This may look like a fun tree house. But look closer and you find all kinds of high-tech security including a biometric fingerprint lock
“Unique to this project was the high site security required by the client. “Someone from the client’s security detail remained with our craftsmen at every moment — even to the toilet or while waiting outside of the door to enter. My staff was required to hand in their passports, mobile phones and cameras to armed security personnel at the main entrance,” says Payne.”
Actually nothing to do with icrecream, but CSO highlights a variety of digital breaches
The Verizon RISK Team performs cyber investigations for hundreds of commercial enterprises and government agencies annually across the globe. In 2015, they investigated more than 500 cybersecurity incidents. They shared some of the details in a recent report of how they solved the cyber crimes.
Israel based Clipfort’s sensor-equipped magazines have fingerprint identification to prevent an unauthorized user from loading ammunition. The biometrics, built into the clip, are being designed for most guns, the company says.
ID confirmation takes 0.7 seconds. Given a match, the clip can load bullets until the magazine is removed from the gun.
K2, founded by corporate investigators Jules Kroll and his son Jeremy, has been bulking up its cyber-response unit with former FBI agents. AIG, one of the first firms to offer insurance for property damage caused by hackers, is counting on Berglas' team to investigate attacks on policyholders. It's also asking K2 to provide data on threats to protect clients from events that could cost hundreds of millions of dollars.
"We'd like to aggregate that data to use for ourselves, but also to use for our clients so they know what industries are being targeted by what type of attackers, what the motivation is, if it's on the rise," said Tracie Grella, who oversees cybercoverage at AIG for clients including retailers, banks and energy companies.
Grella said AIG will offer coverage limits of as much as $100 million for property damage and $100 million in bodily injury caused by a cyberattack. She predicts the market could balloon to $10 billion in annual premiums by 2020, compared with about $2 billion this year, as more companies buy policies.
The first two-thirds of the cyber analysis course consist of mundane but essential subjects meant to help students understand the making and breaking of computer systems. These include math, basic programming, Windows and Unix operating systems, and the science behind networks and wireless technologies. Then students move on to the fundamentals of hacking: target research, signal analysis, network defense, and malware. They learn to hack a simulated network with open source software and tools such as Metasploit. The curriculum is adjusted to keep pace with advances in both offensive and defensive tactics, an unusual challenge for the military, says Maureen Fox, CID’s commanding officer. “Missile technology changes, but it doesn’t change in a day or an hour,” she says. “The technology in the area we’re in does.”
BusinessWeek in a story on US Navy’s Corry Station base in Pensacola, FL
sounds counter-intuitive but what Google is doing internally according to the WSJ
“With this approach, trust is moved from the network level to the device level. Employees can only access corporate applications with a device that is procured and actively managed by the company. In this setup, Google requires a device inventory database that keeps track of computers and mobile devices issued to employees as well as changes made to those devices.
After the device is authenticated, the next step involves securely identifying the user. Google tracks and manages all employees in a user database and a group database that is tied into the company’s human resources processes. These databases are updated as employees join the company, change responsibilities or leave the company. There’s also a single sign-on system, a user authentication portal that validates employee use against the user database and group database, generating short-lived authorization for access to specific resources.”
First you establish a baseline pattern for a system as it operates normally. PFP sees a particular opportunity in poorly protected infrastructure systems, so take a protective relay for example. That's a device used to sense and cut off voltage surges on power lines.
Once the power signature for the device is recorded, PFP's monitor can detect even the smallest change in that pattern. Maybe the relay has stopped functioning properly—or perhaps a hacker has implanted a piece of malicious code in it. Either way, the technology can alert a human technician to the anomaly within milliseconds.
The technology, made up of sensors and software that analyzes what the sensors pick up, was developed in 2006 at Virginia Tech by Jeffrey Reed, a professor of electrical and computer engineering, and Carlos Aguayo Gonzalez, one of his Ph.D. students at the time. The research was inspired by the side-channel attack, a way of breaking into an encrypted system by analyzing physical signals such as heat and power consumption, says Reed, PFP's president.