Search This Blog

Powered by Blogger.

Blog Archive

Labels

Showing posts with label Security Framework. Show all posts

The Growing Concern Regarding Privacy in Connected Cars

 

Data collection and use raise serious privacy concerns, even though they can improve driving safety, efficiency, and the whole experience. The automotive industry's ability to collect, analyse, and exchange such data outpaces the legislative frameworks intended to protect individuals. In numerous cases, car owners have no information or control over how their data is used, let alone how it is shared with third parties. 

The FIA European Bureau feels it is time to face these challenges straight on. As advocates for driver and car owners' rights, we are calling for clearer, more open policies that restore individuals' control over their data. This is why, in partnership with Privacy4Cars, we are hosting an event called "Driving Data Rights: Enhancing Privacy and Control in Connected Cars" on November 19th in Brussels. The event will bring together policymakers, industry executives, and civil society to explore current gaps in legislation and industry practices, as well as how we can secure enhanced data protection for all. 

Balancing innovation with privacy 

A recent Privacy4Cars report identifies alarming industry patterns, demonstrating that many organisations are not fully compliant with GDPR laws. Data transparency, security, and consent methods are often lacking, exposing consumers to data misuse. These findings highlight the critical need for reforms that allow individuals more control over their data while ensuring that privacy is not sacrificed in the sake of innovation.

The benefits of connected vehicle data are apparent. Data has the potential to alter the automotive industry in a variety of ways, including improved road safety, predictive maintenance, and enhanced driving experiences. However, this should not be at the expense of individual private rights. 

As the automobile sector evolves, authorities and industry stakeholders must strike the correct balance between innovation and privacy protection. Stronger enforcement of existing regulations, as well as the creation of new frameworks that suit the unique needs of connected vehicles, are required. Car owners should have a say in how their data is utilised and be confident that it is managed properly. 

Shaping the future of data privacy in cars 

The forthcoming event on November 19th will provide an opportunity to dig deeper into these concerns. Key stakeholders from the European Commission, the automotive industry, and privacy experts will meet to discuss the present legal landscape and what else can be done to protect persons in this fast changing environment. 

The agenda includes presentations from Privacy4Cars on the most recent findings on automotive privacy practices, a panel discussion with automotive industry experts, and case studies demonstrating real-world examples of data misuse and third-party access. 

Connected cars are the future of mobility, but it must be founded on confidence and transparency. By giving individuals authority over their personal data, we can build a system that benefits everyone—drivers, manufacturers, and society as a whole. The FIA European Bureau is committed to collaborating with all parties to make this happen.

Here's How to Solve Top Challenges in Data Storage

 

Data volumes are not only expanding, but also accelerating and diversifying. According to recent IDG research, data professionals state that data volumes are rising by 63 percent every month on average in their organisations. The majority of these organisations also collect data from 400 or more sources; 20% of respondents report having over 1,000 data sources. 

The result is an increasing demand for dependable, scalable storage. Companies want systems that can do more than just store data in an IT ecosystem informed by evolving compliance, agility, and sustainability requirements. Here are three of the most common data storage challenges, along with how suitable remedies can help. 

Top three challenges in data storage 

While more data opens up greater options for analytics and insight, the sheer volume of data collected and stored by companies creates issues. Three of the most major problems are security, complexity, and efficiency. 

Companies require storage security frameworks that prioritise cyber resilience, as cyberattacks are inevitable. According to Ben Jastrab, director of storage product marketing at Dell Technologies, “this is such a big topic, and such an important one. Every company in every industry is worried.”A zero-trust framework built on least privilege principles and advanced detecting technologies can assist businesses in identifying storage attacks and minimise the damage done. 

Storage faces additional challenges as complexity increases. IT teams can easily become complacent when it comes to purchasing, maintaining, and replacing physical hardware, as well as adopting, monitoring, and upgrading storage software. "Companies have more things to manage than ever," explains Jastrab. "To make the most of storage, they need to automate operations.” 

More data, less time. Higher expenses and lower costs. Higher demands and a smaller pool of skilled staff. These common challenges share a unifying thread: efficiency. Companies that can increase the efficiency of their storage solutions will be better prepared to manage the ever-changing storage landscape. 

Consider the recent data from the United States Energy Information Administration, which estimates that wholesale power rates would be 20% to 60% higher this winter than in 2022. As storage volumes grow, companies require a solution to cut physical footprints and energy costs.

Here's Why Robust Space Security Framework is Need of the Hour

 

Satellite systems are critical for communication, weather monitoring, navigation, Internet access, and numerous other purposes. These systems, however, suffer multiple challenges that jeopardise their security and integrity. To tackle these challenges, we must establish a strong cybersecurity framework to safeguard satellite operations.

Cyber threats to satellites 

Satellite systems suffer a wide range of threats, including denial-of-service (DoS) attacks and malware infiltration, as well as unauthorised access and damage triggered by other objects in their orbit that hinder digital communications. 

For satellite systems, these major threats can distort sensor systems, resulting in harmful actions based on inaccurate data. For example, a faulty sensor system could cause a satellite's orbit path to collide with another satellite or natural space object. If a sensor system fails, it may result in the failure of other space and terrestrial systems that rely on it. Jamming or sending unauthorised satellite guidance and control commands has the potential to destroy other orbiting space spacecraft.

DoS attacks can lead satellites to become unresponsive or, worse, shut down. Satellite debris fallout could pose a physical safety risk and damage to other countries' space vehicles or the earth. Malware installed within systems via insufficiently secured access points may have an influence on the satellite and spread to other systems with which it communicates. 

Many of the 45,000 satellites have been in service for years and have minimal (if any) built-in cybersecurity protection. Consider the Vanguard 1 (1958 Beta 2), a small, solar-powered satellite that orbits Earth. It was launched by the United States on March 17, 1958, and is the oldest satellite still orbiting the earth.

Given potential risks that satellites face, a comprehensive cybersecurity strategy is required to mitigate such risks. Engineering universities and tech organisations must also work with government agencies and other entities that design and build satellites to develop and execute a comprehensive cybersecurity, privacy, and resilience framework to regulate industries that are expanding their use of space vehicles. 

Cybersecurity framework

The NIST Cybersecurity Framework (CSF) outlines five critical processes for mitigating common threats, including those related with satellite systems: identify, protect, detect, respond, and recover.

Identify

First, identify the satellite data, individuals, personnel, systems, and facilities that support the satellite's uses goals, and objectives. Document the location of each satellite, as well as the links between each satellite component and other systems. Knowing which data is involved and how it is encrypted can help with contingency, continuity, and disaster recovery planning. Finally, understand your risk landscape and any elements that may affect the mission so that you can plan for and avoid potential incidents. This information will aid in the successful management of cybersecurity risk for satellite systems and its associated components, assets, data, and capabilities. 

Protect

Using the recently identified data, choose, develop, and implement the satellite's security ecosystem to best protect all of its components and associated services. Be aware that traditional space operations and vehicles typically rely on proprietary software and hardware that were not intended for a highly networked satellite, cyber, and data environment. As a result, legacy components may lack certain security measures. As a result, create, design, and use verification procedures to prevent loss of assurance or functionality in satellite systems' physical, logical, and ground parts, as well as to allow for response to and recovery from cybersecurity incidents. To protect satellite systems, physical and logical components must be secured, access limits monitored, and cybersecurity training made available.

Detect 

Create and implement relevant actions to monitor satellite systems, connections, and physical components for unforeseen incidents and alert users and applications of their detection. Use monitoring to spot anomalies within space components, and put in place a strategy for dealing with them. Use many sensors and sources to correlate events, monitor satellite information systems, and maintain access to ground segment facilities in order to detect potential security breaches. 

Respond

Take appropriate actions to mitigate the impact of a cybersecurity attack or unusual incident on a satellite system, ground network, or digital ecosystem. Cybersecurity teams should inform key stakeholders regarding the incident and its implications. They should also put in place systems for responding to and mitigating new, known, and anticipated threats or vulnerabilities, as well as continuously improving these processes based on lessons learned. 

Recover 

Create and implement necessary activities to preserve cybersecurity and resilience, as well as to restore any capabilities or services that have been impaired as a result of a cybersecurity event. The objectives are to quickly restore satellite systems and associated components to normal functioning, return the organisation to its appropriate operational state, and prevent the same type of incident from recurring.

As our world continues to rely on satellite technology, cyber threats will emerge and adapt. It is critical to safeguard these systems by developing a comprehensive cybersecurity framework that outlines the way to design, create, and operate them. Such a structure enables organisations to respond effectively to incidents, recover swiftly from interruptions, and remain ahead of potential threats.

Experts Predict AI to Create Job Opportunities in Energy Sector

 

The latest the findings from Airswift's ninth annual Global Energy Talent Index (GETI) survey show a significant shift in opinion of the impact of artificial intelligence (AI) on the employment market in the energy industry. Contrary to popular belief, more than 90% of questioned experts believe AI will increase the necessity for human skills ranging from technical proficiency to creativity and problem-solving ability. Furthermore, nearly half of respondents (46%) believe that AI deployments will lead to higher earnings.

The survey, which includes insights from 12,000 professionals in 149 countries, highlights the numerous perceived benefits of AI integration in the workplace. The predicted increase in productivity is the most important of these benefits, according to 74% of respondents. Furthermore, 60% feel that AI will improve their career prospects and job satisfaction.Notably, more than half of the participants (54%) are optimistic about improved work-life balance, noting AI's ability to streamline activities and free up more leisure time. 

AI concerns and hurdles 

Despite the general optimism, professionals raise concerns about AI's impacts in the workplace. The perceived lack of human touch associated with AI is the most common fear, according to 42% of respondents. Moreover, 33% of respondents expressed concerns about potential misuse or inadequate adoption due to insufficient training. Cybersecurity issues are also a source of conflict, with 30% expressing concern about potential vulnerabilities.

Furthermore, the survey indicates a significant gap in AI policies among workplaces. Half of the respondents say their organisations do not have AI policies, while 17% are unsure whether such regulations exist. Only 52% of respondents who acknowledge the presence of AI policy confirm coverage of critical areas such as data protection and security. 

Professionals report various challenges to widespread AI adoption, such as ambiguity about appropriate AI tools and a perceived lack of investment. Despite these limitations, the overall sentiment remains positive, with 82% of respondents believing AI has the ability to improve the energy sector.

While 82% of energy professionals are optimistic about AI's potential, substantial impediments prevent widespread deployment. Among these challenges are concerns about which AI technologies to utilise and a perceived lack of investment in AI initiatives. These constraints lead to a slower rate of AI integration in the energy sector, with only 24% of oil and gas personnel now using AI technologies in their jobs.

Sector-specific data 

The survey analyses sector-specific perceptions of AI integration. Notably, professionals in the nuclear energy sector have a particularly positive perspective, with 69% expecting AI to drive productivity gains in the next two years. In contrast, individuals in the oil and gas sector report the lowest levels of AI integration, with only 24% incorporating AI technologies into their employment.

The GETI report provides insight into how AI use is changing in the energy sector and highlights professionals' varied points of view. Though there is a lot of hope for AI's potential advantages, worries about how it may impact cybersecurity, legal frameworks, and the nature of jobs persist. In order to fully utilise the technology's potential to encourage innovation and long-term growth, the industry will need to take proactive steps to plug talent gaps, improve cybersecurity processes, and promote a culture of responsible AI adoption.

Russian Hackers Target Ukraine's Fighter Jet Supplier

 

A cyberattack on a Ukrainian fighter aircraft supplier has been reported, raising concerns about whether cybersecurity risks in the region are increasing. The incident—attributed to Russian hackers—highlights the need to have robust cyber defense strategies in a world where everything is connected.

According to a recent article in The Telegraph,  the cyber attack targeted Ukraine's key supplier for fighter jets. The attackers, suspected to have ties to Russian cyber espionage, aimed to compromise sensitive information related to defense capabilities. Such incidents have far-reaching consequences, as they not only threaten national security but also highlight the vulnerability of critical infrastructure to sophisticated cyber threats.

Yahoo News further reports that Ukrainian cyber defense officials are actively responding to the attack, emphasizing the need for a proactive and resilient cybersecurity framework. The involvement of top Ukrainian cyber defense officials indicates the gravity of the situation and the concerted efforts being made to mitigate potential damage. Cybersecurity has become a top priority for nations globally, with the constant evolution of cyber threats necessitating swift and effective countermeasures.

The attack on the fighter jet supplier raises questions about the motivations behind such cyber intrusions. In the context of geopolitical tensions, cyber warfare has become a tool for state-sponsored actors to exert influence and gather intelligence. The incident reinforces the need for nations to bolster their cyber defenses and collaborate on international efforts to combat cyber threats.

As technology continues to advance, the interconnectedness of critical systems poses a challenge for governments and organizations worldwide. The Telegraph's report highlights the urgency for nations to invest in cybersecurity infrastructure, adopt best practices, and foster international cooperation to tackle the escalating threat landscape.

The cyberattack on the supplier of fighter jets to Ukraine is an alarming indicator of how constantly changing the dangers to global security are. For countries to survive in the increasingly digital world, bolstering cybersecurity protocols is critical. The event emphasizes the necessity of a proactive approach to cybersecurity, where cooperation and information exchange are essential components in preventing cyberattacks by state-sponsored actors.

India Strengthens Crypto Crime Vigilance with Dark Net Monitor Deployment

India has made a considerable effort to prevent crypto-related criminal activity by establishing a Dark Net monitor. This most recent development demonstrates the government's dedication to policing the cryptocurrency market and safeguarding individuals from potential risks.

India has made a considerable effort to prevent crypto-related criminal activity by putting in place a Dark Net monitor. This most recent development demonstrates the government's dedication to overseeing the cryptocurrency industry and safeguarding citizens from any potential risks.

Drug trafficking, cyberattacks, and financial crimes using cryptocurrency are just a few of the criminal activities that have long been the center of the Dark Net, a secret area of the internet. Indian officials hope to efficiently identify and stop these illegal activities by implementing a Dark Net monitor.

According to officials, this cutting-edge technology will provide critical insights into the operations of cybercriminals within the crypto space. By monitoring activities on the Dark Net, law enforcement agencies can gain intelligence on potential threats and take proactive measures to safeguard the interests of the public.

Sneha Deshmukh, a cybersecurity expert, commended this move, stating, "The deployment of a Dark Net monitor is a crucial step towards ensuring a secure and regulated crypto environment in India. It demonstrates the government's dedication to staying ahead of emerging threats in the digital landscape."

India's stance on cryptocurrencies has been closely watched by the global community. The government has expressed concerns about the potential misuse of digital currencies for illegal activities, money laundering, and tax evasion. The deployment of a Dark Net monitor aligns with India's broader strategy to strike a balance between innovation and regulation in the crypto space.

A spokesperson for the Ministry of Finance emphasized, "We recognize the transformative potential of blockchain technology and cryptocurrencies. However, it is imperative to establish a robust framework to prevent their misuse. The Dark Net monitor is a crucial tool in achieving this goal."

Experts believe that this move will bolster confidence among investors and industry stakeholders, signaling a proactive approach towards ensuring a secure crypto ecosystem. By leveraging advanced technology, India is poised to set a precedent for other nations grappling with similar challenges in the crypto space.

Initiatives like the deployment of the Dark Net monitor show India's commitment to staying at the forefront of regulatory innovation as the global crypto scene changes. This move is anticipated to be crucial in determining how cryptocurrencies will evolve in the nation and open the door for a more secure and safe digital financial ecosystem.

Security Professionals Propose Guidelines for AI Development in an Open Letter

 

A new voluntary framework for designing artificial intelligence products ethically has been revealed by a global consortium of AI experts and data scientists. 

There are 25,000 members of the World Ethical Data Foundation, including employees of several digital behemoths including Meta, Google, and Samsung. The framework includes a list of 84 issues that programmers should think about before beginning an AI project. 

The foundation is also encouraging the general public to submit their own inquiries.It states that all of them will be taken into account at its upcoming annual meeting. The framework was published as an open letter, which appears to be the favoured approach among AI experts. It has multiple signatories.

The Foundation, which was established in 2018, is a non-profit global organisation that brings together experts working in technology and academia to examine the development of new technologies. Its issues for developers include how to avoid an AI product from integrating prejudice and how to cope with a circumstance in which a tool's output leads to law-breaking. 

Yvette Cooper, the Labour Party's shadow home secretary, stated this week that people who intentionally utilise AI techniques for terrorist goals will face criminal charges. 

Prime Minister Rishi Sunak has appointed tech entrepreneur and AI investor Ian Hogarth to oversee an AI taskforce. Mr. Hogarth said this week that he wants "to better understand the risks associated with these frontier AI systems" and hold the firms that develop them accountable. 

Other factors considered in the framework include data protection legislation in different countries, whether it is obvious to a user that they are engaging with AI, and whether human workers who input or tag data required to train the product were treated fairly. 

The complete list is broken down into three chapters: questions for individual developers, questions for a team to think about collectively, and questions for those who will be testing the product. 

"We're in this Wild West stage, where it's just kind of: 'Chuck it out in the open and see how it goes'." Vince Lynch, the company's creator and a board advisor for the World Ethical Data Foundation, said. The concept for the framework was his. 

"And now those cracks that are in the foundations are becoming more apparent, as people are having conversations about intellectual property, how human rights are considered in relation to AI and what they're doing." 

It's not possible to simply remove data that is copyright protected from a model that has already been trained; instead, the model may need to be built from scratch. 

"That can cost hundreds of millions of dollars sometimes. It is incredibly expensive to get it wrong," Mr Lynch added.

Series of letters 

As the AI industry grapples with concerns related to its rapid growth in the lack of public or governmental control, open letters have recently begun to dominate the industry. 

Some of the most prominent figures in technology, including Elon Musk, Apple co-founder Steve Wozniak, and Stability AI creator Emad Mostaque, signed an open letter in March calling for a pause on AI development for at least six months to allow for research and risk mitigation related to the technology. 

In May, a similar petition urging action to reduce "the risk of extinction from AI" appeared, this time with signatories such as AI pioneer Geoffrey Hinton and OpenAI CEO Sam Altman.