Ericsson Reveals Container-Based 5G ‘First’ With Telstra

Sdxcentral | December 18, 2019

Ericsson says it has, with an assist from Telstra, deployed the first cloud-native and container-based evolved packet core for 4G and 5G services. The Australian network operator launched limited 5G services on Ericsson equipment in May and has been building out its coverage to reach at least 35 cities during the first half of 2020. Telstra deployed Ericsson’s evolved packet core technology in its network functions virtualization infrastructure (NFVI) and is now carrying live 4G and 5G Non-Standalone (NSA) traffic on its mobile core network, according to a joint announcement. Ericsson describes the successful deployment as a “significant milestone in network orchestration and automation” because it will enable Telstra and other operators that use the technology to build a web-scale core network.

Spotlight

The security holes in virtual environments open up enterprises to threats that may result in business disruption, data theft, and financial loss. Cybercriminals leverage web server and web applications’ vulnerabilities to access parts of a company’s servers that they should not be able to. These vulnerabilities can be used to access company assets ranging from customer databases to trade secrets. The stolen information can be sold in underground forums or used to launch a far more damaging attack.


Other News
SERVER HYPERVISORS

VMware Prevents 100% of Critical Attacks Tested During MITRE Engenuity ATT&CK® Evaluation

VMware | April 05, 2022

Today, VMware, Inc. (NYSE:VMW) announced the results of its successful completion of the MITRE Engenuity ATT&CK® Evaluation. VMware security solutions were put to the test in their detection and prevention of attack techniques used by Wizard Spider, a financially motivated cybercriminal group, and Sandworm, a destructive threat group that the U.S. and U.K. have attributed to Russia. Modern cyberattacks are sophisticated, multi-step assaults launched by bad actors who disguise themselves in the noise of multi-cloud environments. During the evaluation, VMware delivered critical preventions in 100% of the cases tested with zero configuration changes. The combination of VMware endpoint and network security provides customers with effective security that is easier to operate and designed specifically for the threats businesses and governments face today. “MITRE Engenuity’s rigorous testing reflects the type of threats that our customers are seeing in the real world, where there are no redo’s,” said Scott Lundgren, Chief Technology Officer of VMware’s Security Business Unit. “With highly effective detection and prevention, our results demonstrate the power of VMware’s comprehensive endpoint and network visibility, which not only works out of the box, but also works the first time.” About MITRE Engenuity MITRE Engenuity, a subsidiary of MITRE, is a tech foundation for the public good. MITRE’s mission-driven teams are dedicated to solving problems for a safer world. Through our public-private partnerships and federally funded R&D centers, we work across government and in partnership with industry to tackle challenges to the safety, stability, and well-being of our nation. MITRE Engenuity brings MITRE’s deep technical know-how and systems thinking to the private sector to solve complex challenges that government alone cannot solve. MITRE Engenuity catalyzes the collective R&D strength of the broader U.S. federal government, academia, and private sector to tackle national and global challenges, such as protecting critical infrastructure, creating a resilient semiconductor ecosystem, building a genomics center for public good, accelerating use case innovation in 5G, and democratizing threat-informed cyber defense. About VMware VMware is a leading provider of multi-cloud services for all apps, enabling digital innovation with enterprise control. As a trusted foundation to accelerate innovation, VMware software gives businesses the flexibility and choice they need to build the future. Headquartered in Palo Alto, California, VMware is committed to building a better future through the company’s 2030 Agenda

Read More

VPN

Exidio Launches First-of-Its-Kind Decentralized VPN App for IOS/Android

Exidio | December 16, 2021

Following their initial launch in 2020, Exidio expands their offerings to include mobile app devices including apps for Exidio and Sentinel, creating custom open source applications on a peer-to-peer bandwidth network for optimal protection. This tech provides people with secured and easily accessible information using dVPN to protect users from shared data and encrypt all personal information. While many in Western countries don’t experience the impact of controlling governments, globally people are actively controlled by local and national governments or external groups. Using services, like those that Exidio and Sentinel offer, can give freedom to the users to effectively communicate or manage sensitive information. Exidio changes the landscape of mistrust and obscurity within the VPN industry by creating custom, white label applications that connect to the Sentinel node network, a decentralized peer-to-peer node network. Ensuring privacy and security, Exidio can prove a users' web traffic and metadata is end-to-end encrypted. Exidio cannot access the traffic, nor can a node host view the web traffic or metadata of a user. Exidio builds open source applications allowing anyone to check its codebase. The Sentinel Ecosystem consists of the Sentinel node network, the dVPN user base, communities of open source code contributors, and companies integrating the Sentinel node network. Since its inception in 2018, the Sentinel Ecosystem has seen significant growth. By sharing an app version for this tech, people will be able to access more easily and integrate into the fast communications and processes of a mobile device. Whether participating at a protest or just texting a friend on a sidewalk, this tech will protect people who are at risk of federal detention or worse, physical abuse and harm, at the hands of controlling groups. About Exidio Exidio is the leader in transparent, end-to-end encrypted VPN technology. Exidio builds beautiful applications empowering consumers and businesses to reclaim their digital privacy and security. Leveraging open-source code and decentralized networks, Exidio is bringing a new paradigm of transparency to the VPN space. Customers can download our application to access websites and stream videos from around the world, reclaim their online security and free themselves from third-party surveillance. About Sentinel Sentinel is the first scalable framework allowing for dVPNs to utilize shared resources, reducing the overall network carbon footprint The goal of the Sentinel ecosystem to decentralize the VPN industry and introduce the ‘dVPN’ to the mainstream consumer.

Read More

VPN

A2i Selects BlastWave's BlastShield Passwordless Software-Defined Perimeter Solution

BlastWave | December 17, 2021

BlastWave, a developer of software-defined perimeter (SDP) solutions that protect networks from inadvertent and intentional threats, announced that A2i systems selected its BlastShield solution to protect A2i's internal network and remote customer access. BlastShield is the first all-in-one SDP patented solution that combines infrastructure cloaking and passwordless multi-factor authentication (MFA) for identity-based secure remote network access for organizations that've adopted a zero-trust security model. BlastShield enables organizations to hide on-premise and cloud workloads from outsiders and insider threats, concealing an organization's infrastructure from cyberattacks through software-defined microsegmentation without modifications to existing network fabric and hardware. BlastWave's novel approach solves the three most critical steps in the cyber kill chain for an attacker: (1) account takeover; (2) lateral movement; and (3) remote access compromise. In addition, BlastShield helps prevent and isolate attacks mitigating the spread of malware, reducing the blast radius. BlastShield also enables cloud-native app development by securing microservices, containers and Kubernetes clusters. A2i Systems provides the first secure pricing optimization solution in the retail fuel industry through their flagship product, PriceCast Fuel. A2i Systems utilizes customer-centric AI by detecting behavioral patterns in Big Data and dynamically mapping customer and competitor behaviors to identify the optimal price for consumers throughout the day. As a result, A2i can now help customers price strategically instead of tactically through their cloud-hosted services that move them on to the most advanced fuel price management system currently available. In the wake of recent supply chain attacks, we recognized that VPN-based solutions simply cannot provide the level of protection we require for our critical data and remote access. The security of our data and our customers' data is our highest priority and we needed a secure platform to provide access to our hybrid data services, hosted both in the cloud and on-premise. BlastShield filled both these needs for us with their patented solution." Emil Erlandsson, Vice President of Professional Services at A2i After a comprehensive proof of concept (PoC) using BlastShield's Free Starter Package solution, A2i selected BlastShield and began deploying BlastShield's Invisible peer-to-peer software-defined perimeter solution for initially for internal use for secure remote access. "We're excited to partner with A2i systems on this project," says Tom Sego, CEO BlastWave. "By combining A2i's revolutionary AI-based fuel pricing solution with BlastWave's patented invisible SDP, A2i customers will enjoy the benefits of state-of-the-art pricing optimization while mitigating the risk of supply chain attacks." About BlastWave Founded by former executives and technologists from Apple and Cisco, BlastWave is taking a fundamentally different approach to security aimed at protecting privacy and connected devices from cyberattacks. BlastWave's patented product, BlastShield, is an all-in-one-zero trust stack that combines state-of-the-art passwordless multi-factor authentication with high-performance, resilient encrypted connectivity and built-in microsegmentation. In addition to protecting servers and IoT devices, BlastShield also secures containers that are orchestrated with Kubernetes, enabling more agile and efficient cloud-native application development. BlastWave is backed by Rocket Strategies, Lucas Venture Group, and Millennium Investments. The company is headquartered in Palo Alto, California. About A2i Headquartered in Copenhagen, Denmark, A2i uses ground-breaking Artificial Intelligence (AI) technology to make advancements in ways to interact with your customers at the forecourt. We are giving you the opportunity to transform your business and be ready for the next phase of Fuel Retail. Our product, PriceCast Fuel (PCF) is the world's first industry-specific retail fuel pricing, management and optimization solution developed by A2i. By combining state-of-the-art AI and Machine Learning with Big Data, PCF brings dynamic, predictive consumer-behavior-based pricing to the retail fuel industry providing a fully automated pricing decision system capable of achieving location-specific objectives optimally within any given corporate constraints. By applying self-learning capabilities, PCF continuously assures the highest accuracy prediction in an ever-changing market.

Read More

VPN

NordVPN extension now on Microsoft Edge

NordVPN | December 15, 2021

NordVPN has officially launched the NordVPN extension for Microsoft Edge browser, available on all platforms compatible with Edge. The new extension is extremely light and fast so users can switch between locations within seconds. Microsoft Edge browser is based on Chromium, which means users can install the NordVPN extension via the Chrome Web Store. With this release, NordVPN is unlocking full official support for people who were already using other NordVPN extensions on Edge. We knew many users were installing the NordVPN extension for Chrome on the Microsoft Edge browser. That's why we decided to improve their experience by releasing an official NordVPN extension designed for Edge. In terms of functionality, the new extension works exactly the same way as the ones for Chrome and Firefox, giving users a seamless experience across browsers." Vykintas Maknickas, Product Strategist at NordVPN Apart from Edge, NordVPN has browser extensions for both Google Chrome and Mozilla Firefox. "We're constantly looking for ways to enhance our user experience. For example, we recently added M1 Mac compatibility and increased our bug bounty program to $50K for all Nord brands, including NordPass, NordLocker, and NordLayer. As part of a broader effort to shift Nord Security and our brands into a broader cybersecurity suite, pushing all of these initiatives brings us closer to doing exactly this," says Vykintas Maknickas from NordVPN. To stress the importance of privacy online, NordVPN recently released the findings of its research on browser cookies and how browsing habits create different privacy and security risks. NordVPN is the first brand in the Nord Security family of products and was established in 2012. NordVPN became the premier VPN solution of choice worldwide throughout the years, now serving more than 14 million users. Nord Security has also expanded its scope to include security solutions for businesses and advanced encryption tools for consumers, including NordPass, NordLocker, and NordLayer. About NordVPN NordVPN is the world's most advanced VPN service provider used by over 14 million internet users worldwide. NordVPN provides double VPN encryption, malware blocking, and Onion Over VPN. The product is very user-friendly, offers one of the best prices on the market, has over 5,000 servers in 60 countries worldwide. One of the key features of NordVPN is the zero-log policy.

Read More

Spotlight

The security holes in virtual environments open up enterprises to threats that may result in business disruption, data theft, and financial loss. Cybercriminals leverage web server and web applications’ vulnerabilities to access parts of a company’s servers that they should not be able to. These vulnerabilities can be used to access company assets ranging from customer databases to trade secrets. The stolen information can be sold in underground forums or used to launch a far more damaging attack.

Resources