Tag Archive for: ‘robust’

Michael Gove insists on ‘robust’ security despite Liz Truss phone hack claims | Politics | News


The embarrassing revelation is the second security row to rock the Government in two weeks.

It comes amid criticism of Suella Braverman’s reappointment as Home Secretary after she breached the ministerial code by passing on Government documents from her personal phone.

The Russian hack was discovered while Ms Truss was running for the Tory leadership but was apparently kept out of the public eye by then-prime minister Boris Johnson and Cabinet secretary Simon Case.

But when quizzed about the matter yesterday, Levelling Up Secretary Mr Gove said: “I’m sure that Liz, both as foreign secretary and as prime minister, will have followed the advice that she was given by the intelligence and security communities.

“The more that we talk in detail about these things, the more that we risk giving information to people who wish this country and its citizens harm.”

Mr Gove said he did not know the full details of “what security breach, if any, took place”.

He said: “What I do know is that the Government has very robust protocols in place in order to make sure that individuals are protected, but also that Government security and national security are protected as well.”

He refused to discuss the potential implications as “loose lips can sink ships when it comes to these questions”.

Former MI6 chief Sir Alex Younger said MPs do not understand enough about cyber-security.

He said: “Levels of education aren’t high enough, and I don’t think people are focusing enough on the risks to their security and their devices, because these are hidden threats that aren’t properly understood.

“I think that’s true of ministers as anyone else, and there’s a premium on making sure that they’re properly educated.

“I would be extremely surprised, by the way though, if the sort of material that we handled in the agencies – so secret intelligence material – gets anywhere near mobile devices connected to the internet, in ministerial hands or otherwise.”

The former head of the Army, Lord Dannatt, said: “Our leaders must be sufficiently disciplined to only communicate through authorised means which themselves are encrypted and are secure.

“We’ve seen it with Suella Braverman,…

Source…

Android 12 will provide robust enterprise trust and security: Google


New Delhi: Google has made Android 12 open-source earlier this week and now, the company has said it is focused on helping organisations achieve the right balance between protecting employee privacy and equipping IT with necessary security and controls.

Android 12 introduces user privacy enhancements for all managed devices, including improved transparency of admin controls.

“Work profile users will be able to approve (if allowed by their IT admin) or deny sensor-related permissions, such as location and camera, to work profile apps. On fully-managed devices, IT admins can choose to give their users this same control,” Google said in a statement late Thursday.

MS Education Academy

To further protect user privacy, admins will be able to set up WiFi networks for employees through a new network API that doesn’t require user location permissions.

Hardware device IDs for personal devices have also changed.

“Now, instead of solely hardware-based identifiers, companies can use a combination of hardware and employer-specific identifiers that help preserve employee privacy if they leave their organisation,” said Google.

For Android 12, Google has added additional controls to help enterprise IT teams reduce security risks and ensure tighter monitoring of business data.

A key addition is network logging for the work profile, to give organisations added control and reporting for their work data, while still protecting user privacy in the personal profile.

“We’re also empowering IT to decide what input method editors (IMEs) employees can use in their personal profiles to reduce the risk of using a rogue keyboard that could capture data on the device. IT will also have the ability to disable USB signaling for anything but charging, reducing the risk of USB-based attacks,” the tech giant explained.

Admins can now easily set password requirements that meet modern security best practices by choosing between pre-set password complexity levels.

IT admins will also have the option to slice their 5G network and dedicate connectivity to all apps on a fully-managed device, or specifically to apps in the work profile.

“In partnership with their carrier, admins will be able to have wider control over…

Source…

Internet of Things in desperate need of more robust identity and access management


The future of identity and access management in the Internet of Things will escape the confines of user-focused identity and transition toward a more inclusive model, according to a new analysis research report by ABI Research.

The new multi-faced approach will include machine and system identity along with IoT device and platform management operations.

“IAM is yet another identity and security framework that poses significant challenges when crossing from the IT realm onto the IoT,” says Dimitrios Pavlakis, senior cyber security and IoT analyst at ABI Research.

“Most cloud providers regard IAM as a purely user-focused term while other IoT device management and platform providers make references to IAM in device access control,” he says.

“IAM in traditional IT environment is used to streamline user digital identities and to enhance the security of user-facing front-end operations using a variety of management tools, privilege management software and automated workflows to create a user-focused authorisation framework.”

Pavlakis says the explosion of IoT technologies has significantly increased the sheer volume and complexity or interconnected devices, users, systems, and platforms making traditional IT IAM insufficient, if not problematic in some cases. 

“Insufficient access control options, legacy infrastructure and proprietary protocol dependencies, traditionally closed networks, the fervent increase in digitisation, albeit with lackluster security operations, are some of the most prominent challenges for IAM in IoT,” he explains. 

“Regardless of which IAM terminology is used, these challenges along with the highly complex IoT identity value chain point toward a more competent model of IAM, which touches upon various technologies and security protocols to be considered under the IAM umbrella including: user privilege management and on-prem access control, edge-to-cloud integration, cloud directory-as-a-service, system and machine ID, data security and governance, API management, IoT device identity, authentication and access control.”

Pavlakis says the justifiable lack of a unified IoT security standardisation framework, the fact that organisations are always on a…

Source…

Security Software Market May See Robust Growth By 2026 | Symantec, Panda Security, Intel – KSU


The latest independent research document on Global Security Software examine investment in Market. It describes how companies deploying these technologies across various industry verticals aim to explore its potential to become a major business disrupter. The Security Software study eludes very useful reviews & strategic assessment including the generic market trends, emerging technologies, industry drivers, challenges, regulatory policies that propel the market growth, along with major players profile and strategies. This version of Security Software market report advocates analysis of Imperva, F-Secure Corporation, Symantec Corporation, Panda Security, Intel Corporation, Trend Micro Incorporated, Cisco Systems, AVG Technologies, Dell Inc. & IBM.

Get Free Sample Pages of Global Security Software Market Study Now @: https://www.htfmarketreport.com/sample-report/3343200-2020-2025-global-security-software-market-report-production-and-consumption-professional-analysis

As Security Software research and application [Large Enterprises, Government Agencies & Others] continues to expand in scope, the market will see deeper integration and application of more technologies in the future. This commercialization of market is playing a positive role in accelerating Security Software business digitalization, improving industry chain structures and enhancing information use efficiency. The findings mainly focus on category or product type: , Mobile Security Software, Consumer Security Software & Enterprise Security Software etc, which underpins many recent advances in the other Security Software technologies.

In order to provide a more informed view, Security Software research offers a snapshot of the current state of the rapidly changing industry, looking through the lenses of both end users and service provides/players of to come up with a more robust view.

Market Scope

Based on the type of product, the market segmented into :, Mobile Security Software, Consumer Security Software & Enterprise Security Software

Based on the End use application, the market segmented into :Large Enterprises, Government Agencies & Others

Buy this research report @

Source…