Tag Archive for: implications

Critically Analyzing ‘Evolving Cyber Operations’ And Implications For Pakistan – OpEd – Eurasia Review


A recent report by RAND Cooperation titled “Evolving Cyber Operations” provides a comprehensive analysis of cyber operations and capabilities, particularly focusing on the lessons from the Ukraine conflict. It presents a critical look at the evolving nature of cyber warfare, the role of cyber proxies, and the shift from traditional cyber defense strategies to a resilience-focused approach.

It emphasizes cyber resilience over deterrence. The report emphasizes a shift from deterrence to resilience in cyber defense strategies. It argues that democracies cannot rely solely on deterring cyberattacks but must focus on minimizing disruption to critical data and services. The report also highlighted the role of cyber proxies. The conflict in Ukraine highlighted the significant role of cyber proxies. These proxies, whether aligned with Russia or Ukraine, have demonstrated their capacity to influence conflicts beyond direct cyberattacks, particularly in shaping political narratives and international opinions

Political and Social Resilience: Political and social resilience is identified as crucial in cyber defense. The Ukrainian experience shows the importance of maintaining political will and leveraging a diverse range of actors, including civil society and the private sector, in building a robust defense. International Collaboration remains one of the most important: The report underscores the importance of international partnerships in cyber defense. Sharing intelligence, technology, and tactics among allies can significantly enhance a nation’s cyber capabilities The use of proxies in cyber warfare has evolved, with groups like Killnet and the IT Army of Ukraine playing significant roles. These groups have blurred the lines between traditional state-aligned proxies and transnational political actors

Implications for Pakistan’s National Security

Enhancing Cyber Resilience: Pakistan should prioritize building a resilient cyber infrastructure that can withstand and quickly recover from cyberattacks. This involves not just technological solutions but also a comprehensive strategy encompassing political, social, and economic dimensions.

Diverse Cyber Defense Strategy:…

Source…

Cyber, Kinetic Implications for the World


Cyberwarfare / Nation-State Attacks
,
Fraud Management & Cybercrime
,
Video

Zscaler CISO Sam Curry on Impact on People, Geo-Political Tensions, Cyber Community

Sam Curry, vice president and CISO, Zscaler

The eruption of war in Israel has sent shockwaves throughout the world. Zscaler Vice President and CISO Sam Curry, who has deep connections in Israel, pointed out that the global economy is vulnerable to this regional conflict, and the war can quickly escalate to the world stage – both through kinetic and cyberwarfare.

See Also: Challenges and Solutions in MSSP-Driven Governance, Risk, and Compliance for Growing Organizations

“There are many single points of failure … so things that happen in Israel affect things in China and affect the United States or Brazil,” he said. “It’s worth talking to your board about real risks. And I don’t mean just blowing it off and reading it, I mean spending some time and workshopping it.”

Curry urged cybersecurity organizations to prioritize human life and employee well-being above all, and then focus issues such as productivity, supply chain resilience and risk management in the face of a potential global crisis.

Curry said that as governments around the world respond to the conflict, he hopes they don’t lose site of their core values of freedom. Democracy, while complicated, offers more freedom and potential for citizens than authoritarian regimes, so it’s worth defending, he said. “Liberty comes at a price,” Curry added.

In this video interview with Information Security Media Group, Curry discussed:

  • The implications of the Israeli conflict on global cyber…

Source…

Security Implications In Context Of Kashmir Region – Eurasia Review


The union territory of Jammu and Kashmir has been subjected to many internet shutdowns in recent years, including the longest ever enforced in a democracy, lasting 145 days due to the repeal of Article 370,i which granted the state special status. However, instead of entirely shutting down the internet, the government frequently slows it down while also restricting the number of sites that an individual may visit.ii 

The government’s main objective has been social media, which has been put to sleep throughout the lockdowns. During this period, the Virtual Private Network (VPN) comes in handy for residents, allowing them to access government-banned websites, notably social media. This has become a major security concern since the government believes that the VPN is mostly used to spread incorrect and fabricated facts, causing societal instability while also providing information to secessionist groups, compromising national security. So, in order to prevent all of this from happening, the state has prohibited the usage of VPN services, and any person discovered engaging in this behaviour will suffer legal consequences.iii

Introduction

VPN (Virtual Private Network) refers to the ability to establish a secure network connection when utilising public networks. VPNs encrypt your internet traffic and conceal your identity online. This makes it more difficult for third parties to follow your internet activities and steal information. The encryption happens in real time. A VPN conceals your IP address by routing it through a specially configured distant server maintained by a VPN host. iv

This implies that if you use a VPN to access the web, the VPN server becomes the source of your data. This means that your ISP and other third parties cannot know which websites you visit or what data you transmit and receive online. A VPN acts as a filter, converting all of your data into “gibberish.v” Even if someone were to obtain your data, it would be worthless. The VPN boom in Kashmir finds its genesis in various lockdowns which puts a haul in normalcy of day-to-day activities. The exponential rise in use of VPN was seen after the abrogation of article 370 of the Indian constitution when…

Source…

Now in Mobile PCs, Synpatics’ AI Solution Holds Industrial Implications | Business


Computer makers Dell and Panasonic have deployed Synaptics’ Emza Visual Sense AI technology, which enables human presence detection (HPD), in mobile PC units that the companies are now shipping. The AI technology works by running machine learning algorithms on dedicated, ultralow-power edge AI hardware and allows for the conservation of battery power and enhanced privacy and security.

By analyzing context, the technology goes beyond basic presence detection to automatically wake the system when a user is engaged, dim the screen when they are not, hide information when an onlooker is detected, and lock the PC when the user walks away — all while the PC’s webcam is off.

Synaptics acquired Emza Visual Sense in October 2022. The move strengthened the company’s position in Edge AI and enabled it to immediately serve the PC market for HPD application.
Running advanced Emza ML algorithms on dedicated, ultra-low power edge AI hardware, Synaptics provides PC OEMs with a turnkey solution that enables both longer battery life and enhanced privacy and security. the technology goes beyond basic presence detection to automatically wake the system when a user is engaged, dim the screen when they are not, hide information when an onlooker is detected, and lock the PC when the user walks away. Courtesy of Synaptics.


Running advanced Emza machine learning algorithms on dedicated, ultralow-power edge AI hardware, Synaptics’ turnkey solution for PC OEMs enables longer battery life and enhanced privacy and security. The technology goes beyond basic presence detection to automatically wake the system when a user is engaged, dim the screen when they are not, hide information when an onlooker is detected, and lock the PC when the user walks away. Courtesy of Synaptics. 


Elad Baram, director of low-power AI marketing at Synaptics, told Vision Spectra via email that the potential deployments for the technology extend beyond consumer electronics and into industrial applications.

“Ultralow-power vision AI is targeting applications that are highly power constrained. These can be battery-operated devices with expectations for years of battery life, or systems that have small photovoltaic panels that can drive low-power systems,” Baram said.

Individual use cases for the technology include zone enforcement, such as the detection of people or vehicles in restricted areas or in front of emergency exit paths or restricted areas; safety regulation enforcement; and statistics. Examples include determining whether people are alert while operating equipment or wearing appropriate protective equipment, intruder detection, occupancy analytics, and operational…

Source…