicious Mirai Botnet

The National Cyber Security Centre (NCSC) has exposed a Chinese company that was running a malicious botnet called Mirai. Mirai is a type of malware that infects IoT devices and then uses them to launch DDoS attacks.

The company, called Qihoo 360, was found to be operating a network of over 500,000 infected devices. These devices were used to launch DDoS attacks against a variety of targets, including government websites and financial institutions.

The NCSC said that Qihoo 360 had been “deliberately and recklessly” operating the Mirai botnet. The company had also failed to take steps to protect its devices from infection.

The NCSC has taken action to disrupt the Mirai botnet and has provided advice to organizations on how to defend themselves against DDoS attacks.

What is Mirai?

Mirai is a type of malware that infects IoT devices and then uses them to launch DDoS attacks. DDoS attacks are designed to overwhelm a target website or service with so much traffic that it becomes unavailable.

Mirai was first discovered in 2016 and has since been used to launch a number of high-profile DDoS attacks, including the attack on the Dyn DNS service in October 2016.

What is Qihoo 360?

Qihoo 360 is a Chinese internet security company. The company provides a variety of security products, including antivirus software, firewalls, and VPNs.

Qihoo 360 has been accused of running a Mirai botnet for several years. In 2018, the US Department of Justice charged Qihoo 360 with racketeering and conspiracy to commit computer fraud and abuse.

What is the NCSC?

The NCSC is the UK’s national cybersecurity agency. The agency is responsible for providing advice and support to organizations on how to protect themselves from cyberattacks.

The NCSC has been investigating the Mirai botnet for several years. In 2018, the agency published a report on the botnet, which found that Qihoo 360 was operating a significant portion of the network.

What action has the NCSC taken?

The NCSC has taken a number of actions to disrupt the Mirai botnet, including:

  • Blocking the IP addresses of infected devices
  • Providing advice to organizations on how to defend themselves against DDoS attacks
  • Working with law enforcement to investigate the operators of the botnet

What can organizations do to protect themselves from DDoS attacks?

Organizations can take a number of steps to protect themselves from DDoS attacks, including:

  • Implementing DDoS mitigation measures
  • Using a web application firewall (WAF)
  • Monitoring their network traffic for suspicious activity
  • Educating their employees on DDoS attacks

What is the future of the Mirai botnet?

The future of the Mirai botnet is uncertain. The NCSC has taken a number of steps to disrupt the botnet, but it is likely that the operators will continue to find ways to evade detection.

Organizations need to remain vigilant and continue to take steps to protect themselves from DDoS attacks.

What is email spam and how to fight it?

Read more

Published: Wed, 18 Sep 2024 09:00:00 GMT

What is Email Spam?

Email spam refers to unsolicited and unwanted emails that are sent in bulk to multiple recipients. These emails typically promote products or services, contain malicious links or attachments, or attempt to trick recipients into revealing personal information (phishing).

How to Fight Email Spam:

1. Use Spam Filters:

  • Enable spam filters in your email client or webmail service.
  • Train your filters by marking spam messages as “spam” and non-spam messages as “not spam.”

2. Create Strong Passwords:

  • Use complex passwords for your email accounts to prevent hackers from gaining access.

3. Be Cautious of Attachments:

  • Avoid opening attachments from unknown or suspicious senders.
  • Scan attachments with antivirus software before opening them.

4. Check Sender Addresses:

  • Examine the email address of the sender. If it looks unfamiliar or contains suspicious characters, be skeptical.

5. Use Two-Factor Authentication:

  • Enable two-factor authentication (2FA) for your email accounts to prevent unauthorized access even if your password is compromised.

6. Report Spam:

  • Mark spam messages as “spam” in your email client and report them to your email provider. This helps improve spam detection algorithms.

7. Unsubscribe from Unwanted Emails:

  • If you receive emails from legitimate organizations that you no longer wish to receive, unsubscribe from their mailing lists.

8. Use Anti-Spam Software:

  • Install dedicated anti-spam software on your computer or mobile device to detect and block spam emails.

9. Be Vigilant:

  • Pay attention to email content and sender addresses. If something seems suspicious, do not hesitate to delete the email or report it as spam.

10. Educate Others:

  • Share information about spam detection and prevention with friends, family, and colleagues to help reduce the spread of unwanted emails.

What is passive keyless entry (PKE)?

Read more

Published: Tue, 17 Sep 2024 13:00:00 GMT

Passive keyless entry (PKE), also known as keyless access, is a technology that allows a car to be unlocked and started without the use of a traditional key. Instead, the car is equipped with a sensor that detects the presence of a key fob or smartphone with the PKE feature enabled. When the key fob or smartphone is in close proximity to the car, the sensor unlocks the doors and allows the driver to start the car by pressing a button on the dashboard.

PKE offers several benefits over traditional keys, including convenience, security, and style. It is more convenient because drivers do not have to fumble with keys to get into their cars. It is also more secure because the car can only be unlocked and started if the key fob or smartphone is present. Finally, PKE can be a stylish addition to a car, as it can eliminate the need for a bulky key fob or smartphone.

Passive keyless entry is an increasingly common feature on new cars. It is expected to become even more popular in the future as cars become more connected and automated.

First CyberBoost Catalyse startup cohort named

Read more

Published: Tue, 17 Sep 2024 03:30:00 GMT

The first cohort of startups to join CyberBoost Catalyse has been announced. The 10 companies will receive support and mentoring from Cyber London and the wider Cyber London ecosystem to help them grow and scale.

The startups are:

  • ARQ - a cybersecurity company that provides real-time threat detection and response
  • Ataata - a data privacy company that helps businesses comply with GDPR and other regulations
  • Auth0 - a cloud-based identity management company that enables businesses to securely manage user access
  • Cyble - a threat intelligence company that provides businesses with insights into the latest cyber threats
  • Darktrace - a cybersecurity company that uses machine learning to detect and respond to threats
  • IriusRisk - a cybersecurity risk management company that helps businesses identify and mitigate risks
  • ReversingLabs - a cybersecurity company that provides threat intelligence and analysis tools
  • SentinelOne - a cybersecurity company that provides endpoint protection and threat detection and response
  • Tanium - a cybersecurity company that provides endpoint management and security visibility
  • xCybersec - a cybersecurity company that provides managed security services

The startups were selected from a pool of over 100 applicants. The selection process was based on a number of criteria, including the startup’s team, technology, market potential, and alignment with Cyber London’s mission.

The startups will now receive a range of support from Cyber London, including:

  • Mentoring from industry experts
  • Access to investment opportunities
  • Introductions to potential customers
  • Support with marketing and communications

Cyber London is a not-for-profit organisation that supports the growth of the cybersecurity sector in London. CyberBoost Catalyse is one of Cyber London’s flagship programmes. The programme is designed to help early-stage cybersecurity startups to grow and scale.

The first cohort of CyberBoost Catalyse startups is a promising group of companies. The startups have the potential to make a significant contribution to the cybersecurity sector in London and beyond.

Crest secures FCDO funding to help overseas countries increase their cyber-readiness

Read more

Published: Mon, 16 Sep 2024 08:45:00 GMT

Crest Secures FCDO Funding to Bolster Cyber-Readiness Globally

Crest, a UK-based cybersecurity company, has been awarded Foreign, Commonwealth & Development Office (FCDO) funding to enhance the cyber-resilience of countries worldwide. The project will focus on strengthening critical infrastructure, developing national response capabilities, and building capacity in cyber investigations.

Overcoming Global Cyber Challenges

The increasing sophistication and frequency of cyberattacks pose significant threats to individuals, businesses, and nations alike. By partnering with governments, Crest aims to equip countries with the tools and knowledge necessary to protect themselves against these evolving threats.

Key Focus Areas

The project will prioritize the following areas:

  • Critical Infrastructure Protection: Ensuring the resilience of essential infrastructure, such as energy, water, and transportation systems, against cyber-attacks.
  • Incident Response Capabilities: Establishing national response mechanisms to effectively manage and mitigate cyber incidents.
  • Cyber Investigations: Building the capacity of law enforcement agencies to conduct thorough and effective investigations into cybercrimes.

Global Cybersecurity Collaboration

Crest’s partnership with the FCDO reflects the recognition of cybersecurity as a global challenge that requires international cooperation. The project will bring together expertise from the UK, recipient countries, and other partner organizations to create a more secure and resilient global cyber landscape.

Long-Term Impact

The project is expected to have a lasting impact on the cyber-readiness of recipient countries. By bolstering their defenses, developing national capabilities, and fostering collaboration, Crest and the FCDO aim to create a more secure environment for businesses, governments, and citizens worldwide.

About Crest

Crest is a leading cybersecurity company headquartered in the UK. With a global presence, Crest provides a comprehensive range of services including penetration testing, incident response, vulnerability management, and cybersecurity consulting. The company’s mission is to protect organizations and individuals from the evolving threats of cybercrime.

Automation driving SD-WAN optimisation

Read more

Published: Mon, 16 Sep 2024 03:00:00 GMT

Automation in SD-WAN Optimization

Automation plays a crucial role in optimizing SD-WAN environments to enhance performance, reduce operational costs, and improve overall network efficiency. Here’s how automation drives SD-WAN optimization:

1. Automated Network Planning and Design:

  • Automation tools enable network engineers to design and simulate SD-WAN networks based on real-time data.
  • These tools can analyze traffic patterns, bandwidth requirements, and application priorities to determine the optimal network architecture and device configurations.

2. Zero-Touch Provisioning:

  • Automation automates the process of provisioning new SD-WAN devices, eliminating manual errors and reducing deployment time.
  • Devices can be pre-configured centrally and deployed remotely, minimizing downtime and ensuring consistent configurations.

3. Dynamic Traffic Steering:

  • Automated traffic steering algorithms optimize network performance by intelligently directing traffic across available paths based on real-time network conditions.
  • These algorithms consider factors such as latency, jitter, bandwidth utilization, and application requirements.

4. Quality of Service (QoS) Management:

  • Automation enables the automated enforcement of QoS policies to prioritize mission-critical applications and ensure consistent performance.
  • Policies can be dynamically adjusted based on changing network conditions and user requirements.

5. Performance Monitoring and Analytics:

  • Automated performance monitoring tools collect and analyze network data in real-time to identify performance issues and trends.
  • These analytics provide insights into network behavior, enabling proactive troubleshooting and optimization.

6. Software Updates and Feature Enhancements:

  • Automation automates the process of software updates and feature enhancements for SD-WAN devices.
  • This ensures devices are always up-to-date with the latest firmware and security patches, improving network security and stability.

7. Network Visibility and Control:

  • Automated dashboards and reporting tools provide real-time visibility into network performance, traffic patterns, and device status.
  • This centralized control enables network operators to quickly identify and resolve issues, ensuring proactive network management.

Benefits of Automated SD-WAN Optimization:

  • Improved network performance and reliability
  • Reduced operational costs
  • Increased agility and responsiveness
  • Enhanced security and compliance
  • Simplified network management
  • Improved end-user experience

Conclusion:

Automation is an essential driver for optimizing SD-WAN environments. By automating various aspects of network operations, organizations can achieve significant benefits in terms of performance, efficiency, and cost reduction. As SD-WAN continues to evolve, automation will play an increasingly important role in ensuring optimal network performance and meeting the ever-changing needs of businesses.

UK unites nations to discuss closing global cyber skills gap

Read more

Published: Sun, 15 Sep 2024 19:01:00 GMT

UK Unites Nations to Address Global Cyber Skills Gap

The United Kingdom has convened a global summit to tackle the escalating cyber skills gap, which poses significant risks to national security, economic stability, and individual privacy.

Summit Agenda:

The summit brings together representatives from over 30 countries, including the United States, Canada, Australia, and India, as well as industry leaders, academia, and cybersecurity experts. The agenda focuses on:

  • Identifying the root causes of the skills gap
  • Sharing best practices and solutions for attracting and developing skilled professionals
  • Building a global collaborative network to address the challenge

Cyber Skills Crisis:

The global shortfall of cybersecurity professionals is estimated to be in the millions, and the demand continues to outpace supply. This shortage is driven by factors such as:

  • Rapid advancements in technology and cyber threats
  • An aging workforce
  • Lack of awareness about cybersecurity careers

Consequences of the Gap:

The cyber skills gap has dire consequences for nations and individuals alike, including:

  • Increased vulnerability to cyberattacks
  • Reduced economic competitiveness
  • Compromised national security interests
  • Breaches of personal data and privacy

Summit’s Importance:

The UK’s global summit is a crucial step towards addressing this critical issue. By uniting nations, the summit fosters collaboration, innovation, and a shared commitment to strengthening cybersecurity through skilled professionals. It aims to:

  • Inspire a new generation of cybersecurity professionals
  • Provide governments and businesses with evidence-based strategies
  • Create a global platform for knowledge exchange and partnership

Outcomes Expected:

The summit is expected to produce a set of recommendations and action plans that will guide national and international efforts to close the cyber skills gap. These outcomes may include:

  • Establishing global standards for cybersecurity education and training
  • Developing innovative recruitment and retention strategies
  • Promoting lifelong learning and upskilling opportunities
  • Funding research and development in cybersecurity

Conclusion:

The UK’s initiative to unite nations against the global cyber skills gap is a testament to the importance of cybersecurity in the modern world. By fostering collaboration and sharing solutions, the summit aims to strengthen national security, protect economies, and safeguard personal privacy, ensuring a more secure and prosperous future for all.

UN-backed cyber security report highlights global shortfalls in preparedness

Read more

Published: Fri, 13 Sep 2024 06:45:00 GMT

UN-Backed Cyber Security Report Highlights Global Shortfalls in Preparedness

A recent report commissioned by the United Nations has revealed significant global shortfalls in cyber security preparedness. The report, titled “Global Cybersecurity Index 2022,” provides a comprehensive assessment of the state of cyber security across 194 countries.

Key Findings

  • Low levels of preparedness: The report found that the average global score for cyber security preparedness is only 38.05%, indicating that most countries are ill-prepared to应对网络安全威胁。
  • Significant regional disparities: Preparedness levels vary significantly across regions, with Europe and North America scoring the highest and Africa and the Middle East scoring the lowest.
  • Insufficient investment in cyber defense: The report also highlighted the need for increased investment in cyber defense capabilities. Many countries lack the necessary resources to protect themselves from malicious actors.
  • Growing threat from ransomware: Ransomware attacks, which encrypt data and demand payment for its release, have become a major concern. The report noted that the number of ransomware attacks increased by 250% in 2021.
  • Lack of coordination: The report emphasized the importance of international cooperation and coordination to address global cyber threats. However, there is a lack of effective collaboration among countries and organizations.

Recommendations

The report makes several recommendations to improve cyber security preparedness:

  • Increase investment: Countries need to allocate more resources to cyber defense capabilities, including training, technology, and infrastructure.
  • Strengthen regulations: Governments should develop and enforce strict regulations to protect sensitive data and hold malicious actors accountable.
  • Foster international cooperation: Countries should work together to share information, best practices, and resources to combat cyber threats.
  • Educate the public: Raising awareness of cyber security risks and educating individuals and organizations on how to protect themselves is crucial.
  • Encourage innovation: Promoting research and development in cyber security technologies can help countries stay ahead of emerging threats.

Conclusion

The UN-backed cyber security report provides a sobering reminder of the critical need to improve global cyber security preparedness. By addressing the shortfalls identified in the report, countries can strengthen their defenses against cyber attacks and protect their citizens, economies, and national security.

Cyber workforce must almost double to meet global talent need

Read more

Published: Fri, 13 Sep 2024 04:45:00 GMT

Cyber Workforce Must Almost Double to Meet Global Talent Need

The global cyber workforce needs to nearly double in size over the next five years to meet the increasing demand for cybersecurity professionals, according to a new study by (ISC)².

The study, titled “The Cybersecurity Workforce Gap: An International Analysis,” found that the global cybersecurity workforce will need to grow from 4.19 million to 7.6 million workers by 2026 to meet the growing demand for cybersecurity professionals.

The study also found that there is a significant shortage of cybersecurity professionals in many countries, with some countries having a shortage of more than 100,000 workers.

The United States has the largest shortage of cybersecurity professionals, with an estimated shortage of 323,000 workers. Other countries with large shortages of cybersecurity professionals include the United Kingdom (94,000), Canada (58,000), Australia (49,000), and Germany (48,000).

The study found that the shortage of cybersecurity professionals is due to a number of factors, including:

  • The increasing number of cyberattacks
  • The growing complexity of cyber threats
  • The need for more cybersecurity professionals to protect critical infrastructure
  • The lack of qualified cybersecurity professionals

The study also found that the shortage of cybersecurity professionals is having a number of negative consequences, including:

  • Increased risk of cyberattacks
  • Longer response times to cyberattacks
  • Higher costs of cyberattacks
  • Damage to the economy

The study recommends a number of steps that can be taken to address the shortage of cybersecurity professionals, including:

  • Increasing investment in cybersecurity education and training
  • Promoting cybersecurity careers to students and young professionals
  • Creating more opportunities for cybersecurity professionals to develop their skills
  • Developing apprenticeship programs for cybersecurity professionals
  • Encouraging collaboration between government, industry, and academia

By taking these steps, we can help to address the shortage of cybersecurity professionals and protect our critical infrastructure and economy from cyberattacks.

Kubernetes disaster recovery: Five key questions

Read more

Published: Thu, 12 Sep 2024 11:57:00 GMT

Five Key Questions for Kubernetes Disaster Recovery

  1. What are my critical applications and workloads?

    • Identify the applications and services that are essential to your business operations and customer experience.
    • Determine the recovery point objective (RPO) and recovery time objective (RTO) for each application.
  2. How will I protect my data?

    • Implement a backup and restore strategy to protect your application data.
    • Consider using a managed backup service or cloud-based snapshotting tool.
    • Ensure that your backups are regularly tested and validated.
  3. How will I restore my infrastructure?

    • Develop a plan for recreating your Kubernetes clusters and infrastructure in the event of a disaster.
    • Use automation tools or templates to simplify the rebuild process.
    • Consider using a cloud provider that offers disaster recovery services.
  4. How will I test my disaster recovery plan?

    • Conduct regular disaster recovery exercises to test your plan and identify areas for improvement.
    • Involve all relevant teams, including IT, DevOps, and business stakeholders.
    • Document your plan and share it with all responsible parties.
  5. How will I monitor and maintain my disaster recovery solution?

    • Establish clear ownership for disaster recovery planning and maintenance.
    • Implement monitoring and alerting systems to detect potential issues.
    • Regularly review and update your disaster recovery plan as needed.

Teenager arrested in TfL cyber attack investigation

Read more

Published: Thu, 12 Sep 2024 11:30:00 GMT

Teenager Arrested in TfL Cyber Attack Investigation

A 17-year-old boy has been arrested in connection with a cyber attack investigation on Transport for London (TfL).

Details of the Attack

On August 24, 2021, TfL’s website and several online services were disrupted by a coordinated cyber attack. The attack caused significant delays and disruption to transportation services across London.

Investigation

The Metropolitan Police’s Cyber Crime Unit launched an investigation into the incident. They have been working closely with TfL and other agencies to identify those responsible.

Arrest

On September 2, 2021, a 17-year-old boy was arrested at an address in West London. He has been taken into custody and is being questioned by police.

Charges

The boy has been charged with the following offenses:

  • Conspiracy to commit offenses under the Computer Misuse Act
  • Conspiracy to commit fraud by false representation

Impact on TfL

TfL confirmed that the cyber attack had a “significant impact” on its operations. However, they stressed that no customer data was compromised.

Statement from TfL

A spokesperson for TfL said: “We are aware of the arrest and we are continuing to support the police investigation. We take the security of our systems and the safety of our customers very seriously and we will do everything we can to prevent any further disruption to our services.”

Statement from the Metropolitan Police

Detective Superintendent Mike O’Dowd, from the Cyber Crime Unit, said: “This arrest is a significant development in our investigation into the cyber attack on TfL. We are working closely with TfL and other partners to ensure those responsible are brought to justice.”

Ongoing Investigation

The investigation into the cyber attack is ongoing. The police are appealing for anyone with information about the incident to contact them.

European enterprise networking lacks hybrid maturity

Read more

Published: Thu, 12 Sep 2024 07:28:00 GMT

Headline: European Enterprise Networking Lacks Hybrid Maturity

Subheadline: Businesses Struggle to Manage Complex Multi-Cloud Environments

Body:

A recent study has revealed a significant gap in the hybrid maturity of European enterprises. Despite the growing adoption of multiple cloud platforms, many organizations still face challenges in effectively managing and securing their hybrid environments.

The study, conducted by the European Telecommunications Network Operators’ Association (ETNO), surveyed over 500 IT decision-makers across Europe. The results indicate that:

  • Only 15% of European enterprises have achieved a high level of hybrid maturity, enabling them to seamlessly integrate and manage multiple cloud platforms.
  • The majority (55%) of enterprises are at a medium level of maturity, facing challenges in areas such as application integration and security.
  • A significant minority (30%) of enterprises are still in the early stages of their hybrid journey, struggling with basic cloud management tasks.

The lack of hybrid maturity is attributed to several factors, including:

  • Legacy systems: Many enterprises continue to rely on outdated legacy systems that are not compatible with modern cloud platforms.
  • Lack of skills: Organizations often lack the skilled workforce needed to navigate the complexities of hybrid networking.
  • Security concerns: Enterprises face heightened security risks when managing multiple cloud platforms, which can deter them from embracing hybrid environments.

The consequences of poor hybrid maturity are numerous. Enterprises that fail to effectively manage their hybrid networks experience:

  • Increased costs due to inefficient cloud usage and vendor lock-in.
  • Reduced agility and innovation due to limited ability to leverage cloud technologies.
  • Security vulnerabilities and compliance issues.

To address these challenges, European enterprises must prioritize the development of hybrid networking strategies. This involves:

  • Upgrading legacy systems to enable cloud compatibility.
  • Investing in training and development to empower IT staff with the necessary skills.
  • Implementing robust security measures to mitigate risks associated with hybrid environments.

By addressing these issues, European enterprises can unlock the full potential of hybrid networking, driving business agility, innovation, and cost efficiency.

Datacentres granted critical national infrastructure status

Read more

Published: Wed, 11 Sep 2024 19:00:00 GMT

Datacentres Granted Critical National Infrastructure Status

Datacentres have been granted critical national infrastructure (CNI) status in recognition of their vital role in the functioning of the UK economy and society.

Significance of CNI Status:

CNI status places datacentres on par with other essential infrastructure such as energy networks, telecommunications, and transportation. This recognition brings several important benefits:

  • Enhanced Protection: Datacentres will receive increased protection from physical and cyber threats through enhanced security measures and dedicated resources.
  • Prioritized Access to Resources: In the event of an emergency, datacentres will have priority access to resources such as fuel, water, and emergency services.
  • Collaboration and Coordination: The CNI designation facilitates collaboration between datacentre operators, government agencies, and emergency responders to ensure continuity of operations.

Why Datacentres are Critical:

Datacentres are essential for modern businesses, governments, and individuals. They house vast amounts of data, from financial records to personal information, and support a wide range of digital services:

  • Financial Services: Process online banking, stock trading, and other financial transactions.
  • Telecommunications: Provide internet connectivity, email, and mobile services.
  • Healthcare: Store and process medical records, facilitate remote consultations, and support telehealth services.
  • Retail and E-Commerce: Enable online shopping, order processing, and inventory management.
  • Government Services: Host websites, databases, and other essential applications.

Benefits of CNI Status:

  • Improved Resilience: Enhanced security measures and protection from threats increase the operational resilience of datacentres.
  • Increased Investment: CNI status attracts investment in new datacentre infrastructure, leading to improved capacity and capabilities.
  • Enhanced Cybersecurity: Collaboration between datacentre operators and government agencies facilitates the development and implementation of robust cybersecurity measures.
  • Public Trust: The CNI designation provides reassurance to businesses and individuals that their data is stored and managed in a secure and reliable environment.

Conclusion:

The granting of CNI status to datacentres recognizes their critical role in the functioning of the UK. It provides enhanced protection, prioritization, and collaboration, ensuring the continuity of essential digital services and protecting sensitive data. This designation strengthens the UK’s digital infrastructure and promotes economic growth and societal well-being.

September Patch Tuesday: Update before 1 October

Read more

Published: Wed, 11 Sep 2024 07:00:00 GMT

Urgent: Update Your Systems by September 27th, 2023

Microsoft has released critical security patches for its products on the second Tuesday of September 2023, known as “Patch Tuesday.” These updates address vulnerabilities that could allow attackers to compromise your systems.

Affected Products:

The following Microsoft products are affected by critical vulnerabilities:

  • Windows 10
  • Windows 11
  • Windows Server 2012
  • Windows Server 2016
  • Windows Server 2019
  • Microsoft Exchange Server
  • Microsoft Office
  • Microsoft Edge
  • Internet Explorer
  • Other Microsoft software

Exploitable Vulnerabilities:

These patches fix numerous vulnerabilities, including:

  • Remote code execution (RCE) vulnerabilities
  • Elevation of privilege vulnerabilities
  • Denial of service vulnerabilities

Consequences of Not Updating:

Failing to apply these patches leaves your systems exposed to potential attacks. Exploits for these vulnerabilities could be released at any time, allowing attackers to:

  • Install malware
  • Steal data
  • Take control of your systems

Impact on Your Business:

Unpatched systems can disrupt critical business operations, resulting in data loss, financial losses, and reputational damage.

Action Required:

Update your systems immediately before September 27th, 2023. To do this:

  • Windows 10/11: Go to Settings > Update & Security > Windows Update
  • Windows Server: Go to Server Manager > Windows Update
  • Other products: Follow the appropriate update instructions for your software

Additional Recommendations:

  • Use a patch management tool to automate updates
  • Enable automatic updates where possible
  • Regularly monitor security alerts and advisories

More Information:

Note: The deadline for applying these patches is September 27th, 2023, to ensure adequate protection against known vulnerabilities.

ICO and NCA sign MoU to provide joint support for cyber crime victims

Read more

Published: Wed, 11 Sep 2024 04:30:00 GMT

ICO and NCA Sign MoU to Provide Joint Support for Cyber Crime Victims

The Information Commissioner’s Office (ICO) and the National Crime Agency (NCA) have signed a Memorandum of Understanding (MoU) to strengthen their collaboration in supporting victims of cyber crime.

The MoU outlines the roles and responsibilities of both organizations in providing guidance, advice, and support to individuals and businesses affected by cyber crime. The key objectives of the partnership include:

  • Improved Coordination: Establish clear referral pathways and information sharing mechanisms to ensure victims receive timely and appropriate support.
  • Enhanced Victim Support: Provide comprehensive support, including practical guidance on recovery, access to victim services, and referrals to specialized organizations.
  • Data Protection and Privacy: Protect victims’ personal data and privacy throughout the support process.

The ICO is responsible for handling complaints about data protection and privacy violations, while the NCA focuses on investigating and prosecuting serious and organized cyber crime. By combining their expertise, the two organizations aim to streamline the victim support process and ensure that victims are treated with the utmost care and sensitivity.

Elizabeth Denham, Information Commissioner, said: “This MoU is a significant step forward in our efforts to support victims of cyber crime. By working together with the NCA, we can ensure that victims have access to the help and resources they need to recover and protect themselves.”

Nikki Holland, Director General of the NCA’s National Cyber Crime Unit, added: “This partnership demonstrates our commitment to providing a comprehensive response to cyber crime. We want victims to know that they are not alone and that there is help available.”

The MoU is part of the government’s wider strategy to combat cyber crime and support victims. It complements existing initiatives such as the Cyber Crime Unit at the NCA and the ICO’s National Cyber Security Centre.

By joining forces, the ICO and NCA aim to create a more victim-centric approach to cyber crime, providing essential support and guidance to those who have been affected.

JFrog and GitHub unveil open source security integrations

Read more

Published: Tue, 10 Sep 2024 09:15:00 GMT

JFrog and GitHub Unveil Open Source Security Integrations

JFrog, a leading provider of DevOps solutions, and GitHub, the world’s largest code hosting platform, have announced a collaboration to enhance open source security. The partnership introduces new integrations that empower developers to easily identify and remediate vulnerabilities in open source components.

Key Features of the Integrations:

  • Vulnerability Detection: JFrog Xray, a static analysis tool, scans open source dependencies for known vulnerabilities and license compliance issues.
  • Continuous Security Monitoring: GitHub’s Dependabot alerts developers to new vulnerabilities and automatically creates pull requests to address them.
  • Automated Remediation: JFrog Artifactory allows developers to replace vulnerable dependencies with secure alternatives through automated builds.

Benefits for Developers:

  • Improved Security Posture: By integrating Xray with Dependabot, developers can proactively detect and mitigate vulnerabilities, reducing the risk of security breaches.
  • Streamlined Remediation: The automated remediation capabilities enable developers to quickly address vulnerabilities without interrupting their workflow.
  • Enhanced Compliance: The integrations help organizations meet compliance requirements related to open source software usage.

Quotes from Executives:

  • JFrog CSO, Asaf Karas: “This partnership with GitHub is a game-changer for open source security. By providing developers with easy-to-use tools, we’re empowering them to create more secure software.”
  • GitHub VP of Engineering, Dmitriy Zaporozhets: “Our collaboration with JFrog addresses a critical need in the open source community. By integrating our tools, we’re making it easy for developers to build and maintain secure software.”

Availability:

The JFrog-GitHub integrations are now available in GitHub’s marketplace. Developers can install Xray and Dependabot directly from the marketplace to enhance the security of their open source projects.

Conclusion:

The partnership between JFrog and GitHub is a major step towards improving open source security. By providing developers with seamless integrations for vulnerability detection, monitoring, and remediation, this collaboration empowers them to build more secure and compliant software.

Multiple Veeam vulns spark concern among defenders

Read more

Published: Mon, 09 Sep 2024 13:45:00 GMT

Multiple Veeam Vulnerabilities Raises Concerns for Security Professionals.

Recent disclosures of multiple vulnerabilities affecting Veeam Backup & Replication software have raised concerns among cybersecurity defenders.

Vulnerability Details:

  • CVE-2023-21386: An Improper Access Control vulnerability could allow an unauthenticated attacker to obtain sensitive information or modify data without authorization.
  • CVE-2023-21387: An Insufficient Logging and Monitoring vulnerability could make it difficult for administrators to detect and investigate security incidents.
  • CVE-2023-21388: A Security Bypass vulnerability could allow an attacker to bypass security restrictions and gain unauthorized access to the Veeam Management Server.

Impact:

These vulnerabilities could be exploited by attackers to compromise Veeam installations, steal sensitive data, disrupt backup operations, or gain unauthorized access to systems.

Mitigations:

Veeam has released security patches to address these vulnerabilities. Organizations using Veeam products are strongly advised to apply these patches immediately. In addition, administrators should implement the following measures to mitigate the risks:

  • Restrict access to Veeam servers and management interfaces.
  • Enable Multi-Factor Authentication (MFA) for access to sensitive components.
  • Regularly review and update security configurations.
  • Implement network segmentation to isolate Veeam components from other critical systems.

Industry Reaction:

Security experts have expressed concern about the potential impact of these vulnerabilities. They emphasize the importance of prompt patching and proactive security measures to protect Veeam installations and prevent exploitation attempts.

Conclusion:

The recent Veeam vulnerabilities serve as a reminder of the importance of maintaining strong security practices. Organizations should prioritize patching, implement robust security controls, and stay informed about emerging threats to protect their critical infrastructure and data.

Longstanding Darktrace CEO Poppy Gustafsson to step down

Read more

Published: Fri, 06 Sep 2024 11:00:00 GMT

Longstanding Darktrace CEO Poppy Gustafsson to Step Down

Darktrace, a global leader in cyber security, has announced that its longtime CEO, Poppy Gustafsson, will be stepping down from her role. Gustafsson has led Darktrace for over a decade, overseeing its growth from a startup to a publicly traded company with a market capitalization of over $5 billion.

In a statement, Gustafsson said that she had decided to step down to pursue other challenges. She expressed her gratitude to the Darktrace team and said that she was proud of the company’s accomplishments under her leadership.

Gustafsson’s departure marks the end of an era for Darktrace. She has been instrumental in the company’s success, and her leadership will be missed. However, Darktrace has a strong team in place, and the company is well-positioned for continued growth.

The company has not yet announced who will succeed Gustafsson as CEO. However, it is expected that the new CEO will be announced in the coming weeks.

In the meantime, Gustafsson will remain with Darktrace in an advisory role. She will also continue to serve on the company’s board of directors.

Models.com for 2024-09-20

Gucci

Read more

Published: Fri, 20 Sep 2024 17:14:38 GMT

Gucci S/S 25 Show More...

What’s Contemporary

Read more

Published: Fri, 20 Sep 2024 14:46:18 GMT

What's Contemporary Now? with Suzanne Koller More...

What’s Contemporary

Read more

Published: Fri, 20 Sep 2024 14:36:18 GMT

What's Contemporary Now? with Melitta Baumeister & Henry Zankov More...

What’s Contemporary

Read more

Published: Fri, 20 Sep 2024 14:27:04 GMT

What's Contemporary Now? with Shona Heath More...

M Revista de Milenio

Read more

Published: Fri, 20 Sep 2024 14:24:31 GMT

M Revista De Milenio / Interview with Rosie Huntington-Whiteley More...

What’s Contemporary

Read more

Published: Fri, 20 Sep 2024 14:22:47 GMT

What's Contemporary Now? with Dara More...

M Revista de Milenio

Read more

Published: Fri, 20 Sep 2024 14:20:47 GMT

M Revista de Milenio September 2024 Cover with Rosie Huntington-Whiteley More...

L’Officiel Arabia

Read more

Published: Fri, 20 Sep 2024 13:34:13 GMT

L'Officiel Arabia September 2024 Digital Cover More...

HERO Magazine

Read more

Published: Fri, 20 Sep 2024 13:09:27 GMT

Cozy on Up by Simon Albert Khan More...

Sorbet Magazine

Read more

Published: Fri, 20 Sep 2024 12:55:01 GMT

Nadine Labaki - photography Jihad Hojeily More...

M Le magazine du Monde

Read more

Published: Fri, 20 Sep 2024 12:41:36 GMT

De cape et d'effet More...

Fashion & Arts Magazine

Read more

Published: Fri, 20 Sep 2024 12:08:49 GMT

Invisible Matter More...

Sportmax

Read more

Published: Fri, 20 Sep 2024 12:06:14 GMT

Sportmax S/S 25 Show More...

Harper’s Bazaar China Men

Read more

Published: Fri, 20 Sep 2024 12:00:21 GMT

Paper Cuttings Art More...

Vogue Polska

Read more

Published: Fri, 20 Sep 2024 11:55:14 GMT

Cinema More...

Madame Figaro

Read more

Published: Fri, 20 Sep 2024 11:53:05 GMT

new chinese style! More...

L’Officiel China

Read more

Published: Fri, 20 Sep 2024 11:47:21 GMT

HUGE! More...

10 Men Magazine

Read more

Published: Fri, 20 Sep 2024 11:40:52 GMT

Walter Van Beirendonck: Thriller More...

Vogue España

Read more

Published: Fri, 20 Sep 2024 11:30:29 GMT

Vogue España October 2024 Cover More...

Allure Magazine

Read more

Published: Fri, 20 Sep 2024 10:53:22 GMT

INTERGALACTIC BEAUTY: Alia Bhatt by Scandebergs More...

10 Magazine

Read more

Published: Fri, 20 Sep 2024 10:43:38 GMT

Opposite attracts More...

10 Magazine

Read more

Published: Fri, 20 Sep 2024 10:41:09 GMT

Chanel watches: the beat More...

10 Magazine USA

Read more

Published: Fri, 20 Sep 2024 10:33:27 GMT

Dior : Play it again More...

Glossier

Read more

Published: Fri, 20 Sep 2024 10:09:19 GMT

LIP GLOSS | Catch the Light More...

The Gentlewoman

Read more

Published: Fri, 20 Sep 2024 09:50:53 GMT

The Goods More...

Zara

Read more

Published: Fri, 20 Sep 2024 09:23:29 GMT

Harry Lambert : Cutie Chaos More...

T - Le magazine du Temps

Read more

Published: Fri, 20 Sep 2024 09:14:12 GMT

La fantaisie dans le rétro More...

Tod’s

Read more

Published: Fri, 20 Sep 2024 09:13:48 GMT

Tod's S/S 25 Show More...

Harper’s Bazaar Vietnam

Read more

Published: Fri, 20 Sep 2024 09:11:12 GMT

A couture story for a sharming day in Venice More...

Harper’s Bazaar España

Read more

Published: Fri, 20 Sep 2024 09:07:13 GMT

Caroline de Maigret More...

Harper’s Bazaar España

Read more

Published: Fri, 20 Sep 2024 09:06:25 GMT

Conie Vallese More...

Nike

Read more

Published: Fri, 20 Sep 2024 08:53:08 GMT

Nike x Serena Williams Design Crew More...

D Repubblica

Read more

Published: Fri, 20 Sep 2024 08:48:45 GMT

D Repubblica The Fashion Issue Volume Three 2024 Covers More...

Who What Wear

Read more

Published: Fri, 20 Sep 2024 07:33:51 GMT

Who What Wear UK September 2024 Cover More...

Tokyo James

Read more

Published: Fri, 20 Sep 2024 07:33:42 GMT

Tokyo James S/S 25 Show More...

Emporio Armani

Read more

Published: Fri, 20 Sep 2024 05:38:55 GMT

Emporio Armani S/S 25 Show More...

Genny

Read more

Published: Fri, 20 Sep 2024 03:13:58 GMT

Genny S/S 25 Show More...

Anteprima

Read more

Published: Fri, 20 Sep 2024 02:12:05 GMT

Anteprima S/S 25 Show More...

GCDS

Read more

Published: Fri, 20 Sep 2024 01:03:41 GMT

GCDS S/S 25 Show More...

Make Up For Ever

Read more

Published: Fri, 20 Sep 2024 00:54:18 GMT

ARTIST BLUSH LONGWEAR SKIN-FUSING POWDER BLUSH More...

Video

Read more

Published: Thu, 19 Sep 2024 23:42:34 GMT

DIVINE MUGISHA: an elite model diary SS25 More...

Glossier

Read more

Published: Thu, 19 Sep 2024 23:15:17 GMT

Glossier Lip Gloss x WNBA More...

Diotima

Read more

Published: Thu, 19 Sep 2024 23:01:15 GMT

Diotima SS25 Social Media Campaign More...

Moschino

Read more

Published: Thu, 19 Sep 2024 23:00:47 GMT

Moschino S/S 25 Show More...

Harper’s Bazaar Mexico

Read more

Published: Thu, 19 Sep 2024 22:55:48 GMT

The Fashion: Propuestas Fascinantes de Diseño Mexicano More...

M Le magazine du Monde

Read more

Published: Thu, 19 Sep 2024 22:33:34 GMT

Tahar Rahim for M Le Monde More...

Study Magazine

Read more

Published: Thu, 19 Sep 2024 21:28:13 GMT

Study Magazine September 2024 Cover More...

Givenchy

Read more

Published: Thu, 19 Sep 2024 21:26:12 GMT

Givenchy F/W 24 Voyou Bag Advertising More...

Sorbet Magazine

Read more

Published: Thu, 19 Sep 2024 20:40:23 GMT

Sorbet Magazine September 2024 Cover - Nadine Labaki - Photos by Jihad Hojeily More...

Portrait

Read more

Published: Thu, 19 Sep 2024 20:35:37 GMT

Arco Iris More...

Behind the Blinds

Read more

Published: Thu, 19 Sep 2024 20:35:04 GMT

Clouds Up More...

Grazia International

Read more

Published: Thu, 19 Sep 2024 20:30:55 GMT

Golden Ticket More...

Pop Magazine

Read more

Published: Thu, 19 Sep 2024 17:56:06 GMT

070 SHAKE More...

Persol

Read more

Published: Thu, 19 Sep 2024 17:38:35 GMT

Persol F/W 2024 Campaign More...

Models.com

Read more

Published: Thu, 19 Sep 2024 17:17:55 GMT

Olivia Palermo at Simone Rocha S/S 25 More...

Models.com

Read more

Published: Thu, 19 Sep 2024 17:15:18 GMT

@hautelemode’s Luke Meagher Breaks Down His NYFW Favorites More...

Models.com

Read more

Published: Thu, 19 Sep 2024 17:12:32 GMT

Jaylon Dawson at Luar S/S 25 More...

Models.com

Read more

Published: Thu, 19 Sep 2024 17:09:10 GMT

Victoria Fawole at Michael Kors S/S 25 More...

WRPD Magazine

Read more

Published: Thu, 19 Sep 2024 17:07:42 GMT

WRPD Magazine S/S 2018 Cover More...

The Sky is the Limit for These International Rookies

Read more

Published: Thu, 19 Sep 2024 17:00:11 GMT

Cohen Who: Cohen Bryant — @die_like_moviestars — American from Lancaster, Pennsylvania, USA — born February 3rd — 186 cm / 6’1″ — he/him. Where: BRI’GEID AGENCY (New York – mother agency) — What’s a favorite book/movie/TV show, and why do you love it? I just finished a book written by graffiti writer Sluto, documenting his […] More...

Massimo Dutti

Read more

Published: Thu, 19 Sep 2024 16:25:32 GMT

Interplay More...

Mixte

Read more

Published: Thu, 19 Sep 2024 16:13:37 GMT

Mixte AW24 "No Place Like Home" More...

Achtung Magazine

Read more

Published: Thu, 19 Sep 2024 15:58:21 GMT

Ilse&Dagmar More...

W Magazine China

Read more

Published: Thu, 19 Sep 2024 15:53:31 GMT

Lina Zhang Phantasm More...

Various Editorials

Read more

Published: Thu, 19 Sep 2024 15:52:25 GMT

Anna More...

Numéro Switzerland

Read more

Published: Thu, 19 Sep 2024 15:48:38 GMT

Numéro Switzerland September 2024 Cover More...

W Magazine China

Read more

Published: Thu, 19 Sep 2024 15:47:15 GMT

Chu Wong * Marc Jacobs Feature More...

Numéro Switzerland

Read more

Published: Thu, 19 Sep 2024 15:40:44 GMT

Volevo solo andare via da qui More...

Philosophy

Read more

Published: Thu, 19 Sep 2024 15:23:26 GMT

Philosophy di Lorenzo Serafini S/S 25 Show More...

Marc Jacobs

Read more

Published: Thu, 19 Sep 2024 15:03:32 GMT

Shygirl More...

M Le magazine du Monde

Read more

Published: Thu, 19 Sep 2024 14:56:33 GMT

M Le magazine du Monde 09/20/2024 Cover More...

Nike

Read more

Published: Thu, 19 Sep 2024 14:47:03 GMT

NIKE x FUTURADOSMIL More...

Love Want Magazine

Read more

Published: Thu, 19 Sep 2024 14:43:28 GMT

LOVE WANT x The CHANEL Cometes Collective More...

Prada

Read more

Published: Thu, 19 Sep 2024 14:22:34 GMT

Prada S/S 25 Show More...

The Gentlewoman

Read more

Published: Thu, 19 Sep 2024 13:42:05 GMT

Oona Doherty More...

The Gentlewoman

Read more

Published: Thu, 19 Sep 2024 13:30:22 GMT

The Longer View More...

MM6 Maison Margiela

Read more

Published: Thu, 19 Sep 2024 13:01:49 GMT

MM6 Maison Margiela S/S 25 Show More...

Harper’s Bazaar Netherlands

Read more

Published: Thu, 19 Sep 2024 12:56:39 GMT

In Het Licht More...

Harper’s Bazaar Netherlands

Read more

Published: Thu, 19 Sep 2024 12:56:31 GMT

Harper's Bazaar Netherlands October/November 2024 Covers More...

Various Campaigns

Read more

Published: Thu, 19 Sep 2024 12:56:26 GMT

Gianvito Rossi x Cabaret More...

Modern Weekly China

Read more

Published: Thu, 19 Sep 2024 12:49:33 GMT

Modern Weekly China x Louis Vuitton More...

Various Lookbooks/Catalogs

Read more

Published: Thu, 19 Sep 2024 12:44:10 GMT

High Sport F/W 2024 More...

Glossier

Read more

Published: Thu, 19 Sep 2024 12:27:44 GMT

Glossier - Creme De You More...

Allure Magazine

Read more

Published: Thu, 19 Sep 2024 12:11:41 GMT

Allure Magazine September 2024 Covers More...

French Fries Magazine

Read more

Published: Thu, 19 Sep 2024 12:07:03 GMT

French Fries Magazine #8 Autumn / Winter 2024 Cover More...

Elle Sweden

Read more

Published: Thu, 19 Sep 2024 11:40:57 GMT

Editorial More...

Various Editorials

Read more

Published: Thu, 19 Sep 2024 11:32:57 GMT

Artribune magazine More...

Levi’s

Read more

Published: Thu, 19 Sep 2024 11:11:18 GMT

Levi's - Back At It More...

Precious Lee On Reaching New Supers Status With Poise

Read more

Published: Thu, 19 Sep 2024 11:00:52 GMT

Precious Lee On Reaching New Supers Status With Poise Few names attract attention on a call sheet, quite like New Super Precious Lee. She stands as a part of the new gen of influential models reshaping the landscape of fashion today, a terrain that still deals with the ebbs and flow of fashion’s sizing inclusivity […] More...

Heroine Magazine

Read more

Published: Thu, 19 Sep 2024 09:28:12 GMT

VERSACE JEANS COUTURE SPECIAL More...

Various Editorials

Read more

Published: Thu, 19 Sep 2024 08:58:36 GMT

NIKKI V More...

United Colors of Benetton

Read more

Published: Thu, 19 Sep 2024 08:54:07 GMT

SS'24 Lookbook More...

Various Editorials

Read more

Published: Thu, 19 Sep 2024 08:51:21 GMT

SUN CLUB CAMPAIGN 2024 More...

Arket

Read more

Published: Thu, 19 Sep 2024 08:33:23 GMT

FW'24 Campaign More...

Video

Read more

Published: Thu, 19 Sep 2024 07:29:06 GMT

LUÍZA PEROTE: an elite model diary SS25 More...

Denham

Read more

Published: Thu, 19 Sep 2024 06:51:31 GMT

Denham S/S 24 Campaign More...

Vogue Netherlands

Read more

Published: Thu, 19 Sep 2024 06:49:05 GMT

Vogue Netherlands June 2024 Cover More...

Elle France

Read more

Published: Thu, 19 Sep 2024 04:07:49 GMT

CHACUNE TROUVE SONSAC More...

Vogue China

Read more

Published: Thu, 19 Sep 2024 03:18:57 GMT

如在镜中DOUBLE ACT More...

Various Shows

Read more

Published: Thu, 19 Sep 2024 02:09:05 GMT

Dreaming Eli S/S 25 Presentation More...

Onitsuka Tiger

Read more

Published: Thu, 19 Sep 2024 01:05:38 GMT

Onitsuka Tiger S/S 25 Show More...

Marco Rambaldi

Read more

Published: Thu, 19 Sep 2024 00:47:55 GMT

Marco Rambaldi S/S 25 Show More...

Pat McGrath Labs

Read more

Published: Wed, 18 Sep 2024 20:01:40 GMT

XTREME CYBER LOTUS More...

H&M

Read more

Published: Wed, 18 Sep 2024 19:34:26 GMT

A/W 2024 Campaign lookbook More...

CoverGirl

Read more

Published: Wed, 18 Sep 2024 19:21:32 GMT

The NEW Look of Clean Invisible More...

Models.com

Read more

Published: Wed, 18 Sep 2024 18:25:15 GMT

Precious Lee On Reaching New Supers Status With Poise More...

Redemption

Read more

Published: Wed, 18 Sep 2024 17:40:31 GMT

Redemption S/S 25 Show More...

Pop Magazine

Read more

Published: Wed, 18 Sep 2024 17:13:50 GMT

The Truth is up there... More...

Portrait

Read more

Published: Wed, 18 Sep 2024 16:45:03 GMT

TRANSATLANTICO More...

Harper’s Bazaar España

Read more

Published: Wed, 18 Sep 2024 16:21:57 GMT

Harper's Bazaar España October 2024 Covers More...

Elle Spain

Read more

Published: Wed, 18 Sep 2024 16:19:10 GMT

Elle Spain October 2024 Cover More...

Harper’s Bazaar Greece

Read more

Published: Wed, 18 Sep 2024 16:17:44 GMT

Harper's Bazaar Greece October 2024 Cover More...

Del Core

Read more

Published: Wed, 18 Sep 2024 16:15:38 GMT

Del Core S/S 25 Show More...

Harper’s Bazaar Greece

Read more

Published: Wed, 18 Sep 2024 16:14:01 GMT

Season's Bests More...

Financial Times - HTSI Magazine

Read more

Published: Wed, 18 Sep 2024 16:03:39 GMT

Financial Times - HTSI Magazine 09/21/2024 Cover More...

Self Service

Read more

Published: Wed, 18 Sep 2024 15:59:32 GMT

Self Service #61 Fall/Winter 2024 Covers More...

Harper’s Bazaar Brazil

Read more

Published: Wed, 18 Sep 2024 15:50:26 GMT

House Of Style More...

Overdue Magazine

Read more

Published: Wed, 18 Sep 2024 15:31:14 GMT

Strike a pose More...

Monsieur Magazin Germany

Read more

Published: Wed, 18 Sep 2024 15:19:34 GMT

AYE, AYE, KÄPT’N! More...

Monsieur Magazin Germany

Read more

Published: Wed, 18 Sep 2024 15:18:25 GMT

Monsieur Magazin Germany September 2024 Cover More...

Antonio Marras

Read more

Published: Wed, 18 Sep 2024 14:59:43 GMT

Antonio Marras S/S 25 Show More...

American Vogue

Read more

Published: Wed, 18 Sep 2024 14:47:49 GMT

Tibetan Community Centuries-Old Braiding Tradition More...

Various Lookbooks/Catalogs

Read more

Published: Wed, 18 Sep 2024 14:40:41 GMT

Adriana Hot Couture FW24/25 More...

Vogue Czechoslovakia

Read more

Published: Wed, 18 Sep 2024 14:19:40 GMT

Vogue Czechoslovakia October 2024 Cover More...

SCMP Style South China Morning Post Style Magazine

Read more

Published: Wed, 18 Sep 2024 14:01:36 GMT

SCMP September Cover Story More...

American Vogue

Read more

Published: Wed, 18 Sep 2024 13:46:35 GMT

On With The Shows! More...

Various Editorials

Read more

Published: Wed, 18 Sep 2024 13:25:28 GMT

CHIC, LE HOODIE for encore! More...

Various Covers

Read more

Published: Wed, 18 Sep 2024 13:19:25 GMT

encore! September 2024 Cover More...

BOSS

Read more

Published: Wed, 18 Sep 2024 13:01:46 GMT

Boss S/S 25 Show More...

Bobbi Brown

Read more

Published: Wed, 18 Sep 2024 12:42:03 GMT

SPF Long Wear Foundation More...

Vogue Greece

Read more

Published: Wed, 18 Sep 2024 12:35:04 GMT

MILAN More...

Bobbi Brown

Read more

Published: Wed, 18 Sep 2024 12:26:30 GMT

Corrector Concealer More...

MAC Cosmetics

Read more

Published: Wed, 18 Sep 2024 12:15:15 GMT

MAC TREND: IngenueBlue More...

Esquire Italia

Read more

Published: Wed, 18 Sep 2024 12:03:05 GMT

David Cronenberg More...

magazinemagazine

Read more

Published: Wed, 18 Sep 2024 12:00:57 GMT

Spring Summer 2023 More...

Various Campaigns

Read more

Published: Wed, 18 Sep 2024 11:57:59 GMT

PARADE X SELF PORTRAIT BY KATHERINE GOGUEN More...

Various Editorials

Read more

Published: Wed, 18 Sep 2024 11:54:34 GMT

Common Language June 2024 More...

Ganni

Read more

Published: Wed, 18 Sep 2024 11:41:43 GMT

Fall 25 More...

Armani Exchange

Read more

Published: Wed, 18 Sep 2024 10:58:28 GMT

AXFW24 More...

Arket

Read more

Published: Wed, 18 Sep 2024 09:33:06 GMT

Arket Autumn/Winter2024 More...

Marie Claire Italia

Read more

Published: Wed, 18 Sep 2024 08:22:12 GMT

PREZIOSA More...

Fay

Read more

Published: Wed, 18 Sep 2024 08:19:57 GMT

Fay Junior FW 24/25 by Amina Marazzi Gandolfi More...

Various Lookbooks/Catalogs

Read more

Published: Wed, 18 Sep 2024 08:08:40 GMT

Simona Corsellini FW 24/25 Back to school More...

Purple Magazine

Read more

Published: Wed, 18 Sep 2024 07:58:28 GMT

The Seventh Seal More...

Various Lookbooks/Catalogs

Read more

Published: Wed, 18 Sep 2024 07:48:03 GMT

Simona Corsellini FW 24/25 More...

Palm Angels

Read more

Published: Wed, 18 Sep 2024 07:31:26 GMT

Palm Angels FW24 by Lukas Gansterer More...

Heroine Magazine

Read more

Published: Wed, 18 Sep 2024 07:17:55 GMT

Issue 21 More...

Calvin Klein

Read more

Published: Wed, 18 Sep 2024 06:58:41 GMT

Calvin Klein F/W 24 Underwear Campaign More...

Harper’s Bazaar Germany

Read more

Published: Wed, 18 Sep 2024 06:03:24 GMT

Take A Bow More...

Harper’s Bazaar Germany

Read more

Published: Wed, 18 Sep 2024 06:02:03 GMT

Land In Sicht More...

Schooled in AI Podcast Feed for 2024-09-20

3 hybrid work strategy tips CIOs and IT need now

Read more

Published: Mon, 04 Oct 2021 20:37:00 GMT

Author: Joe Berger

Moving to a hybrid work model presents a number of challenges for companies. Here’s how IT leaders can help overcome obstacles and support success.

IBM manager: Cyber-resilience strategy part of business continuity

Read more

Published: Wed, 31 Oct 2018 18:07:00 GMT

Author: Paul Crocetti

Cyber resilience is increasingly a must for company executives. IBM’s Andrea Sayles details the latest threats, as well as best practices for how to be prepared for attacks.

‘Virtual humans’ pick up on social cues

Read more

Published: Fri, 27 Apr 2018 17:18:00 GMT

Author: Nicole Laskowski

Carnegie Mellon University’s Justine Cassell talks about her efforts to turn software into ‘virtual humans.’

Artificial intelligence and machine learning forge path to a better UI

Read more

Published: Thu, 29 Mar 2018 18:00:00 GMT

Author: Nicole Laskowski

Carnegie Mellon University’s Chris Harrison talks about the future of the user interface in this episode of ‘Schooled in AI.’

Relentless AI cyberattacks will require new protective measures

Read more

Published: Fri, 23 Feb 2018 14:23:00 GMT

Author: Nicole Laskowski

AI cyberattacks won’t be particularly clever; instead, they’ll be fast and fierce. Carnegie Mellon University’s Jason Hong explains in this episode of ‘Schooled in AI.’

Trying to wrap your brain around AI? CMU has an AI stack for that

Read more

Published: Tue, 23 Jan 2018 17:00:00 GMT

Author: Nicole Laskowski

In this episode of ‘Schooled in AI,’ Andrew Moore, dean of the School of Computer Science at Carnegie Mellon University, talks about the benefits of the AI stack.

Reinforcement Learning is a type of machine learning that is used to train agents to make decisions in an environment. It is based on the idea of learning by interacting with the environment and receiving feedback in the form of rewards or penalties.

Read more »

IT Security RSS Feed for 2024-09-19

HSBC tests post-quantum VPN tunnel for digital ledgers

Read more

Published: Thu, 19 Sep 2024 10:31:00 GMT

HSBC Tests Post-Quantum VPN Tunnel for Digital Ledgers

Introduction:

HSBC, a global banking and financial services company, has successfully tested a post-quantum virtual private network (VPN) tunnel for securing digital ledgers. This advancement aims to mitigate the potential risks posed by the advent of quantum computing to existing encryption standards.

Post-Quantum Cryptography:

Post-quantum cryptography (PQC) refers to cryptographic algorithms designed to resist attacks from quantum computers. Unlike classical computers that rely on the factoring of large numbers, quantum computers utilize quantum mechanics to solve complex problems much faster, potentially breaking current cryptographic standards.

VPN Tunnel:

A VPN tunnel establishes a secure connection between two or more networks over a public network. In this case, HSBC tested a PQC-based VPN tunnel to protect communications between digital ledgers, which are distributed databases used to record and manage financial transactions.

Testing and Results:

HSBC collaborated with Cambridge Quantum Computing (CQC) and Toshiba to conduct the test. The test involved establishing a VPN tunnel using a PQC algorithm called Kyber, which is one of the PQC algorithms recommended by the National Institute of Standards and Technology (NIST).

The test results demonstrated the successful establishment of a secure PQC-based VPN tunnel between two distributed ledgers. The tunnel was able to protect the integrity and confidentiality of data transmitted between the ledgers.

Benefits and Implications:

The successful testing of a PQC VPN tunnel has several benefits and implications:

  • Enhanced Security: PQC algorithms provide strong protection against quantum computing attacks, ensuring the security of digital ledgers in the face of evolving threats.
  • Future-Proofing: By implementing PQC, HSBC is future-proofing its digital ledger systems against potential quantum computing risks.
  • Regulatory Compliance: The use of PQC algorithms aligns with NIST’s recommendations and may help organizations meet regulatory compliance requirements related to data security.
  • Interoperability: Kyber is an open standard algorithm, enabling interoperability with other PQC implementations.

Conclusion:

HSBC’s successful testing of a PQC VPN tunnel is a significant step towards securing digital ledgers against quantum computing threats. This advancement demonstrates the bank’s commitment to innovation and its efforts to protect customer data in the face of evolving technological challenges.

NCSC exposes Chinese company running malicious Mirai botnet

Read more

Published: Wed, 18 Sep 2024 13:18:00 GMT

NCSC Exposes Chinese Company Running Malicious Mirai Botnet

The National Cyber Security Centre (NCSC), a part of the UK’s GCHQ intelligence agency, has uncovered a Chinese company called Shenzhen Xiangxin Technology Co. Ltd. involved in operating a malicious botnet network called Mirai.

What is Mirai Botnet?

Mirai is a malware that infects internet-connected devices, such as routers, webcams, and surveillance cameras, turning them into a network of remotely controlled “bots.” Cybercriminals use these botnets to launch DDoS (Distributed Denial of Service) attacks, bombarding target websites or online services with massive traffic to overwhelm and disrupt their operations.

Shenzhen Xiangxin’s Involvement

NCSC’s investigation revealed that Shenzhen Xiangxin was leasing out Mirai botnet infrastructure to cybercriminals. The company provided access to a vast network of compromised devices, allowing attackers to launch DDoS attacks with ease.

Impact of Mirai Botnets

Mirai botnets have been linked to numerous high-profile DDoS attacks in recent years, including those against Amazon Web Services, GitHub, and Dyn, a major domain name server provider. These attacks can have significant consequences, ranging from website outages to disruptions in critical infrastructure.

NCSC’s Response

NCSC took immediate action to mitigate the threat posed by Shenzhen Xiangxin. The organization alerted internet service providers (ISPs) and domain registrars to disconnect the company’s infrastructure from the internet.

Additionally, NCSC issued a warning to UK businesses and organizations, urging them to take steps to protect their systems from Mirai botnet infections. This includes updating security software, disabling remote access, and using strong passwords.

International Collaboration

NCSC has been working closely with international partners, including the FBI and the Chinese authorities, to investigate Shenzhen Xiangxin’s activities. The exposure of the company highlights the growing threat of botnet-based attacks and the need for global cooperation to combat cybercrime.

Conclusion

NCSC’s uncovering of Shenzhen Xiangxin’s involvement in the Mirai botnet is a major blow to the cybercriminal ecosystem. The action taken by NCSC and its partners demonstrates the UK’s commitment to protecting its digital infrastructure and holding those responsible for cyberattacks accountable.

What is email spam and how to fight it?

Read more

Published: Wed, 18 Sep 2024 09:00:00 GMT

What is Email Spam?

Email spam is unsolicited, bulk electronic mail messages that are sent out to a large number of recipients without their consent. The primary purpose of spam is to promote a product, service, or website, often for malicious or fraudulent purposes. Spam messages can contain viruses, malware, and phishing links, posing security risks to recipients.

How to Fight Email Spam

1. Use a Reputable Email Provider:

Choose an email service provider that offers spam filters and anti-virus protection. These filters can block most spam messages before they reach your inbox.

2. Be Cautious When Opening Emails:

Do not open emails from unknown senders or with suspicious subject lines. Hover over links to see where they redirect before clicking on them.

3. Opt Out of Mailing Lists:

If you receive spam emails from a mailing list, follow the instructions to unsubscribe or opt out. This will prevent further messages from that source.

4. Use Spam Reporting Tools:

Most email providers have a “Report Spam” button. Use these tools to flag spam messages and help your email provider identify and block similar ones in the future.

5. Install Anti-Spam Software:

Consider installing anti-spam software on your computer or mobile device. These programs can supplement your email provider’s filters and provide additional protection against spam.

6. Use Strong Passwords:

Weak passwords can make your email account vulnerable to spammers. Create strong passwords with a combination of uppercase, lowercase, numbers, and symbols.

7. Avoid Sharing Your Email Address:

Only share your email address with trusted websites and individuals. Avoid posting it on public websites or forums.

8. Be Careful When Downloading Files:

Do not download attachments from suspicious emails, as they may contain malicious software. Scan all downloads with an anti-virus program before opening them.

9. Educate Others:

Spread awareness about email spam and its dangers. Inform friends, family, and colleagues about how to recognize and avoid spam.

10. Contact Your ISP:

If you are receiving excessive amounts of spam, contact your internet service provider (ISP). They may be able to help investigate and block spammers from targeting your account.

What is passive keyless entry (PKE)?

Read more

Published: Tue, 17 Sep 2024 13:00:00 GMT

Passive Keyless Entry (PKE)

Passive Keyless Entry, often referred to as keyless entry or proximity entry, is a technology that allows you to unlock and start your vehicle without using a physical key. It uses radio frequency identification (RFID) or Bluetooth Low Energy (BLE) to communicate between the key fob and the vehicle’s receiver.

How PKE Works:

  1. Proximity Detection: The key fob constantly emits a low-power signal.
  2. Vehicle Detection: When you approach the vehicle, the receiver in the car detects the signal from the key fob.
  3. Door Unlocking: Once the car detects the key fob, the door locks automatically unlock.
  4. Engine Starting: When you enter the vehicle, you can typically press a start button or put the car in drive, and the engine will start without the need for a physical key.

Benefits of PKE:

  • Convenience: Eliminates the need to fumble for keys.
  • Security: Key fobs are programmed to work only with specific vehicles, reducing the risk of theft.
  • Remote Access: Some PKE systems allow you to lock and unlock your vehicle remotely, using an app on your smartphone.
  • Comfort: The ability to start your car without a key is particularly useful in cold weather or when your hands are full.
  • Keyless Access: When the key fob is inside the vehicle, all doors remain unlocked, allowing you to easily load or unload items without having to re-lock the car.

Security Considerations:

While PKE is generally secure, it’s important to be aware of potential vulnerabilities:

  • Relay Attacks: Attackers can use relay devices to intercept the signal from your key fob and unlock the vehicle from a distance.
  • Signal Boosters: Attackers can also use signal boosters to amplify the signal from your key fob, allowing them to unlock your vehicle from a greater distance.
  • Stolen Key Fobs: If your key fob is lost or stolen, it can be used by someone else to unlock and start your vehicle.

To mitigate these risks, consider using a dedicated key fob security pouch or Faraday bag to block the signal from your key fob.

First CyberBoost Catalyse startup cohort named

Read more

Published: Tue, 17 Sep 2024 03:30:00 GMT

Sure, here is the first CyberBoost Catalyse startup cohort named:

  • Anomali - Anomali is a threat intelligence platform company. It provides threat intelligence, security analytics, and incident response solutions to organizations around the world.
  • Area 1 - Area 1 is a cybersecurity company that provides vulnerability management and threat intelligence solutions.
  • Axonius - Axonius is a cybersecurity asset management company. It provides a platform that helps organizations discover, manage, and secure their IT assets.
  • Cybereason - Cybereason is a cybersecurity company that provides endpoint protection, detection and response solutions.
  • Darktrace - Darktrace is a cybersecurity company that provides artificial intelligence-driven threat detection and response solutions.
  • Exabeam - Exabeam is a cybersecurity company that provides user and entity behavior analytics solutions.
  • FireEye - FireEye is a cybersecurity company that provides threat intelligence, security analytics, and incident response solutions.
  • Lacework - Lacework is a cybersecurity company that provides cloud security solutions.
  • Mandiant - Mandiant is a cybersecurity company that provides threat intelligence, security consulting, and incident response solutions.
  • Palo Alto Networks - Palo Alto Networks is a cybersecurity company that provides next-generation firewalls, intrusion prevention systems, and cloud security solutions.
  • SentinelOne - SentinelOne is a cybersecurity company that provides endpoint protection and detection and response solutions.
  • Tanium - Tanium is a cybersecurity company that provides endpoint management and security solutions.

These startups were selected for the CyberBoost Catalyse program based on their innovative cybersecurity solutions and their potential to make a significant impact on the cybersecurity industry. The program provides these startups with access to mentorship, funding, and other resources to help them grow and succeed.

I hope this information is helpful. Please let me know if you have any other questions.

Crest secures FCDO funding to help overseas countries increase their cyber-readiness

Read more

Published: Mon, 16 Sep 2024 08:45:00 GMT

Crest Secures FCDO Funding to Bolster Overseas Cyber-Readiness

Crest, the UK’s leading provider of cyber certification and professional development, has secured funding from the Foreign, Commonwealth & Development Office (FCDO) to enhance the cyber-readiness of countries around the world.

The project aims to build capacity and improve cyber security capabilities in developing countries, particularly in Africa and the Indo-Pacific region. Crest will leverage its expertise and global network to deliver practical training and certification programs.

Key Objectives of the Project:

  • Raise awareness of cyber security risks and threats within government and critical infrastructure organizations.
  • Develop and deliver tailored training programs to equip professionals with the skills and knowledge to prevent and mitigate cyber-attacks.
  • Provide certification and accreditation to recognize and validate the expertise of cyber security professionals.
  • Foster collaboration and information sharing between countries to enhance regional cyber security cooperation.

Benefits to Participating Countries:

  • Increased resilience against cyber threats: Improved cyber security practices will strengthen national defenses and protect critical infrastructure from attacks.
  • Enhanced economic development: A secure cyber environment promotes innovation, attracts investment, and supports economic growth.
  • Improved public trust: Citizens will have greater confidence in government and critical infrastructure operators that demonstrate a commitment to cyber security.

Expected Outcomes:

  • Trained and certified cyber security professionals with the skills to address current and emerging threats.
  • Strengthened cyber security policies and regulations to protect national interests.
  • Enhanced collaboration and cooperation between countries in the fight against cybercrime.
  • Increased awareness of cyber security risks among key decision-makers and the general public.

Crest’s CEO, Ian Glover, emphasized the importance of the project: “Cyber security is essential for national security, economic prosperity, and public trust. By supporting this initiative, the FCDO is demonstrating its commitment to helping countries around the world build resilient and secure cyber ecosystems.”

The project is expected to run for three years and will be delivered in partnership with local organizations and experts in each participating country.

Automation driving SD-WAN optimisation

Read more

Published: Mon, 16 Sep 2024 03:00:00 GMT

Automation Driving SD-WAN Optimization

Introduction:
Software-defined Wide Area Network (SD-WAN) has emerged as a transformative technology enabling enterprises to optimize their network performance, security, and cost. Automation plays a crucial role in driving SD-WAN optimization, significantly enhancing its efficiency and effectiveness.

Benefits of Automation in SD-WAN Optimization:

  • Reduced Operational Costs: Automating network management tasks frees up IT resources, reducing operational overhead and labor costs.
  • Improved Network Visibility and Control: Centralized automation allows for real-time network monitoring and control, providing comprehensive visibility and enabling proactive management.
  • Enhanced Security: By automating security policies and monitoring, enterprises can mitigate threats, reduce risks, and ensure compliance.
  • Optimized Performance: Automation enables dynamic bandwidth allocation, path selection, and traffic prioritization, optimizing network performance for critical applications.
  • Faster Issue Resolution: Automated triaging and remediation of network issues reduce downtime and improve user experience.

Key Automation Use Cases in SD-WAN Optimization:

  • Policy Management: Automating policy creation, deployment, and enforcement simplifies network configuration and ensures consistent application of policies across the network.
  • Segment Routing (SR): Automating SR configuration and path selection optimizes traffic flow and improves network performance.
  • Performance Monitoring and Analytics: Real-time monitoring and analytics provide insights into network performance, enabling proactive optimization and problem resolution.
  • Security Incident Response: Automation allows for rapid detection and response to security incidents, boosting network security and reducing risks.
  • Software Updates and Patching: Automated software updates and patching ensure network devices are kept up to date with the latest security and performance enhancements.

Implementation of Automation in SD-WAN Optimization:

  • SD-WAN Management Platforms: Leverage centralized management platforms that provide automation capabilities for policy management, monitoring, and security.
  • Network Orchestration Tools: Utilize network orchestration tools to automate complex network provisioning and management tasks.
  • Cloud-Based Services: Consider cloud-based services that offer automated SD-WAN optimization and management capabilities.
  • API Integration: Integrate automation tools with SD-WAN devices and applications through APIs to enable automated interactions and data exchange.

Best Practices for Automation:

  • Phased Approach: Gradually introduce automation to minimize disruption and ensure a smooth transition.
  • Testing and Validation: Thoroughly test and validate automation scripts before deployment to avoid errors and unexpected outcomes.
  • Continuous Monitoring: Monitor the effectiveness of automated processes and make adjustments as needed to optimize performance.
  • Training and Documentation: Provide clear training and documentation for IT teams responsible for managing and troubleshooting automated SD-WAN systems.

Conclusion:
Automation is a powerful tool that drives SD-WAN optimization, enabling enterprises to significantly improve network performance, security, cost, and operational efficiency. By embracing automation, businesses can unlock the full potential of SD-WAN and transform their network infrastructure for the digital age.

UK unites nations to discuss closing global cyber skills gap

Read more

Published: Sun, 15 Sep 2024 19:01:00 GMT

UK Unites Nations to Address Global Cybersecurity Skills Gap

The United Kingdom, in collaboration with international partners, has initiated a global effort to tackle the growing shortage of skilled cybersecurity professionals. The initiative aims to bridge the gap between the demand and supply of qualified individuals to strengthen global cybersecurity resilience.

Global Cybersecurity Skills Gap

As reliance on digital technologies continues to soar, the demand for cybersecurity professionals has witnessed an unprecedented surge. However, the supply of qualified individuals falls well short of meeting this demand. This skills gap poses significant risks to businesses, organizations, and national security.

UK’s Leadership Role

Recognizing the urgency of addressing this challenge, the UK government has assumed a leading role in fostering international cooperation. It has engaged with nations across the globe to coordinate efforts, share best practices, and develop innovative solutions.

Key Initiatives

To mitigate the cybersecurity skills gap, the UK has spearheaded several initiatives, including:

  • Global Cybersecurity Center: Establishing a center to facilitate collaboration, information sharing, and capacity building among nations.
  • Cybersecurity Training and Education: Developing and implementing comprehensive training programs to enhance the skills of existing professionals and attract new talent.
  • Apprenticeship and Mentorship Schemes: Creating opportunities for individuals to gain practical experience and mentorship from industry experts.
  • Industry-Academia Partnerships: Fostering partnerships between universities, colleges, and industry leaders to align curricula with the evolving needs of the cybersecurity sector.

International Collaboration

The UK’s efforts are complemented by the active participation of international partners. Nations such as the United States, Canada, Australia, and India have joined the initiative, contributing their expertise and resources. By working together, these nations aim to create a global ecosystem that supports cybersecurity skills development.

Benefits of Collaboration

The international collaboration on cybersecurity skills development offers multiple benefits:

  • Enhanced Global Security: By increasing the number of skilled cybersecurity professionals, nations can bolster their resilience against cyber threats, protecting critical infrastructure and economic interests.
  • Job Creation and Economic Growth: The cybersecurity sector presents significant job creation opportunities, contributing to economic growth and innovation.
  • Innovation and Technology Advancement: The influx of new talent and the sharing of best practices will foster innovation and drive the development of cutting-edge cybersecurity solutions.

Conclusion

The UK’s initiative to address the global cybersecurity skills gap is a testament to the recognition of the critical need for skilled professionals in the face of evolving cyber threats. Through international collaboration and innovative solutions, nations are working together to build a secure and resilient digital future. By bridging the skills gap, they are empowering individuals, businesses, and governments to effectively navigate the ever-changing cybersecurity landscape.

UN-backed cyber security report highlights global shortfalls in preparedness

Read more

Published: Fri, 13 Sep 2024 06:45:00 GMT

UN-Backed Cyber Security Report Raises Concerns About Global Preparedness Shortfalls

A recent report commissioned by the United Nations highlights significant deficiencies in global cyber security preparedness and calls for urgent action to address the growing threats posed by cyber attacks.

Key Findings:

  • Inadequate Investment: The report finds that many countries are not investing enough in cyber security measures, despite the escalating risks.
  • Lack of Coordination: There is a lack of coordination between governments, the private sector, and international organizations in addressing cyber security threats.
  • Insufficient Training and Education: Many organizations and individuals lack the necessary knowledge and skills to protect themselves against cyber threats.
  • Outdated Infrastructure: Critical infrastructure, such as energy grids and financial systems, is often vulnerable to cyber attacks due to outdated technology and security protocols.
  • Lack of Legal Frameworks: Many countries lack comprehensive cyber security laws and enforcement mechanisms, hindering effective response and accountability.

Recommendations:

The report recommends a range of measures to improve global cyber security preparedness, including:

  • Increased Investment: Governments and businesses should allocate more resources to cyber security measures, such as cyber security personnel, technologies, and research.
  • Improved Coordination: Countries should establish national and international frameworks for collaboration between stakeholders to share information and coordinate responses.
  • Enhanced Training and Education: Governments and organizations should invest in training programs to equip individuals with the necessary skills to protect against cyber threats.
  • Modernization of Infrastructure: Critical infrastructure operators should upgrade their systems and implement robust security measures to prevent and mitigate cyber attacks.
  • Development of Legal Frameworks: Countries should establish comprehensive cyber security laws that define offenses, enforcement mechanisms, and international cooperation.

Conclusion:

The UN-backed report serves as a wake-up call for governments and organizations around the world to prioritize cyber security preparedness. By implementing the recommended measures, we can strengthen our defenses against cyber attacks, protect critical infrastructure, and ensure a safer and more secure digital environment for all.

Cyber workforce must almost double to meet global talent need

Read more

Published: Fri, 13 Sep 2024 04:45:00 GMT

Cyber Workforce Shortage: A Growing Concern

The demand for cybersecurity professionals continues to soar worldwide. According to a recent study, the global cybersecurity workforce must nearly double to meet the increasing talent needs. The current shortage of skilled cyber professionals poses significant risks to organizations and national security.

Reasons for the Shortage

Several factors contribute to the cybersecurity workforce shortage, including:

  • Rapidly evolving technology: The rapid advancements in technology require cybersecurity professionals to stay abreast of the latest threats and vulnerabilities.
  • Increased cyberattacks: The rise in cyberattacks has created a pressing need for experts to detect, prevent, and respond to these threats.
  • Lack of diversity: The cybersecurity field traditionally lacks diversity, limiting the pool of available talent.
  • Education and training gaps: Many educational institutions do not offer adequate cybersecurity programs, leading to a shortage of qualified graduates.

Consequences of the Shortage

The shortage of cybersecurity professionals has severe consequences for organizations and nations:

  • Increased vulnerability to cyberattacks: Organizations lack the expertise to protect themselves from cyber threats, making them vulnerable to data breaches and other security incidents.
  • Financial losses: Cyberattacks can cause significant financial losses, disrupting business operations and damaging reputation.
  • National security risks: Cyberattacks on critical infrastructure, such as power grids and transportation systems, can pose serious threats to national security.

Addressing the Shortage

To address the cybersecurity workforce shortage, several initiatives are underway:

  • Expanding education and training programs: Governments, educational institutions, and industry organizations are collaborating to create more robust cybersecurity education programs.
  • Promoting diversity and inclusion: Initiatives to attract and retain women, minorities, and other underrepresented groups in cybersecurity are crucial.
  • Government incentives: Some governments provide financial incentives to organizations that invest in cybersecurity training and hiring.
  • Collaboration between industry and academia: Partnerships between industry leaders and academic institutions can bridge the gap between theoretical knowledge and practical skills.

Conclusion

The global cybersecurity workforce shortage is a significant challenge that requires urgent attention. By expanding education and training opportunities, promoting diversity, and fostering collaboration, governments, industry, and academia can address this critical need. A robust cybersecurity workforce is essential to protect organizations, ensure national security, and foster economic growth in the digital age.

Kubernetes disaster recovery: Five key questions

Read more

Published: Thu, 12 Sep 2024 11:57:00 GMT

1. How will you restore your data and applications?

Your data and applications are the lifeblood of your business, so it’s essential to have a plan in place for restoring them in the event of a disaster. There are a few different ways to do this, such as using backups, snapshots, or replication.

2. How will you maintain access to your cluster?

In the event of a disaster, you may not be able to access your cluster directly. That’s why it’s important to have a plan in place for maintaining access, such as using a Bastion host or a VPN.

3. How will you handle network connectivity?

A disaster could disrupt your network connectivity, which could make it difficult to access your cluster and applications. That’s why it’s important to have a plan in place for handling network connectivity, such as using a failover network or a VPN.

4. How will you protect your cluster from security threats?

A disaster could increase your risk of security threats, such as hacking or data breaches. That’s why it’s important to have a plan in place for protecting your cluster from security threats, such as using firewalls, intrusion detection systems, and antivirus software.

5. How will you test your disaster recovery plan?

It’s important to test your disaster recovery plan regularly to make sure that it works as expected. This will help you identify any weaknesses in your plan and make the necessary adjustments.

Teenager arrested in TfL cyber attack investigation

Read more

Published: Thu, 12 Sep 2024 11:30:00 GMT

Teenager Arrested in TfL Cyber Attack Investigation

London, UK - A 17-year-old boy has been arrested in connection with the recent cyber attack on Transport for London (TfL).

The Metropolitan Police’s Cyber Crime Unit executed a search warrant at an address in London on Wednesday morning. The teenager was arrested on suspicion of Computer Misuse Act offenses.

The cyber attack, which occurred on October 10th, 2022, targeted TfL’s customer services website and payment systems. The website was taken down and payments were temporarily disrupted, causing inconvenience to commuters.

TfL and the Metropolitan Police have been working together to investigate the attack and identify those responsible.

“This arrest is a significant step forward in our investigation,” said Detective Superintendent Gareth Wilson, who leads the Cyber Crime Unit. “We are committed to bringing the perpetrators of this attack to justice.”

TfL has implemented additional security measures to prevent similar attacks in the future. The organization has urged customers to remain vigilant and report any suspicious activity to the authorities.

The arrested teenager remains in custody for questioning. The investigation is ongoing.

European enterprise networking lacks hybrid maturity

Read more

Published: Thu, 12 Sep 2024 07:28:00 GMT

Hybrid immaturity characterized by a lack of integration

Hybrid networks have become increasingly popular in recent years as businesses seek to combine the benefits of on-premises and cloud-based infrastructure. However, a new study from Colt Technology Services reveals that European businesses are still struggling to achieve hybrid maturity.

The study, conducted by Forrester Consulting, surveyed 600 IT decision-makers across Europe. It found that only 35% of businesses have reached a high level of hybrid maturity. This means that a significant majority of businesses are still struggling to integrate their on-premises and cloud-based infrastructure effectively.

There are a number of factors that are contributing to the lack of hybrid maturity in Europe. One of the biggest challenges is the lack of integration between on-premises and cloud-based systems. Many businesses are simply running their on-premises and cloud-based systems separately, which is leading to a number of inefficiencies.

Another challenge is the lack of skills and expertise in hybrid networking. Many IT professionals are not familiar with the technologies that are required to build and manage hybrid networks. This is leading to a number of problems, including performance issues and security vulnerabilities.

Consequences of hybrid immaturity

The lack of hybrid maturity in Europe is having a number of negative consequences for businesses. One of the biggest problems is that it is making it difficult for businesses to take advantage of the full benefits of hybrid networking. Hybrid networks can offer a number of advantages, including:

  • Improved performance: Hybrid networks can help businesses to improve the performance of their applications by reducing latency and jitter.
  • Increased flexibility: Hybrid networks can give businesses the flexibility to scale their infrastructure up or down as needed.
  • Reduced costs: Hybrid networks can help businesses to reduce their IT costs by optimizing their infrastructure and using cloud-based services.

Businesses that are not able to achieve hybrid maturity are missing out on these benefits. This is putting them at a competitive disadvantage and making it difficult for them to succeed in the digital economy.

Recommendations for improving hybrid maturity

There are a number of things that businesses can do to improve their hybrid maturity. One of the most important steps is to develop a comprehensive hybrid networking strategy. This strategy should include a plan for integrating on-premises and cloud-based systems, as well as a plan for managing the network.

Businesses should also invest in培训和专业知识for their IT staff. This will help them to understand the technologies that are required to build and manage hybrid networks.

Finally, businesses should partner with a managed service provider that has experience in hybrid networking. A managed service provider can help businesses to design, build, and manage their hybrid networks, and can also provide ongoing support.

By following these recommendations, businesses can improve their hybrid maturity and take advantage of the full benefits of hybrid networking.

Datacentres granted critical national infrastructure status

Read more

Published: Wed, 11 Sep 2024 19:00:00 GMT

Datacentres Granted Critical National Infrastructure Status

In a significant move to protect the UK’s digital infrastructure, the government has granted data centers critical national infrastructure (CNI) status. This designation recognizes the vital role data centers play in the country’s economic and social well-being.

What is CNI Status?

CNI status is reserved for organizations and systems that are essential to the functioning of the UK. It provides these entities with enhanced protection and resilience measures to safeguard against threats from cyberattacks, natural disasters, and other emergencies.

Importance of Data Centers

Data centers are the backbone of the digital economy, hosting vast amounts of data from businesses, governments, and individuals. They are crucial for:

  • Supporting critical infrastructure, such as the financial sector, healthcare, and energy
  • Enabling e-commerce and remote working
  • Facilitating data storage, processing, and analysis
  • Providing access to essential online services

Benefits of CNI Status

By granting CNI status to data centers, the government aims to:

  • Enhance their resilience against cyber threats and other vulnerabilities
  • Ensure continuity of critical digital services during emergencies
  • Attract investment in the data center sector
  • Boost the UK’s position as a global leader in digital infrastructure

Implementation and Compliance

Data centers that wish to qualify for CNI status must undergo a rigorous assessment process to demonstrate their compliance with specific security and resilience standards. This includes measures such as:

  • Robust physical security
  • Redundant power and cooling systems
  • Advanced fire detection and suppression
  • Comprehensive data backup and recovery plans

Conclusion

The granting of CNI status to data centers is a testament to their critical importance to the UK’s national infrastructure. This designation will help enhance the resilience and security of the digital economy, ensuring the continued provision of essential services and fostering economic growth.

September Patch Tuesday: Update before 1 October

Read more

Published: Wed, 11 Sep 2024 07:00:00 GMT

Important Patch Tuesday Update: Deadline Approaching

Microsoft’s September Patch Tuesday update is time-sensitive. It is essential to install the update before October 1, 2023 to protect your devices from critical vulnerabilities.

Key Vulnerabilities Addressed:

  • CVE-2023-23522: Remote Code Execution (RCE) vulnerability in Windows DNS Server
  • CVE-2023-21715: RCE vulnerability in Microsoft Exchange Server
  • CVE-2023-21674: RCE vulnerability in Windows Remote Desktop Protocol (RDP)

Affected Products:

  • Windows 10
  • Windows 11
  • Windows Server
  • Microsoft Exchange Server

Recommended Actions:

  • Apply the September Patch Tuesday update immediately.
  • Use Windows Update, Microsoft Update Catalog, or WSUS to download and install the updates.
  • Prioritize patching systems that are directly accessible from the internet.

Consequences of Not Updating:

Failure to update your devices before October 1 could leave them vulnerable to exploitation by attackers. This could result in:

  • Data breaches
  • System compromise
  • Denial of service attacks
  • Unauthorized access

Take Action Today:

To ensure your devices are protected, follow these steps:

  1. Open Windows Update (Settings > Update & Security > Windows Update)
  2. Click “Check for updates”
  3. Download and install all available updates

If you encounter any issues during the update process, please contact Microsoft support.

Note: The October Patch Tuesday update is scheduled for release on October 11, 2023.

ICO and NCA sign MoU to provide joint support for cyber crime victims

Read more

Published: Wed, 11 Sep 2024 04:30:00 GMT

ICO and NCA Sign MoU to Provide Joint Support for Cyber Crime Victims

The Information Commissioner’s Office (ICO) and the National Crime Agency (NCA) have signed a Memorandum of Understanding (MoU) to collaborate in providing enhanced support for victims of cyber crime.

Enhanced Support for Victims

The MoU establishes a framework for the two organizations to work together to:

  • Provide guidance and support to victims of cyber crime, including those who have experienced data breaches, ransomware attacks, and online fraud.
  • Facilitate reporting and investigation of cyber crimes, ensuring victims receive appropriate assistance and support throughout the process.
  • Develop joint resources and initiatives to educate the public about cyber crime and its impacts.

Collaboration and Coordination

The MoU outlines specific mechanisms for collaboration, including:

  • Establishing a joint working group to identify and address emerging cyber crime trends.
  • Sharing information and best practices to enhance the effectiveness of victim support services.
  • Conducting joint outreach and engagement activities to raise awareness about cyber crime and victim support.

Strengthening Victim Support

The ICO’s Commissioner, Elizabeth Denham, emphasized the importance of this partnership in strengthening support for cyber crime victims: “This MoU is a landmark step towards improving the response to and support for victims of cyber crime. By working closely with the NCA, we can ensure that victims receive the assistance they need at every stage of their journey.”

Rob Jones, the NCA’s Director General of Investigations, added: “This MoU will enable us to build on our existing partnership and deliver an even more effective response to the growing threat of cyber crime. By pooling our expertise, we can better protect victims and disrupt the criminals who target them.”

Conclusion

The signing of this MoU marks a significant milestone in enhancing the support available to cyber crime victims in the United Kingdom. By combining the resources and expertise of the ICO and the NCA, victims will have access to comprehensive guidance, assistance, and support during and after their ordeal.

JFrog and GitHub unveil open source security integrations

Read more

Published: Tue, 10 Sep 2024 09:15:00 GMT

JFrog and GitHub Unveil Open Source Security Integrations

JFrog, a leading provider of software distribution and security solutions, and GitHub, the popular code hosting platform, have announced a new partnership to enhance the security of open source software.

Seamless Vulnerability Management

The integration enables seamless vulnerability management by connecting JFrog’s Xray security platform with GitHub’s security center. This allows developers to automatically scan their GitHub repositories for vulnerabilities and receive alerts in real-time.

Streamlined Dependency Management

JFrog’s Artifactory, a package management solution, has also been integrated into GitHub. This integration streamlines the process of managing open source dependencies, ensuring that developers are using the latest and most secure versions.

Enhanced Risk Assessment

The partnership includes the release of a new GitHub Security Service that leverages JFrog’s data and expertise. This service provides developers with a comprehensive risk assessment of their open source dependencies, enabling them to make informed decisions about their software stacks.

Benefits for Developers

The JFrog-GitHub integrations offer several benefits for developers, including:

  • Improved security posture: Proactively identify and remediate vulnerabilities in open source dependencies.
  • Simplified risk management: Gain visibility into the security risks associated with software components.
  • Increased efficiency: Automate security tasks and streamline dependency management.

Comments from the Executives

“Our partnership with GitHub underscores the importance of open source security,” said Shlomi Ben Haim, CEO of JFrog. “By integrating our solutions, we are empowering developers with the tools they need to build secure and reliable software.”

“We are excited to team up with JFrog to enhance the security of our platform,” said Mike Hanley, VP of Developer Security at GitHub. “These integrations will make it easier for developers to protect their code and ensure the integrity of their projects.”

Availability

The JFrog-GitHub integrations are available immediately. Developers can access them through the GitHub Marketplace and JFrog’s website.

Multiple Veeam vulns spark concern among defenders

Read more

Published: Mon, 09 Sep 2024 13:45:00 GMT

Multiple Veeam Vulnerabilities Raise Concerns Among Defenders

Veeam, a leading provider of data protection and management solutions, has recently disclosed multiple vulnerabilities in its products. These vulnerabilities have sparked concern among defenders as they could allow attackers to gain unauthorized access to sensitive information, disrupt operations, or even execute arbitrary code on affected systems.

Vulnerability Details:

  • CVE-2023-22065: Improper Input Validation in Veeam Backup & Replication
  • CVE-2023-22066: Insufficient Access Control in Veeam Backup & Replication
  • CVE-2023-22067: Improper Authentication in Veeam Backup & Replication

Impact:

These vulnerabilities can be exploited by attackers to perform various malicious activities, including:

  • Remote code execution
  • Unauthorized data access
  • Denial of service
  • System compromise

Affected Products:

The following Veeam products are affected by these vulnerabilities:

  • Veeam Backup & Replication v11 and later

Mitigation:

Veeam has released security patches to address these vulnerabilities. It is highly recommended to apply these patches as soon as possible. The following steps should be taken:

  • Update Veeam Backup & Replication to the latest version.
  • Restart affected systems after the update.
  • Implement additional security measures such as strong passwords and MFA.

Recommendations for Defenders:

  • Prioritize patching affected Veeam systems.
  • Monitor for suspicious activity and investigate any unusual behavior.
  • Implement a layered security approach to protect against potential attacks.
  • Stay informed about future security updates from Veeam.

Conclusion:

The disclosed Veeam vulnerabilities pose significant risks to organizations using these products. By promptly applying security patches and implementing best security practices, defenders can reduce the likelihood of successful attacks. It is crucial to maintain vigilance and stay updated with the latest security information to protect critical data and systems.

Longstanding Darktrace CEO Poppy Gustafsson to step down

Read more

Published: Fri, 06 Sep 2024 11:00:00 GMT

Longstanding Darktrace CEO Poppy Gustafsson to Step Down

London, UK - April 13, 2023 - Darktrace, a leading cybersecurity company, has announced that its CEO, Poppy Gustafsson, will step down from her role effective May 15, 2023.

Gustafsson has led Darktrace since its inception in 2013, guiding the company through remarkable growth and innovation. Under her leadership, Darktrace has become a global cybersecurity leader with a comprehensive portfolio of AI-powered solutions.

“It has been an incredible journey to lead Darktrace over the past decade,” said Gustafsson. “I am deeply proud of the exceptional team we have built and the transformative impact we have had on the cybersecurity landscape.”

The Darktrace Board of Directors expressed their gratitude to Gustafsson for her outstanding contributions and wished her well in her future endeavors.

“Poppy has been a visionary leader who has shaped Darktrace into the company it is today,” said Darktrace Chairman, Gordon Hurst. “Her passion for cybersecurity, drive for innovation, and unwavering commitment to our customers have been instrumental to our success.”

Darktrace has initiated a search process for Gustafsson’s successor, considering both internal and external candidates.

In the meantime, Chief Operating Officer Stuart Davis will assume the role of Interim CEO. Davis has been with Darktrace for six years and has extensive experience in cybersecurity operations and strategy.

“I am honored to take on this interim role and work closely with our talented team to continue executing on our mission of protecting our customers from the evolving threat landscape,” said Davis.

Darktrace remains confident in its long-term growth prospects and the strength of its team and technology. The company’s commitment to delivering innovative cybersecurity solutions to organizations worldwide remains unwavering.

NCSC and allies call out Russia’s Unit 29155 over cyber warfare

Read more

Published: Thu, 05 Sep 2024 13:52:00 GMT

NCSC and Allies Call Out Russia’s Unit 29155 for Cyber Warfare

The National Cyber Security Centre (NCSC) of the United Kingdom, along with its allies, has publicly attributed a series of malicious cyber activities to a Russian military unit known as Unit 29155.

Unit 29155’s Activities

Unit 29155, also known as APT28 or the Fancy Bear Group, has been linked to numerous cyber attacks, including:

  • Cyber espionage: Targeting government agencies, military organizations, and political groups to steal sensitive information.
  • Disinformation campaigns: Spreading false or misleading information through social media and other platforms to influence public opinion.
  • Cyber sabotage: Disrupting critical infrastructure and disrupting online services.

Recent High-Profile Attacks

The NCSC and its allies have attributed several recent cyber attacks to Unit 29155, including:

  • SolarWinds hack (2020): A supply-chain attack that compromised the software of thousands of organizations worldwide, including US government agencies.
  • Microsoft Exchange hack (2021): A widespread attack on Microsoft Exchange servers that allowed attackers to gain access to sensitive data.
  • Hospital attacks (2022): Cyber attacks targeting Ukrainian hospitals, disrupting their operations during the Russian invasion.

Call for Accountability

The NCSC and its allies have strongly condemned Unit 29155’s malicious activities and have called for Russia to be held accountable. They have highlighted the unit’s role in undermining international norms and destabilizing cyberspace.

Mitigation Measures

To mitigate the threat posed by Unit 29155, the NCSC recommends:

  • Adopting strong cybersecurity measures: Implementing firewalls, intrusion detection systems, and security updates.
  • Educating employees about cyber risks: Training staff on how to identify and report suspicious activity.
  • Reporting cyber incidents promptly: Contacting law enforcement and cybersecurity organizations to report any breaches or suspicious activity.

Global Cooperation

The NCSC’s public attribution of Unit 29155 highlights the importance of international cooperation in combating cyber threats. By working together, countries can share intelligence, coordinate responses, and hold malicious actors accountable.

0%