Connect with us

Featured

Network becomes device

Published

on

In our hyper connected world, the threat of cybercrime is becoming blatantly clear. PAOLO CAMPOLI, Head of Middle East & Africa Global SP Sales at Cisco, discusses the real risk of the networked economy.

Today the true power of the computer comes from being connected, and with more devices connected, so power grows exponentially. We see this today with cloud computing and increasingly with the Internet of Everything (IoE), which is creating unprecedented opportunities for service providers through the interconnection of people, processes, data, and things.

Largely because of this exciting evolution, we are now facing a similar inflection point with respect to security. To capture opportunities made possible by ever-expanding connectivity, security must evolve in lock-step. In effect: “The network must become the security device” and likewise, the deployment of network services through virtualised technologies requires security considerations.

So how have we evolved our approach to security as defenders? The truth is, not nearly enough. Caught in a cycle of layering on the latest security tool, it isn’t unusual to find organizations with 40 to 60+ different security solutions that don’t – and can’t – work together or interoperate. Attackers are taking advantage of gaps in visibility and protection that this complexity and fragmentation creates to penetrate the network. Environmentally aware, attackers navigate through the extended network, evading detection and moving laterally until reaching the target. Once they accomplish their mission they remove evidence but maintain a beachhead for future attacks.

To truly address today’s dynamic threat landscape, evolving business models, and considerable complexity, security must be embedded into the heart of the intelligent network infrastructure and across the extended network – from the data center out to the mobile endpoint and even onto the factory floor.

When the network is the security device, our approach to security can be:

·Pervasive – to persist across all attack vectors

·Integrated – to share information and capabilities with a rich ecosystem of applications and services

·Continuous – to allow for ongoing protection across the full attack continuum – before, during, and after an attack

·Open – to integrate with third parties, including complementary security technologies and threat intelligence feeds

This requires that we build technologies into network infrastructure that increase visibility across all network activity, provide context based on local and global threat intelligence, and allow control using analysis and automation to dynamically protect against detected threats. We must design infrastructure that is open so that new capabilities and intelligence to address complex and evolving threats can be easily incorporated. And we must embed security without impeding business-critical resources and processes.

Cisco’s NFV (Network Functions Virtualisation) architecture has inbuilt security capabilities, which assist African Service Providers to transform their networks to prepare for the digitization in the IoT/IoE era. SDN also enhances the benefits of data center virtualization, increasing resource flexibility and utilization and reduces infrastructure costs and overhead and enables network programmability and code development to bring applications and networks closer. The result is a modern infrastructure that can securely deliver new applications and services in minutes, rather than days or weeks required in the past delivering with a platform capable of handling the most demanding networking needs of today and tomorrow.

These capabilities were recently demonstrated globally by Light Reading, an independent media organisation, who requested that EANTC (an internationally recognized test center) conduct a series of validation and verification exercises on a number of Cisco SDN (software-defined networking) and virtualization platforms. Findings from the EANTC report, which were recently announced at the SDN World Congress, showed the reliability of Cisco’s secure NFV architecture.

As connectivity continues to expand, security must advance right along with it. By embedding security everywhere across the extended network, not only does security become more effective against advanced attacks, it also becomes a business enabler. Only then can businesses take full and secure advantage of opportunities presented by new digital business models and the IoE.

Featured

Password managers don’t protect you from hackers

Using a password manager to protect yourself online? Research reveals serious weaknesses…

Published

on

Top password manager products have fundamental flaws that expose the data they are designed to protect, rendering them no more secure than saving passwords in a text file, according to a new study by researchers at Independent Security Evaluators (ISE).

“100 percent of the products that ISE analyzed failed to provide the security to safeguard a user’s passwords as advertised,” says ISE CEO Stephen Bono. “Although password managers provide some utility for storing login/passwords and limit password reuse, these applications are a vulnerable target for the mass collection of this data through malicious hacking campaigns.”

In the new report titled “Under the Hood of Secrets Management,” ISE researchers revealed serious weaknesses with top password managers: 1Password, Dashlane, KeePass and LastPass.  ISE examined the underlying functionality of these products on Windows 10 to understand how users’ secrets are stored even when the password manager is locked. More than 60 million individuals 93,000 businesses worldwide rely on password managers. Click here for a copy of the report.

Password managers are marketed as a solution to eliminate the security risks of storing passwords or secrets for applications and browsers in plain text documents. Having previously examined these and other password managers, ISE researchers expected an improved level of security standards preventing malicious credential extraction. Instead ISE found just the opposite. 

Click here to read the findings from the report.

Previous Page1 of 2

Continue Reading

Featured

MWC: Next generation of inflight connectivity to be unveiled

Published

on

Next week at Mobile World Congress, the Seamless Air Alliance will reveal progress on its mission towards enabling the next generation of inflight connectivity. This follows a significant start for the Alliance, which has seen membership increase five-fold since the first meeting in June of last year. The Alliance has a new research laboratory setup and continues progress through its three working groups, writing specifications for the technology, requirements, and operations.

These developments represent a huge leap towards the goal of making connectivity as easy and enjoyable in the skies as it is on the ground. Appearing as part of the Airbus stand (Hall 6, stand 6G34), the Seamless Air Alliance will reveal specification topics that have been completed and published to its membership.

“The passenger experience with inflight connectivity remains one of the great technology challenges. From Day One we have been determined to deliver on our mission to bring industries and technologies together to make the inflight internet experience simple to access and a delight to use,” said the Alliance’s Chief Executive Officer, Jack Mandala.

“I have been tremendously encouraged by the enthusiastic and committed response we have seen and the widening areas of expertise we can call upon as more and more companies and organisations continue to join us,” he added.

Announced during MWC 2018, the Seamless Air Alliance has since grown to twenty-three membercompanies with more than one-hundred key personnel from across the membership participating in its three working groups, with numbers continuing to increase.

The Seamless Air Alliance was created by founding members Airbus, Airtel, Delta Air Lines, OneWeb and Sprint, and quickly joined by Air France KLM, Aeromexico, and GOL Linhas Aereas Inteligentes and global technology leaders including Astronics, Collins Aerospace, Comtech, Cyient, iDirect, Inmarsat, Intelsat, Latecoere, Nokia, and Panasonic. 

Today, the Alliance is pleased to announce five additional new members: Adaptive Channel, Etihad Airways, GlobalReach Technology, Safran, and SITAONAIR.

“We are extremely pleased to have these companies join and be a part of the companies driving the next generation of connectivity.” said Mr Mandala.

The Seamless Air Alliance will enable travelers boarding any flight, on any airline, anywhere in the world, to use their own devices to automatically connect to the Internet with no complicated login process nor paywall to scramble over.

The Alliance is also announcing the release of a new research study on the economic benefit of standardization on the inflight connectivity market at Mobile World Congress. This report is available for download at https://www.seamlessalliance.com/publications/

The Alliance is moving rapidly towards an expected demonstration of the technology later in 2019 and anticipates massive interest in Barcelona from the whole communications eco-system.

Continue Reading

Trending

Copyright © 2018 World Wide Worx