AWS rolls out encryption options for Amazon RDS using MySQL, PostgreSQL and Oracle database instances

Amazon Web Services

Amazon Web Services took steps to make it easier for users to encrypt data at rest in Amazon Relational Database Service (RDS) database instances running MySQL, PostgreSQL and Oracle Database.

Earlier users to choose between RDS for Oracle Database which adopted AWS-managed keys for Oracle Enterprise Edition (EE) and RDS for SQL Server which used AWS-managed keys for SQL Server Enterprise Edition (EE).

Apart from these possibilities, AWS added RDS for MySQL which adopts customer-managed keys using AWS Key Management Service (KMS), RDS for PostgreSQL which uses customer-managed keys using AWS KMS, and RDS for Oracle Database which uses customer-managed keys for Oracle Enterprise Edition using AWS CloudHSM.

For all of the database engines and key management options, encryption (AES-256) and decryption are applied automatically and transparently to RDS storage and to database snapshots. Users need not make any changes to code or operating model in order to benefit from this important data protection feature.

Launched last year at AWS re:Invent, AWS KMS offers seamless, centralized control over encryption keys. It was designed to help implement key management at enterprise scale with facility to create and rotate keys, establish usage policies, and to perform audits on key usage.

AWS KMS is a managed service which helps create and control the encryption keys used to encrypt data, and adopts Hardware Security Modules (HSMs) to protect the security of keys. AWS Key Management Service is integrated with other AWS services including Amazon EBS, Amazon S3, Amazon RDS, Amazon Redshift, and Amazon Elastic Transcoder. AWS Key Management Service is also integrated with AWS CloudTrail to provide users with logs of all key usage to help meet regulatory and compliance needs.

Users can enable the feature and start to use customer-managed keys for RDS database instances running MySQL or PostgreSQL with a couple of clicks when creating a new database instance. Then, turn on enable encryption and choose the default (AWS-managed) key or create own using KMS and select it from the dropdown menu, and now start using customer-managed encryption for MySQL or PostgreSQL database instances.

CloudHSM is now integrated with Amazon RDS for Oracle Database. This allows users to maintain sole and exclusive control of the encryption keys in CloudHSM instances when encrypting RDS database instances using Oracle Transparent Data Encryption (TDE).

The AWS CloudHSM service helps meet corporate, contractual and regulatory compliance requirements for data security by using dedicated Hardware Security Module (HSM) appliances within the AWS cloud. With CloudHSM, users can control the encryption keys and cryptographic operations performed by the HSM. The AWS CloudHSM service protects encryption keys within HSMs designed and validated to government standards for secure key management. Users can generate, store and manage the cryptographic keys used for data encryption. AWS CloudHSM helps to comply with key management requirements without losing application performance.

Read more:
AWS rolls out encryption options for Amazon RDS using MySQL, PostgreSQL and Oracle database instances

WikiLeaks Tweets Hebdo Cartoons, Blames ‘Jewish Pro-Censorship Lobby’ for Legitimizing Attacks

In the wake of the tributes to Charlie Hebdo, WikiLeaks went off on leaders of the Western world for applying a double standard to the attacks.

WikiLeaks, whose founder, Julian Assange, has been holed up in the Ecuadorean embassy since 2012 to avoid extradition to Sweden, accused President Barack Obama and British Prime Minister David Cameron of only promoting free speech when it was politically expedient. The instrumentalization of Charlie Hebdo: Some defend freedom of speech all the time, they tweeted. Others only when they can use it to spy, drone, more.

They also accused the politically-correct lobby for legitimizing the attacks against Charlie Hebdo, which left 12 dead. The notion that offending religious groups is unlawful contributes to a climate where those without legal connections make their own police, they added.

The tweets began yesterday and continued into today:

That said, Wikileaks released a statement from Assange tweeting his support of Charlie Hebdo, honoring them in the way they probably wanted to be remembered:

And as they promised, they tweeted them out, with English captions to capture the full spectrum of offensiveness. Weve included some of them:

[WikiLeaks] [Image via Wikileaks]

>> Follow Tina Nguyen (@Tina_Nguyen) on Twitter

Excerpt from:
WikiLeaks Tweets Hebdo Cartoons, Blames ‘Jewish Pro-Censorship Lobby’ for Legitimizing Attacks

Snowden Claims U.S. Policy Is Creating A Black Market For Digital Weapons

Edward Snowden says in a new interview with NOVA Next that the U.S. governmentwronglypromotescyberoffense strategies at the expense of weakening the system and leaving it open to cyber attacks from the black market.

Were creating a class of Internet security researchers who research vulnerabilities, but then instead of disclosing them to the device manufacturers to get them fixed and to make us more secure, they sell them to secret agencies, Snowdensays. They sell them on the black market to criminal groups to be able to exploit these to attack targets. And that leaves us much less secure, not just on an individual level, but on a broad social level; on a broad economic level. And beyond that, it creates a new black market for computer weapons, basically digital weapons.

Snowden points out that the White Houses own independent review panels have shownthat not a single program has stoppedan imminent terrorist attack on the United States. He does not believe the public is aware of just how disastrous these policies could backfire and questions the value of such programs that leave our own information vulnerable.

Snowden alsopoints out that other countries such as Iran are ahead of us in realizing the problem:

But it is important to highlight that we really started this trend in many ways when we launched the Stuxnet campaign against the Iranian nuclear program. It actually kicked off a response, sort of retaliatory action from Iran, where they realized they had been caught unprepared. They were far behind the technological curve as compared to the United States and most other countries. And this is happening across the world nowadays, where they realize that theyre caught out. Theyre vulnerable. They have no capacity to retaliate to any sort of cyber campaign brought against them.

Wespend much more onresearch and development, compared to the rest of the world. Sowhen it comes to ourcyber security says Snowden, We have more to lose than any other nation on Earth.

Snowden said he didntwant to overhype the problem, Nobodys going to press a key on their keyboard and bring down the government. But he did emphasize that the threats from foreign governments were real and that we should be focusing more on the defense of our own information than focusing on others.

Snowden was interviewed forNOVA Next fromRussia, where he has lived since releasing documents showing the U.S. had been spying on citizens through several technology companies. He is wanted in the U.S. on criminal charges for theft and misuse of classified information. Snowdendismissed former CIA director Michael Haydens predictions that he would wind up a sad and miserable drunk in Russia. Snowden said he only drinks waterand that the country was actually great. Yeah, I know. Its crazy, he told interviewer James Bamford.

Click to read a full transcript of the interview here.

Read more here:
Snowden Claims U.S. Policy Is Creating A Black Market For Digital Weapons

Edward Snowden Should Talk About Cyberwar More Often

We're all sick of used to hearing Edward Snowden talk about NSA surveillance by now. We get it: The government's watching us, and there's basically nothing we can do about it. But PBS just published the transcript of an interview with Snowden that doesn't really talk about surveillance much at all. It's all about cyberwar, and it's fascinating.

In the midst of comprehending Snowden-as-celebrity-whistleblower, it's easy to forget that he's actually a very experienced cybersecurity expert. This young man spent years on the frontlines of America's silent but fierce battle to protect our internet infrastructure. But as Snowden points out in his interview with James Bamford from PBS's tech show NOVA Next, agencies like the NSA actually devote more resources towards launching cyberattacks. In other words, the folks that should be focused on defending our nation in an imminent cyberwar are too busy focusing on the offense.

Though the interview was filmed last June, PBS just released the unedited transcript and a brief video. The transcript is very long but full of goodies, if you're curious about how cybersecurity actually works at the national defense level. After the Sony hack, we all know that it's a glaringly important topic. But Snowden actually does a great job of breaking the nuances of cyberwar down into some easily digestible nuggets.

We don't get to hear Edward Snowden talk about aspects of cybersecurity beyond being a spyhe should do it more often. [PBS]

Originally posted here:
Edward Snowden Should Talk About Cyberwar More Often

Snowden: Don’t Hack Back

Its a safe bet the U.S. government isnt taking advice from Edward Snowden these days, but the infamous leaker offered the Obama administration a warning as it mulls a further response to North Koreas alleged hacking of Sony Pictures Entertainment: dont hack back.

In an interview with PBS Nova Next released Thursday, Snowden offered thoughts on cyberwar that are newly relevant after high-profile cyberattacks at J.P. Morgan Chase , Sony and elsewhere. James Bamford conducted the June 30 interview in Moscow; it features some of the same material as Bamfords August cover story in Wired.

When it comes to cyber warfare, we have more to lose than any other nation on earth, Snowden said, according to a transcript. The technical sector is the backbone of the American economy, and if we start engaging in these kind of behaviors, in these kind of attacks, were setting a standard, were creating a new international norm of behavior that says this is what nations do.

Many current and former U.S. security officials agree. If the Internet becomes a battlefield, they say, the U.S. is so well wired that it would be relatively easy to inflict damage. But theres less to attack in a country like North Korea.

The U.S. last week announced sanctions against North Korea as the first step of retaliation for the Sony hack. Several people involved in the deliberations are opposed to launching a digital counterstrike against Pyongyang.

In the PBS interview, Snowden alluded to a previously reported anecdote that the National Security Agency accidentally knocked Syria offline in 2012 when it hacked into its Internet gear for spying purposes.

A former U.S. official familiar wouldnt discuss Syria specifically but said, Hypothetically, when youre doing those kinds of things, something like that is not beyond the realm of the possible.

______________________________________________________

For the latest news and analysis,

Get breaking news and personal-tech reviews delivered right to your inbox.

See the original post:
Snowden: Don’t Hack Back

Edward Snowden discusses cyber terrorism for first time for PBS documentary

As part of an upcoming PBS documentary about cyber war, former NSA contractor Edward Snowden gave an interview about cyber terrorism for the first time, PBS announced Thursday.

In the interview, filmed in June 2014 in a Moscow hotel, Snowden sheds light on the surprising frequency with which cyber attacks occur, their potential for destruction, and what, exactly, he believes is at stake as governments and rogue elements rush to exploit weaknesses found on the internet, one of the most complex systems ever built by humans, PBS said in a statement.

PBS released a four-minute video excerpt of the interview, seen below, as well as a 25-page transcript of the interview.

"When it comes to cyber warfare, we have more to lose than any other nation on Earth," Snowden said in the interview, referencing the United States. Ithink the public still isnt aware of the frequency with which these cyber-attacks, as theyre being called in the press, are being used by governments around the world, not just the U.S.

The upcoming documentary that includes Snowdens comments is the result of an investigation by PBS digital science series NOVA and author and journalist James Bamford, who gained unrestricted access to the entire archive Edward Snowden took from the NSA, including hundreds of thousands of documents not yet released, said PBS.

See the original post:
Edward Snowden discusses cyber terrorism for first time for PBS documentary

Edward Snowden doc “Citizenfour” dominates Cinema Eye Honors

January 8, 2015 - 12:20 AMT

PanARMENIAN.Net - Edward Snowden documentary Citizenfour dominated Wednesday, Jan 7 night's 8th annual Cinema Eye Honors, devoted to recognizing the best in nonfiction film, The Hollywood Reporter said.

The Laura Poitras-directed film about the NSA leaker, which is a frontrunner for a best documentary Oscar nomination, took home four awards, including best nonfiction feature and best direction, making Poitras the first person in Cinema Eye history to win the award for best direction twice, taking home the prize in 2011 for The Oath. In total, Poitras took home three awards, tying the record set by Lixin Fan in 2011 for Last Train Home. Citizenfour also won the outstanding achievement in editing and production prizes, becoming the second film in Cinema Eye history to capture that many awards in one year and win the best nonfiction feature and direction prizes. Going into the show, the documentary was up for six awards.

Fellow Oscar documentary frontrunner Keep On Keepin' On won the audience choice prize, determined by votes on the Cinema Eye website.

There were two ties at this year's awards, a Cinema Eye first. Syd Garon of Jodorowskys Dune and Heather Brantman and Tim Fisher of Particle Fever shared the award for outstanding achievement in graphic design or animation. 20,000 Days on Earth's Erik Wilson and Virunga's Franklin Dow and Orlando von Einsiedel shared the best cinematography prizes.

Oscar-nominated director Sam Green hosted this year's event, at the Museum of the Moving Image in Queens, and Serial podcast host Sarah Koenig served as the announcer for the awards show.

Cinema Eye was founded in 2007 to recognize excellence in artistry and craft in nonfiction filmmaking and remains the only international nonfiction award to recognize a film's entire creative team. The film nominees are determined by top documentary programmers from festivals all over the world. The television award nominees were selected by a nominations committee of film critics and writers.

Originally posted here:
Edward Snowden doc “Citizenfour” dominates Cinema Eye Honors

Snowden: US has put too much emphasis on cyber-offense, needs defense

Edward Snowden, in his interview with James Bamford for PBS' NOVA.

NOVA/ PBS

In an on-camera interview with James Bamford for an upcoming episode of PBS' NOVA, Edward Snowden warned that the US Department of Defense and National Security Agency have over-emphasized the development of offensive network capabilities, placing the US' own systems at greater risk. With other countries now developing offensive capabilities that approach those of the NSA and the US Cyber Command, Snowden believes the US has much more at stake.

The raw transcript of the NOVAinterview showed Snowden in full control, to the point of giving direction on questions and even suggesting how to organize the report and its visual elements. Snowden frequently steered questions away from areas that might have revealed more about NSA operations, or he went into areas such as White House policy that he considered "land mines." But the whistleblowereloquently discussed the hazards of cyber warfare and the precariousness of the approach that the NSA and Cyber Command had taken in terms of seeking to find and exploit holes in the software of adversaries. In fact, he says the same vulnerabilities are in systems in the US. "The same router thats deployed in the United States is deployed in China," Snowden explained. "The same software package that controls the dam floodgates in the United States is the same as in Russia. The same hospital software is there in Syria and the United States."

Video from the NOVA interview.

Some of the interview, which took place last June in Russia, possibly foreshadowed the cyber attack on Sony Pictures. Snowden said that the capabilities for cyber attacks such as the "Shamoon" malware attack in 2012 and other "wiper" attacks similar to what happened toSony Pictures were "sort of a Fisher Price, babys first hack kind of a cyber campaign," capable of disruption but not really of creating long-term damage. But he said more sophisticated organizations, including nation-state actors, are "increasingly pursuing the capability to launch destructive cyber attacks as opposed to the disruptive kinds that you normally see online...and this is a pivot that is going to be very difficult for us to navigate."

"I dont want to hype the threat," Snowden told Bamford. "Nobodys going to press a key on their keyboard and bring down the government. Nobodys going to press a key on their keyboard and wipe a nation off the face of the earth." But Snowden emphasized that the US should be focusing more on defending against adversaries than trying to penetrate their networks to collect information and do damage.

"When you look at the problem of the US prioritizing offense over defense, imagine you have two bank vaults, the United States bank vault and the Bank of China," Snowden explained. "The US bank vault is completely full. It goes all the way up to the sky. And the Chinese bank vault or the Russian bank vault or the African bank vault or whoever the adversary of the day is, theirs is only half full or a quarter full or a tenth full." But because the US has focused on being able to break into other networks, he said, it has made its own technology vulnerableand other countries can use the same vulnerabilities to attack the US' networks.

"Were opening ourselves up to attack," Snowden said. "Were lowering our shields to allow us to have an advantage when we attack other countries overseas, but the reality is when you compare one of our victories to one of their victories, the value of the data, the knowledge, the information gained from those attacks is far greater to them than it is to us because we are already on top. Its much easier to drag us down than it is to grab some incremental knowledge from them and build ourselves up."

The most valuable piece of infrastructure for the US that is at risk, Snowden said, is the Internet itself. "We use the Internet for every communication that businesses rely on every day," he explained. "If an adversary didn't target our power plants but they did target the core routers, entire parts of the United States could be cut off... and we would go dark in terms of our economy and our business for minutes, hours, days. That would have a tremendous impact on us as a society and it would have a policy backlash."

See original here:
Snowden: US has put too much emphasis on cyber-offense, needs defense