Palo Alto Networks Prepares Organizations for Quantum Security with QRNG Open API

Posted in Commentary with tags on January 22, 2025 by itnerd

 Palo Alto Networks, the global cybersecurity leader, today announced the release of a Quantum Random Number Generator (QRNG) Open API framework, empowering organizations to prepare for future quantum security threats. The framework, developed in partnership with six innovators across the QRNG field, addresses the need for multi-vendor interoperability across the industry and enables organizations to invest in and build QRNG-based systems that are resilient regardless of the underlying technology or company.

The future convergence of AI, ML, deep learning and classical supercomputing with quantum computing necessitates securing today’s systems against quantum-enabled attacks. QRNG is a technology that uses the principles of quantum mechanics to generate truly random numbers, which are essential for creating secure cryptographic keys. Experts recommend the use of recently released NIST post-quantum cryptography (PQC) standards in combination with QRNG to give organizations the best chance to protect against future threats. The QRNG Open API framework eliminates barriers to QRNG adoption, helping global organizations access the highest quality cryptographic operations possible as they prepare for quantum computing technology.

Available through the Palo Alto Networks GitHub portal, the QRNG Open API can be embedded into any application. Later this year, Palo Alto Networks Next Generation Firewalls (NGFWs) will support the QRNG Open API, enabling the network security platform to bring in entropy for cryptographic functions.

Developed by Palo Alto Networks and leading QRNG technology partners, Anametric, ID Quantique, Qrypt, Quantinuum, Quantropi and Quside, the QRNG Open API will:

  • Simplify QRNG integration by removing proprietary silos.
  • Maximize interoperability in multi-vendor networks and promote freedom of choice, allowing customers to select the best technologies and systems for their needs, including both cloud-based and on-prem solutions.
  • Accelerate QRNG adoption by removing barriers with a collaborative, open approach.
  • Provide a common mechanism for obtaining high-quality entropy from an external QRNG platform.

Concur Travel becomes the first booking tool to offer ISO 14083-assured emissions data

Posted in Commentary with tags on January 22, 2025 by itnerd

The new Concur Travel has achieved a significant milestone by becoming the first online booking tool to integrate emissions calculations assured to the new ISO 14083 standard. This development, made possible through our partnership with Thrust Carbon, marks a big step forward in providing accurate and consistent emissions data for customers at the point of booking.

Why ISO matters

The ISO 14083 standard was created to address the confusion and inconsistency caused by the multitude of emissions calculation methods currently in use. ISO 14083 offers a single, globally recognised framework for calculating greenhouse gas emissions across all transportation modes, including air, rail, car and freight. By harmonizing methodologies, ISO 14083 provides organisations with consistent, credible data to guide their regulatory efforts.

This standard also aligns with climate initiatives like the European Union’s Corporate Sustainability Reporting Directive (CSRD) which mandates emissions reporting for over 50,000 companies globally, starting in 2025. Additionally, the proposed Count Emissions EU initiative will require transportation providers to display emissions data at the point of sale. The EU’s endorsement of ISO 14083 as a trusted methodology underscores the importance of adopting this standard.

Leading the way with Thrust Carbon!

The new Concur Travel, in partnership with Thrust Carbon, now delivers ISO 14083-assured emissions data at the point of booking. This integration provides customers with reliable and globally recognised sustainability metrics, enabling organisations to align with incoming international standards.

Thrust Carbon adopts a “multi-methodology” approach to emissions calculations. While their current enhanced ICAO (International Civil Aviation Organisation) approach accounts for real-world factors such as airspace closures, they’ve also introduced a dedicated ISO-compliant formula. This ensures adherence to the standardised requirements of ISO 14083, including the use of consistent flight calculations.

Live now, new Concur Travel customers have access to ISO-assured emissions data, enabling standardised and informed sustainability decisions.

Simplifying emissions reporting

The transition to ISO 14083 standards isn’t just about accuracy, it’s about consistency. For organisations navigating the complexities of CSRD compliance, Thrust Carbon’s robust reporting capabilities ensure that emissions data viewed at the time of booking matches data used within official reports. This alignment simplifies the reporting process and helps businesses make informed decisions about their sustainability strategies.

Creating a sustainable future

In their 2024 Sustainability Benchmark, the Global Business Travel Association (GBTA) assessed the emissions reduction efforts in corporate travel across all industry sectors. On a scale from 0 (no action) to 5 (leading practice), the average sustainability maturity score for the 241 organizations assessed was 1.3. This reveals the severe need for corporate climate action, and that clear, enforceable standards such as ISO 14083 would be instrumental in guiding the collective effort.

By integrating ISO-assured emissions data into new Concur Travel, our customers can confidently navigate a complex future of regulations and advancements knowing that their data is up to the highest standard — equipped with the tools they need to meet their sustainability goals.

What’s next?

The new ISO 14083-assured data is now live in new Concur Travel and is a critical milestone in the mission to provide transparent, reliable and actionable emissions data for customers.

With new Concur Travel and Thrust Carbon’s partnership, businesses can now approach sustainability goals with confidence in the integrity of their emissions reporting.

Samsung Announces The S25 Series

Posted in Commentary with tags on January 22, 2025 by itnerd

Samsung at Galaxy Unpacked in San Jose, California, Samsung has announced its newest smartphone lineup – the highly anticipated Galaxy S25 Series. This new device lineup includes the Galaxy S25, S25+ and S25 Ultra, all of which will soon be available for pre-order. You can find more information on the S25 Series here, as well as some key new features below: 

  • New ways to get things done 
  • Cross App Action: Long press the power button to open Gemini, naturally speak and explain the tasks you want completed, and let AI combine the tasks and complete them for you.  
  • Now Brief: Shows AI-powered insights of your sleep, the weather forecast and even communicates your schedule for the day.  
  • Auto Suggestions: This feature can help you be more productive by suggesting things like turning on your smart washing machine based on your perceived routines or turning on maps to help you navigate to your destination.  
  • Multimodal Search: Allows you to search for a whole range of things easier, including humming the tune of the song you don’t remember.  
  • New ways to create  
  • Audio Eraser: Removes background noise and conversations in video content, isolating and distinguishing the sound you’d like to hone in on. 
  • Auto Trim: Removes unnecessary footage like “ums” and blank spaces in video content. Can also use keywords to help AI know which clips or sound bites to trim out of the video. 

I got an advance look at these devices last week and I have some pictures to share:

One new feature that caught my eye was the morning brief feature which summarizes all your email and notifications among other things on one screen. That makes it easy to figure you what your priorities are when you wake up in the morning.

In terms of accessories, Samsung will have a good selection of first party cases available at launch.

A third party accessory that caught my eye was this:

This 3 in 1 wireless charger and case allows you to charge your S25, Galaxy Buds, and Galaxy Watch on one stand.

The case is required to have your S25 attach to the stand as it has magnets in it to allow that attachment to happen.

And here’s the S25 on the stand. Pretty cool.

Here’s the specs of the different S25 models:

Pricing starts at $1198.99 and goes up to $2458.99. Pre-orders should be live shortly or may already be live by the time you read this.

iOS 18.3 Will Turn On Apple Intelligence Automatically…. WTF?

Posted in Commentary with tags on January 22, 2025 by itnerd

The release candidate of iOS 18.3 hit the streets today. Now a release candidate is basically a beta version of a piece of software that is considered to be stable enough that it may be released to the public. But the person who makes the software wants to make sure that there are no issues of note before it gets released. Thus they put out a release candidate. If it is stable, that’s the version that the public will get. In any case, people who have seen the release candidate of iOS 18.3 have noted that in the release notes for this version, there’s this text:

For users new or upgrading to iOS 18.3, Apple Intelligence will be enabled automatically during iPhone onboarding. Users will have access to Apple Intelligence features after setting up their devices. To disable Apple Intelligence, users will need to navigate to the Apple Intelligence & Siri Settings pane and turn off the Apple Intelligence toggle. This will disable Apple Intelligence features on their device. 

This is the single dumbest thing that Apple has done in a very long time. I say that because you should be able to opt into things rather than be forced to opt out. And with something like Apple Intelligence which is AI by another name, users shouldn’t be forced into running it if they are not comfortable with the implications of running AI on their devices. I say devices because I have seen reports of Apple Intelligence being turned on by default when software updates for Macs appear. What isn’t clear is what happens to users who had turned Apple Intelligence on and then turned it off. Does it get turned back on? That’s pretty bad if that’s the case. What’s clear is that Apple has decided to force Apple Intelligence on its user base whether they want it or not. Which seems so un-Apple like.

Shame on you Apple.

EnGenius Introduces the ESG320: The Ultimate VPN Router for Secure and Reliable Small Business Connectivity

Posted in Commentary with tags on January 21, 2025 by itnerd

EnGenius Technologies, a global leader in innovative networking solutions, is excited to announce the release of the EnGenius Cloud Managed ESG320 VPN Router. Designed to meet the growing demands of small businesses, the ESG320 delivers enterprise-grade performance, robust security, and simplified cloud-based management, making it the ideal choice for companies looking to optimize their network infrastructure, ensure data protection, and increase operational efficiency.

Comprehensive Security with a Stateful Firewall

Businesses face the challenge of securing their networks from external threats while maintaining smooth operations. The ESG320 Cloud Managed VPN Router addresses this with its advanced stateful firewall, which monitors and inspects traffic to safeguard against cyberattacks. It allows only authorized traffic, providing real-time protection against intrusions and malware. This router enables secure access and sharing of critical data while offering flexibility in implementing custom security policies. Additionally, its TPM security chip enhances encryption, preventing unauthorized access and data breaches.

Seamless Auto-VPN and Simplified Network Configuration

Setting up secure connections for remote sites and users can be complex, especially for businesses without dedicated IT teams. The ESG320 simplifies this with its Auto-VPN technology, automatically creating secure VPN tunnels for site-to-site connections. This allows easy connection of branch offices, remote workers, and clients. Key features include VPN healing for automatic recovery from disruptions and NAT traversal for network compatibility. SecuPoint, a VPN client for remote employees, enables hassle-free access to critical resources from anywhere—whether in the office, at home, or on the go.

Optimized Network Performance with Dual-WAN and Cellular Failover

The ESG320 Cloud Managed VPN Router offers Dual-WAN capabilities, providing two separate internet connections that can be used simultaneously to increase bandwidth and optimize network performance. The router includes a Gigabit WAN port, an SFP Fiber Port (WAN1), and a Gigabit LAN port (WAN2) for fast and reliable connectivity. Its WAN load balancing feature optimizes bandwidth usage by distributing traffic across available WAN interfaces, improving network performance and reducing latency. If a WAN connection fails, the cellular failover feature activates automatically through a USB 3.0 cellular modem, ensuring continuous connectivity and minimizing costly downtime.

Cloud-Based Management for Effortless Monitoring and Administration

The ESG320 streamlines network management via the EnGenius Cloud Management Platform, offering a centralized dashboard for remote monitoring and management. Businesses can easily configure and monitor the ESG320 router and other EnGenius devices from one interface. IT teams can conduct real-time diagnostics, track VPN connections, and identify network issues proactively. With automatic updates and remote troubleshooting, businesses can resolve problems quickly, reducing IT workload and costs. The Passthrough Mode allows smooth integration into existing networks without disruption.

Key Features of the ESG320 Cloud-Managed VPN Router

  • Dual-Core 2.1 GHz Processor: Delivers superior speed and performance, enabling businesses to handle demanding networking tasks.
  • Dual-WAN Configuration: Features an SFP port, Gigabit WAN, and cellular failover for continuous, high-speed internet access.
  • Stateful Firewall: Provides advanced protection against cyber threats with high-efficiency filtering and inspection.
  • Auto-VPN: Simplifies the setup and maintenance of site-to-site and client VPNs, ensuring secure remote access to business resources.
  • Gigabit PoE+ Port: Powers devices like Wi-Fi access points, IP cameras, or phones directly from the router.
  • Cloud Management: The EnGenius Cloud Platform offers centralized, remote management for all network devices, ensuring real-time visibility and control.
  • WAN Load Balancing and Traffic Prioritization: Ensures efficient use of available bandwidth and improves network performance.
  • Automatic Firmware Updates: Keeps your network devices up to date without requiring manual intervention, ensuring security and feature improvements.
  • Flexible Connectivity: Supports routed or passthrough mode for easy integration into existing network architectures.

The ESG320 Gateway, with an MSRP of $349, will be available for immediate shipping through the EnGenius Store and EnGenius authorized distributors. For more information about the ESG320, visit ESG320 Cloud VPN Router.

SandboxAQ and Google Cloud Partner to Accelerate Quantitative AI for the Enterprise

Posted in Commentary with tags on January 21, 2025 by itnerd

SandboxAQ announced today a partnership with Google Cloud to integrate and optimize its platform of Large Quantitative Models (LQMs) on Google Cloud while enabling seamless procurement and deployment of SandboxAQ’s solution through Google Cloud Marketplace. SandboxAQ’s cutting-edge quantitative AI technologies, which are driving innovation in drug discovery, chemical and materials science, advanced sensing, and cybersecurity across diverse industries and applications, will leverage Google Cloud as its preferred cloud provider.

‍SandboxAQ is a B2B company delivering solutions at the intersection of AI and quantum techniques. The company’s Large Quantitative Models (LQMs) deliver critical advances in life sciences, financial services, navigation, and other sectors. The company emerged from Alphabet Inc. as an independent, growth-backed company funded by leading investors including funds and accounts advised by T. Rowe Price Associates, Inc., IQT, US Innovative Technology Fund, S32, Hillspire Capital, Breyer Capital, Marc Benioff, Thomas Tull, Paladin Capital Group, and others. For more information, visit http://www.sandboxaq.com.

Posted in Commentary with tags on January 21, 2025 by itnerd

Hewlett Packard Enterprise is investigating claims of a new source code breach after a threat actor said they stole documents from the company’s developer environments.

The company has told BleepingComputer that it hasn’t found any evidence of a security breach, but it is investigating the threat actor’s claims.

“HPE became aware on January 16 of claims being made by a group called IntelBroker that it was in possession of information belonging to HPE,” spokesperson Clare Loxley told BleepingComputer.

“HPE immediately activated our cyber response protocols, disabled related credentials, and launched an investigation to evaluate the validity of the claims. There is no operational impact to our business at this time, nor evidence that customer information is involved.”

IntelBroker, who announced the sale of information allegedly stolen from HPE’s networks, claims they had access to the company’s API, WePay, and (private and public) GitHub repositories for at least two days and stole certificates (private and public keys), Zerto and iLO source code, Docker builds, and old user personal information used for deliveries.

Roger Grimes, Data-Driven Defense Evangelist at KnowBe4 had this to say:

“It looks like HPE took all the appropriate steps. It would be great to know if a breach did occur and, if so, how? As long as HPE disabled the older, possible logon credentials (as they say they did), then the remaining threat comes from the possibly stolen source code. Theoretically, an attacker with the source code can more easily find vulnerabilities and exploit them (or sell those vulnerability findings and/or exploits). Although in practice I’m not aware of an exploit that occurs because of stolen source code. Maybe it’s happened (and I don’t know about it), but the real-world threat from stolen source code doesn’t seem to match the fear. Still, if there was stolen source code and you had a dedicated adversary that was appropriately motivated, having your source code out there is something no development vendor wants. But to me the bigger risk is from unauthorized access to the stolen objects…did it occur, and if so, how did it occur, and what steps have been taken to prevent it from occurring in the future?” 

Hopefully HPE is able to confirm if they were pwned or not, and if they were they need to tell the public what they are going to stop this from happening again. Enterprises need to know that HPE has everything under control. So the more transparent that HPE can be, the better for them.

DSL Reports Is Dead…. Long Live Broadband Bulletin

Posted in Commentary with tags , on January 21, 2025 by itnerd

For years, my go to place for anything from looking for help in regards to telco related issues to getting the inside info on what telcos were doing was DSL Reports. But over the last decade the site had been on the decline. My guess is that the rise of Reddit is responsible for that. However two weeks or so ago the site shut down for good having run since 1999. That left many people like yours truly without a place to go to get all sorts of info in terms of telco related stuff.

Enter Broadband Bulletin which aspires to be the replacement for DSL Reports. We’ll see if it can live up to that aspiration as DSL Reports was held in such high esteem for years. But taking a quick look at the site, it seems that numerous people have found their way here from DSL Reports. So maybe it has a shot. If you’re looking for a new home after the shutdown of DSL Reports, perhaps Broadband Bulletin is worth a look.

Deepfake Research: How Easy Is It to Scam Individuals?

Posted in Commentary with tags on January 21, 2025 by itnerd

There’s some new research which was done by the WizCase team exploring how easy it is to create live deepfake videos and hopefully understand this technology’s potential societal impacts. 

Key findings at a glance: 

  • In the current environment, anyone with the time and patience to learn basic Python coding, along with slightly above-average hardware can create deepfakes independently
  • From the results of their experiment, they were successful in deceiving targets despite both noticing minor anomalies during the video call, and remarked that the issues observed in the video or audio were related to connection problems. 
  • According to data aggregated by Carnegie Mellon University, there was a “nearly five-fold increase” in deepfake incidents from 2022 to 2023
  • Deepfake data is highly disproportionate to the recorded 32% increase in reported overall artificial intelligence (AI) controversies in the same period, suggesting that deepfakes are spreading at a more rapid pace than other AI tech.

While deepfake detection tools are continuously being designed and improved, there’s no telling whether the pace of development for that technology can keep pace with deepfake creation software. As such, users need to remain vigilant of the media they consume, as well as the way they interact with friends, family, and colleagues online. 

You can access their report here: https://www.wizcase.com/blog/deepfake-scam-research/

Xona Launches Secure Access Management Platform To Safeguard Critical Infrastructure

Posted in Commentary with tags on January 21, 2025 by itnerd

Xona Systems, a leading provider of secure access management solutions for critical systems and operational technology (OT) environments, today announced the launch of its new Xona Platform. Designed to provide simple user access without allowing insecure user endpoints from connecting to critical assets, the platform is redefining how industries such as utilities, oil & gas, and manufacturing approach secure access for remote workers, 3rd parties, and onsite employees.

As companies face increasing threats to their critical IT, OT, and cloud-based systems and tighter regulatory compliance mandates, the Xona Platform delivers unmatched security and ease of use, offering an ideal solution bringing together OT managers, CISOs, and IT teams.

Addressing the Number One Threat to Critical Infrastructure

As organizations become more connected and complex, the security of critical systems has been eroded. Reducing this connectivity and complexity is now a top priority. OT environments, in particular, face unique challenges, with legacy IT solutions like VPNs, originally designed for privacy, not security, failing to provide the necessary security and operational continuity.

Xona’s insight is clear: the real challenge lies in providing secure user access to critical systems, without allowing their insecure, transient endpoints from connecting to those critical systems. This approach simplifies user access deployment, administration, and usage, while reducing the critical system attack surface – by preventing up to a 100% of insecure endpoints from connecting – this eliminates the number 1 threat to critical infrastructure.

Key Highlights of the Xona Platform

The Xona Platform stands out in the cybersecurity landscape by offering key benefits like:

  • Identity-based access management for all users including both onsite and remote, and employees, 3rd party vendors, and OEM partners.
  • Disconnected access that eliminates 100% of the insecure endpoints from directly connecting to critical systems reducing the attack surface and safeguarding critical assets from ransomware and malware.
  • Agnostic overlay design that is both technology agnostic and adaptable and doesn’t require network architecture changes, allowing for flexible deployments on premise, at different layers, and using different device options.
  • Zero footprint, best in class user experience using any modern browser to get simple 3-click access to critical systems from anywhere – with no clients, agents, plugins, native software, or cloud access required.
  • Real-time auditability and control with continuous session logging and recording that helps admins simplify access governance.
  • Meets regulatory requirements allowing organizations to address standards and requirements including IEC 62443, NERC CIP, NIST 800-53, FIPS 140-2, RMF, TSA Security Directives, Saudi NCA OTCC-1:2022, and others.
  • Supports the integrated enterprise with integrations for OT and IT identity providers (IdP), SSO, MFA, ZTNA, secrets management, OT asset management, business intelligence, and IT service management tools.
  • Quick and easy deployment and administration. The platform can be deployed in as little as 20 minutes without network changes or complex configurations.

Trusted by Industry Leaders

Leading organizations across multiple industries trust Xona’s platform. Global giants such as GE, Baker Hughes, and Mitsubishi Corporation have adopted Xona’s secure access solutions to protect their critical infrastructure.

One of Xona’s long-standing customers in the energy sector commented, “Xona’s platform has transformed how we manage secure access across our critical infrastructure. It’s the easiest and most impactful tool we’ve implemented in the last year.”

Why Xona Matters in Today’s Market

As critical infrastructure industries face increasing digital threats and navigate an evolving regulatory landscape, secure, simple access solutions like Xona’s are more critical than ever. The platform secures critical OT, IT, and cloud environments and helps companies meet industry standards, including IEC 62443, the Cyber Resilience Act (CRA), and NERC-CIP compliance requirements. Xona provides auditability and governance features that simplify the compliance process, all while reducing the operational burden on IT and OT teams.

Take a First Look or Another Look at Xona

For organizations seeking to improve their OT security, now is the time to consider Xona: www.xonasystems.com