Former Defence CISO to government: Get the basics right on cyber security

CIO | February 18, 2019

Former Department of Defence chief information security officer Lynwen Connick has called on the government to "get the basics right" around digital security in the wake of a cyber attack on the parliamentary computer network. The Department of Parliamentary Services earlier this month reset the passwords of MPs and staff after the Australian Cyber Security Centre (ACSC) identified what the Prime Minister Scott Morrison described as a “malicious intrusion" into the Australian Parliament House network. An investigation into the attack has led the ACSC to believe it was conducted by a "sophisticated state actor" that also penetrated the networks of the Liberal, Labor and National parties. Connick, who joined ANZ bank in 2017 as CISO from a role advising then prime minister Malcolm Turnbull on cyber security issues, told CIO Australia today that government should better communicate threats and improve it's basic cyber hygiene.

Spotlight

APTs (advanced persistent threats) have changed the world of enterprise security and how networks and organizations are attacked. These threats, and the cyber-criminals behind them, are experts at remaining hidden from traditional security while exhibiting an intelligence, resiliency, and patience that has never been seen before. Controlling these threats requires multiple security disciplines working together in context. While no single solution will solve the problem of advanced threats on its own, next-generation security provides the unique visibility and control of, and the true integration of, threat-prevention disciplines needed to find and stop these threats — both known and unknown.

Spotlight

APTs (advanced persistent threats) have changed the world of enterprise security and how networks and organizations are attacked. These threats, and the cyber-criminals behind them, are experts at remaining hidden from traditional security while exhibiting an intelligence, resiliency, and patience that has never been seen before. Controlling these threats requires multiple security disciplines working together in context. While no single solution will solve the problem of advanced threats on its own, next-generation security provides the unique visibility and control of, and the true integration of, threat-prevention disciplines needed to find and stop these threats — both known and unknown.

Related News

SOFTWARE SECURITY

Atera Launches New Integration with Malwarebytes

Atera | July 08, 2022

Atera, a remote-first IT management company, today announced a new integration with Malwarebytes, a provider of real-time cyber protection. Atera is the first remote management company to offer an integration that automates licensing and provisioning of the Malwarebytes OneView platform. This partnership plays an integral role for Atera to provide streamlined and maximized security operations for its community of more than 10,000 customers across 105 countries. "With workplaces continuing to evolve and employees working from anywhere in the world, the risk of ransomware attacks continues to climb. At Atera, we are committed to providing a platform with unmatched security and transparency for our customers," said Gil Pekelman, CEO of Atera. "An integration with Malwarebytes has been one of the most requested by our users, and we're thrilled to roll this out for our customers so they can easily install and manage their endpoint security solutions." This latest integration by Atera will include the option for users to deploy Malwarebytes' products directly through Atera, providing additional ease of use within the Atera platform. Customers will gain access to Malwarebytes' OneView platform, enabling license management, detailed, value-driven reporting that can be shared with their end users, and customer site administration. The integration will include Incident Response, Endpoint Protection, and Endpoint Protection and Response — the latter two being available for both Mac and Windows workstations and Mac/Windows/Linux servers. "As a leading provider of software and solutions to combat malware, we are continuously looking for opportunities to streamline and simplify cybersecurity, making it available for everyone. "Integrations with RMM providers are one way to help achieve this simplicity. Through our latest partnership with Atera, we are furthering the ability of global organizations with limited resources to successfully combat malware and manage endpoints at scale." Brian Thomas, Vice President of Worldwide MSP and Channel Programs for Malwarebytes About Atera Atera is the developer of a Remote Monitoring and Management (RMM) and Professional Services Automation (PSA) platform, built with a dispersed workforce in mind. With more than 10,000 customers in over 105 countries, Atera's intuitive all-in-one platform offers IT professionals and businesses improved operational efficiency, seamless integrations, and end-to-end management at industry-disruptive pricing. Atera's platform empowers IT teams of all sizes to maximize efficiency while transforming to a streamlined remote work environment by analyzing over 60,000 data points per second, 24/7. To learn more, visit atera.com. About Malwarebytes Malwarebytes believes that when people and organizations are free from threats, they are free to thrive. Founded in 2008, Malwarebytes CEO Marcin Kleczynski had one mission: to rid the world of malware. Today, that mission has expanded to provide cyber protection for everyone. Malwarebytes provides consumers and organizations with device protection, privacy, and prevention through effective, intuitive, and inclusive solutions in the home, on-the-go, at work, or on campus. A world-class team of threat researchers and security experts enable Malwarebytes to protect millions of customers and combat existing and never-before-seen threats using artificial intelligence and machine learning to catch new threats rapidly.

Read More

SOFTWARE SECURITY

Syscoin Launches Network Rollup Facility

Syscoin | June 13, 2022

Syscoin, a cutting-edge base layer protocol that incorporates the composability of Ethereum-style smart contracts with the Bitcoin Network's industry-leading security, announced today the upcoming release of Rollux, a suite of developer-ready scaling solutions for developing decentralized applications at the speed of Web2 architectures. “At Syscoin, we are constantly improving the architecture of our platform to offer the most capable solution for developers who want to build with Bitcoin’s security, Ethereum’s flexibility, and, beginning today, Syscoin’s own scaling solutions. The launch of our in-house Layer 2 rollup suite marks a major milestone in the evolution of the Syscoin Network toward being the ultimate foundation for applications aimed at individuals, global enterprises and even governments around the world.” Jag Sidhu, Syscoin Foundation’s lead developer and president Moreover, Syscoin uses its unique Proof-of-Data-Availability (PoDA) breakthrough with Rollux to secure accessible off-chain data for rollups. Apart from Ethereum, Syscoin will be one of the first chains to host optimistic rollups and the only one to use Bitcoin's gold-standard proof-of-work hashing for its own security. As Ethereum evolves toward a proof-of-stake consensus paradigm, this difference will become more relevant. Syscoin's development plan is divided into three segments. The first phase concluded in December with the release of Syscoin's Network-Enabled Virtual Machine (NEVM). Syscoin's NEVM parallel Layer 1 chain allows developers to construct Ethereum-compatible, smart-contract-based decentralized apps on the Syscoin Network. Rollux is Syscoin's in-house Layer 2 rollup suite and marks the next step in the company's evolution. Rollux will provide scaling solutions to applications that use the Syscoin Platform foundation layer in order to provide decentralized services at Web2-like speeds. Furthermore, the Rollux suite will be a comprehensive Layer 2 solution that covers the full range of scaling methods. Rollux will first provide Optimistic rollouts before extending to include ZK rollups when they become practicable. When it is released, Rollux's optimistic rollup utility will use modular scaling technologies to provide the most efficient, cost-effective, scalable, and secure Layer 2 available. Syscoin will unleash performance and scalability 50 times that of existing Layer 2s and 5000 times that of the Ethereum mainnet with direct EVM counterparts like Arbitrum's Nitro and Optimism's Cannon. This powerful platform will continue to progress the sector for many years to come, ultimately ushering in stateless Layer 2 systems that offer a significant advancement in scalability and security. Syscoin Rollux will represent the cutting edge of scaling technology for Solidity-based smart contracts, with Layer 2 scaling coupled to Bitcoin's security standard. Moreover, since the smart contract layer is entirely EVM-compatible, it will be straightforward to onboard applications from Ethereum that want to add Bitcoin's security at scale. Finally, since the non-profit Syscoin Foundation is releasing the Rollux suite, the project will avoid charging excessive fees and using token schemes that add friction and costs to consumers.

Read More

SOFTWARE SECURITY

Hub Security Signs Agreement With Leading Cyber System Integrators

Hub Security | July 01, 2022

HUB Cyber Security (Israel) Limited, a developer of Confidential Computing cybersecurity solutions and services, announced today an agreement to sell HUB's Confidential Compute solutions to US enterprises and telecommunications companies with one of the largest US cyber security system integrators. In the United States, the integrator focuses on supplying equipment and services for 5G networks and edge computing. The engagement is for two years and can be extended by mutual consent between both parties. This is HUB's first strategic partnership in the US market, and the company expects it will improve product sales in the US and have a major influence on revenues over the next 24 months. "We are on a path to hyper growth in the sales of our Confidential Computing solutions worldwide over the next five years to establish ourselves as a leader in this space. The U.S. is a prime target and we intend to build a string of partnerships for rapid introductions and deployments of our solutions in Fortune 500 companies and government agencies." Eyal Moshe, CEO of HUB Security

Read More