Page 1,345«..1020..1,3441,3451,3461,347..1,3501,360..»

Hybrid Networking Environments: Optimising IT Infrastructures in 2023 – TechNative

Historically, every household had its own water well.

Today, public utilities provide clean water to everyone by turning on a tap. Cloud computing functions in a similar way. Like water from a faucet, hybrid networking environments may be quickly turned on and off. As with the water company, a dedicated workforce guarantees that the Cloud service provided is safe, secure, and always available.

A hybrid network is a type of Cloud computing that integrates on-premise technology with a public Cloud. Data and applications can travel between the two environments owing to hybrid Clouds. Many products of the company employ a hybrid Cloud strategy to solve business imperatives such as meeting regulatory and data sovereignty requirements, maximising on-premise technology investment, or addressing low latency challenges.

Cloud Computing is Empowering

The Cloud provides data access from anywhere, at any time, and on any compatible device. This mobility speeds up procedures, enhances communication, and empowers remote employees. Moving to the Cloud can save money, while freeing IT personnel from day-to-day responsibilities, allowing them to focus on enhancing operations and growing the business. 92% of organisations have a multi-Cloud strategy in place or are in the process of developing one, and 82% of large enterprises have implemented a hybrid Cloud infrastructure.

With the rapid shift to remote work during the pandemic, many organisations that had not previously used Cloud deployments quickly realised the value and importance of doing so. This demand has continued to increase. According to a recent study, 16% of all employees work remotely, with 62% preferring a hybrid work environment. Many employees today have the flexibility to work when, how, and where they want for a variety of tasks. This could include some days of in-office collaboration, deep focus work at home on others, and working from a coffee shop while travelling. Employers face challenges in adapting to and meeting these needs, but reap the benefits of employee satisfaction, productivity, and retention in the long run.

Hybrid networking is an excellent storage and scalability solution because it enables businesses to scale their storage up or down based on ongoing demand. Multi-Cloud providers should ideally collaborate seamlessly so that organisations can invest in any level of space, security, and protection based on the needs of each data segment. Administrators can align their business requirements with the best Cloud-hosting providers for each task by incorporating multiple Clouds into a companys IT strategy. Organisations can choose a provider based on its fast upload speed, while another provider can guarantee better service level agreement terms. Users can achieve a high level of agility by having multiple options and matching each part of their business to a specific providers setup and execution terms.

Securing the Cloud

Cloud adoption and an increase in remote work have extended the enterprise perimeter, increasing the attack surface, and the continued shift to a hybrid Cloud will increase this attack surface even further. According to a recent survey, 80% of companies have experienced at least one Cloud security incident in the last year, and 27% of organisations have experienced a public Cloud security incident. However, Cloud storage can be built from the ground up to ensure maximum data security. As Cloud providers are responsible for the security of their infrastructures, they can ensure that an organisation has all of the capabilities required for data protection. A business networks security must be evaluated regularly as its infrastructure and software evolve.

Another significant benefit of implementing a multi-Cloud strategy is risk management. If one vendors infrastructure fails or is attacked, a multi-Cloud user can quickly switch to a different service provider or backup to a private Cloud. Risk can be reduced by using redundant, independent systems that provide robust authentication mechanisms, vulnerability testing, and API asset consolidation.A multi-Cloud solutioncan help protect a companys critical data by providing backup and recovery capabilities that ensure business continuity in the event of an emergency, whether caused by a failed driveor a natural disaster.

The Future is Hybrid

A hybrid Cloud network is a software-centric architecture that tightly integrates computing, storage, and virtualisation resources in a single system. Modern businesses rely on data centres to provide the computing, storage, networking, and management resources required to host critical enterprise workloads and data. However, data centres are notoriously complex places where many vendors compete to deliver a plethora of devices, systems, and software.

Challenges to consider include compatibility issues in synchronisation, security challenges relating to data handling, access management protocols and the evident skills gap in bringing all of this together. Fortunately, there are strategies and tools to help resolve the complications of hybrid management and create a streamlined approach across environments. Cloud migration is well underway for many organisations, driven by a variety of business factors and accelerated in many cases by the pandemic.

About the Author

Alan Hayward is Sales and Marketing Manager at SEH Technology. SEH is a manufacturer of high quality network solutions. With over 30 years of experience in printing and networks we possess broad and profound solution skills in areas for all types of business environments. We develop and manufacture all products at our headquarters in Germany. Worldwide distribution is via our US and UK subsidiaries and an extensive network of partners, distributors, and resellers.

Featured image: ako-photography

View post:
Hybrid Networking Environments: Optimising IT Infrastructures in 2023 - TechNative

Read More..

Fylm.ai 1.6 adds custom LUTs and more – RedShark News

Fylm.ai is a cloud-based, AI-powered color grading solution which debuted in 2021 after a successful beta launch. Version 1.6 just released, bringing the ability to import custom LUTs, new LUT packs from Lutify.me, and more.

We first spoke about Fylm.ai when it officially launched in late 2021 after a successful beta. Using AI, color grading is done intelligently within a web browser. Its also ACES color managed, GPU-accelerated, and compatible with non-ACES workflows.

Footage is uploaded to the cloud, so anyone on the post-production team has access. There are plenty of features and controls to get the look youll want, but AI also helps make it easy for those who want a fast, but professional look via Magic Mode.

Artificial intelligence is all the rage right now, and filmmakers, video producers, and other content creators can take advantage of tools like Fylm.ai to help streamline their pre-production, production, or post-production workflows.

Version 1.6 of Fylm. ai brings a host of new features, including:

Any content creator can use Fylm.ai to color grade their projects, no matter the size. But its especially useful for those working with a team that needs access to the project, including the director, cinematographer, editor, VFX artist and more. And if the team is spread out worldwide, as long as they have high speed internet, collaboration is easy.

With tools like Magic Mode, getting the look you want is easy and fast. Theres no need for an advanced degree to professionally grade a project.

There are four levels of pricing for Fylm.ai:

Learn more at Fylm.ai, and check out the company's cloud-based RAW photo editor while youre there.

See the article here:
Fylm.ai 1.6 adds custom LUTs and more - RedShark News

Read More..

I’ve reviewed external storage for a decade; this is the best portable … – TechRadar

Amazon sells the Seagate One Touch 1TB external SSD (opens in new tab) for $89.99, a saving of 47% from its original selling price of $169.99. While this is not the cheapest 1TB on the market, I think it is one of the best portable SSD (if not the best) for freelancers, especially creative ones, and for a number of reasons.

Thanks to its USB 3.2 Gen 2 connector, it is one of the fastest external solid state drives in its category (under $100), matching the likes of the Samsung T7 or the Crucial X8 with an up-to-read speed of 1.05GBps. Such a fast speed means that you can move files around easily and you can even work directly from the drive if you have compatible portable apps.

A 2TB version is available if you need something bigger for just $149.99 (you will need to select Other Sellers on Amazon to get this price). A smaller 500GB version is also available but at $69.99, its not recommended.

This drive is also ridiculously small and portable (a mere 70 x 50 x 10mm and weighing 43g) which means that you can easily carry it around to keep all your movies, photos, and more in one place. You get both USB Type-C and Type-A cables for out-of-the-box compatibility with Windows, Mac, and Android - wed just wish that they were a tad longer.

Where it pips the competition is when it comes to whats included in the package; other than the standard 3-year warranty, Seagate throws in free data recovery services as well, a life saver if your SSD has been damaged and you cant access, say, your clients files. Now terms and conditions will apply and theres a 10% chance of failure but its good to know that it exists as a safety net.

Also included is a 1-year subscription to Mylio Photos which is an unlimited cloud storage service thats focused on photos (you cant upload any other files). Mylio Photos - by itself - costs $99.99, which is $10 more than the price of the drive itself.

But theres even more; Seagate threw in a four-month subscription to Adobes uber-popular Creative Cloud Photography Plan, which is worth $39.96 by itself. We havent tried but you should be able to redeem it even if you already have an existing account.

Last but certainly not least, Seagate DiscWizard, one of the best free backup software designed exclusively for Seagate hardware, and the Seagate SSD Touch app, which lets you manage files stored on compatible Seagate devices using your Android mobile device.

Users can also redeem a free 90-day subscription to Amazon Music unlimited, worth more than $30, for new Non-Prime members. Check out our review of the Seagate One Touch 1TB external SSD where the device received a superb 4.5 stars out of five.

Link:
I've reviewed external storage for a decade; this is the best portable ... - TechRadar

Read More..

ChatPDF: The Ultimate AI PDF Reader That Answers Your Questions – Dignited

Are you tired of spending hours reading through long PDF documents, trying to find the information you need? Say hello to ChatPDF the AI PDF reader that answers your questions. ChatPDF uses artificial intelligence to understand the context of your questions and provide accurate answers from any PDF file.

ChatPDF is a revolutionary tool that enhances the way you read and understand PDF documents. It can comprehend textbooks, handouts, research papers, and academic articles effortlessly. ChatPDF allows you to unlock a wealth of knowledge, from historical documents to poetry and literature, and expand your horizons by providing you with accurate answers to your questions.

Related: Top 15 New AI Cool Tools to Try Besides ChatGPT: Part 1

Using ChatPDF is simple and straightforward. Heres how to get started:

Your files are stored on secure cloud storage, and ChatPDF will never share your files with anyone. You can delete your files at any time.

Related: What is Auto-GPT AI: Getting Started and How it Differs from ChatGPT

ChatPDF offers a free plan that allows you to use the tool for free with three PDFs every day, each up to 120 pages. For more, you can upgrade to the Plus plan for $5 per month. The Plus plan allows you to use ChatPDF for an unlimited number of PDFs, each up to 1,000 pages.

ChatPDF is available online, and you dont need to sign up to use it. It works on any device with an internet connection and can read PDFs in any language.

Related: How to Send PDFs, EPUB and More Files to Kindle

If youre a developer and want to integrate ChatPDF into your website or mobile app, you can use the ChatPDF API. To get started, fill out the API registration form on the ChatPDF website, and the team will get back to you shortly.

Its worth mentioning that although ChatPDF is a promising tool, it is still in its early stages of development. I tested its ability to provide a summary of a page and was shocked with the result. However, Im unsure whether it sources information from the internet or reads the entire PDF itself.

I attempted to rename a PDF to see if ChatPDF relies on the file name to generate its answers, similar to how ChatGPT uses URLs to provide information as if it is reading the internet. However, I was pleasantly surprised to find that ChatPDF actually reads the entire PDF, as it was able to provide an overview of the contents of the renamed file.

Why is it that ChatPDF is unable to detect the number of pages available when it is capable of reading the content of a PDF file? Nonetheless, a comprehensive review will be available soon, so stay subscribed to receive updates.

With its artificial intelligence capabilities, you can comprehend textbooks, handouts, research papers, and academic articles effortlessly. ChatPDF is a promising AI tool, you can unlock a wealth of knowledge and expand your horizons by providing you with answers to your questions.

Excerpt from:
ChatPDF: The Ultimate AI PDF Reader That Answers Your Questions - Dignited

Read More..

5 ways to reduce digital carbon footprint – NewsBytes

5 ways to reduce digital carbon footprint

May 08, 2023, 01:55 pm 2 min read

Did you know that using digital devices has an environmental impact? Every online activity has an environmental impact. The CO2 emissions from the manufacturing, use, and data transfer of digital devices are known as "digital carbon footprint." Due to our extensive digital presence, leaving a digital footprint has always been disregarded or ignored. Here's how minimizing your digital footprint can help you embrace sustainability.

Every email or attachment sent, received, or stored requires an amount of computing power. It is thus advised to reduce the number of emails you store in your inbox. Remember to unsubscribe to unnecessary newsletters and to report your spam emails so that they don't come back. Similarly, keep your inbox compact by deleting the emails you don't need to retain, including calendar invites.

Turn off devices when not in use

Make sure to switch off your electronics if you are planning to leave your device idle for a long time. Devices like laptops use up energy even when they are in sleep mode. Besides, makes sure you don't leave your devices plugged in for longer than needed. Avoid charging smartphones and laptops overnight. It will degrade your battery and also consume energy unnecessarily.

Every query you type into a search engine consumes energy. Hence try to be as precise as possible when you are searching for something and avoid multiple rounds of searching. Additionally, make sure to bookmark websites you frequently visit. This will reduce the energy used up while searching and entering that particular website every time. Also remember to close inactive browser tabs.

Use cloud storage efficiently

For security purposes, each file you save to the cloud is saved many times. Hence upload and keep only what you believe is truly important. Remove identical photos and any unnecessary shared files with you from your cloud storage. Another viable option is to have such items saved on pen drives or hard drives instead of the cloud.

Video streaming is a major source of energy use and data expansion. Reduce your energy use by not streaming videos that you aren't watching. While it is not practical to avoid streaming completely, one effective way you can manage this is by disabling the 'autoplay' option. Additionally, rather than streaming your audio or music online, try to download them when you can.

Link:
5 ways to reduce digital carbon footprint - NewsBytes

Read More..

Eufy S330 eufyCam Review: All the smarts, none of the fees – TrustedReviews

Verdict

Excellent 4K video quality, offline recording, facial recognition and even the option for AI detection with people, animals and vehicles the Eufy S330 eufyCam has it all. The base station does need to be upgraded from 16GB to make it more useful, and the system isnt cheap. However, if you want quality recording and smart features with no ongoing cost, this is the outdoor security camera system to buy, particularly as the integrated solar panels mean you dont have to worry about charging.

It used to be the case that there was a clear choice between security cameras: you could have subscription-free recording, but with less advanced options; or you could have all the motion detection features you could want but pay for cloud storage.

With the Eufy S330 eufyCam this isnt the case: you get high-end features, including 4K recording and facial recognition, complete with offline, subscription-free recording.

With solar panels to keep the batteries topped up, this is a great system for those that dont want to pay a monthly fee.

Rather than connecting directly to your home network, the Eufy S330 eufyCam cameras connect to the provided HomeBase 3. This small box plugs into your home network via its Ethernet port and then provides a wireless connection to the cameras.

Ive reviewed the package that includes two cameras, but three- and four- camera kits are available, as are add-on cameras if you want to expand. Theres a maximum limit of 16 cameras, although Eufy recommends that no more than 10 are connected for performance reasons.

Theres 16GB of onboard storage built in for recording video. Given that the cameras all have a 4K resolution, this is likely to get eaten up quickly. Fortunately, you can insert a 2.5-inch hard disk or SSD, up to a maximum of 16TB, to increase storage capacity. Its worth doing: a one-off outlay will get you all of the storage that youre likely to need with no ongoing fees.

All of the cameras are the same. They can be charged via USB. Its worth doing this when theyre new to make sure that the battery is full. After that, their integrated solar panels, which sit on top, will keep them charged. Thats similar to the way that the Eufy SoloCam S40 works.

Of course, using the cameras with solar power means that they need to be in direct sunlight. Eufy says that two hours of sunlight a day will keep them topped up. It does mean thinking a bit more about installation.

My garden office is south facing, so works well; the kitchen wall is north facing and never gets direct sunlight, so wouldnt work at all. Once youve found the right position, the cameras connect to the screw-in mount, and can be easily positioned.

The Eufy S330 eufyCam is controlled by the Eufy Security app, which is used for all of Eufys security products, such as the Eufy Video Doorbell 2K. Here, the cameras each get their own thumbnail image, which you can tap to go into the live view to see whats happening in real time. Theres then the option to use two-way chat to talk to anyone that you can see on the camera.

As with all security cameras, these are best when configured to record clips when motion is detected. There are motion-sensitivity settings, and the choice to turn on activity zones. These two choices alone can help reduce the number of alerts that the app can set.

However, the Eufy S330 eufyCam is more advanced than this, with onboard AI. Theres the option to detect people, vehicles and pets (effectively, animals), which is the same level of protection that the Arlo Pro 5 offers via a cloud subscription.

In fact, the Eufy S330 eufyCam goes one step further, as it also offers facial recognition. You can use a photo to train the camera to spot familiar people, and then review the footage to help the system learn, removing incidents of false identification.

Ive not seen a camera with facial recognition since the Nest Cam (outdoor or indoor, battery), although that model does require a subscription to Nest Aware to turn on the feature. Getting it for free here is quite incredible.

Does it work? Yes, pretty well. I found that the system was better during the day, always spotting me as I moved towards my office; at night in dark light, the camera didnt always know that it was me but thats to be expected.

Footage is recorded to the HomeBase 3, and clips can be viewed via the app. The interface is quite simple: just a list of thumbnails, organised by date, with filters to jump to a specific date, by camera and even by person detected. Any clip can be viewed or quickly downloaded to your phones album for permanent storage.

The cameras can be managed by security mode, which is chosen using the app. For example, you may want to turn off internal cameras when in Home mode, and have everything on in Away mode. Its good to have manual options, but opt for Ring cameras, and they can operate in synchronisation with your Ring Alarms mode.

Theres no support for Apple HomeKit, but Amazon Alexa and Google Assistant support are built in, letting me stream a cameras footage to a compatible smart screen.

The cameras all have a 135 field of view, which is a touch narrow for an outdoor camera. The Arlo Pro 5, in comparison, has a 160 field of view, which captured a lot more of my garden when both cameras were installed in the same place.

When positioning a Eufy S330 eufyCam its worth checking the feed before you permanently install to make sure that its capturing what you want it to.

These cameras record in 4K (3840 x 2160) making them one of the highest-resolution cameras that I have reviewed. The Arlo Ultra 2 is capable of this resolution, but it also requires a more expensive subscription plan; here, 4K is included for free, recorded locally to the HomeBase 3.

Video quality is largely excellent. During the day, the camera can shoot very sharp video, with plenty of detail. Given that the camera was pointing into the sun, it did a brilliant job of dealing with the issue, creating a well-exposed shot. It was easy to find a freeze-frame that caught someone in full detail.

At night, the camera has a spotlight and can shoot in full colour. Image quality is sharp with plenty of detail through the frame.

With less light, there is more motion blur. As I walked towards the camera, it was hard to find a frame where my face was in full detail and not slightly blurred. To be fair, the footage looks better in motion than when paused like this, and the quality is still very good.

I found that the Arlo Pro 5 was slightly better at night footage thanks to its powerful sensor; likewise, the Annke NC800s low-light lens helped it shoot better footage, although that camera is a lot more fiddly to set up.

Thanks to the integrated solar panels, I didnt have to charge my cameras at all, and they never dropped down to low battery levels. Whether or not thats true for you will depend on how much sunlight your cameras get and how many events are triggered; for the best battery life, the Eufy S330 eufyCam camera should be angled to only trigger when something important happens on your land.

You want high quality video and no monthly fees: These cameras can shoot at 4K and record to local storage, so have no ongoing costs.

You only need a single camera: If you dont need the full pack, cheaper options for a single camera are available.

Available as a two-pack for starters, the Eufy S330 eufyCam isnt cheap up-front, but its not overly expensive compared to the competition. Its clear advantage is that theres no ongoing costs and you can record high-quality 4K footage direct to the HomeBase.

If you dont want to compromise on features and performance, and dont want monthly fees, this is a great choice. If you dont mind paying monthly, the Arlo Pro 5 is hard to beat, and you can see other alternatives in my guide to the best outdoor security cameras.

Unlike other sites, we test every security camera we review thoroughly over an extended period of time. We use industry standard tests to compare features properly. Well always tell you what we find. We never, ever, accept money to review a product.

Find out more about how we test in our ethics policy.

Used as our main security camera for the review period

We test compatibility with the main smart systems (HomeKit, Alexa, Google Assistant, SmartThings, IFTTT and more) to see how easy each camera is to automate.

We take samples during the day and night to see how clear each cameras video is.

Two hours per day should be enough to keep the battery topped up, depending on how many events are triggered.

It has 16GB on the HomeBase 3, but you can install a hard disk up to 16TB in size.

UK RRP

Manufacturer

Size (Dimensions)

Weight

Release Date

First Reviewed Date

Model Number

Resolution

Voice Assistant

Battery Length

Smart assistants

App Control

Camera Type

Mounting option

View Field

Recording option

Two-way audio

Night vision

Light

Motion detection

Activity zones

Object detection

Power source

Eufy S330 eufyCam

493.99

Eufy

54 x 91 x 66 MM

285 G

2023

28/04/2023

Eufy S330 eufyCam

3840 x 2160

Amazon Alexa, Google Assistant

6 months

Yes

Yes

Outdoor wireless

Wall

135 degrees

Local

Yes

Full colour

Spotlight

Yes

Yes

Facial recognition, people, animals, vehicles

Battery (solar panel)

More here:
Eufy S330 eufyCam Review: All the smarts, none of the fees - TrustedReviews

Read More..

The WhatsApp of secure computation – Help Net Security

A key term when discussing encryption these days is end-to-end (E2E) encryption. The idea with E2E encryption is that data is kept confidential between the encryptor and the intended receiver. This might seem an obvious requirement, but not all so-called secure systems offer this level of protection.

Take for example SMS messages on your phone. The communication between your mobile phone and the local radio mast is indeed encrypted, but from that point onuntil the message reaches the radio mast close to the receivers mobile phonethe SMS message is sent in the clear. The mobile phone company could, in theory, read your messages.

A similar issue occurs in email: you can connect to Gmail or Outlook, or iCloud using a secure connection, but usually the email is stored in the clear on the Google, Microsoft, or Apple server. Again, this means that these email service providers could read your sent and received emails.

In some sense, SMS and email are legacy, old fashioned systems. Today, more and more people are communicating via instant messaging systems such as WhatsApp and Signal. These systems provide excellent security, particularly E2E encryption. It is mathematically impossible for the service provider to read any of your messages, even though you rely on the service provider to relay them.

This deals with the issue of securing data during transit, or transmission. But what about data at rest?

Here, we must consider how to store data encrypted on a hard disk or how it should be handled when it is written to a database. For such systems, E2E encryption means that only the person who stores the data should be able to read the data. In effect, its design requires that stolen data cannot be read or manipulated. E2E encryption of data at rest is provided by the operating system or hard disk itself and combined with a suitable method for key management.

Having dealt with E2E encryption of data during transit and at rest, we now turn to the more esoteric case of E2E encryption of data during computation.

It may seem strange that you can perform computations on encrypted data in the first place. But advances over the last 10 years have resulted in systems that can indeed compute on encrypted data, i.e. without needing to see the data. These advances are made possible by Fully Homomorphic Encryption (FHE).

In FHE, the first party enters data into the system by encrypting it. Then, a second party can perform arbitrary computation on the data without seeing it. Finally, a third partyor even the first partycan decrypt the output of the computation. In this context, the second party (the party doing the computation) has no access to the underlying data. This is analogous to the situation for data in transit, in that the party relaying the data should have no access to its contents.

FHE is designed so that the second computing party learns nothing about the underlying data, so we can say that FHE provides E2E encryption for data during computation, just as WhatsApp provides E2E encryption for data during transit.

Organizations and individuals now consider it a fundamental aspect of messaging security that no-one can read ones private messages; especially the service provider who is providing the messaging application. Organizations and individuals no longer trust Big Tech with their private messages.

Yet when companies, both big and not-so-bit tech, process private data we currently think it perfectly acceptable that they can do so and see the data as they process it. As trust in such companys access to private data goes down, and yet the potential use-cases and benefits from technology such as artificial intelligence, blockchain, and personalized medicine increase, we need to find a way of unlocking the value in data without needing to make the data public. FHE provides such a mechanism.

We shouldnt have to worry about privacy anymore: this should be a feature already built in by default into all applications.

Continued here:
The WhatsApp of secure computation - Help Net Security

Read More..

What is Encryption? – The Tech Edvocate

In todays digital age, where information is transmitted across networks and stored on servers, encryption has become a fundamental technique to ensure the confidentiality, integrity, and authenticity of data. Encryption is the process of converting plaintext, i.e., a piece of data that is readable and understandable, into ciphertext, i.e., a piece of data that is unreadable and incomprehensible, using a cryptographic algorithm.

An encryption system uses two essential components a key and an algorithm. The key is a piece of information that the encryption algorithm uses to transform the plaintext into ciphertext, and without the key, it is virtually impossible to decrypt the ciphertext back into plaintext. The algorithm, on the other hand, takes in the plaintext and the key as input and transforms the plaintext into ciphertext, which can only be decrypted back into plaintext using the same key and algorithm.

Encryption is used in various applications, such as online banking, e-commerce, email, and secure messaging applications. In online banking, the users account information is encrypted before being transmitted over the internet to prevent unauthorized access by hackers. Similarly, e-commerce websites encrypt the credit card information of their customers to protect it from cybercriminals who attempt to steal sensitive data.

Encryption also plays a significant role in securing communication channels. For example, email services such as Gmail and Outlook use encryption to protect the messages sent and received over their platforms. Secure messaging platforms such as WhatsApp, Telegram, and Signal use end-to-end encryption, which means that the messages are encrypted on the users device and can only be decrypted on the recipients device, ensuring complete privacy and security.

In addition to securing data, encryption is also used for digital signatures and certificates. Digital signatures verify the authenticity of a digital document or message and ensure that it has not been tampered with. Digital certificates, on the other hand, are used to authenticate the identity of users or devices and are issued by trusted certificate authorities.

In conclusion, encryption is an essential technique to ensure the security and privacy of digital data. In the era of increasing cyber-attacks and data breaches, encryption plays a vital role in protecting sensitive information and maintaining trust in digital communication and transactions. While there are debates about the use of encryption by governments and law enforcement agencies, it is undeniable that encryption is essential in maintaining the security and privacy of digital data.

The rest is here:
What is Encryption? - The Tech Edvocate

Read More..

Data at Rest Why Data Encryption, Data Security and Beneficial to … – CXOToday.com

Data at restmay be a known term to technology enthusiasts, but not for many others. So what does data at rest mean? It refers to data that is not actively being transferred, processed, or accessed by users or applications. This data is typically stored in databases, file systems, or other storage devices, such as hard drives, flash drives, or tape backup systems. Data at rest can include a variety of types of data, including personal information, financial data, intellectual property, and other sensitive or confidential information.

This data may be encrypted or protected by other security measures to prevent unauthorized access or theft. Ensuring the security of data at rest is an important aspect of information security, as it can be vulnerable to theft, hacking, or other unauthorized access if not properly protected. Organizations may use a range of security measures to protect data at rest, including access controls, encryption, and physical security measures such as locked data centers or storage rooms.

How is it beneficial to the IT teams?

Data at rest plays a critical role in IT as it allows organizations to protect, manage, and leverage their data assets effectively. In IT, data at rest is used for various purposes, including:

Data at rest needs security to protect sensitive information, comply with regulations, maintain reputation and protect intellectual property. Data encryption is an effective way to protect data at rest and helps to ensure that sensitive information remains confidential and secure. It helps protect data at rest by converting it into an unreadable form, making it difficult for unauthorized parties to access and read the data even if they gain physical access to the storage device where the data is stored. Here are some ways data encryption helps the data at rest:

But why is security necessary for data at rest considering it is actively being transferred, processed, or accessed by users or applications?

(The author is Prashanth GJ, CEO, TechnoBind Solutions, and the views expressed in this article are his own)

Read the original post:
Data at Rest Why Data Encryption, Data Security and Beneficial to ... - CXOToday.com

Read More..

Tor Project, LGBTQ groups and CDT sound alarm over efforts to … – SC Media

A group of more than 40 media and digital rights organizations are calling on Five Eyes nations and democratic governments around the world to reject efforts to weaken encryption and support a global vision of a free and open internet.

In recent years, governments around the world have been making (another) major push to pass laws that would force companies to give law enforcement access to encrypted communications built into their products, something encryption advocates say would amount to a dangerous backdoor.

In an open letter published Tuesday and sent to policymakers in the U.S., the European Union, Canada, the UK and India, dozens of organizations expressed alarm over a series of new laws that have either passed or are being considered by democratic countries, saying many would weaken privacy protections for activists, dissidents, journalists and citizens around the world who must operate in secrecy to stay safe.

Encrypted services are at the forefront of the battle for online privacy, freedom of the press, freedom of opinion and expression. Many journalists, whistleblowers and activists depend on secure, encrypted solutions to protect their data as well as their identity, the groups wrote. Access to these tools can be literally life or death for those who rely on them.

Signatories on the letter include the Tor Project, encrypted apps Threema and Tutanota, Proton AG (the Swiss makers of ProtonMail), digital rights nonprofits the Center for Democracy & Technology and Fight for the Future, the E-Governance and Internet Governance Foundation for Africa, and the Surveillance Technology Oversight Project (STOP).

The letter calls out nations from the Five Eyes alliance in particular, highlighting proposed legislation like the Eliminating Abusive and Rampant Neglect of Interactive Technologies Act of 2023 (EARN IT Act) in the U.S., the Online Safety Act in the UK and legislation under consideration in the Canadian Parliament as examples of a worrying trend that threatens privacy and security in some of the worlds foremost democracies. The term Five Eyes refers to an alliance intelligence agencies that include the United States and Australia, Canada, New Zealand and the United Kingdom.

Government attacks on encrypted services threaten privacy and puts users at risk. This might seem like a distant problem primarily faced in authoritarian countries but the threat is just as real and knocking at the doors of democratic nations, the groups write.

A group of 132 human rights and LGBTQ organizations sent a separate open letter to U.S. Congressional leaders Tuesday urging them not to pass the EARN IT Act.

The call for changing encryption laws has been an ongoing debate in many of these countries for decades, as technology and the internet has made phones and other devices critical to modern communication and a key source of evidence for law enforcement. The U.S. Department of Justice has waged multiple lobbying efforts since the 1990s to convince Congress to pass legislation requiring access to encrypted communications during investigations or when there is a warrant.

Service providers, device manufacturers, and application developers are deploying products and services with encryption that can only be decrypted by the end user or customer. Because of warrant-proof encryption,the government often cannot obtain the electronic evidence and intelligence necessary to investigate and prosecute threats to public safety and national security, even with a warrant or court order, the departments Office of Legal Policy wrote last year.

Tech companies have said there is no way to create that kind of access for legitimate criminal and national security investigations without watering down security protocols or placing encryption keys in the hands of the government or a third-party, where they could be abused, hacked or stolen.

The letter calls on nations to ensure legislatures arent engaging in overreach when they write laws around encryption, ensure encrypted communications arent being blocked or throttled to reduce access and revisit any bills, laws and policies that legitimize undermining encryption or blocking access to services offering encrypted communication.

See the rest here:
Tor Project, LGBTQ groups and CDT sound alarm over efforts to ... - SC Media

Read More..