Tag Archive for: CLOSE

US trade rep seeks close economic security ties in Asia


TOKYO — The United States hopes to deepen trade ties with Japan as it fortifies cooperation on economic security with its Asian allies and partners, the top U.S. trade envoy said Wednesday.

U.S. Trade Representative Katherine Tai’s visit to Tokyo follows a trip to the Philippine capital, Manila, that she said highlighted a newly emerging partnership among the three countries as they build both economic and defense ties.

Tai met with Japanese Foreign Minister Yoshimasa Hayashi to discuss making supply chains more resilient and secure, the Japanese Foreign Ministry said in a statement.

Tai also reviewed the status of negotiations on the Indo-Pacific Economic Framework, or IPEF, a new trade pact proposed by Washington, emphasizing the importance of cooperation with Japan, it said.

The framework has 13 members, including the U.S., that account for 40% of global gross domestic product: Australia, Brunei, India, Indonesia, Japan, South Korea, Malaysia, New Zealand, the Philippines, Singapore, Thailand and Vietnam.

Hayashi responded by welcoming more U.S. engagement in the regional economy, saying Japan will proactively discuss the plan with other partners.

Japan and the United States have been promoting multilateral cooperation, most recently with the Philippines as they share common concern over China’s growing influence and assertiveness in both security and economic activities.

But the U.S. has stepped up diplomacy across the region, with Secretary of State Antony Blinken stopping over the weekend in Vietnam, which Washington sees as a key component of its strategy for the region given the country’s traditional rivalry with its much larger neighbor China.

Tai also met Wednesday with Minister of Economy, Trade and Industry Yasutoshi Nishimura. The trade ministry said the two discussed strengthening supply chains — an issue that gained urgency amid shortages of computer chips and other goods during the pandemic. They also discussed ways to cooperate in the protection of human rights in business, the ministry said.

Japan and the United States have set up a taskforce that aims to eliminate human rights violations in international supply chains and to ban use of materials from…

Source…

HP Wolf Connect expands PC management to help close security gaps


HP has introduced HP Wolf Connect, a connectivity solution for IT management that offers a secure connection to remote PCs. This solution allows IT professionals to manage devices even when they are offline or turned off.

Using a cellular-based network, HP Wolf Connect’s robust connectivity helps ensure IT teams can readily manage a dispersed hybrid workforce. It can reduce the time and effort needed to resolve support tickets, secure data from loss or theft to mitigate a potential breach and optimize asset management.

“Hybrid work has made remote management at scale more complex, yet more essential,” comments Dr. Ian Pratt, Global Head of Security for Personal Systems, HP Inc. “The cloud has helped but hasn’t solved IT’s ability to manage devices that are powered down or offline. HP Wolf Connect’s highly resilient connection opens new doors to remote device management, enabling efficient and effective management of dispersed workforces.”

HP Wolf Protect and Trace with Wolf Connect is a software service capable of locating, locking and erasing a PC remotely, even when it’s turned off or disconnected from the Internet. This capability protects sensitive data on the move and helps lower IT costs by reducing the need for PC remediation or replacement.

Securing and managing the hybrid workforce is a top priority for organizations. New global research from HP Wolf Security found 82% of security leaders operating a hybrid work model have gaps in their organization’s security posture. The global study of 1,492 security leaders found:

  • 61% say protecting their hybrid workers will get harder in the year ahead.
  • 70% say that hybrid work increases the risk of lost or stolen devices.

“IT teams need a better way to deal with the increase in lost or stolen devices,” continues Pratt. “Before today, solutions relied on PCs being on or connected to the internet, but HP Wolf Connect now provides a highly resilient mobile connection to find, lock, and erase lost or stolen devices even if they are disconnected or powered down.

Pratt continues; “This is particularly crucial in industries where devices may contain PII (personally identifiable information) or…

Source…

Feds close case of Kremlin-connected Russian tech businessman accused of hacking non-public reports of U.S. companies


The fate of a Kremlin-connected Russian tech businessman accused of directing an $82 million hacking scheme of non-public reports of U.S. companies and then illegally trading off this information is now in the hands of a federal jury.

Attorneys made their closing arguments Friday following the two-week trial of Vladislav Klyushin in federal court in Boston’s Seaport District.

The defense argued that the case was politically motivated and built on “predetermined conclusions.” The prosecution argued that Klyushin’s trading activities had only a “one-in-a-trillion chance” of being coincidental and unconnected to the hacking.

Klyushin was a director of Moscow, Russia-based M-13, a company, according to court documents, which provided services including the “monitoring and analytics of media and social media messages” and penetration testing — a service in which a company tests for security vulnerabilities in IT infrastructure. The company claimed it was used by Russian government agencies and even by President Vladimir Putin’s office.

He was arrested while on a ski trip in Switzerland in March 2021 and then extradited to the U.S. to face four counts related to conspiracy and wire and securities fraud.

Klyushin was indicted alongside alleged co-conspirators Ivan Ermakov and Nikolai Rumiantcev on April 6, 2020. Two others, Mikhail Irzak and Igor Sladkov, have also been charged in the case. All of the alleged conspirators, excepting Klyushin, remain at large.

Ermakov, the alleged lead hacker, is a former officer in the Russian Main Intelligence Directorate (GRU) also wanted by the FBI after he and 11 others were indicted by a federal grand jury in Washington D.C. in July 2018 for allegedly interfering in the 2016 presidential election.

“What’s not in dispute is that the hackers were sophisticated, they were experts,” said Assistant U.S. Attorney Stephen Frank during the prosecution’s rebuttal, the last of the arguments heard before the jurors were given instructions by Judge Patti B. Saris.

Prosecutors allege Klyushin directed a scheme in which hackers at his company obtained quarterly and annual reports of major companies before they were made public by…

Source…

Newly Introduced HackerOne Assets Goes Beyond Attack Surface Management To Close Security Gaps


SAN FRANCISCO, October 13, 2022: HackerOne, the leader in Attack Resistance Management, today announced the general availability of its HackerOne Assets product. Assets combines the core capabilities of Attack Surface Management (ASM) with the expertise and reconnaissance skills of ethical hackers to bring visibility, tracking, and risk prioritization to an organization’s digital asset landscape. Research from ESG
revealed that 69% of organizations have experienced a cyberattack through the exploit of an unknown, unmanaged, or poorly managed internet-facing asset. Assets form a key part of HackerOne’s Attack Resistance Management portfolio that aims to discover unknown assets and vulnerabilities and close organizations’ security gaps.

With Assets, customers can manage both the discovery and testing of assets in a single platform. The solution blends security expertise with asset discovery, continuous assessment, and process improvements to reduce risk. HackerOne’s community of ethical hackers enrich the asset and scan data and analyze it themselves, ensuring that newly found assets are tested for risk and mapped according to their metadata. Once the assets have been identified and ranked for risk, security teams can use these insights to initiate pentests on newly discovered assets and add assets to their bug bounty scope.

“HackerOne Assets solves for the inefficiencies in traditional ASM scanning” explained Ashish Warty, SVP of Engineering at HackerOne. “It’s impossible for security teams to see their entire attack surface, while cloud transformation, agile product cycles, and mergers and acquisitions keep the threat landscape growing. By combining attack surface management with the creative power of the ethical hacking community, Assets reduces manual work, increases the accuracy of scanning results, and speeds up time to remediation by prioritizing based on real world risk.”

“Having in-depth visibility of our attack surface is a core part of our security strategy,” said Roy Davis, Lead Security Engineer at Zoom. “With HackerOne Assets and the insights it brings from the hacking community, our security team has been able to effectively prioritize those…

Source…