Archive for the ‘NSA’ Category

NSA invoked against Amritpal Singh: Sources – The Statesman

Pro-Khalistan self-styled radical Sikh preacher Amritpal Singh [File Photo]

The National Security Act (NSA) has been invoked against pro-Khalistan self-styled radical Sikh preacher Amritpal Singh on Tuesday, who has been absconding since March 18, informed sources said on Tuesday.

The police have launched massive search and cordon operations in the state against activists of Amritpal Singhs Waris Punjab De.

However, his supporters claimed that he was already in illegal police custody.

Meanwhile, the Punjab police used massive force on Tuesday to physically remove hundreds of Sikh protesters, under the banner of Qaumi Insaaf Morcha, who had laid siege to Gurdwara Singh Shaheedan Chowk near Mohali after reports of the police detaining Waris Punjab De supporters.

However, the police arrested a large number of supporters, who were armed with sharp-edged weapons.

The Punjab government has extended curbs on internet and SMS services till March 23 noon in Tarn Taran, Ferozepur, Moga and Sangrur districts; Ajnala sub-division in Amritsar district; and areas in Mohali district.

Chief Minister Bhagwant Mann said his government would take strict action against anyone who tried to disturb the states peace and harmony.

In his first reaction, Mann said he had received several calls from people praising his government.

People are telling me, you have done a good job. There should be peace and harmony in Punjab. In this matter, we will support you, he said in a video message.

On Monday, the the police invoked the NSA against five people linked to the Waris Punjab De.

The stringent law has been invoked against Daljit Singh Kalsi, Bhagwant Singh, Gurmeet Singh and Pradhanmantri Bajeke and Harjit Singh, who have been shifted to the Dibrugarh Central Jail in Assam.

Six FIRs have been registered and 114 people arrested against elements of Amritpal Singhs outfit.

A team of the state police had chased Waris Punjab Da chiefs convoy while he was on his way to Jalandhar on March 18 but he managed to escape on a motorcycle.

See more here:
NSA invoked against Amritpal Singh: Sources - The Statesman

India Banned TikTok In 2020. TikTok Still Has Access To Years Of … – Forbes

TikTok was banned in India in 2020, but a review by Forbes found that the company's employees can still mine some of Indians' most sensitive data.

Almost three years after TikToks largest market, India, banned the Chinese-owned social media app over geopolitical tensions, troves of personal data of Indian citizens who once used TikTok remain widely accessible to employees at the company and its Beijing-based parent, ByteDance, Forbes has learned.

The revelation comes as President Joe Bidens administration threatens to ban the platform used by more than 100 million Americans if TikToks Chinese owner does not sell its stake. Officials in the highest levels of the U.S. government see a blanket TikTok ban as a possible solution to the countrys national security concerns about the potential for China to surveil or manipulate Americans. Some have called India a guide star, urging the U.S. to follow its lead.

I dont think [Indians are] aware of how much of their data is exposed to China right now, even with the ban in place, a current TikTok employee told Forbes.

According to the employee and a review of internal TikTok and ByteDance programs by Forbes, almost anyone at the companies with basic access to their tools can retrieve and analyze granular data about past TikTok users in India. (ByteDance has more than 110,000 employees around the world, including in China and Russia, but reportedly fired its entire India staff last month.) Another source also independently confirmed that Indians data has been accessible since the country banned the app.

I dont think [Indians are] aware of how much of their data is exposed to China right now, even with the ban in place.

One social mapping toolwhich the TikTok employee jokingly called NSA-To-Gocan spit out a list of any public or private users closest connections on TikTok and personally identifiable information about them, and it still pulls up the TikTok profiles of people in India, according to a review by Forbes. Staff can plug in a TikTokers unique identifier or UID, a string of numbers tied to more detailed data about the person, to retrieve the TikTok usernames (often, first and last name) of hundreds of friends and acquaintances; the region where they live; and how they share TikTok content with phone contacts and users across other social platforms. The same UID can be used across TikTok and ByteDances other internal tools to find even more information about the personincluding their search behavior. The TikTok employee described it as a key to building a digital dossier on any user, including those with private accounts.

Neither company would say whether TikTok continues to use the data it collected from its past users in India.

We have steadfastly complied, and continue to remain in full compliance, with the Government of India order since it was implemented, TikTok spokesperson Jason Grosse said in an email. All user data is subject to our robust internal policy controls surrounding access, retention, and deletion. ByteDance did not respond to a request for comment.

The purpose of Indias 2020 ban appears to have focused on preventing public access to TikTok in the country going forward, given concerns about the app potentially sending data it had collected on Indian users back to China. (Nikhil Gandhi, who was then head of TikTok in India, said at the time that TikTok had not shared any information of our users in India with any foreign government, including the Chinese government.) The ban did not seem to call for deletion of app data that had already been captured and stored.

As a result, the profiles of Indian users who once used TikTok can still be found online, though their owners havent been able to post since the 2020 ban. The company would not say how many Indian accounts can be viewed in the internal tool, but TikTok had roughly 150 million monthly active users there at the time it was shut down, according to data analytics firm Sensor Tower. The data in this particular tool appears to be frozen in time for the India users; for other countries like the U.S., where TikTok is widely used today, it updates in real-time.

The current TikTok employee told Forbes that nearly anyone with basic access to company toolsincluding employees in Chinacan easily look up the closest contacts and other sensitive information about any user. That includes everyone from prominent public figures to the average person, according to the employee and a Forbes review of the tool. In the wrong hands, the employee noted, that information could be dangerous.

From [their social graphs], if you want to start a movement, if you want to divide people, if you want to do any kind of operation to influence the public on the app, you can just use that information to target those groups, they said. This powerful demographic data, especially on TikToks unmatched Gen Z userbase, could also be highly valuable for commercial purposes, the employee added.

We cant ban them from the data they already have.

Beyond the India case, company-wide access to a tool like this could be highly problematic in the context of geopolitical conflict. Data on users from Ukraine and Russia, including details about who they communicate with on the app, has been available in the tool, according to the TikTok employee and internal materials obtained by Forbes. Though there is no known instance of this tool or others at TikTok being used against foreign adversaries, such information could jeopardize the safety of soldiers and citizens alike.

"When an authoritarian country like China is able to amass a lot of information about citizens in another country, that's going to raise all sorts of red flags, former National Security Agency general counsel Glenn Gerstell told Forbes. He said that while he thought it might be hard for China to actually weaponize that information in practice, it absolutely raises concerns, heightens tensions [and] puts them in a position potentially to do mischief with the data. And that's obviously a threat.

TikTok has already used its arsenal of tools to target individuals and their networks. A December Forbes investigation revealed that ByteDance had tracked multiple journalists who cover the company, gaining access to their IP addresses and other data to try to uncover which ByteDance employees may have been in proximity to them and potentially leaking information. The company vehemently denied that report until its own internal investigation proved it to be accurate, heightening fears across the U.S. government that such surveillance could be conducted on Americans more broadly. The FBI and Justice Department are now investigating ByteDances use of TikTok to spy on journalists, as Forbes first reported. The White House has also ordered federal agencies to wipe TikTok from government employees devices by the end of this month.

Got a tip about TikTok or ByteDance? Reach out securely to the author, Alexandra S. Levine, on Signal/WhatsApp at (310) 5261242, or email her at alevine@forbes.com.

TikToks retention of Indians data shows why, stateside, a consensual agreement between TikTok and the Committee on Foreign Investment in the U.S. might be far more effective than a ban, Gerstell said. (CFIUS and TikTok have been in talks since 2019 on a deal to address national security concerns about the app.) He said a CFIUS deal could lock down historical data, which the India ban apparently failed to do, and that it would give the U.S. government the ability to set the terms around what happens to Americans data from past and present. Though a consensual deal wouldnt guarantee that China wont find a way to access that old data, it could afford other protections, he explained.

"If it's a banwhich is the same thing in Indiawe can't ban them from the data they already have, Gertstell said. Whatever the data is up to that moment of the ban is TikTok's, is ByteDance's...and we have no legal basis, if all we're doing is banning the thing, to tell them what to do with [it]." It gets even more complicated if the data is already stored outside U.S. jurisdiction, he added.

"The politicians, and the people pounding the table when they talk about bans, in their mind think they're solving a problem, he told Forbes, and they absolutely aren't.

Emily Baker-White contributed reporting.

Continue reading here:
India Banned TikTok In 2020. TikTok Still Has Access To Years Of ... - Forbes

NSA invoked against Amritpal Singh: Sources – OTV News

The National Security Act (NSA) has been invoked against pro-Khalistan self-styled radical Sikh preacher Amritpal Singh on Tuesday, who has been absconding since March 18, informed sources said on Tuesday.

Meanwhile, the Punjab police used massive force on Tuesday to physically remove hundreds of Sikh protesters, under the banner of Qaumi Insaaf Morcha, who had laid siege to Gurdwara Singh Shaheedan Chowk near Mohali after reports of the police detaining Waris Punjab De supporters.

However, the police arrested a large number of supporters, who were armed with sharp-edged weapons.

The Punjab government has extended curbs on internet and SMS services till March 23 noon in Tarn Taran, Ferozepur, Moga and Sangrur districts; Ajnala sub-division in Amritsar district; and areas in Mohali district.

Chief Minister Bhagwant Mann said his government would take strict action against anyone who tried to disturb the state's peace and harmony.

In his first reaction, Mann said he had received several calls from people praising his government.

"People are telling me, you have done a good job. There should be peace and harmony in Punjab. In this matter, we will support you," he said in a video message.

On Monday, the the police invoked the NSA against five people linked to the 'Waris Punjab De'.

The stringent law has been invoked against Daljit Singh Kalsi, Bhagwant Singh, Gurmeet Singh and Pradhanmantri Bajeke and Harjit Singh, who have been shifted to the Dibrugarh Central Jail in Assam.

Six FIRs have been registered and 114 people arrested against elements of Amritpal Singh's outfit.

A team of the state police had chased Waris Punjab Da chief's convoy while he was on his way to Jalandhar on March 18 but he managed to escape on a motorcycle.

See original here:
NSA invoked against Amritpal Singh: Sources - OTV News

Notes from the underworld. Cyberespionage in occupied Ukraine … – The CyberWire

Dateline

Ukraine at D+391: Attribution ambiguity. (CyberWire) A new, unattributed APT seems active in Russian occupied territories. A Russian proposal for new cyberspace norms.

Russia-Ukraine war: List of key events, day 392 (Al Jazeera) As the Russia-Ukraine war enters its 392nd day, we take a look at the main developments.

Ukraines Leadership Doubles Down on Bakhmut Defense as Russians Get Closer (Wall Street Journal) Ukrainian commanders say they are sapping Russian strength in the eastern city to give their planned offensive a better chance of success.

Russian cruise missiles destroyed in drone strike on Crimea train (The Telegraph) Kyiv says Kalibr missiles being transported on a train in Dzhankoi were destroyed while Russia's region chief blames drone attack

Ukraine, Russia Trade Claims After Blast Rocks Crimean Town (Military.com) Russian and Ukrainian officials have given conflicting accounts of what appeared to be a brazen attack on Russian cruise missiles being transported by train in Moscow-annexed Crimea.

Japan Prime Minister Fumio Kishida makes surprise visit to Ukraine (AP NEWS) Japanese Prime Minister Fumio Kishida arrived in Kyiv for a surprise visit shortly after noon Tuesday, hours after Chinese President Xi Jinping arrived in neighboring Russia for a three-day trip.

Xi, Putin signal unity against U.S. in joint statement (Nikkei Asia) China urges peace talks in Ukraine, Moscow backs Beijing on Taiwan

After Kremlin talks, Xi and Putin sign cooperation agreements as Japans leader visits Ukraine (Washington Post) Putin, Xi agree on expanding natural gas trade, other economic ties. Visit by Japans Kishida to Kyiv gives sharp contrast to Xi in Russia. Xi and Putin to meet for ceremony, talks and state dinner.

China lacks credibility to secure Ukraine ceasefire amid Russia drone fears (The Telegraph) Nato sceptical of Beijings plan for peace following reports that a Chinese firm was in talks to arm Moscow with kamikaze drones

Putin got very little out of Xis big visit except pomp and ceremony (The Telegraph) The Chinese presidents grand trip to Moscow looked like theatre that played more to his benefit than to Russias

Putins two-day charm offensive with Xi underlines whos boss (the Guardian) Kremlin toasts the Russian-Chinese partnership, which appears warm but far from equal

Why Xi can't solve Putin's Ukraine problem (The Telegraph) Chinese president could have profound influence but questions remain about whether he can, or wants to, end the war

7 myths standing in the way of Ukraines victory (POLITICO) If Kyiv is forced to settle, it will bring neither justice, nor peace. Only victory will stop Putin coming at us again.

Freeing Belarus from tyranny: A conversation with Sviatlana Tsikhanouskaya (Atlantic Council) How can the United States and its Western allies help support freedom and self-determination in Belarus? What effect has Russias full-scale invasion of Ukraine had on Belarusian democratic opposition and civil society?

Putin the Pariah: War crimes arrest warrant deepens Russias isolation (Atlantic Council) The ICC decision to indict Putin for war crimes is a highly consequential step that will deepen Russias international isolation while weakening Putins personal position both at home and abroad, writes Anders slund.

ICC arrest warrant for Putin is a step toward ending Russian impunity (Atlantic Council) The International Criminal Court decision to issue an arrest warrant for Putin over his alleged role in the deportation of Ukrainian children has sparked a lively debate. Is the move truly historic or merely symbolic?

Putin warns UK it is ramping up war with its 'nuclear component' arms for Ukraine (The Telegraph) Britain confirms it will send depleted uranium shells, but Kremlin accused of 'bonkers' reaction at press conference with President Xi

Putin says Russia will respond if UK supplies depleted uranium shells to Ukraine (the Guardian) Russian leader reacts to comments by UK defence minister that Britain will supply armour-piercing rounds to Kyiv

The Army Digs in for Competition Against Russia, Sets Garrison in Poland (Military.com) The Army now has a permanent garrison in Poland, a major milestone underscoring that country's central role as a hub of NATO support for Ukraine's fight against invading Russian forces.

Absolutely a quick study: Ukrainians master Patriot system faster than expected (POLITICO) They are the best of the best in what they do in air defense for Ukraine," a U.S. general said.

Ukrainians to Get U.S. Tanks by Fall (U.S. Department of Defense) The U.S. will send M1A1 Abrams tanks from refurbished hulls already in U.S. inventory to Ukraine, and the delivery will be in the fall, which isfaster than what was initially expected.

US speeds up Abrams tank delivery to Ukraine war zone (AP NEWS) The Pentagon is speeding up its delivery of Abrams tanks to Ukraine, opting to send a refurbished older model that can be ready faster, with the aim of getting the 70-ton battle powerhouses to the war zone by the fall, the Pentagon said Tuesday.

US to accelerate delivery of tanks to Ukraine (CNN) The US will dramatically accelerate the time it takes to ship Abrams tanks to Ukraine by sending older M1-A1 models of America's main battle tank instead of the more modern version of the tank, according to two US officials.

The Dangers of a New Russian Proposal for a UN Convention on International Information Security (Council on Foreign Relations) Russia recently issued a new draft for a UN international convention on cybersecurity. An alternative proposal offers a freer vision of internet governance, and would provide a more action-oriented p

Bad magic: new APT found in the area of Russo-Ukrainian conflict (Securelist) In October 2022, we identified an active infection of government, agriculture and transportation organizations located in the Donetsk, Lugansk, and Crimea regions.

Unknown actors target orgs in Russia-occupied Ukraine (Register) If this is Kyiv's work, Russia can Crimea river

New 'Bad Magic' Cyber Threat Disrupt Ukraine's Key Sectors Amid War (The Hacker News) New "Bad Magic" activity cluster targeting gov't, agriculture & transportation orgs in Donetsk, Lugansk & Crimea amid ongoing Russia-Ukraine war.

Partisan suspects turn on the cyber-magic in Ukraine (Cybernews) A previously unidentified threat actor is believed to be using new malware programs called CommonMagic and PowerMagic to phish for details of targets in disputed Russian-controlled areas of Ukraine.

Hacker tied to D.C. Health Link breach says attack 'born out of Russian patriotism' (CyberScoop) The hacker who took responsibility for the D.C. Health Link breach claims to have targeted U.S. politicians out of allegiance for Russia.

Financial cyber threats heightened by ideologically motivated hacktivism amidst geopolitical tension (SC Media) Russia's war with Ukraine has triggered a surge in ideologically motivated hacktivism that persists to this day, posing by far the most significant impact on the cyber threat landscape for financial services, according to a report by the Financial Services Information Sharing and Analysis Center.

Review: Protecting and Defending Ukraines Cultural Identity (New York Times) A festival responds to the assaults and insults of war by celebrating the composer who shaped the nations contemporary music, Borys Liatoshynsky.

ENISA Transport Threat Landscape (ENISA) This report is the first analysis conducted by the European Union Agency for Cybersecurity (ENISA) of the cyber threat landscape of the transport sector in the EU. The report aims to bring new insights into the reality of the transport sector by mapping and studying cyber incidents from January 2021 to October 2022. It identifies prime threats, actors and trends based on the analysis of cyberattacks targeting aviation, maritime, railway and road transport over a period of almost 2 years.

Ransomware likely to target transportation OT systems, warns EU cyber agency (Record) The European Union's cyber agency says ransomware is the biggest cyberthreat to Europe's ports, railways and aviation, and attackers are likely to target operational technology (OT) instead of information technology (IT) at some point.

Vulnerability Spotlight: Netgear Orbi router vulnerable to arbitrary command execution (Cisco Talos Blog) Cisco Talos recently discovered four vulnerabilities in the Netgear Orbi mesh wireless system, including the main hub router and satellite routers that extend the networks range.

From Ransomware to Cyber Espionage: 55 Zero-Day Vulnerabilities Weaponized in 2022 (The Hacker News) 55 zero-day vulnerabilities exploited in 2022, mainly in software from Microsoft, Google, and Apple.

Chatbots, Celebrities, and Victim Retargeting: Why Crypto Giveaway Scams Are Still So Successful (Akamai) Akamai researchers have been monitoring several cryptocurrency giveaway scam kits that impersonate celebrities and brands, notably Elon Musk and his associated companies. The scams are delivered through various social media platforms as well as direct messaging apps such as WhatsApp or Telegram.

ZenGo uncovers security vulnerabilities in popular Web3 Transaction Simulation solutions: The red pill attack (ZenGo) ZenGo uncovers security vulnerabilities in popular Web3 Transaction Simulation solutions: The red pill attack ZenGo is the first keyless bitcoin and cryptocurrency wallet the most simple and secure way to manage your crypto assets.

Google Pixel phones had a serious data leakage bug heres what to do! (Naked Security) What if the safe images you shared after carefully cropping them had some or all of the unsafe pixels left behind anyway?

Stopping a $36 Million Vendor Fraud Attack (Abnormal Intelligence) Abnormal recently observed an attempted vendor email compromise attack that sought to steal $36 million. Here's how we detected and stopped the attack.

Ransomware gangs incite fear in victims to fuel attacks (Cybersecurity Dive) Attacks involving data theft nearly doubled and harassment spiked 20 times by late 2022, Palo Alto Networks Unit 42 said.

Harvest Keeper Rugged Users And Shows Why "AI Crypto" Can't Work (CryptoMode) Harvest Keeper boasted of being an AI project that "optimizes the trading process for maximum payout" and promised users a 4.81% return on deposits.

Personal details of 8,000 staff and clients compromised in cyber attack, health organisation says (ABC) After a lengthy investigation, an Aboriginal health organisation says hackers accessed Medicare numbers, licences, passports and tax file numbers in the attack last year.

Ferrari Extorted Over Client Database Breach (Tech Times) The Italian automaker opted not to pay the ransomhere's why!

WSJ News Exclusive | U.S. State-Government Websites Use TikTok Trackers, Review Finds (Wall Street Journal) The presence of the Chinese apps trackers means that U.S. states might be inadvertently participating in data-collection efforts for a foreign-owned company.

Cybercriminals care about security too: how shady business is done on the dark web (ANI News) Latest Kaspersky research reveals cybercriminals posted more than 1 million messages mentioning escrow services on the darknet in 2020-2022. Escrow agents are third-party intermediaries involved in such deals to control the fulfillment of agreements and reduce the risks of cheating. They partner with cybercriminals who want to sell or buy data, services, or conclude a partnership - usually earning from three to 15 per cent of the transaction. However, the deal can still fail for various reasons, including those related to escrow scams. How such business is done on the darknet is described in a new report by Kaspersky Digital Footprint Intelligence team.

CISA Releases Eight Industrial Control Systems Advisories | CISA (Cybersecurity and Infrastructure Security Agency CISA) CISA released eight Industrial Control Systems (ICS) advisories on March 21, 2023. These advisories provide timely information about current security issues, vulnerabilities, and exploits surrounding ICS.

These Fortune 500 Companies Show Up Most Often in Compromised Password Data (Specops Software) Today, the Specops research team is sharing the results of their latest findings on the use of Fortune 500 company names in compromised passwords. The...

Fortinet Annual Skills Gap Rep (GuruFocus) New Fortinet research reveals escalating cyber risks due to the ongoing talent shortage while the number of organizations experiencing five or more breaches jumped by 53%

Only 1 in 10 workers remembers all their cyber security training (CybSafe) Only 1 in 10 workers remembers all their cyber security training. Read more...

Join the Brightest Startups at RSAC Innovation Sandbox (RSA Conference 2023) For 17 years, cybersecurity's boldest new innovators have competed in the RSAC Innovation Sandbox contest to put the spotlight on their potentially game-changing ideas. This year, 10 finalists will again have three-minutes to make their pitch to a panel of judges.

XM Cyber Announces Acquisition of Confluera, Adding Run-Time Protection on Cloud workloads to Extend CNAPP Capabilities (XM Cyber) Learn more about XM Cyber Announces Acquisition of Confluera, Adding Run-Time Protection on Cloud workloads to Extend CNAPP Capabilities . Read more on XM Cyber website.

dope.security Lands $16M in Funding for Fly-Direct Secure Web Gateway (Business Wire) Former Symantec, Forcepoint Product Leader Takes on Legacy Vendors, Disrupting SWG Market with Radical New Architecture

Backslash Security Emerges from Stealth to Fuse Code Security with Cloud-Native Context, Transforming a Decades-Long AppSec Paradigm (Yahoo Finance) Backed by StageOne Ventures and a stellar roster of security industry leaders, AppSec disruptor secures $8M to equip AppSec teams with visual control over cloud-native applications by identifying toxic code flows and automating threat models

Summers Predicts Cleaning Out of Fintech Sector After SVB Failure (The Information) Former Treasury Secretary Larry Summers predicted Silicon Valley will see a cleaning out in the fintech sector as a result of regulatory attention flowing from the failure of Silicon Valley Bank. In an interview with The Informations editor in chief Jessica Lessin, Summers also said that the ...

Briefing: TikTok CEO to Pledge App Will be Free From Any Government Influence (The Information) TikTok CEO Shou Zi Chew will offer a broad series of promises to protect American users data and keep the app free from government interferencein his upcoming testimony to Congress. We will firewall protected U.S. user data from unauthorized foreign access, he will say, according to a copy of the prepared remarks . Tiktok will remain a platform for free expression and will not be

TikTok CEO appears on TikTok to warn users about the TikTok ban (The Verge) A message to the apps 150 million US users

TikTok bans deepfakes of nonpublic figures and fake endorsements in rule refresh (The Verge) TikTok says realistic deepfakes need to be clearly labeled.

TikTok is D.C.'s new boogeyman. Can Silicon Valleys tactics save them? (Washington Post) The app, owned by Beijing-headquartered ByteDance, is adopting the lobbying tactics of many of its American tech company peers

Here's Why CrowdStrike Is Thrilled to Partner With Dell (The Motley Fool) There's a lot of good stuff here for investors to think about.

Check Point tells employees no raises in 2023 (CTech) The Israeli cyber giant informed its employees that, in view of the economic situation, instead of salary increases, they will receive a special bonus of blocked shares for one year in the amount of 5% of their base salary

Radware Named a Gold Winner for Application Security in the 2023 Globee Cybersecurity Awards (GlobeNewswire News Room) Receives top honors for Radware SecurePath, its innovative application security architecture ...

Industry Veteran Kevin Senator Joins aDolus as CEO (EIN News) Experienced OT/IT/IoT executive to expand customer base

AppOmni Bolsters C-Suite with Key Leadership Appointments (Business Wire) SaaS security leader names new Chief Development Officer and Chief Customer Officer

NinjaOne Appoints Robert Gibbons as Chief Technology Officer (NinjaOne) Read first-hand accounts of how Ninja's products and superior support help companies deliver fast and effective IT management.

SaaS Data Security Leader DoControl Announces Christine Castro as its New Vice President of Marketing (PR Newswire) DoControl, the automated Software as a Service (SaaS) security company, today announced that Christine Castro has joined as Vice President of...

HUMAN Expands Legal and Compliance Capabilities with Newly-Appointed General Counsel (HUMAN Security) HUMAN Expands Legal and Compliance Capabilities with Newly-Appointed General Counsel, Kirsten Canton.

https://www.businesswire.com/news/home/20230322005527/en/Orca-Security-Appoints-Co-Founder-Gil-Geron-as-CEO (Business Wire) Strategic Changes Position Company for Next Stage of Growth as Cloud-Native Application Protection Platform Market Leader

This Ukrainian Startup Is Looking to Automate Crypto Crime Reporting Using Smart Contracts, AI (Yahoo Finance) HAPI Labs has launched a platform for reporting of scam- and crime-related addresses in partnership with Ukraines cyber police.

Intelligent CloudCare Launches Online Cybersecurity Employee Training Courses (GlobeNewswire News Room) Intelligent CloudCare, an IT services firm for small and medium-sized businessesand a subsidiary of...

ConnectWise Challenges IT Solution Providers to Prepare for the Future at IT Nation London Conference (GlobeNewswire News Room) MSP software leader kicks off annual conference in Europe with broad updates to tools and services and messages on solving challenges in time of rapid...

Cybersecurity & Compliance Platform from Onapsis Now an SAP Endorsed App Available on SAP Store (Onapsis) Customers can benefit from accelerated cloud and digital transformation initiatives through supplementary, independent cybersecurity and compliance capabilities.

Sophos Partners with Cowbell to Provide Businesses with Easier Access to Cyber Insurance (Sophos) Partnership Helps Organizations Apply for Cyber Insurance and Assess Security Health for Insurability

Sophos Partners with Cowbell (Sophos News) Providing Small and Medium Enterprises with streamlined access to cyber insurance coverage and facilitating optimal insurance provision for Sophos customers in the U.S. through the opt-in sharing o

Cellebrite Announces Enhanced Solution Capabilities for Digital Investigations (GlobeNewswire News Room) Cellebrite's latest AI-enabled Investigative Analytics Solution, Pathfinder X, equips investigators with new breadth of investigative tools and enterprise...

Cellebrite Announces RelativityOne Integration for Quicker, Safer Data Review (GlobeNewswire News Room) Cellebrites LegalView add-on for RelativityOne to simplify how modern data is collected and reviewed...

Dell strengthens security portfolio (IT-Online) Dell Technologies has announced new security services and solutions to help organisations protect against threats, respond to attacks and secure their devices, systems and clouds. Seventy-two percent of IT business leaders and professionals believe the changing working world exposes their organization to even greater risk. The highly distributed IT environment creates new opportunities for cybercriminals []

Launch of Virtru Private Keystore Enables Heightened Privacy and Secure Collaboration in the Cloud (GlobeNewswire News Room) Encryption Key Management Solution Gives Customers Full Control of Cloud-Hosted Data...

Cemtrex Announces Vicon End-to-End Security System Order for Next Generation Zero-Carbon Prison System in United Kingdom (GlobeNewswire News Room) $0.8 Million in Vicon Surveillance Equipment with Latest Smart Technologies to Better Protect Prisoners, Staff and Public...

OP[4] Launches with Groundbreaking IoT and Embedded Systems Security Tech (Yahoo Finance) Automated Platform Detects, Prioritizes, Remediates Exploitable VulnerabilitiesCHANTILLY, Va., March 22, 2023 (GLOBE NEWSWIRE) -- OP[4], a new company built on pioneering cybersecurity technology originally developed for DARPA and productized via AFWERX, launched today with over $2 million U.S. dollars in initial seed funding secured through a combination of product sales and private investment. OP[4]'s revolutionary security platform is designed to automatically find and fix N-Day and 0-Day vul

Vectra Unifies AI-driven Behavior-based Detection and Signature-based Detection in a Single Solution (Vectra news release) Published: Mar 22, 2023. Vectra Unifies AI-driven Behavior-based Detection and Signature-based Detection in a Single Solution. Visit our news releases page to read more!

Bluescape and Jazz Solutions Add Virtual Workspace Solutions to Automa (PRWeb) FedRAMP-certified Bluescape helps achieve new levels of agility for dispersed teams Bluescape, a visual collaboration and workspace platform,

Cohesity and OwnBackup Partner to Offer Simplified and Consolidated Data Protection for SaaS workloads (Cohesity) Leading Data Protection and Management Providers OwnBackup and Cohesity Join Forces to Streamline Data Backup for Customers and Elevate Business Continuity in the Ransomware Era

Lightspin Launches Remediation Hub to Identify and Fix the Cloud Security Threats that Matter Most (PR Newswire) Lightspin, the leading cloud security solution for SaaS companies, today launched the Remediation Hub as part of its cloud-native application...

CISA Releases Updated Cybersecurity Performance Goals (Cybersecurity and Infrastructure Security Agency CISA) Today, we published stakeholder-based updates to the Cybersecurity Performance Goals (CPGs). Originally released last October, the CPGs are voluntary practices that businesses and critical infrastructure owners can take to protect themselves against cyber threats

CISA and NSA Release Enduring Security Framework Guidance on Identity and Access Management | CISA (Cybersecurity and Infrastructure Security Agency CISA) As part of the Enduring Security Framework (ESF), the Cybersecurity and Infrastructure Security Agency (CISA) and the National Security Agency (NSA) has released Identity and Access Management Recommended Best Practices Guide for Administrators. These recommended best practices provide system administrators with actionable recommendations to better secure their systems from threats to Identity and Access Management (IAM).

ESF Partners, NSA, and CISA Release Identity and Access Management Recommended Best Practi (National Security Agency/Central Security Service) As part of the Enduring Security Framework (ESF), the National Security Agency (NSA) and the Cybersecurity and Infrastructure Security Agency (CISA) published the Recommended Best Practices Guide for

Identity and Access Management: Recommended Best Practices for Administrators (NSA and CISA) Identity and access management (IAM) is a framework of business processes, policies, and technologies that facilitate the management of digital identities to ensure that users only gain access to data when they have the appropriate credentials.

How to Manage Cyber Risk as a Board Director (OODA Loop) The evolving responsibilities of board members to cyber security and cyber risk were highlighted as a theme in the OODA Almanac 2023. While cybersecurity has been a focus of corporate boardrooms in the past, it is about to become a required focus as the Securities and Exchange Commission (SEC) seeks to have companies identify a board of directors member as the cybersecurity lead. OODA has specific expertise supporting the nexus between technical cybersecurity and corporate governance risk management and looks forward to supporting a wide range of companies by either placing a cybersecurity expert directly on the board or working as a consultant to the board to help guide their strategic initiatives and ensure they are exercising due care in managing cyber risks. Following is a guide for board members as they begin to explore the impact of cyber risk on the fiduciary responsibilities of a board of directors.

Weak, Repetitive Passwords a Common Problem in Government, Says Report (FEDweek) Use of weak and/or repetitive passwords is a common problem in government, according to a report by a cybersecurity firm that is the latest caution about

Meet Data Privacy Mandates With Cybersecurity Frameworks (CPO Magazine) In the coming months, data protection laws will continue to evolve and strengthen, requiring organizations to refine their data protection policies further and take demonstrable steps to safeguard the privacy of individual customers information.

Proactive Defence : How Enterprises Are Using Dark Web Threat Intelligence - Searchlight Cyber (Searchlight Cyber) Download our latest research report - based on a survey of more than 1,000 CISOs in the US and UK - to find out how large enterprises are using dark web intelligence. We found that 93 percent of CISOs are concerned about dark web threats but the use of threat intelligence varies by geography and...

Opinion Social media is devastating teens mental health. Heres what parents can do. (Washington Post) If we are serious about addressing the alarming worsening of teens mental health, we must reduce their social media use.

What is the CIA Triad? - Check Point Software (Check Point Software) Learn what the CIA Triad is, and how potential cyber threats to an organizations systems are limited if they ensure confidentiality, integrity, and availability.

Cyber Warfare is Upon Us: Why the Next Generation of War Games so Important (Infosecurity Magazine) Modern businesses are increasingly used as pawns in cyber battles between nation-states and affiliated groups

Turing Award Won by Co-Inventor of Ethernet Technology (New York Times) In the 1970s, Bob Metcalfe helped develop the primary technology that lets you send email or connect with a printer over an office network.

Google Rolls Out Its Bard Chatbot to Battle ChatGPT (WIRED) A new bot has entered the chat. But Google warns that, like its competitor, it will sometimes hallucinate.

Google just launched Bard, its answer to ChatGPTand it wants you to make it better (MIT Technology Review) Under pressure from its rivals, Google is updating the way we look for information by introducing a sidekick to its search engine.

Amazon Faces Moment of Truth on Alexa as ChatGPT Steals Its Thunder (The Information) At the 2018 Consumer Electronics Show, Amazon announced one of its biggest partnerships yet to help make its Alexa voice assistant ubiquitous: a deal with Toyota to integrate Alexa into the auto giants cars. Our vision for Alexa is that she should be everywhere a customer might need herat ...

The case for slowing down AI (Vox) Pumping the brakes on artificial intelligence could be the best thing we ever do for humanity.

Go here to read the rest:
Notes from the underworld. Cyberespionage in occupied Ukraine ... - The CyberWire

NSA Shines Light on Importance of Transparency and Accountability – HS Today – HSToday

Sunshine Week is in full swing across the federal government, and the National Security Agency (NSA) is taking the time to recognize and reaffirm Agency values of transparency and accountability.

A time to acknowledge and celebrate transparency in the federal government, Sunshine Week was created 18 years ago by the American Society of News Editors, now known as the News Leaders Association. Freedom of Information Day was also celebrated this weekon 16 March. Speaking at the Agencys Privacy Day event last year, GEN Paul M. Nakasone, Commander, U.S. Cyber Command, Director, NSA/Chief, CSS, explained that transparency is always a work in progress: NSA has had a history of strength, civil liberties, and privacy protections in daily operationsand has made great strides in being more transparent about what we do.

NSAs Civil Liberties, Privacy, and Transparency (CLPT) Office is key to the Agencyspromotion and integrationof civil liberties and privacy protections into everything NSA does: policies, plans, procedures, technology, programs, and activities.

At the head of the CLPT Office isActing Director Thomas D. T.D. Stuck, who said hes always asking, How can we be more effective in our transparency? Its more than just providing information, too: Its giving the context of what were doing so that the public can have a sense of how information fits into the broader sense of why there is a National Security Agency, Stuck said.

Transparency and accountability go hand in hand. Ultimately, Stuck underlined, Were accountable to the American people.

Learn more about the CLPT Office bywatching a videoor exploringtheir webpage.

Read more at NSA

Read more:
NSA Shines Light on Importance of Transparency and Accountability - HS Today - HSToday