30 Matching Annotations
  1. Last 7 days
    1. ||VladaR||||AndrijanaG|| Here is a good summary of action against Revil group.

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

  2. Jan 2022
    1. the U.S. government passed a sweeping cybersecurity bill called the Internet of Things Cybersecurity Improvement Act of 2020 at the very tail end of that year. The law is a more flexible and adaptable approach to cybersecurity than previous laws. Crucially, it requires the National Institute of Standards and Technology to establish best practices that other government agencies must then follow when purchasing IoT devices. The initial rules unveiled by NIST in 2021 include requiring an over-the-air update option for devices and unique device IDs. And while the law pertains only to devices purchased by the U.S. government, there’s little reason to suspect it won’t have ongoing and broad effects on the IoT industry. Companies will likely include NIST’s cybersecurity requirements in all of its devices, whether selling to the U.S. government or elsewhere.

      About US IoT cybersecurity improvement act 2020

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. Of the big three vendors, only Huawei is not a member, citing its belief that Open RAN systems cannot perform as well as the company's proprietary systems

      It will be important to follow China's attitude towards ORAN. Currently, it seems ORAN is not as efficient as proprietary - but this is likely to change. At some point, Huawei model may become less 'sellable' (ultimately, operators around the world decide on profit, especially when difference is big). Will Chinese industry ultimately turn to ORAN to some extent? Also, will China try to 'emphasise' some of the weaknesses of ORAN, eg. through cyberattacks against its virtualised elements? ||JovanK|| ||sorina|| ||AndrijanaG||

    2. When an operator buys an end-to-end system from Nokia or Ericsson or Huawei, it also knows it can depend on that vendor to support the network when problems crop up. Not so with Open RAN deployments, where no single vendor is likely to claim responsibility for interoperability issues. Larger operators will likely be able to support their own Open RAN networks, but smaller operators may be reliant on companies like Mavenir, which have positioned themselves as system integrators.

      Another possible drawback of ORAN: ensuring interoperability of various vendors, in contrast to responsibility of big vendors (similar challenge to open source software). Open question: how can this impact security (similar to open source security issues)?

    3. inevitably create more points in the network for cyberattacks

      Important issue to study. Argument that more open standards bring more risks is somewhat true: it is harder to create attacks against more closed and specialised networks (plus, an attack against Huawei's network couldn't be applied to Ericsson's, etc) - but obscurity is not really a cure for security (most experts don't believe in 'security by obscurity'). More important element is that much of the functionality of ORAN will be moved to software and cloud, much like other ordinary services. This makes core telecom networks more 'ordinary', and prone to common cyber-attacks and vulnerabilities related to common digital networks. It is important to further study those risks. ||AndrijanaG|| ||VladaR||

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. The attack exploited a vulnerability in a legacy compression tool used to process text in images from a physical scanner, enabling NSO Group customers to take over an iPhone completely. Essentially, 1990's algorithms used in photocopying and scanning compression are still lurking in modern communication software, with all of the flaws and baggage that come with them.

      ||VladaR|| This could be an interesting example how legacy standard from photo-copying machines impacted nowdays security.

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

  3. Nov 2021
  4. Oct 2021
    1. President Biden has unveiled plans for more extensive cooperation on cybersecurity, artificial intelligence, and quantum computing.
    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

  5. Sep 2021
    1. The complexity of modern conflicts and crises continues to grow with the marriage of emergingfactors, such as climate change, cyber threats anddisinformation,and the old foesof authoritarianism andtyranny.
    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. Regional instability, weakening state structures, refugee and migrant flows, religious extremism and terrorism, and new forms of conflict – hybrid, digital, environmental and resource-based.

      new form of conflicts

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. From this standpoint, theCovid-19 p andemic was tantamount to a mirror to the world, reflecting its weaknesses and revealing its flaws, manifested in several chronic aspects, among which is the increase in rates of hunger and p overty, p rolonged conflicts, uncontrolled p rogress of modern technology, and its ramifications on cyber security
    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. The dependence on digital space has revealed also our vulnerability to security threats and to cyberattacks.It has highlighted the extent of the damage caused by such attacks with regard to critical infrastructure, the economy, society or even loss of life.
    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. U.S.-EU Trade and Te chnology Council InauguralJoint State me ntSe pte mbe r 29, 2021Pitts burgh, Pe nns ylvania

      Leaked draft of the TTC outlining cooperation steps in tech between US and EU. France wants to postpone the meeting for a month (submarine issue), Germany and others insist on 29 September. Touches on most of the issues, except for the data transfers, which was requested to be left out by the EU. ||Jovan|| ||StephanieBP|| ||Katarina_An|| ||NatasaPerucica||||AndrijanaG||||VladaR||

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. we will continue to work closely with partners on cyber security digital public good and to call irregular migration of persons
    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. he very first official discussion on cybersecurity in the Council earlier this year, whichallowedusto raise awareness on threats to international peace and security stemming from the malicious use of cyberspace and create momentum for the implementation of our existing framework
    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. But on the other hand, the world has felt the effects of the misuse of cyberspace, including breaching private domains of individuals and international piracy and the serious threat it poses to the security and stability of the international community. From this standpoint, we reiterate the call for the United Nations to lead the process of unifying the efforts to prevent the misuse of the scientific progress in cybersecurity and regularize these vital aspects according to the rules of international law.

      on the misuse of cyberspace; UN to lead the efforts to prevent the misuse of cyberspace

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. Bucharest brings its contribution byhosting the European Cybersecurity Centre, which will improvecyber-resilience and cybersecurity research across the European Union.

      Romania hosting the European Cybersecurity Centre

    2. Recently we have also witnessed the potential and the challenges of digital technologies. We must ensure meaningful and safe access to the Internet, strengthen cybersecurity and promote responsible behavior in the cyberspace, while addressing the digital spread of hatred and disinformation.
    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. Cyber securityis perhaps one of our fastest growing concerns. Trendsappear to indicatean increasingdiversification ofmalicious efforts, perhapsstate-sponsoredones being the most worrisome. Particularly upsetting incidents involvecyber-attacks targetingour critical health infrastructures,alreadyexhausted in the struggle with the COVID-19 pandemic.
    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. We’re hardening our critical infrastructure against cyberattacks, disrupting ransomware networks, and working to establish clear rules of the road for all nations as it relates to cyberspace.  We reserve the right to respond decisively to cyberattacks that threaten our people, our allies, or our interests. 

      Addressing cyberattacks and response - strong language , includes attacks on allies.

    2. We have reaffirmed our sacred NATO Alliance to Article 5 commitment.  We’re working with our Allies toward a new strategic concept that will help our Alliance better take on evolving threats of today and tomorrow.

      Recommitment to NATO, interesting mention of Art. 5 as the last statements related to Art. 5 were on cybersecurity and armed attack, inferred cyberattacks in 'evolving threats'

    3. Instead of continuing to fight the wars of the past, we are fixing our eyes on devoting our resources to the challenges that hold the keys to our collective future: ending this pandemic; addressing the climate crisis; managing the shifts in global power dynamics; shaping the rules of the world on vital issues like trade, cyber, and emerging technologies; and facing the threat of terrorism as it stands today

      Change in tone. Note the order of issues the resources are to be devoted to: pandemic, climate, global power dynamics (China). Call for change in global rules - trade, digital, terrorism in that order.

    4. Will we apply and strengthen the core tenets of inter- — of the international system, including the U.N. Charter and the Universal Declaration of Human Rights, as we seek to shape the emergence of new technologies and deter new threats?  Or will we allow these universal — those universal principles to be trampled and twisted in the pursuit of naked political power? 

      International system, incl UN needs strengthening. Makes connection between international system and emerging technologies, new threats (cyber) and the need to protect principles of UN Charter

    1. Вместе с тем призываем активизировать международные усилия не только для борьбы с терроризмом и экстремизмом, но и против транснациональной организованной преступности, занимающейся незаконной деятельностью в сфере оборота наркотиков и оружия, торговли людьми, отмыванием преступных доходов, и в киберпространстве. Кыргызстан в рамках Шанхайской организации сотрудничествапрорабатывает вопрос создании Центра по противодействию международной организованной преступности в городе Бишкек

      At the same time, we urge to intensify international efforts not only to combat terrorism and extremism, but also against transnational organized crime engaged in illegal activities in the field of drug and arms trafficking, human trafficking, money laundering and cyberspace. Kyrgyzstan, within the framework of the Shanghai Cooperation Organization, is working on the issue of creating a Center for Countering International Organized Crime in the city of Bishkek

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. tecnología con el Internet de las cosas, la inteligencia artificial, la ciberseguridad, la computación en la nube y las aplicaciones,nos revelanque los avances de la virtualidad son oportunidades de desarrollo humano.

      IoT, AI, cybersecurity, cloud computing

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. Mais il n’y a pas de consensus sur la manière de réglementer ces technologies.

      Today, autonomous weapons can target and kill people without human intervention. Such weapons should be banned.

    2. Aujourd’hui, des armes autonomes peuventprendre pour cible des personnes et les tuer sans intervention humaine. De telles armes devraient être interdites.

      Today, autonomous weapons can target and kill people without human intervention. Such weapons should be banned.

    3. Je suis par exemple certain que toute future confrontation majeure –et j’espère évidemment qu’une telle confrontation n’aura jamais lieu –commencera par une cyberattaque massive.

      For example, I am certain that any future major confrontation - and of course I hope that such a confrontation never happens - will start with a massive cyberattack.

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

  6. Jun 2021
    1. Issued by the Heads of State and Government participating in the meeting of the North Atlantic Council in Brussels 14 June 2021

      Important cybersecurity event

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL