Online security assessment framework helps businesses cope with increased use of personal devices

Employees increasingly access sensitive company data remotely, often from personal devices where social media networks hold a prominent place. Easy targets for cyber criminals? Members of the DOGONA consortium believe so, and they have devised a risk assessment framework to help businesses alleviate this threat.

EU's Call for Proposals: Innovative applications of drones for ensuring safety in transport

Develop and test technologies, operational and business models for the application of drones or drone swarms and other emerging technologies to increase the safety, security, public acceptance and overall efficiency of air, waterborne and surface transport, both passenger and cargo, including search and rescue applications.
Applications are closed

Singapore launched a new S$30 million Cybersecurity Capabilities Grant to strengthen the cyber resilience of the financial sector

The Monetary Authority of Singapore (MAS) today announced the launch of a new S$30 million Cybersecurity Capabilities Grant to strengthen the cyber resilience of the financial sector in Singapore and help financial institutions develop local talent in cybersecurity.

EU's Call for Proposals: Machine learning to detect Cyber intrusion and anomalies

The objective is to design an aircraft onboard security filter with an accuracy level of intrusion detection compatible with cyber protection objectives.
Applications are closed

EU's Call for Applications: Cybersecurity

The coordinated calls aim at exploiting synergies between these three sectors related to the aspect of digitalisation with a view to foster the development and implementation of coherent digital infrastructure and solutions across the various networks within the scope of the three CEF sectors.
Applications are closed

Global Study Finds Artificial Intelligence is Key Cybersecurity Weapon in the IoT Era

The research revealed that in the quest to protect data and other high-value assets, security systems incorporating machine learning and other AI-based technologies are essential for detecting and stopping attacks that target users and IoT devices.

Top Blockchain Messaging Apps: Crypto Messengers

Blockchain messaging apps are on the rise. Multiple platforms have entered the market this year, with more scheduled for release in the coming months.

EU Call for Proposals: Digital security, privacy, data protection and accountability in critical sectors

In critical vertical sectors/domains, cybersecurity technologies deployed in several application domains should be aligned to the specific domain needs, linking the demand and supply sides for such cyber technologies.
Applications are closed
10 months ago

Call for Applications: ‘Building Block’ technologies, infrastructures, and communities relied upon by digital security

The Open Technology Fund (OTF) is currently seeking applications for its Core Infrastructure Fund that supports the ‘building block’ technologies, infrastructures, and communities relied upon by digital security and circumvention tools strengthening internet freedom, digital security, and the overall health of the internet.
Applications are closed
a year ago

BlockChain: A Distributed Solution to Automotive Security and Privacy

We propose a BC-based architecture to protect the privacy of users and to increase the security of the vehicular ecosystem. Wireless remote software updates and other emerging services such as dynamic vehicle insurance fees are used to illustrate the efficacy of the proposed security architecture. We also qualitatively argue the resilience of the architecture against common security attacks.
a year ago

EU Call for Proposals: Cybersecurity in the Electrical Power and Energy System (EPES): an armour against cyber and privacy attacks and data breaches

The proposals should demonstrate how the actual EPES can be made resilient to growing and more sophisticated cyber and privacy attacks and data breaches (including personal data breaches) taking into account the developments of the grid towards a decentralised architecture and involving all stakeholders.
Applications are closed
a year ago

Singtel Innov8 and NUS to create Singapore's first regional cyber security start-up hub

ICE71 aims to strengthen Singapore’s growing cyber security ecosystem by attracting and developing competencies and new technologies.
a year ago

EU Call for Projects: Establishing and operating a pilot for a Cybersecurity Competence Network to develop and implement a common Cybersecurity Research & Innovation Roadmap

The objective of this topic is to scale up existing research for the benefit of the cybersecurity of the Digital Single Market, with solutions that can be marketable. For this, participants should in parallel propose, test, validate and exploit the possible organisational, functional, procedural, technological and operational setup of a cybersecurity competence network with a central competence hub.
Applications are closed
a year ago

Precision Security: Integrating Video Surveillance with Surrounding Environment Changes

This article presents a brain-inspired computing of attention value of surrounding environment changes (EC) with a processes-based cognition model by introducing a ratio value λ of EC-implications within considered periods.
a year ago

Asia Pacific Call for Proposals: The Cybersecurity Grants - Projects focusing on practical solutions around network resiliency and security

The Cybersecurity Grants supports projects focusing on practical solutions around network resiliency and security.
Applications are closed
a year ago

EU Call for Proposals: Inducement prize: Online security - Seamless personal authentication

Password protection has been the default method of authentication online to date. This simple mechanism has many advantages, but the use of usernames and passwords in practice is severely flawed in both security and usability. Other solutions, typically employed in conjunction with passwords in a multi-factor approach, usually improve the robustness of the authentication.
Applications are closed
a year ago

EU Call for Proposals: Toolkit for assessing and reducing cyber risks in hospitals and care centres to protect privacy/data/infrastructures

Development and implementation of innovative methods, tools, guidelines or best practices addressing the need for cybersecurity in hospitals including remote care and homecare settings e.g. for assessing risks and vulnerabilities of hospitals w.r.t cyberattacks; innovative cybersecurity measures; identification/authentication systems within hospitals taking into account cross-border requirements and usability; addressing cybersecurity in the whole lifecycle of a medical device.
Applications are closed
a year ago

EU - Japan Call for Proposals: Advanced technologies (Security/Cloud/IoT/BigData) for a hyper-connected society in the context of Smart City

Interoperability of IoT devices/platforms is of particular interest in the context of Smart Cities (the areas of energy, social infrastructure, traffic/transport, healthcare, and disaster/crime prevention) in order to promote collaboration between a variety of business operators and platforms connecting to various IoT devices, open source, standards, SDKs, common APIs, are the cornerstone of the EU-Japan collaboration.
Applications are closed
a year ago

France - Israel Call for Proposals: Joint R&D projects in Automotive and Cyber security

France and Israel are active members of Eureka and support innovation projects through the various Eureka instruments, including Eureka Network Projects. The two countries are now announcing a Call for proposals for joint R&D projects under the EUREKA Network Projects program.
Applications are closed
a year ago

U.S. Call for Proposals: Configuration Security Program to Make Network-Connected Systems Less Vulnerable

To address the challenges created by the proliferation of COTS devices and help harden the security surface of network-connected composed systems, DARPA has launched a new program called Configuration Security (ConSec). The program, just announced today, aims to develop a system to automatically generate, deploy, and manage inherently more secure configurations of components and subsystems for use in military platforms.
Applications are closed
a year ago

Gemalto launches the first biometric EMV card for contactless payments

Using fingerprint recognition instead of a PIN code to authenticate the cardholder, the card is compatible with existing payment terminals already installed in the country. When customers place their fingerprint on the sensor, a comparison is performed between the scanned fingerprint and the reference biometric data securely stored in the card.
a year ago

Thales and Gemalto Create a World Leader in Digital Security

By acquiring a global leader in trusted identities and data security, Thales adds over €3bn of revenue to its digital business sales and acquires a set of technologies and competencies that have applications in all of Thales’s five vertical markets. The combination creates a powerhouse with a solution portfolio including security software, expertise in biometrics and multifactor authentication and the issuance of secure digital and physical credentials.
a year ago

Top Ten IT Security Predictions For 2018

IoT is a major threat and possibly the biggest threat to businesses in the coming years. Unfortunately, it is not easy, and in some cases impossible, to bolt on security as an afterthought with IoT, and many organisations will find it challenging to deal with the consequences of such breaches.
a year ago

Home security system using internet of things

Home security is a very useful application of IoT and we are using it to create an inexpensive security system for homes as well as industrial use. The system will inform the owner about any unauthorized entry or whenever the door is opened by sending a notification to the user. After the user gets the notification, he can take the necessary actions.
a year ago

Italtel introduces Open Innovation Program with focus on the Internet of Things (IoT), Blockchain and Cybersecurity Technologies

Italtel has launched an Open Innovation program, which will see it collaborate with start-ups and new businesses to leverage emerging technologies for applications such as Industry 4.0, Smart Cities and Digital Healthcare.
Applications are closed
a year ago

SystemX launches New Call for Applications from Startups in Cybersecurity

The call for applications for START@SystemX Cybersecurity is an opportunity for startups to join the EIC (Environment for Interoperability and integration in Cybersecurity) project and test their innovative cybersecurity technologies or concepts on the CHESS (Cybersecurity Hardening Environment for Systems of Systems) platform.
Applications are closed
a year ago

The Design and Implementation of a Low Cost and High Security Smart Home System Based on Wi-Fi and SSL Technologies

In this paper, combined with Wi-Fi technology, Android system, cloud server and SSL security protocol, a new set of smart home system is designed, with low cost, easy operation, high security and stability.
a year ago

Atos’ Enterprise SSO as-a-Service brings password-free logins to both Cloud and on-premises applications

Atos, a global leader in digital transformation, launches Evidian Enterprise Single Sign-On as-a-Service (E-SSO aaS), through Bull, its brand for HPC and cybersecurity products. This is the only solution on the market that enables users to access their applications, without the need to enter passwords, on both Cloud-based and on-premises applications.
a year ago

Thales reveals the names of the 9 Startups selected to join its 6-month Cybersecurity programme at STATION F

During a rigorous selection process, Thales has chosen 9 startups (4 from France and 5 from abroad – Poland, US, Israel, Switzerland and Netherlands), adding value to the Group’s global cybersecurity offer and complementary to each other, offering clients solutions covering the whole cybersecurity chain.
a year ago

Gemalto and Ledger Join Forces to Provide Security Infrastructure for Cryptocurrency Based Activities

The solution also builds in the ability to execute blockchain-based smart contracts, which are self-enforcing, self-executing digitally signed contracts. Compared with traditionally brokered transactions, a secure blockchain application for cryptocurrency trading simplifies a financial organization's portfolio and contract management process by reducing costs and saving time.
a year ago

Integrated Security is a Top Business Priority for IoT Deployments

The Internet of Things (IoT) is increasingly permeating every aspect of consumer and enterprise activities. With the growth of microelectronics, ubiquitous connectivity, and cognition (predictive computing), IoT is poised for rapid growth.
a year ago

Convergence of IoT Applications Can Untangle Cybersecurity Challenges, says Frost & Sullivan

The future Internet of everything includes leveraging a common secure cloud infrastructure with an unified API for all application sectors
2 years ago

Go Ignite announced the Winners of the Second Global Search for Start-ups in Consumer Experience Artificial Intelligence, Connected Homes and Internet of Things Cyber Security

Go Ignite, an alliance of the world’s leading telcos including Deutsche Telekom, Orange, Singtel and Telefonica today announced the winners of the second global search for start-ups that offer the most innovative solutions for three key technologies including Consumer Experience Artificial Intelligence, Connected Homes and Internet of Things Cyber Security.
2 years ago

WISeKey and the Government of Andhra Pradesh, India announce collaboration to bring Security to BlockChain and Fintech Projects

The WISeKey Platform can be used to enhance the security of Citizens’ Identity, position citizens at the center of gravity of Government services using the WISeKey PKI based Blockchain technology as the solution to secure government-recorded data.
2 years ago

Security Management for The Internet of Things

This research work into security management of IoT involves five sections. We first point out the conception and background of the IoT. Then, the security requirements for the IoT have been discussed intensively. Next a proposed layered-security management architecture has been outlined and described. An example of how conveniently this proposed architecture can be used to come up with the security management for a network of the IoT is explained in detail.
2 years ago

Reverse Engineering and Security Evaluation of Commercial Tags for RFID-Based IoT Applications

IoT smart objects need to be somehow identified to determine the origin of the data and to automatically detect the elements around us. One of the best positioned technologies to perform identification is RFID (Radio Frequency Identification), which in the last years has gained a lot of popularity in applications like access control, payment cards or logistics. Despite its popularity, RFID security has not been properly handled in numerous applications.
2 years ago

WISeKey Unveils its New Citizen Digital Identity Platform to Bring Innovation and Security to Smart Cities across the Globe

WISeKey’s identity management and innovative cybersecurity solution for IOT will provide smart cities with a scalable, easily manageable object identity management and security solution when connecting to Microsoft Azure and other Microsoft-based platforms. The Managed WISeKey Root of Trust (RoT) serves as a common trust anchor, which is recognized by operating systems (OS) and applications to ensure the authenticity, confidentiality and integrity of on-line transactions.
2 years ago

Leading AI Cyber Security Firm, Darktrace, Raises $75 Million in Funding to Meet Company’s Growing Demand

Darktrace is recognized as the de facto leader in disruptive AI technology for cyber security, tackling the challenge of defending against ever more sophisticated cyber-attacks. Powered by machine learning and AI algorithms, Darktrace’s Enterprise Immune System technology is capable of detecting and responding to cyber-threats that evade legacy security controls, containing incidents before damage is done.
2 years ago

Automotive Industry Relies on Blockchain Platforms to Enhance Security in Increasingly Digitized Environment

By 2025, the total automotive industry's spend on technology is expected to be ~168.80 billion, with ~0.6 percent investment on blockchain technology due to their value in smart manufacturing, supply chain logistics, retailing & leasing, connected living & IoT (Internet of Things) and mobility services. Automotive original equipment manufacturers (OEMs) primarily employ blockchain technology in financial applications, but in the long term, they will extend their use to functional areas such as smart manufacturing and connected cars.
2 years ago

Optimized Hash Based Security System for Big Data

In this paper hash and PSO based security system is proposed for security of Big Data. The hash features are extracted in the spatial domain of the image through PSO to generate the image hash. The extracted hash is encrypted to maintain the secrecy.
2 years ago

Using Bitcoin to prevent Identity Theft

An attacker who hacked a public-key encryption system, for instance, might “certify”, or cryptographically assert the validity of, a false encryption key, to trick users into revealing secret information. But it couldn’t also decertify the true key without setting off alarms, so there would be two keys in circulation bearing certification from the same authority. The new system, which Tomescu developed together with his thesis advisor, Srini Devadas, the Edwin Sibley Webster Professor of Electrical Engineering and Computer Science at MIT, defends against such “equivocation.”
2 years ago

Zero-knowledge Security Layer to be Added to Quorum Blockchain Platform

The Zerocoin Electric Coin Company (ZECC), developers of the Zcash™ digital currency, today announced a partnership with J.P. Morgan, one of the world’s largest banks, to add technology from Zcash to J.P. Morgan's enterprise blockchain platform, Quorum.This technology will extend Quorum’s existing privacy protections, which already offer private smart contracts, to add cryptographically assured, private settlement of digitized assets on a distributed ledger without a central intermediary.
2 years ago

SECURIOT-2 Project will bring Security to the Internet of Things, TIEMPO SECURE Appointed as Project Leader

The goal of the SECURIOT-2 project is to develop a Secure Microcontroller (SMCU) that will bring to the IoT environment a high level of security, similar to the one in use in the secure transactions industry (banking cards, ePassports…). This SMCU will also include unique energy management functions to address the need for low power consumption specific to the Internet of Things.
2 years ago

TENSOR: A Technique to Enhance IoT Data Security using Bluetooth Low Energy Network for Smart Home Environment

The communication technology used in IoT differs from application to application. The end devices /sensors are not always connected directly to internet, instead they are connected through the gateway. The security is the challenging task in IoT due to heterogeneity of devices. All security algorithms are not energy efficient.The proposed technique deals with data security in smart health environment. The duplication of data is identified by the location of end devices. The results prove that the proposed technique enhances the data security.
2 years ago

A Cybersecurity Risk Assessment Framework that Integrates Value-Sensitive Design

In order to maximize the value created from cybersecurity risk mitigations, we review literature on the state of cybersecurity in the medical device industry, on cybersecurity risk management frameworks in the context of medical devices, and on how cybersecurity can be used as a value proposition. We then synthesize the key contributions of the literature into a framework that integrates cybersecurity value considerations for all relevant stakeholders into the risk mitigation process.
2 years ago

Web based Online Home Automation and Security System based on Wireless Video Streaming using Internet of Things

The main objective of the present work is to design a smart home using various sensors which can be controlled and monitored by the Raspberry Pi via the Internet of Things (IoT). This will help the house owners to provide a simple, fast and reliable way to automate their environment. This paper focuses on two aspects of smart home i.e. home automation and home security.
2 years ago

WISeKeyIoT, Public Key Infrastructure Framework Tailored for the Internet of Things

The solution, called WISeKeyIoT is a scalable framework, offering digital Public Key Infrastructure (PKI) certificates for connected devices, protected in certified tamper resistant silicon chips, as well as an outsourced or on-premises certificate management system, with device life cycle control functions and security enforcement entities. The digital PKI certificates can be signed by the publicly trusted root, owned by OISTE and operated by WISeKey.
2 years ago

Web Application Security Testing Market Can Leverage Machine Learning to Catalyse Growth Opportunities

Dedicated web application testing is fast becoming essential to any organisation’s cyber security approach. The rapid proliferation of connected devices and the direct links among applications, http protocol, and web services create numerous points of vulnerability for hackers to exploit. Machine learning technology offers an innovative way to prevent these attacks and optimise web application security testing.
2 years ago

MIT experts urge Trump administration to Take Immediate Action on Cybersecurity

In a new report based on a year of workshops with leaders from industry and government, the MIT team has made a series of recommendations for the Trump administration to develop a coherent cybersecurity plan that coordinates efforts across departments, encourages investment, and removes parts of key infrastructure like the electric grid from the internet.
2 years ago

IBM and SecureKey Technologies to Deliver Blockchain-Based Digital Identity Network for Consumers

IBM InterConnect and SecureKey Technologies announced they are working together to enable a new digital identity and attribute sharing network based on IBM Blockchain. The network will be designed to make it easier for consumers to verify they are who they say they are, in a privacy-enhanced, security-rich and efficient way. When launched later this year, consumers can use the network to instantly verify their identity for services such as new bank accounts, driver's licenses or utilities.
2 years ago

Cyber-Security in Smart Cities: the case of Dubai

The city of Dubai emerges as a leading partner in not only technology innovation but also designed infrastructure and strategic security. There is a strategy, which will globally add the city and leadership to the leading smart cities of the world. Considering current and future challenges, the strategic aim is to 'smart' wire the city of Dubai by 2020.
2 years ago

Integration of Blockchain Technology with Thales Hardware Security Module addresses Key Distributed Ledger Risks for Financial Services, Government, Healthcare and Other Sectors

Keys stored in the Thales HSM architecture cannot be extracted or used except under a highly controlled protocol. The new solution is based on the widely used nShield HSM developed by Thales and creates a simple path to large-scale commercial use of blockchain technology.
2 years ago

RuBee IO Application Framework Optimized Factory Automation with Secure Verified Blockchain Audits for Sensitive Items

RuBee Wireless is the only technology that has a proven zero safe separation distance on fused ordnance and on nuclear warheads (HERO ZERO). RuBee is safe on and near high explosives (HERF ZERO). RuBee wireless is secure and produces no Compromising Emanations, with no eavesdropping, target or tempest risk. Finally, RuBee has no nulls, or multipath interference so provides 100% read accuracy and can manage and optimize product flow on any factory floor on or near steel, and liquids.
2 years ago

ENISA report on Blockchain Technology and Security

Blockchain is a distributed ledger which maintains all transactions and assets and is updated by a number of counterparties. Financial institutions are investing in the technology - in what is hoped - to automate processes and remove “human” errors. This may help towards lowering transactional and operational costs by releasing the finance sector from its legacy systems.
2 years ago

Thales Releases Advanced Encryption Solutions for Secure Docker Containers, Simplified Deployment and Zero Downtime

Thales, a leader in critical information systems, cybersecurity and data security, today announced the release of new capabilities for its leading Vormetric Data Security Platform. These advances extend data-at-rest security capabilities with deeply integrated Docker encryption and access controls, the ability to encrypt and re-key data without having to take applications offline, FIPS certified remote administration and management of data security policies and protections, and the ability to accelerate the deployment of tokenization, static data masking and application encryption.
2 years ago

Home Security Systems: Wider Integration of ICT and Application of Big Data will Enhance Efficiency

The home security sector is shifting to a cyber-centric model, with pronounced emphasis on developing less-complicated, self-powered, connected devices. This shift has spawned the need to secure the entire lifecycle of the product. The changing definition of a "breach" is further compelling solution providers to secure their smart home security solutions from end to end.
2 years ago

UK Tech Start up Pimloc Uses Machine Learning and Artificial Intelligence to Develop Image Protection and Security Platform

Pimloc, a new tech start up that uses machine learning and artificial intelligence, today announced it is developing a suite of image and video management solutions for businesses and private users who want their private images to stay private.
2 years ago

WISeKey and Indian Potash Limited to set up Cybersecurity/IoT Platform – an Ecosystem Connecting 140 Million Farmers and 200 Companies in India

The project is aiming to enable the evolution of IPL’s end-user base of 140 million farmers with digital identification for people and objects including the secure connection of over 200 distribution channels into a Trusted Cybersecurity Platform enabling farmer empowerment by inclusive eco-systems. Farmers and distributors will be enabled with the latest Digital Identity and IoT technologies allowing them to be authenticated and allowing them preferential tailor made access to data through a trusted exchange between IPL, farmer’s communities, government entities and private enterprises.
2 years ago

IoT Privacy and Security Challenges for Smart Home Environments

Often the Internet of Things (IoT) is considered as a single problem domain, with proposed solutions intended to be applied across a wide range of applications. However, the privacy and security needs of critical engineering infrastructure or sensitive commercial operations are very different to the needs of a domestic Smart Home environment.
3 years ago

NYU Researchers Report Cybersecurity Risks In 3D Printing

In the paper, the researchers examined two aspects of 3D printing that have cybersecurity implications: printing orientation and insertion of fine defects.
3 years ago

Big Data Security and Privacy Issues in the Cloud

This paper reviews the existing technologies and a wide array of both earlier and state-ofthe-art projects on cloud security and privacy. We categorize the existing research according to the cloud reference architecture orchestration, resource control, physical resource, and cloud service management layers, in addition to reviewing the recent developments for enhancing the Apache Hadoop security as one of the most deployed big data infrastructures.
3 years ago

Australian Fintech Opens up Vast Opportunities for ICT Companies in Security, Cloud, Managed Services, Blockchains, Artificial Intelligence, Biometrics and Data Centre, says Frost & Sullivan

Data and connection security will be the most significant challenge for Fintech companies in Australia; largely because mobile payments make up the majority of the revenues of all the Fintech segments. Reliable security will be a key issue and an important selling point to ensure success as this will allow Fintechs to build consumer trust in order to grow and compete with established institutions. Australian Fintechs need to partner and collaborate with security vendors and ICT companies to improve the security and connectivity of increasingly mobile-centric financial services and to protect a user's financial data.
3 years ago

Smart Cities: A Survey on Security Concerns

A smart city is developed, deployed and maintained with the help of Internet of Things (IoT). The smart cities have become an emerging phenomena with rapid urban growth and boost in the field of information technology. However, the function and operation of a smart city is subject to the pivotal development of security architectures.
3 years ago

Hyundai's Roadmap for Connected Car will focus on Open Innovation in Big data Analytics, Cloud Technology, In-Vehicle Networks and Connected Car Security

This initiative will provide users with a hub of infinite knowledge, plus the ability to analyze and utilize all information to enhance owner's lives. The 'Hyper-connected and Intelligent Car' goes beyond converging communications technology and the vehicle to become a 'High-Performing Computer on Wheels'.
3 years ago

ISACA/RSA Conference survey shows that cybersecurity is still seen as a technology issue, not a business imperative

Cybersecurity is now front and center on organizations’ boardroom agendas, but most chief information security officers (CISOs) have yet to earn a seat at the table. According to a study by ISACA and RSA Conference, 82 percent of cybersecurity and information security professionals polled in the survey report that their board of directors is concerned or very concerned about cybersecurity, but only 1 in 7 (14 percent) CISOs reports to the CEO.
3 years ago

Aviation Cyber Security Market worth 61.85 Billion USD by 2020

The global aviation cyber security market is projected to reach USD 61.85 Billion by 2020, at a CAGR of 9.34% from 2015 to 2020. This growth is mainly attributed to rise in cyber-threats and cybercrimes by professional attackers on aerospace and defense organizations, thereby creating a threat to the national security.
3 years ago

No more posts.