
- Like
- Digg
- Del
- Tumblr
- VKontakte
- Buffer
- Love This
- Odnoklassniki
- Meneame
- Blogger
- Amazon
- Yahoo Mail
- Gmail
- AOL
- Newsvine
- HackerNews
- Evernote
- MySpace
- Mail.ru
- Viadeo
- Line
- Comments
- Yummly
- SMS
- Viber
- Telegram
- Subscribe
- Skype
- Facebook Messenger
- Kakao
- LiveJournal
- Yammer
- Edgar
- Fintel
- Mix
- Instapaper
- Copy Link
Privileged accounts have been a key asset in each of the most significant security breaches in the last couple of years.
This is Mr Lavi Lazarovitz’s claim. Lavi is based in Israel and works as CyberArk Research Lab Team Leader. In his line of work, he’s seen some of the greatest heists in the 21st Century – credential theft. While no blood is shed in this transgression, he believes that when credit card information is stolen, and personal data is misused, hackers essentially control the keys to the kingdom.
Fittingly, his group explores new innovative defensive and offensive approaches which are then translated into cybersecurity tools and products. In his research, he studies the methods and tactics employed by hackers to penetrate and exploit organizational networks. Lavi is an expert in hacks owing to compromised privileged accounts and cloud shadow admins. He shares with us how the strongest might actually be the weakest link in a network operating system.
Tumbling the Walls of Jericho from the Inside
Privileged accounts are held by high ranking executives in an organisation, and consequently have access to more sensitive information. Take an IT manager for example. To do the job well, the IT manager would need greater levels of access to perhaps manage applications, software and server hardware. Access to client or company information is a privilege which only the IT manager and other selected appointees can access. Appointees might also include non-human privileged accounts. These are application accounts which require specific permissions.
Organisations typically have many sets of accounts and permissions associated with privileged accounts. The number of such accounts increase in larger organisations such as governments. With the adoption of new technologies and automated environments such as cloud, these sets of accounts increase in tandem. The problem is, these accounts are managed by third parties.
Subcontractors and subordinates are allowed some access, visibility or functionality within the network. Although well intentioned to lower the cost of public service delivery, third parties may compromise system integrity. Third parties do not necessarily comply with internal standards perhaps out of ignorance or compliance their own organisation’s standards which might be lower.
Furthermore, passwords which barricade sensitive information from prying eyes can be easily uncovered. Combined with the growing number of third-party credentials, hackers can easily access or compromise the organisation’s network and the information they possess. Usernames and passwords are used for infiltration, lateral movement, or data exfiltration. Even more worrying is the attacker’s ability to clean up the trail of evidence. Credential theft becomes child’s play.
“Emperor’s” New Clothes
A second move of stealth is the use of cloud shadow admins, dovetailing from poorly managed privileged accounts. Cloud shadow admins are prevalent in organisations which rely on cloud infrastructure.
Lavi provides some context, “Organisations that adopt cloud security are very well aware of privileged account security especially governments and banks, intelligence agencies…The guy who has the privilege to change the security configuration or run a hundred new instances, probably knows what he has in his hands and how important the username and passwords are. Organisations [too] are well aware of how important the accounts are. There are a whole set of accounts and permissions associated with [privileged] accounts, that organisations which [require high] security in some cases ignore or are not really aware of the [privileged] accounts. This is where shadow admins come into play.”
To explain what a cloud shadow admin is and its potency, Lavi first delineates two types of administrative accounts. Only the latter is of interest.
The first is an all-admin account can perform almost any function and most organisations are aware of how to handle it. The other administrative account operates under a more restrictive policy, where only perhaps four to five actions or angles can be made. A user may continue to launch a new instance or machine. Despite the limited access, hackers can escalate their access rights to possess an equivalent level of control comparable to an all admin account. This goes one step further from just a privileged admin account.
A one minute and thirteen second demonstration on the CyberArk microsite shows how easy it is to break into an account and alter the policy settings.
“Cloud shadow admins are accounts that attackers use to compromise the account in 4-5 steps, but on the other hand, the accounts do not look like privileged accounts.”
Attackers look for accounts which are unmonitored, typically owned by developers and engineers, rather than for full admin accounts. Reaching for the lowest hanging fruit is enough to cause damage.
The combination of permissions given to an authorised user and instance can be manipulated to gain privileged access and take over the entire system. For example, a DevOps engineer could have permission to launch a new instance. It could be as simple as to take an image and launch it on the cloud infrastructure. The engineer simultaneously assigns the machine a role while enabling the sensors to handle the database entry. These are necessary to create cloud infrastructure stability.
However in the process, an entire operating system can be easily taken over. The combination of permissions assigned to the developer and the instance provide multiple low barrier gateways to access privileges. The manoeuvres are so simple that cloud shadow admin attacks are all too common.
If so, then how does one avoid being pawned? Read the second half of this interview here.
- Like
- Digg
- Del
- Tumblr
- VKontakte
- Buffer
- Love This
- Odnoklassniki
- Meneame
- Blogger
- Amazon
- Yahoo Mail
- Gmail
- AOL
- Newsvine
- HackerNews
- Evernote
- MySpace
- Mail.ru
- Viadeo
- Line
- Comments
- Yummly
- SMS
- Viber
- Telegram
- Subscribe
- Skype
- Facebook Messenger
- Kakao
- LiveJournal
- Yammer
- Edgar
- Fintel
- Mix
- Instapaper
- Copy Link
In the nation’s critical infrastructure landscape, K-12 schools are pivotal, serving as the foundation for future success and playing an indispensable part in the lives of millions of children, families, and communities. Recognising the importance of ensuring the safety and well-being of students, educators, and staff, the Cybersecurity and Infrastructure Security Agency (CISA) leads the annual Critical Infrastructure Security and Resilience Month. This initiative aims to educate and engage all levels of government, infrastructure owners and operators, and the American public about critical infrastructure’s crucial role in the nation’s well-being and the need to strengthen security and resilience.
Digital technology has become an integral aspect of modern education, and as schools navigate the complex landscape of security and resilience, leveraging digital tools and strategies becomes paramount. The intersection of education and technology presents various challenges and opportunities, especially in an evolving threat environment that includes cyberattacks alongside more traditional hazards.
As CISA encourages a Resolve to be Resilient, the emphasis extends to the education community, urging several measures and investments in resilience. The agency acknowledges threats’ increased frequency and intensity, encompassing natural disasters, targeted violence, and cyberattacks. The call to action is clear: prepare today to withstand or recover quickly in the event of an incident tomorrow.
To address the challenges an interconnected world poses, CISA collaborates with several federal agencies and non-government partners to provide actionable guidance, evidence-based practices, and digital tools. The goal is to empower school leaders to navigate the complexities of the digital landscape while fostering a secure and resilient environment for students and staff.
One critical resource CISA offers is the K-12 Bystander Reporting Toolkit, developed in partnership with the U.S. Secret Service National Threat Assessment Centre. This toolkit equips schools with simple strategies to implement and enhance safety reporting programmes, leveraging digital communication channels to facilitate reporting and response.
The K-12 School Security Guide Product Suite, another digital resource, offers districts and campuses tools and strategies to evaluate vulnerabilities, strengthen security measures, and enhance the protection of school communities. This suite reflects a comprehensive approach to digital and physical security in educational settings.
Recognising the importance of cybersecurity, CISA’s Cybersecurity for K-12 Education provides schools with tools, information, and resources to guard against cyber actors and reduce the likelihood of successful cyber incursions. Addressing systemic cybersecurity risks becomes an integral component of school safety plans as technology advances.
Further, CISA’s Tabletop Exercise Packages, designed to examine and test safety processes and plans through simulated exercises, incorporate digital scenarios to ensure that schools are prepared for various threat scenarios, including cyber incidents. This proactive approach helps schools identify digital resilience and response capabilities gaps.
The agency’s regionally based security advisors further contribute to building resilience by providing various risk management and response services, including guidance on addressing evolving digital threats. These advisors play a crucial role in ensuring that schools are equipped to handle the dynamic challenges posed by the digital landscape.
In the digital age, where information is shared at unprecedented speeds, CISA administers SchoolSafety.gov, a Federal interagency website serving as a one-stop access point to school safety information, resources, and tools. This platform covers various topics and threats, offering a holistic approach to creating comprehensive and sustainable school safety plans.
Critical Infrastructure Security and Resilience Month reminds the entire school community to unite in advancing safety efforts. The focus on digital resilience highlights the need for ongoing preparedness and adaptation to changing risk conditions. Throughout this month and beyond, CISA reaffirms its commitment to assisting school communities in maintaining safe, secure, and resilient learning environments in the digital era. The agency’s dedication to leveraging digital technology to benefit education underscores the importance of an inclusive and collaborative approach to cybersecurity and resilience in the nation’s schools.
- Like
- Digg
- Del
- Tumblr
- VKontakte
- Buffer
- Love This
- Odnoklassniki
- Meneame
- Blogger
- Amazon
- Yahoo Mail
- Gmail
- AOL
- Newsvine
- HackerNews
- Evernote
- MySpace
- Mail.ru
- Viadeo
- Line
- Comments
- Yummly
- SMS
- Viber
- Telegram
- Subscribe
- Skype
- Facebook Messenger
- Kakao
- LiveJournal
- Yammer
- Edgar
- Fintel
- Mix
- Instapaper
- Copy Link
In a meeting with the Private Sector Advisory Council (PSAC), President Ferdinand R. Marcos Jr. pledged support for pivotal legislative measures recommended by the PSAC Digital Infrastructure Group. These measures, aligned with the Philippine Digital Transformation Framework, aim to fortify cybersecurity efforts within the nation.
Expressing his commitment during a Palace gathering, the President affirmed his intention to prioritise and expedite the passage of three bills pending in the Senate. These bills, including the Cybersecurity Act, Anti-Mule Act, and the Online Site Blocking Act, are integral components of the nation’s strategy to bolster cybersecurity and safeguard digital assets.
“The structural requirements in legislation are evidently crucial. Let’s focus on the Cybersecurity Act, Anti-Mule Act, and the Online Site Blocking Act. Collaborating with the Legislature’s leadership, we aim to swiftly progress these bills,” explained the President to PSAC officials.
The bills, currently pending at the Senate, encompass vital aspects crucial for the country’s digital security and protection against cyber threats. The Cybersecurity Act, in particular, carries provisions designed to enhance the country’s cybersecurity resilience, fortify critical information infrastructures, and impose penalties for non-compliance with digital asset protection standards.
Recent cyber threats targeting government entities have underscored the urgency of passing the Cybersecurity Act, aligning with the administration’s commitment to securing public digital assets.
Citing statistics from a tech giant, a significant 85% of Philippine companies anticipate potential disruptions to their operations due to cybersecurity attacks within the next 24 months. Additionally, data from the Department of Information and Communications Technology (DICT) underscores the Philippines’ prominence as the fourth most targeted country globally, with approximately 3,000 cyber incidents reported between 2020 and 2022, half of which targeted government institutions.
Moreover, the proposed Anti-Mule Act aims to curb fraudulent activities related to bank accounts, e-wallets, and other financial platforms. The legislation seeks to criminalise activities like using fake identities to open accounts, unauthorised account transfers, and recruiting individuals for fraudulent account purposes. It will also enforce stricter penalties and delineate jurisdiction for law enforcement agencies.
Simultaneously, the Online Site Blocking Act, if passed, will combat online content piracy by instituting measures to block websites hosting pirated content. Advocates highlight the importance of safeguarding the creative industry and consumers from the perils of online piracy, emphasising the potential revenue loss and risks posed by pirate websites.
PSAC stressed the significance of fortifying laws to protect the creative economy, ensuring artists can create content without fear of theft. They underscored the necessity of empowering the Executive branch to implement these laws effectively.
The collective urgency to fortify cybersecurity measures and protect digital assets underscores the critical need for the prompt passage of these bills. President Marcos Jr.’s endorsement signifies a pivotal step toward reinforcing the country’s digital infrastructure and safeguarding its cyber landscape for the future.
Earlier this year the Asian Productivity Organization (APO) convened a pivotal training session focused on enhancing cybersecurity across its member countries. Intending to foster the adoption of robust cybersecurity practices among IT professionals, the event encompassed representatives from diverse nations. Notably, among the forty-four participants, fourteen were delegates from various Philippine National Government Agencies alongside active participation from the private sector.
The four-day intensive training facilitated addressed the pressing need to fortify defences against evolving cyber threats and shed light on the escalating complexity of cyber threats. With the proliferation of artificial intelligence (AI) in augmenting the capabilities of cyber assailants, the landscape has become more treacherous, amplifying the vulnerabilities of existing cybersecurity defence mechanisms.
Established in 1961, the APO stands as an intergovernmental organisation committed to fostering mutual cooperation and sustainable socio-economic development across the region. Serving as a think tank and offering policy advisory services, the APO has consistently spearheaded initiatives spanning diverse sectors. In its unwavering dedication, it plays a crucial role in enhancing the cybersecurity resilience of member countries.
- Like
- Digg
- Del
- Tumblr
- VKontakte
- Buffer
- Love This
- Odnoklassniki
- Meneame
- Blogger
- Amazon
- Yahoo Mail
- Gmail
- AOL
- Newsvine
- HackerNews
- Evernote
- MySpace
- Mail.ru
- Viadeo
- Line
- Comments
- Yummly
- SMS
- Viber
- Telegram
- Subscribe
- Skype
- Facebook Messenger
- Kakao
- LiveJournal
- Yammer
- Edgar
- Fintel
- Mix
- Instapaper
- Copy Link
Singapore’s Senior Minister of State for Defence, Heng Chee How, and Senior Minister of State for Communications and Information and Health, Dr Janil Puthucheary, recently visited the Critical Infrastructure Defence Exercise (CIDeX) 2023, underscoring the government’s commitment to fortifying national cybersecurity.

The exercise, held at the National University of Singapore School of Computing, witnessed over 200 participants engaging in operational technology (OT) critical infrastructure defence training.
Organised by the Digital and Intelligence Service (DIS) and the Cyber Security Agency of Singapore (CSA), with support from iTrust/SUTD and the National Cybersecurity R&D Laboratory (NCL), CIDeX 2023 marked a collaborative effort to enhance Whole-Of-Government (WoG) cyber capabilities. The exercise focused on detecting and countering cyber threats to both Information Technology (IT) and OT networks governing critical infrastructure sectors.
This year’s edition boasted participation from DIS, CSA, and 24 other national agencies across six Critical Information Infrastructure (CII) sectors. With an expanded digital infrastructure comprising six enterprise IT networks and three new OT testbeds, participants operated on six OT testbeds within key sectors—power, water, telecom, and aviation.
CIDeX 2023 featured Blue Teams, composed of national agency participants serving as cyber defenders, defending their digital infrastructure against simulated cyber-attacks launched by a composite Red Team comprising DIS, CSA, DSTA, and IMDA personnel. The exercises simulated attacks on both IT and OT networks, including scenarios such as overloading an airport substation, disrupting water distribution, and shutting down a gas plant.
The exercise provided a platform for participants to hone their technical competencies, enhance collaboration, and share expertise across agencies. Before CIDeX, participants underwent a five-day hands-on training programme at the Singapore Armed Forces (SAF)’s Cyber Defence Test and Evaluation Centre (CyTEC) at Stagmont Camp, ensuring readiness for cyber defence challenges.
On the sidelines of CIDeX 2023, the DIS solidified cyber collaboration by signing Memorandums of Understanding (MoUs) with key technology sector partners, expanding its partnerships beyond the earlier agreement with Microsoft earlier in the year.
Senior Minister Heng emphasised the importance of inter-agency cooperation, stating, “CIDeX is a platform where we bring together many agencies throughout the government to come together to learn how to defend together.” He highlighted the collective effort involving 26 agencies and over 200 participants, acknowledging the significance of unity in cybersecurity.
Dr Janil echoed this sentiment, emphasising CIDeX’s role in the Whole-of-Government (WoG) cyber defence effort. He remarked, “Defending Singapore’s cyberspace is not an easy task, and it is a team effort.”
He commended the strong partnership between the Cyber Security Agency of Singapore and the Digital and Intelligence Service, recognising the exercise as a crucial element in strengthening the nation’s digital resilience and national cybersecurity posture.
By leveraging collaboration, innovation, and a robust defence strategy, Singapore aims not just to protect its critical infrastructure but to set a global standard in cybersecurity practices.
CIDeX 2023 serves as a compelling embodiment of Singapore’s unwavering dedication to maintaining a leadership position in cybersecurity practices. This strategic exercise underscores the nation’s commitment to cultivating collaboration and fortifying its resilience against continually evolving cyber threats.
Beyond a training ground for sharpening the skills of cyber defenders, CIDeX 2023 encapsulates the government’s profound commitment to adopting a robust, collaborative, and forward-thinking approach to safeguarding the integrity and security of the nation’s critical infrastructure in the dynamic landscape of the digital age.
- Like
- Digg
- Del
- Tumblr
- VKontakte
- Buffer
- Love This
- Odnoklassniki
- Meneame
- Blogger
- Amazon
- Yahoo Mail
- Gmail
- AOL
- Newsvine
- HackerNews
- Evernote
- MySpace
- Mail.ru
- Viadeo
- Line
- Comments
- Yummly
- SMS
- Viber
- Telegram
- Subscribe
- Skype
- Facebook Messenger
- Kakao
- LiveJournal
- Yammer
- Edgar
- Fintel
- Mix
- Instapaper
- Copy Link
Union Minister of State for Skill Development & Entrepreneurship and Electronics & IT, Rajeev Chandrasekhar, spoke at two influential tech events: the Indian Express Digifraud & Safety Summit 2023 and YourStory Techsparks’23. His engagements centred around India’s technological advancements, regulatory policies, and the nation’s promising future in the global tech landscape.

At these tech summits, Minister Rajeev Chandrasekhar outlined India’s ambitious technological trajectory, reinforcing the government’s dedication to fostering innovation, ensuring a safe digital environment, and harnessing the transformative power of technology for the nation’s progress.
Minister Rajeev Chandrasekhar articulated India’s journey in artificial intelligence (AI) and emphasised the government’s commitment to fostering innovation and the startup ecosystem. He expressed the government’s profound interest in further boosting India’s burgeoning startup landscape.
Minister Rajeev Chandrasekhar noted India’s transition from an unrestricted, eternally optimistic view of technology and the internet to a more nuanced approach. He highlighted the government’s aim to strike a balance between fostering innovation and growth while guaranteeing distinct rights for digital citizens.
The Minister emphasised the evolution from the phase of transforming India to the concept of ‘New India’ and now envisions witnessing the emergence of ‘Viksit Bharat’. He expanded on India’s transformation which resonated with the Prime Minister’s vision to raise India to a developed nation status, aiming to elevate the nation to the position of the world’s third-largest economy.
Highlighting the government’s initiatives, Minister Chandrasekhar stated, “Our focus is on startups, innovation, and funding, creating a computing infrastructure. In January, Prime Minister Shri Narendra Modi agreed to establish a significant amount of GPU capacity in India for startups to access and bring forth their innovation and foundational models.”
He advocated for decentralising the startup landscape, encouraging the emergence of successful ventures from various regions across India. “We want unicorns and successful startups to come from Meerut, Ghaziabad, Kohima, Srinagar, Kottayam, Belgaum, Dharwad, Visakhapatnam, Nagpur, and beyond,” he asserted, confirming the nation’s commitment to fostering innovation in diverse cities.
Addressing concerns about internet regulation and safety, the Minister explained the government’s evolved approach, focusing on ensuring safety and trust for digital citizens while holding platforms accountable. He clarified that “safety and trust are not for the Government; rather, they are initiatives aimed at safeguarding the vast majority of Digital Nagriks”.
Reflecting on his participation in the UK AI Summit, Minister Chandrasekhar underscored India’s commitment to a safe and trusted internet, aligning with the government’s guiding principles since 2021.
“We want the internet to be safe and trusted; it is an article of faith. We also aim for platforms to be legally accountable,” he reiterated.
He highlighted the need to embrace AI’s potential while managing risks, warning against a narrative that diminishes its innovation. The Minister emphasised that avoiding the overshadowing of AI’s benefits by its perceived risks is crucial for the digital economy and the populace.
“We don’t seek to demonise AI; rather, it’s vital to maintain a balance so that the discourse on its risks doesn’t eclipse its potential advantages,” he explains, clarifying India’s approach to artificial intelligence.
OpenGov Asia provided coverage of India’s expanding global influence, highlighting the country’s leadership roles across diverse international platforms. Prime Minister Narendra Modi has introduced the Global Digital Public Infrastructure Repository (GDPIR) and a Social Impact Fund (SIF). The GDPIR will be used for sharing information and best practices and the SIF is designed to advance Digital Public Infrastructure (DPI).
He unveiled the schemes during the Virtual G20 Leaders’ Summit. Chaired by the Ministry of Electronics and Information Technology (MeitY), the G20 Digital Economy Working Group (DEWG) has played a key role in progressing the global DPI agenda.
- Like
- Digg
- Del
- Tumblr
- VKontakte
- Buffer
- Love This
- Odnoklassniki
- Meneame
- Blogger
- Amazon
- Yahoo Mail
- Gmail
- AOL
- Newsvine
- HackerNews
- Evernote
- MySpace
- Mail.ru
- Viadeo
- Line
- Comments
- Yummly
- SMS
- Viber
- Telegram
- Subscribe
- Skype
- Facebook Messenger
- Kakao
- LiveJournal
- Yammer
- Edgar
- Fintel
- Mix
- Instapaper
- Copy Link
In a significant move aimed at fortifying the nation’s technological landscape, the Vietnam Authority of Information Security (AIS) has underscored the non-negotiable nature of cybersecurity in the current digital landscape.
Emphasising the indispensability of robust cybersecurity measures, the AIS recommended stringent adherence to these protocols across agencies, institutions, and businesses. In today’s digital landscape, the confluence of telecommunications and IT has redefined the contours of security, compelling institutions and businesses to recalibrate their approach to information security.

A workshop dedicated to IT and information security held in Hanoi spotlighted the criticality of information security investment for the digital future. A collaborative effort between AIS, Viettel Cyber Security, and IEC Group, the summit aimed at empowering institutions and businesses to proactively anticipate risks and navigate confidently through the complexities of the digital landscape.
Highlighting the severity of the situation, Nguyen Son Hai, CEO of Viettel Cyber Security observes that the digital transformation wave brings a torrent of information security risks. Viettel Threat Intelligence, for instance, reported 12 million hacked accounts within Vietnam, with 48 million data records compromised and traded in the cyberspace market. Moreover, the stark reality is that numerous entities remain unaware of being under cyberattack.
Financial fraud looms large on this precarious horizon. An alarming revelation showcases the exploitation of 5,800 domain names masquerading as commercial banks, e-wallets, manufacturing firms, and retail giants, posing a severe threat to users’ assets through deceitful means.
Ransomware, an escalating menace, presents formidable challenges to organisations and businesses. Its disruptive potential can cripple entire operations, with cybercriminals extorting exorbitant sums, sometimes reaching millions of dollars, from their victims.
Nguyen Son Hai highlighted the 300 GB of encrypted organisational data published on the Internet, indicating that the actual figures are likely higher, underlining the gravity of the situation.
Tran Dang Khoa from AIS stressed the perennial existence of information security risks, underscoring the urgent need for effective solutions. He outlined five pivotal criteria for cybersecurity solutions: legality, effectiveness, appropriateness, comprehensiveness, and a crucial emphasis on utilising solutions originating from Vietnam.
The paramount importance of legal compliance within cybersecurity frameworks cannot be overstated. Organisations providing online services bear a heightened responsibility to ensure compliance, as information security is mandated by law. Straying from these regulations can render entities liable in the event of security breaches.
Despite substantial investments in sophisticated protection systems, the efficacy of these measures remains questionable if they cannot detect and avert cyberattacks. The challenge lies in optimising system efficiency while rationalising costs – an arduous task that cybersecurity firms endeavour to address.
Khoa acknowledges the need to address existing vulnerabilities alongside fortifying against new threats. Neglecting existing risks within systems, and waiting for opportune moments for cyber assailants, poses significant dangers. Pre-emptive measures must focus on rectifying known vulnerabilities before investing in additional protective tools.
Khoa highlighted that vulnerabilities often emanate not from direct cyberattacks but from individuals within organisations possessing inadequate technological proficiency. Exploiting these individuals can cascade attacks throughout systems, amplifying vulnerabilities exponentially.
Empowering all personnel within organisations with robust cybersecurity knowledge and skills emerges as a pivotal defence mechanism. Khoa accentuated the criticality of imparting such knowledge to safeguard information systems comprehensively.
Furthermore, advocating for the utilisation of ‘Make in Vietnam’ products, solutions, and services assumes significance. Homegrown solutions tailored to address the specific intricacies of Vietnamese organisations offer unique advantages. These domestic solutions not only offer timely support but also demonstrate a deep understanding of local challenges, aiding in swift problem resolution.
As businesses and institutions navigate this dynamic digital terrain, the proactive integration of these strategies is pivotal in safeguarding against the multifaceted threats that loom large in the era of digital proliferation.
- Like
- Digg
- Del
- Tumblr
- VKontakte
- Buffer
- Love This
- Odnoklassniki
- Meneame
- Blogger
- Amazon
- Yahoo Mail
- Gmail
- AOL
- Newsvine
- HackerNews
- Evernote
- MySpace
- Mail.ru
- Viadeo
- Line
- Comments
- Yummly
- SMS
- Viber
- Telegram
- Subscribe
- Skype
- Facebook Messenger
- Kakao
- LiveJournal
- Yammer
- Edgar
- Fintel
- Mix
- Instapaper
- Copy Link
All institutions rely on IT to deliver services. Disruption, degradation, or unauthorised alteration of information and systems can impact an institution’s condition, core processes, and risk profile. Furthermore, organisations are expected to make quick decisions due to the rapid pace of dynamic transformation. To stay competitive, data is a crucial resource for tackling this challenge.
Hence, data protection is paramount in safeguarding the integrity and confidentiality of this invaluable resource. Organisations must implement robust security measures to prevent unauthorised access, data breaches, and other cyber threats that could compromise sensitive information.
Prasert Chandraruangthong, Minister of Digital Economy and Society, supports the National Agenda in fortifying personal data protection with Asst Prof Dr Veerachai Atharn, Assistant Director of the National Science and Technology Development Agency, Science Park, and Dr Siwa Rak Siwamoksatham, Secretary-General of the Personal Data Protection Committee, gave a welcome speech. It marks that the training aims to bolster the knowledge about data protection among the citizens of Thailand.
Data protection is not only for the organisation, but it also becomes responsible for the individuals, Minister Prasert Chandraruangthong emphasises. Thailand has collaboratively developed a comprehensive plan regarding the measures to foster a collective defence against cyber threats towards data privacy.
The Ministry of Digital Economy and Society and the Department of Special Investigation (DSI) will expedite efforts to block illegal trading of personal information. Offenders will be actively pursued, prosecuted, and arrested to ensure a swift and effective response in safeguarding the privacy and security of individuals’ data.
This strategy underscores the government’s commitment to leveraging digital technology to fortify data protection measures and create a safer online environment for all citizens by partnering with other entities.
Further, many countries worldwide share these cybersecurity concerns. In Thailand’s neighbouring country, Indonesia, the government has noticed that data privacy is a crucial aspect that demands attention. Indonesia has recognised the paramount importance of safeguarding individuals’ privacy and has taken significant steps to disseminate stakeholders to gain collaborative effort in fortifying children’s security.
Nezar Patria, Deputy Minister of the Ministry of Communication and Information of Indonesia, observed that children encounter abundant online information and content. It can significantly lead them to unwanted exposure and potential risks as artificial intelligence has evolved.
Patria stressed the crucial role of AI, emphasising the importance of implementing automatic content filters and moderation to counteract harmful content. AI can be used to detect cyberbullying through security measures and by recognising the patterns of cyberbullying perpetrators. It can also identify perpetrators of online violence through behavioural detection in the digital space and enhance security and privacy protection. Moreover, AI can assist parents in monitoring screen time, ensuring that children maintain a balanced and healthy level of engagement with digital devices.
Conversely, the presence of generative AI technology, such as deep fake, enables the manipulation of photo or video content, potentially leading to the creation of harmful material with children as victims. Patria urged collaborative discussions among all stakeholders involved in related matters to harness AI technology for the advancement and well-being of children in Indonesia.
In the realm of digital advancements, cybersecurity is the priority right now. Through public awareness campaigns, workshops, and training initiatives, nations aim to empower citizens with the knowledge to identify, prevent, and respond to cyber threats effectively. The ongoing commitment to cybersecurity reflects the country’s dedication to ensuring a secure and thriving digital future for its citizens and the broader digital community.
- Like
- Digg
- Del
- Tumblr
- VKontakte
- Buffer
- Love This
- Odnoklassniki
- Meneame
- Blogger
- Amazon
- Yahoo Mail
- Gmail
- AOL
- Newsvine
- HackerNews
- Evernote
- MySpace
- Mail.ru
- Viadeo
- Line
- Comments
- Yummly
- SMS
- Viber
- Telegram
- Subscribe
- Skype
- Facebook Messenger
- Kakao
- LiveJournal
- Yammer
- Edgar
- Fintel
- Mix
- Instapaper
- Copy Link
The introduction of the E-Travel Customs System at Ninoy Aquino International Airport Terminal 1 by the Bureau of Customs (BOC) in conjunction with key stakeholders represents a significant stride in the direction of enhancing national security and streamlining customs processes in the Philippines.

This transformative system, developed in coordination with the Bureau of Immigration (BI), the Banko Sentral ng Pilipinas (BSP), the Anti-Money Laundering Council (AMLC), and the Department of Information and Communications Technology (DICT), marks a significant leap in digitising data collection processes for travellers and crew members arriving in and departing from the Philippines.
The integration of the Electronic Customs Baggage Declaration Form (e-CBDF) and Electronic Currencies Declaration Form (e-CDF) into the BI’s eTravel System is a pivotal step in the evolution of border control practices. This collaborative initiative aims to optimise customs procedures, bolster health surveillance, and facilitate in-depth economic data analysis.
The E-Travel Customs System, a unified digital data collection platform, streamlines the passenger experience at airport terminals. Its standout feature is the integration of the Electronic Customs Baggage and Currency Declaration interface, formerly part of the BOC’s I-Declare System, introduced last year.
Travellers and crew members can now utilise a user-friendly, single web portal that consolidates the border control requirements of the Bureau of Quarantine, BOC, BI and the BSP.
This not only enhances the overall passenger experience but also enables the BOC to receive advanced information for effective risk profiling. Besides, the timely sharing of information with AMLC and BSP strengthens the nation’s commitment to combat money laundering and ensure financial security.
BOC Commissioner Bienvenido Y Rubio expressed confidence in the E-Travel Customs System’s potential to revolutionise customs processes, stating, “This collaborative initiative demonstrates our commitment to innovation and efficiency in customs management.”
The E-Travel Customs System will play a pivotal role in ensuring the security of the borders and fostering a seamless travel experience for all. Commissioner Bienvenido added that they are dedicated to advancing the customs practices, aligning with global standards, and safeguarding the interests of the nation.
The BOC cited that the E-Travel Customs System stands as a testament to the government’s dedication to providing cutting-edge solutions for border control, aligning with international standards, and advancing towards a more secure and efficient customs environment. The collaborative efforts of the BOC, BI, AMLC, BSP, and DICT signify a commitment to innovation, ensuring that the Philippines remains at the forefront of modern customs practices.
The E-Travel Customs System represents a paradigm shift in customs management, transcending mere technological enhancement. It stands as a strategic initiative meticulously designed to reshape and fortify customs practices, infusing them with agility, heightened security, and alignment with global best practices. This innovative system is not merely an upgrade; it is a holistic approach aimed at ushering in a new era of efficiency and adaptability in customs operations.
As the Philippines embraces this technological leap into the future of border control, it reaffirms its unwavering commitment to establishing a customs environment that goes beyond traditional boundaries. The system’s multifaceted capabilities, ranging from streamlined data collection to real-time risk profiling, showcase its transformative potential.
By prioritising technological advancements, the nation aims to enhance the overall travel experience, reduce procedural bottlenecks, and strengthen its position in global efforts to ensure secure and seamless border management.