DATA SECURITY

Huawei and RCR Wireless Host a Fireside Chat on Zero-Trust Cybersecurity Strategy

Huawei | May 13, 2021

In collaboration with RCR Wireless, Huawei Technologies USA held a fireside chat with Andy Purdy, Chief Security Officer at Huawei Technologies USA, and Sean Kinney, Editor in Chief at RCR Wireless, to explore how organizations can understand and adopt zero-trust strategies. Purdy, a cybersecurity specialist, provides insights into accelerating the global adoption of standardized processes for ensuring the security of all telecom devices. He also discusses the wider implications of Huawei's inclusion on the US export controls list on the supply chain. While the list was established to protect national security, it has grown in scope and has had unexpected consequences for the global supply chain.

The fireside chat, which can be seen here, goes into greater detail on the importance of reestablishing global trust and cooperation to maintain a regular supply chain. Zero-trust cybersecurity strategies can promote an environment for innovation while also protecting national security through an intervention based on facts, verification, transparency, and risk management. The zero-trust model, which is based on never trusting and always verifying, assists companies in minimizing damage and reducing the possibility of hackers trying to infiltrate their systems. Following SolarWinds and other cyberattacks, the cybersecurity community has recognized the crucial importance of transparency and accountability. Experts emphasize the growing importance of incentives to encourage companies to uphold secure cybersecurity practices, as well as the need to hold organizations accountable when they fail to do so.

Are telecom operators building their networks following zero-trust principles? What will experts do to improve industry assurance, accountability, and transparency? What else will Huawei do to push for the global adoption of standardized processes for checking the security of all telecom equipment, not just Huawei's? And how has Huawei's inclusion on the U.S. Commerce Department's Bureau of Industry and Security entity list affected the company overall? Purdy and Kinney delve into these and other issues, including actionable insights into making cyberspace safer and more transparent by using zero-trust cybersecurity.

About Huawei

Huawei is a world leader in infrastructure and smart devices for information and communications technology (ICT). We are dedicated to bringing digital to every person, home, and enterprise through interconnected technologies across four key domains – telecom networks, IT, smart devices, and cloud services – for a fully connected, intelligent world.

Huawei's whole product, solution, and service portfolio are both competitive and secure. We create long-term value for our customers by an open partnership with ecosystem partners, collaborating to empower people, enhance home life, and inspire innovation in organizations of all sizes.

Huawei innovates to meet the needs of its customers. We make significant investments in basic research, focusing on technological breakthroughs that drive the world forward. We hire over 188,000 people and operate in over 170 countries and regions. Huawei, which was established in 1987, is a private company that is entirely owned by its employees.

Spotlight

Protecting your organization from threats is an ever-expanding and complicated process that requires an enormous amount of work. Even though the frequency and severity of breaches are rising, many organizations still rely on a small team of talented individuals to protect their organizations from attacks. These unsung heroes of cybersecurity cover many job functions and work very long hours to keep their organization safe. When your team is small, you have to do the mundane, manual tasks, from keeping spreadsheets and logs, to adding enrichment data and indicators before you can even think about incident response or proactive cybersecurity. You are asked to do so much, it wouldn’t be surprising if they handed you a mop and bucket and asked you to clean the floors too.

Spotlight

Protecting your organization from threats is an ever-expanding and complicated process that requires an enormous amount of work. Even though the frequency and severity of breaches are rising, many organizations still rely on a small team of talented individuals to protect their organizations from attacks. These unsung heroes of cybersecurity cover many job functions and work very long hours to keep their organization safe. When your team is small, you have to do the mundane, manual tasks, from keeping spreadsheets and logs, to adding enrichment data and indicators before you can even think about incident response or proactive cybersecurity. You are asked to do so much, it wouldn’t be surprising if they handed you a mop and bucket and asked you to clean the floors too.

Related News

DATA SECURITY

NETSCOUT Omnis Cyber Intelligence Integrates with AWS Security Hub

NETSCOUT | November 11, 2021

NETSCOUT SYSTEMS, INC. a leading provider of cybersecurity, service assurance, and business analytics solutions, today announced that Amazon Web Services, Inc. (AWS) customers will now have added visibility and security when migrating workloads to AWS using NETSCOUT's Omnis® Cyber Intelligence (OCI) integration with AWS Security Hub. NETSCOUT OCI is the industry's fastest and most scalable network security software solution, built on the foundation of the industry's most prominent network monitoring and packet recording and analysis technology. It uniquely detects and investigates suspicious activities in real-time and retrospectively, identifies threats early in the attack life cycle to prevent infections from spreading, stops future attacks, and identifies compromised assets. As a cloud security posture management service, AWS Security Hub performs automated, continuous security best practice checks against AWS resources, aggregates alerts, and enables automated remediation. The integration between NETSCOUT OCI and AWS Security Hub enhances the corporate security posture by extending the breadth and depth of cyberthreat visibility and intelligence. The integration is seamless since NETSCOUT OCI automatically formats violations in the Amazon Security Findings Format (ASFF) with built-in intelligence to suppress duplicate alerts and group them as needed. NETSCOUT OCI, through its integration with AWS Security Hub, helps detect, investigate, and respond to potentially malicious activity exposing risks that exist in hybrid cloud interdependencies. "As organizations migrate workloads to the cloud, their infrastructure becomes increasingly complex, making end-through-end visibility a necessity to uncover increased attack surfaces and combat threat exposure,As an AWS Validated Technology and Public Sector Partner with Network and Migration competencies, we've been in lock-step development with AWS. We're excited that customers can realize the benefits of NETSCOUT OCI, which is now fully integrated onto AWS Security Hub." Russ Currie, vice president, enterprise strategy, NETSCOUT About NETSCOUT NETSCOUT SYSTEMS, INC. helps assure digital business services against security, availability, and performance disruptions. Our market and technology leadership stems from combining our patented smart data technology with smart analytics. We provide real-time, pervasive visibility and insights customers need to accelerate and secure their digital transformation. Omnis Cyber Intelligence delivers the fastest and most scalable network security solution available on the market. NETSCOUT nGenius service assurance solutions provide real-time, contextual analysis of service, network, and application performance. And Arbor® Smart DDoS Protection by NETSCOUT products help protect against attacks that threaten availability and advanced threats that infiltrate networks to steal critical business assets. To learn more about improving service, network, and application performance in physical or virtual data centers or in the cloud, and how NETSCOUT's security and performance solutions can help you move forward with confidence.

Read More

DATA SECURITY

Aviation ISAC to Partner with Cyware for Expanding Automated Response Capabilities and Threat Intelligence Sharing

Cyware | June 28, 2021

Cyware, the well-known and the only Virtual Cyber Fusion Platform provider of the industry, has announced their strategic partnership with A-ISAC (Aviation Information and Analysis Center) to make them and its members timely respond to threat intelligence. This partnership will enable members of A-ISAC to run end-to-end security automation, incident response programs, and threat hunting more efficiently leveraging Cyware’s Cyber Fusion platform. A-ISAC, the global consortium for cybersecurity information, shares cybersecurity information across the aviation sector. It was founded by seven global aviation companies in 2014. It was established itself for the global aviation community as the trusted point of coordination related cyber threats. In the aviation industry, A-ISAC can get help from Cyware for collecting and sharing alerts on the changing threat intelligence and landscape around specific attacks. With Threat Intelligence Exchange (CTIX) and Situation Awareness Platform (CSAP) of Cyware, members of A-ISAC can automatically share threat intelligence such as malware alerts, indicators of compromise (IOCs), security incidents, phishing, vulnerability advisories, and spear phishing attacks among its global aviation community. About Cyware Cyware is a company that helps enterprise cybersecurity teams for building various platform-agnostic virtual cyber fusion centers. Security operations are transformed by Cyware is using the only Virtual Cyber Fusion Center Platform of cybersecurity industry with next-generation security orchestration, automation, and response (SOAR) technology. It help organizations increase accuracy and speed. About the Aviation ISAC The Aviation ISAC, a worldwide, non-profit membership association, was created to help the timely exchange of susceptibilities, best practices, and threat intelligence to decrease operational hazards and offer the resources for reliable sharing and qualified exchange. It has members on five continents. Vision of ISAC is an efficient, safe, secure, and resilient international air transportation system.

Read More

DATA SECURITY

Arctic Wolf Selects AWS to Power Global Cybersecurity Offering at Scale

Arctic Wolf | September 03, 2021

Amazon Web Services, Inc. an Amazon.com, Inc. company announced that Arctic Wolf Networks has selected AWS as its primary cloud provider to power the company’s innovative, cloud-native security operations platform. Arctic Wolf is one of the leading cybersecurity technology innovators in the world. The company provides turnkey, managed threat detection and response, risk management, cloud monitoring, and security training and awareness services to organizations. The company’s hybrid approach to security combines the scale, speed, and processing power of cloud-based automation with the experience of trained security experts to transform how organizations protect themselves. Using AWS’s unmatched portfolio of cloud capabilities, including containers, serverless, analytics, database, compute, and storage, Arctic Wolf can cost-effectively process more than 1.4 trillion unique security events a week from its global and fast-growing customer base. In addition, Arctic Wolf plans to leverage AWS’s proven global infrastructure to continue to expand its operations across Europe, the Asia-Pacific region, and beyond. Under the traditional cybersecurity model, companies typically relegate security to IT teams that rely on disparate technology solutions in an attempt to keep up with rapidly evolving threats. These systems can flood IT teams with security notifications, making it hard to differentiate between meaningful threats and noise and leaving organizations vulnerable to attack. In contrast, Arctic Wolf’s approach uses AWS to power and deliver its cloud-native Arctic Wolf Platform, which is remotely managed by Arctic Wolf’s “Concierge Security Team” (CST) in the cloud. The platform collects, enriches, and analyzes security data at scale and flags the CST when a potential threat requires additional scrutiny. The CST, in turn, alerts a customer only after they have validated a security incident and can provide recommended response options. In July 2021, Arctic Wolf used AWS to process and analyze more than 200 billion security events per day, including threats such as viruses, ransomware attacks, and compromised websites. Arctic Wolf uses the breadth and depth of AWS services to elastically scale their offerings and meet global customer demand with low latency. The company typically runs more than 60,000 containers on Amazon Elastic Container Service (Amazon ECS) and Amazon Elastic Kubernetes Service (Amazon EKS) to provide its detection services. AWS Auto Scaling provides the elasticity and availability required to handle peak loads and events such as zero-day security incidents that often affect multiple customers over different geographical regions. When Arctic Wolf registers a security observation as suspicious activity, their CST leverages AWS Lambda (AWS’s serverless compute service that lets customers run code without provisioning or managing servers) to trigger further automated analysis, review the findings, and validate threats before escalating to the customer. The company also uses AWS’s managed database services, including Amazon DynamoDB and Amazon Relational Database Service (Amazon RDS), to process security observation data at scale, looking for outliers or unexpected patterns of activity that could indicate potential threats. Arctic Wolf then automatically references that data against historical activity and serves the analysis to their CST to evaluate in the context of emerging threats. “As repeatedly demonstrated by recent ransomware incidents, the digital threat landscape continues to evolve, with attack surfaces that include consumer devices and public infrastructure that connects to corporate networks. Organizations and consumers alike feel the impact when data and personal information falls into the wrong hands, yet businesses can easily become overwhelmed trying to manage security alerts on their own. Arctic Wolf combines the best of technology and human intelligence to help our customers stay ahead of threats. Our hybrid security approach powered by AWS is enabling more organizations around the world to innovate with the confidence that their systems and data are secure,” said Nick Schneider, CEO, Arctic Wolf. “AWS’s proven performance and security, global reach, and breadth of services, as well as the agility we gain by running in the cloud, are critical to achieving our mission to end cyber risk. The Arctic Wolf Platform was born in the cloud, and we look forward to continuing our work with AWS as a customer and a partner to help organizations across industries protect themselves and those they serve.” Moving forward, Arctic Wolf will use AWS’s proven global infrastructure to expand their managed services quickly and cost effectively. Running on AWS, Arctic Wolf can replicate its IT architecture in additional AWS Regions in a matter of weeks rather than construct new data centers. The company recently announced plans to launch their first European security operations center by the end of 2021, which will be located in Germany and use the AWS Europe (Frankfurt) Region. Arctic Wolf is an ISV Partner in the AWS Partner Network (APN) and an AWS Level 1 Managed Security Service Provider (MSSP), a new designation that AWS announced last week. It means Arctic Wolf is a cybersecurity business that has met or exceeded 10 managed security service specializations that protect and monitor essential AWS resources, are delivered as a 24/7 fully managed service, and span vulnerability management, cloud security best practices and compliance, threat detection and response, network security, host and endpoint security, and application security. In addition, through an expanding technical relationship, Arctic Wolf and AWS are committed to better integrating their security services to keep joint customers secure from advanced attacks. “The cloud-native nature of Arctic Wolf’s comprehensive security operations platform, coupled with the performance and reliability of AWS, gives us the agility and broad visibility we need in an ever-expanding cyber threat environment,” said Bill Berzinskas, Director of Reliability and Security at Teamworks, a customer of Arctic Wolf. “We’re scaling our SaaS platform from a simple web application to a mature business with hundreds of thousands of users, and the security operations approach pioneered by Arctic Wolf and powered by AWS gives us the confidence and security posture we need to grow our business.” “Arctic Wolf is elevating security operations to help organizations of all sizes reliably and cost-effectively protect themselves in a constantly shifting threat landscape. AWS makes it possible for Arctic Wolf to expand their service to benefit customers around the world and rapidly adapt to emerging threats,” said Stephen Schmidt, Vice President of Security Engineering and Chief Information Security Officer, Amazon Web Services, Inc. “By running on AWS, Arctic Wolf has the performance, elasticity, breadth of services, and go-to-market support they need to keep their customers safe and scale with demand. We’re delighted to deepen our collaboration and congratulate them on their managed cloud security capabilities and distinction of AWS Level 1 MSSP Competency.” About Amazon Web Services For over 15 years, Amazon Web Services has been the world’s most comprehensive and broadly adopted cloud offering. AWS has been continually expanding its services to support virtually any cloud workload, and it now has more than 200 fully featured services for compute, storage, databases, networking, analytics, machine learning and artificial intelligence (AI), Internet of Things (IoT), mobile, security, hybrid, virtual and augmented reality (VR and AR), media, and application development, deployment, and management from 81 Availability Zones within 25 geographic regions, with announced plans for 21 more Availability Zones and seven more AWS Regions in Australia, India, Indonesia, Israel, Spain, Switzerland, and the United Arab Emirates. Millions of customers—including the fastest-growing startups, largest enterprises, and leading government agencies—trust AWS to power their infrastructure, become more agile, and lower costs. To learn more about AWS, visit aws.amazon.com. About Amazon Amazon is guided by four principles: customer obsession rather than competitor focus, passion for invention, commitment to operational excellence, and long-term thinking. Amazon strives to be Earth’s Most Customer-Centric Company, Earth’s Best Employer, and Earth’s Safest Place to Work. Customer reviews, 1-Click shopping, personalized recommendations, Prime, Fulfillment by Amazon, AWS, Kindle Direct Publishing, Kindle, Career Choice, Fire tablets, Fire TV, Amazon Echo, Alexa, Just Walk Out technology, Amazon Studios, and The Climate Pledge are some of the things pioneered by Amazon.

Read More