Following the 3-pillar approach to effective security strategy
Large-scale data breaches are reported in the press almost daily, with devastating consequences for the organizations and individuals involved. A multi-layer security strategy minimizes cybersecurity risks for your organization and streamlines the compliance journey in the run-up to upcoming legislation.
By Paulina Gomez – Technology innovation – the continued evolution of cloud computing, the rapid increase in Internet of Things (IoT) and the growth of Artificial Intelligence (AI) – is expected to drive a 100x increase in connected devices and a 1,000x increase in data traffic by 2020 (2016 Mobility Report, November 2016, Ericsson). Each new device doesn’t just drive traffic, it also dramatically expands the network attack surface – increasing the opportunity of cybercriminals to leverage sophisticated methods to exploit these opportunities.
In response to the rapidly evolving cybersecurity threat landscape, regulations around the world are upping the pressure on organizations to protect their sensitive customer and operational data. The maximum fine for a data breach in the upcoming European General Data Protection Regulation (GDPR), for example, could be up to 4% of global revenues; enough to put even large organizations out of business.
How can an organization minimize its security risks? It’s about more than just encryption and firewalls. A comprehensive, multi-layer security strategy is vital to an effective defense.
By following these three key pillars to achieve the confidentiality, integrity, and availability of data in your network, you will be protecting your data, your customers, and your business. more>
Posted in Broadband, Business, Communication industry, Economic development, Economy, Education, How to, Net, Product, Science, Technology
Tagged Broadband, Business improvement, Ciena, Cybersecurity, Fiber optics, Internet, Technology
Virtualizing the World of Cable
By Wayne Hickey – When cable operators saw huge demands in linear video, Video-on-Demand (VoD) and high-speed data services, and faced with an aging analog infrastructure, they moved to a Converged Cable Access Platform (CCAP) to increase capacity and throughput. CCAP combines headend functions into a single architecture by combing Edge Quadrature Amplitude Modulation (EQAM) and Cable Modem Termination System (CMTS).
Back in June 2011, CableLabs created CCAP by blending two competing platforms, a Comcast-backed Converged Multiservice Access Platform (CMAP) and a Time Warner Cable Converged Edge Services Access Router (CESAR) platform. The following year CCAP products were introduced, and deployed the year after.
Fast forward to today, cable operators are looking to implement software-based access platforms, migrate away from commonly deployed centralized, purpose-built CCAP equipment, and virtualize CCAP (vCCAP) — and thus begin the shift to a Distributed Access Architecture (DAA). Developed by CableLabs, vCCAP is the latest cable technologies that combines functions including the CMTS and EQAM.
Virtualizing and distributing MAC and PHY functions enables digital combining, eliminates analog optics with cost effective 10G Ethernet transport, and converts analog fiber nodes to digital optic IP-enabled devices. DAA makes it easier to push fiber deeper into the edge of the network, and along with the ability to support denser wavelengths for each fiber, digital optics greatly improves Carrier-to-Noise-Ratio (CNR), which will enable higher orders of QAM on the coax and higher performance DOCSIS technologies. more> https://goo.gl/EoPwPL
Posted in Broadband, Communication industry, Economic development, Economy, Media, Net, Product, Technology, Telecom industry
Tagged Broadband, Ciena, Cybersecurity, Electronics, Internet, Net evolution, Technology
By Steve Ranger – At its core, cyberwarfare is the use of digital attacks by one country or nation to disrupt the computer systems of another with the aim of create significant damage, death or destruction.
Governments and intelligence agencies worry that digital attacks against vital infrastructure — like banking systems or power grids — will give attackers a way of bypassing a country’s traditional defenses.
And unlike standard military attacks, a cyberattack can be launched instantaneously from any distance, with little obvious evidence in the build-up, and it is often extremely hard to trace such an attack back to its originators. Modern economies, underpinned by computer networks that run everything from sanitation to food distribution and communications, are particularly vulnerable to such attacks, especially as these systems are in the main poorly designed and protected.
Attacks by individual hackers, or even groups of hackers, would not usually be considered to be cyberwarfare, unless they were being aided and directed by a state. more> https://goo.gl/U3S5Ds
Posted in Banking, Broadband, Business, Communication industry, Economy, Education, History, Leadership, Media, Net, Technology
Tagged Broadband, Business, Congress Watch, cyberattack, Cybersecurity, Government, Internet, Technology
By Mike Hearn – One of the issues (though not at all the only one) is how governments understand the term “cyber warfare”. This term has spread rapidly throughout government in the past 20 years. Presidents, Prime Ministers, generals and journalists all believe they understand what “cyber warfare” is, but they don’t and this lack of understanding leads to events like today’s.
The big problem is that cyber warfare is totally different to normal warfare, in fact it’s so different that calling it warfare at all is meaningless. In regular warfare you can build up your own defenses without improving your opponent’s defenses, and you can develop new weapons that your opponents will not have. This basic asymmetry is key to the very concept of war: the side with the better weapons, defenses and tactics should normally win.
But cyber warfare doesn’t work like that. Because everyone uses the same software infrastructure, and the “weapons” are nothing more than weaknesses in that global infrastructure, building up your own defenses by fixing problems inherently builds up your opponents defenses too. And developing new “weapons” is only possible if your opponents are able to develop the very same weapons for themselves, by exploiting the very same vulnerabilities in your country that you are exploiting in theirs.
Governments have huge problems understanding this fact because politicians tend to reflexively trust their own intelligence agencies, who deliberately obfuscate about it. more> https://goo.gl/t1YWuS
Posted in Broadband, Business, Communication industry, CONGRESS WATCH, Economy, Education, History, Leadership, Media, Net
Tagged Broadband, Congress Watch, Cybersecurity, Government, Internet, Leadership, Technology, United States
By Teri Takai – The big problem for many government agencies is that most of them still rely on declarative legacy roles, rubber-stamping certifications and manual processes to manage identities and roles — all of which expose them to continual and multiple access risks. External threat actors compromise identities to evade detection from existing defenses, while insiders work under the radar to access data for exfiltration.
To provide a robust defense and protect the identity-based perimeter, government agencies must consider new thinking and approaches.
The core issue is security leaders are not attacking the evolving security landscape through proactive planning and change management. Instead, they are stuck in a reactive mode.
It is not hard to understand why: the user profile is 24-7, global, instantaneous, and rich in consumer-driven IT. more> https://goo.gl/X59JUA
Posted in Broadband, Communication industry, Economy, Education, Leadership, Media, Net, Regulations, Technology
Tagged Broadband, Business improvement, Congress Watch, Cybersecurity, Government, Identity, Internet, Leadership, United States
Four-Stroke Engine Cycle Produces Hydrogen from Methane and Captures CO<sub2
By John Toon – When is an internal combustion engine not an internal combustion engine? When it’s been transformed into a modular reforming reactor that could make hydrogen available to power fuel cells wherever there’s a natural gas supply available.
By adding a catalyst, a hydrogen separating membrane and carbon dioxide sorbent to the century-old four-stroke engine cycle, researchers have demonstrated a laboratory-scale hydrogen reforming system that produces the green fuel at relatively low temperature in a process that can be scaled up or down to meet specific needs. The process could provide hydrogen at the point of use for residential fuel cells or neighborhood power plants, electricity and power production in natural-gas powered vehicles, fueling of municipal buses or other hydrogen-based vehicles, and supplementing intermittent renewable energy sources such as photovoltaics.
Known as the CO2/H2 Active Membrane Piston (CHAMP) reactor, the device operates at temperatures much lower than conventional steam reforming processes, consumes substantially less water and could also operate on other fuels such as methanol or bio-derived feedstock. It also captures and concentrates carbon dioxide emissions, a by-product that now lacks a secondary use – though that could change in the future.
Unlike conventional engines that run at thousands of revolutions per minute, the reactor operates at only a few cycles per minute – or more slowly – depending on the reactor scale and required rate of hydrogen production. And there are no spark plugs because there’s no fuel combusted. more> https://goo.gl/h4K7fV
- Likelihood of Dieting Success Lies Within Your Tweets, Ben Snedeker
- New Partnership to Advance Production Standards in Biomanufacturing, Josh Brown
- Simulated Ransomware Attack Shows Vulnerability of Industrial Controls, John Toon
- DNA “Barcoding” Allows Rapid Testing of Nanoparticles for Therapeutic Delivery, John Toon
- Size Matters for Marine Protected Areas Designed to Aid Coral, John Toon
- Cholera Bacteria Stab and Poison Enemies so Predictably, Ben Brumfield
- Looking for Entangled Atoms in a Bose-Einstein Condensate, John Toon
- Team Demonstrates Digital Health Platform for Department of Veterans Affairs, John Toon
- Eating in the blink of an eye, Jason Maderer
- Internet of Things Center Continues to Grow, Make Global Impact, Lance Wallace
- Weaver Wins JDRF Fellowship
- Trio of Petit Institute labs link tendon overuse injury to degenerative changes in shoulder cartilage, Jerry Grillo
- Liquid Assets, Erin Peterson
Posted in Broadband, Business, Communication industry, EARTH WATCH, Economic development, Economy, Education, Energy & emissions, Healthcare, Nature, Science, Technology
Tagged Broadband, Business improvement, Climate change, Cybersecurity, Georgia Tech, Health, Manufacturing, Physics, Technology