security architecture
Agile Orchestration at Will: An Entire Smart Service-Based Security Architecture Towards 6G
Duan, Zhuoran, Nan, Guoshun, Li, Rushan, Wang, Zijun, Xiong, Lihua, Yuan, Chaoying, Liu, Guorong, Xu, Hui, Cui, Qimei, Tao, Xiaofeng, Quek, Tony Q. S.
The upcoming 6G will fundamentally reshape mobile networks beyond communications, unlocking a multitude of applications that were once considered unimaginable. Meanwhile, security and resilience are especially highlighted in the 6G design principles. However, safeguarding 6G networks will be quite challenging due to various known and unknown threats from highly heterogeneous networks and diversified security requirements of distinct use cases, calling for a comprehensive re-design of security architecture. This motivates us to propose ES3A (Entire Smart Service-based Security Architecture), a novel security architecture for 6G networks. Specifically, we first discuss six high-level principles of our ES3A that include hierarchy, flexibility, scalability, resilience, endogeny, and trust and privacy. With these goals in mind, we then introduce three guidelines from a deployment perspective, envisioning our ES3A that offers service-based security, end-to-end protection, and smart security automation for 6G networks. Our architecture consists of three layers and three domains. It relies on a two-stage orchestration mechanism to tailor smart security strategies for customized protection in high-dynamic 6G networks, thereby addressing the aforementioned challenges. Finally, we prototype the proposed ES3A on a real-world radio system based on Software-Defined Radio (SDR). Experiments show the effectiveness of our ES3A. We also provide a case to show the superiority of our architecture.
Nigeria's fragile security architecture is collapsing
Earlier this month, attacks that took place within minutes of each other in different parts of Nigeria, and the apparent failure of the security forces to respond to them efficiently and in a timely manner, exposed how big of a threat lawlessness and impunity currently poses to the country and its people. Late on July 5, heavily armed men on motorcycles raided the Kuje Medium Security Custodial Centre on the outskirts of Abuja and released more than 900 inmates, including more than 60 Boko Haram members in detention. The Islamic State West Africa Province (ISWAP) – an offshoot of Boko Haram now allied with the ISIL (ISIS) group – claimed responsibility for the attack. Just hours before the Kuje incident, another group of heavily armed men had attacked a convoy carrying an advance security team for President Muhammadu Buhari in his home state of Katsina. A presidential spokesperson said the convoy carrying a team of security guards, as well as protocol and media officers, was on its way to Daura, Buhari's hometown, to prepare for a visit by him when the attack took place.
- Africa > Nigeria > Federal Capital Territory > Abuja (0.26)
- Africa > West Africa (0.25)
- Africa > Nigeria > Katsina State (0.05)
- Africa > Niger (0.05)
- Commercial Services & Supplies > Security & Alarm Services (1.00)
- Government > Military (0.71)
How Artificial Intelligence Will Help You Protect Your Client Data
The problem of cyber attack has been on the rise in the present-day digital economy. If you are conversant with the issues that have bedeviled businesses from gaining traction and achieving their objectives and goals, one of the big issues that has impeded the growth of businesses is cybercrime. Cybercrime is an act whereby unscrupulous individuals like internet fraudsters and data hackers have unflinching access to the database of a company without any restriction. If you operate a business in this digital age, there are ways that you can address the problem of data breaches regardless of the industry. Despite stringent norms, as well as high-powered government regulations that the government has put in place to discourage data theft, data protection is still a huge challenge for most businesses operating in the gig economy.
- Law (1.00)
- Information Technology > Security & Privacy (1.00)
Evolving your security architecture for increased agility and resiliency
When designing your cybersecurity defenses for the new normal, it's important to look beyond the technology. You'll need a true architecture-led approach, one that's driven by your business needs. The global pandemic has jolted many organizations into a new reality where virtual and remote become more important than physical and local. Security architectures deployed over decades have suddenly become irrelevant. Concurrent to this, organizations are looking inward and challenging themselves by asking, "How do I justify new investment in tight economic times? In fact, how do I justify an entirely new security architecture for this remote work reality?"
Why Intel believes confidential computing will boost AI and machine learning
Companies are collecting increasing amounts of data, a trend that is driving the development of better analytical tools and tougher security. Analysis and security are now converging as confidential computing prepares to deliver a critical boost to artificial intelligence. Intel has been investing heavily in confidential computing as a way to expand the amount and types of data companies will manage through cloud services. According to Intel Fellow Ron Perez, who works on security architecture with the Intel Data Center Group, the company believes the emerging security standard will allow enterprises and large organizations to explore new ways to share the data needed to fuel AI and machine learning. "We see this as a long-term effort," Perez said.
- North America > United States > Pennsylvania (0.05)
- Europe > United Kingdom (0.05)
- Europe > Germany (0.05)
- Asia > India (0.05)
- Information Technology > Security & Privacy (0.91)
- Information Technology > Services (0.70)
Council Post: The Importance Of Security Architecture And Attack Surface Analysis
Automation, cloud-based systems, internet-enabled devices, API-centric environments -- all of these things within software application development have paved the way for greater enterprise efficiency, productivity and innovation. But they have also opened up new avenues for cybercriminals to target private, sensitive information and compromise the systems that process it. Security pros and hackers tend to stay neck and neck in a race against each other. As new security innovations emerge, hackers crop up almost immediately, finding new ways to get around them. The only way for the good guys to pull ahead in the race is to shift their security and risk management approach from reactive to proactive.
FortiGuard Labs' Derek Manky Talks Swarm Attacks, War of Deception - SDxCentral
Swarm-based network attacks are still likely a couple years away, according to Derek Manky, chief of security insights and global threat alliances at FortiGuard Labs. But, especially as they start deploying 5G networks, enterprises should prepare for these types of attacks now. FortiGuard Labs is the global threat intelligence and research team at Fortinet. In a conversation at the recent RSA Conference, Manky explained the strategy behind swarm attacks -- one of the scarier emerging threats that he's been following for a few years. "And I do think this is on the horizon," he said.
Cisco want to boost Industrial IoT with the power of AI
Technology giant Cisco has unveiled a new Internet of Things (IoT) security architecture with the goal of protecting processes and increasing visibility in numerous industries. Aside from the obvious security benefits, increased visibility can also help executive make better, informed choices. The innovations within the IoT security architecture include Cisco Cyber Vision, which secures the industrial network environment, and Cisco Edge Intelligence, essentially data governance from edge to the multi-cloud. Cisco Cyber Vision is a solution for automated discovery of industrial assets. It analyses traffic from connected devices, creates segmentation policies to prevent hackers from moving laterally throughout the network and provides real-time monitoring of cybersecurity threats to assets. Cisco Edge Intelligence makes extracting data at the network edge simpler, as it streamlines data delivery to multi-cloud and on-premises destinations.
- Information Technology > Security & Privacy (1.00)
- Government > Military > Cyberwarfare (0.71)
Security Architecture for Smart Factories
Building smart factories is a substantial endeavor for organizations. The initial steps involve understanding what makes them unique and what new advantages they offer. However, a realistic view of smart factories also involves acknowledging the risks and threats that may arise in its converged virtual and physical environment. As with many systems that integrate with the industrial internet of things (IIoT), the convergence of information technology (IT) and operational technology (OT) in smart factories allows for capabilities such as real-time monitoring, interoperability, and virtualization. But this also means an expanded attack surface.
- Information Technology > Security & Privacy (1.00)
- Government > Military > Cyberwarfare (0.51)
Check Point Software Acquires ForceNock, a Web Application and API Protection startup - NASDAQ.com
SAN CARLOS, Calif., Jan. 14, 2019 (GLOBE NEWSWIRE) -- Check Point Software Technologies Ltd. (NASDAQ:CHKP), a leading provider of cyber security solutions globally, today announces it has acquired ForceNock Security Ltd. of Tel Aviv, Israel. Founded in 2017, ForceNock, developed a Web Application and API Protection (WAAP) technology which utilizes machine learning, behavioral and reputation-based security engines. Check Point plans to integrate ForceNock's technology into its Infinity total protection architecture. "Check Point is committed to providing the most comprehensive security architecture to prevent current and future generations of cyber attacks. The growing usage of platforms - Cloud, Network, Mobile, Endpoint and IoT - requires complete, simple to deploy and easy to use security technologies", said Dr. Dorit Dor, Check Point's VP Products. "Incorporating ForceNock's technology into our Infinity Architecture will enable us to continue to provide the highest level of security for our customers worldwide and strengthens our machine learning protection capabilities."
- Asia > Middle East > Israel > Tel Aviv District > Tel Aviv (0.29)
- North America > United States > California > San Mateo County > San Carlos (0.27)