Telekom Malaysia is the second largest telecommunications provider in South Asia. They had issues with data being stolen, resulting in bribery and manipulated contracts. They implemented a solution using Safetica software to monitor and control access to sensitive documents at their new secure Telekom Malaysia Tender Evaluation Centre location, without requiring expensive hardware. This helped substantially lower their costs from data loss by encrypting any flash drive rather than requiring expensive secure drives. Both Safetica and their partner Iconic Innovations were able to prove they could compete against larger established security vendors.
How the Emerging IoT will Prompt Asset Management Issues - IAITAM Spring ACE ...John Boruvka
As companies leverage the Internet of Things (IoT), the Software Asset Management (SAM) function will be forced to rethink its charter. This presentation, given by Iron Mountain's John Boruvka at IAITAM's Spring ACE 2018 conference, explores how professionals within the SAM function need to start thinking about the IoT, and how they can prepare to manage the asset management challenges it presents, along with its benefits.
To read the accompanying article, visit: https://www.linkedin.com/pulse/how-emerging-iot-prompt-asset-management-issues-john-boruvka/
Introduction to ENT (Entity Network Translation)ENT Technologies
Want to eliminate hacks of critical infrastructure, vehicles and military systems? Do you think patients should exclusively own and control access to their medical records? Want to eliminate counterfeiting on digital and physical goods? Want to be able to exclusively own, sell, transfer, buy or lease your data and digital assets like physical property?
ENT makes all these things possible - TODAY.
ENT (Entity Network Translation) is a fully decentralized, next-generation trust infrastructure that replaces passwords, PKI, blockchain, and centralized data stores. ENT is a radical innovation in core enabling trust technology & networked systems.
+ Trusted micro-networking between entities of any kind: humans, devices, data and files, software processes, physical objects, concepts like corporations and currencies, and groups of any/all of these;
+ Exponentially increases security and privacy because entities are individually protected and connected directly without any middleman or central management;
+ Built on a patent-pending fundamental advancement in asymmetric key models called Relational Key Infrastructure (RKI) that eliminates central authorities and key management - the first key infrastructure innovation in 30 years;
+ Fully decentralized and owner-driven;
+ Useful for any purpose: Internet of Things, government, healthcare, finance, manufacturing, retail, etc;
+ Useful in any environment: scales from embedded components up to complex global systems;
+ Open standard for transparent governance, high usability across industries and wide adoption.
A History of IIoT Cyber-Attacks & Checklist for Implementing Security [Infogr...GlobalSign
The Industrial Internet of Things, or Industry 4.0, is improving operational efficiencies for global industrial systems on a scale never seen before. The IIoT holds great potential for improved communications, productivity, quality control, supply chain efficiencies and overall business operations. With this broader connectivity, comes new attack vectors, vulnerabilities and opportunities for hackers. We have created this infographic to show some of the top cyber-attacks in the industrial sector and how they could have been prevented. Now is the time to take our advice and prevent an attack on your business.
Read More: https://www.globalsign.com/en/blog/industrial-internet-of-things-cyber-attacks-infographic/
5th Meetup - Ethereum & IoT: examples, opportunities and IBM initiativeAlexander Hirner
IoT must shift from proprietary to decentralized and open but secure for a triple win: hardware manufacturers, consumers and system developers. The reasons why Ethereum is a suitable enabler and testbed for protocol extensions in the IoT space are explained with some examples. Privacy and security provide a common topic to other IoT developments.
Blockchain and Artificial Intelligence are two of the hottest technology trends right now. Even though the two technologies have highly different developing parties and applications, researchers have been discussing and exploring their combination. With both these technologies able to effect and enact upon data in different ways, their coming together makes sense, and it can take the exploitation of data to new levels. At the same time, the integration of machine learning and AI into blockchain, and vice versa, can enhance blockchain’s underlying architecture and boost AI’s potential.
Ethereum: A decentralized software platform for people and thingsAlexander Hirner
Blockchain 2.0 technologies promise to be the new layer for federated and accountable networks. At the Global IoT day 2015, I presented the motivation for decentralized but data-based business models and where / where not Ethereum fits into this picture.
Video: https://youtu.be/EGrFZuTrVKg?t=39s
How the Emerging IoT will Prompt Asset Management Issues - IAITAM Spring ACE ...John Boruvka
As companies leverage the Internet of Things (IoT), the Software Asset Management (SAM) function will be forced to rethink its charter. This presentation, given by Iron Mountain's John Boruvka at IAITAM's Spring ACE 2018 conference, explores how professionals within the SAM function need to start thinking about the IoT, and how they can prepare to manage the asset management challenges it presents, along with its benefits.
To read the accompanying article, visit: https://www.linkedin.com/pulse/how-emerging-iot-prompt-asset-management-issues-john-boruvka/
Introduction to ENT (Entity Network Translation)ENT Technologies
Want to eliminate hacks of critical infrastructure, vehicles and military systems? Do you think patients should exclusively own and control access to their medical records? Want to eliminate counterfeiting on digital and physical goods? Want to be able to exclusively own, sell, transfer, buy or lease your data and digital assets like physical property?
ENT makes all these things possible - TODAY.
ENT (Entity Network Translation) is a fully decentralized, next-generation trust infrastructure that replaces passwords, PKI, blockchain, and centralized data stores. ENT is a radical innovation in core enabling trust technology & networked systems.
+ Trusted micro-networking between entities of any kind: humans, devices, data and files, software processes, physical objects, concepts like corporations and currencies, and groups of any/all of these;
+ Exponentially increases security and privacy because entities are individually protected and connected directly without any middleman or central management;
+ Built on a patent-pending fundamental advancement in asymmetric key models called Relational Key Infrastructure (RKI) that eliminates central authorities and key management - the first key infrastructure innovation in 30 years;
+ Fully decentralized and owner-driven;
+ Useful for any purpose: Internet of Things, government, healthcare, finance, manufacturing, retail, etc;
+ Useful in any environment: scales from embedded components up to complex global systems;
+ Open standard for transparent governance, high usability across industries and wide adoption.
A History of IIoT Cyber-Attacks & Checklist for Implementing Security [Infogr...GlobalSign
The Industrial Internet of Things, or Industry 4.0, is improving operational efficiencies for global industrial systems on a scale never seen before. The IIoT holds great potential for improved communications, productivity, quality control, supply chain efficiencies and overall business operations. With this broader connectivity, comes new attack vectors, vulnerabilities and opportunities for hackers. We have created this infographic to show some of the top cyber-attacks in the industrial sector and how they could have been prevented. Now is the time to take our advice and prevent an attack on your business.
Read More: https://www.globalsign.com/en/blog/industrial-internet-of-things-cyber-attacks-infographic/
5th Meetup - Ethereum & IoT: examples, opportunities and IBM initiativeAlexander Hirner
IoT must shift from proprietary to decentralized and open but secure for a triple win: hardware manufacturers, consumers and system developers. The reasons why Ethereum is a suitable enabler and testbed for protocol extensions in the IoT space are explained with some examples. Privacy and security provide a common topic to other IoT developments.
Blockchain and Artificial Intelligence are two of the hottest technology trends right now. Even though the two technologies have highly different developing parties and applications, researchers have been discussing and exploring their combination. With both these technologies able to effect and enact upon data in different ways, their coming together makes sense, and it can take the exploitation of data to new levels. At the same time, the integration of machine learning and AI into blockchain, and vice versa, can enhance blockchain’s underlying architecture and boost AI’s potential.
Ethereum: A decentralized software platform for people and thingsAlexander Hirner
Blockchain 2.0 technologies promise to be the new layer for federated and accountable networks. At the Global IoT day 2015, I presented the motivation for decentralized but data-based business models and where / where not Ethereum fits into this picture.
Video: https://youtu.be/EGrFZuTrVKg?t=39s
Proven Practices to Protect Critical Data - DarkReading VTS DeckNetIQ
NetIQ was a Platinum sponsor for “Plugging the Leaks: Finding and Fixing the IT Security Holes in Your Enterprise,” a virtual trade show (VTS) produced by Information Week Magazine and Dark Reading.
This was our presentation deck: "Proven Practices to Protect Critical Data" presented by Matt Mosley, Senior Product Manager, and Matt Ulery, Director of Product Management during a live presentation. They explored some of the most significant problems facing security teams tasked with protecting critical data. And, they will reveal some of the most effective approaches and technology that can be used to quickly identify real threats.
With the new interconnected age comes new risks for cyber attacks and other fraudulent activity. Do you know what you need to keep your end users protected? Digital Insight discusses security and compliance in the interconnected age.
The world we live in right now is getting more and more digital. All possible things we were reading in sci-fi books or watching in fantasy movies are becoming a reality. Internet of things, drones, e-world, mobility, applications, cloud, digital prototyping, e-voting, quantum computing, 3D printing like in Terminator movies and much more is a reality. On average auditory of this room can agree that it is ok to say that we live in the future. As what has happened to technology for personal use and business in last 25 years is impressive. And we can experience that. We are unique generation and live in unique times.
The digital world gives huge opportunities to any business entering it. There are soon close to 4 billion of potential customers out there in 2015 that are. Digital world introduces new products every day and technology creators are extremely working on to get new products to market as soon as possible.
But like in every book, movie, story, historical reality when there are good forces also there are bad forces. Cyber crime is growing and various things are happening everywhere. New technologies also introduce new risks and those risks are with different configuration. Countries attack countries and we call that a cyber wars, citizens are attacking countries and we call that hacktivism, professionals are attacking everyone for financial gains and we call that organized digital crime. And the methods are getting more and more sophisticated so in the end doesn’t matter how great are technologies of defense every day we have new articles of new indicents, data breeches, companies who have huge financial loses and damages of reputation, lost marketplace, stock market positions, customers, employees or even lives. I won’t touch each different method of attacks but I will simply try to share how we as a system integrator of complex cyber security protection technology solutions look at things and protect our customers.
Beyond the hype and the media-fueled apocalyptic scenarios, let's analyze what A.I really
means for the future of the industrial world.
I'll demystify what’s beyond the buzzwords of the moment, and have a close look at A.I,
Blockchain and IoT, illustrated with some real-world use-cases.
I'll finally propose a few scenarios where these three technologies could converge into the 3rd era of the Internet.
Welcome to the world of Internet of Things wherein a glut of devices are connected to the internet which emanates massive amounts of data. But we have many hoops to jump before we can claim that crown starting with a huge number of devices lacking unified platform with serious issues of security standards threating the very progress of IoT.
Fog computing security and privacy issues, open challenges, and blockchain so...IJECEIAES
Due to the expansion growth of the IoT devices, Fog computing was proposed to enhance the low latency IoT applications and meet the distribution nature of these devices. However, Fog computing was criticized for several privacy and security vulnerabilities. This paper aims to identify and discuss the security challenges for Fog computing. It also discusses blockchain technology as a complementary mechanism associated with Fog computing to mitigate the impact of these issues. The findings of this paper reveal that blockchain can meet the privacy and security requirements of fog computing; however, there are several limitations of blockchain that should be further investigated in the context of Fog computing.
Safeguarding customer and financial data in analytics and machine learningUlf Mattsson
Digital Transformation and the opportunities to use data in Analytics and Machine Learning are growing exponentially, but so too are the business and financial risks in Data Privacy. The increasing number of privacy incidents and data breaches are destroying brands and customer trust, and we will discuss how business prioritization can be benefit from a finance-based data risk assessment (FinDRA).
More than 60 countries have introduced privacy laws and by 2023, 65% of the world’s population will have its personal information covered under modern privacy regulations. We will discuss use cases in financial services that are finding a balance between new technology impact, regulatory compliance, and commercial business opportunity. Several privacy-preserving and privacy-enhanced techniques can provide practical security for data in use and data sharing, but none universally cover all use cases. We will discuss what tools can we use mitigate business risks caused by security threats, data residency and privacy issues. We will discuss how technologies like pseudonymization, anonymization, tokenization, encryption, masking and privacy preservation in analytics and business intelligence are used in Analytics and Machine Learning.
Organizations are increasingly concerned about data security in processing personal information in external environments, such as the cloud; and information sharing. Data is spreading across hybrid IT infrastructure on-premises and multi-cloud services and we will discuss how to enforce consistent and holistic data security and privacy policies. Increasing numbers of data security, privacy and identity access management products are in use, but they do not integrate, do not share common policies, and we will discuss use cases in financial services of different techniques to protect and manage data security and privacy.
ITCamp 2018 - Cristiana Fernbach - GDPR compliance in the industry 4.0ITCamp
The session will address GDPR compliance challenges in the context of industry 4.0 and will offer a deeper look into the convergence of data privacy with the digitalisation movement, where Big Data, IoT, AI and Cloud services are all depending on one thing: DATA.
Emerging application and data protection for multi cloudUlf Mattsson
Emerging Application and Data Protection for Multi-Cloud
Personal data privacy will be the most prominent issue affecting how businesses gather, store, process, and disclose data in public cloud. Businesses have been inundated with information on what recent privacy laws like GDPR and CCPA require, but many are still trying to figure out how to comply with them on a practical level. Many companies are focusing on data privacy from the legal and security side, which are foundational, but are missing the focus on data. The good news is that these data privacy regulations compel businesses to get a handle on personal data - how they get it, where they get it from, which systems process it, where it goes internally and externally, etc. In other words, the new norms of data privacy require proactive data management, which enables organizations to extract real business value from their data, improve the customer experience, streamline internal processes, and better understand their customers. The new Verizon Data Breach Investigations Report (DBIR) provides perspectives on how Criminals simply shift their focus and adapt their tactics to locate and steal the data they find to be of most value. This session will discuss Emerging Application and Data Protection for Multi-cloud and review Differential privacy, Tokenization, Homomorphic encryption, and Privacy-preserving computation.
The following list of predictions (Figure 1) explores the state of IoT in 2019 and covering IoT impact on many aspects business and technology including Digital Transformation, Blockchain, AI, and 5G.
Practical risk management for the multi cloudUlf Mattsson
This session will take a practical approach to IT risk management and discuss multi cloud, Verizon Data Breach Investigations Report (DBIR) and how Enterprises are losing ground in the fight against persistent cyber-attacks. We simply cannot catch the bad guys until it is too late. This picture is not improving. Verizon reports concluded that less than 14% of breaches are detected by internal monitoring tools.
We will review the JP Morgan Chase data breach were hackers were in the bank’s network for months undetected. Network configuration errors are inevitable, even at the largest banks as Capital One that recently had a data breach where a hacker gained access to 100 million credit card applications and accounts.
Viewers will also learn about:
- Macro trends in Cloud security and Micro trends in Cloud security
- Risks from Quantum Computing and when we should move to alternate forms of encryption
- Review “Kill Chains” from Lockhead Martin in relation to APT and DDoS Attacks
- Risk Management methods from ISACA and other organizations
Speaker: Ulf Mattsson, Head of Innovation, TokenEx
Presentation during my study at UniKL BMI.
Lecturer: Sir. Roy [https://www.facebook.com/azroy.arman]
Thank you Sir, you are so dedicated and caring lecturer ever.
TM as a Malaysia number 1 Information Communication Technologies provider. We have provide the Internet services, Communication Services, Web Hosting, and other Business Solution Packages.
Proven Practices to Protect Critical Data - DarkReading VTS DeckNetIQ
NetIQ was a Platinum sponsor for “Plugging the Leaks: Finding and Fixing the IT Security Holes in Your Enterprise,” a virtual trade show (VTS) produced by Information Week Magazine and Dark Reading.
This was our presentation deck: "Proven Practices to Protect Critical Data" presented by Matt Mosley, Senior Product Manager, and Matt Ulery, Director of Product Management during a live presentation. They explored some of the most significant problems facing security teams tasked with protecting critical data. And, they will reveal some of the most effective approaches and technology that can be used to quickly identify real threats.
With the new interconnected age comes new risks for cyber attacks and other fraudulent activity. Do you know what you need to keep your end users protected? Digital Insight discusses security and compliance in the interconnected age.
The world we live in right now is getting more and more digital. All possible things we were reading in sci-fi books or watching in fantasy movies are becoming a reality. Internet of things, drones, e-world, mobility, applications, cloud, digital prototyping, e-voting, quantum computing, 3D printing like in Terminator movies and much more is a reality. On average auditory of this room can agree that it is ok to say that we live in the future. As what has happened to technology for personal use and business in last 25 years is impressive. And we can experience that. We are unique generation and live in unique times.
The digital world gives huge opportunities to any business entering it. There are soon close to 4 billion of potential customers out there in 2015 that are. Digital world introduces new products every day and technology creators are extremely working on to get new products to market as soon as possible.
But like in every book, movie, story, historical reality when there are good forces also there are bad forces. Cyber crime is growing and various things are happening everywhere. New technologies also introduce new risks and those risks are with different configuration. Countries attack countries and we call that a cyber wars, citizens are attacking countries and we call that hacktivism, professionals are attacking everyone for financial gains and we call that organized digital crime. And the methods are getting more and more sophisticated so in the end doesn’t matter how great are technologies of defense every day we have new articles of new indicents, data breeches, companies who have huge financial loses and damages of reputation, lost marketplace, stock market positions, customers, employees or even lives. I won’t touch each different method of attacks but I will simply try to share how we as a system integrator of complex cyber security protection technology solutions look at things and protect our customers.
Beyond the hype and the media-fueled apocalyptic scenarios, let's analyze what A.I really
means for the future of the industrial world.
I'll demystify what’s beyond the buzzwords of the moment, and have a close look at A.I,
Blockchain and IoT, illustrated with some real-world use-cases.
I'll finally propose a few scenarios where these three technologies could converge into the 3rd era of the Internet.
Welcome to the world of Internet of Things wherein a glut of devices are connected to the internet which emanates massive amounts of data. But we have many hoops to jump before we can claim that crown starting with a huge number of devices lacking unified platform with serious issues of security standards threating the very progress of IoT.
Fog computing security and privacy issues, open challenges, and blockchain so...IJECEIAES
Due to the expansion growth of the IoT devices, Fog computing was proposed to enhance the low latency IoT applications and meet the distribution nature of these devices. However, Fog computing was criticized for several privacy and security vulnerabilities. This paper aims to identify and discuss the security challenges for Fog computing. It also discusses blockchain technology as a complementary mechanism associated with Fog computing to mitigate the impact of these issues. The findings of this paper reveal that blockchain can meet the privacy and security requirements of fog computing; however, there are several limitations of blockchain that should be further investigated in the context of Fog computing.
Safeguarding customer and financial data in analytics and machine learningUlf Mattsson
Digital Transformation and the opportunities to use data in Analytics and Machine Learning are growing exponentially, but so too are the business and financial risks in Data Privacy. The increasing number of privacy incidents and data breaches are destroying brands and customer trust, and we will discuss how business prioritization can be benefit from a finance-based data risk assessment (FinDRA).
More than 60 countries have introduced privacy laws and by 2023, 65% of the world’s population will have its personal information covered under modern privacy regulations. We will discuss use cases in financial services that are finding a balance between new technology impact, regulatory compliance, and commercial business opportunity. Several privacy-preserving and privacy-enhanced techniques can provide practical security for data in use and data sharing, but none universally cover all use cases. We will discuss what tools can we use mitigate business risks caused by security threats, data residency and privacy issues. We will discuss how technologies like pseudonymization, anonymization, tokenization, encryption, masking and privacy preservation in analytics and business intelligence are used in Analytics and Machine Learning.
Organizations are increasingly concerned about data security in processing personal information in external environments, such as the cloud; and information sharing. Data is spreading across hybrid IT infrastructure on-premises and multi-cloud services and we will discuss how to enforce consistent and holistic data security and privacy policies. Increasing numbers of data security, privacy and identity access management products are in use, but they do not integrate, do not share common policies, and we will discuss use cases in financial services of different techniques to protect and manage data security and privacy.
ITCamp 2018 - Cristiana Fernbach - GDPR compliance in the industry 4.0ITCamp
The session will address GDPR compliance challenges in the context of industry 4.0 and will offer a deeper look into the convergence of data privacy with the digitalisation movement, where Big Data, IoT, AI and Cloud services are all depending on one thing: DATA.
Emerging application and data protection for multi cloudUlf Mattsson
Emerging Application and Data Protection for Multi-Cloud
Personal data privacy will be the most prominent issue affecting how businesses gather, store, process, and disclose data in public cloud. Businesses have been inundated with information on what recent privacy laws like GDPR and CCPA require, but many are still trying to figure out how to comply with them on a practical level. Many companies are focusing on data privacy from the legal and security side, which are foundational, but are missing the focus on data. The good news is that these data privacy regulations compel businesses to get a handle on personal data - how they get it, where they get it from, which systems process it, where it goes internally and externally, etc. In other words, the new norms of data privacy require proactive data management, which enables organizations to extract real business value from their data, improve the customer experience, streamline internal processes, and better understand their customers. The new Verizon Data Breach Investigations Report (DBIR) provides perspectives on how Criminals simply shift their focus and adapt their tactics to locate and steal the data they find to be of most value. This session will discuss Emerging Application and Data Protection for Multi-cloud and review Differential privacy, Tokenization, Homomorphic encryption, and Privacy-preserving computation.
The following list of predictions (Figure 1) explores the state of IoT in 2019 and covering IoT impact on many aspects business and technology including Digital Transformation, Blockchain, AI, and 5G.
Practical risk management for the multi cloudUlf Mattsson
This session will take a practical approach to IT risk management and discuss multi cloud, Verizon Data Breach Investigations Report (DBIR) and how Enterprises are losing ground in the fight against persistent cyber-attacks. We simply cannot catch the bad guys until it is too late. This picture is not improving. Verizon reports concluded that less than 14% of breaches are detected by internal monitoring tools.
We will review the JP Morgan Chase data breach were hackers were in the bank’s network for months undetected. Network configuration errors are inevitable, even at the largest banks as Capital One that recently had a data breach where a hacker gained access to 100 million credit card applications and accounts.
Viewers will also learn about:
- Macro trends in Cloud security and Micro trends in Cloud security
- Risks from Quantum Computing and when we should move to alternate forms of encryption
- Review “Kill Chains” from Lockhead Martin in relation to APT and DDoS Attacks
- Risk Management methods from ISACA and other organizations
Speaker: Ulf Mattsson, Head of Innovation, TokenEx
Presentation during my study at UniKL BMI.
Lecturer: Sir. Roy [https://www.facebook.com/azroy.arman]
Thank you Sir, you are so dedicated and caring lecturer ever.
TM as a Malaysia number 1 Information Communication Technologies provider. We have provide the Internet services, Communication Services, Web Hosting, and other Business Solution Packages.
This is a keynote lecture delivered in the 3rd American Society for Nutrition Middle East Congress, Dubai, UAE, Feb 2014.
The lecture was mainly focused on the effect of different bioactive food compounds on cancer, promoting diet therapy as a key component of cancer treatment.
Bursa Announcement - Share Buy-Back Statement sbc.corporation
SHARE BUY-BACK STATEMENT IN RELATION TO THE PROPOSED RENEWAL OF THE
AUTHORITY FOR THE COMPANY TO UNDERTAKE A SHARE BUY-BACK OF UP TO 10% OF
ITS ISSUED AND PAID-UP CAPITAL (“PROPOSED SHARE BUY-BACK RENEWAL”)
Department of Transportation and Communications of Philippines Selects Guardt...flashnewsrelease
Philippine Department of Transportation and Communications has selected Guardtime, to pilot the Link2Cloud solution to quickly and reliably verify physical document authenticity in field conditions.
This kickoff intrtoduces the concept of the Agile Fractal grid to more than 100 companies that particpated in the full day workshop lead by Chuck Speicher and John Reynolds and Craig Miller the Chief scientist of the NRECA
Presentation for Elastic User Group during a Meetup session on Wed 24 May 2023 at the office of T-Mobile in Diemen.
The presentation shows how T-Mobile Nederland uses Elastic to improve the Network Observability of their fixed and mobile network infrastructure.
OneTK: Key Distribution Center at Cloud Providers towards End to End, Securit...Editor IJMTER
Using End to End Connection in packet Switching networks for providing higher
security in Cloud Computing. In cloud computing a major role is provide security to services that
may be PaaS( Platform as a Service), SaaS( Software as a Service) , CaaS( Communication as a
Service) , IaaS( Infrastructure as a Services) , MaaS ( Monitoring as a Service)n, XaaS( X: Platform,
Software, Monitoring, Infrastructure). Cloud computing provides wide range of services. Large,
Small and medium businesses are depending on out sourcing of data services and computation on
cloud this is mainly deals with SaaS. The cloud provides a very high efficient service for the business
organizations. These business organizations trust cloud service providers on their data security. But
providing security is highly risk in cloud through the third party, especially in private cloud services.
Existing data security methods are not so effective. By using this End to End Connection and Session
Keys and attempts is to be covered secularism in the area of Cloud computing users.
A new approach for securing the data from cloud. OTK – “One Time Key Distribution File” is a
service that protects unauthorized file downloading form the cloud.
These 10 shocking stats reveal the danger shadow I.T poses to your data security. Stats that you can’t afford to ignore when you consider that 88% of cloud applications aren’t enterprise-ready and 84% of UK CIOs fear they are losing control of I.T.
Telecoms in a convergent world - Emerging issuesMartyn Taylor
Telecommunicationss in a convergent world; Big data and its implications; M2M and the Internet of Things; Digital content and video streaming; Growing use of strategic alliances
Vodacom Tightens Security with Identity Manager from NetIQNetIQ
Managing access—to physical buildings, network resources and more than 100 corporate applications—for this workforce is extremely challenging. Contractors may work in different locations on contracts of various lengths, making it difficult for Vodacom to maintain an accurate view of access rights.
Previously, Vodacom relied on line managers to correctly provision and deprovision contractors. Vodacom wanted to close this potential security loophole and simplify and accelerate identity management, enabling zero- day starts for new employees and reducing administrative costs.
Read more here: https://www.netiq.com/success/stories/vodacom.html
Bluedog Rescues the FTC - eWeek Magazine 103006tom termini
The Federal Trade Commission (FTC) was suffering from a botched upgrade of the Identity Theft and Do Not Call systems. Bluedog's crack team of technologists implemented a service oriented architecture to modernize the legacy big data systems, as well as provide links to the CRM in call centers, local and federal law enforcement, and build a conduit for sharing data via XML. All for a low cost, in record time, and with Java-based WebObjects technology from Apple.
Authentication And Authorization Issues In Mobile Cloud Computing A Case Study
Telekom malaysia keeping the good data inside with Safetica - By Safetica Benelux
1. Telekom Malaysia: Keeping the Good
Data Inside with Safetica
Profile – Telekom Malaysia is the second largest telecommunications provider in South Asia
with an annual turnover of $5.5 billion.
Problem – Loose data handling processes resulted in stolen data, bribery, and manipulated
contracts.
Solution – Create a leak-proof office and data loss protection system supported by Safetica
software.
Benefits – Monitor and control access to sensitive documents without requiring costly hard-
ware.
Lost data costs money and reputation
Data loss was costly for Telekom Malaysia. The company, the second largest telecommunications
provider in South Asia with an annual turnover of $5.5 billion, discovered that its tender process
was undermined by stolen data.
An $85 million contract had been awarded to Alcatel-Lucent as the result of confidential information
from a bribed official. This was no one-off incident. The French IT company had admitted multiple
instances of this behavior and was fined $137 million by a United States court for its actions in
Malaysia and other countries.
The bribery incident led to substantial changes at Telekom Malaysia(TM). “Before the scandal hit,
they really had no data handling procedures,” points out Mitthiran Raman, founder of Safetica
distributor Iconic Innovations. “Their tender room was a long table with open files, laptops every-
where, no monitoring – even vendors could come in.”
Creating a leak-proof office
In response to government demands that TM improve data handling standards, the company re-
sponded with plans for the Telekom Malaysia Tender Evaluation Centre(TMTEC), a locked-down
office with the latest desktop and data security systems for processing confidential tenders.
The future location of TMTEC was a given: It would be sited on the 50th floor of the TM building in
Kuala Lumpur with a dedicated elevator, controlled access, and individually checked-in employees.
2. But the data control system was less clear. The tender called for a data loss prevention (DLP) solution
to be installed on nearly 90 employees’ computers, use of encrypted flash drives, and document
storage on a secure intranet.
Nimble approach to problem solving
TM invited its registered suppliers to compete in the tender and received bids from industry leaders
such as Symantec and IronKey. Safetica participated via its distributor Iconic Innovations and their
partner firm Privasia Technologies.
“We went through every clause and requirement in the RFP (Request For Proposal) and showed
them how Safetica really exceeded their requirements with its 360 degree DLP approach,” remem-
bers Mitthiran. “They didn’t know exactly what they wanted, so we thought ‘lets give them more
than just a secure thumbdrive’.”
Open communication between Safetica and Iconic Innovations during the bid preparation was criti-
cal, points out Jakub Mahdal, CEO of Safetica. “DLP systems are notoriously complex and we were
talking with Mitthiran at all hours. This allowed us to quickly answer questions before they could
become an issue.”
These fast response times and operational flexibility helped Iconic Innovations implement the project
despite delays due to changes in Project Timeline. “It was only after we were announced as the bid
winner that they finalized the network architecture and workflows,” adds Mitthiran. “It’s good to be
small and nimble.”
Safe data without expensive hardware
With Safetica, Iconic Innovations was able to beat back competitors offering expensive hardware
or a DLP add-on to an antivirus solution. The winning bid incorporated Safetica software with 86
flashdrives, one console in the TMTEC secretariat, and a management server and a database
server residing at an external TM data center 30 km away.