|By RealWire News Distribution||
|July 1, 2014 05:06 AM EDT||
By David Parkinson, strategic development manager, UK & Ireland, for Wick Hill
It's not often that news from the information security industry reaches the early evening TV slots. However, the major disruption caused recently to the Gameover Zeus (GOZ) botnet certainly did.
In a collaborative effort to combat the botnet, the intelligence agencies of different countries, as well as leading information security vendors, worked together on the problem. They managed to give users a two week clear window in which to get their house in order, before command and control of the botnet was likely to have been won back by the instigators.
This collaborative action to stymie GOZ will surely be something we see more of in the future, as we strive to disrupt the increasingly fast, global spread of malware.
Indeed, this global collaboration theme was a key topic at the CPX Barcelona event in May, when Check Point announced the launch of ThreatCloud IntelliStore, a global marketplace for customers to select highly specific, relevant intelligence feeds from the likes of Crowdstrike and iSIGHT Partners ,and convert that intelligence automatically into additional protection, without further infrastructure change.
While GOZ itself is extremely dangerous, because it looks for banking and financial information on an infected host, its ability to download and install other malware, routinely CryptoLocker, makes it especially treacherous. As the FBI.gov page on the disruption action notes, it is estimated that around $30 million was paid in CryptoLocker ransoms between September and December 2013 alone. It's not surprising that Sky News ran a story reporting Cybercrime to be 'As lucrative as the drugs trade'.
While GOZ and CryptoLocker are undeniably an enormous problem for consumers worldwide, their effect on organisations from small businesses through to enterprises and public sector bodies is just as serious.
For a small business, with say twenty to two hundred PCs out in the (often remote) field, some infrastructure needs to be deployed, configured and trusted so malware can be detected and removed at the endpoint, and of course, preferably prevented from reaching the network and endpoint in the first place. For larger organisations, that problem is magnified, though they may have more resource with which to tackle the complexities.
While the viewpoint that we need new ways of looking at the problem can be wholly understood, and that we need to encourage vendors to be innovative, we also need to recognise that organisations need to work with the tools that are available to them today.
The increased publicity around PC malware infestation may encourage organisations to look again at centrally hosted desktop services, for at least a portion of their users, and may encourage service providers to take the opportunity to look again at their offerings.
For example, Virtual Desktop Infrastructure (VDI) could be considered if it could provide the benefit of improved security, and better management of that security.
One of the problems with endpoint protection in VDI is the potential replication of the endpoint agent to each guest operating system. This can cause storms of traffic during updates, create replicas of databases, and create a high processing overhead during scans. Hypervisor level protection can provide a solution to this, though that is often limited to file level scanning.
One solution would be a virtual appliance sitting on a host, with a small agent within each guest on the host, that then communicates with the virtual appliance.
The "Light Agent" approach from Kaspersky Lab provides the benefits of hypervisor level protection, along with the fuller protections associated with an agent installed on a desktop (malware control, application control, device control etc).
Having more desktops within just such a centralised environment means that they can often be kept secure more reliably, that they can provide a safer working environment for the user, and that they can be backed up more effectively. This might be a strategy worth looking at again. It will be interesting to see which service providers look to differentiate their services by providing such levels of protection.
Quite rightly, a centralised desktop infrastructure requires secure and flexible access to the data centre. This access might be required by regular VDI users who are looking to centralise desktop resources as described earlier, remote workers in the field, or perhaps users who are invoking a disaster recovery plan.
These different user groups may have very different requirements from their local computing hardware. A regular user would possibly find a tablet cumbersome to work with throughout the day and require a laptop or conventional "PC" setup, with keyboard and mouse, while remote workers may find access from a tablet far more convenient for the tasks they need to complete away from a desk.
A key user needing occasional access, or an IT Manager looking for a convenient ICE (In case of emergency) solution, might find a palm sized system-on-chip device that can be plugged into any HDMI monitor and connect wirelessly to network and input devices, the ideal solution for distribution and portability.
Such flexibility of device choice, tied with the security that only centralised management across all devices can provide (including remote device wipe), together with port and application control, makes Becrypt's tVolution suite suitable for any organisation looking to provide comprehensive secure access options into VDI services.
All this isn't at all to say that VDI is a panacea to the current wave of high profile malware distribution, but it is another tactic that can be considered after carefully looking at the tools at our current disposal.
About Wick Hill
Established in 1976, value added distributor Wick Hill specialises in secure IP infrastructure solutions. The company sources and delivers best-of-breed, easy-to-use solutions through its channel partners, with a portfolio that covers security, performance, access, networking, convergence, storage and hosted solutions.
Wick Hill is part of the Wick Hill Group, based in Woking, Surrey with sister offices in Hamburg. Wick Hill is particularly focused on providing a wide range of value added support for its channel partners. This includes a strong lead generation and conversion programme, technical and consultancy support for reseller partners in every stage of the sales process, and extensive training facilities. For more information about Wick Hill, please visit http://www.wickhill.com/company/company-profile or www.twitter.com/wickhill
SYS-CON Events announced today that Embotics, the cloud automation company, will exhibit at the 19th International Cloud Expo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. Embotics is the cloud automation company for IT organizations and service providers that need to improve provisioning or enable self-service capabilities. With a relentless focus on delivering a premier user experience and unmatched customer support, Embotics is the fas...
Oct. 21, 2016 02:00 PM EDT Reads: 610
Just over a week ago I received a long and loud sustained applause for a presentation I delivered at this year’s Cloud Expo in Santa Clara. I was extremely pleased with the turnout and had some very good conversations with many of the attendees. Over the next few days I had many more meaningful conversations and was not only happy with the results but also learned a few new things. Here is everything I learned in those three days distilled into three short points.
Oct. 21, 2016 02:00 PM EDT Reads: 6,769
SYS-CON Events announced today that Coalfire will exhibit at the 19th International Cloud Expo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. Coalfire is the trusted leader in cybersecurity risk management and compliance services. Coalfire integrates advisory and technical assessments and recommendations to the corporate directors, executives, boards, and IT organizations for global brands and organizations in the technology, cloud, health...
Oct. 21, 2016 01:45 PM EDT Reads: 1,448
The IoT industry is now at a crossroads, between the fast-paced innovation of technologies and the pending mass adoption by global enterprises. The complexity of combining rapidly evolving technologies and the need to establish practices for market acceleration pose a strong challenge to global enterprises as well as IoT vendors. In his session at @ThingsExpo, Clark Smith, senior product manager for Numerex, will discuss how Numerex, as an experienced, established IoT provider, has embraced a ...
Oct. 21, 2016 01:00 PM EDT Reads: 900
Cloud based infrastructure deployment is becoming more and more appealing to customers, from Fortune 500 companies to SMEs due to its pay-as-you-go model. Enterprise storage vendors are able to reach out to these customers by integrating in cloud based deployments; this needs adaptability and interoperability of the products confirming to cloud standards such as OpenStack, CloudStack, or Azure. As compared to off the shelf commodity storage, enterprise storages by its reliability, high-availabil...
Oct. 21, 2016 01:00 PM EDT Reads: 916
SYS-CON Events announced today that MathFreeOn will exhibit at the 19th International Cloud Expo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. MathFreeOn is Software as a Service (SaaS) used in Engineering and Math education. Write scripts and solve math problems online. MathFreeOn provides online courses for beginners or amateurs who have difficulties in writing scripts. In accordance with various mathematical topics, there are more tha...
Oct. 21, 2016 12:15 PM EDT Reads: 862
@ThingsExpo has been named the Top 5 Most Influential Internet of Things Brand by Onalytica in the ‘The Internet of Things Landscape 2015: Top 100 Individuals and Brands.' Onalytica analyzed Twitter conversations around the #IoT debate to uncover the most influential brands and individuals driving the conversation. Onalytica captured data from 56,224 users. The PageRank based methodology they use to extract influencers on a particular topic (tweets mentioning #InternetofThings or #IoT in this ...
Oct. 21, 2016 12:00 PM EDT Reads: 8,049
More and more brands have jumped on the IoT bandwagon. We have an excess of wearables – activity trackers, smartwatches, smart glasses and sneakers, and more that track seemingly endless datapoints. However, most consumers have no idea what “IoT” means. Creating more wearables that track data shouldn't be the aim of brands; delivering meaningful, tangible relevance to their users should be. We're in a period in which the IoT pendulum is still swinging. Initially, it swung toward "smart for smar...
Oct. 21, 2016 10:50 AM EDT Reads: 220
Complete Internet of Things (IoT) embedded device security is not just about the device but involves the entire product’s identity, data and control integrity, and services traversing the cloud. A device can no longer be looked at as an island; it is a part of a system. In fact, given the cross-domain interactions enabled by IoT it could be a part of many systems. Also, depending on where the device is deployed, for example, in the office building versus a factory floor or oil field, security ha...
Oct. 21, 2016 10:45 AM EDT Reads: 1,640
SYS-CON Events announced today that Transparent Cloud Computing (T-Cloud) Consortium will exhibit at the 19th International Cloud Expo®, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. The Transparent Cloud Computing Consortium (T-Cloud Consortium) will conduct research activities into changes in the computing model as a result of collaboration between "device" and "cloud" and the creation of new value and markets through organic data proces...
Oct. 21, 2016 10:30 AM EDT Reads: 1,228
Donna Yasay, President of HomeGrid Forum, today discussed with a panel of technology peers how certification programs are at the forefront of interoperability, and the answer for vendors looking to keep up with today's growing industry for smart home innovation. "To ensure multi-vendor interoperability, accredited industry certification programs should be used for every product to provide credibility and quality assurance for retail and carrier based customers looking to add ever increasing num...
Oct. 21, 2016 09:15 AM EDT Reads: 271
In an era of historic innovation fueled by unprecedented access to data and technology, the low cost and risk of entering new markets has leveled the playing field for business. Today, any ambitious innovator can easily introduce a new application or product that can reinvent business models and transform the client experience. In their Day 2 Keynote at 19th Cloud Expo, Mercer Rowe, IBM Vice President of Strategic Alliances, and Raejeanne Skillern, Intel Vice President of Data Center Group and ...
Oct. 21, 2016 08:45 AM EDT Reads: 1,371
@ThingsExpo has been named the Top 5 Most Influential M2M Brand by Onalytica in the ‘Machine to Machine: Top 100 Influencers and Brands.' Onalytica analyzed the online debate on M2M by looking at over 85,000 tweets to provide the most influential individuals and brands that drive the discussion. According to Onalytica the "analysis showed a very engaged community with a lot of interactive tweets. The M2M discussion seems to be more fragmented and driven by some of the major brands present in the...
Oct. 21, 2016 08:45 AM EDT Reads: 11,123
Machine Learning helps make complex systems more efficient. By applying advanced Machine Learning techniques such as Cognitive Fingerprinting, wind project operators can utilize these tools to learn from collected data, detect regular patterns, and optimize their own operations. In his session at 18th Cloud Expo, Stuart Gillen, Director of Business Development at SparkCognition, discussed how research has demonstrated the value of Machine Learning in delivering next generation analytics to impr...
Oct. 21, 2016 08:00 AM EDT Reads: 5,583
Data is the fuel that drives the machine learning algorithmic engines and ultimately provides the business value. In his session at Cloud Expo, Ed Featherston, a director and senior enterprise architect at Collaborative Consulting, will discuss the key considerations around quality, volume, timeliness, and pedigree that must be dealt with in order to properly fuel that engine.
Oct. 21, 2016 07:45 AM EDT Reads: 3,735
What happens when the different parts of a vehicle become smarter than the vehicle itself? As we move toward the era of smart everything, hundreds of entities in a vehicle that communicate with each other, the vehicle and external systems create a need for identity orchestration so that all entities work as a conglomerate. Much like an orchestra without a conductor, without the ability to secure, control, and connect the link between a vehicle’s head unit, devices, and systems and to manage the ...
Oct. 21, 2016 07:15 AM EDT Reads: 1,284
Virgil consists of an open-source encryption library, which implements Cryptographic Message Syntax (CMS) and Elliptic Curve Integrated Encryption Scheme (ECIES) (including RSA schema), a Key Management API, and a cloud-based Key Management Service (Virgil Keys). The Virgil Keys Service consists of a public key service and a private key escrow service.
Oct. 21, 2016 07:15 AM EDT Reads: 883
Web Real-Time Communication APIs have quickly revolutionized what browsers are capable of. In addition to video and audio streams, we can now bi-directionally send arbitrary data over WebRTC's PeerConnection Data Channels. With the advent of Progressive Web Apps and new hardware APIs such as WebBluetooh and WebUSB, we can finally enable users to stitch together the Internet of Things directly from their browsers while communicating privately and securely in a decentralized way.
Oct. 21, 2016 06:45 AM EDT Reads: 1,796
Amazon has gradually rolled out parts of its IoT offerings, but these are just the tip of the iceberg. In addition to optimizing their backend AWS offerings, Amazon is laying the ground work to be a major force in IoT - especially in the connected home and office. In his session at @ThingsExpo, Chris Kocher, founder and managing director of Grey Heron, explained how Amazon is extending its reach to become a major force in IoT by building on its dominant cloud IoT platform, its Dash Button strat...
Oct. 21, 2016 06:15 AM EDT Reads: 4,656
Two weeks ago (November 3-5), I attended the Cloud Expo Silicon Valley as a speaker, where I presented on the security and privacy due diligence requirements for cloud solutions. Cloud security is a topical issue for every CIO, CISO, and technology buyer. Decision-makers are always looking for insights on how to mitigate the security risks of implementing and using cloud solutions. Based on the presentation topics covered at the conference, as well as the general discussions heard between sessi...
Oct. 21, 2016 05:45 AM EDT Reads: 5,052