Top related persons:
Top related locs:
Top related orgs:

Search resuls for: "Centre for Cyber Security"


8 mentions found


AdvertisementIn Russia, however, "they have the expertise but not necessarily the service providers who sit in front of organisations to detect and deflect DDoS attacks," Woodward added. AdvertisementSuch attacks may also help "support defensive movements of the Ukrainian army," said Vasileios Karagiannopoulos, an associate professor in cybercrime and cybersecurity at the University of Portsmouth. Advertisement"The IT Army is managed by the SBU and the Ukrainian MoD," Soesanto said, adding that they receive support from Ukraine's Ministry of Digital Transformation. Ted told BI that "the MoD does not run the IT army, but there is collaboration to ensure efforts are synchronized." Ukraine's Ministry of Defense did not respond to a request for comment from BI on the nature of its relationship with the IT army.
Persons: , Mykhailo Fedorov, Ukraine's, Eager, Ted, Ted said, Alan Woodward, Woodward, Ukraine's cyberdefense, Stefan Soesanto, Vasileios Karagiannopoulos, Karagiannopoulos, Soesanto Organizations: Service, Business, Transformation Ministry, IT Army, Surrey Centre, Cyber Security, University of Surrey, Visa, Mastercard, Center for Security Studies, ETH Zurich, Kommersant, University of Portsmouth, country's Ministry of Defense, Ukrainian MoD, Ukraine's Ministry of Digital, MoD, Ukraine's Ministry of Defense Locations: Russia, Ukraine, Ukraine's, cybercrime, Ukrainian
AI threat demands new approach to security designs -US official
  + stars: | 2023-11-27 | by ( ) www.reuters.com   time to read: +2 min
AI (Artificial Intelligence) letters are placed on computer motherboard in this illustration taken, June 23, 2023. REUTERS/Dado Ruvic/Illustration/File Photo Acquire Licensing RightsOTTAWA, Nov 27 (Reuters) - The potential threat posed by the rapid development of artificial intelligence (AI) means safeguards need to be built in to systems from the start rather than tacked on later, a top U.S. official said on Monday. "We've normalized a world where technology products come off the line full of vulnerabilities and then consumers are expected to patch those vulnerabilities. We can't live in that world with AI," said Jen Easterly, director of the U.S. Cybersecurity and Infrastructure Security Agency. "We have to look at security throughout the lifecycle of that AI capability," Khoury said.
Persons: Dado Ruvic, Jen, Sami Khoury, Khoury, David Ljunggren, Matthew Lewis Organizations: REUTERS, Rights OTTAWA, U.S, Cybersecurity, Infrastructure Security Agency, Canada's, Cyber Security, Thomson Locations: Ottawa, United States, British
Broken Ethernet cable is seen in front of binary code and words "cyber security" in this illustration taken March 8, 2022. "We're also seeing a greater interest from state actors in Australia's critical infrastructure." In May, the Five Eyes intelligence alliance and Microsoft (MSFT.O) said a state-sponsored Chinese hacking group was spying on U.S. critical infrastructure organisations. Techniques used by the China hacking group could be used against Australia's critical infrastructure including telecommunications, energy and transportation, the report said. Marles said Australia's relationship with China, its largest trading partner, was "complex" and the government had never pretended the relationship would be easy.
Persons: Dado Ruvic, cybercrime, Richard Marles, We're, Marles, Matthew Warren, Nigel Phair, Renju Jose, Byron Kaye, Lincoln, Edwina Gibbs Organizations: REUTERS, Rights, U.S, Australian Cyber Security, ABC Radio, Microsoft, RMIT University Centre, Cyber Security Research, Australian Securities and Investments, Australia, Monash University, DP, Optus, Thomson Locations: Britain, U.S, Canada, New Zealand, Australia, China, Sydney
Two experts in 5G technology and cybersecurity, Rahim Tafazolli and Alan Woodward of the University of Surrey, spoke to Insider about the key steps organizations should take to develop a secure 5G network. Understand your needs and hire the right staffThe first thing to check is whether you need a 5G network, and if so, how you should scope it. Evaluate public versus private 5G optionsIf you don't have the full complement of telecom skills required, it's much safer to rely on those who do to provide you with a secure 5G network. A public 5G network slice from a mobile operator may, in that instance, be better than a private, on-premise 5G network that you have to maintain in-house. Implement monitoring and automationOperating a 5G network requires extensive telecom expertise that many enterprises lack.
Persons: , Rahim Tafazolli, Alan Woodward, Tafazolli, 5GIC, Woodward Organizations: Service, University of Surrey, Institute for Communication Systems, Surrey Centre, Cyber Security
[1/2] A man types into a keyboard during the Def Con hacker convention in Las Vegas, Nevada, U.S. on July 29, 2017. In an interview this week, Canadian Centre for Cyber Security Head Sami Khoury said that his agency had seen AI being used "in phishing emails, or crafting emails in a more focused way, in malicious code (and) in misinformation and disinformation." The same month, Britain's National Cyber Security Centre said in a blog post that there was a risk that criminals "might use LLMs to help with cyber attacks beyond their current capabilities." The LLM responded with a three paragraph email asking its target for help with an urgent invoice. Reporting by Raphael Satter in Washington; editing by Chris Sanders and Josie KaoOur Standards: The Thomson Reuters Trust Principles.
Persons: Steve Marcus WASHINGTON, Sami Khoury, Khoury, cybercriminals, Europol, ChatGPT, Raphael Satter, Chris Sanders, Josie Kao Organizations: Def Con, REUTERS, Reuters, cybercriminals, Centre for Cyber Security, European, Cyber Security, Thomson Locations: Las Vegas , Nevada, U.S, Washington
OTTAWA, July 6 (Reuters) - U.S. and Canadian authorities issued a joint advisory on Thursday warning about a widespread increase in the use of a type of malware called Truebot to target organizations in the two countries. "Cyber threat actors are using new variants of Truebot malware to exfiltrate large amounts of sensitive information for financial gain," the Canadian Centre for Cyber Security said in a joint advisory issued by authorities in the two countries, including the U.S. FBI. Reporting by Ismail Shakil in Ottawa; editing by Rami AyyubOur Standards: The Thomson Reuters Trust Principles.
Persons: Ismail Shakil, Rami Ayyub Organizations: OTTAWA, Canadian Centre for Cyber Security, U.S . FBI, Thomson Locations: Ottawa
Suncor Energy says it experienced a cybersecurity incident
  + stars: | 2023-06-26 | by ( ) www.reuters.com   time to read: +1 min
Companies Suncor Energy Inc FollowJune 25 (Reuters) - Canadian energy firm Suncor (SU.TO) on Sunday said it experienced a cybersecurity incident, adding that some transactions with customers and suppliers could be impacted while they investigate and resolve the situation. "At this time, we are not aware of any evidence that customer, supplier or employee data has been compromised or misused as a result of this situation," the company said in a statement. Suncor's operations include oil sands development, production, offshore oil and gas, petroleum refining in Canada and the U.S, including the company's Petro Canada retail and wholesale distribution networks. The Canadian Centre for Cyber Security had earlier said it was aware of reports of an incident affecting Petro Canada but said it did not generally comment on "specific cybersecurity incidents." Reporting by Seher Dareen and Swati Verma in Bengaluru and Raphael Satter Editing by Christopher Cushing and Louise HeavensOur Standards: The Thomson Reuters Trust Principles.
Persons: Seher Dareen, Swati Verma, Raphael Satter, Christopher Cushing, Louise Heavens Organizations: Suncor Energy, company's Petro Canada, Canadian Centre for Cyber Security, Petro Canada, Thomson Locations: Canada, Petro, Bengaluru
"This may be a first step, it may be the only step we need to take," he said referring to the action against TikTok. As government bans TikTok on work phones, "many Canadians, businesses and private individuals will reflect on the security of their own data and perhaps make choices in consequence," he said. The ban was issued "without citing any specific security concern or contacting us with questions," a TikTok spokesperson said in an emailed statement. Ottawa has also previously excluded Chinese firms from Canada's critical minerals and telecommunication sectors, citing risks to its national security. "The Communications Security Establishment’s Canadian Centre for Cyber Security (Cyber Centre) guidance strongly recommends that Canadians understand the risks and make an informed choice on their own before deciding what tools to use."
Total: 8