UAAP Season 80 Preview: UE aims big after ‘disappointing’ run last season

first_imgView comments Hotdog’s Dennis Garcia dies “I expect him to carry the load for our team. He will be our leader for this season. He played well last season. In the first three to four games, he was still adjusting, but this season, I expect him to have a full blast right from the start,” he said.But it’s not just about Pasaol as the Red Warriors will also have guard Philip Manalang and team captain Mark Olayon giving Pumaren enough reasons to think that his team would be no pushover.“We are there. We’re getting there. As I’ve said, of course I’d be lying if we are not looking at the Final Four. We’re not just there for participation, but the objective right now is to better our performance last season because we disappointed the UE community,” he said.“That’s what I’m looking forward. And the team knows that. We are looking forward and hopefully, we’ll just play hard and compete with other teams.”ADVERTISEMENT Don’t miss out on the latest news and information. LATEST STORIES Search on for 5 Indonesians snatched anew in Lahad Datu But from the rubble of the past season is where Pumaren hopes the Red Warriors will come out of as they aspire to go deep this time around.“It was a really disappointing season for us last year,” Pumaren said.FEATURED STORIESSPORTSEnd of his agony? SC rules in favor of Espinosa, orders promoter heirs to pay boxing legendSPORTSRedemption is sweet for Ginebra, Scottie ThompsonSPORTSMayweather beats Pacquiao, Canelo for ‘Fighter of the Decade’“We are looking forward for a better performance this coming season and we’re hoping that the guys I’m relying on to deliver will deliver this time,” he said.Pumaren is putting Alvin Pasaol under the spotlight as the 6-foot-3 forward will be front and center in UE’s charge this season after a promising showing last year Marcosian mode: Duterte threatens to arrest water execs ‘one night’ UAAP Season 80 Preview: Sablan vows different UST Tigers will show up Coach: Derrick PumarenLast Season: 3-11 (7th Place)Holdovers: Alvin Pasaol, Philip Manalang, Mark OlayonAdditions: Mark MalolesKey Losses: Bonbon Batiller, Edgar Charcos, Paul VarillaUniversity of the East had a failed campaign last year, finishing at the bottom of the standings with only three wins to show.ADVERTISEMENT Bishop Baylon encourages faithful in Albay to help Taal evacueescenter_img OSG plea to revoke ABS-CBN franchise ‘a duplicitous move’ – Lacson Police seize P68-M worth of ‘shabu’ in Pasay Redemption is sweet for Ginebra, Scottie Thompson MOST READ Hotdog’s Dennis Garcia dies For the complete collegiate sports coverage including scores, schedules and stories, visit Inquirer Varsity. Filipinos turn Taal Volcano ash, plastic trash into bricks PLAY LIST 01:40Filipinos turn Taal Volcano ash, plastic trash into bricks01:32Taal Volcano watch: Island fissures steaming, lake water receding02:14Carpio hits red carpet treatment for China Coast Guard02:56NCRPO pledges to donate P3.5 million to victims of Taal eruption00:56Heavy rain brings some relief in Australia02:37Calm moments allow Taal folks some respite Sports Related Videospowered by AdSparcRead Next Britain’s Prince Harry and Meghan Markle to give up royal titleslast_img read more

Massive Meter Theft Compounds West Pointers’ Erosion Woes

first_imgIt started with what has now been rated the worst sea erosion to ever hit and almost robbed the impoverished township of West Point of its existence, destroying dozens of zinc shacks and a few concrete buildings and leaving hundreds homeless.Then in early September, the reach of the erosion washed away the only paved road to the township, destroyed several Liberia Electricity Corporation (LEC) light poles and plunged that densely populated community into darkness for over three weeks, leaving residents at the mercy of marauding hard-core township criminals.Suddenly, a week ago, hundreds of West Point residents took to the only remaining street in jubilation of the LEC’s decision to restore electricity to the township. Their jubilation was, however, cut short when they realized that many of the LEC poles had been looted of the meters.Many of those affected blamed the LEC management for its “don’t care-fy attitude” towards the residents by failing to conduct daily inspections of the poles. According to sources, each of the meters costs US$150. The lootings are suspected to be carried out during the small hours of the night, with accusing fingers being pointed at some former and current LEC employees, allegedly assisted by some unemployed youths in both Clara Town and West Point. “We who are legally transacting business with the LEC have now turned beggars to those who steal current and deny government revenue,” a distraught resident told our reporter.Two of those hardest hit by the meter theft, Siahr Nyumah and Adama Bah – both proprietors of provision shops – told our reporter that they are living at the mercy of those who have by-passed the LEC prepay system and are giving out current to individuals who make monthly payments as low as US$10 and as high as US$20, depending on individual needs.According to them, a few days ago, people believed to be LEC employees visited the township to assess the magnitude of the damage to their system during the three-week blackout. When inspected, the cables connecting many of the poles were found totally without meters (each pole contains about 15 meters), which were visibly disconnected from the empty boxes.West Point Commissioner, Sampson Nyan, confirmed the theft of the meters, but could not say how many legal meter owners were affected.It can be recalled that during several appearances before Legislative Committees and Senate Plenary, the management of LEC complained that the corporation was sustaining a monthly loss of over US$250,000 due to power theft, mainly from communities like West Point, NewKru Town and Clara Town, among others.During a recent town hall meeting with community leaders in Monrovia, the LEC’s Deputy Managing Director for Customer Services, Famatta Sirleaf, disclosed that a fine of up to US$350 awaits power thieves and those tampering with electricity meters. The penalty, she said, is imposed to serve as a deterrent to power theft.The LEC executive highlighted the dangers power theft poses to thieves and the end users, saying scores of young Liberians have lost their lives stealing current.Share this:Click to share on Twitter (Opens in new window)Click to share on Facebook (Opens in new window)last_img read more

Chelsea teen shows Messi how it’s done with amazing skill and goal

first_img1 With incredible close control and quick feet, Chelsea teenager Jeremie Boga glided past his markers to score a stunning goal for Chelsea’s U21 side.The 17-year-old attacker scored both goals as Chelsea beat Everton 2-0 on Sunday.Boga was born in Marseille, France and joined the Blues’ U12 team and made his debut for the U21 side two years ago while still an U15 player.As you can see, he appears to be a player to watch out for. Chelsea’s Jeremie Boga last_img

Ronaldo to begin Juve adventure in intimate alpine friendly

first_img0Shares0000Juventus fans will have their first sight of Cristiano Ronaldo in black and white stripes in a pre-season match against the club’s B team on Sunday. A Turin hit by Cristiano Ronaldo fever awaits the striker as Juventus prepare to unveil the surprise signing, that after the end of the World Cup, puts all eyes on the Italian champions and Serie A. © AFP/File / MIGUEL MEDINAROME, Italy, Aug 11 – Juventus fans will get their first glimpse of superstar summer signing Cristiano Ronaldo in rarified surroundings on Sunday, when he makes his debut for the Italian champions at the foot of the Alps a week before the start of the new Serie A season.Ronaldo, who signed for Juventus from European champions Real Madrid in a shock 100 million euro ($117 million) deal exactly a month ago, will wear the Juventus kit for the first time in the club’s traditional pre-season friendly between Juve’s first XI and a “B” team in Villar Perosa, a small town 40 kilometres (25 miles) west of Turin. Set in a valley at the foot of the Italian Alps, Villar Perosa (population: roughly 4,100) is the home of the family estate and summer retreat of the powerful Agnellis, who, apart from a brief period around the Second World War, have run Juventus since 1923 and established the traditional alpine curtain raiser.Members of the industrial dynasty — founders of Fiat car manufacturers and often called the “Italian Kennedys” — have lived at “The Castle” in Villar Perosa since the 19th century, while deceased former club chairman Gianni Agnelli was town mayor between 1945 and 1980.– Up close and personal –Used to imposing arenas such as the Camp Nou, Old Trafford and the Bernabeu, current Ballon d’Or holder Ronaldo will take his first steps in black and white stripes at the town’s compact ground, named after notoriously brutal Italy centre-back Gaetano Scirea.There should be more fans at the match than the entire population of Villar Perosa, with the 5,000 tickets available long-since sold out and even more supporters desperate to try and catch a glimpse of their new idol.Such is the enthusiasm for Ronaldo’s debut, that special security measures have been drafted in the town for the match, including a complete ban on the sale of alcohol from Saturday.Ronaldo’s arrival had sparked rumours that the match would be moved to the Allianz Stadium such was the enthusiasm from fans after his signing, but the club decided to stick with the traditional bucolic setting.That could mean Ronaldo gets even more up close and personal with Juve fans.Established custom dictates that five minutes after half-time fans invade the pitch, bringing the game to a halt as fans charge after and greet their heroes.– Superhuman? –Ronaldo joined the team for training on Wednesday with Juventus two important players lighter after their return from the International Champions Cup in the United States.The 33-year-old’s arrival pushed striker Gonzalo Higuain to rivals AC Milan, and the Argentine was joined by the impressive Mattia Caldara, who has established himself as one of Serie A’s best defenders since breaking through at Atalanta two years ago.Caldara arrived at Juve in early July only to be swapped last week with Leonardo Bonucci, who returned to Turin after just one unconvincing season with Milan.The decision to deprive themselves of a proven Serie A goalscorer and in particular to swap Caldara, 24, for 31-year-old Bonucci has left some question marks over Juventus despite Ronaldo’s proven prowess.His domestic form — despite scoring 26 goals in La Liga — was below the almost superhuman levels that had characterised his time in Spain as Madrid finished third behind local rivals Atletico and a whole 17 points behind champions Barcelona.However Juve’s closest recent challengers — Napoli and Roma — have sold important players this summer, and Napoli have to adapt to new coach Carlo Ancelotti following talismanic Maurizio Sarri’s departure and subsequent move to Chelsea.– Euro ambitions –Juventus have signed Ronaldo not to cement their domestic dominance, after winning seven straight league titles, but to boost their international profile and bag their first Champions League triumph in over two decades.Last season, Ronaldo was his usual dominant self in Europe as he smashed 15 goals to top the Champions League scoring charts and fired Real Madrid to continental glory for the third straight year.Leonardo Bonucci has returned to Juventus after an unhappy year with AC Milan. © AFP/File / MARCO BERTORELLOInterest in Juve and in Italian football has spiked following Ronaldo’s arrival. July visits to the club museum shot up 15 percent compared to last year, and were nearly a third more than in 2016, and the over 29,000 season tickets available to fans have been sold despite a deeply unpopular 30 percent price bump announced before Ronaldo’s arrival.ESPN have snatched the rights to broadcast Serie A in the United States from BeIN Sports (although the league has not said how much the network will pay) and World Cup Golden Ball winner Luka Modric is also pondering a move to join former teammate Ronaldo in Italy — at Juve’s arch rivals Inter Milan.0Shares0000(Visited 1 times, 1 visits today)last_img read more

Handcuffed OC sheriff goes to court

first_imgCRIME: Carona, known from Runnion case, is accused of corruption. By Gillian Flaccus The Associated Press Five years ago, Orange County Sheriff Michael S. Carona became an overnight sensation when he looked into the cameras and told a 5-year- old’s murderer, “Don’t sleep. Don’t eat. We’re coming after you.” He and his wife, Deborah, held hands as they raced to a waiting SUV and sped off without comment. He has turned over his passport, but the magistrate denied a prosecution request to confiscate his firearm. Also charged are his wife and mistress, who is an attorney; both appeared in handcuffs with Carona on Wednesday. Two former assistant sheriffs already pleaded guilty to lesser counts in exchange for their help building a case against Carona. David Wiechert, an attorney for Carona’s wife, said he believed his client was included in the indictment to put pressure on her husband. A public defender assigned to Debra Victoria Hoffman, identified as Carona’s mistress in court papers, did not speak with reporters at the hearing. An after-hours call to her office was not immediately returned. Prosecutors accuse Carona and others of collecting $350,000 in everything from payments, loans, a boat, vacation expenses, watches, ringside boxing tickets and luxury box seats to the World Series playoffs. Carona has denied the charges – he faces seven counts of conspiracy, mail fraud and witness tampering – and vowed to remain in office. “He’s so anxious to fight these charges that we have to hold him back,” said Carona’s attorney, H. Dean Steward. “He’s angry. He didn’t want to go through this today and he’s embarrassed.” Steward maintained that federal authorities could have allowed his client to avoid being detained in a cell and appearing in court with handcuffs, but they chose not to for symbolic reasons. “They were trying to send him a message: … `You did something very bad, we gotcha,”‘ Steward said. “If you want to play it that way, we’re ready.” Meanwhile, some local officials called for Carona’s ouster. Orange County Supervisor John Moorlach wants Carona to resign so the region’s governing board can name an interim sheriff until next year’s election. Corona gained national attention during the 2002 investigation into the kidnapping and murder of 5-year-old Samantha Runnion. CNN’s Larry King called him “America’s Sheriff,” a nickname that appears on Carona’s official biography.160Want local news?Sign up for the Localist and stay informed Something went wrong. Please try again.subscribeCongratulations! You’re all set! AD Quality Auto 360p 720p 1080p Top articles1/5READ MOREGame Center: Chargers at Kansas City Chiefs, Sunday, 10 a.m.What Carona was allegedly doing off-camera, however, is now a bigger story – one that could put him in prison for years and end dreams of a high-profile political career. Carona appeared in federal court Wednesday on corruption charges in an alleged conspiracy to enrich himself, his wife and mistress by accepting cash and gifts in exchange for political favors. Wearing handcuffs, the head of the nation’s fifth largest sheriff’s department listened quietly and responded, “Yes, Sir,” when a magistrate asked if he understood the charges. Carona did not enter a plea, although his attorney said outside court he would plead not guilty to all charges at a hearing Monday. After surrendering to federal authorities Wednesday morning and being held in a cell several hours, he was released later in the day on $20,000 bond. last_img


first_imgThere was a huge turnout at the official opening of the new sports shop of Donegal GAA stars Michael Murphy and Neil Gallagher.A large crowd attended the official opening, with many well wishers visiting the new store to wish the men well in their new business venture.Murphy and Gallagher have insisted though that their primary focus at the minute is the All-Ireland semi-final clash with Dublin at Croke Park on August 31st. Pictures by Brian McDaid, Cristeph Studio. PICTURE SPECIAL – DONEGAL STARS MICHAEL & NEIL OPEN THEIR NEW SPORTS SHOP was last modified: August 15th, 2014 by Mark ForkerShare this:Click to share on Facebook (Opens in new window)Click to share on Twitter (Opens in new window)Click to share on LinkedIn (Opens in new window)Click to share on Reddit (Opens in new window)Click to share on Pocket (Opens in new window)Click to share on Telegram (Opens in new window)Click to share on WhatsApp (Opens in new window)Click to share on Skype (Opens in new window)Click to print (Opens in new window) Tags:FeaturesMichael MurphyNeil Gallaghernewspicture specialSportssports shoplast_img read more


first_imgVOODOO VENUE WEEKEND PICTURE SPECIAL: We had another superb Donegal International Rally Weekend at Voodoo Venue – Donegal’s No 1 nightspot.At Voodoo revellers have the opportunity of sampling the sounds of Voodoo Lounge, Voodoo Club and Voodoo Vintage, that diversity which caters for all ages is what ultimately makes Voodoo Venue so unique in the entertainment industry. Every week Voodoo in conjunction with Donegal Daily are giving ONE lucky reader that has been pictured enjoying themselves at Voodoo the chance to win FREE entry for FOUR and a bottle of CHAMPAGNE on their next visit to Voodoo.It’s simple – if you’re face is circled in the images above then you’ve WON.Simply contact Voodoo via their Facebook page to claim your prize NOW.DONEGAL RALLY WEEKEND – VOODOO VENUE WEEKEND PICTURE SPECIAL was last modified: June 24th, 2015 by Mark ForkerShare this:Click to share on Facebook (Opens in new window)Click to share on Twitter (Opens in new window)Click to share on LinkedIn (Opens in new window)Click to share on Reddit (Opens in new window)Click to share on Pocket (Opens in new window)Click to share on Telegram (Opens in new window)Click to share on WhatsApp (Opens in new window)Click to share on Skype (Opens in new window)Click to print (Opens in new window) Tags:EntertainmentFeaturesnewsVoodoo Venuelast_img read more

Meeting sought with Letterkenny bus operator over Long Lane ‘exclusion’

first_imgLetterkenny councillors are seeking a meeting with the operator of the Letterkenny Town Bus over issues with the route and service.A number of concerns about the local bus were highlighted at this month’s council meeting, while Cllr Gerry McMonagle claimed that the entire Long Lane area was being denied access to the service due to a past incident.“The operator is insisting that he won’t go up Long Lane and that’s exclusion,” Cllr McMonagle said. “A number of years ago there was a window broke on one of the buses on Long Lane by a young lad and there hasn’t been a recurrence.“There is no reason why this gentleman should be allowed to deny a large number of people because a window was broke four years ago.”Cllr McMonagle also questioned whether the operator is legally allowed to avoid a road under the licence granted by the local authority.Cllr Ciaran Brogan proposed that the council members meet with the operator to share the concerns of local residents who want to see the service improved. Meeting sought with Letterkenny bus operator over Long Lane ‘exclusion’ was last modified: November 12th, 2019 by Rachel McLaughlinShare this:Click to share on Facebook (Opens in new window)Click to share on Twitter (Opens in new window)Click to share on LinkedIn (Opens in new window)Click to share on Reddit (Opens in new window)Click to share on Pocket (Opens in new window)Click to share on Telegram (Opens in new window)Click to share on WhatsApp (Opens in new window)Click to share on Skype (Opens in new window)Click to print (Opens in new window)last_img read more

Steve Mouzon on the New Business of Business

first_imgFernando Pagés Ruiz is a builder and author. He has developed, built, and remodeled homes in California, Nebraska, and Wyoming, and has won a number of awards, including recognition from the National Association of Home Builders. The new business modelPatience: New Media is arguably a powerful way for any business to reach new prospects today. But social media works very slowly and cumulatively. If you start tweeting tomorrow, it won’t have an impact immediately. However, in time you will see more results from this effort than you will ever see with traditional marketing. Patience is exactly the opposite of faster.Generosity: Generosity is the opposite of cheapness. People have a hard time letting go of their money today, so you must be willing to give things away … on the internet. Even when you know that the majority of the people that will benefit won’t ever contact you or do business with you.Nowadays, traditional advertising teasers are considered spam, and spam turns people off. Traditional media is having trouble attracting advertisers because people skip past the commercials, or seek non-commercial media for entertainment. To engage potential clients you have to start an interesting conversation with them, and then they will engage you.The old way was to hold your cards close to your chest, protecting trade secrets. The new way is to get up on YouTube and explain exactly what you do and how. Eventually you will get known for this, and customers will come to you not because of your mysterious secret sauce, but precisely because they know exactly what you do and how you do it. They trust you.Connectedness: Connectedness is not the exact opposite of “better,” but it’s got a funky relationship to the concept of “new and improved.” To explain this “funky relationship,” Steve sited an example: “I founded a group called ‘The New Urban Guild.’ It’s a voluntary work group, a think tank of sorts, with some of the best designers I know. By working with this group of people, who are my heroes, I have gotten much better myself.“It used to be that if you got really good, you got really famous and everyone wanted to contact you, at which point you got ‘connected.’ Unfortunately, you also likely developed arrogance, which nobody likes. But if you start connected and get better through the connectedness, you understand where your expertise came from and it develops humility.” Putting it in practiceBy this point in the conversation, I was sold on the new business plan. It gave a hard-nosed basis to something I’m keenly drawn to by nature, which is being a nice guy. But Steve warned me, “Much of this is anathema to the old ways, so you have to decide what your prime virtues of business are. You can’t just do a part of it. You have to do it all or none. You have to decide if you’re part of the old or part of the new.”So I asked Steve for some practical examples of what it means to be “part of the new.”“When I am trying to get better by going to a conference, I listen and take notes. But instead of taking notes on paper, I take notes with Twitter. This not only gives me access to my notes later, it gives me public access as well. Not only am I getting better, but I am also getting 20 to 30 new followers each day because I am giving things always. So I am connected to and learning from my community while being generous, which brings new clients, and exercising patience because all of this may not bring immediate results,” Steve explained, wrapping all the virtues into one simple tip: take notes on Twitter.When a builder is sharing what he learns through social media, that builder becomes a lot more interesting than the other guy to a prospective client. And once a builder gets hooked on sharing what he learns, he becomes addicted to learning. The need for content forces him to develop expertise, becoming even more attractive to clients.The net effect of Steve’s three new business principles have is that you will learn; in time, people will find out that you know stuff; and you and your business will growTo learn more about Steve’s approach, check out “New Media for Designers and Builders.” True to his word, you’ll find two thirds of Steve’s material on the web absolutely free. A few of you will buy what’s missing. RELATED ARTICLES Architect Turned Master Marketer Writes a BookGiving Architects Free Rein to Go GreenHow to Solve the Energy Puzzle The green-building movement proved resilient during the Great Recession and beyond. While conventional builders went bankrupt, many green builders thrived. This trend continues, so when I heard that green-building guru Steve Mouzon, author of The Original Green, was holding a seminar on new approaches to building up green business, I wanted to know more.I spoke with Steve while he was on the road in Birmingham, Alabama, and I asked him, “What’s different about the new green business plan from the traditional builder’s approach?”His answer surprised me: “The building business, and really all business,” he said, “has changed more in the last ten years than it has since the Industrial Revolution.” I was skeptical.He went on, “For last 250 years it’s about better, faster, and cheaper,” he explained, “but now there’s a new business model that, in many ways, represents just the opposite.”The new business model is based on three very new-age sounding virtues that may not appeal to the hard-nosed businessman right away. But once you hear him out, Steve makes a lot of sense, as you consider how and why today’s super successful companies prosper.The three new business drivers, according to Steve, involve patience, generosity, and connectedness. If this makes as little sense to you as it did to me on first hearing, read on, because you will be convinced.last_img read more

Why data security is really everyone’s challenge today

first_imgReadWrite Sponsors Why IoT Apps are Eating Device Interfaces Follow the Puck Related Posts Small Business Cybersecurity Threats and How to…center_img The prevalence and proliferation of connected devices has undoubtedly improved efficiency in people’s lives, but the massive amounts of personal data required to operate such devices has raised numerous safety and security concerns. We spoke with Gerald Reddig, Nokia’s head of security marketing, and Daisy Su, Nokia’s connected device platform marketing manager, to gain a better understanding of what’s happening in the IoT security landscape, and what Nokia is doing to ensure that customers’ data stays safe.ReadWrite: The Internet of Things provides new ways to use services that are reliant on data and providing a platform in the cloud. So we kind of know that end users are going to have issues around data security. How do we overcome the customer’s fears regarding security?  Gerald Reddig: One of the nice proof points for all of the initiatives that we started in Nokia has to do with the Mirai botnet attack — the biggest IoT attack ever. This type of breach attacks internet or service providers; in the Mirai case, the service provider was hacked by IoT devices that were managed by neither the end user nor the manufacturer. This raised an important question in the IoT industry — should we secure the device itself or the data from the device, within the application server? The bottom line is that there is actually no single magic security bullet that can easily fix all the key IoT security issues. You need to attack the problem from different angles. There are a range of different issues to consider in IoT security. The first is IoT network security, which protects and secures the DNS or connected devices to backend systems on the Internet. Then there’s IoT authentication, which provides the ability for users to penetrate the IoT device and the management of overseeing the device. The third is encryption, or putting data in transit between IoT edge devices and backend systems. IoT public key infrastructure (PKI) typically originates from service providers and ensures that the radio access network (RAN) system provides digital certificates and cryptographic lifecycle capabilities. The fifth and biggest industry topic right now is IoT security analytics, which is process of collecting, aggregating, and monitoring all of the data.These top five IoT security pieces are on Nokia’s radar to help security become more proactive, rather than simply reactive.  Nokia developed a security architecture for service providers and enterprises that helps to deploy the right balance between both proactive and reactive security.RW: Where do devices fit into the security picture?Daisy Su: When talking about security, we need to focus on end-to-end security, covering not only network connectivity and the applications in which the user data is being transported, but also the device itself. What we have learned and discovered is that many IoT devices behave similarly to mobile devices in terms of connecting to mobile networks, and we need to make sure that the device management lifecycle that we traditionally do for mobile is applied to the entire IoT as well. Here are a few common security questions related to mobile devices that are relevant to IoT:   How do we authenticate devices to make sure that they have the correct identities and credentials to be allowed into the system without compromising the network? How do we apply access control to make sure that the right users and the right devices do only what they are supposed to do?How do we ensure that the data from the devices is transported through a secure channel onto mobile networks so that it cannot be compromised tampered with?How do we ensure data confidentiality, so that the intended receiver of the data is the only one who can read the data?How do we ensure that we know the status and the availability of all the devices connecting to this network?We also need to be able to generate secure passwords and allow future locking and wiping for IoT devices if they are compromised. It is essential that we be able to apply security fixes remotely and to neutralize the IoT security threat when vulnerability is detected. Many IoT developers today have not focused strongly enough on how to secure the devices and connectivity to the networks. They have a general understanding on how to secure devices from the Internet point of view, but securing them on a mobile network involves very different knowledge, experience, and learning. There are a lot of back doors in IoT that people just don’t know how to close. Nokia has solutions to help both IoT service providers and mobile network operators track down and actively secure the vulnerable devices before, during, and after the attacks. We also provide a way to access millions of network connected devices, secure them and apply software update and security patches remotely. RW: What are some of the best practices, as we add millions of devices, in terms of deploying IoT networks?DS: Managing network-connected devices starts with making sure that devices are certified according to industry standards and network operators’ specifications. At Nokia, we are helping service providers certify their mobile and IoT devices before on-boarding them to their network. For example, with our largest North American operators, we provide self-verification for device vendors to test their devices against the device protocols required. We also provide verification services for both network operators and device vendors to test and verify the devices with the end-to-end network use cases, making sure that they don’t compromise the network once they connect. Once the device is certified, being able to connect the network to the proper on-boarding procedure is really important. The on-boarding procedure has to make sure that these devices are authorized and authenticated to connect to the network in real time. But the complete device lifecycle management goes beyond certification and on-boarding. With Nokia Connected Device Platform, we can qualify the devices and detect new devices as soon as they attempt to connect to the network, thus authenticating and authorizing proper devices for access to the network. We can automatically and remotely activate, deactivate, and configure features and functionalities for the devices based on triggered policies and mobile network requirements. We can also provide maintenance functions, and identify and manage the flaws with the devices. Additionally, we can efficiently apply the most recent software and firmware updates onto millions of network-connected devices remotely.  When devices need security updates, these can be burdensome tasks, but we at Nokia can provide and support security updates for the mobile service provider. With IoT, there are multiple device models and that are flooding the network, each of which supports multiple OS versions; every security update must be unique to a specific device model’s specific OS system. So with millions of IoT devices connected to multiple networks, you have to figure out a way to update devices in the least amount of time and effort possible. You need a dynamic system to enable you to organize, analyze, and apply that firmware. At Nokia, we have successfully updated the security of more than 300 million mobile devices. GR: What Daisy just described is incident prevention, incident detection, and incident mitigation. The second part, incident detection, is where the service providers play an important role with sophisticated machine learning analytics software. All of these big data techniques provide more predictive modeling for anomaly detection. RW: There are a lot of solutions out there, and Nokia has it’s own as well, but what’s unique about how you’re addressing attack prevention? GR: Our end-to-end security portfolio, which is called Netguard Security, makes it simpler by cutting the security issue into three main blocks. Block one is endpoint security, which involves the encryption and authentication of end points and the detection of traffic anomalies. The second block is network security —  the most essential part and probably, from the market revenue perspective, the most relevant because it covers the perimeter protection against external attacks. Block three is security management, which helps reduce the response time of security teams and even automate parts of mitigation processes.  Let’s use the Mirai botnet attack again as an example. Our threat intelligence center alerted our customer by providing guidance on how to react and implement new security policies, though in many of our networks, Mirai was not present at all. Still, we made sure that our customer was prepared in case they were attacked — that’s a critical part of security prevention. This kind of threat intelligence helps all customers implement preventative security, and with the even more sophisticated attacks we see on the cybersecurity horizon, you can’t be too prepared. RW: Is there a different approach for enterprise? How is Nokia dealing with this target?GR: What comes to mind is my recent conversations with some enterprises at one of the trade shows in the critical communication world in Hong Kong — the question I always get is how I can make sure that the convergence that happens between information technology and operations technology does not create a disaster precipitated by a hacker attack. The typical nightmare scenario for all security people working in the utility industry is that someone could hack into the IT system and get across to the OT. We have also recently seen attacks involving advanced persistent threats, like in Ukraine, where hackers gained access to the power grid system and denied thousands of people electricity for a few days.The critical question is not that there is a big difference between SP service providers and enterprises, but rather how to reduce the pain of the volume and the velocity of security data alerts. More than 90 percent of enterprises receive more than 150,000 security alerts a year. With only a small team, there’s no way to look to all of the alerts; our research found was that only 30 percent of security alerts are investigated. This makes today’s technology landscape fertile ground for hackers. Target Inc., for example, has been hacked, and the hackers lurked inside the company’s network for months before they started exfiltrating the actual credit card data. Hackers are masters at waiting until the prime opportunity to strike presents itself; the average dwell time, the time that threat actors lingers in a victim’s environment until they are detected, in cyberspace is 146 days. Today, we know that hackers are beginning to compromise low-value assets capture the big fish — the high value assets. We must make the dwell time harder and shorter to make hacking itself harder. This requires new security management to reduce the alert noise and focus on the real threats.Finally, we must shorten the time between detection and remediation. And that’s what Nokia developed. Our NetGuard security management centers are easy-to-use security operations, analytics, and reporting software solutions that enable operators to prevent, pinpoint, and address security threats before they result in breaches. It shrinks detection time by 80 percent, and accelerates recovery time by 75 percent and investigation time by more than 50 percent. DS: Securely on-boarding network-connected devices is essential, regardless of whether the IoT devices are provided by the service provider or enterprise. If the IoT devices provided by the enterprise need to connect to the mobile network, the same device lifecycle management procedures described earlier are applicable onto all those enterprise IoT devices as well. RW: What is the killer app for security on the horizon?GR: That question makes it seem like there is a one-size-fits-all solution, but such a solution probably doesn’t exist. The same applies for cloud security and for smartphone security. Whenever we talk about security, all of the products and interlocking interfaces should be integrated so that we have a cohesive end-to-end solution that provides all of the unique capabilities help for our customers to address the evolving security threat. And that happens for mobile broadband, for IoT, for cloud, or for whatever the technological disruptions are prevalent at the time. I’ve never heard of a killer app, but I think the right structure and strategy means from professional security to investigate where security holes exist, the right mix of security hardware and software deployments to prevent and detect security threats, and a mitigation system with a rapid response automation is essential. All three of those things help keep the balance between proactive and reactive security. Still, even that solution doesn’t work for everyone. RW: I kind of asked that question knowing that the answer was going to be no, but I wanted to know anyway. DS: Basically, security is the job of everyone — the users, the software, every single network element, every device on the network, everything.This article was produced in partnership with Nokia. Internet of Things Makes it Easier to Steal You… Tags:#Big Data#data security#Internet of Things#IoT#Nokia last_img read more