West
now browsing by tag
#deepweb | West Coast Fishery Rebounds
Source: National Cyber Security – Produced By Gregory Evans Groundfish is a catch-all term that refers to dozens of species that live or on, or near, the bottom of the Pacific off the West Coast. Trawling vessels drag weighted nets to scoop up as many fish as possible, but that can also damage critical rocky […] View full post on AmIHackerProof.com
#cybersecurity | hacker | Is 5G the security silver bullet for system integrators in the West?
Source: National Cyber Security – Produced By Gregory Evans
U.S. vs. China heavyweight
fight not ending soon
As we endure the ongoing U.S.
vs. China trade talks, it has become increasing clear that the U.S.
administration’s on-again off-again relationship with China is not going to
change. The U.S. is seeking a reset
in its relationship with China including better protections for American IP,
and Huawei has become a victim of this reset.
This ongoing instability has
resulted in having the Five Eyes’ (United States, Britain, Canada, New Zealand
and Australia) decision
not to use technology from Huawei in the “sensitive” parts of their telecoms
networks. The U.S. told allies not to
use Huawei for fear of Chinese spying through the back doors of the equipment.
The key to share shift is
5G
Now let’s look at the U.S. vs.
China spat through the lens of wireless system integrators. Ericsson and Nokia have long been dominant
players in world since 2G. Huawei made
significant share increases in APAC with LTE deployments and to a lesser extent
in Latin America, Africa and Eastern Europe.
Now LTE deployments (first national deployments begun in 2009) are
largely complete.
The networks are built, the vendors
are selected, and their services are up and running. Global market share is set, for now. Now enter the 5G major deployments for 2020. New 5G vendors are performing acceptance
testing on initial deployments imminently at this very moment, and this represents
the biggest chance in 10 years for any of the major vendors (Ericsson, Nokia,
Huawei, Samsung, Cisco) to gain share.
Enterprise fears and China
leers
Once we accept that Huawei’s position
in the cross hairs of the U. S. administration isn’t changing, there are two
aspects we must consider. First, though
Huawei’s executives have made multiple statements saying there are no back
doors to their equipment, two Chinese laws- the 2017 National Intelligence Law
and the 2014 Counter Espionage Law -remain very problematic for the
company. Some of the most troubling language is
content like Article 22 which states:
“When the state security organ investigates and understands
the situation of espionage and collects relevant evidence, the relevant organizations
and individuals shall provide it truthfully and may not refuse.”
Legal experts
have interpreted this as a legal basis upon which the Chinese government could
compel any Chinese company including Huawei to share any and all customer data from equipment deployed both inside China
and throughout the rest of the world.
With the understanding that
Huawei may have a legal obligation to share customer data with the intelligence
wing of the Chinese government, non-Chinese vendors gain a distinct advantage. Because enterprises believe they can be and
are being penetrated (Radware research
found that 67% of C-Suite executives believe their networks can be penetrated
by hackers). Cisco, Nokia, Ericsson and
others can differentiate themselves by developing a superior security offering. And they can make a statement to Service
Providers that Huawei never can: “We will never share any customer data with
any foreign governments and have ZERO legal obligation to do so.”
Once Cisco, Ericsson, Nokia
and others embrace this statement, Service Providers will clearly understand they
can build superior, high quality, agile security services with Western vendors.
Thousands of security
instances, when and where you need them
As Service Providers build
out their new 5G core networks, many will build out thousands of Mobile Edge
Compute (MEC) nodes across the network.
These MECs give the Service Providers a service edge that is geographically
very close to tens of thousands of enterprises, and that sees all the
applications flowing in and out of the enterprise. This becomes an ideal point to insert a
security instance at the network, or application layer (or both) to inspect
traffic in real-time as it enters and exits the enterprise. When the security instance sees any anomaly,
it can signal to the orchestration layer to spin up an enforcement instance to
clean the traffic and block the offending IP address (or whatever action is
required by the pre-programmed security policy).
In addition, the MEC nodes
are effectively distributed private cloud instances. As such, they enable Service Providers to
deploy this highly valuable security service as a completely software-based
cloud solution. This results in a
significantly lower cost service with new business models in which enterprises could
pay for a monitoring only service that increases to an additional enforcement
service just for the actual minutes spent thwarting an attack. This opens new avenues for revenue to
businesses that see themselves as vulnerable, but can only afford a small
amount per month to monitor their applications.
Increase growth 30X? Yes
please
Managed Security Services are
going through a period of explosive growth.
For example, Akamai saw 29%
growth YoY in its most recent quarter.
In an environment where large
Service Providers are growing
overall revenues in the low single digits, a high value, high margin service
growing almost 30X faster than the overall company is very attractive.
Cisco, Ericsson, Nokia and
other non-Chinese vendors have a unique opportunity to lead with security in
their 5G MEC applications. This will
enable them to differentiate against Huawei with the superiority of their
offerings and the ability to provide peace of mind from foreign government
hacking that clouds Huawei networks. It
truly is a great opportunity for Western network equipment vendors to:
- Gain 5G share
- Help Service Providers
build a superior high value security service - Differentiate
themselves as the pro security, pro privacy vendors for Service providers in an
environment where most enterprises see themselves as vulnerable.
The post #cybersecurity | hacker | Is 5G the security silver bullet for system integrators in the West? appeared first on National Cyber Security.
View full post on National Cyber Security
#nationalcybersecuritymonth | GLACY+: Inter-Ministerial Round Table on cyber security and cybercrime in West Africa, Ghana an ECOWAS best practice
Source: National Cyber Security – Produced By Gregory Evans
An Inter-Ministerial Round Table on cyber security and cybercrime in West Africa was held in Accra, Ghana, as high-level event of the Climax Week of the National Cyber Security Awareness Month. The meeting gathered together Ministers, diplomats and other dignitaries of countries from the ECOWAS Region, including Ministers from Ghana, Guinea Bissau, Liberia, Niger, Sierra Leone. The meeting was chaired by the Minister for Communication of Ghana, co-chaired by ECOWAS and the Council of Europe, and attended by additional participants coming from Embassies of Burkina Faso Togo and Benin, Ministry of Communications of Nigeria, U.S. Department of State, UK High Commission.
A declaration was prepared in the end of the meeting, reporting the main take aways of the day, and will be formally submitted by the Ghanaian government to the next gathering of the ECOWAS Technical Committee.
During the meeting, ECOWAS Commission endorsed Ghana as the champion in the region on cyber security and cybercrime matters, requesting the country to act as “ambassador” in the field and share best practices with neighboring countries.
The post #nationalcybersecuritymonth | GLACY+: Inter-Ministerial Round Table on cyber security and cybercrime in West Africa, Ghana an ECOWAS best practice appeared first on National Cyber Security.
View full post on National Cyber Security
West African Cyber Security Summit (WACSS)
Source: National Cyber Security News

General Cybersecurity Conference
March 20 – 21, 2018 | Lagos, Nigeria
Cybersecurity Conference Description
The West African Cyber Security Summit is a one-day conference co-located alongside Securex West Africa 2017. See key industry experts take to the stage as they host specialist sessions and panel discussions around the West African cybersecurity industry.
2017’s event brought together over 80 senior members and stakeholders from the private and public sector to learn about important developments, key trends, cutting-edge technology and discuss the latest risks and threats facing the future of the industry.
Speakers included leading experts from prominent cybersecurity firms and government agencies such as KPMG, the Economic and Financial Crimes Commission, Ernst & Young, G3, CSEAN, Interpol and more.
View full post on National Cyber Security Ventures
Cybersecurity Connect West
Source: National Cyber Security – Produced By Gregory Evans
General Cybersecurity Conference
March 8, 2018 | Calgary, Canada
Cybersecurity Conference Description
An Invitation-Only Summit for Heads of Cyber Security
Cyber Security Summit West was designed in collaboration with leading cyber security experts and is a peer-to-peer discussion to ensure your network and organization are resilient in a time of increased and sophisticated cyber-attacks.
The post Cybersecurity Connect West appeared first on National Cyber Security Ventures.
View full post on National Cyber Security Ventures
West Valley man faces 31 charges in alleged identity theft, forgery sprees
A West Valley man faces 31 federal charges in connection with alleged forgery and identity theft crime sprees in Salt Lake County in 2013 and 2015. Prosecutors say Kevin Russell Humphreys, 35, stole mail, identifications and checks, and then forged the checks for various amounts before cashing them in the names of people whose identities […]
View full post on AmIHackerProof.com | Can You Be Hacked?
SANS Security West 2016
Cybersecurity Training in San Diego, California
Take Cybersecurity training in San Diego from SANS Institute, the global leader in information security training. At SANS Security West 2016 + Emerging Trends, we offer more than 20 hands-on, immersion-style security training courses taught by real-world practitioners and interactive bonus sessions, led by a star-studded panel, on Emerging Trends in cybersecurity.
Event Schedule
Two-day courses: Begin on Friday, April 29th.
Five-day courses: Begin on Monday, May 2nd.
Six-day courses: Begin on Sunday, May 1st.
View the complete schedule, which includes all Courses, Bonus Sessions, and NetWars Tournaments. For a printable schedule, download the Security West event brochure.
With cyber-attacks and data breaches on the rise, attacks becoming more frequent, sophisticated and more costly the gap in the ability to defend has become wider and more time sensitive. Now is the perfect time to take the next step in your career. Cybersecurity is more vital, crucial, and important to the growth of your organization than ever before. Join us at SecWest to gain the skills and knowledge to help your organization succeed.
The line-up of cybersecurity courses below, covers IT security, digital forensics, ethical hacking, penetration testing, software security, and security courses for legal and management personnel. In addition to these security courses, the Emerging Trends discussions will provide the insight necessary to stay ahead of the latest cybersecurity threats and keep your organization secure.
The site of SANS Security West 2016, May 1-6, 2016, is the Manchester Grand Hyatt Hotel in San Diego, located where the culture and beauty of the sun sparkling off the San Diego Bay is right outside your door. At SANS Security West, you have the opportunity to advance your information security skill set, learn to prepare your organization for the future, and enjoy the fun and sun of San Diego
Source:http://www.sans.org/event/sans-security-west-2016?utm_medium=Referral&utm_source=Concise+Courses&utm_content=FEL_SecW16_Concise&utm_campaign=SANS+Security+West+2016
The post SANS Security West 2016 appeared first on AmIHackerProof.com.
View full post on AmIHackerProof.com | Can You Be Hacked?
North West And Penelope Disick Prove You’re Never Too Young For Hair Extensions
If you’re a member of the Kardashian family, you know there’s nothing more important than a good glam team.
North West, 2, and Penelope Disick, 3, clearly already have a better hair and makeup crew than most, as the two little gals have been rocking what look like extensions for a little while.
It appears Khloe Kardashian might have something to do with P’s hair, since she Instagrammed a photo of the two twinning a few days ago with the caption, “I made her my mini me!!”
ISIS to unleash TENS OF MILLIONS of jihadi hackers on West in blitz worse than NUCLEAR WAR
Source: National Cyber Security – Produced By Gregory Evans
The computer security expert, who invented the McAfee anti-virus software, claimed “fifteen to 25 percent” of the world’s 1.6 billion Muslims are extremists, meaning ISIS could have an army of 400 million fanatical followers ready to strike at any minute. Computer boffins at the terrorists’ headquarters in Raqqa have developed a secret smartphone application designed to spread Islamist propaganda and help followers carry out terrorist attacks from the comfort of their own homes. A team which may have included British hacker Junaid Hussain invented a feature which allows even the most computer illiterate of jihadis to launch sophisticated Distributed Denial of Service (DDoS) attacks against websites. DDoS attacks work by flooding a site with fake traffic, causing it to grind to a halt, and have been successfully used against some of the world’s biggest companies and government departments. Experts now believe that ISIS hackers carried out a major test of the app’s capabilities last week by launching an audacious attempt to bring down the 13 root servers which keep the Internet running worldwide. Whilst the attack ultimately failed, it did temporarily slow down services across the globe and has been described as an unprecedented attempt to strike at the heart […]
For more information go to http://www.NationalCyberSecurity.com, http://www. GregoryDEvans.com, http://www.LocatePC.net or http://AmIHackerProof.com
The post ISIS to unleash TENS OF MILLIONS of jihadi hackers on West in blitz worse than NUCLEAR WAR appeared first on National Cyber Security.
View full post on National Cyber Security