Israel Securities Authority Turns to Blockchain for Improving Cybersecurity

From: cointelegraph

By Marie Huillet

The Israel Securities Authority (ISA) has started to use blockchain to improve the cybersecurity of its messaging system, online newspaper Times of Israel reports today, October 3.

The government regulator has reportedly embedded the technology into a system dubbed “Yael,” used to deliver messages and other information to entities that fall under ISA oversight.

Read Complete Article


Germany’s Position on International Law in Cyberspace

From: Lawfare

By Nele Achten

In February 2018, the German government’s network was attacked. Germany did not specify what kind of information was accessed by the foreign hackers, but it is publicly known that the hackers successfully attacked the IT system of the Ministry of Foreign Affairs. On March 18, 2018, the Head of the Federal Chancellery and Federal Minister for Special Tasks, Helge Braun, issued a public statement about this attack and explained that the government would examine the possibilities of cyber counterattacks. His statement heated the political debate about cybersecurity and parliamentary opposition groups raised concerns and questions in official inquiries to the federal government on March 23, May 4 and May 7. The questions covered many topics ranging from Russia’s potential influence on the domestic political debate to facts about specific cyber attacks to the domestic institutional framework for cyber defense to attribution and the international legal framework.


The Brazilian Data Protection Legal Framework

From: Mondaq

Article by Simone Lahorgue Nunes, Daniel Tardelli Pessoa, Allan Nascimento Turano, Júlio César Ferro and Rodrigo Dias | Levy & Salomao Advogados


On August 14, 2018, Law No. 13,709 (LGPD – Lei Geral de Proteção de Dados) was enacted, creating a personal data protection legal framework in Brazil. The LGPD is influenced by the EU General Data Protection Regulation (GDPR); individuals, private entities and public authorities are affected by its provisions.


Whacking the mole: how Australia scrambles to regulate Chinese technology

From: The Conversation

, Research Fellow, UNSW

Did you ever go to your local show as a child? Remember that infuriating game where to win you had to hit every mole which popped its head out of a hole? I imagine Australia’s government feels like it’s playing whack-a-mole in regulating Chinese information and communications technology right now.

A clearer policy on regulating information and communications technology in the context of national security threats may help. Though in this version of the game, the stakes are rather higher than cheap toys at the local show.

Read Complete Article


Chinese regulators urge further security efforts to safeguard network

From: ecns.cn

China Daily Editor: Li Yan

China needs to ramp up efforts to further promote the construction of its cybersecurity system and safeguard the country’s network security, said senior industry regulators.

More efforts should be made to increase investment in core network security technology research and development, make breakthroughs in key technologies such as big data and artificial intelligence, build an industrial internet security system, actively develop the cybersecurity industry, and build a cybersecurity technology management system covering telecommunications, the internet, and the industrial internet, according to Liang Bin, deputy director of the network security administration of the Ministry of Industry and Information Technology.


UK immigration and the national cyber security strategy

From: ITProPortal


Skilled workers from diverse backgrounds are in great need if the UK aims to be a world leader in cyber security.

The Department for Digital, Culture, Media & Sport (“DCMS”) is consulting on a national cyber security strategy to make the UK a world leader in cyber security. The strategy, which comes on the back of a notable increase in cyber-attacks in recent years (including the traumatic WannaCry attacks which affected 48 NHS trusts and countless other organisations) will see the government plough £1.9 billion into UK cyber security from 2016 to 2021. At the core of the policy is the belief that the cyber security space should have strong leadership, centralised and clear qualifications, and diversity.


China’s Huawei, ZTE banned from Australia’s 5G network

From: Sydney Morning Herald

By Tim Biggs & Jennifer Duke

The federal government has banned Chinese telecommunication companies Huawei and ZTE from providing 5G technology to Australia, Fairfax Media understands, after laying out new rules in a security guidance statement to vendors and telcos building the next-generation mobile infrastructure.

A joint statement from Treasurer Scott Morrison and Communications Minister Mitch Fifield heavily implies that the involvement of Chinese companies would pose too high a security risk, although it does not single out any specific companies and does not name China.

Read Complete Article


China could reportedly use its ‘unwritten’ tech rules as an ‘invisible tool’ against US firms

From: CNBC

  • With Sino-American trade tensions escalating, China’s cybersecurity standards could be used as an “invisible tool” for retaliating against Washington’s tariffs, according to one expert.
  • Such standards are government-issued operational guidelines that are technically voluntary, but are oftentimes treated as mandatory by foreign firms’ Chinese business partners.
  • If Asia’s largest economy were to weaponize the listing of standardized practices to hit American companies, the cost would be difficult to quantify, but the move’s effects on foreign firms could outlive current tensions, according a report from a Washington-based think tank.


Cyber minister pushes ‘forward defence’ for Australia

From: Computerworld (Australia)

Minister for cyber security and law enforcement Angus Taylor calls for coordination between private sector and government to block threats

Rohan Pearce

Despite many of the information security threats faced by Australian governments and the private sector coming from known sources, not enough is not being done to block bad actors, according to the minister for cyber security and law enforcement, Angus Taylor.

Taylor said that he was not calling for an “Internet filter” but said he would push for increased collaboration between the government and businesses, including telcos, cloud providers, data centre operators and software providers, to block known malicious domains.


Pentagon Creates ‘Do Not Buy’ List of Russian, Chinese Software

From: Defense One


Increasingly alarmed at foreign hacking, DOD and intelligence officials are racing to educate the military and defense contractors.

The Pentagon is warning the military and its contractors not to use software it deems to have Russian and Chinese connections, according to the U.S. Defense Department’s acquisition chief.

Officials have begun circulating a “Do Not Buy” list of software that does not meet “national security standards,” Ellen Lord, defense undersecretary for acquisition and sustainment, said Friday.

Read Complete Article

Older posts «