More stories

  • in

    Elon Musk activates Starlink to help keep Ukraine's internet up and running

    With Russia’s invasion of Ukraine, Ukraine’s internet was sent staggering. Georgia Tech’s Internet Outage Detection and Analysis (IODA) project, which monitors the internet, reported serious outages in Ukraine starting late on February 23.In response to this and other internet attacks, Ukraine’s Vice Prime Minister and Minister of Digital Transformation Mykhailo Fedorov requested help from SpaceX and Tesla billionaire Elon Musk. Musk responded on Twitter, where he wrote, “Starlink service is now active in Ukraine. More terminals en route.”Starlink, SpaceX’s low-earth orbit (LEO) high-speed, low-latency internet service, is considered far more reliable than conventional broadband.One person on Twitter summed it up nicely: “The people of Ukraine now have access to the fastest, most robust satellite internet system ever created. This makes it impossible for Russia to disable the Ukrainian internet access fully without cyber attacking foreign data centers.” Even before the declaration of war, Russia has been targeting Ukraine with cyber attacks. On 15 January 2022, Russia injected malware and employed a DDoS attack on Ukrainian websites, while in 2016, a Russian cyber attack turned off the power supply of Ukraine’s capital city, Kyiv. More recently, Russia has been trying to disrupt Ukraine’s internet. According to the internet monitoring group NetBlocks, GigaTrans — Ukraine’s main internet service provider — has seen its traffic disrupted since February 24. NetBlocks also reported internet outages in major Ukrainian cities such as Kyiv, Kharkiv, and Mariupol.The Computer Emergency Response Team (CERT) of Ukraine also reported that Russia’s internet attacks have expanded beyond Ukraine. CERT Ukraine said the NC1151 group, a hacker organization associated with Belarus’s Ministry of Defense, a Russian ally, has also been attacking Polish and non-government Belarusian and Russian sites.Still, despite all of Russia’s efforts, Cloudflare Radar shows that for now Ukraine’s internet traffic, while suffering a significant drop, is still hanging in there. With the help of Starlink, Ukraine’s internet should still continue to hold its own. Updated at 11:21am AEST, 28 February 2022: fixed grammatical errors and added further information about Starlink activation.

    Ukraine Crisis More

  • in

    MWC 2022: TCL launches five more 30 Series smartphones, plus tablets and routers

    Fresh from unveiling a portfolio of products at CES, including TVs, tablets, smartphones, AR glasses and a laptop, and launching its first two (US exclusive) 30 Series phones, TCL is back at Mobile World Congress (MWC) with yet more new products. This time, there are details on a quintet of 30 Series phones, including one 5G model, along with three new tablets and three CPE routers. Here’s a tour of TCL’s MWC announcements.30 Series smartphones
    Image: TCL
    TCL ‘pre-announced’ its 30 Series phones at CES, and has recently launched the $300 30 V 5G and $200 30 XE 5G in the US, via Verizon and T-Mobile respectively. There are five new phones, all costing less than €300 and launching first in Europe; four of them are 4G handsets and the top-end phone is a 5G device. The phones are: TCL 30 5G, TCL 30+, TCL 30, TCL 30 SE and TCL 30 E. Key selling points across the range include the screens, which all feature TCL’s NXTVISION display optimisation technology and 20:9 aspect ratios. The 30 5G, 30+ and 30 have a 6.7-inch AMOLED panel with FHD+ (1080 x 2400, 395ppi) resolution and a 60Hz refresh rate. The 30 SE and 30 E both have a 6.52-inch ‘mini-notch’ panel with HD+ (720 x 1600, 269ppi) resolution. All 30 Series models bar the low-end TCL 30 E have a triple rear camera system comprising a 50MP main camera, a 2MP depth camera and a 2MP macro camera. The 30 E omits the macro capability. The front cameras are more varied: 13MP ultra-wide on the 30 5G and 30+, 8MP on the 30 and 30 SE, and 5MP on the entry-level 30 E. AI assistance makes it easy for non-expert users to get good results in different shooting conditions, TCL says – these are not premium cameras aimed at pro photographers. The 6.7-inch devices (30 5G, 30+, 30) all weigh 184g and are 7.74mm thick, with claimed screen-to-body ratios of 91.7%. The 6.52-inch models (30 SE, 30 E) are heavier (190g) and thicker (8.9mm) with lower screen-to-body ratios (89.1%). Although TCL describes the phones as ‘durable’, there’s no IP rating for dust and water resistance. The 30 Series phones all benefit from large batteries (5010mAh on the 30 5G, 30+ and 30, 5000mAh on the 30 SE and 30 E), delivering ‘better than day-long battery life’, according to TCL. Fast charging at 18W is supported on the three higher-end phones, 15W on the 30 SE and 10W on the 30 E. AI smart charging optimises the charging cycle to minimise battery deterioration. The 30 Series phones will ship with Android 12, and TCL plans to support two OS upgrades, although the details may change for carrier variants. However, TCL confirmed that the 30+ and 30 models are certified by the Android Enterprise Recommended program and will get at least two years of security patches and at least one OS upgrade. TCL’s 30 Series phones are all powered by MediaTek chipsets: Dimensity 700 (30 5G), Helio G37 (30+, 30) and Helio G25 (30 SE, 30 E). TCL 30 Series: pricing and availabilityModelPriceRegionDateTCL 30 5G€249 (64GB), €269 (128GB)Europe (select regions later)April 2022TCL 30+€199Europe (select regions later)nowTCL 30€179Europe (select regions later)nowTCL 30 SE€149 (64GB), €169 (128GB)Europe (select regions later)nowTCL 30 E€139Europe (select regions later)April 2022TabletsTCL is expanding its education-focused Android tablet portfolio with three new products: the TCL NXTPAPER MAX 10, TCL TAB 10 HD 4G and TCL TAB 10s 5G.
    Image: TCL
    The 10.36-inch NXTPAPER MAX 10 features TCL’s ‘paper-like’ NXTPAPER LCD display technology, which focuses on eye protection via a combination of multi-layer blue light reduction and anti-glare glass. The result, TCL says, is a ‘more comfortable, natural reading and writing experience’. There are two models – Wi-Fi only and Wi-Fi plus 4G LTE. 
    Image: TCL
    The 10.1-inch TCL Tab 10 HD 4G is an entertainment-focused device with an HD (1280 x 800) IPS screen, 8.7mm bezels resulting in an 82% screen to body ratio, and a 5500mAh battery that will ‘comfortably’ deliver all-day battery life, TCL says. As well as 4G LTE, the device offers Wi-Fi 5 (802.11ac) connectivity. A version with an FHD (1920 x 1200) screen will be available in Asia in mid-Q2 this year. 
    Image: TCL
    TCL claims that the 10.1-inch TAB 10s 5G is among the first affordable tablets with 5G connectivity. The NXTVISION screen has FHD (1920 x 1200) resolution, and the device is powered by an octa-core MediaTek chipset with 4GB of RAM and 64GB of internal storage, expandable via MicroSD card. Power is supplied by an 8000mAh battery, replenished by a 9V/2A charger. TCL also teased another 5G tablet – the 2-in-1 TCL TAB PRO 12 5G with ‘a large display and a ultra-fast 5G connectivity’, but offered no further details. TCL tablet pricing and availabilityModelPriceRegionDateTCL NXTPAPER MAX 10  from €269  Asia  mid-Q2 2022TCL TAB 10 HD 4G  €179  Europe  nowTCL TAB 10 FHD 4G  €199  Asia  late March 2022  TCL TAB 10s 5G  €349  n/smid-Q2 2022  RoutersTCL tops off its MWC portfolio with three CPE (Customer Premises Equipment) routers, the LINKHUB 5G CPE HH515 (first announced at CES), the LINKZONE LTE CAT6 Mobile Wi-Fi MW63, and the LINKHUB LTE CAT6 Home Station HH63.
    Image: TCL
    Capable of delivering a peak data rate of up to 4.7Gbps via sub-6GHz 5G, the LINKHUB 5G CPE HH515 can support up to 256 connections over dual band Wi-Fi 6 (802.11ax). With support for standalone (SA) as well as non-standalone (NSA) 5G networks, the HH515 router can support a variety of use cases (cloud-based gaming, live streaming, online education, home working) in areas where fixed-line internet access is poor. The LINKHUB 5G CPE HH515 will be available in Europe in Q1 2022, but TCL has not provided pricing.
    Image: TCL
    The LINKZONE LTE CAT6 Mobile Wi-Fi MW63 is a ‘MiFi’-style 4G device offering up to 300Mbps download speed and up to 32 Wi-Fi 5 (802.11ac) connections in a portable form factor powered by a 2150mAh battery offering up to 8 hours of working time and 300 hours on standby, TCL says.
    Image: TCL
    LINKHUB LTE CAT6 Home Station HH63 comes in a new ‘Tile’ design and also offers up to 300Mbps download and up to 32 Wi-Fi 5 connections. Both of TCL’s 4G routers, which are eSIM compatible, will launch in Europe in Q2 2022.Finally, TCL teased a 5G mobile router, the LINKZONE 5G Mobile Wi-Fi MW513, which will support mmWave as well as sub-6GHz 5G frequency bands and will launch ‘later in the year’. More

  • in

    Hewlett Packard Enterprise backs startup Ayar Labs for photonic circuits

    Technology giant Hewlett Packard Enterprise on Thursday announced a “multi-year strategic collaboration” with Ayar Labs, the seven-year-old photonic chip startup whose circuits are designed to move data between chips much faster than typical metal interconnects.

    California-based Ayar, which has amassed $65 million in venture capital funding, is also receiving funding from Hewlett’s venture capital unit, Hewlett Packard Pathfinder. The two declined to disclose how much.Hewlett said that because of the rapidly increasing amounts of data in high-performance computing (HPC) and in artificial intelligence computing, traditional “electrical-based networking offerings will eventually reach bandwidth limits.”Therefore, the duo “plan to develop capabilities that leverage optical I/O, which is a silicon photonics-based technology that uses light instead of electricity to transmit data, to integrate with HPE Slingshot,” Hewlett’s networking product dedicated to interconnecting HPC systems. Slingshot is being developed for computers such as “exascale” machines designed for the US Department of Energy.Ayar Labs claims its silicon photonic technology can deliver 1,000 times the bandwidth of electrical I/O circuity while consuming 1/10th the power.A recent Ayar Labs research report on a terabit-per-second optical interconnect.
    Ayar Labs 2021
    Ayar Labs has amassed nearly two dozen patents on photonic chip technology and has another four dozen patent applications.Recent research published by the company describes transmitting 1-terabit-per-second data feeds over wavelength-division multiplexing (WDM) fiber-optic network systems, at 128 gigabits per second on each of 16 ports. 

    Networking More

  • in

    Intel expands AI developer toolkit to bring more intelligence to the edge

    Intel on Wednesday announced that it’s updating its OpenVINO AI developer toolkit, enabling developers to use it to bring a wider range of intelligent applications to the edge. Launched in 2018 with a focus on computer vision, OpenVINO now supports a broader range of deep learning models, which means adding support for audio and natural language processing use cases. 

    Innovation

    “With inference taking over as a critical workload at the edge, there’s a much greater diversity of applications” under development, Adam Burns, Intel VP and GM of Internet of Things Group, said to ZDNet. Since its launch, hundreds of thousands of developers have used OpenVINO to deploy AI workloads at the edge, according to Intel. A typical use case would be defect detection in a factory. Now, with broader model support, a manufacturer could use it to build a defect spotting system, plus a system to listen to a machine’s motor for signs of failure. Besides the expanded model support, the new version of OpenVINO offers more device portability choices besides the expanded model support with an updated and simplified API. OpenVINO 2022.1 also includes a new automatic optimization process. The new capability auto-discovers the compute and accelerators on a given system and then dynamically load balances and increases AI parallelization based on memory and compute capacity. “Developers create applications on different systems,” Burns said. “We want developers to be able to develop right on their laptop and deploy to any system.” Intel customers already using OpenVINO include automakers like BMW and Audi; John Deere, which uses it for welding inspection; and companies making medical imaging equipment like Samsung, Siemens, Philips and GE. The software is easily deployed into Intel-based solutions — which is a compelling selling point, given that most inference workloads already run on Intel hardware. “We expect a lot more data to be stored and processed at the edge,”  Sachin Katti, CTO of Intel’s Network and Edge Group, said to ZDNet. “One of the killer apps at the edge is going to be inference-driven intelligence and automation.”Ahead of this year’s Mobile World Congress, Intel on Thursday also announced a new system-on-chip (SoC) designed for the software-defined network and edge. The new Xeon D processors (the D-2700 and D-1700) are built for demanding use cases, such as security appliances, enterprise routers and switches, cloud storage, wireless networks, AI inferencing and edge servers — use cases where compute processing needs to happen close to where the data is generated. The chips deliver integrated AI and crypto acceleration, built-in Ethernet, support for time-coordinated computing and time-sensitive networking. More than 70 companies are working with Intel on designs that utilize the Xeon D processors, including Cisco, Juniper Networks and Rakuten Symphony.Intel also said Thursday that its next-gen Xeon Scalable platform, Sapphire Rapids, includes unique 5G-specific signal processing instruction enhancements to support RAN-specific signal processing. This will make it easier for Intel customers to deploy vRAN (virtual Radio Access Networks) in demanding environments.

    Artificial Intelligence More

  • in

    SockDetour backdoor used in attacks on defense contractors: Unit42

    Researchers at Palo Alto Network’s Unit 42 said they discovered a tool — named SockDetour — that serves as a backup backdoor in case the primary one is removed. They believe it’s possible that is has “been in the wild since at least July 2019.”The researchers said it stood out and is hard to detect because it operations filelessly and socketlessly on compromised Windows servers.

    ZDNet Recommends

    “One of the command and control (C2) infrastructures that the threat actor used for malware distribution for the TiltedTemple campaign hosted SockDetour along with other miscellaneous tools such as a memory dumping tool and several webshells. We are tracking SockDetour as one campaign within TiltedTemple, but cannot yet say definitively whether the activities stem from a single or multiple threat actors,” the researchers explained. “Based on Unit 42’s telemetry data and the analysis of the collected samples, we believe the threat actor behind SockDetour has been focused on targeting US-based defense contractors using the tools. Unit 42 has evidence of at least four defense contractors being targeted by this campaign, with a compromise of at least one contractor.”SockDetour allows attackers to remain stealthily on compromised Windows servers by loading filelessly in legitimate service processes and using legitimate processes’ network sockets to establish its own encrypted C2 channel.The researchers did not find any additional SockDetour samples on public repositories, and the plugin DLL remains unknown. They added that it is being delivered through SockDetour’s encrypted channel and communicating via hijacked sockets.Unit 42 noted that the type of NAS server found hosting SockDetour is typically used by small businesses. The company tied the backdoor to a larger APT campaign they named TiltedTemple. They first identified TiltedTemple while investigating its use of the Zoho ManageEngine ADSelfService Plus vulnerability CVE-2021-40539 and ServiceDesk Plus vulnerability CVE-2021-44077. “Our initial publications on TiltedTemple focused on attacks that occurred through compromised ManageEngine ADSelfService Plus servers and through ManageEngine ServiceDesk Plus,” the researchers said. “The TiltedTemple campaign has compromised organizations across the technology, energy, healthcare, education, finance, and defense industries and conducted reconnaissance activities against these industries and others, including infrastructure associated with five US states. We found SockDetour hosted on infrastructure associated with TiltedTemple, though we have not yet determined whether this is the work of a single threat actor or several.” More

  • in

    How Palo Alto Networks modernized its security management with AI

    The SIEM, or security information and event management console, has been a staple for security teams for more than a decade. It’s the single pane of glass that shows events, alerts, logs, and other information that can be used to find a breach. Despite its near ubiquity, I’ve long been a SIEM critic and believe the tool is long past its prime. This is certainly not the consensus; I’ve been criticized in the past for taking this stance. Legacy SIEMs are outdated 

    ZDNet Recommends

    The best security key

    While robust passwords help you secure your valuable online accounts, hardware-based two-factor authentication takes that security to the next level.

    Read More

    The proof point I offer is the fact that whenever a breach occurs, the SIEM vendor claims to have seen it, yet the breach happened anyway. That was the case with many big-name businesses that suffered a newsworthy cyberattack. Target, Sony, and many others all echoed the same. The SIEM saw it, but the security team missed it. If SIEMs are so powerful, why does this continue to happen? The answer is that SIEMs can no longer keep up with the massive volumes of data that come into them and need to be correlated, sorted, and viewed in a way that helps security operations prioritize events. This can help separate an actual breach from a false positive. Many security pros have told me their SIEM shows so much info now that they ignore much of it. In a sense, too much information is as useful as no information.Palo Alto introduces an AI-powered operations tool This week, Palo Alto Networks introduced its Cortex XSIAM (eXtended Security Intelligence and Automation Management), which can be viewed as a modernized SIEM with an infusion of artificial intelligence. The concept of the XSIAM is that it uses AI to separate the threats from the noise in the immense amounts of telemetry data generated by infrastructure today. If done correctly, this would accelerate threat identification, which in turn, speeds up threat response. The infusion of AI into security is something that has been badly needed for some time. There are still some people opposed to it, and the thought of taking the analytic process out of people’s hands and trusting machines, in reality, can be scary. The truth is the bad guys are using AI. Using people to fight threat actors armed with machine learning is akin to bringing a knife to a gunfight. It’s time to fight fire with fire, and that means accepting that AI needs to be a key part of cybersecurity moving forward. 

    One of the major differences between a traditional SIEM and Cortex XSIAM is that the latter collects granular telemetry information, not just logs and alerts. This is where AI can add value as it can drive natively autonomous response actions, such as cross-correlation of alerts and data, detection of sophisticated emerging threats, and automated remediation based on threat intelligence and attack surface data. Security platforms are the way forward The release of Cortex XSIAM is a direct result of the security platform that Palo Alto Networks has built. Historically, security pros have used best-of-breed point products to secure specific points in the environment. This is why, according to ZK Research, the average enterprise has 32 security vendors, with some reporting more than 100. One of the three-letter U.S. government agencies told me it has more than 200. CISOs are now starting to understand that this strategy does not work. One CISO stated that best of breed everywhere does not lead to best-in-class threat protection. In fact, it creates suboptimal protection because it becomes impossible to manage security policies across the various vendors. I do not believe we can ever have one vendor to handle everything, but businesses do need to pick a single open-platform vendor that has a strong foundation in networking, cloud, and endpoint, and then augment that with technologies that interoperate with that platform. This has been the vision on which Palo Alto has been working. The first proof point for validating the value of the platform was the release of Palo Alto’s XDR solution. In 2018, I authored this post, proclaiming XDR to be the evolution of EDR. My thesis at the time was that looking at endpoint data in isolation wasn’t enough; XDR rolls up data from across the infrastructure to see things EDR can’t. The release of Cortex XSIAM follows the same thought process. SIEMs use limited data, and manual analytics and are no longer a viable way of finding threats. This model has not worked, is not working, and won’t ever work. Security teams need an operations tool that uses AI-based analytics, which pulls granular data from across the platform to combat today’s highly advanced threat actors. More

  • in

    Asustor warns users of Deadbolt ransomware attacks

    Users of Asustor Network Attached Storage (NAS) devices are being warned of potential Deadbolt ransomware infections after dozens of people took to Reddit and other message boards to complain of attacks. Asustor Marketing Manager Jack Lu told ZDNet that the company is “going to release a recovery firmware for support engineers today for users whose NAS is hacked so they can use their NAS again.” 

    ZDNet Recommends

    The best network-attached storage devices

    If cloud-based servers don’t meet all of your storage needs, consider a NAS solution. We selected a handful of devices that passed our reliability torture tests and offer superior usability and feature sets.

    Read More

    “However, encrypted files can not be recovered unless users have backups,” Lu added. Asustor released a warning on Wednesday that the Deadbolt ransomware was being used in attacks affecting Asustor devices. It announced that the myasustor.com DDNS service will be disabled while the issue is investigated.The company recommends users change default ports, including the default NAS web access ports of 8000 and 8001 as well as remote web access ports of 80 and 443. Users should also Disable EZ Connect, make immediate backups, and turn off Terminal/SSH and SFTP services.Asustor also provided a more detailed guide for users in need of more help. If you have already been hit by Deadbolt ransomware, you should unplug the Ethernet network cable and shut down your NAS by pressing and holding the power button for three seconds.Users are urged to fill out this form and make sure not to initialize their NAS because it will erase their data.The New Zealand CERT released its own lengthy warnings about Deadbolt this week, writing that vulnerabilities in QNAP and Asustor NAS devices are being actively exploited to deploy ransomware. The US Cybersecurity and Infrastructure Security Agency declined to comment.QNAP released its own Deadbolt guidance last month and took several controversial measures to limit the spread of the ransomware. CERT NZ said users should follow the guidance provided by both companies about how to protect their devices. But it noted that both are “being actively targeted by attackers intending to deploy ransomware.”It said QNAP NAS devices that are internet exposed and running QTS and QuTS operating systems, or add-ons with the following versions, are affected:QTS 5.0.0.1891 build 20211221 and laterQTS 4.5.4.1892 build 20211223 and laterQuTS hero h5.0.0.1892 build 20211222 and laterQuTS hero h4.5.4.1892 build 20211223 and laterQuTScloud c5.0.0.1919 build 20220119 and laterAffected Asustor devices that are internet exposed and running ADM operating systems include the AS5104T, AS5304T, AS6404T, AS7004T, AS5202T, AS6302T, and AS1104T models. 

    Users have reported seeing the same ransom messages that were deployed last month when QNAP devices were hit. The Deadbolt ransomware group demanded 0.03 bitcoins (BTC) in exchange for the decryption key. In another note to Asustor, the ransomware group offers to provide the company with information about the alleged zero-day vulnerability they used to attack in exchange for 7.5 BTC. The group is also offering a master decryption key for 50 BTC, worth $1.9 million. For QNAP, the group demanded a payment of 5 BTC in exchange for details about the alleged zero-day and 50 BTC for a universal decryption master key.As users wait for the firmware to be released, some are warning users to make a backup of the locked files. QNAP’s firmware removed the ransom note that is needed to get and use the decryption key. Both the decryption tools from Deadbolt and security company Emsisoft require the original ransom note. It is unclear how many Asustor users are affected by the ransomware. Censys reported last month that of the 130,000 QNAP NAS devices that were potential targets, 4,988 “exhibited the telltale signs of this specific piece of ransomware.”Censys later told ZDNet that the number of exposed and infected devices was around 3,927.  More

  • in

    Singtel splashes $1.5B to redevelop headquarters for 'sustainable workspaces'

    Singtel has unveiled plans to dish out at least SG$2 billion ($1.49 billion) to redevelop its global headquarters. Located along Singapore’s Orchard Road shopping strip, the new site is pitched as a smart building that will showcase sustainable workspace designs for the telco’s employees and future tenants. Called Comcentre, the building has sat on its current plot since 1979 and occupies an area of 19,252 square metres. The planned redevelopment is estimated to cost at least SG$2 billion ($1.49 billion), including land costs, Singtel said in a statement Wednesday. The Singapore telco said it would divest ownership of the building as part of its “capital recycling strategy” to a joint venture to be formed with an appointed estate developer. Singtel would hold a majority stake in the joint venture. 

    It added that it was in the process of confirming the developer from a shortlist of two. The tender process would close next month, with a decision to be made in May, according to Singtel.  The telco said it would be the anchor tenant of the new development, taking up some 30% of the space. The rest would be leased out to tenants seeking offices in the area, providing additional recurring income for Singtel in the long term, it said. Slated for completion by end-2028, the redeveloped site is expected to span a gross floor area of more than 110,000 square metres comprising office buildings, and a retail component. It also will comprise Singtel’s  Orchard Exchange, which currently hosts telecommunications infrastructure. The telco said it had secured in-principal approval from Singapore Land Authority to extend its lease on all lots within Comcentre to 2089. 

    The office buildings on the redeveloped site would feature “more open and digital” areas that facilitate a collaborative environment and provide tenants with “optimised hybrid workspaces”, Singtel said.  Singtel Group CEO Yuen Kuan Moon said: “We’re truly excited to be working with the authorities to rejuvenate the Orchard Road precinct to prepare for the post-pandemic world and reinvigorate our future workplaces… Maximising the unique development potential of Comcentre will significantly enhance its value in a vicinity where Grade A office developments are in short supply. We strive to optimise the capital we can unlock from existing assets to fund our growth initiatives, including 5G and the regional expansion of our data centre business.”The new Comcentre will cater to our evolving business needs and showcase the digital workplace of the future featuring 5G solutions… The redevelopment of our headquarters also supports our vision to build a greener and sustainable future, and will further facilitate our efforts to reach net zero for our own operations,” Yuen said. Preparation for the redevelopment would begin in 2024, when employees would move to temporary spaces at Singtel’s other premises across Singapore. The telco last year kickstarted a business transformation it dubbed a “strategic reset”. Two other local telcos StarHub and M1 also made similar moves and all three companies saw leadership changes in recent years. StarHub’s Nikhil Eapen took on the CEO role in December 2020, after a months-long search, while Yuen assumed his current role in January last year and M1 CEO Manjot Singh Mann took over the helm in December 2018.In a separate announcement Tuesday, Singtel launched a new orchestration platform for 5G edge computing and cloud services. Dubbed Paragon, the new offering was touted to allow enterprise customers to tap the telco’s 5G network on-demand and roll out mission-critical applications on its MEC (Multi-access Edge Compute) infrastructure. Customers also would be able to access applications offered by Singtel’s partners as well as deploy them in a hybrid environment, comprising Singtel’s edge and a public cloud platform. “Many enterprises are undergoing rapid digitalisation while exploring and developing tailored 5G solutions for deployment in their industries,” said Singtel’s enterprise group CEO Bill Chang. “We understand the challenges and complexities they face in managing the various networks, edge cloud applications, and services with the required cybersecurity, resiliency, and demanding service assurances required, cost-effectively. Paragon was conceived, developed, and delivered to help enterprises meet these needs through a single platform.”RELATED COVERAGE More