Network Security - AI-Tech Park https://ai-techpark.com AI, ML, IoT, Cybersecurity News & Trend Analysis, Interviews Thu, 29 Aug 2024 04:54:03 +0000 en-US hourly 1 https://wordpress.org/?v=5.4.16 https://ai-techpark.com/wp-content/uploads/2017/11/cropped-ai_fav-32x32.png Network Security - AI-Tech Park https://ai-techpark.com 32 32 LevelBlue released 2024 Futures Report: Cyber Resilience in Retail https://ai-techpark.com/levelblue-released-2024-futures-report-cyber-resilience-in-retail/ Wed, 28 Aug 2024 14:00:00 +0000 https://ai-techpark.com/?p=177916 LevelBlue finds 82% of retail executives acknowledge the increased exposure to risk with dynamic computing, but 77% believe benefits outweigh them LevelBlue, a leading provider of managed network security services, managed detection and response, strategic consulting, and threat intelligence, today released its 2024 Futures Report: Cyber Resilience in Retail. The findings...

The post LevelBlue released 2024 Futures Report: Cyber Resilience in Retail first appeared on AI-Tech Park.

]]>
LevelBlue finds 82% of retail executives acknowledge the increased exposure to risk with dynamic computing, but 77% believe benefits outweigh them

LevelBlue, a leading provider of managed network security services, managed detection and response, strategic consulting, and threat intelligence, today released its 2024 Futures Report: Cyber Resilience in Retail. The findings detail how the rapid evolution of computing has thrust retail businesses into a perpetual struggle between innovation and risk. While dynamic computing presents major opportunities for technology innovation in the retail industry, these capabilities bring new security challenges that will require retailers to enhance their cybersecurity resilience to better safeguard against today’s threats.

There is a high degree of optimism in the retail industry as it relates to the innovation potential that results from dynamic computing. In fact, 86% of respondents anticipate that dynamic computing will enhance operational performance within the next three years, especially in artificial intelligence (AI) strategy development and leveraging sophisticated supply chains. However, a similar number – 82% – acknowledge the increased exposure to risk.

Despite this acknowledgment, 77% of respondents believe dynamic computing’s innovation benefits outweigh the cybersecurity risks. Furthermore, retail leaders are ambitious about investing in the technologies underpinning dynamic computing, but 62% report being a cautious or late AI adopter.

“The era of dynamic computing, spawned by the Internet of Things (IoT) and 5G technologies present both tremendous opportunities and risks for retail organizations,” said Theresa Lanowitz, Chief Evangelist of LevelBlue. “However, as traditional perimeters dissolve, traditional security methods no longer suffice, and retailer leaders need to be thinking broadly about overall cyber resilience. They need to be concerned with establishing visibility into the entire IT estate and protecting the whole organization, including supply chains and meeting the demands of customer data privacy. With our new research, leaders can analyze the landscape of barriers that exist, and take away practical steps for overcoming them with their retail organizations.”

Today’s retailers continue to face unintended consequences as supply chain attacks rise, and vulnerabilities from third-party sources become the top threat factors. This latest LevelBlue report indicates that there is a significant lack of visibility of the supply chain, with 67% of respondents indicating this as a major concern for physical and software supply chains. Another 75% of respondents reveal difficulty in assessing supply chain risk, with only 36% stating that their supply chain is completely or almost completely secure.

When assessing cyber resilience planning and cybersecurity budgeting for retail organizations, the report found that:

  • 65% of respondents reported that leadership doesn’t prioritize cyber resilience, and 75% say their organizations do not specifically invest in cyber resilience beyond cybersecurity.
  • Only 37% integrate cybersecurity into their computing planning or have a cybersecurity budget line item for every project, and a majority (74%) indicate that cybersecurity resilience initiatives are not sufficiently factored into the organization’s budget.
  • 72% believe cybersecurity is an afterthought, and 74% indicate that it’s impossible for them to assess how an attack might impact their organization.
  • 67% confirm efforts are often siloed, hindering comprehensive protection, 65% lack formalized incident response plans, and 62% do not have standardized cybersecurity processes.
  • 61% indicate that they have little to zero visibility into the IT estate, and 74% say the lack of visibility is compounded by new regulations.
  • 80% reveal their organizations are at risk due to barriers impacting their cybersecurity resilience strategies, and 78% report struggling to find the external guidance they need.

To better achieve cyber resilience in the retail industry, LevelBlue shares five specific steps that can be applied across industries, directly in response to these findings: identify the barriers to cyber resilience; be secure by design; align cyber investment with business; build a support ecosystem; and transform cybersecurity strategies.

Download the complete findings of the 2024 LevelBlue Futures Report: Cyber Resilience in Retail at this link here. The report identifies how retail organizations can effectively prioritize innovation while reducing cyber risk in today’s quickly advancing retail environment. This report follows the May 2024 release of the core 2024 LevelBlue Futures Report found here.

For more information on LevelBlue and its managed security, consulting, and threat intelligence services, please visit www.levelblue.com

Methodology
The research is based on a quantitative survey that was carried out by FT Longitude in March 2024. There were a total of 1,050 C-suite and senior executives surveyed, across 18 countries and seven industries: energy and utilities, financial services, healthcare, manufacturing, retail, transportation, and US SLED (state, local government, and higher education). Respondents were employed in a variety of cybersecurity-related roles, with 32% working at C-level and the remainder employed in C-minus one positions. The total number surveyed in retail is 171.

Explore AITechPark for the latest advancements in AI, IOT, Cybersecurity, AITech News, and insightful updates from industry experts!

The post LevelBlue released 2024 Futures Report: Cyber Resilience in Retail first appeared on AI-Tech Park.

]]>
Telenor Denmark Leads New Era in Wireless Innovation with CSG https://ai-techpark.com/telenor-denmark-leads-new-era-in-wireless-innovation-with-csg/ Wed, 24 Jul 2024 07:30:00 +0000 https://ai-techpark.com/?p=173868 Power of the cloud and AI elevate digital customer experiences and propel future business growth Telenor Denmark, the second-largest mobile operator in the Danish market, is a trailblazer for customer-first innovation. To reinforce its position at the forefront of digital telecommunications commerce and continue to provide excellent customer experiences, Telenor...

The post Telenor Denmark Leads New Era in Wireless Innovation with CSG first appeared on AI-Tech Park.

]]>
Power of the cloud and AI elevate digital customer experiences and propel future business growth

Telenor Denmark, the second-largest mobile operator in the Danish market, is a trailblazer for customer-first innovation. To reinforce its position at the forefront of digital telecommunications commerce and continue to provide excellent customer experiences, Telenor Denmark chose CSG®‘s (NASDAQ: CSGS) cloud-native, software-as-a-service (SaaS) platforms to drive its evolution into the future. This transformation turbocharges Telenor Denmark’s omnichannel monetisation, improves business efficiency and future-proofs the B2C and B2B customer experience.

“At Telenor Denmark, we make it easy for our 1.7 million customers to connect with the people and services that matter most to them. This is how we earned the industry’s highest customer satisfaction in 2023,” said Lars Thomsen, CEO, Telenor Denmark. “As we look to the future, we must adapt to meet fluctuating demands and continue to offer new, innovative solutions to our customers. CSG has the proven track record, industry depth and cloud expertise we need to embrace end-to-end digitalisation that will further strengthen our ability to deliver excellent customer service and inspire our customers. It’s an exciting time for Telenor Denmark and this strategic collaboration with CSG brings us one step closer to the future we want to shape for our customers, partners and ourselves.”

As Telenor Denmark and CSG collaborate to make the communication service provider (CSP) a leading digital telco in Denmark, CSG Ascendon, a market-leading AWS cloud-native revenue management platform, with pre-integrated, world-class customer engagement capabilities powered by CSG Xponent, enhance Telenor Denmark’s growth with flexibility, efficiency and intelligence. With CSG’s real-time decisioning engine, Telenor Denmark will deliver better digital experiences across all touchpoints, enhance omnichannel support for all business segments and seize new revenue opportunities. Along with CSG’s industry-leading configure, price and quote capabilities, the two platforms give Telenor Denmark powerful tools to seamlessly bundle offers with partners and create faster, more efficient solutions for its business customers. These improvements make it easy for Telenor Denmark to keep happier, more loyal customers that drive faster revenue for future innovation.

“To come out on top in digital telco commerce, CSPs need business infrastructure that allows them to hit the ground running and wow customers with speed, sophistication and flexibility,” said Ian Waterson, SVP of Go-To-Market, CSG. “As a customer satisfaction leader, Telenor Denmark understands the importance of customer loyalty in driving long-term growth. Their trust in CSG and our industry-leading solutions will elevate customer experience and set Telenor Denmark up for future-ready success.”

Get the facts on CSG Ascendon’s B2C, B2B and B2B2X capabilities and read CSG’s eBook to discover how you can make your CX more proactive, predictive and personalised with data-driven customer communication programs.

Explore AITechPark for the latest advancements in AI, IOT, Cybersecurity, AITech News, and insightful updates from industry experts!

The post Telenor Denmark Leads New Era in Wireless Innovation with CSG first appeared on AI-Tech Park.

]]>
TXOne Networks Welcomes Stephen Driggers as New CRO https://ai-techpark.com/txone-networks-welcomes-stephen-driggers-as-new-cro/ Mon, 15 Jul 2024 08:00:00 +0000 https://ai-techpark.com/?p=172779 TXOne Networks, a leader in Cyber-Physical Systems (CPS) security, today announced Stephen Driggers has been appointed Chief Revenue Officer (CRO), Vice President of Sales In his new role, Stephen Driggers will spearhead the development and execution of comprehensive revenue strategies, ensuring alignment among sales, marketing, and customer success teams to drive sustainable growth. Stephen...

The post TXOne Networks Welcomes Stephen Driggers as New CRO first appeared on AI-Tech Park.

]]>
TXOne Networks, a leader in Cyber-Physical Systems (CPS) security, today announced Stephen Driggers has been appointed Chief Revenue Officer (CRO), Vice President of Sales In his new role, Stephen Driggers will spearhead the development and execution of comprehensive revenue strategies, ensuring alignment among sales, marketing, and customer success teams to drive sustainable growth.

Stephen Driggers joins TXOne Networks with more than two decades of experience in leading revenue generation and sales for companies in data and network security. Most recently before joining TXOne Networks, he served as Chief Revenue Officer of Nozomi Networks. His previous roles included Vice President, Sales, Americas, Thales Cloud Security; Vice President, Global Sales, Vormetric; Vice President of Sales, Americas, HP Enterprise Security; Sales Director, Americas, HP Networking, and Vice President, Sales, Americas, TippingPoint.

“We are very excited about everything that Stephen is bringing to our company as our new CRO,” said Dr. Terence Liu, Chief Executive Officer, TXOne Networks. “He is an inspiring leader with proven results in a variety of environments, and his professionalism and personal integrity are obvious. His contributions to TXOne Networks and our customers will be far-reaching.”

Added Stephen Driggers: “TXOne Networks is an innovative and visionary company in a rapidly growing space, and the crucial value of OT (operational technology) and ICS (industrial control system) security is better understood every day by companies in a range of industries globally. The opportunity here is tremendous, and I am eager to get rolling with the team in working with our customers to develop practical, operations-friendly approaches to cyber defense.”

Follow TXOne Networks on Blog, Twitter, and LinkedIn.

Explore AITechPark for the latest advancements in AI, IOT, Cybersecurity, AITech News, and insightful updates from industry experts!

The post TXOne Networks Welcomes Stephen Driggers as New CRO first appeared on AI-Tech Park.

]]>
Broadcom’s Symantec Cloud SWG Receives FedRAMP Authorization https://ai-techpark.com/broadcoms-symantec-cloud-swg-receives-fedramp-authorization/ Fri, 21 Jun 2024 14:00:00 +0000 https://ai-techpark.com/?p=170491 U.S. public sector entities can now leverage leading web security as they transition to the cloud Broadcom Inc. (NASDAQ: AVGO) today announced its Symantec Cloud Secure Web Gateway (SWG) solution received Federal Risk and Authorization Management Program (FedRAMP®) authorization, further expanding Broadcom’s portfolio of FedRAMP authorized solutions for the U.S....

The post Broadcom’s Symantec Cloud SWG Receives FedRAMP Authorization first appeared on AI-Tech Park.

]]>
U.S. public sector entities can now leverage leading web security as they transition to the cloud

Broadcom Inc. (NASDAQ: AVGO) today announced its Symantec Cloud Secure Web Gateway (SWG) solution received Federal Risk and Authorization Management Program (FedRAMP®) authorization, further expanding Broadcom’s portfolio of FedRAMP authorized solutions for the U.S. sector. Symantec Cloud SWG delivers comprehensive, cloud-hosted security for U.S. federal agencies adopting a Security Service Edge (SSE) architecture. The solution enables U.S. federal agencies to cost-effectively migrate security services from on-premises data centers to cloud-native services without sacrificing security or designing new policy and workflows.

This FedRAMP authorized service is available as part of Symantec Gov Cloud – Web Protection to deliver one solution with flexible deployment options. Many federal agencies still have requirements to support on-premises security environments as they migrate to the cloud. Gov Cloud – Web Protection uniquely provides cloud-hosted security while also supporting full licensing of Symantec’s network security solutions. Customers can choose to deploy security components on-premises or use the cloud. Gov Cloud – Web Protection includes market-leading Symantec Secure Web Gateway, Reverse Proxy, Deep Content Inspection, Management Center and Cloud Reporting, Intelligence Services for application visibility and control, and Full-Traffic Decryption.

Key Benefits of Symantec Gov Cloud – Web Protection

  • Protects users, devices, and data from known and unknown threats across all locations (remote, branch, and HQ). Deploys across a cloud-native, highly scalable, and performance-intensive infrastructure built on top of a leading cloud service provider. This is the same backbone that delivers YouTube, Google Search, and other world-class services.
  • Simplify and streamline purchasing, provisioning, training, and management, through simple user-based licensing that supports cloud, on-prem, or hybrid deployments.
  • Provides a strong foundation for Secure Access Service Edge (SASE), facilitating secure and fast web access for any user, from any device, from any location.

“Numerous U.S. Federal agencies rely on Symantec security solutions to protect mission-critical data, resources, and thousands of users,” said Rob Greer, vice president and general manager of the Enterprise Security Group at Broadcom. “With Symantec’s Cloud SWG solution now achieving FedRAMP Authorized status, these agencies know their security needs are met and they can transition to the cloud at their own pace. We are excited about this achievement that shows our commitment to securing federal agencies and ensuring the highest protection standards are met.”

“Obtaining FedRAMP certification is a critical step for establishing trust with U.S. federal agencies moving their infrastructure to the cloud,” said Frank Dickson, Group Vice President, Security & Trust at IDC. “This rigorous certification not only ensures the security and compliance of cloud solutions but also opens a gateway for security solution vendors to better serve the stringent needs of the federal space.”

Explore AITechPark for the latest advancements in AI, IOT, Cybersecurity, AITech News, and insightful updates from industry experts!

The post Broadcom’s Symantec Cloud SWG Receives FedRAMP Authorization first appeared on AI-Tech Park.

]]>
Adtran joins LU-CIX community as a Gold Member https://ai-techpark.com/adtran-joins-lu-cix-community-as-a-gold-member/ Thu, 20 Jun 2024 12:15:00 +0000 https://ai-techpark.com/?p=170315 LU-CIX member ecosystem enhances Luxembourg’s digital infrastructure through strategic alliances and technological innovation Adtran’s membership reinforces a longstanding collaboration, with its open FSP 3000 transport technology integral to LU-CIX’s infrastructure ALM fiber monitoring technology elevates LU-CIX’s service reliability, boosting network availability and stability across the country Adtran and the Luxembourg...

The post Adtran joins LU-CIX community as a Gold Member first appeared on AI-Tech Park.

]]>
  • LU-CIX member ecosystem enhances Luxembourg’s digital infrastructure through strategic alliances and technological innovation
  • Adtran’s membership reinforces a longstanding collaboration, with its open FSP 3000 transport technology integral to LU-CIX’s infrastructure
  • ALM fiber monitoring technology elevates LU-CIX’s service reliability, boosting network availability and stability across the country
  • Adtran and the Luxembourg Internet eXchange (LU-CIX), today announced that Adtran has joined the LU-CIX community as a Gold Member. This addition expands and enhances LU-CIX’s supporting member ecosystem, which is key for the digital infrastructure of Luxembourg and beyond. Adtran joining the community cements a longstanding relationship with LU-CIX. Its FSP 3000 open optical transport solution was instrumental in expanding LU-CIX’s network capacity efficiently and sustainably, and the Adtran ALM fiber monitoring platform is helping boost the reliability of LU-CIX’s services.

    “We’re thrilled to have Adtran join us as a Gold Member. The dedication to openness and collaborative innovation that the Adtran team brings will help lift our collective efforts. Our history of success together sets a solid foundation for this partnership. Moreover, Adtran’s compact, energy-efficient technology perfectly aligns with our sustainability goals and enhances the performance and reliability of our network,” said Claude Demuth, chairman of LU-CIX. “This partnership underscores the importance of robust relationships in propelling our digital infrastructure forward and reinforcing Luxembourg’s status as a premier digital hub in Europe.”

    LU-CIX is a major European internet exchange, optimizing connectivity and internet speed by facilitating direct traffic routing among connected networks. Through its neutral and highly reliable platform, it supports the digital economy and boosts data transmission security across the country and beyond. The LU-CIX community, comprising internet service providers, telecommunication companies and content networks, collaborates to improve network efficiency and strengthen Luxembourg as a major digital hub. By welcoming Adtran, LU-CIX is broadening its technological capabilities. Adtran’s solutions enhance network performance, flexibility and reliability, delivering major benefits across Europe’s digital landscape. What’s more, Adva Network Security provides network security solutions approved by the Bundesamt für Sicherheit in der Informationstechnik (BSI) that comprehensively protect networks built on Adtran FSP 3000 transport technology, providing its customers with access to quantum-resistant communication and fortifying digital infrastructure against future threats.

    “We’re very pleased to be part of the LU-CIX community. The power of collaborative initiatives like this one cannot be overstated. The LU-CIX supporting member hub is key to driving technological advancements and shaping the future of digital infrastructure in this region and across Europe,” commented Stuart Broome, GM of EMEA sales at Adtran. “LU-CIX’s proactive approach to interworking and its leadership in the industry align perfectly with our commitment to open, multi-vendor networks. Our technologies are ideal for enhancing and supporting the scalability and security of major internet exchanges like LU-CIX, ensuring a more connected and resilient future.”

    Explore AITechPark for the latest advancements in AI, IOT, Cybersecurity, AITech News, and insightful updates from industry experts!

    The post Adtran joins LU-CIX community as a Gold Member first appeared on AI-Tech Park.

    ]]>
    LSP Protocol Best Solution for Building a Security Moat for PoS Networks https://ai-techpark.com/lsp-protocol-best-solution-for-building-a-security-moat-for-pos-networks/ Thu, 13 Jun 2024 07:30:00 +0000 https://ai-techpark.com/?p=169174 Staking is usually the main way to maintain the security of the PoS network. For a PoS network, the more and more dispersed assets in the network participate in the validator staking, the better the network’s security. Usually, starting from the PoS network itself, they provide incentives to validators, firstly...

    The post LSP Protocol Best Solution for Building a Security Moat for PoS Networks first appeared on AI-Tech Park.

    ]]>
    Staking is usually the main way to maintain the security of the PoS network. For a PoS network, the more and more dispersed assets in the network participate in the validator staking, the better the network’s security. Usually, starting from the PoS network itself, they provide incentives to validators, firstly to reward them as contributors, and secondly to encourage more validators to participate in network staking and verification.

    In fact, for any PoS network, it is unrealistic to allow token holders to independently participate in the network validator staking. One is the cost perspective. For example, the minimum threshold for Ethereum’s PoS validator is 32 ETH. Based on the price of ETH 3,800 US dollars, the cost threshold to directly become a validator is about 121,600 US dollars, but the APR is only 2.21%, and the capital utilization rate is extremely low. On the other hand, the staker needs to have the ability to run the client independently to avoid fines. Overall, it is unrealistic for non-professional token holders to directly participate in the staking of any network as a validator.

    Therefore, the emergence of the liquidity derivative pledge track, namely LSD, just solves the above pain points. On the one hand, token holders can entrust token pledges to the LSD protocol (no capital scale is required, usually assets worth tens or even tens of US dollars can participate), and the protocol will participate in the pledge of the PoS network on behalf of the pledger, and return part of the income to the pledger. At the same time, the LSD protocol will also return an LST token to the pledger, which is equivalent to the value of the pledged assets and can be used to obtain new income in LSTFi to improve the utilization rate of funds. This has a good driving effect on improving the pledge rate of the PoS network.

    Except for the Ethereum ecosystem, other ecosystems are not large in LSD

    However, from the current LSD track, except for the Ethereum ecosystem, the LSD scale of other networks is not large. On the one hand, in terms of scale, the current liquidity pledge scale of Ethereum is 13 million Ethereum, about 50.23 billion US dollars. According to the current 32 million Ethereum participating in the pledge in the Ethereum beacon chain, the liquidity pledge accounts for about 40.6%.

    In addition to Ethereum, other PoS ecosystems such as Cosmos and BNB Chain are relatively small in scale, and the ratio of liquidity staking sources is not high. For example, among the ATOM tokens staked by Cosmos, although its overall staking rate is as high as about 63%, only about 2% comes from liquidity equity.

    On the other hand, although LSD projects are rising, the leading LSD protocols represented by Lido, Rocket, Binance Staked, etc. have obvious monopoly effects in the field of ETH LSD staking, among which Lido alone accounts for 75% of the entire ETH LSD market share, and the market share of emerging LSD protocols is extremely low. In particular, the leading LSD protocols such as Lido are centralized models, which may have the risk of monopolizing most of the proportion, reducing the overall income of the LSD sector, and reducing the staking desire of the pledgers. In addition, excessive concentration of funds may cause security risks to the PoS ecosystem.

    In addition to LSD, the re-staking track centered on EigenLayer, namely the LRT track, is also centered around the Ethereum ecosystem. Some LRT protocols including Kyper DAO, Renzo, Ether.fi, EigenPie, YieldNest, Swell, etc. are all built around LST and ETH assets to provide staking services, and lack support for native tokens on other chains. Similarly, EigenLayer also has shortcomings in maintaining network security. For example, in a PoS network, if EigenLayer’s incentive mechanism conflicts with the existing PoS incentive mechanism, it may reduce the validator’s commitment to network security. EigenLayer may cause some validators to gain more rights and control, thereby increasing the centralization risk of the network. Centralized networks are more vulnerable to attacks and manipulation, weakening overall security.

    So overall, LSD and LRT may not be the best solutions for PoS ecosystem to obtain security:

    ● The LSD sector is severely monopolized and centralized. The scale of pledged income has decreased due to monopoly and it threatens the security of the PoS network, which deviates from the original intention of PoS.

    ● The multi-layer nesting model of LSD and LRT is risky, especially since some of the leading LSD protocols are too large in scale. Once a security problem occurs and a run occurs, it will be catastrophic for the Ethereum ecosystem. The Terra ecosystem is a lesson for this.

    ● The LSD and LRT tracks are mainly based on Ethereum. It is difficult for other PoS ecosystems to encourage more users to pledge through liquidity pledge and re-staking, and the problem of low capital utilization is difficult to solve.

    ● Except for the Ethereum ecosystem, there is a lack of infrastructure to support other PoS ecosystems to expand the scale of staking, and the trend of multi-chain development is hindered.

    Of course, there are more solutions to maintain PoS network security and improve capital utilization than just LSD and LRT. The recent market-oriented LSP protocol has brought a better solution. Based on the innovative Node Slicing and OmniVerify Chain solutions, it capitalizes the user’s asset rights and node income rights and gives them liquidity. Compared with existing solutions, the LSP protocol is expected to achieve better results in PoS network security and promote the balanced development of the PoS network system, and PoS will return to its original intention.

    LSP protocol “node slicing” solution

    The LSP protocol is a new PoS liquidity derivative pledge solution. One of its features is the use of the Node Slicing solution as a core processing method for nodes during the protocol execution. Similar to LSD, PoS asset holders can pledge directly through the LSP protocol. The LSP protocol verification network will pledge funds to different PoS networks through the OmniVerify Chain network, and after verifying and hosting the decentralized network, the pledge certificate will be sliced. The sliced assets will include the user’s asset rights and node income rights.

    Although the process of returning sliced assets seems similar to LSD, what is returned is not just an LST asset. Based on having all the capabilities of LST assets, it is also an asset that can represent asset rights and node income rights (LST assets do not have complete equity utility), that is, the process is a process in which users directly participate in the PoS network verification through the LSP protocol and obtain all the income rights obtained by the node. At the same time, the sliced assets can be freely exchanged and held in the LSP protocol trading platform, and can also be further traded in some LSTFi or even some LRT protocols.

    Improving the scale and decentralization of PoS staking

    In fact, from the perspective of the PoS network itself, it requires large-scale, decentralized users to participate in the verification of the network. From the perspective of scale, it is definitely difficult to meet the demand by simply attracting more retail traders to participate, so from this perspective, it is very necessary for some whale users, large node verifiers, and mining pools to participate.

    A considerable number of these users run their own clients instead of participating in staking through the LSD protocol (potential risks are too high), but this method greatly reduces the utilization rate of funds, so the LSP protocol can become a good starting point. Using the LSP protocol, the above can more lightly carry out the funds in and out of the mining pool shares, and will not be affected by the fluctuation of assets in the mining pool staking nodes, making the public chain network more secure and reliable.

    By utilizing the LSP protocol, nodes no longer need to go through complicated transaction confirmations and asset transfer pressures when exchanging asset ownership. Node holders can directly sell the node assets that need to be traded through the LSP trading platform, making it easier to exit, rather than requiring redemption to exit from the LSD and LRT platforms.

    Of course, the decentralization of POS network staking nodes is equally important. On the one hand, the sharding scheme of the LSP protocol eliminates the potential threat of large stakers to the security of the PoS network. On the other hand, it is also expected to attract more decentralized users to participate in staking.

    For users who need to participate in node staking, they do not need to participate in the construction of the network in a real sense. They can directly purchase node slices under the network ecosystem through the LSP protocol. This greatly reduces the threshold and deployment pressure for new users to participate in the public chain ecosystem, and also avoids various potential security threats in this process.

    Adaptability to multiple PoS networks

    Ethereum is currently the main market for LSD and LRT (centralized service providers dominate), and most emerging LSD and LRT protocols usually choose Ethereum ecosystem as their first choice in order to better capture users and funds. Therefore, it is unable to provide the original independent functionality of nodes to more ecosystems, including the data verification function of the network to which it belongs as an independent node. When it is unable to participate in verification, it also loses the core value of nodes as a guarantee of network data security, which is what we call a deviation from the original purpose of PoS.

    This has resulted in the scale of Ethereum’s liquidity derivatives growing larger and larger, while other PoS ecosystems have difficulty in scaling up, which in turn has caused many emerging PoS networks to face certain difficulties in maintaining security and capturing stakers.

    The LSP protocol is natively compatible with all PoS ecosystems, rather than being deployed at the bottom of one or several PoS networks like the LSD protocol. Therefore, the LSP protocol is not only aimed at Ethereum, but also other PoS ecosystems, which means that you can also pledge through the LSP protocol and get the return of slice equity assets.

    When a large number of nodes on the same public chain network participate in the LSP protocol, or when a public chain network user interacts with the LSP protocol for the first time, a node pledge pool dedicated to the network ecosystem will be opened to ensure that these sliced certificate assets come from the same public chain network. After the node pledge pool is established, the node network that joins later will enter this pledge pool by default and conduct the required asset transactions or holding activities with other pledged certificates.

    The above process is achieved through the verification network OmniVerify Chain, which can ensure that the node assets held by users can obtain the original node income and data verification functional value of the network to which they belong while running as an independent node.

    Focusing on OmniVerify Chain itself, it is an important underlying infrastructure for the operation of the LSP protocol. The LSP protocol is built on OmniVerify Chain, which includes a Rollup layer and a data availability service DA layer, which provides absolute security and data consistency guarantees for the underlying assets and completes data verification and equity ownership through cloud nodes. In the actual operation of OmniVerify Chain, users actually only need to perform a few simple steps such as delegated verification, purchase/sale of node slices, and other proof certificates.

    Since the security and functionality of the user-delegated nodes are guaranteed by OmniVerify Chain, strictly speaking, as long as the distributed network security management of OmniVerify Chain is friendly enough, its asset security is much better than storing it in the user’s hot wallet.

    Composability and Programmability

    The LSD protocol is composable and programmable.

    Composability is reflected in the ability of PoS verification. In fact, in some PoS networks, if we want to make a cross-chain bridge, a game application, a derivatives protocol featuring a synthetic asset protocol, or even some protocols or layers attached to Layer1 and Layer2 (such as Layer3), etc., we need to build a set of verification groups with different schemes by ourselves, and these verification groups need to have certain PoS capabilities. Building a set of verification groups requires sufficient pledges and nodes to ensure decentralization, but this need is based on a lot of economic costs and also lacks certain security. Although EigenLayer can provide certain support, the protocol must be built on the Ethereum system and also faces some centralized risks such as the centralized risks we mentioned above.

    The LSD protocol can solve the above problems through composability in this direction. While the LSD protocol itself provides verification capabilities for the PoS network, this verification capability is also extended to its underlying Dapps. For example, the LSD protocol integrates the Solana network and supports users to participate in staking on Solana. Then these SOL-based verification capabilities can also provide support for Dapps on Solana. These Dapps do not need to build their verification groups but can be directly developed and adapted through the OmniVerify Chain of the LSD protocol. The data verification revenue generated by the development of this product will be captured by most of these node slices, which will further expand the profitability of these node slices in the LSP protocol.

    In addition, in terms of programmability, the node assets are shared through the LSP protocol, allowing more complex protocols to expand the ecosystem of assets in a composable manner, ensuring the composability of assets. Since the OmniVerify Chain network meets the EVM execution standards, its assets are also programmable. Any developer is allowed to use node-slicing proof certificates to perform any type of asset combination.

    Backed by the huge PoS system, the LSP protocol has broad development prospects

    Whether it is the LSD or LRT track, in theory, it has benefits for building a security moat for the PoS ecosystem, but in reality, there are still many limitations and security issues. The LSP protocol is of great significance to the development of the PoS ecosystem in terms of wide adaptability, programmability, composability, and many other aspects. It can not only further promote the expansion of the scale of the Ethereum pledge system to disperse, but also accelerate the balance of the scale of the PoS network pledge.

    With the LSD protocol, users who participate in PoS staking can participate extensively in different ecosystems, and this more direct way of participation does not have the “nesting doll” attribute and thus does not have the risk of a death spiral.

    From a market perspective, the LSP protocol has huge market potential in a broad sense. Some potential directions include:

    ● Data availability layer, such as AI-based data availability networks such as TAO and RNDR.
    ● Oracle networks, such as LINK, API3, etc., require nodes to participate in data verification value networks.
    ● Cross-chain bridges, such as LayerZero, Wormhole, and other networks that require nodes to participate in data consistency verification.
    ● Other consensus protocols, and consensus verification networks similar to POS mechanisms.
    ● Rollup-based L2 networks, such as BTC L2, ETH L2, and L2 of more public chain networks in the future.
    ● Depin networks of cloud computing services, such as Aleo, IO.net, Aethir, etc., use cloud computing to provide computing resources.

    These networks cover almost all the non-POW public chain networks in the market. We believe that the overall market valuation of these networks will exceed one trillion US dollars in the next five years. On the other hand, the market-oriented consensus systems are all moving towards PoS, and even some infrastructure in the BTCFi field are following the PoS consensus mechanism. This trend is providing impetus for the development of the LSP protocol. If the LSP protocol can capture most of the nodes in a small part of the main public chain network ecosystem, then the node assets that the LSP protocol can manage and operate will also exceed tens of billions of US dollars, which also indirectly confirms the broad development prospects of the LSP protocol in the future.

    Explore AITechPark for the latest advancements in AI, IOT, Cybersecurity, AITech News, and insightful updates from industry experts!

    The post LSP Protocol Best Solution for Building a Security Moat for PoS Networks first appeared on AI-Tech Park.

    ]]>
    Arctic Wolf Wins Best SME Security Solution at 2024 SC Awards Europe https://ai-techpark.com/arctic-wolf-wins-best-sme-security-solution-at-2024-sc-awards-europe/ Tue, 11 Jun 2024 12:45:00 +0000 https://ai-techpark.com/?p=169000 Recognition reflects how Arctic Wolf’s native platform and European investments are delivering world-class security outcomes for organizations of almost any size Arctic Wolf®, a global leader in security operations, today announced that Arctic Wolf Managed Detection and Response was named Best SME Security Solution at the 2024 SC Awards Europe....

    The post Arctic Wolf Wins Best SME Security Solution at 2024 SC Awards Europe first appeared on AI-Tech Park.

    ]]>
    Recognition reflects how Arctic Wolf’s native platform and European investments are delivering world-class security outcomes for organizations of almost any size

    Arctic Wolf®, a global leader in security operations, today announced that Arctic Wolf Managed Detection and Response was named Best SME Security Solution at the 2024 SC Awards Europe. This recognition from UK and Europe’s longest-running and most respected annual cybersecurity competition serves as further validation of how the company’s single, open platform delivers effective, comprehensive, and reliable security outcomes for customers around the globe.

    Arctic Wolf Managed Detection and Response is the cornerstone of the Arctic Wolf Security Operations Cloud which provides thousands of organizations worldwide with the ability to quickly detect, respond to, and recover from advanced cyber threats. Built on an open XDR architecture and leveraging advanced AI-algorithms against the more than 5.5 trillion security events it ingests each week, the Arctic Wolf Platform unifies organizational data and delivers game changing noise reduction by turning thousands of daily alerts into an average of a single actionable ticket each day.

    Small and medium-sized enterprises (SMEs) are often resource constrained, lacking not only the financial resources to staff a security team 24×7, but also the operational expertise needed to defend against modern cyber threats. Arctic Wolf Managed Detection and Responses helps MSEs tackle these challenges head on by providing broad visibility, 24×7 monitoring, and advanced threat detection all delivered as an outsourced and fully-managed solution. With its unique Concierge Delivery Model and Security Journey benefits, Arctic Wolf Managed Detection helps midsize organizations defend against a sophisticated threat landscape and improve insurability, all for less than the typical annual cost of a single dedicated security analyst.

    “The ability for Arctic Wolf Managed Detection and Response to deliver superior security outcomes and an exceptional customer experience is a direct result of the speed, scale, and efficiency of the Arctic Wolf Platform,” said Dan Schiappa, chief product and services officer, Arctic Wolf. “Over the last three years, Arctic Wolf has gone all in on growing our security operations and go-to-market teams across Europe, and winning this SC Awards Europe is a tremendous honor that demonstrates how those investments have made Arctic Wolf Managed Detection and Response the ideal solution for European organizations looking for holistic protection that defends at the speed of data.”

    Arctic Wolf Managed Detection and Response continues to be globally recognized for its ability to enable companies of any size to establish world-class security operations in a rapid, cost-efficient, and scalable way. Additional recognition for Arctic Wolf Managed Detection and Response over the last twelve months include:

    • Named Leader in the 2024 IDC MarketScape for Worldwide Managed Detection and Response Services
    • Named Leader in Frost & Sullivan’s 2024 Frost Radar™ MDR report
    • Named Customers’ Choice for the North America region in the Gartner Peer Insights™ Voice of the Customer for Managed Detection and Response

    Explore AITechPark for the latest advancements in AI, IOT, Cybersecurity, AITech News, and insightful updates from industry experts!

    The post Arctic Wolf Wins Best SME Security Solution at 2024 SC Awards Europe first appeared on AI-Tech Park.

    ]]>
    Nokia unveils advanced DDoS countermeasures for improved protection https://ai-techpark.com/nokia-unveils-advanced-ddos-countermeasures-for-improved-protection/ Tue, 11 Jun 2024 09:00:00 +0000 https://ai-techpark.com/?p=168966 Nokia unveils advanced DDoS countermeasures for improved protection against botnet and application-level DDoS attacks Distributed Denial of Service (DDoS) attacks have become more frequent, sophisticated, and potent over last two years with some CSPs registering over 100 attacks daily. Nokia introducing advanced DDoS countermeasures, setting new standards for DDoS security...

    The post Nokia unveils advanced DDoS countermeasures for improved protection first appeared on AI-Tech Park.

    ]]>
    Nokia unveils advanced DDoS countermeasures for improved protection against botnet and application-level DDoS attacks

    • Distributed Denial of Service (DDoS) attacks have become more frequent, sophisticated, and potent over last two years with some CSPs registering over 100 attacks daily.
    • Nokia introducing advanced DDoS countermeasures, setting new standards for DDoS security with unmatched detection accuracy and speed and unparalleled mitigation agility and precision.
    • Countermeasures allow Nokia to meet growing demands of communications service providers (CSPs) and large digital enterprises to fight the latest generations of DDoS attacks.

    Espoo, Finland – Nokia today revealed an expanded set of Distributed Denial of Service (DDoS) mitigation capabilities of its Defender Mitigation System (7750 DMS-1) through advanced DDoS countermeasures. These countermeasures allow the DMS to meet the growing demands of communications service providers (CSPs) and large digital enterprises to fight the latest generations of DDoS attacks with improved efficiency and cost efficiency.

    Over the last two years, DDoS attacks have become more frequent, sophisticated, and potent with many CSPs and enterprises registering over 100 attacks daily. In 2023, more than 60% of all DDoS attacks were botnet-based, posing great challenges for legacy DDoS solutions and systems to detect and mitigate them. In 2024, DDoS threats come in a variety of new disguises, including free web browsing proxies that can be used to orchestrate botnet DDoS attacks without the knowledge of end-users. The ever-changing DDoS threat landscape is driving the need to neutralize new generations of DDoS attacks with improved speed, efficiency, and precision.

    A better approach to DDoS security is required to protect services and customers against a new scale of DDoS attacks (tens to hundreds of Gbps, occurring regularly), new levels of attack complexity (from many more sources to many more destinations and involving tens to hundreds of thousands of endpoints in case of botnet DDoS), and at a whole new level of concurrency (e.g., hundreds of simultaneous attacks).

    The new release of 7750 DMS-1 delivers Advanced Countermeasures Engine (ACE) functionality with L4-L7 stateful inspection of IP packets, allowing 7750 DMS-1 to combat all types of DDoS attacks – from volumetric to botnet and application-layer attacks – with a new level of agility and cost efficiency. The ACE functionality on 7750 DMS-1 is a testament to Nokia’s commitment to innovation, further enhancing Nokia’s unique combination of AI-driven big data analytics in Deepfield Defender and advanced IP networking technology, including the Nokia state-of-the-art routers powered by FP5 silicon.

    At the heart of the Nokia DDoS security solution is Deepfield Defender – an “all-seeing, all-knowing” AI-driven big data processing platform that analyzes network telemetry information obtained from the network and correlates it with the “security map of the internet,” the Deepfield Secure Genome® data feed. Using advanced AI/ML learning and algorithms, Defender makes real-time decisions about how to neutralize DDoS threats and attacks by activating mitigation on the network edge or a dedicated, next-generation mitigation platform, Defender Mitigation System (7750 DMS-1).

    The Nokia 7750 DMS-1 boosts DDoS mitigation efficiency with an array of new features, such as a full global map of DDoS botnets, improved DNS server protection, packet validation, and selective geo-IP blocking. 7750 DMS-1 has been designed to address stringent network security requirements driven by both networking and security teams.

    Grant Lenahan, Partner and Principal Analyst at Appledore Research, said: “Appledore has been convinced of the virtues of both Deepfield’s threat identification technology and the architectural benefits of the Nokia FP5-based solutions – both when used as appliances and as embedded functionality in routers. With advanced DDoS countermeasures on its 7750 Defender Mitigation System, Nokia further advanced its solution for dedicated DDoS mitigation with the addition of application-layer attack resolution parity to complement its FP5-based volumetric leadership. The solution’s expanded deployment footprint attests to this market success.”

    Jeff Smith, Vice President and Head of the Deepfield Business Unit at Nokia, said: “The occurrences of DDoS attacks have increased exponentially, and they’ve become more complex and powerful. We now commonly see attacks peaking in hundreds of Gbps in our customers’ networks – they are no longer a rare occurrence. This is the new DDoS reality the world is facing. The 7750 DMS-1 with new advanced DDoS countermeasures that Nokia has announced today set new standards for accuracy, speed and mitigation for DDoS security. Our unique solution and product architecture will facilitate the integration of the Nokia DDoS security solution into multiple networking and security environments, and will help service providers and enterprises protect their infrastructure, services and customers with a new level of network security required in the era of 5G, IoT and cloud connectivity.”

    The solution will be featured and demonstrated at the Nokia SReXperts EMEA conference in Palma, Spain, June 4-6, 2024.

    Explore AITechPark for the latest advancements in AI, IOT, Cybersecurity, AITech News, and insightful updates from industry experts!

    The post Nokia unveils advanced DDoS countermeasures for improved protection first appeared on AI-Tech Park.

    ]]>
    Corero Network Security Secures Major Renewal with DigitalOcean https://ai-techpark.com/corero-network-security-secures-major-renewal-with-digitalocean/ Thu, 06 Jun 2024 14:30:00 +0000 https://ai-techpark.com/?p=168628 Today, Corero Network Security (AIM: CNS) (OTCQB: DDOSF), the distributed denial of service (DDoS) protection specialists, announced the renewal of a significant contract with DigitalOcean, a leading cloud computing provider. This $1M+ agreement extends the partnership for an additional three years, highlighting Corero’s trusted role in safeguarding DigitalOcean’s extensive network infrastructure. DigitalOcean, renowned for...

    The post Corero Network Security Secures Major Renewal with DigitalOcean first appeared on AI-Tech Park.

    ]]>
    Today, Corero Network Security (AIM: CNS) (OTCQB: DDOSF), the distributed denial of service (DDoS) protection specialists, announced the renewal of a significant contract with DigitalOcean, a leading cloud computing provider. This $1M+ agreement extends the partnership for an additional three years, highlighting Corero’s trusted role in safeguarding DigitalOcean’s extensive network infrastructure.

    DigitalOcean, renowned for offering simple and affordable cloud computing solutions, has been a pioneering force in enabling developers, startups, and SMBs to bring their innovations to life. With a global network spanning over 17 data centers, DigitalOcean has turned to Corero’s advanced DDoS protection solutions to ensure seamless operations and robust defense against cyber threats.

    Under the renewed contract, Corero will provide DigitalOcean with its comprehensive SecureWatch Managed Services. This fully managed solution encompasses configuration optimization, proactive monitoring, and swift mitigation response to any DDoS incident. Delivered by Corero’s Security Operations Center (SOC), this service is designed to meet the specific security policies and business goals of DigitalOcean.

    Carl Herberger, CEO at Corero Network Security, commented:

    “We are thrilled to continue our partnership with DigitalOcean. This renewal underscores the confidence they have in our ability to protect their critical infrastructure. Our SecureWatch Managed Services will allow DigitalOcean to focus on their core business activities, knowing that their network is in safe hands.”

    Corero’s solution replaces a competitive solution with Corero SmartWall ONE, providing rapid and accurate DDoS attack detection at the network edge. Additionally, a dedicated Technical Account Manager will ensure ongoing professional services and continuous enhancements to DigitalOcean’s deployment.

    During an initial eight-month ramp-up and trial period, Corero demonstrated significant value through seamless transitions and continuous optimization, ultimately leading to this extended commitment from DigitalOcean.

    Explore AITechPark for the latest advancements in AI, IOT, Cybersecurity, AITech News, and insightful updates from industry experts!

    The post Corero Network Security Secures Major Renewal with DigitalOcean first appeared on AI-Tech Park.

    ]]>
    NVIDIA Supercharges Ethernet Networking for Generative AI https://ai-techpark.com/nvidia-supercharges-ethernet-networking-for-generative-ai/ Mon, 03 Jun 2024 15:45:00 +0000 https://ai-techpark.com/?p=168237 Spectrum-X Adopted by Cloud Service Providers, GPU Cloud Providers and Enterprises; Broad System-Maker Support Extends NVIDIA Networking’s Reach to Every Market COMPUTEX — NVIDIA today announced widespread adoption of the NVIDIA Spectrum™-X Ethernet networking platform as well as an accelerated product release schedule. CoreWeave, GMO Internet Group, Lambda, Scaleway, STPX Global and Yotta are...

    The post NVIDIA Supercharges Ethernet Networking for Generative AI first appeared on AI-Tech Park.

    ]]>
    Spectrum-X Adopted by Cloud Service Providers, GPU Cloud Providers and Enterprises; Broad System-Maker Support Extends NVIDIA Networking’s Reach to Every Market

    COMPUTEX — NVIDIA today announced widespread adoption of the NVIDIA Spectrum™-X Ethernet networking platform as well as an accelerated product release schedule.

    CoreWeave, GMO Internet Group, Lambda, Scaleway, STPX Global and Yotta are among the first AI cloud service providers embracing NVIDIA Spectrum-X to bring extreme networking performance to their AI infrastructures. Additionally, several NVIDIA partners have announced Spectrum-based products, including ASRock Rack, ASUS, GIGABYTE, Ingrasys, Inventec, Pegatron, QCT, Wistron and Wiwynn, which join Dell Technologies, Hewlett Packard Enterprise, Lenovo and Supermicro in incorporating the platform into their offerings.

    “Rapid advancements in groundbreaking technologies like generative AI underscore the necessity for every business to prioritize networking innovation to gain a competitive edge,” said Gilad Shainer, senior vice president of networking at NVIDIA. “NVIDIA Spectrum-X revolutionizes Ethernet networking to let businesses fully harness the power of their AI infrastructures to transform their operations and their industries.”

    Annual Release Cadence
    Spectrum-X is the world’s first Ethernet fabric built for AI, accelerating generative AI network performance by 1.6x over traditional Ethernet fabrics.

    To meet the industry’s strong demand for the performance Spectrum provides, NVIDIA founder and CEO Jensen Huang today announced during his COMPUTEX keynote in Taiwan that NVIDIA plans to launch new Spectrum-X products every year, delivering increased bandwidth and ports and enhanced software feature sets and programmability to drive leading AI Ethernet networking performance.

    Featuring the NVIDIA Spectrum SN5600 Ethernet switch and the NVIDIA BlueField® -3 SuperNIC, Spectrum-X is an end-to-end platform built with the performance and features required by generative AI clouds. Leveraging adaptive routing and congestion control for maximum bandwidth and noise isolation, it offers the highest-performance Ethernet networking for AI, providing predictable outcomes for thousands of simultaneous AI jobs at every scale.

    Combined with NVIDIA BlueField-3 DPUs, the platform enables advanced cloud multi-tenancy, GPU compute elasticity and zero-trust security. With it, cloud service providers can accelerate the development and deployment of AI solutions while improving their return on investment.

    Explore AITechPark for the latest advancements in AI, IOT, Cybersecurity, AITech News, and insightful updates from industry experts!

    The post NVIDIA Supercharges Ethernet Networking for Generative AI first appeared on AI-Tech Park.

    ]]>