All posts tagged: Securing

France and UK to co-host talks on securing Strait of Hormuz – POLITICO

France and UK to co-host talks on securing Strait of Hormuz – POLITICO

Macron later Tuesday said on X that he spoke with U.S. President Donald Trump and Iranian President Masoud Pezeshkian on Monday. After peace talks over the weekend between Tehran and Washington failed to deliver an agreement, Trump said the United States would blockade ships entering or leaving the strait to ratchet up pressure on Iran to strike a deal to curtail its nuclear program and open the vital waterway to maritime traffic. But France and the U.K. have signaled their disapproval of Trump’s latest attempt to strong-arm Iran. Friday’s summit is aimed at “driv[ing] forward the international effort we have built in recent weeks to ensure freedom of navigation,” said a spokesperson for the British prime minister. But it’s unclear how the Franco-British offer will help dial down tensions. U.S.-Israeli strikes on Iran in February triggered a regional conflict in the Middle East and brought navigation in the Strait of Hormuz to a virtual standstill, pushing oil and gas prices up across the globe. The two sides agreed to a two-week ceasefire before talks over …

Merz rejects immediate role in securing Strait of Hormuz amid fragile ceasefire – POLITICO

Merz rejects immediate role in securing Strait of Hormuz amid fragile ceasefire – POLITICO

European leaders have repeatedly said they would help open the contested waterway once the fighting stops, but it hasn’t been clear what that would look like in practice. U.S. President Donald Trump has displayed increasing frustration over the lack of help from America’s European allies in NATO, openly entertaining a U.S. withdrawal from the alliance. The chancellor stressed the need for calm, telling reporters that “we do not want — I do not want — NATO to split. NATO is a guarantor of our security, including and especially in Europe. We must continue to keep a cool head here.” Merz told reporters in Berlin on Thursday that he had explained to Trump by phone that Germany would only participate in securing safe passage through the Strait of Hormuz once the war ends and if two conditions are met. Trump announced Tuesday evening that the U.S. had reached a two-week ceasefire agreement with Iran, subject to the opening of the Strait of Hormuz, a global energy chokepoint. The German leader called the ceasefire a “ray of hope,” …

Trump again berates NATO for inaction in securing Strait of Hormuz

Trump again berates NATO for inaction in securing Strait of Hormuz

Donald Trump lambasted NATO and other allies for rejecting his appeals to help secure the Strait of Hormuz, through which around a fifth of global crude oil and liquefied natural gas normally passes. “I’m so disappointed in NATO, because this was a test for NATO” the US President said during a cabinet meeting on Thursday. FRANCE 24’s Carys Garland reports. Keywords for this article Source link

Securing digital assets against future threats

Securing digital assets against future threats

Two major technological advances—AI and quantum computing—are the impetus for significant innovation across industries. Unfortunately, the cybercriminal ecosystem is no different. Cybercriminals’ experimentation with AI, the threat quantum computing poses to encrypted data, and the rapid adoption of digitized value are resulting in massive changes, says Ian Rogers, chief experience officer at Ledger, a provider of secure signer platforms. “We have lived through the ‘once in humanity’ digitization of all information, and now we are living through the ‘once in humanity’ digitization of all value,” he says. “And I would say, we may all have a bit of whiplash from the internet, but you ain’t seen nothing yet.” The ubiquity of AI and continuing advances in quantum computing will transform the security landscape and change what companies and users need to safeguard their digital assets. Quantum computing poses challenges for the cryptocurrency ecosystem, especially for those areas not updated to use post-quantum cryptography, while AI lowers the barriers to creating synthetic identities and convincing fake information. “We have lived through the ‘once in humanity’ digitization …

The usability imperative for securing digital asset devices

The usability imperative for securing digital asset devices

“As you develop these things, you’re a victim of your own development speed,” says Fadell, who developed Ledger Stax, a signing device for securing digital assets, and is now a board member at digital asset security firm Ledger. “If you introduced these features and functions without the proper review, and now customers are demanding security, you’ll realize that you should have designed it differently from the start, and it’s very hard to undo what you’ve already done.” A critical aspect of designing secure technology, however, must be ease of use too. Without it, it is all too simple for users to make a mistake or use an unsafe workaround that undermines device protections. Think a post-it stuck to a monitor or some variation of “123456” or “admin” for passwords. With digital asset security devices like signers—more commonly called “wallets”—such errors could lead to seriously detrimental outcomes. If, for example, a user’s private key falls into the wrong hands, bad actors can use it to steal their digital assets. Estimates suggest that around 20% of all …

Securing digital identity through advanced biometric authentication

Securing digital identity through advanced biometric authentication

CardLab provides passwordless biometric authentication, protecting enterprises and critical infrastructure from evolving cyber threats and now adds FIDO-certified biometric card and server login solutions. Cybersecurity and digital convenience are now major hot topics, something CardLab foresaw and addressed by adapting our current strategic focus. With global cybercrime costs reaching $9.22tr in 2024 and projected to surge to $14tr by 2028, and with the introduction of quantum computing we must realize that traditional security measures are failing. Stolen credentials, human error, cyber warfare, social engineering, and privilege misuse, such as credential and password sharing, present major risks to digital infrastructure. CardLab has taken on the challenge to solve this by replacing passwords and conventional authentication methods with a much safer and more convenient biometric authentication method. Since our incorporation in 2006, CardLab has addressed these ever-increasing threats with a mission to provide security that is convenient, reliable, and scalable. As a global leader in advanced biometrics, the company specialises in logical and physical access control, identity management, and infrastructure protection. Research and development of biometric cards …

From guardrails to governance: A CEO’s guide for securing agentic systems

From guardrails to governance: A CEO’s guide for securing agentic systems

3. Permissions by design: Bind tools to tasks, not to models A common anti-pattern is to give the model a long-lived credential and hope prompts keep it polite. SAIF and NIST argue the opposite: credentials and scopes should be bound to tools and tasks, rotated regularly, and auditable. Agents then request narrowly scoped capabilities through those tools. In practice, that looks like: “finance-ops-agent may read, but not write, certain ledgers without CFO approval.” The CEO question: Can we revoke a specific capability from an agent without re-architecting the whole system? Control data and behavior These steps gate inputs, outputs, and constrain behavior. 4. Inputs, memory, and RAG: Treat external content as hostile until proven otherwise Most agent incidents start with sneaky data: a poisoned web page, PDF, email, or repository that smuggles adversarial instructions into the system. OWASP’s prompt-injection cheat sheet and OpenAI’s own guidance both insist on strict separation of system instructions from user content and on treating unvetted retrieval sources as untrusted. Operationally, gate before anything enters retrieval or long-term memory: new sources …

Securing digital identity through biometric authentication

Securing digital identity through biometric authentication

CardLab introduces QuardLock, a new era in cybersecurity that offers passwordless authentication with FIDO2 offline biometric fingerprint cards and a certified backend server. State-of-the-art cybersecurity CardLab has developed a biometric ‘authentication as a service’ solution based on biometric smartcards in different configurations for logical and physical access control, combined with a backend authentication system. These biometric smartcards are always offline and play a central role in our consolidated cybersecurity platform. Fingerprint templates are encrypted in the card’s secure element and never leave it. Private keys that are used for authentication and transaction signing are also encrypted in the card’s secure element and never leave it. Nothing in the cards’ secure element is accessible from outside, providing a new level of hacker-proof cybersecurity solution. QuardLock is CardLab’s centralised identity platform, combining an open directory with a single layer that connects and governs access across all IT resources. Securely connect users to their devices, servers, networks, apps, and files, where the “QuardLock” solution can serve as an authoritative directory or defer to existing identity providers. CardLab provides …

Securing digital assets as crypto crime surges

Securing digital assets as crypto crime surges

For businesses to protect cryptocurrency, tokens, critical documents, or other digital assets, this could be a platform that allows multi-stakeholder custody and governance, supports software and hardware protections, and allows for visibility of assets and transactions through Web3 checks. Developing proactive security measures As the threat landscape evolves at breakneck speed, in-depth research conducted by attack labs like Ledger Donjon can help security firms keep pace. The team at Ledger Donjon are working to understand how to proactively secure the digital asset ecosystem and set global security standards. Key projects include the team’s offensive security research, which uses ethical and white hat hackers to simulate attacks and uncover weaknesses in hardware wallets, cryptographic systems, and infrastructure. In November 2022, the Donjon team discovered a vulnerability in Web3 wallet platform Trust Wallet, which had been acquired by Binance. They found that the seed-phrase generation was not random enough, allowing the team to compute all possible private keys and putting as much as $30 million stored in Trust Wallet accounts at risk, says Bouzon. “The entropy was …