Tag Archive for: Extreme

Government working to address extreme security threats from quantum computers


A future quantum computer would be able to break current internet encryption, meaning anyone with that tool could hack into previous financial transactions, medical records and national security secrets. The National Institute of Standards and Technology (NIST) is working on post-quantum cryptography that can stand up to an attack by a quantum computer.

  • Edward Parker, physical scientist at the RAND Corporation, said these computers could enable bad actors to read everything over the internet and that estimates of when they will be available vary widely.
  • NIST has selected four encryption algorithms out of submissions from the general public, and four alternates, one of which has been cracked. Parker said this is “concerning but not disastrous.”
  • The agency is asking the public to look for vulnerabilities in algorithms, said Parker. He recommends adding a financial incentive.

Watch the interview for more:

Source…

Apple’s Lockdown Mode: An ‘extreme’ option for the few


This week, Apple announced a new “extreme, optional” security feature called Lockdown Mode that is aimed at a very small minority of users who are at risk of being deliberately targeted by cyberattacks “from private companies developing state-sponsored mercenary spyware.” It will launch with iOS 16, iPadOS 16, and macOS Ventura this fall. 

Lockdown Mode is designed to block a category of hyper-targeted hacks that are generally used by governments (or private companies with support from governments) against activists, dissidents, journalists, and high-level business people. Although there are presumably other, similar exploits that have not been exposed, the most infamous of these is the spyware called Pegasus

Pegasus, developed by the (now sanctioned) Israeli technology firm NSO Group, turns iPhones and Android smartphones against their users. It’s basically the stereotypical Hollywood hack: The attackers have access to pretty much everything on the device, can intercept calls and messages, and even use the microphone, camera, and GPS to record and track people. Crucially, Pegasus can be a “zero-click” exploit, meaning that it can be installed without the user doing anything; at one point, phones could even be infected through a missed WhatsApp voice call

Cybersecurity typically involves a tradeoff between convenience and security. If you want your computer to be very difficult to hack, don’t connect it to the internet—lock it in a secure room in your house. No viruses! But also no email, Amazon, or Minecraft. Modern iPhones, iPads, and Macs come with loads of features that make them fast, convenient, and easy to use, but these same features also give hackers large “attack surfaces” to work with. Lockdown Mode turns off a lot of these features, or at least makes them disabled by default, at the expense of a great user experience. 

Some of the features that get disabled by Lockdown Mode, for example, are the speed and efficiency technologies in a bit of software called WebKit (which powers Safari). Web pages that haven’t been flagged as “trusted” will take longer to load and may be jankier to use, but those web pages…

Source…

Extreme : Security and Availability across Service Provider Data Center and Mobile Edge Network Infrastructure with Trusted Delivery


Headlines around supply chain attacks remain consistent. Those attacks keep on growing. 2020 ended with a blockbuster supply chain attack, namely Solarwinds, and attacks continued well into 2021.

The Identify Theft Resource Center keeps a tap on all publicly known security breaches. By September 30, 2021 the total number of events in comparison to FY 2020 has been exceeded by 17 percent. The trendline continues to point to a record-breaking year for data compromises. You can check over here for more details.

Those security breaches have several material business impacts:

  • Disruption of operation of the supply chain
  • Significant damage to brand and reputation
  • Impact on product safety and integrity
  • Loss of theft of IP
  • Substantial fines and fees

With cyberattacks on the rise, supply chain security is more critical than ever, requiring state-of-the-art network technology from end to end. Trusted Delivery enables network administrators to validate hardware components, boot processes, and the operating system (OS) throughout the device lifecycle – without disrupting device functionality – mitigating the risk of supply chain cyberattacks.

Trusted Delivery – Key Benefits:

  • Secure Foundation for Future Deployments: With Trusted Delivery, Extreme delivers an additional layer of certainty for Service Providers that are beginning to move away from legacy solutions and ensures a foundation of secure, validated infrastructure to support new networks. Available today across the Extreme 8000 Series, including the Extreme 8520 and Extreme 8720 data center and cellular edge leaf and spine switches, Trusted Delivery provides mechanisms for verifying device security and performance during operation, enabling service providers to deploy new infrastructure with confidence.
  • Increased Simplicity in Hardware Validation: Measured boot, an anti-tamper mechanism, gives operators the ability to validate hardware and boot processes remotely without shutting the device down. This saves time and…

Source…

Extreme Ensures Security, Availability Across Service Provider Data Center and Mobile Edge Network Infrastructure with Trusted Delivery


Eliminates Unnecessary Network Downtime, Creates Additional Layer of Certainty in Deploying New Infrastructure

SAN JOSE, Calif., Dec. 16, 2021 /PRNewswire/ — Extreme Networks, Inc. (NASDAQ: EXTR), a cloud-driven networking company, today announced Extreme Trusted Delivery, a carrier-grade solution designed to protect critical network infrastructure and ensure it is performing as anticipated without interference, regardless of location. Trusted Delivery protects key service delivery infrastructure at remote and unattended cellular edge sites, as well within co-location and data center environments where shared facility access is a potential concern.

Extreme Networks Logo (PRNewsFoto/Extreme Networks) (PRNewsFoto/Extreme Networks) (PRNewsfoto/Extreme Networks, Inc.)

Extreme Networks Logo (PRNewsFoto/Extreme Networks) (PRNewsFoto/Extreme Networks) (PRNewsfoto/Extreme Networks, Inc.)

With cyberattacks on the rise, supply chain security is more critical than ever, requiring state-of-the-art network technology from end to end. Trusted Delivery enables network administrators to validate hardware components, boot processes, and the operating system (OS) throughout the device lifecycle – without disrupting device functionality – mitigating the risk of supply chain cyberattacks.

Key Benefits:

  • Secure Foundation for Future Deployments: With Trusted Delivery, Extreme delivers an additional layer of certainty for service providers that are beginning to move away from legacy solutions and ensures a foundation of secure, validated infrastructure to support new networks. Available today across the Extreme 8000 Series, including the Extreme 8520 and Extreme 8720 data center and cellular edge leaf and spine switches, Trusted Delivery provides mechanisms for verifying device security and performance during operation, enabling service providers to deploy new infrastructure with confidence.

  • Increased Simplicity in Hardware Validation: Measured boot, an anti-temper mechanism, gives operators the ability to validate hardware and boot processes remotely without shutting the device down. This saves time and resources and prevents unnecessary service disruptions. Measured boot implementation is enabled by a microcontroller-based hardware root of trust (HWRoT) in conjunction with a Trusted Platform Module (TPM)….

Source…