New Quick Start: Build a hybrid data lake on the AWS Cloud with WANdisco Fusion and AWS services

This Quick Start deploys a hybrid architecture that integrates on-premises Hadoop clusters with a data lake environment on the Amazon Web Services (AWS) Cloud. The deployment takes about 15 minutes and includes WANdisco Fusion, Amazon Simple Storage Service (Amazon S3), and Amazon Athena, and supports cloud migration and burst-out processing scenarios. 
Quelle: aws.amazon.com

Simplifying OPC UA security for everyone

At the IoT Expo in Taipei, we were excited to announce our contribution of an open-source, cross-platform OPC UA Global Discovery Server (GDS) to the OPC Foundation. As we have done with our UA-.Net Standard cross-platform reference stack contribution, we will check it in to the OPC Foundations’ GitHub in the next couple of weeks. While an OPC UA GDS also manages OPC UA server configuration and handles centralized discovery, the greatest value of a GDS deployment is its certificate management capability and is described here.

The most important aspect of the digital factory and other connected industrial infrastructure is security. A defense-in-depth security approach is needed on premises and the air gap traditionally used to protect the Operational Technology infrastructure (i.e. the factory floor) from the Information Technology infrastructure (i.e. the back office and public Internet), which was proven insufficient over 7 years ago. For example, Stuxnet managed to “jump” the air gap by infecting laptops of engineers working in the factory who hand-carried the virus on premises. Defense-in-depth means that each machine on the factory floor handles its own security and doesn’t rely on a perimeter security concept alone.

Until now, there are no open-source GDS reference implementations available to the public. Due to this limitation, it is not surprising that the majority of factory operators turn off security (i.e. authentication and encryption) on their machines altogether or rely on a complicated and time-intensive manual exchange of self-signed OPC UA certificates (one per machine/server and one per connecting client). To make this process easier to manage, operators also use insecure locations to store certificates, such as file shares and USB keys. Furthermore, self-signed certificates not only have the disadvantage of being management-intensive, they also rely on the factory operator to make trust decisions based on hard-to-understand information located in the certificate and which additionally can be easily spoofed, as a self-signed certificate cannot be independently validated. Self-signed certificates are therefore not recommended for establishing trust and should not be used. On the other hand, Certificate Authority (CA)-signed certificates as provided by a GDS can be validated (via the certificate “chain” leading back to the root CA) and manual exchange of certificates is eliminated as all certificates signed by a certain CA are trusted by an application trusting the CA. A GDS can also handle the automatic installation of a CA-signed certificate on the machine.

Now, we realize that not everyone will be able to download, compile and run a GDS reference implementation from GitHub. We have therefore decided that we will additionally offer an Azure IoT Edge-based GDS, integrated with our upcoming Azure IoT Hub Device Provisioning Service. This fully cloud-managed GDS will also be available open-source on GitHub and as a Docker container on Docker Hub and will be the first truly global GDS, containing data from a customer’s worldwide industrial OPC UA-enabled machine deployments.

As you can see, we continue to invest in making the factory of the future more secure by simplifying and supporting the leading open industrial interoperability standard OPC UA.
Quelle: Azure

Kaspersky’s Competitors Are Using The US’s Ban As A Selling Point

Eugene Kaspersky, chairman and Chief Executive Officer of Kaspersky Lab, at Mobile World Congress in Barcelona, Spain, in February.

Paul Hanna / Reuters

In the days following the Department of Homeland Security’s ban against using Kaspersky antivirus software, several of that company’s competitors have begun using the controversy for a business advantage.

The ban, issued Wednesday, is the culmination of months of open distrust for the Russian-based company from members of Congress and leaders of the US intelligence community, and reflects a nervousness that information about US government computers is routinely sent to servers in Russia. DHS’s statement echoes the broad distrust that community has of Russia since that country’s interference in the 2016 US election, saying “The Department is concerned about the ties between certain Kaspersky officials and Russian intelligence and other government agencies.” A spokesperson for Russian President Vladimir Putin has characterized the ban as an attempt to harm a prominent Russian company in the international market.

The company’s founder and CEO, Eugene Kaspersky, who was trained by Russian intelligence as a young man, has long vocally insisted that he abides by the laws of every country that uses his software and that he has no direct ties to any intelligence agency. He has been invited to testify before the House of Representatives about his company and has applied for an expedited visa to go to Washington.

The DHS itself is unsure of exactly how many federal computers use Kaspersky software, a representative said, which is why the first order of its ban is for a full federal accounting of how many systems have it installed.

Some industry executives have openly pondered whether the Kaspersky ban was more motivated by politics than by an actual problem with its products. David Kennedy, founder of Cleveland-based TrustedSec, previously told BuzzFeed News that “we don’t know if Kaspersky has direct ties” to Russian intelligence.

But other Kaspersky competitors have seized on the controversy. Canadian company Softchoice emailed potential clients, explicitly encouraging them to drop Kaspersky for their service.

In an email acquired by BuzzFeed News, Softchoice Senior Account Executive Nick Young sent a potential client a link to a New York Times story about the DHS ban, writing “if you are utilizing Kaspersky I thought you might want to take a look at this recent announcement.”

“A recent client of ours was in the middle of a three-year Kaspersky investment and IT is now being directed by the business to pull the investment and move to a new solution following the US Government’s decision to do the same,” Young added.

US-based Symantec tweeted a story by cybersecurity news site Cybserscoop about the FBI urging American customers to drop Kaspersky.

Neither Softchoice nor Symantec returned BuzzFeed News’s request for comment.

But another company that sent out such emails, US-based Malwarebytes, said it was a mistake. A Malwarebyte marketing email read, in part, “If the US Government's ban of Kaspersky Lab's software has you concerned or you simply want to strengthen your security posture, it might be an opportune time to discuss Malwarebytes antivirus replacement for business.”

“This is not OK,” Malwarebytes CEO and cofounder Marcin Kleczynski told BuzzFeed News. “This was a third party marketing company that helps us get appointments with prospects.”

At least one cybersecurity company, however, said such ads are simply an expression of business competition. Romanian company Bitdefender ran a Facebook ad with a picture of a Trojan horse alongside the text “Bitdefender is helping customers all over the world switch from Kaspersky to a trusted endpoint protection solution.”

“That is a tactical competitive marketing displacement campaign, this type of campaign is a fairly common marketing tactic,” said Damase Tricart, the company’s global communications director. The company isn’t unfairly singling out Kaspersky, he explained – it frequently creates marketing campaigns that specifically target competitors. As evidence, he pointed to a current campaign to convert Symantec customers.

Kaspersky himself characterized the ads as ineffective but reflecting badly upon his competitors.

“While we don't see a tangible negative impact from this marketing activity this is very bad for image of the cybersecurity industry,” he told BuzzFeed News.

Quelle: <a href="Kaspersky’s Competitors Are Using The US’s Ban As A Selling Point“>BuzzFeed