Tag Archive for: Trust

Israeli Spy Drama ‘Trust No One’ Ups the Paranoia – Variety


World-premiering at the Monte-Carlo Television Festival, Israeli espionage thriller “Trust No One” marries the pedigree and primetime polish of past series like “Traitor” and “Valley of Tears” with techno-anxieties tied to the here-and-now – specifically with regards to the security state and modern cyber warfare.

“Israel has become one of the largest global exporters of spy ware,” says co-creator Daniel Amsel. “Only, those technological weapons can undermine democracy and lead to the death of truth. So we wanted to thread those very sensitive topics into an entertaining and fast-paced thriller that deals with the loneliness of leadership and the difficulties of parenthood, among other themes.”

Created by Amsel alongside Ron Leshem (“Euphoria”) and Amit Cohen (“False Flag”), directed by Ofir Lobel (“A Wonderful Country,” “Black Space”), and distributed by Keshet International, the nine-part drama follows Itamar (“Fire Dance” award-winner Yehuda Levi), the youngest ever head of Israel’s Shin Bet security agency turned target of a cyber-security leak.

As promised by the title, the series ratchets up the paranoia scene-for-scene once Itamar finds himself alienated from (and suspicious of) the full security apparatus serving under him.

“Nobody’s spared in this age of AI, deep-fakes and all-powerful surveillance,” says Amsel. “Even if you’re surrounded by the most sophisticated defense system, nobody is safe. Not even the head of the biggest security agency in the Middle East.”

“We thought to explore how the most secretive people in the world react to a time when sharing has become our second nature and privacy no longer exists,” Amsel continues. “We have all willingly given up privacy in the name of comfort, and today every possible bit of date is but a few clicks away. That offers a fresh way into an intelligence agency drama, especially when you dive into the character’s point of view.”

“Trust No One”
Keshet

“Itamar is not some typical strong and macho Israeli who wins every battle and…

Source…

iboss Adaptive Private Access for Zero Trust Networks Provides Greater Protection Against Advanced Threats and Malware than Competitors in Independent Laboratory Tests


News Image

At iboss, we are hyper focused on creating technology that makes it easier for organizations to implement a complete Zero Trust Network Architecture to better protect organizations in this modern-day work from anywhere environment

iboss, the leader in cloud-delivered cybersecurity, today announced the results of its third-party efficacy testing for its iboss Zero Trust Adaptive Access for Zero Trust Networks, which was rigorously tested for its malware blocking effectiveness by Miercom, a premier independent testing laboratory. The report concluded that iboss Adaptive Private Access delivered superior malware threat protection and is the only service that provides continuous inspection of Private Access traffic.

The test evaluated iboss’s Adaptive Private Access technology. This cloud native Zero Trust platform protects organizations by ensuring employees or devices accessing sensitive cloud apps are redirected through iboss’s Adaptive Private Access, which acts as a checkpoint that continuously monitors for threats to the protected cloud app. When iboss Adaptive Private Access adaptive identifies a threat, the platform cuts access immediately and automatically, with no human intervention, to prevent infections from spreading and corporate data from being stolen. The test results proved that iboss exceeded the requirements set forth by Miercom, blocking 99.7% of malware, and performed 26% higher in malware blocking effectiveness than the industry average of all platforms tested by Miercom to date.

“At iboss, we are hyper focused on creating technology that makes it easier for organizations to implement a complete Zero Trust Network Architecture to better protect organizations in this modern-day work from anywhere environment,” said Paul Martini, CEO and co-founder of iboss. “This result confirms our commitment to providing the most comprehensive security solution for organizations of all sizes.”

The report concluded that iboss Adaptive Private…

Source…

Early Learnings From Advanced Hack and How Zero Trust Can Help


Over the past year, there have been a number of successful ransomware attacks that have made online security a hot topic across the globe.

In fact, just recently it was reported that Advanced, a technology vendor that provides the architecture for services such as patient check-in and NHS 111, fell victim to a ransomware attack in August 2022. Whilst the investigation is still ongoing, Advanced predicts that it may take several months to get some of its services back online. Therefore, instead of focusing on patient care, doctors are having to manually process mounting piles of medical paperwork which is of course time consuming, arduous, and inefficient.

However, it appears that Advanced are taking the security lessons in their stride and looking to bounce back from this incident. According to a statement, Advanced said they were “rebuilding and restoring impacted systems in a separate and secure environment” by “implementing additional blocking rules and further restricting privileged accounts for Advanced staff” and “conducting 24/7 monitoring.” These are key principles of a Zero Trust Architecture. While Advanced probably had elements of Zero Trust beforehand, it is reassuring to see them reinforce this network architecture when faced with a paralysing ransomware attack. Here I explore how Zero Trust principles can be applied to organisations’ existing security architecture to prevent similar attacks and reduce risk.

HOW ZERO TRUST WORKS

Zero Trust is a network security model based on a philosophy that no user or device is trusted to access a resource until their identity and authorisation are verified. This process applies to those normally inside a private network, like an employee on a company computer working in the office, remotely from home or on their mobile device while at an offsite conference. It also applies to every person or device outside of the core network. It makes no difference if you have accessed the network before or how many times — your identity is not trusted until verified each time. The idea is that you should assume every machine, user, and server to be untrusted until proven otherwise.

While this may sound difficult to…

Source…

Zero trust security solutions for zero-day threats


Recently Microsoft released patches to six, zero-day threats.

A zero-day threat is any threat for which no known solution exists to block the threat using well-known anti-virus, anti-malware, anti-spyware or anti-ransomware solutions.

No software can ever be 100% secure. Its security has been tested against known threats or threat vectors. However, new threats occur daily and criminal actors are looking to exploit any weakness for financial gain. A hack is when an attacker gains unauthorized access to a system by attaining someone’s credentials or tricking them via a phishing or other attack.

An exploit is when an attack takes advantage of a weakness in the program. Imagine a building with millions of doors and windows. Now imagine if someone were to discover that one of the windows doesn’t have a lock and one could enter the building at any time. This example is exactly how a weakness is exploited and allows an attacker to enter a computer system. Of course, once the opening is discovered it is published on the internet and all the bad actors know about it until the software is repaired. These exploits are simply latent bugs waiting to be unearthed.

Fortunately, there are some measures a firm can take to limit exposure. The first line of defense is to patch all operating systems and programs to the most recent version no less than monthly. Next, update the firmware or operating system of all devices including firewalls, wireless access points, switches, routers and servers. After that, inquire with the firm’s IT service provider about application whitelisting, anti-tamper and ring-fencing technologies.

Typical security software works upon a known list of bad actors, suspicious IP addresses or patterns of attacks known as heuristics in attempt to thwart the attack. Unfortunately, the world is creating about 700,000 new viruses, worms, and other attacks per day, so the odds of blocking them all are not in one’s favor – since the attack only needs to be right once and IT security needs to be correct 100% of the time.

In a world where 100% security is not possible to achieve, application whitelisting works to close the gap by trusting only known programs and…

Source…