Tag Archives: Zero Trust

Strengthening Core Infrastructure with Proactive Measures and Monitoring

This article was based on an interview with Mr Ramon Pinero, General Manager of BlackBerry AtHoc, and Mr Jonathan Jackson, Senior Director of Strategic Accounts at BlackBerry.

As digital ecosystems grow more complex, the need for robust cybersecurity measures becomes critical. BlackBerry, having transitioned from mobile devices to cybersecurity, is now one of the foremost companies leading the charge in safeguarding critical infrastructure, supply chains, and digital assets through emerging technologies like artificial intelligence (AI) and machine learning (ML). With cyberattacks growing in sophistication, BlackBerry’s focus on prevention and vigilance sets a new standard in cyber resilience.

The Financial Impact of Cyberattacks

The cost of a cyberattack is staggering. A 2024 study from BlackBerry revealed that the average cost of a single data breach has risen to USD 4.45 million. For industries such as healthcare, finance, and energy—where attacks can disrupt critical services—the cost can soar even higher. Beyond immediate financial losses, cyberattacks can damage reputations, erode customer trust, and lead to legal penalties or regulatory fines.

Woman in a Beige Coat Writing on a Glass Panel Using a Whiteboard Marker
Photo by Nataliya Vaitkevich

In particular, ransomware attacks—one of the most prevalent threats—cost companies over USD 1.85 million per incident when factoring in downtime, recovery, and ransom payments​. These costs are unsustainable for many organizations, especially smaller businesses. In the words of Ramon Pinero, General Manager of BlackBerry AtHoc, “If we can prevent attacks from happening, it means that organizations don’t have to spend time and resources recovering from incidents.”

The Rise in Cyber Threats: A Call for Vigilance

BlackBerry’s Global Threat Intelligence Report highlights a surge in cyberattacks. Between April and June 2024, the company prevented 3.7 million attacks— a 53% increase from the previous quarter. Over 800,000 of these attacks targeted critical infrastructure, including the financial sector, energy grids, and healthcare. This increase undoubtedly underlines the importance of continuous vigilance across all sectors.

Prevention Through Proactive AI Solutions

Prevention should be at the core of any company, organization and city’s strategy in dealing with malicious attacks. That being the case, it’s also at the core of BlackBerry’s strategy when it comes to empowering customers. By embedding AI into its cybersecurity solutions, the company is emphasizing deterring cyberattacks before they cause damage. By acquiring Cylance, BlackBerry was able to incorporate predictive AI technology into its security systems, allowing it to proactively prevent cyberattacks instead of just reacting to them.

an illustrated image of a chip with an AI label on it powering a security system
AI-Generated Image by Copilot of an AI Chip embedded in a system

BlackBerry’s AI-powered defence mechanisms are particularly effective in securing critical infrastructure and supply chains. According to the Global Threat Intelligence Report, the company intercepts over 11,500 unique malware hashes daily, highlighting the pace at which new cyber threats emerge.

Supply Chain Security: A Critical Weakness

One of the most significant risks today lies in the vulnerability of software supply chains. BlackBerry’s June 2024 survey on supply chain cybersecurity reveals that more than 75% of software supply chains experienced cyberattacks within the past year. These attacks often target smaller, less secure suppliers as entry points to larger organizations, causing a cascade of damage.

Of concern is that 74% of these attacks originated from third-party vendors or suppliers that organizations were either unaware of or failed to monitor. As BlackBerry’s Vice President of Product Security Christine Gadsby noted, “How a company monitors and manages cybersecurity in their software supply chain has to rely on more than just trust.” In this landscape, prevention demands heightened visibility, continuous monitoring, and regular audits of suppliers’ security postures.

The Role of Managed Detection and Response (MDR)

For organizations without dedicated cybersecurity teams, BlackBerry’s Cylance Managed Detection and Response (MDR) provides critical support. The service offers real-time monitoring and rapid response to emerging threats, ensuring that businesses, especially smaller ones, are not left vulnerable.

According to Jonathan Jackson, Senior Director of Strategic Accounts at BlackBerry, “BlackBerry offers MDR because not every organization can afford a fully staffed cybersecurity team,”. MDR enables companies to utilize sophisticated threat detection tools and professional analysis, allowing them to stay ahead of cybersecurity risks even without an extensive cybersecurity outfit.

Zero Trust for Critical Infrastructure

A zero-trust approach has become essential for protecting critical infrastructure. BlackBerry’s security solutions implement zero-trust architectures, where no device, user, or system is inherently trusted. This model is crucial for sectors like healthcare, finance, and energy, where the stakes are high, and breaches could lead to widespread disruptions.

cyber 4610993 1280
Image from Image by Pete Linforth from Pixabay

“Zero trust is especially important for critical infrastructure because of the types of data and assets involved,” Jackson emphasized. By enforcing strict authentication protocols and continuous monitoring, BlackBerry’s solutions protect critical systems from both internal and external threats.

Resilience for Smart Cities and IoT

As cities become smarter, integrating Internet of Things (IoT) devices into their infrastructure, they become prime targets for cyberattacks. With IoT traffic systems, smart utilities, and public services forming the backbone of modern cities, a single cyberattack could cripple entire urban centres.

Companies like BlackBerry will play a critical role in safeguarding these environments, ensuring that IoT systems are secured and cyber-resilient. “As you have more connected systems, you increase the attack surface,” Jackson explains. AI-driven threat detection and real-time monitoring are vital to ensure that smart cities remain functional despite cheap to cyber threats.

Cyber Resilience Through Prevention

As the cyber threat landscape evolves, prevention and vigilance remain the twin pillars of a robust cybersecurity strategy. Whether protecting supply chains, critical infrastructure, or smart cities, solutions like BlackBerry’s Cylance AI offer a blueprint for building resilience in the face of increasingly sophisticated cyberattacks.

A cyber resilient Kuala Lumpur
AI-Generated Image by Copilot of A cyber resilient Kuala Lumpur

By staying proactive, monitoring vulnerabilities, and implementing zero-trust architectures, organisations can prevent breaches before they occur. As BlackBerry’s research shows, the key to true cyber resilience lies in constant vigilance and a commitment to prevention—because in today’s world, one breach could mean the difference between success and disaster.


This article was written based on an interview session with Mr Ramon Pinero, General Manager of BlackBerry AtHoc and Mr Jonathan Jackson Senior Director of Strategic Accounts at BlackBerry.

Ramon Pinero Profile Pic sq

Ramon Pinero
General Manager BlackBerry AtHoc

Ramon Pinero is the General Manager of BlackBerry AtHoc, where he oversees all aspects of the critical event management business. With more than 20 years of experience in crisis/emergency management (CEM) technologies, Ramon brings a deep understanding of both product development and customer success.

With a passion for technology and deep roots in emergency response, Ramon continues to advance BlackBerry AtHoc’s position as the market leader. He is focused on driving strategy, fostering innovation, and enabling AtHoc’s technology to make an even greater impact—helping more organizations increase their resiliency and save lives through fast, accurate communications before, during, and after critical situations.

Jonathan Jackson Profile Pic

Jonathan Jackson
Senior Director, Strategic Technical Sales APAC at BlackBerry

Jonathan Jackson (JJ) is the Senior Director, Strategic Technical Sales APAC for BlackBerry. With over 20 years of experience, he helps organisations manage their cyber risk, leveraging the best of breed solutions to stop cyber attacks. JJ is a staunch advocate of protecting data and privacy and is a frequent spokesperson on cyber threat intelligence in Australia and all across APAC.

How Your Bad Password Hygiene Can Put Everything At Risk at Home and at Work

Another day, another email from IT telling you to change or update your passwords. We’ve all been there, opening emails and sighing at that reminder. However, did you stop to think what could be at risk when you don’t update your passwords across the board? What could the harm with just one password not being updated?

Password screen AI generated image

Understanding Passwords, Password Hygiene and Multifactor Authentication

Well, like Julie Andrews once sang – Let’s start at the very beginning, a very good place to start. What exactly are passwords in our current, digital, always connected society? If your data and accounts were your home, your password would be your master key. The one thing giving you access to everything. Of course, we technically don’t need to talk about it in this anecdotal way cause, everyone knows what passwords are. But, humour me as we break down the issue.

Knowing that your password is a master key, how would you make sure that things are always secure? You would keep it physically near you. Maybe clean it or make sure the key’s groves are still properly functioning. Similarly, password hygiene is simply the basics of creating a secure master key. There are certain characteristics that make it secure and hard to duplicate.

Brass Ornate Vintage Key on Black Computer Keyboard
Photo by Pixabay

Firstly, it must be unique. The same applies to passwords – your passwords should be unique. Something that only you can figure out. Secondly, it has to be complex, the grooves of the key must be hard to reproduce. When it comes to passwords, this is done in two ways: with the length of the password and the use of special characters. Experts recommend that passwords should be longer than 6 characters and contain a mix of upper-case characters, lower case characters, numbers and special characters. In addition, it should ideally not be birthdates, social security numbers or simple patterns.

Now that you’ve got a secure key for your main door. Maybe we should add another layer of security considering everything you own is within this home. Let’s include a way to confirm that it’s really you opening the door. Maybe, we’ll use a voice authenticator. The addition of this second layer of security is exactly what multifactor authentication is. Essentially, it is there to ensure that it is you that is accessing your home. This has become a mainstay now with services like Google, Amazon and even Facebook requiring you to activate MFA. These are arguably, the very basics of keeping your data and digital self-safe.

Bad Passwords Puts Everyone at Risk

Now that we’ve covered the basics, let’s scale this up. Now think of a neighbourhood of homes. This is – perhaps – your family home. Each of your homes are interconnected with a powerline, a water source and more. However, each of these accesses are protected by the same protections that protect your mansion. More importantly, your homes are located within a gated community. This gated community is your home network. Ideally, there should be two access points to this community, one which gives you access to everything in the gated community and one that limited access. These access points are your WiFi passwords. In most cases, we tend to have two: one for your home devices and your guest password. Since we’ve established what a good password is, it should come as no surprise that the same rules of password hygiene apply even to these.

Crop hacker typing on laptop with information on screen
Photo by Sora Shimazaki

However, let’s think for a second about what happens if one of our access point has a weak password. It is very common for us to setup good home network passwords, but keep our guest passwords simple – cause who needs the hassle of trying to communicate complex passwords. Well, that would be, in this anecdote’s case, like putting a security guard who is blind at the guardhouse that provides guests access to the neighbourhood. While it is still secure, it’s not secure enough. Similarly, when we use weak passwords or repeated passwords, we’re doing the same to our data. Imagine what could happen now to all the homes in the neighbourhood because of that ONE vulnerability. You can have malicious actors enter the neighbourhood and snoop around.


Trend Micro Sage Profile Pic 07052024 1 1

“… password hygiene is crucial for organizations, it is important to note that unauthorized access to sensitive data can result in financial losses, reputational damage, and legal consequences. To prevent this, organizations should take the necessary steps to implement MFA and conduct regular software updates to protect organizations from known vulnerabilities that attackers might exploit. Organizations should be proactive in using the available tools such as password managers paired with the right training for employees to protect their data..”

Sage Khor, Presales Technical Manager, Trend Micro


In the case of passwords, one weak password could put everyone at risk. Remember earlier, how we said that each home is connected with an electric line, water line and more? Well, similarly, each device on your network – be it at home or at work – is connected in some way. Having a weak password is like having a thin wooden door with a flimsy lock. These malicious actors would be able to just bring down the door and access everything in your house and potentially make their way to other homes.

Keeping Things Secure Beyond Your Password

Hopefully, the anecdote helps clarify how passwords are essentially the first step to creating a secure environment both at work and at home. However, sometimes, passwords are not enough. While they provide some security, we have had to build on the foundations that were provided by passwords. This is especially true in recent years with malicious actors using more sophisticated attacks that require us to be more vigilant.

ed hardie RMIsZlv8qv4 unsplash
Photo by Ed Hardie on Unsplash

One of the most common way that has emerged to help secure our data is multifactor authentication (MFA). A good example of this is Google’s implementation where we need to click a prompt on our smartphones to prove your identity when accessing your Google account. This extra level of security makes it even harder for malicious actors to access your data. Another common MFA method is the use of authenticators which generate a random number that is used to unlock your accounts in addition to your password.

In addition to this, we have to – unfortunately – be more vigilant with our online interactions. Like the popular phrase in Game of Thrones, the internet “is dark and full of terrors”. Password hygiene is only one step we can take to protect ourselves on the internet. Having proper cyber security solutions such as the solution that Trend Micro offers will offer even better protection. For organizations, this may include the adoption of Zero Trust security models that will provide even better protection against compromise.

Aruba ClearPass Security Portfolio Recognised for Ability to Reduce Risk

As companies continue in their digitization journeys, they are seeing an increased need for solutions that are able to mitigate risk. However, with the many solutions in the market, it can be daunting for them to discern between them. Marsh, a global insurance broking and risk management firm, has come up with a program called Cyber Catalyst which recognises and certifies cybersecurity solutions for their effectiveness across a set of criteria including the effectiveness, efficiency and viability of the solution. For the second time, one of Aruba’s security offerings has been recognised for its efficacy as part of the Cyber Catalyst Program.

Aruba’s ClearPass Suite of identity-based access control solutions has been recognised in the Cyber Catalyst program. The ClearPass suite encompasses an array of individual, AI-driven services which allow organisations to have better visibility of their network activity. It allows businesses to scale – even with the rigours of remote work – effectively without compromising network and data security through the implementation of automated device compliance policies and even through BYOD provisioning. Aruba’s ClearPass covers everything from onboarding, policy control, remote management and even guest access security.

Aruba’s ClearPass joins its Policy Enforcement Firewall (PEF) which received the same recognition in 2019. As two of their services have now been recognised, the company now boasts an integrated identity-based network access control solution. Aruba’s offerings are now a comprehensive approach to Zero Trust and Security Access Service Edge (SASE) frameworks.

Can cybersecurity keep up with flexible work arrangements?

2020 will be remembered as the year the world experienced its largest ever work-from-home experiment as the global pandemic forced businesses to move operations online and adapt to a new distributed workforce.

As some markets around the globe gradually ease some restrictions and allow employees to go back to the office, the situation remains in a delicate balance and work as we know it has been redefined for many. Increasingly, organisations are embracing the new work model and the many benefits that come with it including increased employee well-being and better work-life balance. In fact, some organisations are now establishing permanent work-from-home policies with 60 percent of the largest companies integrating flexible virtual-physical collaborative environments by 2021, according to Bain & Company. This is supported by Lenovo’s Work From Home survey which found that nearly half (46 percent) of employees are as productive when working from home as they are in the office, with 15 percent saying that productivity increases at home.

woman writing on her notebook
Photo by Retha Ferguson on Pexels.com

The survey also found that 87 percent of workers feel somewhat ready to adapt to a distributed, work-from-anywhere environment if required. So too are cybercriminals. The looming uncertainty among employees of the delicate, everchanging global circumstances, combined with their unfamiliarity with the new work arrangement, has created a wealth of opportunities for cyber-attacks. Cyber criminals are taking advantage of the situation to launch COVID-themed attacks, phishing attempts and spread fake news. In Malaysia, cybersecurity cases have seen a surge of more than 90% during the Movement Control Order (MCO) so far compared to the same period last year, CyberSecurity Malaysia revealed.

Watch for your blind spots

With employees accessing confidential data from various devices, locations, and unsecured networks, it opens more endpoints and vulnerabilities for cyberattacks. In our hyper-digital and mobile world, hardware security is becoming ever more critical, as across the globe, each person is expected to own 6.58 network connected devices in 2020. In fact, according to cybersecurity solutions provider Sepio Systems, there has been a 300 percent increase in the number of new connected devices from unknown vendors attached to the enterprise network.

blur bright business codes
Photo by Pixabay on Pexels.com

While a majority of employees are working primarily from home, it is only a matter of time before they begin heading back to shared workspaces, coffee shops and planes and once again enjoy the flexibility of working from anywhere. This means that an organisation’s network, database and confidential files may be accessed from unsecured VPNs, unknown networks, and rogue access points. Without proper security standards put in place, hackers can easily gain access to an organisation’s network via vulnerable devices and execute attacks remotely. Organisations must take this into consideration and be on the offensive to mitigate potential attacks before malicious entities infiltrate company systems and confidential data.

Adopt a Zero Trust mindset

The nature of a distributed workforce removes the luxury of face-to-face identification and validation. Tech Wire Asia reported that cyber scams based on COVID-19 becomes prevalent in recent months, as hackers look to capitalize on the virus-driven uncertainty affecting individuals, enterprises, and governments. This means that organisations must double down on their efforts in credential and access management and continue to educate employees to identify and weed out impersonation scams and phishing attempts. As hackers grow in sophistication, organisations and employees must take a Zero Trust. In order to protect business and employee data, organisations must implement a system to ensure that the right people have access to the right data at the right time, on a ‘need-to-know’ basis.

Empowering a distributed workforce with cybersecurity

To reap the full benefits of a distributed workforce in the long run, organisations must provide employees with secure devices and create a safe digital environment to operate in, allowing them to focus on the job at hand. This shift to a decentralised work environment means that IT teams must have extended visibility over digital platforms and the organisations digital ecosystems in order to identify and mitigate potential threats in a timely manner.

However, with the shortage of cyber talent and growing digital footprint, this can take a toll on IT teams. IT teams must be supported to enhance their capabilities with solutions that provide both hardware and software security. For example, Lenovo’s ThinkShield solution helps secure devices from development through disposal, giving IT admins more visibility into end points and providing easier and more secure authentication. Lenovo has also partnered with SentinelOne to leverage its behavioral AI technology to predict tomorrow’s attacks today and allow ThinkShield devices to predict cyberattacks and enable devices to self-heal from any attack instantaneously, adding another critical layer to our ThinkShield offering.

As employees have quickly adapted to new work structures in these unique times, organisations must also embrace the risk that comes with it and put in place the right measures and solutions to create a secure and robust environment for employees to operate in. One way Lenovo helps organisations empower employees is by offering services that supports remote workers. For employees who do not have access to IT helpdesks, Lenovo’s Premier Support allows for direct, 24/7 access to elite Lenovo engineers who provide unscripted troubleshooting and comprehensive support for hardware and software. This results in less downtime for end users when things go wrong, freeing IT staff up to focus on strategic efforts.

Only then will organisations and employees be able to reap the full benefits of a distributed workforce and build a stronger digital foundation to effectively navigate and succeed in the new world of work.

Aruba Introduces ESP (Edge Services Platform), A Sixth Sense for Networks

When it comes to networking there’s a myriad of considerations that go into securing, deploying and even managing the network. This is further exacerbated when it comes to large networks with the current perimeter of safety being disintegrated with BYOD (Bring Your Own Devices) and even with distance work cultures. Corporations and even homes are left with a huge gap that they have had to fill with multiple solutions which sometimes just don’t coalesce.

Aruba has been hard at work developing a solution that will help companies be forward thinking while keeping their security in check. Their new ESP (Edge Services Platform) allows companies to adopt policies such as BYOD without compromising their network security and without them having to dedicate human and large financial resources in managing and administering network access. ESP essentially empowers the network with an AI-driven sixth sense that provides actionable insights for network administrators while taking the bulk of menial tasks off their to-do lists.

Meet Aruba ESP

The Aruba ESP framework essentially consists of three principal components: AI Ops, a unified infrastructure and Zero Trust Network Security. These components work in tandem to deliver increased network reliability and security. With a cohesive approach, Aruba has managed to build an offering that is able to be implemented at scale and even with smaller businesses. In fact, ESP is able to be deployed according to client needs over a period of time.

The AI Ops component of ESP works to help with identifying, segmenting and remediate network issues. With Aruba’s implementation of AI Ops, the network is able to analyse and segment the network to isolate and protect company assets while allowing employees and guests to access the network with their own devices. It also proactively monitors the network for any security risks such as infected devices or even probable attackers to prevent any downtime. Even if there is downtime, AI Ops will allow Aruba’s ESP to automatically heal and repair the network which will, in the best scenarios, negate possible downtime.

Introducing Aruba ESP

The Edge Services Platform is also a turnkey solution for corporations that allows the consolidation of their networking solution on one unified platform. Running on their already proven Aruba Central network management solution, ESP is able to provide administrators with a cloud native solution to manage everything from switching, Wi-Fi and SD-WAN across their campus network. The single, unified interface also allows them to have a one-stop platform to identify and deal with potential networking issues which may arise. This together with the analytics and insights from AI Ops simplifies the process identifying, isolating and fixing network issues. What’s more, Aruba’s ESP is brand agnostic allowing devices and services from other vendors to be seamlessly integrated into the network.

ESP adopts a Zero Trust approach to network security. However, it doesn’t just segment the network. Instead, it uses built-in, role based access technology that will enable Dynamic Segmentation. This simply means that the platform is able to identify and isolate devices dynamically as they enter the network. It uses an AI model that has been trained to identify certain parameter and automatically assign or isolate devices to help prevent potential security risks or breaches. This approach allows companies to be forward looking while keeping their assets and data safe from intrusion; empowering remote work and BYOD policies which have been proven to increase productivity.

Source: Aruba

Aruba’s ESP heavily leverages telemetry and insights derived from the company’s many years in providing networking solutions and hardware to deliver an ever evolving, rapidly adapting solution that can be deployed according the needs and constraints of their customers. That said, ESP isn’t just reliant of Aruba’s data and telemetry, it evolves with the company and learns from the data and telemetry that is natively derived from the organisation and its policies. Aruba ESP will be available for current platforms including Amazon Web Services.