More stories

  • in

    NSW firefighters to be equipped with AU$57 million worth of new bushfire equipment

    Image: Fire and Rescue NSW
    The deployment of new drones, cells on wheels, and vehicles with built-in Wi-Fi will form part of the New South Wales government’s AU$57.4 million investment into arming firefights with new equipment.Under what the state government is calling the connected firefighter package, firefighters will have access to drones that can provide images and data from incidents in real-time that can be used to assist in incident planning, and for chemical and gas detection; cells on wheels equipped with communication technology to provide power, especially in remote parts of the state without coverage; vehicles with built-in Wi-Fi that can provide mobile 4G network in remote locations where satellite connection is limited.Fire and Rescue NSW mobile command centres will also receive upgrades to ensure there is communication between incident management teams and firefighters during incidents. “What is apparent is that our emergency services are entering a tech boom, one which rightly puts NSW ahead of the pack this bushfire season,” Minister for Police and Emergency Services David Elliot said in a statement on Friday. “These assets will ensure our first responders are safe as they enter dangerous and volatile fire grounds to protect their communities.”The investment is part of the state government’s overall AU$480 million response to the independent NSW bushfire inquiry following the 2019/20 Black Summer Bushfires. The inquiry underscored a need to equip firefighters with more advanced technology, such as drones, remote sensors, data science, and artificial intelligence, to help them better understand, model, and predict bushfire behaviour, and respond more quickly.A total of 76 recommendations were made and the state government have accepted them all.

    Last October, the NSW government had already allocated AU$192 million to arm firefighters with new equipment and upgrades to the existing aerial fleet, emergency infrastructure, and Fires Near Me app.The state government also announced as part of the 2021-22 Budget that it would direct a total of AU$28 million over four years into research and development of new technologies and industries to help New South Wales tackle future bushfires.Specifically, this included establishing a bushfire technology network for researchers, investors, and industry, as well as work with local small businesses to develop and commercialise bushfire technologies through an early-stage Bushfire Technology Fund and ensure the new technologies are tested by NSW’s frontline bushfire services.Related Coverage More

  • in

    Superloop parts with Hong Kong business and Singapore assets for AU$140 million

    Image: Getty Images
    Superloop announced on Monday morning it would be divesting its Hong Kong business and parts of its Singapore business for AU$140 million to Columbia Capital and DigitalBridge. As part of the deal, Superloop has retained 15-year right of use on the existing and potentially expanded Singapore and Hong Kong networks. The company said this would allow it to continue to offer end-to-end services on the Indigo submarine cable between Australia, Indonesia, and Singapore. The duo making the purchase will have a preferential deal on Indigo access, while Superloop will operate and support the Singapore network for at least three years at a cost of AU$1.5 million to the buyers. The deal is expected to be completed early next calendar year. “I recognised when I joined Superloop that one of our great opportunities was to look at the invested capital of the business and where appropriate, recycle it and re-invest in areas that will drive greater shareholder returns,” Superloop CEO and managing director Paul Tyler said. “This sale of our Hong Kong business and select Singapore assets, at a premium to their carrying values, allows the company to release significant shareholder funds and redeploy them into more strategically aligned assets, higher growth opportunities and markets.” The company is claiming a 30% premium on the sale from its AU$108 million carrying value.

    Elsewhere on Monday, Spirit Technology Solutions, the company formerly known as Spirit Telecom, has sold its consumer assets for AU$5.1 million to DGTek. The company said it would book AU$2.5 million in profit from the sale. “The consumer internet business is not critical to future operations and represents less than 2% of Spirit’s revenue,” Spirit told the ASX. For its part, DGTek said the purchase would take its footprint up to 35,000 premises. Spirit also said it was considering several non-binding proposals to sell its fixed wireless towers. Related Coverage More

  • in

    Google forced me to try Bing (then Microsoft spoiled it all)

    Pretty, isn’t it?
    Screenshot by ZDNet
    Occasionally, you just have to admit why you did something you never thought you’d do.

    more Technically Incorrect

    Here, then, is what happened.I happened upon the tale of Google telling a European court something it thought was embarrassing. Embarrassing for Microsoft, that is.Google’s lawyer, Alfonso Lamadrid told the court: “We have submitted evidence showing that the most common search query on Bing is, by far, ‘Google,'” He added: “People use Google because they choose to, not because they are forced to.””Oh, ho, ho,” I snorted to myself. “Well, how archly arrogant of Google.”This was closely followed by: “Bing? Bing? I wonder what Bing’s like these days.”

    Google is, of course, a verb and a habit. You go there because you go there, because that’s what you do, because that’s what everyone does.Whereas Bing incites the thought: “I can’t even remember the last time I looked at Bing.”I had to look it up. You can do that when you write columns. It was January 2020, when I asked both Google and Bing whether Google was better than Bing. (Answer: Shruggy-shouldered emoji.)So when Google’s lawyer came over all haughty-taughty I thought I’d take another look at Microsoft’s search engine.And what a peculiar sight. Or site.Where Google’s home page is pale tending toward Ted Williams, here was an enticing explosion of color. This was actually moving. This was welcoming. This made me want to search for things. But first, though, it made me utter a deeply felt sound that was somewhere between a hiccup and an expectoration.For there on the page was an instruction from Microsoft: “Switch to the latest browser recommended by Microsoft.”Regular readers will know that Microsoft’s constant nagging to download its every product suffocates. It’s like going out with someone on just one date and they keep texting you to wonder if you should move in together.It’s even worse when you’ve already downloaded the particular Microsoft product and like it, yet the company keeps nagging you to download it.Oh, do stop.
    Screenshot by ZDNet
    What was curious, though, about the latest Binged nag was that it had the Edge logo, but didn’t mention the name. Could it be that some users might think Microsoft was recommending Firefox?In any case, can you just give it a rest, Microsoft? Can you let me decide whether I even like Bing before you start to pester me with more of your desperate entreaties? (I know the answer is no, but I can still ask, surely.)Still, I quickly filled in the search box and discovered that the results were, in large part, much more recent that I’d previously associated with Bing. In some cases they were more recent than a simultaneous, comparable search on Google. In some cases Google was appreciably badder than Bing. (Oh, come on. I had to.)

    I drifted away heartened by Bing’s look, yet annoyed by Microsoft’s pestering.A few days later, I went back to Bing. Again, the attractive home page welcome. As well as a peculiar display of stories, with headlines such as “Clipboard hits fan,” “Files defamation suit” and “Alaska’s fattest bear.”Is this what Microsoft thinks moves me? Silly sports stories, lawsuits and fat animals? It seems so.Naturally, I clicked on the fattest bear story. Naturally, Microsoft began to annoy me again. This was so, so petty. But once I’d looked at the search results for Alaska’s fattest bear, the back button didn’t work. It was clear Microsoft wanted me to search some more, instead of going back to the home page to look at the gorgeous scenery. This was so utterly pointless and something Google doesn’t do.I got back to the pretty home page by clicking on the Bing logo. I scrolled down some more and it really was quite absorbing. For example, stories from that particular day in history. Not one included a fat animal, though one was about a blackballed billy goat that cursed the Chicago Cubs in 1945. It could have been a large goat, I suppose.Yet scroll to the bottom and what do you find? Another nag: “Make Bing your homepage.” This was accompanied by the tender words: “Experience beauty every day.”I want to do that. I do. This is my goal in life. But not in this context: “Never miss a moment and keep search at your fingertips. Just set Bing as your browser’s homepage with a few easy steps!”Please, Bing, let me like you first. Please let’s go on a third date. Then a fourth. One day, I might fall in love with you. One day. More

  • in

    How AIOps is charting paths to fully autonomous networks

    AIOps (AI for IT operations) adoption is on the rise as organizations invest in AI to make their IT ops smarter, faster, and more secure. Those who have adopted AIOps view the technology as no longer a nice-to-have but a necessity in the post-pandemic, work-from-home era. In this new era, IT leaders are tasked with managing third-party cloud applications from devices and remote workers scattered across numerous locations.The insights come from a recently published State of AIOps Study, conducted by ZK Research, sponsored by Masergy, a software-defined networking (SD-WAN) services company. In August 2021, ZK Research surveyed more than 500 IT decision-makers in the U.S. across seven industries. IT decision-makers believe AIOps offers their organization several business benefits, including improved productivity, cloud application performance, and security. The majority (94%) of the respondents believe it’s important or very important for AIOps to manage network and cloud-app performance.AIOps continuously monitors app performance using ML algorithms by assessing bandwidth usage patterns, identifying anomalies, and predicting outages. Masergy, for example, has embedded AIOps directly in the application layer of its newly enhanced AIOps platform to help IT teams improve cloud app performance on global networks. AIOps starting to reach the massesAIOps adoption is starting to reach the masses, with network and security automation as the key drivers. One of the more interesting findings is that 64% of organizations claim to be already using AIOps. This number first seemed high to me, but I believe that’s because a number of organizations are using tools that claim to be AIOps but are simply rules-based engines. It’s important to understand that AIOps is not an upgraded management console or fancy SIEM (Security Information and Event Management). It’s a data-driven application or service that goes through a training process and then is restrained over time. It’s critical that buyers do their due diligence and ensure they are using a true AIOps tool and not one that’s just branded AI.Another interesting data point is that 55% of organizations are using AIOps across both network and security, meaning more than half of companies want to bring security and networking together. This is a trend the industry has been watching for a decade or more, and it hasn’t come to fruition yet. Now that digital businesses are network-centric, securing an organization should be done at the network level. It would have been nice to see this number higher, but 55% is certainly moving the industry in the right direction. 

    Also, 84% see AIOps as the path to a fully automated network environment, and 86% expect to have a completely automated network within five years. It’s good to see respondents understand that today AIOps can’t deliver a fully self-driving network, but it’s a step along the way. A good analogy is to think of AI in automobiles. Today, there are loads of AI features, such as lane change alert and autopilot, that make driving safer, but a fully autonomous vehicle remains a vision. IT pros need to think of AIOps as a tool that makes their jobs easier today, but they still should plan for automation. Start with SD-WAN and work toward AIOpsThe best way for organizations to fully benefit from AIOps is to invest in SD-WAN and secure access service edge (SASE), which combines elements of SD-WAN and network security into a single cloud-based service. When organizations adopt SD-WAN, and ultimately SASE, they gain virtualization and orchestration capabilities that are necessary for managing distributed networks and security policies. Also, SD-WAN and SASE combine network and security data, making it easier to coordinate security changes with network updates. Legacy networks aren’t designed for AI or centralized intelligence. AIOps is only as smart as the data it is fed, so it can’t become fully automated when used on a network that’s not managed using software. SASE provides a single converged platform where AIOps can access data across both the network and security to automate IT processes. Most (77%) organizations agree that AIOps performs better with a SASE architecture, in which SD-WAN and security are combined in one platform.More than two-thirds (73%) of the study participants believe IT should be investing in SD-WAN modernization and virtualization tools in preparation for AIOps. The other top two investments required to become AI-ready are cloud migration (67%) and training for AI models (61%).However, AIOps migration involves more than just deploying tools. Half of organizations cite eliminating system fragmentation as a major AIOps challenge. AI shouldn’t be fragmented across multiple tools, but rather AIOps and SASE should work together to provide overarching insights. The good news is organizations trust AIOps tools to create fully automated systems. The majority (97%) of the respondents are confident in these tools. For 65% of organizations buying and implementing solutions, AIOps features drive their selection. Meanwhile, 50% deploy AIOps using a fully managed or co-managed service.As is the case with any type of automation, AIOps requires reframing of processes, roles, and responsibilities. Organizations should create their own IT operations playbooks to train an AIOps engine. When choosing a solution, ZK Research recommends asking vendors — preferably not incumbents — for AI efficacy rates and how those are increasing over time. Every organization should have an AIOps strategy to avoid being left behind. More

  • in

    Dell expands focus on telecom space with new deployment software

    Dell Technology has announced the introduction of its Bare Metal Orchestrator, which is software it boasts will help telecoms solve the complexities associated with deploying and managing servers across various geographic locations.As the first software to be released from Project Metalweaver, which was announced in June, Dell said the Bare Metal Orchestrator will offer communication service providers (CSPs) the tools to automatically discover, deploy, and manage their servers. “With Bare Metal Orchestrator, cloud communication service providers are going to be able to keep costs in control, while they build out their edge,” Dell Technologies edge and telecom VP Aaron Chaisson told media. “As an example, if you look at all of the hyperscale clouds in the world, the total number of points of presence is only about 600. In the telecom space, there’s over 7 billion points of presence, globally,” he added. “Managing that type of scale is a major challenge for the telecom providers, so they need to solve this ability to address day-to-day virtual network tasks across their entire core edge and RAN environment at scale, across a highly distributed and geographical set of locations.”Chaisson claimed the software could save CSPs “up to 57% in operational costs”. To be globally available from November, the first release will support VMware, with future releases to also include RedHat and Wind River.

    Dell added it is expanding its open partner ecosystem by making its reference architecture, initially available for VMware and Red Hat, now available for Wind River Studio. The company is also introducing from early 2022 validated solution for Mavenir Open vRAN and VMware Telco Cloud Platform to accelerate the shift to ORAN technologies.  The tech giant first flagged its foray into the telecom space during Dell World in May, before it announced a slew of hardware and software to build out its cloud-native telecom ecosystem.At the time, Dell’s Telecom Systems Business senior VP and general manager said the “5G era is really the ‘enterprise G’.””It’s the era in which the next set of those kinds of transformational services are going to take place throughout the economy,” he said.”Three things have to happen in order to do that. First, they (telecom companies) need to be able to build and monetize edge computing. Second, they need to modernize network architectures — the legacy network isn’t as agile as it needs to be. It isn’t software-defined — it’s fundamentally not cloud-native. That really gets to the last piece, which is cloud-native operations need to become the principal mechanism by which a communication service provider operates,” Hoffman continued.More From Dell More

  • in

    ZTE widens bug bounty to focus on 5G security

    ZTE has widened a bug bounty scheme to plug security vulnerabilities in its products, especially potential holes brought about by the launch of commercial 5G networks and services. The Chinese networking equipment vendor is working with bug bounty platform YesWeHack to test a range of products, including smartphones as well as cloud computing and database management systems. More than 30,000 researchers in YesWeHack’s global network have been invited to participate in the bounty, which offers up to $2,000 for each bug uncovered, with the final amount awarded depending on the level of severity. When ZDNet spoke with its Asia-Pacific managing director Kevin Gallerin in July, the bug bounty platform worked with 10,000 security researchers in this region. In a statement Monday, YesWeHack said the deployment of 5G networks had further underscored the importance of cybersecurity in the telecoms industry, with such rollouts increasing potential attack surfaces and introducing new technologies and techniques into the threat landscape. 

    Blocking China can lead to fragmented 5G market

    With China-US trade relations still tense, efforts to cut out Chinese vendors such as Huawei from 5G implementations may create separate ecosystems and consumers could lose out on benefits from the wide adoption of global standards, as demonstrated with 4G.

    Read More

    “In addition, the ability of 5G to support massive Internet of Things (IoT) connectivity introduces many times more devices connected to the network, presenting a wide-reaching and increased attack surface,” it said. ZTE’s product portfolio spans handsets, mobile broadband, terminal chipset modules, and peripheral products. The bug bounty would enable the Shenzhen-based vendor build “a sound cybersecurity governance structure” and “security assurance mechanism” across the entire product lifecycle, YesWeHack said.  ZTE’s chief security officer Zhong Hong said in the statement: “Through openness and transparency, we try to give our customers confidence by letting them see what we do and how we provide end-to-end security. Our partnership with YesWeHack will help to enhance the security of ZTE’s products and confront new challenges brought by the 5G network commercialisation.”The ZTE bug bounty covers product categories such as the vendor’s 5G Common Core fixed networking systems, 5G NR (New Radio) equipment, smart home and video IoT systems, and Axon and Blade smartphone series. 

    ZTE has remained on the list of telecoms equipment barred from being purchased using the US Federal Communications Commission’s (FCC) Universal Service Fund, after the US government agency rejected the Chinese vendor’s request to be removed as a national security threat. The FCC last month set out its conditions for small carriers looking to be reimbursed for ripping out and replacing network equipment and services from ZTE and Huawei. Amongst the conditions it listed for access to the designated $1.9 billion in funds, the commission said eligible expenses included the cost of removing, replacing, and disposing ZTE and Huawei equipment and services obtained on or before June 30 last year.  The reimbursement scheme had been been in the works for two years, after the FCC officially labelled the two Chinese networking equipment vendor as national security threats in July 2020. GSMA has projected Asia-Pacific to be the world’s largest 5G region by 2025, hitting 675 million connections–or more than half of the global volume. The industry group, though, revised its 2020 projection of 5G connections to be 20% lower than its previous forecast, due to the global pandemic.  It said the region’s growth would be led by markets such as China, Japan, and South Korea, with mobile operators investing $331 billion building out their 5G networks. GSMA further estimated that 24 markets across Asia-Pacific would have launched 5G by 2025, including China where 28% of mobile connections would run on 5G networks and account for a third of the world’s 5G connections. RELATED COVERAGE More

  • in

    NEC scores deal to build Facebook transatlantic half-petabit cable

    Facebook Connectivity has handed a contract to NEC to build a subsea cable that will link the US to Europe. NEC boasted it would be the world’s first 24 fibre-pair subsea cable, and would be capable of carrying 500Tbps. It is the first transatlantic cable for Facebook, which said it was capable of delivering 200 times more capacity than the cables laid in the 2000s. Last year, the social media giant announced it was part of expanding the 2Africa cable system to include the Pearl branch that would add landing stations on the Indian Ocean and Persian Gulf at Oman, UAE, Qatar, Bahrain, Kuwait, Iraq, Pakistan, India, and Saudi Arabia. The extension makes the total length of 2Africa 45,000 kilometres, which Facebook says is the “longest subsea cable system ever deployed”, and would triple the cable capacity serving Africa. Facebook added it was looking at new ways to power subsea cables. “Consider, for instance, a transatlantic cable that runs between Europe and the United States at over 7,000 kilometres in length, and all those repeaters getting their electricity through the cable from shore. This makes the cable a very long power cord,” the company said.

    “To solve this challenge, engineers are working on buoys that can deliver power to the repeaters from the middle of the ocean. We’re exploring more sustainable ways to do this, harnessing a combination of wave energy converters and solar panels.”In March, Facebook was part of a group announcing the laying of two cables to connect Singapore, Indonesia, and North America. The first, named Echo and to be completed in 2023, will be built by Google and XL Axiata, while the second to be completed in 2024, dubbed Bifrost, would involve Telin and Keppel. Related Coverage More

  • in

    Singapore tweaks cybersecurity strategy with OT emphasis

    Singapore has tweaked its cybersecurity strategy to beef up its focus on operational technology (OT), offering a new competency framework to provide guidance on skillsets and technical competencies required for OT industry sectors. The revised national cybersecurity roadmap also looks to bolster the overall cybersecurity posture and foster international cyber cooperation. The 2021 cybersecurity strategy also would build on efforts to safeguard Singapore’s critical information infrastructure (CII) and other digital infrastructure, said Cyber Security Agency (CSA). The government organization said it would work with CII operators to beef up the cybersecurity of OT systems where cyber attacks could pose physical and economic risks.CSA defines OT systems to include industrial control, building management, and traffic light control systems that encompass monitoring or changing “the physical state of a system”, such as controlling railway systems. 

    “Many OT systems are historically designed to be standalone and not connected to the Internet or external networks. However, with the introduction of new digital solutions in OT systems to increase automation and facilitate data collection and analysis, this has introduced new cybersecurity risks to what used to be a relatively ‘safe’ air-gapped operating environment,” it said. To address such risks, enterprises needed a framework from which they could get guidance on processes, structures, and skills required to manage their OT cybersecurity. Called the OT Cybersecurity Competency Framework, it is touted to provide a “more granular breakdown” and reference of cybersecurity skills and technical competencies required for OT industry sectors. It aims to plug existing gaps in OT cybersecurity training, CSA said. Before, OT systems owners including those in CII sectors would take guidance from the Skills Framework for ICT, parked under SkillsFuture Singapore, to identify skills gaps and develop training plans.

    Jointly developed with Mercer Singapore, the new OT security framework offered roadmaps of various job roles and the corresponding technical skills and core competencies required. Both OT and IT systems owners could refer to reference guide to provide adequate training and plot employees’ career progression, while training providers could use it to identify technical competencies and certifications needed to support local training needs.In addition, the CSA Academy would host roadshows to help organisations on adopting the OT security framework based on their business requirements. The increased focus on OT cybersecurity was in line with Singapore’s updated cybersecurity strategy, which detailed efforts to assume a more proactive stance in addressing digital threats, drive the nation’s cybersecurity posture, and push international norms and standards on cybersecurity. Adjusted focus needed to address growing cyber threatsThese were essential amidst increased connectivity, digitalisation, and complexity in cyber threats, said Senior Minister and Coordinating Minister for National Security Teo Chee Hean, at the opening of the conference Tuesday night.Telecommuting, video calls, online shopping, and digital payment had become the “new normal”, as populations worldwide turned to online technologies to cope with physical restrictions around the global pandemic. These provided benefits and opportunities, and impact on businesses, jobs, and lives would be permanent, Teo said. He added that, each day, more companies and people were engaging in the digital space and such interactions were becoming more pervasive. New apps and services were launched every day, and technologies such as 5G, cloud, Internet of Things (IoT), artificial intelligence (AI), and data analytics were taking digitalisation to a new level. “But connecting more people, bringing in new services, and rolling them out fast, bring added risks. They open up a wider attack surface, and raise the likelihood, impact and cost of a breach,” Teo said. “Strategies to enhance security, on the other hand, are inherently aimed at stability, conservatism, and reducing risk. Instinctively, the two seem mutually exclusive. These are real dilemmas that all of us face.”

    Geopolitical tensions further compounded this growing landscape, threatening to bifurcate the technology world and increase digital risks, the minister said. Pointing to Operation HAECHI-I, a transnational joint operation targeting five types of cyber-enabled financial crimes, including voice phishing and money laundering, he said more than 1,600 bank accounts linked to these crimes were frozen, and $83 million intercepted. More than 585 individuals were arrested and at least 890 cases solved, he said, noting that the successful operation demonstrated what was possible if the global community worked together to make the cyber space safer and more secure. According to the Interpol, Operation HAECHI-I involved specialist law enforcement officers across nine Asian economies including Singapore, China, Indonesia, South Korea, and Thailand. Recent supply chain attacks including the SolarWinds and Kaseya breach also underscored the urgency for Singapore to invest in its capabilities and bolster the “trust, but verify” approach in its digital systems, said Teo. The need to continuously verify and validate all activity on the country’s networks would provide greater confidence to trust its digital technologies and devices, he said.These considerations drove Singapore’s updated cybersecurity strategy, which outlined its approach to safeguarding its wider cyberspace in an increasingly complex environment, the minister said. Amongst such requirements were the need to develop and roll out cybersecurity standards on a national level, to raise the minimum standard of cybersecurity in ICT products and services the country used.Teo said: “One key element of the revised strategy is going beyond protecting merely our critical information infrastructure, and working to secure our wider cyberspace given the increasingly widespread and interconnected use of digital technology in all domains,” he noted. “This needs to be underpinned by building organisational capability and talent development.”Singapore’s 2021 cybersecurity strategy further recognised the need to build consensus and deepen collaboration, in which it would look to advocate for a rules-based multilateral order in cyberspace and an interoperable ICT environment. Teo said: “Difficult as it may seem, we should work to reach consensus on rules, norms, principles, and standards. Given the borderless nature of the digital domain–some have likened it to a digital global commons–we need to aspire for global consensus. Singapore supports the creation of such a multilateral order in cyberspace. Countries need to work together to develop new governance principles, frameworks, and standards for the digital commons to preserve trust and confidence, and for it to work well, safely and securely for all of us.”Consensus-building is crucial to maintain an open, secure, and interoperable digital domain,” he added.Currently the chair of United Nations’ (UN) Open-Ended Working Group on Security, from 2021 to 2026, Singapore said it would contribute and drive discussions on international cyber norms as well as support global efforts to augment nations’ capacities to protect themselves against cyber threats. Here, CSA added, Singapore would call on the development and adoption of cybersecurity standards so a minimum level of cybersecurity was implemented in ICT products and services used by citizens and businesses. Earlier this week, Singapore inked an agreement with Finland to mutually recognise each country’s cybersecurity labels for IoT devices, and help consumers assess the level of security in such products. Touting it as the first of such bilateral recognition, Singapore said the partnership aims to reduce the need for duplicated testing. Asean also was the first regional group to subscribe, in principle, to the UN’s 11 voluntary, non-binding norms of responsible state behaviour in cyberspace, Teo noted. Asean member states currently were working to implement these norms and translate principles into tangible outcomes, he said, adding that cooperation at such regional level was an important building block and stepping stone towards global consensus. “Cyberspace transcends physical boundaries and many systems span different countries and jurisdictions,” he said. “Countries, therefore, need to collaborate closely to align our policy approaches to deal with and police cross-border cyber threats. We also need to collaborate at the operational level to respond to cyber threats rapidly and in a coordinated manner.”Singapore’s revised 2021 cybersecurity strategy comes five years after its first such plan was introduced in 2016. Moving forward, CSA said it would “explore expanding” regulations under the country’s Cybersecurity Act to include entities and systems beyond CIIs.RELATED COVERAGE More