Collaborating Authors


Software Engineer III


We're on a mission to provide security teams with the intelligence they need to confront and stop advanced threats like supply chain attacks, zero day exploits, and ransomware attacks. Cyber attackers still have the advantage. Are you ready to help us reclaim the upper hand? Every day, banks, hospitals, government agencies, and entertainment companies rely on Extrahop's Reveal(x) a cloud-based machine learning cyber security platform to understand which users, devices and network activities they can trust. With this knowledge companies prevent fraud, data breaches, and can focus on building better user experiences, instead of worrying about security.

Securing automated and connected vehicles in the age of hyper-connectivity


The world is experiencing interesting times with connected devices redefining how human beings interact with the ecosystem. In this context, innovation in the automotive industry is particularly noteworthy, with connected vehicles becoming equipped for varying degrees of autonomous driving. Their popularity will only continue to grow in the near future with an expected market size of $469 billion (Rs 36,61,952 crore) in 2030. To deliver the expected quality of service, modern connected vehicles mostly rely on cloud-based architecture built on 5G technology. Vehicular communication is enabled by Vehicle-to-Everything (V2X) technologies such as Cellular Vehicle-to-Everything (C-V2X) and Dedicated Short-Range Communication (DSRC) based on the IEEE 802.11p system, which aggregate information across network drop points.

Three opportunities of Digital Transformation: AI, IoT and Blockchain


Koomey's law This law posits that the energy efficiency of computation doubles roughly every one-and-a-half years (see Figure 1–7). In other words, the energy necessary for the same amount of computation halves in that time span. To visualize the exponential impact this has, consider the face that a fully charged MacBook Air, when applying the energy efficiency of computation of 1992, would completely drain its battery in a mere 1.5 seconds. According to Koomey's law, the energy requirements for computation in embedded devices is shrinking to the point that harvesting the required energy from ambient sources like solar power and thermal energy should suffice to power the computation necessary in many applications. Metcalfe's law This law has nothing to do with chips, but all to do with connectivity. Formulated by Robert Metcalfe as he invented Ethernet, the law essentially states that the value of a network increases exponentially with regard to the number of its nodes (see Figure 1–8).

Difference Between Agent-Based and Network-Based Internal Vulnerability Scanning


For years, the two most popular methods for internal scanning: agent-based and network-based were considered to be about equal in value, each bringing its own strengths to bear. However, with remote working now the norm in most if not all workplaces, it feels a lot more like agent-based scanning is a must, while network-based scanning is an optional extra. This article will go in-depth on the strengths and weaknesses of each approach, but let's wind it back a second for those who aren't sure why they should even do internal scanning in the first place. While external vulnerability scanning can give a great overview of what you look like to a hacker, the information that can be gleaned without access to your systems can be limited. Some serious vulnerabilities can be discovered at this stage, so it's a must for many organizations, but that's not where hackers stop.

Report on Constellation Network (DAG)


Constellation is a distributed network that enables fast, scalable solutions for organizations who need to process and transfer data securely and build interoperability for connected sensors and devices. As computing moves increasingly to the edge, Constellation provides the only scalable, secure solution for a world with more connectivity, more centralization, and more concentrated risk. Constellation Network is a decentralized, open-source, and permissionless programming platform that allows anybody to create apps. Constellation also provides complete control over the tokenomic structure and incentives of apps. Constellation Network, on the other hand, is much more than a decentralized playground and toolbox.

Wazuh and Its XDR Approach


Today's cyber security technological evolution milestones in the context of effective detection and response are the endpoint detection and response (EDR), Manage Detection and Response (MDR), and Network Detection and Response (NDR). However, these all solutions are running independently and missing the correlated high level processed alert to which Extended Detection and Response (XDR) is a solution that emerged, rather than adding another tool, XDR aims to change this security landscape and enable a more compelling activity of the security stack. What problem does XDR solve? Attackers often target endpoints, but they also target other layers of the IT domain in the corporate network, such as email servers and cloud systems, and they may bounce between layers or hide in the interface between them to evade detection. XDR solves both problems at once.

An Emerging Threat: Attacking 5G Via Network Slices


San Francisco -- While 5G security is not new as a topic of conversation, emerging attack vectors continue to come to the fore. Deloitte & Touche researchers have uncovered a potential avenue of attack targeting network slices, a fundamental part of 5G's architecture. The stakes are high: Not just a faster 4G, next-generation 5G networks are expected to serve as the communications infrastructure for an array of mission-critical environments, such as public safety, military services, critical infrastructure, and the Industrial Internet of Things (IIoT). They also play a role in supporting latency-sensitive future applications like automated cars and telesurgery. A cyberattack on that infrastructure could have significant implications for public health and national security, and impact a range of commercial services for individual enterprises.

Cybersecurity Concepts, Types, and Jobs


Cybersecurity is the overall activity of protecting computers, networks, and data from malicious electronic attacks. It is an activity that compares to physical security, a more traditional security activity that controls access to buildings or other objects in the real world. While many high-tech physical security vendors have a combination of physical and cybersecurity in their org charts, cybersecurity is an activity that focuses on protecting assets from malicious logins and code, not on property intrusion or theft. Cybersecurity is a broad concept that encompasses several specific fields of activity. There are many classification methods. For example, there is Kaspersky Lab's classification system, and Mindcore has such a system.

How safe is YOUR smart device? Popular gadgets including Amazon Echo and Google Nest can be HACKED

Daily Mail - Science & tech

Smart home devices from companies such as Amazon and Google can be hacked and used to crash websites, steal data and snoop on users, an investigation reveals. Consumer group Which? has found poor security on eight smart devices, some of which are no longer supported with vital security updates due to their age. Examples include the first generation Amazon Echo smart speaker, released in 2014, and a Virgin Media internet router from 2017. All of the products had vulnerabilities that could leave users exposed to cybercriminals, Which? Domestic abuse survivors can also be tracked and controlled by ex-partners who exploit weak security on devices including Wi-Fi routers and security cameras.

How AI can keep the industrial lights shining


Sponsored Feature Internet connectivity has changed everything, including old-school industrial environments. It's a situation that's creating clear and present security concerns, and the industry needs new approaches to dealing with them. Industrial Internet of Things (IIoT) adoption is speeding ahead. Research from Inmarsat found that 77 per cent of organisations surveyed have fully deployed at least one IIoT project, with 41 per cent of them having done so between the second quarters of 2020 and 2021. The same research also warned that security was a primary concern for companies embarking on IIoT deployments, with 54 per cent of respondents complaining that it stopped them using their data effectively.