Tag Archive for: internet

ZeroOutages Launches Bundled LEO Satellite Net Featuring Integrated Sophos Industry-Awarded Managed Internet Security


ZeroOutagesZeroOutages

ZeroOutages

ZeroOutages Unveils Revolutionary Bundled LEO Satellite Internet Featuring Integrated Sophos Industry-Awarded Managed Internet Security

Los Angeles, CA, April 15, 2024 (GLOBE NEWSWIRE) — ZeroOutages, a leading provider of innovative networking solutions, proudly announces the global launch of its groundbreaking bundled Low Earth Orbit (LEO) Satellite Internet service, combined with integrated Sophos industry-awarded Managed Threat Detection and Response (MDR), Extended Detection and Response (XDR) and Zero Trust Network Access (ZTNA) Internet security solutions.

This pioneering offering from ZeroOutages marks a significant advancement in the realm of satellite-based internet connectivity. Leveraging the latest advancements in LEO satellite technology, ZeroOutages has engineered a solution that not only delivers high-speed internet access but also ensures uncompromised security with the integration of Sophos’ renowned internet security suite.

The partnership with Sophos, a globally recognized leader in cybersecurity, underscores ZeroOutages’ commitment to providing comprehensive and robust solutions to its customers. By integrating Sophos’ industry-awarded internet security features directly into its bundled LEO Satellite Internet service, ZeroOutages empowers businesses and individuals globally with a seamless, reliable, and secure internet experience, even in the most remote locations.

Key features of ZeroOutages’ Bundled LEO Satellite Internet with Integrated Sophos Industry-Awarded Internet Security include:

  1. High-Speed Connectivity: ZeroOutages’ LEO Satellite Internet offers blazing-fast internet speeds, enabling users to stay connected and productive regardless of their geographical location.

  2. Global Coverage & Global Deployment: With a constellation of LEO satellites in orbit, ZeroOutages ensures global coverage, delivering internet access to even the most remote and underserved regions.

  3. Integrated Security: By incorporating Sophos’ industry-awarded internet security suite, ZeroOutages provides robust protection against cyber threats such as malware, ransomware, phishing attacks, and more, safeguarding users’ data and privacy.

  4. Seamless Integration: The…

Source…

A near-miss hack of Linux shows the vulnerability of the internet


One of the most fascinating and frightening incidents in computer security history started in 2022 with a few pushy emails to the mailing list for a small, one-person open source project.

A user had submitted a complex bit of code that was now waiting for the maintainer to review. But a different user with the name Jigar Kumar felt that this wasn’t happening fast enough. “Patches spend years on this mailing list,” he complained. “5.2.0 release was 7 years ago. There is no reason to think anything is coming soon.”.

A month later, he followed up: “Over 1 month and no closer to being merged. Not a suprise.” [sic]

And a month after that: “Is there any progress on this?” Kumar stuck around for about four months complaining about the pace of updates and then was never heard from again.

A few weeks ago, the world learned a shocking twist. “Jigar Kumar” does not seem to exist at all. There are no records of any person by that name outside the pushy emails. He — along with a number of other accounts — was apparently part of a campaign to compromise nearly every Linux-running computer in the world. (Linux is an open source operating system — as opposed to closed systems from companies like Apple — that runs on tens of millions of devices.)

That campaign, experts believe, was likely the work of a well-resourced state actor, one who almost pulled off an attack that could have made it possible for the attackers to remotely access millions of computers, effectively logging in as anyone they wanted. The security ramifications would have been huge.

How to (almost) hack everything

Here’s how events played out: In 2005, software engineer Lasse Collin wrote a series of tools for better-compressing files (it’s similar to the process behind a .zip file). He made those tools available for free online, and lots of larger projects incorporated Collin’s work, which was eventually called XZ Utils.

Collin’s tool became one part of the vast open source ecosystem that powers much of the modern internet. We might think that something as central to modern life as the internet has a professionally maintained structure, but as an XKCD comic published well before the…

Source…

The internet ‘wasn’t designed to be secure’: Gilbane CIO


Cybersecurity incidents are on the rise, and contractors need to be prepared.

Karen Higgins-Carter, the chief information and digital officer for Providence, Rhode Island-based Gilbane Building Co., brings a wealth of experience from previous roles protecting the banking and financial services industries from cyber criminals. She warns that the internet wasn’t originally built to be secure, and that the onus is on contractors to make sure they’re up to snuff on today’s security demands.

Here, Higgins-Carter spoke with Construction Dive about where the biggest threats come from, how Gilbane keeps its employees up to date and what the industry can do to protect itself.

Editor’s Note: This interview has been edited for brevity and clarity.

CONSTRUCTION DIVE: What’s the state of cybersecurity in the construction industry?

KAREN HIGGINS-CARTER: I’ll start with my view on cybersecurity in general. I think it’s important to understand two things. First, the internet was not designed to be secure. It was designed to be open. Second, we are going to continue to see a volume of attacks coming from countries that are effectively safe harbor for this type of activity.

A headshot of Karen Higgins-Carter

Karen Higgins-Carter

Permission granted by Gilbane Building Co.

 

Because of that environment, we’re seeing the regulatory response. SEC disclosure requirements being first and foremost, that were implemented in December.

What I find is the need to adjust and connect with our people based upon their current level of awareness. There’s a predictable cycle of bringing our people from a position of not really being aware of the threats to feeling invested in protecting the company and being on board with that mission.

How do you get everyone to an optimal level of comfort with cybersecurity when their experiences differ?

One of the things that we have implemented in building, in terms of our innovation practices, is responsible innovation. That it’s important to take risks in order to grow. 

There is no risk-free path to achieving your strategic objectives. 

Where that’s important in innovation is understanding, how does this innovation support our…

Source…

Advanced Insights into Digital Credentials to Fortify Internet Security


As we navigate the complex landscape of the digital realm, the importance of securing all our online interactions has become paramount. The exchange of sensitive information and execution of financial transactions underscore the critical need for advanced digital security measures.

Digital credentials are at the forefront of establishing digital trust—a concept we have delved into previously in  ‘The Evolution of Digital Trust’. In this blog, we zero in on the role of digital credentials within Transport Layer Security (TLS), supported by Public Key Infrastructure (PKI), which has been a fundamental aspect of internet security for over three decades.

In today’s AI-driven era, fostering trust in digital transactions and interactions presents a unique set of challenges. With cyber threats rapidly evolving and on the rise, the urgency to adopt advanced security frameworks has never been more acute, necessitating a proactive approach to safeguard our digital interactions and ecosystem.

Client-Server and The Man-in-the-Middle

Long before the evolution of the modern internet as we know it today, security and privacy in digital transactions were of paramount concern. This was the era of Web 1.0, the first version of the internet, where digital users were merely consumers of information; web developers were the only content creators, and ubiquitous ‘http’ protocol governed browser addresses.

Afiinidi

In the traditional client-server communication model, powered by http, anyone with basic networking tools can decipher every bit of the un-encrypted interaction between a browser (i.e. client) and the website (i.e. server). Fortunately, browsers ensure that users are cautioned that such interactions are not innately secure.

Affinidi

Client-Server and HTTPS

It did not take long before Netscape, in 1995, introduced Hyper Text Transfer Protocol Secure (HTTPS), which was HTTP secured by SSL 2.0 – a cryptographic protocol that provided end-to-end communication security over networks. This protocol has evolved significantly since then and is now known as TLS (Transport Layer Security), with the most recent version being TLS 1.3.

When you visit a…

Source…