Tag Archive for: Modern

How the Modern Data Landscape Made the Traditional Cybersecurity Approach Obsolete


From the news headlines, we know that data breaches are on the rise – both in frequency and scale. While this reality is unsettling, it’s not surprising. That is because the volume of data being collected and stored by organizations continues to grow exponentially each year. Every day, the global population creates 2.5 quintillion bytes of data, and some estimates state that by the end of 2022, 97 zettabytes (one zettabyte is one trillion gigabytes) of data will be created, captured, copied, and consumed worldwide. 

This data is valuable and, therefore, attractive to cybercriminals to steal or manipulate to conduct fraud, sell on, or hold for ransom. Organizations are well aware of the threats to data and invest heavily in cybersecurity measures. However, despite this, data breaches continue to occur. To understand why we need to look at how the data landscape has changed in the last decade and how that has made traditional cybersecurity frameworks and playbooks obsolete.

The data landscape pre-2010

Before 2010 and the mass internet adoption spurred on by the invention of the smartphone, organizations had a relatively well-defined and controlled footprint of people, processes, and technology that were used to capture, process, and store data.

Pre-2010 Data Landscape

At that time, data was still largely collected using paper. This data was generally provided to a  handful of employees (i.e. Data Entry Operators) who had been strongly verified by the organization. They entered this data into monolithic and green screen applications, which stored the data in a handful of enterprise databases that were available at the time. All this was largely run within the organization’s own data centers, under the control of their IT and security teams.

The data landscape post-2010

Mass adoption of the internet and the digitization of the economy since 2010 have seen a significant shift in our data practices and processes.

Post 2010 Data Landscape

Today we have hundreds or even thousands of people (ie. customers), entering data via web and mobile apps. These users are poorly verified, often requiring as little as an email address to get access. Gone are the centralized monolithic and green screen applications, replaced by web and…

Source…

Samsung Malaysia Electronics Introduces The New Galaxy XCover6 Pro Made To Secure And Built For Modern Enterprises – Samsung Newsroom Malaysia


With advanced productivity features, a faster processor and 5G enabled, the Galaxy XCover6 Pro is designed for a more collaborative and productive workforce

KUALA LUMPUR, 11 October 2022 – Samsung Malaysia Electronics today announced the availability of the new Galaxy XCover6 Pro in the market – a purposefully engineered, enterprise-ready smartphone powerful enough to support today’s most demanding businesses. The XCover6 Pro delivers enhanced mobility with strong performance, end-to-end security and ruggedized durability to help professionals get more from their device, whether they are in the office or in the field.

 

 

 

Powerful Performance for Unbeatable Productivity

The Galaxy XCover6 Pro is a breakthrough in ruggedized performance and is powered by an enhanced 6nm processor to deliver supercharged speed that shortens work time and help frontline professionals get their work done. With an optional microSD card[1], the XCover6 Pro offers expandable storage, which means – no compromises in the work you do. It is the first-ever device in the XCover series to support 5G network[2] making it possible to work from anywhere a signal can be found.

 

Today, work can happen anywhere, so employees need a device that is agile and reliable. With the Galaxy XCover6 Pro, users can conveniently extend the battery life of their device because its long-lasting, replaceable battery[3] can be easily swapped with a fresh one when it runs out. Thanks to convenient POGO charging[4] capabilities, multiple users can dock their device and quickly power up for uninterrupted productivity.

 

For workers who split their time between the office and working remotely, the Galaxy XCover6 Pro has Samsung DeX.[5] This enables users to connect[6] their device to an external display, keyboard and mouse and enjoy a PC-like experience. Employees can also use their XCover6 Pro to take pictures and notes on the go while seamlessly access the information they captured to build reports once they are back at their desk — all using one device.  

 

 

 

Strong and Streamlined for Challenging Work Environments

The Galaxy XCover6 Pro is designed to…

Source…

Polish Growth Forecast Revised Down in 2022 – Modern Diplomacy



Polish Growth Forecast Revised Down in 2022  Modern Diplomacy

Source…

Major Hack On Ukraine Infrastructure Highlights The Reality Of Modern Warfare


The websites of the Ukrainian army, the defense ministry and major banks were knocked offline after a series of cyberattacks highlighting the nature of modern-day warfare.    

At least a dozen Ukrainian websites were unreachable for a few hours due to the attacks, including the defense, foreign and culture ministries and Ukraine’s two largest state banks. 

Customers of Privatbank and Oschadbank reported problems with online payments, ATM withdrawals and mobile apps.

Even though Ukraine officials didn’t rush to blame Russia for the attack, like they did with a previous cyber attack,  a Ukrainian Information Ministry statement suggests Russian involvement.

“It is possible that the aggressor resorted to tactics of petty mischief, because his aggressive plans aren’t working overall,” the Ukrainian statement said. 

This is the second cyberattack on Ukrainian infrastructure this year. Last month, a massive cyber-attack knocked out key government websites, the foreign ministry, the cabinet of ministers and the security and defense council, among others.

The hackers left a message on the Ukrainian Foreign Ministry website saying: “Ukrainians! … All information about you has become public. Be afraid and expect worse. It’s your past, present and future.”

Authorities in Kyiv said they had uncovered clues that Russian security services could have been behind the cyber-attack.

Unless some third party is trying to take advantage of openings amid an intensifying crisis between Ukraine and Russia, Russian hackers, either acting privately or state-sponsored, are likely behind this week’s attack.

There is certainly a recent precedent: In 2014, when it seized and annexed Crimea from Ukraine, Russia was accused of launching a series of cyber-attacks to destabilize communications and spread disinformation. Cyberattacks are strategically advantageous to create a destabilizing atmosphere ahead or instead of a physical invasion. 

Since then, Russian hackers have attacked Ukraine’s power grid and caused several blackouts in the capital city of Kyiv. 

The Russian track record of unleashing destructive “hybrid warfare” cyber attacks has many nations, the U.S. included,…

Source…