Publications | Media & Events

List of publication and media references:

image1

Building a brand-new Internet

We do not possess the ability to read the future, and yet we can predict with a high level of certainty that we will see more major cybersecurity incidents in 2016 and 2017.

The world’s cybersecurity capability is not able to advance in line with the growing vulnerabilities. We are faced by more and more threats each day, and hackers are becoming more sophisticated. Whether an organization invests $1 million or $100 million in its security infrastructure, it will still remain vulnerable. What’s worse, there appears no end to this disparity.

cybersecurity

Firewalls up: Companies not prepared to tackle cyber attacks

Cybercrime is perhaps the only criminal activity that’s crazier in real life than in Hollywood. Tom Cruise stealing CIA secrets in Mission Impossible does not even come close to some of the biggest hacks in the world.

In 2013, hackers stole $300 million from a hundred banks across 30 countries. Last year, Sony Pictures Entertainment, banking and financial services company JP Morgan Chase, investment firm Morgan Stanley and American retailers Home Depot and Target Corporation—all international giants—were hacked, leading to hundreds of millions of dollars in losses and costing several high-profile executives their jobs.

mj14.biz_.1

Spying Is Bad for Business

Negotiators from Brazil and Europe reached a deal to lay a $185 million fiber-optic cable spanning the 3,476 miles between Fortaleza and Lisbon. The cable will be built by a consortium of Spanish and Brazilian companies.

According to Brazil’s president, Dilma Rousseff, it will “protect freedom.” No longer will South America’s Internet traffic get routed through Miami, where American spies might see it. She’s not being paranoid. Documents leaked last June by former U.S. intelligence contractor Edward Snowden revealed a global surveillance operation coördinated by the U.S. National Security Agency and its counterpart in Britain, the GCHQ.

image2

Comprehensive Cybersecurity strategy for Smartgrid equipment

The benefits in the evolution of traditional electrical grid into the Smart Grid, are more evident every day. However, this evolution is also offering more rewards to potential attackers as well as a wider range of potential attack.

Vectors due to the increase in the use of communications and the integration of operational systems in the internet. This has led to an increased awareness of the need for implementation of Cybersecurity measures in the Smart Grid. Cybersecurity field has not been part of the body of knowledge of electrical grid designers, though. So, even if equipment manufacturers are beginning to deal with the inclusion of CyberSecurity features to their

cw052215a

Enabling innovation with trusted computing

Menny Barzilay is an evangelist of innovation and cyber security strategist—two roles that are very much related, but often contradicting each other. As a former CISO of the Israeli Defense Forces and adviser in the global startup community, Barzilay says cyber security is often an innovation enabler, instead of limiter.

He will be visiting Hong Kong to share his views at the 16th Info-Security Conference on May 29, 2015. At an interview with Computerworld Hong Kong (CWHK), Barzilay talked about trusted computing and its value to innovation. CWHK: Innovation and cyber security appear to be contradictory concepts. As an expert in technology and innovation

CONTACT US AT ANY TIME