Page 1,351«..1020..1,3501,3511,3521,353..1,3601,370..»

Opinion: Striking television and film writers want artificial intelligence … – The Globe and Mail

Open this photo in gallery:

Demonstrators hold signs during the 2007-2008 Writers Guild of America strike in Hollywood.CHRIS DELMAS/AFP/Getty Images

Gus Carlson is a U.S.-based columnist for The Globe and Mail.

For decades, Hollywood writers have been creating stories about a future where machines take over the world. Think The Terminator, Blade Runner, I, Robot even the animated kids movie, WALL-E.

Now, these creatives find themselves on the thin edge of the wedge in their own version of that apocalyptic plot line.

When the members of the Writers Guild of America went on strike this week, they listed among their demands a provision that nods to a not-too-distant future where human creativity is under siege: regulations for the use of materials produced using artificial intelligence or similar technologies.

Beyond the cruel irony of this existential crisis for writers, the call to limit AIs influence in this context raises the question: Does it really matter who or what creates a good story well told?

Would viewers really care if their favourite Netflix series was the product of AI, as long as it was engaging and entertaining and especially if they didnt have to wait so long between seasons?

Purists would say they should care that the human creative process is iterative and by nature takes time to brew. Great art, whether it is writing, music, film, stage, painting, dance or sculpture, is about the expression of human emotion and feeling that cant be captured and replicated by machines. AI can do many things to mimic art, but is it really art?

Sure, AI can write a plot line about racism in Depression-era Alabama, but can it capture the powerful anxiety of Harper Lees To Kill and Mockingbird? It can spew out a scene where two friends kibitz about love in a New York diner, but can it capture the comic brilliance of a line of dialogue like Ill have what shes having? And yes, it can mimic a complicated guitar solo, but can it inspire like the magic of a B.B. King free-form riff?

Increasingly, however, the consumers and producers of content might not be so quick to dismiss the idea of tech-driven shortcuts to feed our instant-gratification culture.

As production costs for films, television programs and streaming series rise, and the demand to fill the content pipeline intensifies, the use of AI is becoming a real option for studios and networks. If they can produce high-quality content faster and cheaper and the viewers and subscribers dont really care or cant even tell how the sausage is made everybody, except the writers, of course, wins.

That point is more salient when we consider that restricting AI in the creation of stories isnt the only thing the writers want as part of their contract negotiations with a trade association representing the top Hollywood studios, television networks and streaming platforms.

They have many more concerns in the here and now, including making more money. A big part of their gripes is that streaming series typically have fewer episodes than broadcast shows, so maintaining a consistent income stream is difficult.

These demands will further strain the budgets of the studios. If writers want to be paid more, AI would start to look all the more attractive to the studios.

Of course, Hollywood writers are not alone in their wariness of a creative world infected by technology. Book publishers are on the lookout for AI-manufactured manuscripts, and many college admissions officers are placing less weight on student essays some are eliminating them as a requirement altogether because of widespread use of AI to create personal stories so expertly written they could not have come from the keyboard of the average teenager.

As writers and other artists struggle to protect their gifts, the broader cultural challenge is clear. There are many things AI can do, as well as many things it cant. The quandary for creatives is whether the difference will continue to matter to the average humanoid consumer of their wares. The economic viability of their craft hangs in the balance.

Read this article:
Opinion: Striking television and film writers want artificial intelligence ... - The Globe and Mail

Read More..

The Artificial Intelligence Future Is Upon Us in ‘Class of ’09’ – The Daily Beast

Shows dont come timelier than Class of 09, an eight-part FX on Hulu drama, premiering May 10, that concerns the potential benefits and pitfalls of artificial intelligenceincluding the moral questions it raises and the ramifications it may have on the human workforce. Arriving as companies such as IBM are opting to not hire new workers for positions that will be replaced by A.I. in the coming few years, its a limited series with its finger so firmly and urgently on the pulse of our present (and future) reality that its fiction plays not as pure make-believe but, rather, as a vision of a possible tomorrow.

Better yet, Tom Rob Smiths show has more going for it than just prescience. Set during a trio of time periods, it focuses on four individuals struggling to figure out (and define) who they are while simultaneously navigating a law enforcement system dedicated to identifying threats to the public. A

ll three of these strands are intertwined in various narrative and thematic ways, highlighting the ethical and practical dilemmas that drove characters to embark on their respective courses, and exposing the fundamental means by which the personal affects the professionaland, as a result, the national. Inventively conceived and deftly executed, its a crime saga that comes across a modernized, multi-layered spin on Philip K. Dicks (and Steven Spielbergs) Minority Report.

Trifurcated across decades, Class of 09 begins in 2034, with FBI director Tayo Michaels (Brian Tyree Henry) monitoring the country via a wall of monitors whose security camera footage sometimes devolves into oceanic streams of matrix-like data. In order to locate a wanted individual named Amos Garcia (Ral Castillo), Michaels sends Amy Poet (Kate Mara), who has one cybernetic eye and doesnt understand why shes been plucked for this assignment.

What she discovers alongside comrade Murphy (Mrs. Davis Jake McDorman, co-starring in yet another AI-related series) is a bank of screens not unlike those possessed by Michaels, and which eventually cut to a loop of Michaels himself proclaiming, Not only are we now one of the greatest countries on this Earthwe are now also one of the safest.

Garcia is an apparent figure from the FBIs past, and its there that Class of 09 soon travels. In 2009, Poet is a nurse who puts everyone first, but shes convinced to give herself a shot by trying out for the bureau.

At Quantico, she joins a prospective incoming class that includes Miller, a former cog in the corporate machine whos looking to fight injustice, as well as confident Lennix (Brian J. Smith), whose parents view the FBI as a step on his journey to political power, and Hour (Sepideh Moafi), the daughter of persecuted Iranian immigrants who dont understand their daughters decision to channel her MIT-grade intellect into a career with the feds. Smith delineates these characters in quick, acute strokes, and then slowly peels back their layers to bare the hang-ups that have led them to their new career.

We always reveal ourselves, says Miller to an interrogation-room suspectone of many instances in which Class of 09s protagonists articulate this sentiment. The desire to know the self is central to Smiths story, which discloses that Miller doesnt trust people (thanks to a harrowing teenage traffic stop gone awry), Hour dreams of creating an inherently fair system (because it might provide the acceptance she craves as a gay woman), and Poet is a loner who prioritizes others in the same (harmful) manner that her single mother did.

These individual issues are wrapped up in the series fascination with AI, which promises investigators the ability to correlate and analyze data on a heretofore unheard-of scale, albeit at the cost of the vital human input necessary (or is it?) to differentiate between right and wrong, good and evil.

Between 2009 and 2034, Class of 09 situates itself in 2023, with Hour attempting to convince a skeptical establishment that an interconnected criminal database would help agents (rather than render them obsolete), Poet being forced to go undercover to investigate her own (following her triumphant take-down of corrupt Philly cops), and Michaels finding himself in a firefight with Montana domestic terrorists whose cunningly smiling leader Mark Tupirik (Mark Pellegrino) seems to have his sights trained specifically on him.

The threads connecting these comrades befores and afters only slowly become clear, as Smith hopscotches between eras with tantalizing (and generally surefooted) dexterity. Theyre brought to life, moreover, by a cast that skillfully handles both the proceedings action-oriented demands and psychological and Big Picture interests, led by the typically great Henry, whose Michaels has an easygoing charisma that belies his keen perceptiveness and formidable determination. Hes the centerpiece of the show, even if he never unduly overshadows his co-stars.

Smith imagines 2034 society as populated by realistic techno-gadgets and complicated by the consequences of artificial intelligence, whose unparalleled ability to assess information results in the types of predictive precrime measures that formed the basis of Dicks predecessor.

Its a fantasy that feels like its sprung from todays headlines, and its AI-centric material serves as an apt contextual framework for a story thats about the eternal quest to know oneself, others, and the world. From touch screens to domestic automation to the implants that grant Poet and others enhanced interfacing abilitiesthe byproducts of innovation that are also necessitated by grievous injuriesClass of 09 proves to be a science-fiction venture whose latter is inspired by the former.

Since press were only provided with four of the series eight installments, theres no guessing the ultimate destination of Class of 09, which uses its time-jumping conceit to thrill and, additionally, to elucidate new facets of its primary players. In an era when so many overlong TV efforts telegraph their every move, such unpredictability is another feather in Class of 09s cap, and makes one wish that it would continue on even past this season. If not, though, theres still plenty of reason to see it through to its finishwhich, hopefully, wont provide an AI cautionary-tale lesson that hits too close to home.

Liked this review? Sign up to get our weekly See Skip newsletter every Tuesday and find out what new shows and movies are worth watching, and which arent.

See more here:
The Artificial Intelligence Future Is Upon Us in 'Class of '09' - The Daily Beast

Read More..

AI could be as transformative as Industrial Revolution – The Guardian

Artificial intelligence (AI)

UKs outgoing chief scientist urges ministers to get ahead of profound social and economic changes

The new genre of AI could be as transformative as the Industrial Revolution, the governments outgoing chief scientific adviser has said, as he urged Britain to act immediately to prevent huge numbers of people becoming jobless.

Sir Patrick Vallance, who stood down from his advisory role last month, said government should get ahead of the profound social and economic changes that ChatGPT-style, generative AI could usher in.

However, in a wide-ranging final parliamentary hearing that also covered his reflections on the pandemic and the rise of China as a global scientific power, he suggested AI could also have considerable benefits that should not be overlooked.

There will be a big impact on jobs and that impact could be as big as the Industrial Revolution was, Vallance told the Commons science, innovation and technology committee. There will be jobs that can be done by AI, which can either mean a lot of people dont have a job, or a lot of people have jobs that only a human could do.

In the Industrial Revolution the initial effect was a decrease in economic output as people realigned in terms of what the jobs were and then a benefit, he added. We need to get ahead of that.

Vallance called for a national review of which sectors would be most significantly affected so plans could be drawn up to retrain and give people their time back to do [their jobs] differently.

The comments follow an announcement by IBM this week that it is suspending or reducing hiring in jobs such as human resources, with a suggestion that 30% of its back-office roles could be replaced by AI in five years.

Echoing comments by the AI pioneer Geoffrey Hinton, who announced his departure from Google this week, Vallance said the most immediate concern posed by AI was ensuring it did not distort the perception of truth.

He added that there was also a broader question of managing the risk of what happens with these things when they start to do things that you really didnt expect.

Despite these potential existential threats, the technology also presented opportunities, Vallance argued. In medicine, it could be that you get more time with your doctor rather than being pressurised, he said. That could be a good outcome.

We shouldnt view this as all risk, he added. Its already doing amazing things in terms of being able to make medical imaging better. It will make life easier in all sorts of aspects of every day work, in the legal profession. This is going to be incredible important and beneficial.

Vallance, who is now chair of the Natural History Museum, appeared sceptical about the prospect of developing a British version of ChatGPT, dubbed Brit-GPT, which some experts have called for in recent months. In March, the Treasury committed 900m to building a supercomputer to boost sovereign capabilities in this area.

Vallance said the focus for the UKs core national capability should be on understanding the implications of AI models and testing the outputs not on building our own version.

He said: You need to be able to probe them and understand them. I just dont think the idea were going to invent something that rivals what the big companies have already made is very sensible. It sounds like attempts to invent a new internet. I mean, why?

Vallance also implied that a moratorium on AI would not be feasible. Unilaterally falling behind doesnt seem to me to be a sensible approach, he said.

Looking back over his tenure, Vallance said his proudest achievements included helping establish the Covid-19 vaccines taskforce and acting as chief scientific adviser for the Cop26 climate summit.

He said he regretted very clumsy wording about herd immunity that led to misunderstanding and controversy early in the pandemic. In a March 2020 interview, Vallance said the aim was not to suppress the virus completely to build up some degree of herd immunity whilst protecting the most vulnerable.

He told the committee his intention was to reflect that immunity was fundamentally how you end pandemics rather than it being an intended strategy. People get immunity through vaccines and they get immunity through catching infections, he said. Ultimately that is where we have got to.

On the origins of the pandemic, Vallance said by far the most likely explanation was a spillover from bats, and that the available evidence suggested a lab leak was less likely.

Vallance also commented on the UKs position in a shifting geopolitical world, with countries including China in the ascendancy in science and technology. Against this backdrop, he said, it was essential for the UK to remain part of the EUs Horizon programme, pointing out it took the flagship research scheme a decade to get going effectively.

The idea that you can instantly set up something equivalent is flawed, he said. China has huge scale, US has huge scale. There are some parts of science that need scale. You cant replicate that domestically.

He called on the UK government to make changes to its visa scheme, which he said needed to be quick and internationally competitive in order to attract the best scientists. When asked whether the Home Office had responded to his advice on this, Vallance said: I guess the feedback is the action.

{{topLeft}}

{{bottomLeft}}

{{topRight}}

{{bottomRight}}

{{.}}

Read the rest here:
AI could be as transformative as Industrial Revolution - The Guardian

Read More..

Cybersecurity Trends & Statistics; More Sophisticated And Persistent Threats So Far In 2023 – Forbes

background. New Year 2023 celebration concept.getty

The pace of technological innovation has led to a transformation in many areas of our lives. In 2023, although it is only Spring, the impact of emerging technologies including artificial intelligence/machine learning, 5G, IoT, and quantum are significantly impacting everything connected to the internet.

The introduction of these potentially disruptive technologies do have implications on cybersecurity and the challenges of keeping us safe. In particular, AI is the hot topic of focus as generative artificial intelligence can leverage ChatGPT-powered for code, and ai/machine learning to amplify social engineering capabilities and help identify target vulnerabilities for hackers. These evolving tech trends and statistics are already telling a story for 2023.

As data continues to be produced and stored in greater volumes, and as connectivity greatly expands globally on the internet, the attack surface has become more exploitable with gaps and vulnerabilities for criminal and nation state hackers. And they are taking advantage.

In fact, the global cyber-attacks Rose by 7% already in Q1 2023. Weekly cyber-attacks have increased worldwide by 7% in Q1 2023 compared to the same period last year, with each firm facing an average of 1248 attacks per week. The figures come from Check Points latest research report, which also suggests that the education and research sector experienced the highest number of attacks, rising to an average of 2507 per organization per week (a 15% increase compared to Q1 2022). The Check Point report also shows that 1 in 31 organizations worldwide experienced a ransomware attack weekly over the first quarter of 2023. Global Cyber Attacks Rise by 7% in Q1 2023 - Infosecurity Magazine (infosecurity-magazine.com)

In addition, key malware statistics for 2023 are adding to cybersecurity difficulties. It is estimated that 560,000 new pieces of malware are detected every day and that there are now more than 1 billion malware programs circulating. This translates to four companies falling victim to ransomware attacks every minute. A Not-So-Common Cold: Malware Statistics in 2023 (dataprot.net)

To top it off with more alarming statistics, so far almost 340 million people have been affected by publicly-reported data breaches or leaks in 2023 according to a public data breach tracker created by the U.K. news site The Independent. Cyber Security Today, April 28, 2023 Data on over 340 million people exposed so far this year | IT World Canada News

Last year, global 5G connections increased 76% in 2022 to 1.05B; 5G penetration hit 32% in North America. Global 5G connections are set to reach 1.9B in 2023. For cybersecurity that means less latency and faster attacks by threat actors. Global 5G Connections Set to Hit 1.9B in 2023 | TV Tech (tvtechnology.com)

Both cyber-attacks and vulnerabilities are expanding. A new report, State of Cyber Assets Report (SCAR) shows released by the cyber asset management company JupiterOne, analyzed over 291 million assets, findings, and policies to determine the current state of enterprise cloud assets. The report found that the number of assets organizations manage on average has increased by 133% year-over-year, from 165,000 in 2022 to 393,419 in 2023. The number of security vulnerabilities has grown disproportionately, jumping up 589%. According to the report, data is the most vulnerable type of asset, accounting for nearly 60% of all security findings.

The report also highlighted the challenges that security teams are facing, showing that, on average, a security team is responsible for 393,419 assets and attributes, 830,639 potential security risks, and 55,473 policies. This has led to security fatigue and staffing shortages in many organizations. Report: Cyber vulnerabilities skyrocket 589%, underscoring importance of cybersecurity | WRAL TechWire

While many industry sectors have been the target of cyber-attacks, including financial, education, and retail, the healthcare industry still is in the cross hairs of criminal hackers. This makes sense as many health institutions still lack the proper investment and expertise in cybersecurity because their funding goes to medical equipment and operations. Criminal hackers tend to go for the low hanging fruit. In the case of healthcare, the liability risks make ransomware a logical means of extortion.

Stethoscope on laptop keyboard, blue lighting

getty

According to the IBM 2022 Cost of a Data Breach report, the healthcare industry is still the costliest industry for a breach at $10.1 million on average for the twelfth year in a row. Fortified Health found that 78% of data breaches in 2022 were from hacking and IT incidents, an increase from 45% in 2018. Unauthorized access the second leading cause accounted for 38% of incidents in 2018 and now is only responsible for 16%. Other causes noted were theft, loss and improper data disposal.

Attackers often set their sights on healthcare organizations because breaches and incidents have a high impact. Because healthcare is an essential service, organizations are more likely to pay ransoms to provide continuous care when business disruptions can have devastating consequences. Additionally, healthcare organizations possess high-value data, such as personal and financial information. Attackers can often resell records for high prices on the dark web. Hacking Caused 80% of Healthcare Data Breaches in 2022 (securityintelligence.com)

Phishing is still one of the preferred methods used by criminal hackers. Why, because it is easy to do and successful, especially now that many of the attacks are being automated.

New research shows that up to a half of all HTML email attachments are malicious. This rate of malicious HTML prevalence is double compared to what it was last year and doesn't appear to be the result of mass attack campaigns that send the same attachment to a large number of people.

Barracuda used its telemetry to perform an analysis in May 2022 and found that 21% of the HTML attachments its products scanned that month were malicious. This was by far the highest malicious-to-clean ratio of any file type sent via email, but it progressively got worse since then, reaching 45.7% in March this year.So, for anyone who receives an HTML attachment via email right now there's a one in two chance it's maliciousAttacks increasingly use malicious HTML email attachments | CSO Online

Emerging technologies combined with the ability to be paid in cryptocurrencies that are hard to trace has accelerated ransomware attacks in recent years. The trend continues, ransom demands, recovery times, payments and breach lawsuits all on the rise.

In 2022, we saw increases in average ransom demands, average ransom payments, and average recovery times in most industries, the report authors wrote. The lull in ransomware that marked the start of the year is over. Ransomware groups have resumed attacks, and organizations must redouble their efforts to defend themselves against increasing attacks.

Baker Hostetlets Digital Assets and Data Management examined over 1,160 incidents from 2022. While many organizations have bolstered security and resilience, the data shows that threat actors continue to adapt and find footholds onto the network through evasive malware, social engineering, multi-factor authentication bombing, and credential stuffing.

The average time to recover from ransomware rose in nearly every sector, and in most cases, significantly. In 2021, the average recovery time for all sectors was just over a week. Last year, the retail, restaurant, and hospitality sectors saw an increase in the average recovery time from 7.8 days in 2021 to 14.9 days in 2022, or a 91% increase.

Healthcare saw a 69% rise in the length of recovery, followed by a 54% uptick for the energy and technology sectors, and 46% in the government industry segments. These increases mirrored a spike in ransom demands in 6 out of 8 industries, with an average payment of $600,688. Ransom demands, recovery times, payments and breach lawsuits all on the rise | SC Media (scmagazine.com)

For a detailed examination of the ransomware threat, please see my FORBES article Ransomware on A Rampage:

One of the biggest vulnerabilities for cyber-attacks has been on the supply chain. This was highlighted by the Colonial Pipeline and Solar Winds breaches and many others. It is a formidable task to protect any business or organization from the bast array of cyber- attacks, but when they are part of a supply chain with other parties or vendors, it becomes even a larger challenge. The reality is that 9 out of 10 companies have recently detected software supply chain security risks.

Reversing Labs Software Supply Chain Risk Survey found that nearly 90% of technology professionals detected significant risks in their software supply chain in the last year. More than 70% said that current application security solutions aren't providing necessary protections. More than 300 global executives, technology and security professionals at all seniority levels directly responsible for software at enterprise companies, were surveyed for the study.

Nearly all respondents (98%) recognized that software supply chain issues pose a significant business risk, citing concerns beyond code with vulnerabilities, secrets exposures, tampering and certificate misconfigurations. Interestingly, more than half of technology professionals (55%) cited secrets leaked through source code as a serious business risk followed by malicious code (52%) and suspicious code (46%).9 out of 10 companies detected software supply chain security risks | Security Magazine

And data released from Black Kites 2023 Ransomware Landscape Report finds the number of ransomware victims announced in March 2023 was nearly double that of April 2022 and 1.6 times higher than the peak month in 2022. Other key findings from April 1, 2022, through March 31, 2023, include:

Black Kite Research: Ransomware Attacks Resurge with Victims Doubling in 2023 (yahoo.com)

Data Breach Button on Computer Keyboard

getty

Because company reputations and stock prices can be impacted by a breach disclosure, that is often a reluctance to report an incursion to the public. New laws that require disclosure, especially in the banking and financial community are on the books and should help to quell this trend, but apparently it has not taken root yet.

New research released by cybersecurity vendor Bitdefender today surveyed over 400 IT and security professionals who work in companies with 1,000 or more employees. Bitdefender found that 42% of IT and security professionals surveyed had been told to keep breaches confidential i.e., to cover them up when they should have been reported.

Perhaps even more shockingly, 29.9% of respondents admitted to actually keeping a breach confidential instead of reporting it. This research highlights that an alarming number of organizations are willing to ignore their obligations to report data breaches to regulators and customers, in an attempt to avoid legal and financial penalties. A third of organizations admit to covering up data breaches | VentureBeat

While the threats are more sophisticated and capable, there are some basic cyber-hygiene measures that any company or individual can do to make themselves less of a target. They include:

Multi-factor authentication (MFA): MFA helps limit the possibility of unauthorized access. Enforcing always-on MFA through additional physical controls or temporary secondary codes makes life for a cybercriminal more difficult.

Identity and access management: Identity and access management (IAM) ensures that only the right people and job roles in your organization can access the tools they need to do their jobs. Through single sign on applications, your organization can manage employee apps without having them log into each app as an administrator.

Strong password management: There are practical remedies to get beyond that bad habit of using easy passwords to crack. Do not use default passwords on your devices and when you do create passwords make them complicated. Consider making them long or using phrases with letters, numbers, and characters.

Protective Tools: for better protection also consider using firewalls, and adding antivirus & intrusion detection software to your devices.

Update and Backup: be sure to update and patch your network in a timely manner and maintain a robust backup program that segments and encrypts sensitive data.

Finally have an Incident Response Plan, anyone in the growing and sophisticated cyber universe can become a victim and attackers always have an asymmetrical advantage.

This is just a small snapshot of some of the trends and statistics that are emerging on the cyber ecosystem in 2023. It is more important than ever to be vigilant and cyber-aware as there is much to be worried about on the cyber-threat horizon.

About The Author:

Chuck Brooks

Chuck Brooks

Chuck Brooks is a globally recognized thought leader and subject matter expert Cybersecurity and Emerging Technologies. Chuck is also an Adjunct Faculty at Georgetown Universitys Graduate Cybersecurity Risk Management Program where he teaches courses on risk management, homeland security technologies, and cybersecurity. LinkedIn named Chuck as one of The Top 5 Tech People to Follow on LinkedIn. He was named Cybersecurity Person of the Year for 2022 by The Cyber Express, and as one of the worlds 10 Best Cyber Security and Technology Experts by Best Rated, as a Top 50 Global Influencer in Risk, Compliance, by Thompson Reuters, Best of The Word in Security by CISO Platform, and by IFSEC, and Thinkers 360 as the #2 Global Cybersecurity Influencer. He was featured in the 2020, 2021, and 2022 Onalytica "Who's Who in Cybersecurity" He was also named one of the Top 5 Executives to Follow on Cybersecurity by Executive Mosaic, He is a GovCon Expert for Executive Mosaic/GovCon Wire, He is also a Cybersecurity Expert for The Network at the Washington Post, Visiting Editor at Homeland Security Today, and a Contributor to Skytop Media, and to FORBES. He has an MA in International relations from the University of Chicago, a BA in Political Science from DePauw University, and a Certificate in International Law from The Hague Academy of International Law.

Chuck Brooks, President of Brooks Consulting International, is a globally recognized thought leader and subject matter expert Cybersecurity and Emerging Technologies. Chuck is also Adjunct Faculty at Georgetown Universitys Graduate Applied Intelligence Program and the Graduate Cybersecurity Programs where he teaches courses on risk management, homeland security, and cybersecurity.

LinkedIn named Chuck as one of The Top 5 Tech People to Follow on LinkedIn. He was named as one of the worlds 10 Best Cyber Security and Technology Experts by Best Rated, as a Top 50 Global Influencer in Risk, Compliance, by Thompson Reuters, Best of The Word in Security by CISO Platform, and by IFSEC and Thinkers 360 as the #2 Global Cybersecurity Influencer. He was featured in the 2020, 2021, and 2022 Onalytica "Who's Who in Cybersecurity" as one of the top Influencers for cybersecurity.

Chuck has served at executive levels in both government and industry. He is a two-time Presidential Appointee and was one of the group of initial people hired to helped set up the Department of Homeland Security, including the Science & Technology Directorate.

Chuck has written over 300 articles and has keynoted dozens of conferences worldwide. He has over 82,000 followers on LinkedIn and almost 18,000 followers on Twitter.

Chuck has an MA in International relations from the University of Chicago, a BA in Political Science from DePauw University, and a Certificate in International Law from The Hague Academy of International Law.

Follow Chuck on social media:

LinkedIn:https://www.linkedin.com/in/chuckbrooks/

Twitter:@ChuckDBrooks

Read more:
Cybersecurity Trends & Statistics; More Sophisticated And Persistent Threats So Far In 2023 - Forbes

Read More..

City of Dallas Continues Battling Ransomware Attack for Third Day – NBC 5 Dallas-Fort Worth

Some services and websites were still crippled Friday in the third day of a ransomware attack on the Dallas City Government.

No one has publicly revealed the ransom thats being demanded to end the attack or whether any ransom has been paid. Experts said the demand could be very expensive.

Computer dispatch was still down in the Dallas 911 call center. Police and firefighters were sent to calls by radio using paper and pencil for addresses.

Code enforcement and other non-emergency response to 311 calls were delayed.

City water bill payments were impacted. Disconnections were canceled.

The city website offered some information about meetings but little more.

According to this government alert a few months ago, this group asked their victims for between one and ten million dollars in bitcoin, said Kevin Collier, an NBC News reporter on cyber security issues.

The latest news from around North Texas.

Southern Methodist University cyber security expert Mitch Thornton agreed the ransom demand could be that large.

It certainly is within the range of what Ive heard from these ransoms, Thornton said.

City officials have said the attack is from a group called Royal. In a statement late Friday, the city said city information technology employees and vendors have worked to contain the virus and restore service. The statement said progress has been made but recovery is ongoing.

Outside experts said the Royal ransomware has been evolving as defense efforts worked to stop it.

Training warns employees not to click on suspicious emails that could unleash ransomware.

Thornton said corrupt online ads can now be a culprit in a scheme called malvertising.

Theres increasingly better screening in our email readers so these threat actors can get around that by placing these ads on web pages when you are browsing around, he said. Im not saying thats what happened here but there have been cases of the Royal ransomware being distributed through these malvertisments.

Ransomware is becoming really big amongst hackers because it works; because people really do pay the ransoms, said Paul Bischoff with the cyber security website Comparitech.com.

His site published a list of $70 billion worth of U-S government ransomware payments reported between 2018 and 2022.

Our estimates are probably a lot lower than what is really happening because people are not reporting it to the FBI, Bischoff said.

The extortion threat could be public release of seized confidential information or stopping service delivery, which has occurred in Dallas.

Ransomware actors are using multiple extortion types, Thornton said.

According to NBC 5's media partner The Dallas Morning News, the Dallas Central Appraisal District paid over $170,000 to end a Royal ransomware attack that lasted for months, crippling the organization's public access website.

Cyber criminals are likely based in Russia. If they were based in the United States we could put handcuffs on them quickly, but theyre not. We have no access to them so its much more difficult to shut them down, Collier said. Its largely Russian organized crime extorting Americans essentially daily and theres not a ton of recourse.

The Dallas City Council Public Safety Committee is due to receive a report on the attack Monday but since it is an ongoing investigation that may include ransom negotiations, much of it will likely occur in a closed-door executive session.

The agenda for that meeting was available online Friday.

Here is additional information the City of Dallas released about the attack Friday:

911and311calls are being answered andDallas Police DepartmentandDallas Fire-Rescueare being timely dispatched by radio.

For residents with non-emergency needs, 311 is still taking service requests by phone but the OurDallas app and online portal are temporarily unavailable. Another option is service in person at City facilities during regular business hours.

Sanitationcollection remains on schedule and disposal sites are operational during regular business hours. If service is missed, please call 311.

Dallas Water Utilitiesservice is unaffected, and disconnections are discontinued until the outage is resolved. Statements may be paid by mail; however, for those who prefer to pay in-person or online, late fees will not be charged for payments that cannot be processed until service is restored. DWU autopay will draft when service is restored. If you have questions or need assistance, please call (214) 651-1441 or walk into the water lobby at City Hall Monday through Friday between 8 a.m. to 5 p.m.

Office of Community Careclinics for Women, Infants and Children (WIC) are open and providing benefits. Vital Statistics is issuing records, but to ensure any records sought are available before you arrive, please call 214-670-3092.

Dallas Public Librarybranches are open, operational, and can check out media to residents with a library card; however, residents with media due to be returned are asked to hang on to it a little longer. There will be no late fees charged for materials due during the service outage. Digital media is also available via Hoopla and Overdrive. Internet-connected computers may be limited, so users in need of online device access should call ahead to their respective branch.

Dallas Animal Servicescontinues handlingadoptions, fosters, rescues, and returns to owners in-person on a case-by-case basis at 1818 N. Westmoreland Road, 75212.

Code Complianceis issuing garage sale permits only in-person at their headquarters at 3112 Canton Street, 75226.

While pages on the Citys website are being restored,Special Eventspermit requests may be submitted through the following direct links:

Development Servicescan review paper plans for walk-ins at 320 E. Jefferson Blvd., 75203 during regular business hours. However, while Permitting, Public Works, and Zoning application and payment systems are offline, submissions cannot be received or approved. This is a dynamic situation, and patience is appreciated while we focus on expediting full-service restoration.

Municipal Courtremains closed Monday, May 8. There will be no court hearings and no trials. Cases scheduled during this outage will be reset, and updates will be mailed. Citation payments and documents due while Municipal Court is closed will be accepted after service is restored.

Please note, no one from the City of Dallas will reach out to members of the public to ask for payment in person or by phone. Never give out your password or payment information by phone or through an email link.

To protect against cyber threats please install the Dallas Secure app on youriOSorAndroiddevice. If you are contacted by someone seeking payment who claims to be from a City of Dallas department, please take note of the number they are calling from and the number they reached you on, then hang up and call the City of Dallas department they claim to be from to report this potential impersonation.

More:
City of Dallas Continues Battling Ransomware Attack for Third Day - NBC 5 Dallas-Fort Worth

Read More..

Companies need a wakeup call to fix chronic security shortcomings … – Cybersecurity Dive

SAN FRANCISCO Digital risks confronting organizations remain the same year after year, and the threat and potential damage awaiting unsuspecting victims is abundantly clear. Yet, many organizations still struggle to address the fundamentals required to take cybersecurity seriously.

For the things that do go wrong, theres a good chance the initial point of intrusion or attack will sound like a broken record to longtime RSA Conference attendees. Phishing, unpatched vulnerabilities and generally lackadaisical processes come up time and again.

To shake the industry into action, a cataclysmic event may be required.

Maybe we need another Snowden moment, Chester Wisniewski, field CTO of applied research at Sophos, told Cybersecurity Dive last week at the annual industry gathering.

When Edward Snowden, a former intelligence consultant and whistleblower, leaked highly classified information from the National Security Agency in 2013, it created a revelatory moment in technology.

Suddenly we went, oh, geez we kind of have to encrypt the internet. And look, it took us 10 years but the whole internets encrypted now, Wisniewski said.

Many cybersecurity experts, Wisniewski included, were lecturing the industry to fully encrypt the internet starting two decades ago. The repeated warnings finally reached a rallying point after Snowdens revelations hit.

Persistent prodding from the threat intelligence community is making an impact. More organizations have been roused into taking security more seriously.

Here we are in 2023, find a website thats not encrypted. You cant find one, but it took a Snowden moment to get everybody to go and do it, Wisniewski said.

Repetition will spur action eventually

Fear is a powerful motivator, but repetition such as threat intelligence from researchers and analysts about supply chain attacks, exploited vulnerabilities and ransomware might be whats required to push more organizations into action.

Theres a lot of gamblers out there, said John Shier, field CTO of commercial at Sophos.

Repetition plays an important role for cybersecurity professionals, precisely because it can eventually hammer the preventable dangers home for business leaders that need to hear their message the most.

John Dwyer has watched best practices go unfollowed his entire 15-year career.

Over extension of privileges, over extension of connectivity and over extension of access has been prevalent for a long time, Dwyer, the head of research at IBM Security X-Force, told Cybersecurity Dive.

Since I started in my career, people have been saying take away local administrative rights, and its still a common problem today, Dwyer said.

Despite the recurrence of long-ignored threats, Dwyer said hes seen a change during the last five years, marked by more organizations willing to invest in security and apply best practices.

On the outside, it may seem like no one's actually taking any of this stuff to heart, Dwyer said. People have been talking about the same thing forever, and youve had the same kind of vendors saying the same thing. What changed is that the threat landscape changed so that every organization on the planet is now actually targeted, more or less.

More organizations are assessing ways to reduce risk through security controls, better architecture and zero-trust models that limit privilege and access, but acquiring the investment needed to achieve those goals remains a hurdle for some companies, according to Dwyer.

Same old problems beats the alternative

Hearing about and sharing the same threats year after year might be tiring on some level for cybersecurity professionals, but for organizations under attack its probably better than the alternative.

Companies can patch vulnerabilities in hardware or software before a threat actor exploits them, strictly monitor supply chains and limit the impact of phishing attacks.

Phishing is still king, and how long have we been talking about phishing? Dwyer said.

Just because someone gets phished doesn't necessarily mean that your organization is going to burn to the ground. There's a whole bunch of stuff that happens in between that, Dwyer said. I think we just need to move to assume you're going to get phished, assume that you're going to get exploited. You still have a lot of opportunities to prevent a crisis, even if that happens.

Much like the long slog the industry endured before encryption became standard and universally adopted, strengthened defense practices and infrastructure might percolate through businesses from the top down.

Early on, Wisniewski said, it was just the richest, biggest companies that understood the problem.

Continue reading here:
Companies need a wakeup call to fix chronic security shortcomings ... - Cybersecurity Dive

Read More..

CIA staged Arab Spring, others around globe Chinese Cyber-security Centre – Businessday

A Chinese report has alleged that the U.S. Central Intelligence Agency (CIA) masterminded a great number of hacker attacks and color revolutions in the post-Soviet space and other regions of the globe.

Chinas National Computer Virus Emergency Response Centre and Chinese internet Security Company 360 made the report on Thursday.

The report said for many years, the CIA has been secretly organising peaceful change and color revolutions, as well as carrying out espionage activities and stealing information.

The authors of the report believe that all revolutions recognised as color revolutions by international experts and organisations, as well as many other events were orchestrated by the U.S. special services.

Read also:Open Banking will democratise Nigerian banking customers data Dozie

The revolutions include: Velvet Revolution in Czechoslovakia in 1989, Rose Revolution in Georgia in 2003, Orange Revolution in Ukraine from 2004-2005, Tulip Revolution in Kyrgyzstan in 2005, Arab Spring of 2010s, Ukrainian Euromaidan from 2013-2014, and Sunflower Movement in Taiwan in 2014.

Besides, the paper argues that U.S. secret agencies were trying to stage color revolutions in Belarus, Azerbaijan, Lebanon, Myanmar, Iran and other states.

According to statistics, over the past few decades, the CIA has overthrown or attempted to overthrow legitimate governments in more than 50 countries, causing unrest, the report read.

Additionally, the report said that the APT or APT-C-39 hacker organisation, which was exposed by the 360 company in 2020, used for its cyberattacks tools similar to those featured in the Vault 7 papers published by WikiLeaks and listed there as CIA hacking tools.

According to the report, the main targets of the organisation are important information infrastructures of various countries, aerospace, research institutes, oil companies, Internet companies and government agencies.

Its activities can be traced back to 2011, and attacks continue to this day.

A Chinese report has alleged that the U.S. Central Intelligence Agency (CIA) masterminded a great number of hacker attacks and color revolutions in the post-Soviet space and other regions of the globe.Chinas National Computer Virus Emergency Response Centre and Chinese internet Security Company 360 made the report on Thursday.The report said for many years, the CIA has been secretly organising peaceful change and color revolutions, as well as carrying out espionage activities and stealing information.The authors of the report believe that all revolutions recognised as color revolutions by international experts and organisations, as well as many other events were orchestrated by the U.S. special services.Read also:Open Banking will democratise Nigerian banking customers data DozieThe revolutions include: Velvet Revolution in Czechoslovakia in 1989, Rose Revolution in Georgia in 2003, Orange Revolution in Ukraine from 2004-2005, Tulip Revolution in Kyrgyzstan in 2005, Arab Spring of 2010s, Ukrainian Euromaidan from 2013-2014, and Sunflower Movement in Taiwan in 2014.Besides, the paper argues that U.S. secret agencies were trying to stage color revolutions in Belarus, Azerbaijan, Lebanon, Myanmar, Iran and other states.According to statistics, over the past few decades, the CIA has overthrown or attempted to overthrow legitimate governments in more than 50 countries, causing unrest, the report read.Additionally, the report said that the APT or APT-C-39 hacker organisation, which was exposed by the 360 company in 2020, used for its cyberattacks tools similar to those featured in the Vault 7 papers published by WikiLeaks and listed there as CIA hacking tools.According to the report, the main targets of the organisation are important information infrastructures of various countries, aerospace, research institutes, oil companies, Internet companies and government agencies.Its activities can be traced back to 2011, and attacks continue to this day.

TO READ THE FULL ARTICLE

See more here:
CIA staged Arab Spring, others around globe Chinese Cyber-security Centre - Businessday

Read More..

Utilization of five data mining algorithms combined with simplified … – BMC Medical Research Methodology

Taylor PN, Albrecht D, Scholz A, Gutierrez-Buey G, Lazarus JH, Dayan CM, Okosieme OE. Global epidemiology of hyperthyroidism and hypothyroidism. Nat Rev Endocrinol. 2018;14(5):30116.

Article PubMed Google Scholar

De Leo S, Lee SY, Braverman LE. Hyperthyroidism. Lancet. 2016;388(10047):90618.

Article PubMed PubMed Central Google Scholar

Chaker L, Bianco AC, Jonklaas J, Peeters RP. Hypothyroidism Lancet. 2017;390(10101):155062.

Article CAS PubMed Google Scholar

Carle A, Pedersen IB, Knudsen N, Perrild H, Ovesen L, Andersen S, Laurberg P. Hypothyroid symptoms fail to predict thyroid insufficiency in old people: a population-based case-control study. Am J Med. 2016;129(10):108292.

Article PubMed Google Scholar

Biondi B, Cappola AR, Cooper DS. Subclinical Hypothyroidism: A Review. JAMA. 2019;322(2):15360.

Article CAS PubMed Google Scholar

Jones GRD, Haeckel R, Loh TP, Sikaris K, Streichert T, Katayev A, Barth JH, Ozarda Y. Intervals ICoR, Decision L Indirect methods for reference interval determination - review and recommendations. Clin Chem Lab Med. 2018;57(1):209.

Article PubMed Google Scholar

Obstfeld AE, Patel K, Boyd JC, Drees J, Holmes DT, Ioannidis JPA, Manrai AK. Data mining approaches to reference interval studies. Clin Chem. 2021;67(9):117581.

Article PubMed Google Scholar

Ma C, Wang X, Wu J, Cheng X, Xia L, Xue F, Qiu L. Real-world big-data studies in laboratory medicine: current status, application, and future considerations. Clin Biochem. 2020;84:2130.

Article CAS PubMed Google Scholar

Haeckel R, Wosniok W, Arzideh F, Zierk J, Gurr E, Streichert T. Critical comments to a recent EFLM recommendation for the review of reference intervals. Clin Chem Lab Med. 2017;55(3):3417.

Article CAS PubMed Google Scholar

Ammer T, Schtzenmeister A, Prokosch HU, Rauh M, Rank CM, Zierk J. refineR: a novel algorithm for reference interval estimation from real-world data. Sci Rep. 2021;11(1):16023.

Article CAS PubMed PubMed Central Google Scholar

Ozarda Y, Ichihara K, Jones G, Streichert T, Ahmadian R. Intervals ICoR, Decision L: comparison of reference intervals derived by direct and indirect methods based on compatible datasets obtained in Turkey. Clin Chim Acta. 2021;520:18695.

Article CAS PubMed Google Scholar

Farrell CL, Nguyen L. Indirect reference intervals: harnessing the power of stored laboratory data. Clin Biochem Rev. 2019;40(2):99111.

PubMed PubMed Central Google Scholar

Hoffmann RG. Statistics in the practice of medicine. JAMA. 1963;185:86473.

Article CAS PubMed Google Scholar

Bhattacharya CG. A simple method of resolution of a distribution into gaussian components. Biometrics. 1967;23(1):11535.

Article CAS PubMed Google Scholar

Concordet D, Geffr A, Braun JP, Trumel C. A new approach for the determination of reference intervals from hospital-based data. Clin Chim Acta. 2009;405(12):438.

Article CAS PubMed Google Scholar

Zierk J, Arzideh F, Kapsner LA, Prokosch HU, Metzler M, Rauh M. Reference interval estimation from mixed distributions using truncation points and the Kolmogorov-Smirnov Distance (kosmic). Sci Rep. 2020;10(1):1704.

Article CAS PubMed PubMed Central Google Scholar

Zhang S, Mo Y, Cheng F, Jia T, Zhao Y, Wang M, Yue Y, Zhang R, Xu J, Zhao Y et al. Establishment of reference intervals for thyroid stimulating hormone measurement by big data and indirect method in adults. Chin J Lab Med. 2021;44(7):62732.

Ma C, Cheng X, Xue F, Li X, Yin Y, Wu J, Xia L, Guo X, Hu Y, Qiu L, et al. Validation of an approach using only patient big data from clinical laboratories to establish reference intervals for thyroid hormones based on data mining. Clin Biochem. 2020;80:2530.

Article CAS PubMed Google Scholar

Pottel H, Vrydags N, Mahieu B, Vandewynckele E, Croes K, Martens F. Establishing age/sex related serum creatinine reference intervals from hospital laboratory data based on different statistical methods. Clin Chim Acta. 2008;396(12):4955.

Article CAS PubMed Google Scholar

Ammer T, Schtzenmeister A, Prokosch HU, Zierk J, Rank CM, Rauh M. RIbench. A proposed benchmark for the standardized evaluation of indirect methods for reference interval estimation. Clin Chem. 2022;68(11):141024.

Holmes DT, Buhr KA. Widespread Incorrect Implementation of the Hoffmann method, the correct approach, and modern alternatives. Am J Clin Pathol. 2019;151(3):32836.

Article CAS PubMed Google Scholar

Wang D, Ma C, Zou Y, Yu S, Li H, Cheng X, Qiu L, Xu T. Gender and age-specific reference intervals of common biochemical analytes in Chinese population: derivation using real laboratory data. J Med Biochem. 2020;39(3):38491.

PubMed PubMed Central Google Scholar

Wang D, Yu S, Zou Y, Li H, Cheng X, Qiu L, Xu T. Data mining: Seasonal fluctuations and associations between thyroid stimulating hormone and lipid profiles. Clin Chim Acta. 2020;506:1228.

Article CAS PubMed Google Scholar

Ichihara K, Boyd JC. An appraisal of statistical procedures used in derivation of reference intervals. Clin Chem Lab Med. 2010;48(11):153751.

Article CAS PubMed Google Scholar

Wayne PA. CLSI defining, establishing, and verifying reference intervals in the clinical laboratory; approved guideline. CLSI document EP28-A3c. 3rd ed. 2008.

Google Scholar

Ma C, Hou L, Zou Y, Ma X, Wang D, Hu Y, Song A, Cheng X, Qiu L. An innovative approach based on real-world big data mining for calculating the sample size of the reference interval established using transformed parametric and non-parametric methods. BMC Med Res Methodol. 2022;22(1):275.

Article PubMed PubMed Central Google Scholar

Ma C, Wang X, Xia L, Cheng X, Qiu L. Effect of sample size and the traditional parametric, nonparametric, and robust methods on the establishment of reference intervals: evidence from real world data. Clin Biochem. 2021;92:6770.

Article CAS PubMed Google Scholar

Zhai X, Zhang L, Chen L, Lian X, Liu C, Shi B, Shi L, Tong N, Wang S, Weng J, et al. An age-specific serum thyrotropin reference range for the diagnosis of thyroid diseases in older adults: a cross-sectional survey in China. Thyroid. 2018;28(12):15719.

Article CAS PubMed Google Scholar

Cappola AR. The Thyrotropin Reference Range Should Be Changed in Older Patients. JAMA. 2019;322(20):19612.

Article PubMed Google Scholar

Wang D, Yu S, Cheng X, Cao L, Zhang H, Liu L, Tang Y, Cai Q, Li P, Ma C, et al. Nationwide Chinese study for establishing reference intervals for thyroid hormones and related tests. Clin Chim Acta. 2019;496:627.

Article CAS PubMed Google Scholar

Haeckel R, Wosniok W. The importance of correct stratifications when comparing directly and indirectly estimated reference intervals. Clin Chem Lab Med. 2021;59(10):162833.

Ma C, Zou Y, Hou L, Yin Y, Zhao F, Hu Y, Wang D, Li L, Cheng X, Qiu L. Validation and comparison of five data mining algorithms using big data from clinical laboratories to establish reference intervals of thyroid hormones for older adults. Clin Biochem. 2022;107:409.

Article CAS PubMed Google Scholar

Go here to read the rest:

Utilization of five data mining algorithms combined with simplified ... - BMC Medical Research Methodology

Read More..

Europes top court clarifies GDPR compensation and data access rights – TechCrunch

Image Credits: Sirinarth Mekvorawuth / EyeEm / Getty Images

The European Unions top court has handed down a couple of notable rulings today in the arena of data protection.

One (Case C-300/21) deals with compensation for breaches of the blocs General Data Protection Regulation (GDPR); and the second (Case C-487/21) clarifies the nature of information that individuals exercising GDPR rights to obtain a copy of data held on them should expect to receive.

Read on for a summary of the judgments and some potential implications.

The CJEUs GDPR compensation ruling relates to a referral from an Austrian court where an individual sought to sue the national postal service for damages after it used an algorithm to predict the political views of citizens according to socio-demographic criteria without their knowledge or consent leaving the individual feeling exposed, upset and with a knock to their confidence, per the Courts press release.

As regards regional damages for privacy violations, there have been a number of attempts to bring class actionstyle suits seeking compensation for data protection breaches in recent years. This CJEU ruling may make it easier to do so within the EU, although the court has put one limit on such claims since the judges have ruled that just the fact of an infringement of the GDPR does not automatically give rise to a right of compensation meaning there is an onus on litigants to demonstrate personal harm.

At the same time, the CJEU has ruled there is no requirement for the nonmaterial damage suffered to reach a certain threshold of seriousness in order to confer a right to compensation.

So, in other words, the court has avoided setting a bar on how much/what type of harm needs to be demonstrated to file a compensation claim. Which looks like a big deal.

[T]he Court holds that the right to compensation is not limited to non-material damage that reaches a certain threshold of seriousness, it writes in a press release accompanying the judgment. The GDPR does not contain any such requirement and such a restriction would be contrary to the broad conception of damage, adopted by the EU legislature. Indeed, the graduation of such a threshold, on which the possibility or otherwise of obtaining that compensation woulda depend, would be liable to fluctuate according to the assessment of the courts seised.

Since the GDPR does not contain any rules for assessing damages, the judges say it is up to courts in EU Member States to define criteria for determining the extent of any compensation payable while noting that such rules must comply with GDPR principles of equivalence and effectiveness, so as to ensure individuals can obtain full and effective compensation for damages suffered.

This sets up for a patchwork of outcomes on damages for privacy breaches, depending on where in the EU a user is able to sue, based on how national courts interpret the mandate.

Commenting on the outcome in a statement, Peter Church, a counsel in the technology practice at law firm Linklaters, suggested: [I]t is possible that even minor anxiety or upset might justify a compensation claim. This in turn could open the way for not only frivolous or vexatious claims but also large class actions in the event of, for example, a data breach (which is currently the subject of separate pending decision in Case C-340/21).

He also predicted a divergence between the EU and the U.K. (which is no longer in the bloc) on this issue, given how back in 2021 the U.K.s Supreme Court ended up denying a long-running litigation against Google that had sought to skip the tricky step of demonstrating individual harm in favor of pressing for collective damages over privacy breaches related to ad tracking users of Apples Safari browser.

In that case, the U.K. judges concluded proof of harm was necessary and, per Church, that it must reach a threshold of seriousness to be eligible for compensation. Hence his prediction that the EU and the U.K. will part ways on this issue since the CJEU has decided there is no seriousness bar on the harm experienced.

So if you live in the EU and having your privacy violated by a data-mining giant like Meta has made you feel a bit annoyed, slightly upset, somewhat uneasy or a little alarmed, any of those sensations would, presumably, be enough to sue for damages. (And this summer member states are due to implement the Collective Redress Directive in national laws a piece of pan-EU legislation that aims to make it easier for consumers to achieve collective redress through class actionstyle litigation.)

Privacy rights group noyb, which has been behind scores of data breach complaints against giants like Meta and Google, reads the CJEU ruling as confirmation that claims for emotional damages are affirmed. In a statement, its founder and honorary chairman Max Schrems, wrote: We welcome the clarifications by the CJEU. A whole industry tried to reinterpret the GDPR, in order to avoid having to pay damages to users whose rights they violated. This seems to be rejected. We are very happy about the result.

In a separate ruling today, the CJEU has issued clarification around the scope and content of an individuals right of access under the GDPR to obtain an copy of their data deciding the regulations wording intends they obtain a faithful and intelligible reproduction of their data, in order they can conduct their own checks to ensure, for example, that their info is correct and being processed in a lawful manner.

The referral here relates to a legal challenge brought by an individual after a business consulting agency that provides data on the creditworthiness of third parties for its clients had processed his personal data. The person had asked for a copy of the documents about him in a standard technical format but had instead been provided with a list summarizing the data, not a complete copy.

That right [Article 15(3) of the GDPR] entails the right to obtain copies of extracts from documents or even entire documents or extracts from databases which contain, inter alia, those data, if the provision of such a copy is essential in order to enable the data subject to exercise effectively the rights conferred on him or her by the GDPR, bearing in mind that account must be taken, in that regard, of the rights and freedoms of others, the Court said in a press release.

It goes on to note that the data controller must take appropriate measures to provide the data subject with all their data in a concise, transparent, intelligible and easily accessible form, using plain and clear language, providing the information in writing or other means, including, where appropriate, electronically.

It follows that the copy of the personal data undergoing processing, which the controller must provide, must have all the characteristics necessary for the data subject to exercise his or her rights under that regulation effectively and must, consequently, reproduce those data fully and faithfully, the Court adds.

This ruling looks important for ongoing efforts to use the GDPR to shine a light on the often dysfunctional algorithmic management of platform workers such as legal challenges in recent years against Uber and Ola in the U.K. and the Netherlands brought by unions and the data trust, Worker Info Exchange, on behalf of a number of drivers, including over claims of robo-firing.

As we have reported, ride-hailing drivers have had limited success in obtaining their data via the GDPR access right route, with platforms blocking requests on security and privacy grounds and/or sending only partial information.

So it will be interesting to see if the CJEUs clarification that the right to a copy of data does actually mean a faithful copy bolsters such efforts in the future.

Albeit, the judgment touches on the issue of conflicting rights that is, between the right of full and complete access to personal data, and others rights or freedoms with judges saying a balance will have to be struck. So there could still be scope for platforms to keep pushing back.

Wherever possible, means of communicating personal data that do not infringe the rights or freedoms of others should be chosen, bearing in mind that the result of those considerations should not be a refusal to provide all information to the data subject, the Court adds in its press release.

See the original post here:

Europes top court clarifies GDPR compensation and data access rights - TechCrunch

Read More..

A Comprehensive Guide to K-12 Cybersecurity and Safety – Security Boulevard

Whether they take the form of a targeted attack or an accidental leak, cyber incidents are a major threat to the U.S. school system.

From public school districts to higher education and everywhere in between, malicious actors are chomping at the bit to get ahold of student data. Of course, hackers are just one part of the problem.

Education institutions are also struggling to keep personal information safe from internal cyber risk. Worse yet, transformative classroom technologies are making it harder than ever to uncover student safety signals and mitigate preventable incidents.

Luckily, its not hard to pinpoint the solution: Schools need insight into whats lurking behind the scenes, no matter whether thats a potential cyber attack or inappropriate content. The only problem? As it turns out, visibility isnt so easy to obtain.

Lets explore everything you need to know about K-12 cybersecurity and safety, including what your school district can do to better protect students from cyber risk.

At first glance, you might assume K-12 cybersecurity and cyber safety are one and the same. Indeed, both are concerned with student well-being, but theres a notable difference.

Specifically, cybersecurity involves proactively safeguarding sensitive information from a potential threat. This can include both internal and external cyber risk factors such as a student inappropriately accessing data on a school-provided device or a threat actor attempting a data breach.

On the other hand, cyber safety is more associated with ensuring students and staff members are safe from physical or emotional harm stemming from cyber incidents; the goal being to prevent such incidents in the first place. (Looking for an example? More on this later.)

The common denominator is that both are crucial in todays increasingly digital school district.

According to a recent report, the K-12 school system experienced a 275% increase in ransomware, 157% rise in malware, and 146% leap in IoT attacks all in 2022 alone.

In essence, that means malicious actors are targeting K12 schools at an accelerated rate. Why? Because theyre a goldmine of sensitive data. Whether youre a private or public school, chances are youre processing the following:

And, because your district has this information, its safe to say your edtech vendors do, too. When you allow vendors to access your data, youre entrusting them to mitigate cybersecurity risk. But, if their abilities are lacking, a third-party data breach could expose your student data at which point, anything could happen. Theres no telling how a threat actor might exploit your personal information.

Where safety is concerned, your school district must also be wary of how students and staff are using technology.

Despite their benefits, edtech tools and cloud applications especially arent always operated with the best intentions. For instance, a student may use a school-provided cloud resource (such as a Google Doc) to cyberbully a classmate. Another cyber risk to consider is that users could be using apps to share inappropriate content, such as pornography or depictions of graphic violence.

Not only are these incidents harmful to youths, but they also violate the Childrens Internet Protection Act (CIPA). CIPA requires you to implement internet security and safety policies for monitoring activity and blocking access to content deemed obscene, inappropriate, illegal, or harmful to minors.

Per the Federal Communications Commission, violating CIPA can result in your school district losing its E-Rate eligibility.

More than just school network or endpoint protection, education institutions are in dire need of cloud security.

Many districts rapidly adopted cloud services during the pandemic. According to CoSNs EdTech Leadership Survey, 97% are using some type of cloud-hosted learning management system. This corroborates our own research in collaboration with EdWeek, which found that over 90% of schools are using cloud domains like Google Workspace or Microsoft 365.

Unfortunately, as cloud technologies rose to the forefront of the school system, so did cybersecurity threat vectors of all shapes and sizes.

With the available data we saw a three-fold increase in cyber incidents affecting the K-12 education sector last year, said Doug Levin, co-founder and director of the K12 Security Information Exchange. That increase was due to the greater [uptick] of technology by schools and the exploitation of IT systems of third-party educational technology vendors that schools rely upon.

Whats important to remember is that remote learning isnt going anywhere. In fact, CoSNs 2022 report indicates that about quarter of schools offer hybrid learning options in the 2022-23 academic year.

Sadly, education institutions arent putting much of their budget into securing student data. When they do, most of their resources are put toward school network security not the cloud.

Consequently, theyre vulnerable to countless cloud-based attack strategies and risks. Lets unpack some of the most common ones:

Inappropriate and harmful behavior among students has long been a lingering problem in the U.S. school system. Although strides have been made over the years, recent tech developments are further stoking the flames of toxicity.

Of course, schools were struggling with cyberbullying well before they ever adopted cloud technology. But, with more digital channels in students hands than ever before, its becoming increasingly difficult to monitor, investigate, and prevent.

Its no surprise that toxicity comes in many forms. Whats more shocking is that there might be traces of them floating around your cloud domain.

K-12 cybersecurity isnt a walk in the park, but were here to help. Here are a few of our cybersecurity recommendations plus a few quick tips to help you shield your school district.

Its important for all users to understand their role and responsibility in keeping the district safe from cyber risk. Both students and staff should be trained on best practices. That way, everyone can do their part.

Here are a few tips you can use when safeguarding your district:

The biggest pain point IT administrators have is that they cant see the full scope of their cloud domain. A cloud monitoring tool can take you behind the scenes of whats really happening, unearthing previously hidden risks and enabling you to intervene.

DLP software is a cybersecurity tool that focuses on preventing critical information from being exposed. With DLP, you can implement custom policies or rules that users must follow when it comes to the cloud. If a student downloads an unsanctioned app, youll be notified right away of exactly whos involved and what actions they took. If someone is discussing suicide or self-harm, youll be similarly alerted and can implement the appropriate response protocol.

Sometimes, all you need is a buffer between your district and the cloud. Thats what CASB has to offer.

When you have a solution with CASB capabilities, you can insert an additional security layer that users must bypass before accessing cloud services. Cloud access security brokers are designed to give you more visibility into who has access to data and how they use it. That way, they can identify suspicious user activity and stop malicious actors in their tracks.

All things considered, K-12 cybersecurity isnt simple. A lot of factors are at play, and you need every advantage you can get to protect your students.

Luckily, thats what ManagedMethods is for. With our automated cloud security platform, you get all these capabilities rolled into one easy-to-use dashboard.

The post A Comprehensive Guide to K-12 Cybersecurity and Safety appeared first on ManagedMethods.

*** This is a Security Bloggers Network syndicated blog from ManagedMethods authored by Alexa Sander. Read the original post at: https://managedmethods.com/blog/a-comprehensive-guide-to-k-12-cybersecurity-and-safety/

Read more:
A Comprehensive Guide to K-12 Cybersecurity and Safety - Security Boulevard

Read More..