WEB SECURITY TOOLS

Star Atlas Launches Initiative to Establish Web3 Security Framework

Star Atlas | May 25, 2022

Star Atlas
Star Atlas, a next-gen metaverse with triple-A game design and Unreal Engine 5 graphics built on the Solana blockchain, today announced an expanded focus on security to ensure consumer protection and digital safety in the metaverse. This multi-pronged initiative includes signing Kudelski Security, the cybersecurity division of the Kudelski Group - the world leader in digital security, and the forefront leader in providing security solutions for major blockchain-based applications, exchanges, and ecosystems - as its security partner. Kudelski Security will perform ongoing audits and analysis to help ensure the integrity of the Star Atlas metaverse is maintained and both partners will work together to explore setting standards for web3 security.

"We are pleased to partner with the team at Kudelski Security to advance the digital security of our fast-expanding metaverse," said Michael Wagner, Co-Founder and CEO of ATMTA, Inc., the principal development studio of Star Atlas. "We understand there is a lot of skepticism when it comes to web3 and security, so we want to be proactive by partnering with one of the top cybersecurity firms to help make sure our community feels safe. Protection of assets is paramount, and we look forward to working with Kudelski Security to establish the best practices for security when it comes to web3 gaming."

As security auditor of record, Kudelski Security will increase the safety and security of the Star Atlas metaverse by testing the protocols and looking for potential vulnerabilities to be addressed. Star Atlas players will have greater assurance that the metaverse has been built securely and tested rigorously, and that Star Atlas has taken the necessary action to become the leader in the web3 space when it comes to security.

The relationship with Kudelski Security goes beyond the hardening of the Star Atlas environment. Star Atlas is looking to expand collaborations with the wider Group to focus on new standards that can help to transition companies and projects into web3, including security standards, tokenization, and best practices in web3 gaming. By developing standard technology and processes that enable safe and secure on-chain gaming, players will be protected from the hacks that currently plague web3 and some of the main barriers to wider stakeholder adoption will be lowered.

"Web3 is growing rapidly, and we are seeing more need for developing a security standard that is adopted across the industry to act as a framework. This is why we are excited to partner with a native web3 leader like Star Atlas and to come together to solve potential security issues before they arise."

Andrew Howard, CEO of Kudelski Security

In addition to Kudelski Security's blockchain and cybersecurity experience, the Kudelski Group is recognized as global leaders in digital security – with specialized expertise in encryption, anti-piracy, watermarking, cryptography, and digital rights management.

Executives from Star Atlas, the Kudelski Group, Kudelski Security, and NAGRA Kudelski are meeting during the World Economic Summit in Davos, Switzerland, to further discuss establishing a framework for securing the web3 ecosystem.

ABOUT STAR ATLAS
Star Atlas is a next-gen gaming metaverse emerging from the confluence of state of the art blockchain, real-time graphics, multiplayer video game, and decentralized financial technologies. Real-time graphics technology using Unreal Engine 5's Nanite allows for cinematic quality video game visuals. Blockchain technology using the Solana protocol establishes a largely serverless and secured gameplay experience. Non-fungible tokens obtained and traded within Star Atlas creates an economy that replicates the tangibility of real world assets and ownership.

Spotlight

Security of the computer files and folders have been a core issue ever since the advent of the windows. Passwords were then introduced to solve this issue but they themselves lend a host of disadvantages. In this paper, the authors shall study what disadvantages the passwords bring and how they can tackle them. Also they shall propose a Two Factor Authentication [T-FA] system utilizing Bluetooth as a factor coupled with the powerful Rijndael encryption algorithm. Bluetooth is the most commonly used technology for point to point short range of communication of devices.

Spotlight

Security of the computer files and folders have been a core issue ever since the advent of the windows. Passwords were then introduced to solve this issue but they themselves lend a host of disadvantages. In this paper, the authors shall study what disadvantages the passwords bring and how they can tackle them. Also they shall propose a Two Factor Authentication [T-FA] system utilizing Bluetooth as a factor coupled with the powerful Rijndael encryption algorithm. Bluetooth is the most commonly used technology for point to point short range of communication of devices.

Related News

DATA SECURITY

Integrating with ServiceNow, SentinelOne to Unify IT and Security

SentinelOne | January 12, 2022

SentinelOne an independent cybersecurity platform firm has recently announced the launch of SentinelOne App for ServiceNow Security Incident Response (SIR).The integration brings together security and IT personnel for more effective incident response. Joint clients can utilize the ServiceNow platform to triage threats because SentinelOne is connected directly. The connection enables security, and IT teams to quickly implement a coordinated, comprehensive, and automated incident response plan across endpoints and cloud environments. Additionally, the SentinelOne Singularity Marketplace and the ServiceNow Store have the app. “The industry is under constant attack every day, as organizations grapple with vulnerabilities like log4j. Having enterprise-wide visibility and protection from SentinelOne Singularity helps our team understand the potential impact in just a few clicks. We use ServiceNow as our incident management and workflow automation platform - together our team has a single pane of glass for incident collaboration to mitigate threats in real-time.” - Identity and Endpoint Security Architect, Global Manufacturer Because ransomware and other forms of malware are becoming more common, IT and security teams must work together to prevent attacks. Unfortunately, many businesses rely on a slew of disparate tools to run their cybersecurity initiatives. As a result of the inefficiencies and alert fatigue, avoidable cyber events occur, posing a risk to the company. XDR solutions shift the paradigm, recasting cybersecurity as a problem of data and workflow automation. The SentinelOne App for ServiceNow Security Incident Response rapidly syncs threats from SentinelOne into the ServiceNow Incident Response module for a unified security program. An incident responder in ServiceNow can see all relevant incident details about the threat, such asthe event status and threat notes, as well as any additional context or notes produced in either platform. When the incident responder concludes that remedial action is required, ServiceNow can activate SentinelOne's automated response actions to destroy, quarantine, remediate, or even roll back any threat's potential impacts. “Streamlining threat investigation, response, and remediation workflows leads to significant risk reduction,Combining SentinelOne with ServiceNow gives defenders and incident responders the workflows they need to improve remediation across security and IT domains.” David Baldwin, Product Director, Ecosystem, SentinelOne

Read More

Research shows Boardroom investments in cybersecurity are most commonly the result of an incident or fears of compliance audit failure

prnewswire | October 08, 2020

Thycotic, provider of privileged access management (PAM) solutions to more than 10,000 organizations, including 25 of the Fortune 100, today released its CISO Decisions survey, an independent global study1 that examines what most influences the Board to invest in cybersecurity and the impact this has on CISO decision-making. Based on findings from more than 900 global CISOs/Senior IT decision-makers, the research shows Boardroom investments in cybersecurity are most commonly the result of an incident or fears of compliance audit failure. Because of this, the research shows more than half, 58 percent, of respondents say their organizations plan to add more towards security budgets in the next 12 months.

Read More

SOFTWARE SECURITY

Trend Micro Detected Nearly 13 Million Malware Events Targeting Linux-based Cloud Environments

Trend Micro Incorporated | August 24, 2021

Trend Micro Incorporated (TYO: 4704; TSE: 4704), a global cybersecurity leader, today released new research on the state of Linux security in the first half of 2021. The report gives valuable insight into how Linux operating systems are being targeted as organizations increase their digital footprint in the cloud and the pervasive threats that make up the Linux threat landscape. As of 2017, 90% of public clouds workloads ran on Linux. According to GartnerÒ, "Rising interest in cloud-native architectures is prompting questions about the future need for server virtualization in the data center. The most common driver is Linux-OS-based virtualization, which is the basis for containers.1" Linux allows organizations to make the most of their cloud-based environments and power their digital transformation strategies. Many of today's most cutting-edge IoT devices and cloud-based applications and technology run on some flavor of Linux, making it a critical area of modern technology to secure. "In the industry, we see some very creative attacks and we have to stay ahead. Protecting the company, our employees, and our intellectual property is a priority," says John Breen, Global Head of Cybersecurity at Flowserve. "We'll continue to work closely and collaborate with Trend Micro to ensure our people and our company remain protected." "It's safe to say that Linux is here to stay, and as organizations continue to move to Linux-based cloud workloads, malicious actors will follow," said Aaron Ansari, vice president of cloud security for Trend Micro. "We have seen this as a main priority to ensure our customers receive the best security across their workloads, no matter the operating system they choose to run it on." The report revealed that most detections arose from systems running end-of-life versions of Linux distributions, including 44% from CentOS versions 7.4 to 7.9. In addition, 200 different vulnerabilities were targeted in Linux environments in just six months. This means attacks on Linux are likely taking advantage of outdated software with unpatched vulnerabilities. About Trend Micro Trend Micro, a global cybersecurity leader, helps make the world safe for exchanging digital information. Fueled by decades of security expertise, global threat research, and continuous innovation, Trend Micro's cybersecurity platform protects hundreds of thousands of organizations and millions of individuals across clouds, networks, devices, and endpoints. As a leader in cloud and enterprise cybersecurity, the platform delivers a powerful range of advanced threat defense techniques optimized for environments like AWS, Microsoft, and Google, and central visibility for better, faster detection and response.

Read More