Shedding Light on Cross Domain Solutions

Never before has the need for collaborative data become more important, nor more vulnerable. APTs are becoming increasingly more advanced at jumping between systems. Meanwhile, today’s users are adept enough with computer systems to employ workarounds to traditional network separation requirements. These growing external and internal threats have an accumulative impact in creating and exploiting vulnerabilities. Correcting the aftereffects of this problem is a zero-sum game. To address the root of the problem, system architects must weigh information sharing capabilities against security controls between different network enclaves. This paper will explore the concept of cross-domain solution types by discussing their respective capabilities, common architectures, and critical considerations.

Spotlight

LEVL Technologies

LEVL develops a new concept for IoT security and device identity management. Different from existing cyber-security solutions, LEVL's unique technology provides security in the physical layer by offering a passive authentication technique which uses the unique RF characteristics of transmitting devices in order to validate their identity and prevent device spoofing and misbehavior. The technology developed at LEVL fills the current gap in cyber-security for wireless sensor networks and is based on the observation that the current IoT cyber-security solutions are often not suitable for the unique requirements of IoT.

OTHER WHITEPAPERS
news image

Revolutionizing cybersecurity

whitePaper | October 31, 2021

FINX, a platform established since 2018 that is enabled by blockchain technology to create the world’s 1st comprehensive decentralized banking platform. FINX aspires to resolve the problem of high banking costs imposed by conventional banks and serve the unbanked market in Southeast Asia.

Read More
news image

Who Owns Security in the Cloud?

whitePaper | September 27, 2022

Businesses once doubted the long-term benefits of moving their traditional, on-premises workloads to the cloud. But those doubts didn’t last long. The ROI of cloud migration was realized quickly and decisively. Businesses eagerly shifted their workloads to the cloud and realized the financial benefits of doing so. However, in the rush to the cloud, clarity on security — and who is responsible for it — is often lost.

Read More
news image

2023 Hybrid Cloud Security Survey

whitePaper | June 26, 2023

While we are witnessing a modest slowdown in cloud migration due to rising costs and economic uncertainty, it remains that a multitude of organizations now have a hybrid infrastructure in place. According to Forrester analysts,1 this is deemed very much the norm and reports show 72 percent of organizations exist in the hybrid cloud.2 This is because enterprises will likely have paired their own data center/private cloud with one or more public clouds as a result of acquisition or to reap a number of benefits: Cisco, for example, identified 42 percent of organizations believe they achieve a more agile and scalable development environment within the hybrid cloud, alongside 40 percent who realize accelerated business agility and innovation.3

Read More
news image

5 Top Residential Security Trends to Watch in 2023

whitePaper | February 24, 2023

The security industry has gained millions of households due to the explosion of DIY offerings and COVID-19. Households sought stability and safety during COVID and were able to find low-cost solutions. In 2022 though, home security system adoption slowed with home security ownership dropping from 2021 levels. The industry’s top players, however, are achieving record revenue in 2022 and that shows no signs of slowing. The rebound of professional installation since 2020 and recent solar system and service offerings have generated robust revenue growth.

Read More
news image

Navigating the Changing Cyber Landscape in Australia

whitePaper | April 13, 2023

Those high profile data breaches led to a swift response from the Government with the penalties for serious or repeated privacy breaches increased from $2.22 million to a minimum of $50 million at the end of December. Since then, the Government has released the Privacy Act Review Report and the 2023-2030 Australian Cyber Security Strategy that signpost a significant shift for Australia’s cyber landscape. Critical infrastructure; personal information; cyber security; dealing with ransomware attacks – all are likely to be shaken up.

Read More
news image

Intel® Converged Security and Management Engine (Intel® CSME) Security

whitePaper | October 26, 2022

Intel platforms are designed with a strong built-in security foundation. This allows the ecosystem partners to help protect the platform data and to build more trusted applications.

Read More

Spotlight

LEVL Technologies

LEVL develops a new concept for IoT security and device identity management. Different from existing cyber-security solutions, LEVL's unique technology provides security in the physical layer by offering a passive authentication technique which uses the unique RF characteristics of transmitting devices in order to validate their identity and prevent device spoofing and misbehavior. The technology developed at LEVL fills the current gap in cyber-security for wireless sensor networks and is based on the observation that the current IoT cyber-security solutions are often not suitable for the unique requirements of IoT.

Events