SOFTWARE SECURITY

HGC signs MoU to strengthen public telecoms network security with CyberSecurity Malaysia

prnewswire | October 28, 2020

HGC Global Communications Limited (HGC), a fully-fledged fixed-line operator and ICT service provider with extensive local and international network coverage, services and infrastructure, today announced the signing of a Memorandum of Understanding (MoU) with CyberSecurity Malaysia, the national cybersecurity specialist and technical agency under the Ministry of Communications and Multimedia Malaysia (KKMM).
The MoU provides a framework under which HGC will facilitate its portfolio of critical cybersecurity skillsets to the telecommunications industry whilst fostering increased cybersecurity innovation by enabling CyberSecurity Malaysia to achieve its purpose of overcoming national cyber security challenges and deliver greater ICT benefits to internet users.

The MoU will at first benefit large to medium enterprises, the financial services industry (FSI), government and semi-government bodies. The cooperation's impact will be felt beyond Malaysia's borders by reaching HGC's customers overseas, in particularly across the Asia community, and within a wide range of industry verticals such as e-health, e-commerce, e-education initiatives.
HGC provides broad range of connectivity and cybersecurity services to keep safe

Given the increase in the number of internet users has a direct implication on the increase in potential threat on information systems, it is essential to take necessary precautionary measures.

According to CyberSecurity Malaysia, between January and September 2020, Malaysia has recorded 8,366 cybersecurity incidents, including fraud, intrusion, and malicious code -- an increase of nearly 10% over compared to 2019.

Under the collaboration, HGC with its international exposure is tasked with provisioning its cybersecurity expertise including consulting, managed security services, engineering, risk management, cloud security and advisory services. This will in turn enable CyberSecurity Malaysia to boost its range of cyber security innovation-led services, programmes, and initiatives to reduce the vulnerability of digital systems, and at the same time strengthen Malaysia's self-reliance in cyberspace.

The MoU will cover cybersecurity cooperation in key areas including telecom security, IoT security and threats intelligence. The exchange of information on telecommunication networks, ICT solutions and cybersecurity can further improve cyberattack readiness and prevention measures.

Ravindran Mahalingam, HGC's SVP of International Business, said: "Cybersecurity is a paramount asset, key to HGC's vision of a connected world. As a global telecommunications service provider, we are committed to promoting sustainable development of technological innovations, keeping cybersecurity at the centre of business solutions. More, cybersecurity is important in a smart city as the infrastructure can be vulnerable and needs to avoid any breaches. HGC is dedicated to support cybersecurity for ICT and network initiatives, ensuring a secure and reliable digital business environment."

Dato' Ts. Dr. Haji Amirudin Bin Abdul Wahab, CyberSecurity Malaysia's Chief Executive Officer, said: "Today, cyber security is a major concern for most industries and the vulnerabilities are rising at an alarming rate; hence IT professionals are in high demand to analyse and overcome these threats. Moreover, these attacks could have been dealt with if those businesses have better cyber resilience. Organizations today are beginning to complement their cybersecurity strategies with cyber resilience. CyberSecurity Malaysia, a national cyber security specialist and technical center under the purview of the Ministry of Communications and Multimedia Malaysia, identifies collaboration as one way to strengthen the cybersecurity ecosystem in Malaysia. CyberSecurity Malaysia is pleased with the collaboration between global companies such as HGC to develop sustainable relationships between government and industry as well as raising the level of readiness and resilience of national cyber security and its contribution to national economic growth."
About HGC Global Communications Limited

HGC Global Communications Limited (HGC) is a leading Hong Kong and international fixed-line operator. The company owns an extensive network and infrastructure in Hong Kong and overseas and provides various kinds of services. HGC has 23 overseas offices, with business over 5 continents. It provides telecom infrastructure service to other operators and serves as a service provider to corporate and households. The company provides full-fledged telecom, data centre services, ICT solutions and broadband services for local, overseas, corporate and mass markets. HGC owns and operates an extensive fibre-optic network, five cross-border telecom routes integrated into tier-one telecom operators in mainland China and connects with hundreds of world-class international telecom operators. HGC is one of Hong Kong's largest Wi-Fi service providers, running over 29,000 Wi-Fi hotspots in Hong Kong. The company is committed to further investing and enriching its current infrastructure and, in parallel, adding on top the latest technologies and developing its infrastructure services and solutions. HGC is a portfolio company of I Squared Capital, an independent global infrastructure investment manager focusing on energy, utilities and transport in North America, Europe and selected fast-growing economies.


About CyberSecurity Malaysia

CyberSecurity Malaysia is the national cybersecurity specialist and technical agency under the purview of the Ministry of Communications and Multimedia Malaysia (KKMM). In essence, CyberSecurity Malaysia is committed to provide a broad range of cybersecurity innovation-led services, programmes and initiatives to help reduce the vulnerability of digital systems, and at the same time strengthen Malaysia's self-reliance in cyberspace. Among specialized cyber security services provided are Cyber Security Responsive Services; Cyber Security Proactive Services; Outreach and Capacity Building; Strategic Study and Engagement, and Industry and Research Development.

Spotlight

What are the key data privacy, cybersecurity and telecoms considerations for early-stage FinTechs?

Take a look through this new initiative from our FinTech team - a series of short, to-the-point videos we've put together outlining key issues early-stage FinTechs should be thinking about.


Other News
DATA SECURITY, PLATFORM SECURITY, SOFTWARE SECURITY

Concentric AI Included in Newly Created Data Security Posture Management Category in Recent Gartner® Hype Cycle™ Report

Concentric AI | August 29, 2022

Concentric AI, a leading vendor of intelligent AI-based solutions for autonomous data security posture management, today announced it has been listed as a Sample Vendor in the newly created Data Security Posture Management category in the recently published Gartner Hype Cycle for Data Security, 2022 report.1 Concentric AI also appears in the Data Access Governance and Data Discovery and Management categories in the Gartner Hype Cycle for Data Security, 2022 report.1 According to the Hype Cycle for Data Security, 2022: “Data security posture management (DSPM) provides visibility as to where sensitive data is, who has access to that data, how it has been used and what the security posture of the data store or application is.”1 Organizations use DSPM as the basis for data risk assessment and to optimize data security governance implementations. The new Data Security Posture Management category has a Benefit Rating of Transformational, which Gartner defines as, “Enables new ways of doing business across industries that will result in major shifts in industry dynamics.”1 According to Gartner: “Organizations face challenges mitigating data security and privacy risks as data rapidly proliferates across multi-cloud and hybrid IT architectures. Identifying meaningful data risk is impossible to solve without combining metrics from data sensitivity, data lineage, infrastructure configurations that create data risks and access risk into a common view. This is an urgent problem that is encouraging rapid growth in the availability and maturation of this technology.”1 “We believe being recognized by Gartner as a Sample Vendor in Data Security Posture Management validates that organizations need visibility of into their sensitive data across datasets and locations, as well as a consolidated view into the risk associated with inconsistent access privileges, permissions, activity, and location to protect their data from loss. “Organizations using Concentric AI benefit from the company’s AI-assisted deep learning autonomous data security solution to reduce their data risk by discovering, evaluating, and remediating security issues.” Karthik Krishnan, Founder and CEO, Concentric AI Concentric AI secures data-centric work using AI to protect business-critical information hidden in the millions of files and databases used by today’s distributed workforce. The company’s unique deep learning solution autonomously and accurately finds sensitive content, assesses risk, and remediates security issues, allowing organizations across industries to meet their data security needs for the first time. Concentric AI’s Semantic Intelligence™ automates unstructured and structured data security using deep learning to categorize data, uncover business criticality and reduce risk. Its Risk Distance™ analysis technology uses the baseline security practices observed for each data category to spot security anomalies in individual files. It compares documents of the same type to identify risk from oversharing, third-party access, wrong location, or misclassification. Organizations benefit from the expertise of content owners without intrusive classification mandates, with no rules, regex, or policy maintenance needed. Gartner Disclaimer Gartner does not endorse any vendor, product or service depicted in its research publications, and does not advise technology users to select only those vendors with the highest ratings or other designation. Gartner research publications consist of the opinions of Gartner’s research organization and should not be construed as statements of fact. Gartner disclaims all warranties, expressed or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose. GARTNER and HYPE CYCLE are registered trademarks and service marks of Gartner, Inc. and/or its affiliates in the U.S. and internationally and are used herein with permission. All rights reserved. About Concentric AI With Concentric AI, organizations can finally address their unmet data security needs by discovering and protecting business-critical content. Concentric AI protects intellectual property, financial documents, PII/PCI content, customer data, business confidential data and more, across on-premises and cloud-based data stores, as well as messaging and communication applications. The Concentric AI Semantic Intelligence™ Data Security Posture Management solution uses deep learning and Risk Distance™ analysis to accurately categorize data, assess risk, and remediate security issues – without relying on upfront rules or complex configuration. Concentric AI is venture-backed by leading Silicon Valley VCs and is headquartered in San Jose, Calif.

Read More

DATA SECURITY, NETWORK THREAT DETECTION, PLATFORM SECURITY

OpenText Teams with NetScaler to Deliver Advanced Web Application Protection

OpenText | October 13, 2022

OpenText™ , today announced the integration of its BrightCloud Threat Intelligence with NetScaler Application Delivery Controller (ADC). The move will provide NetScaler customers with contextual insights and automatically protect against malicious IP addresses to improve their resilience in managing the latest security threats. NetScaler ADC and WAF protect customers from known and zero-day application attacks with a comprehensive security solution for web applications and Application Programming Interfaces (APIs) both on-premises and in the cloud. With the BrightCloud IP Reputation Service as its threat intelligence source, NetScaler can efficiently inspect client requests for attack traffic by filtering against known malicious IP addresses. NetScaler's research shows that BrightCloud IP Reputation Service offers the most comprehensive database of known problematic IP addresses. In fact, BrightCloud Threat Intelligence is used within nearly 85 percent of security solutions purchased by enterprises. "While filtering requests with malicious IP addresses is an effective method to protect applications from attacks, it can be a huge lift and increase inspection overhead. NetScaler came to us for a solution to this challenge that would save their customers time and be easy to operate and reliable. "Our BrightCloud IP Reputation Service easily integrates with any NetScaler ADC function, so that customers always have the most up-to-date threat intelligence at their fingertips. We are thrilled to partner with NetScaler to help improve the security posture of its customer base." Ted Harrison, EVP, Worldwide Enterprise Sales, OpenText Security Solutions With attack sources changing constantly, near real-time updates provided by BrightCloud are critical to safeguard NetScaler customers. Using BrightCloud IP Reputation Service, NetScaler can block application access to from IP addresses that are known, based on BrightCloud data, to be infected. In addition, BrightCloud's contextual mapping across different vectors such as file, domain, and malware data, continuously updates the IP reputation score and highlights typically less obvious connections to potential threat actors. IP reputation scores are updated every five minutes ensuring NetScaler customers have the most up-to-date protection. Citrix is a pioneer and leader in securing applications and delivering information to users wherever they are. Jason Poole, Director of Product Marketing, Application Security, said of the partnership, "In teaming with BrightCloud, we can provide our customers with an added layer of real-time protection and granular controls that protect against the new threats opened by flexible work models and ensure their devices, data, employees and customers remain safe." About OpenText Security Solutions As attack surfaces expand, OpenText Security Solutions help organizations of every size achieve cyber resilience with Webroot Security, Carbonite Data Management, BrightCloud® Threat Intelligence, and EnCase Digital Forensics and Threat Response. With a united front of best practices paired with layered solutions, we prevent, detect, and restore small, mid-sized and enterprise business operations in the event of a cybersecurity attack. About OpenText OpenText, The Information Company™, enables organizations to gain insight through market leading information management solutions, powered by OpenText Cloud Editions.

Read More

DATA SECURITY, ENTERPRISE IDENTITY

Cervello Partners with ST Engineering to Provide Cybersecurity for Rail Operational Networks

Cervello | October 19, 2022

Cervello, a global leader in rail cybersecurity, announced today a new strategic partnership with ST Engineering, a global technology, defense, and engineering group, to incorporate ST Engineering’s cybersecurity services as part of Cervello's patented rail security solution for rail operators and infrastructure managers. This partnership, which has already proven its value by securing the operations of one of the busiest rail networks in APAC, enhances Cervello's ability to offer and support its solution globally. “We are pleased to officially announce our already proven strategic cooperation with ST Engineering, a proven technology and engineering powerhouse, as a significant step toward Cervello's continued global expansion,” states Roie Onn, Cervello's CEO & Co-Founder. “Combining ST Engineering’s decades of experience in empowering cyber resilience across various sectors, together with Cervello’s unparalleled expertise in rail-specific security, we are able to globally support rail organizations with cybersecurity solutions and services that enable them to operate more safely and efficiently.” “Threats in the cyber-physical world are growing at an exponential rate and conventional ways of securing systems and assets are no longer sufficient. “The joint cybersecurity capabilities of ST Engineering and Cervello allow us to build a more comprehensive effective suite of cybersecurity rail solutions that is reliable and ensures business continuity for rail operators." Goh Eng Choon, President, Cyber, ST Engineering About Cervello Cervello accelerates rail digital transformation by securing the industry’s infrastructure and operations from cyber threats. Cervello offers the industry's leading dedicated rail security platform, enabling rail companies to safely deliver connected service. Cervello’s platform gives you the confidence to see, secure, and manage all ​assets connected to your ​critical ​network, combining OT, IoT, IT and physical systems, and turn the associated data into a powerful resource. This means the end of any compromise between security​, safety​ and usability – put simply, this allows you to ​operate with confidence​. The world’s leading rail operators and infrastructure managers trust Cervello to minimize threats and prevent cybersecurity incidents, thereby increasing their safety, reliability, business continuity and service availability.

Read More

DATA SECURITY,PLATFORM SECURITY,SOFTWARE SECURITY

Blackpoint Cyber Launches Three Product Features

Blackpoint Cyber | November 11, 2022

Blackpoint Cyber, a leading technology-focused cybersecurity company, has released three product features this fall, as they look ahead to 2023. “I am consistently blown away by the Blackpoint Cyber team. Our desire to improve the security posture for our partners is an ongoing journey as we continue to expand an ecosystem of products which address the needs of MSPs and customers in todays’ dynamic threat landscape. As someone with previous experience in the MSP space, it is refreshing to see how much our team really loves the channel and strives to regularly provide additional value by helping MSPs to secure themselves as well as their customers,” said Justin Weller, Director of Business Development at Blackpoint Cyber. Blackpoint partners can stay ahead of cyberthreats with the following products: Security Configuration Benchmarks for M365 – Vulnerability Mapping to CIS Benchmarks for Cloud Environments CIS foundation benchmark for M365 and Azure provide prescriptive guidance for establishing a secure baseline configuration. Blackpoint has reviewed every control on your behalf and made recommendations on several to harden your customer environments. Now you can compare your security measures to Center of Internet Security Benchmarks directly in the Blackpoint portal. Assess your standing against these internationally recognized security standards and implement the recommended changes to reduce the attack surface in cloud tenants. MDE Vulnerability Report—Security Visibility Unlocked The capabilities of Blackpoint’s product bundle, Blackpoint Response, have grown. With Managed Defender for Endpoint, we've introduced internal vulnerability reporting to help you better assess your customers’ security posture, directly within the portal. The reports include recommendations for remediation and simplify the process to action them. Improvements based on the reports may pertain to expiring certificates, device exposure, or vulnerable software. macOS Agent—The Power of MDR Within Your Mac After many requests from their partner community, due to a lack of true Mac MDR, Blackpoint’s flagship MDR product, SNAP-Defense, is now available to monitor and respond to threats on Apple devices running macOS. As the macOS market share in business settings continues to grow, Blackpoint partners now have the capability to provide protection to those assets. About Blackpoint Cyber Blackpoint Cyber offers the only world-class, nation-state-grade cybersecurity ecosystem serving the MSP community. Using its own software and SOC, Blackpoint’s true 24/7 MDR service not only detects breaches earlier than any other solution on the market, but also provides an actual response rather than just an alert to keep your and your clients’ networks safe from widespread damage.

Read More

Spotlight

What are the key data privacy, cybersecurity and telecoms considerations for early-stage FinTechs?

Take a look through this new initiative from our FinTech team - a series of short, to-the-point videos we've put together outlining key issues early-stage FinTechs should be thinking about.

Resources