Category Archives: cyber security

Technology embedded in every aspect of working life

Dr Joseph Reger Fujitsu’s EMEA CTO

Technology already surrounds us in the workplace, but we are about to enter an age where it will become embedded in every aspect of working life.

In the vison of Fujitsu’s Work place by 2025,artificial intelligence will deliver a huge leap forwards in enhancing the employee experience, by generating new levels of insight into employee behavior, preferences and context. AI will also play a key role in defending against an escalating cyber security threat, which will increase in sophistication as more areas of the business – from the office entry system to the coffee machine – become connected to the Internet of Things.

As Dr Joseph Reger Fujitsu’s EMEA CTO  explained:  “The security strategy for larger corporations makes it difficult for them to engage with smaller organisations and they are not willing to open up their critical systems to a level that makes it more vulnerable. Instead they will look to work with partners that have trusted systems that enable this collaboration”.

Fujitsu Forum 2017

 

At Fujitsu forum 2017 in Munich we asked to Dr. Reger the human aspects of technology:

  • How IT today is closer to human being?

Fujitsu is a company where responsible business conduct is very important, it is in the company values, and the company rules on how we behave and conduct business. The responsible business require thinking about the consequences of the technologies that we developed and the way we use it or the customer use it. In the early development when we discovered a particular development can cause certain ethical issues we feel obliged to look at the problem that can arise and what can be done to control or at least discuss them. AI is in a development stage today, for this reason we need to discuss and have a societal debate on the consequences, not only because such a powerful technology can be used as a weapon but also for other ethical consequences such as the job market aspects.

  • Could you explain the concept of Human Centric intelligent Society?

Fujitsu arrive at an important pillars in the technology strategy that needs to be human centric. The humans are in the centre of our interest. Our technology development is intended to help people to have better life, more comfortable life but also is addressing the big issue that human society has in terms of complexity we created in urban areas and so on. We clearly recognise that there is a need to use information technology to improve that situation. The humankind built an infrastructure that is not serving only our needs but also putting the human actor in the centre.

Watch the full interview:

Henry Borzi

Advertisements

Cyber security need co-operation ecosystem

At Fujitsu Forum 2017, Tatsuya Tanaka representative Director and President Fujitsu explained how in cyber security a co-operation ecosystem and co-creation approach with customer is key to fight cyber-attacks.

We asked to President Tanaka the Fujitsu strategy on cybersecurity.

Henry Borzi

Fujitsu Cyber Threat Intelligence Service

 

Cyber security has become one of the leading boardroom issues. According to a recent report1by global insurer Lloyds of London, attacks on computer operating systems run by a large number of businesses around the world could cause losses of $28.7 billion in terms of their financial, economic and insurance impact.

Fujitsu announced the availability of its Cyber Threat Intelligence(CTI) service in Europe, the Middle East, India and Africa (EMEIA) region. Fujitsu’sCyber Threat Intelligence teams perform thorough, ongoing monitoring and assessment of the threat landscape, bringing together threat intelligence data from a broad range of sources.

Rob Norris, Head of Enterprise and Cyber Security at Fujitsu in EMEIA, said :“Being online is the lifeblood for all organizations today and it is critical to remain online, and protect the integrity of your systems and your data even when you’re under attack from cyber criminals. Nobody should underestimate the catastrophic damage that a cyberattack can cause starting with a simple slip, such as opening an infected email. The nature and scale of cyber threats is changing so fast that traditional security solutions on their own are no longer enough to provide adequate protection. What we give our customers with the CTI service is a comprehensive view of their security posture, thorough analysis of security risks and actionable information because today, being unprepared for a cyber attack can easily put a company out of business.

  • What challenges customers are facing in cyber security?

Today we have more target attacks in terms of specific individuals certainly, the more sophisticated attackers would identify key people and they would go after them. What the hackers do is doing a lot of research before attacking specific people. This situation probably account for 3-4% of the attacks, but the majority of attacks are still random. Therefore, cyber-attacks are normally done via official emails or by scanning the network structure and looking for defence entry. What we see in terms of attacks are the small businesses because of the easiness of launching a cyber-attack. It is as easy going on the web and purchase procurement target organization. Attacking small businesses and individuals and more they are after their financial information and personal information they can actually sell on the the dark web. You can pay as little as 5$ for some financial information up to 30-40$ for personal information.

  • What about cyber security and cloud services?

There are the same risk using cloud services. With cloud services, I need to know where the data reside and if the data are encrypted. Certainly, these are the principal questions we have to ask to our self in terms of how secure are the data and we need to ask the same questions to the cloud host provider.

  • Recently Fujitsu won a European projects on the framework of Horizon 2020 on the theme of Industrial IT and cyber security.

We have a factory in Augsburg where we are working specifically on IoT security and we have our own Iot competencies centre settled in Germany. With the European Parliament, we are looking in terms on what we are able to do on Cyber security. We are leading a European project with a number of organisations where we are looking on IoT security. One of the Key things would be weather there is a legislation or not and we need to settle certain security standard with IoT devices apply to everybody. For example, when you buy a device and you go on internet you need from the first day to change a password. Simple standards would help in terms of security of IoT devices.

  • How important is the education on data protection?

I think that is very important. If you look on data protection and the work you need to do in terms of protecting data, I think it is only now that people start to understand the importance of data protection. It is like an insurance policy. Many organisations think cyber-attack could happen to somebody else while it could happen to them. The organizations need to understand and carefully manage the risk of threat exposure and constantly test and make sure their defences are continually up to date. Preparation is the key. In the event of a cyber-attack, a response and recovery plan makes all the difference in minimizing the impact of the attack. What personal data they hold on individuals? Where is that data be stored? In the Cloud, in the country that operate? Can I easily access to that information? Is that information encrypted? These are the principles of data protection that need to be enforced.

 Henry Borzi

EU new study to support 5G roll-out

Ahead of tomorrow’s Transport, Telecommunications and Energy Council that will concentrate on most pertinent Digital Single Market issues, the Commission published today the latest study on spectrum assignments that will support the EU’s work towards successful 5G deployment.

The results affirm that licence duration and auction prices influence investments in better network coverage. For example, there is a tendency for higher investment levels in countries that have awarded longer licences. There is additionally evidence that high spectrum prices can be associated with lower 4G availability. These findings will provide supplementary input to the ongoing negotiations with the European Parliament and the Council on the Commission’s proposal for new EU telecoms rules – the European Electronic Communications CodeTomorrow’s Council meeting in Luxembourg aims to accelerate progress on the Digital Single Market legislative files, in particular on spectrum and 5G deployment. Additionally, the Ministers hold a follow-up debate on cybersecurity following the European Council conclusions, the Tallinn Digital Summit and the Commission’s proposals to scale up the EU’s response to cyber-attacks. For the Commission Vice-President for the Digital Single Market Andrus Ansip, Commissioner Julian King in charge of Security Union, as well as Commissioner for Digital Economy and Society Mariya Gabriel will participate. The European Electronic Communications Code is crucial for creating the Digital Single Market, as it will boost investments in high-speed and quality networks. It provides the necessary basis for the 5G roll-out at the same time all across the EU. Read more about the topic in the proposal from 2016. Further details on the spectrum assignments study can be found here. Spectrum factsheet will be available soon here. Overview factsheets on the Digital Single Market can be found here: state of playtimelinecybersecurity.

Start the European Cybersecurity Month

 “Cybersecurity is the basis for the digital world; it is our shared responsibility, of everybody, every day. I welcome these joint efforts to promote awareness and concrete actions for cybersecurity and cyberhygiene across Europe.” Said Commission Vice-President for the Digital Single Market, Andrus Ansip.

The 5th edition of the  European Cybersecurity Month, taking place during the entire month of October 2017 across Europe, aims at raising awareness of cybersecurity threats and promoting cybersecurity among citizens and organisations through education and sharing of good practices. This year’s campaign follows up on Commission’s proposals to scale up EU’s response to cyber-attacks and will carry further the message that cyber-hygiene needs to be embedded in our daily practices. The annual awareness campaign is organised by the European Union Agency for Network and Information Security (ENISA), the European Commission and over 300 partners, including local authorities, governments, universities, think tanks, NGOs and professional associations. Around 300 activities will take place in October throughout Europe. During this month, in order to tackle the need of smarter authentication ways, the European Commission has launched a new  Horizon prize: “Seamless authentication for all”. €4 million are available to the innovators who contribute to inventing secure, privacy-friendly and affordable authentication methods for everyone and their smart objects. You can find out more about what is happening in your country during the Cybersecurity Month by checking the interactive map. Tips and advice in 23 languages, videos, online quizzes and awareness raising material are available on the dedicated website.

EU tackle illegal content online

 

“We are providing a sound EU answer to the challenge of illegal content online. Our guidance includes safeguards to avoid over-removal, ensure transparency and the protection of fundamental rights such as freedom of speech.” Said Andrus Ansip Vice-President for Digital Single Market .

The Commission is presenting a guidelines and principles for online platforms to step up more proactive prevention, detection and removal of illegal content inciting hatred, violence and terrorism online, as announced by President Juncker in his Letter of Intent accompanying his State of the Union speechof 13 September. The increasing availability and spreading of terrorist material and content that incites to violence and hatred online is not only a serious threat to the security and safety of EU citizens, it also undermines citizens’ trust and confidence in the digital environment – a key engine of innovation, growth and jobs.Vera Jourová, Commissioner for Justice, Consumers and Gender Equality, said:”The rule of law applies online just as much as offline. We cannot accept a digital Wild West, and we must act”. Julian King, Commissioner for the Security Union, said: “The digital world offers unprecedented opportunities but, in the wrong hands, poses a serious threat to our security. Mariya Gabriel, Commissioner for the Digital Economy and Society, said: “Today we provide a clear signal to platforms to act more responsibly. This is key for citizens and the development of platforms.” The new guidance issued today calls on online platforms to further boost their efforts to prevent the spread of illegal content. Given their increasingly important role in providing access to information, the Commission expects online platforms to take swift action over the coming months, in particular in the area of terrorism and illegal hate speech – which is already illegal under EU law, both online and offline.

Europol: new solutions for ATM Malware Protection

“The joint industry – law enforcement report by Europol’s EC3 and Trend Micro shows that the malware being used has evolved significantly and the scope and scale of the attacks have grown proportionately. While industry and law enforcement cooperation has developed strongly, the crime continues to thrive due to the major financial rewards available to the organized crime groups involved. This report assesses the developing nature of the threat. I hope that it serves as a blueprint for future industry and law enforcement cooperation,” said Steven Wilson, Head of EC3.

Europol’s European Cybercrime Centre (EC3) and Trend Micro, a global leader in cybersecurity solutions today released a comprehensive report on the current state of ATM Malware. Cashing in on ATM Malware details both physical and network-based malware attacks on ATMs, as well as highlights where the malware is created.

ATM malware has evolved from requiring physical access to infect the machines to now successfully attacking network-based access using the bank’s corporate network. The report dissects recent attacks using bank networks to both steal money and credit card data from ATM machines, regardless of network segmentation. These attacks not only risk personally identifiable information (PII) and large sums of money, but also put banks in violation of PCI compliance standards.

“Protecting against today’s cyber threats and meeting compliance standards require increased resources that are not always available for organizations, including those in the financial services industry,” said Max Cheng, chief information officer for Trend Micro. “Public-private collaborations strengthen the global, ongoing fight against cybercrime, and help fill the resource gap for organizations. This report furthers Trend Micro’s commitment to helping law enforcement and private businesses mitigate future attacks and protect individuals.”

In addition to the public report, a limited-release version is available to law enforcement authorities, financial institutions and the IT security industry. This private report provides greater detail for public and private organizations to harden ATM and network systems and prevent future attacks against financial institutions.

« Older Entries