Eskenzi PR ad banner Eskenzi PR ad banner
  • About Us
Sunday, 2 April, 2023
IT Security Guru
Eskenzi PR banner
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us
No Result
View All Result
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us
No Result
View All Result
IT Security Guru
No Result
View All Result

Israeli PM calls for internet United Nations

by The Gurus
January 28, 2014
in Editor's News
Share on FacebookShare on Twitter

A version of the United Nations should be created for the internet to include a coalition of the leading companies in the cyber world.
According to the Israeli Prime Minister Binyamin Netanyahu, the internet should be turned from “a curse to a blessing”. He was reported in the Jerusalem Post as saying that “the biggest challenge we face with the cyber world is protecting the privacy and security of the public” at an Israeli cybertech conference in Tel Aviv.
He called on the internet community to create a “sort of UN for the internet” which would be “a coalition of the leading companies in the cyber world.”
Brian Honan, CEO of BH Consulting, told IT Security Guru that it was interesting to note that while Netanyahu advocates a UN type facility, he then goes on to cite that it should be run by “a coalition of the leading companies in the cyber world.”
He said: “I would have grave concerns with the concept of the internet being governed by a coalition of private firms. The strength of the internet is that it is borderless and enables effective information sharing. If we try to restrict that information sharing, we undermine the very principles, freedoms, and advantages that the internet gives us.
“While there are many challenges with how individuals, groups, and indeed nation states are undermining the security of the internet I do not believe setting up one body to rule how we all use the internet is the solution.
“What we need are proper resources given to law enforcement agencies around the world to tackle the scourge of cybercrime, more countries to adopt tougher cyber crime laws, and better education aimed at individuals and businesses.”
Honan also cited the work done by computer emergency readiness teams (CERTs).
Sarb Sembhi, analyst and director of Incoming Thought and ISACA London Security Group member, told IT Security Guru that like the concept of Bitcoin which is run by people, the internet should be run by its global community of users.
He said: “Part of the reason this issue has come up is because of the attack this week, and also the issue of net neutrality in the US, too. With net neutrality you don’t control anything, and all data is equal and not controlled by suppliers.
“In some countries, service providers pass information on to the Government and that intrudes on net neutrality and the privacy aspect is important, but where it is a hub passing data to and from countries, then net neutrality comes into play. It will mean completely different things depending on where you come from, and where Government comes in it is a security issue, but with a privacy issue, it is about net neutrality and service.”
The attack on an Israeli defence ministry computer, which was attacked via a malicious email which claimed to be from Israel’s Shin Bet secret security service. Aviv Raff, chief technology officer at Seculert, said the hackers earlier this month temporarily took over 15 computers, one of them belonging to Israel’s Civil Administration that monitors Palestinians in Israeli-occupied territory.
Raff said that the 15 computers were under the hacker’s control for several days after the January 15th dispatch of the email, which included an attachment about ex- Israeli prime minister Ariel Sharon.
Phil Barnett, vice president of global accounts at Good Technology, said: “Gaining control of computer systems via an email attachment is so old school that it is akin to breaking into the NSA headquarters with a trebuchet. The success of this social engineering technique to infiltrate systems highlight
s the danger of human error within cyber security defences.
“It is critical that employee decisions and instincts are supported by cyber technologies that caution their movements without restricting workflows.
“The potential for malware infection is increasingly significant as more entry points and devices are connecting to networks. The mobility of the 21st century calls for a new era of cyber defences, but this incident reminds us that we can’t forget the old.”
At Cybertech, Netanyahu also took the opportunity to praise Israeli cyber efforts with the Cyber Division in Beersheba. “The Cyber Division was formed so we can share these abilities with others,” he said.
“This plan will enable the growth of hundreds of cyber tech companies that would not have existed otherwise. We see it as a cooperation between the government and the business world that we are committed to for the years ahead.
“This project is big, and reflects our vision to develop Israel with international cooperation. We all want to see a cyber world that is open, free and cooperative. When you think cyber, think Israel.”

FacebookTweetLinkedIn
ShareTweetShare
Previous Post

Data Privacy Day should educate those who breach

Next Post

Troy Hunt talks about "Have I Been Pwned"

Recent News

Data Privacy Day: Securing your data with a password manager

For Cybersecurity, the Tricks Come More Than Once a Year

March 31, 2023
cybersecurity training

Only 10% of workers remember all their cyber security training

March 30, 2023
Pie Chart, Purple

New API Report Shows 400% Increase in Attackers

March 29, 2023
Cato Networks delivers first CASB for instant visibility and control of cloud application data risk

Cato Networks Recognised as Leader in Single-Vendor SASE Quadrant Analysis

March 29, 2023

The IT Security Guru offers a daily news digest of all the best breaking IT security news stories first thing in the morning! Rather than you having to trawl through all the news feeds to find out what’s cooking, you can quickly get everything you need from this site!

Our Address: 10 London Mews, London, W2 1HY

Follow Us

© 2015 - 2019 IT Security Guru - Website Managed by Calm Logic

  • About Us
No Result
View All Result
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us

© 2015 - 2019 IT Security Guru - Website Managed by Calm Logic

This site uses functional cookies and external scripts to improve your experience.

Privacy settings

Privacy Settings / PENDING

This site uses functional cookies and external scripts to improve your experience. Which cookies and scripts are used and how they impact your visit is specified on the left. You may change your settings at any time. Your choices will not impact your visit.

NOTE: These settings will only apply to the browser and device you are currently using.

GDPR Compliance

Powered by Cookie Information