Page 1,352«..1020..1,3511,3521,3531,354..1,3601,370..»

How to ask OpenAI for your personal data to be deleted or not used to train its AIs – TechCrunch

Image Credits: Leon Neal / Getty Images

Users of ChatGPT in Europe can now use web forms or other means provided by OpenAI to request deletion of their personal data in order to stop the chatbot processing (and producing) information about them. They can also request an opt-out of having their data used to train its AIs.

Why might someone not want their personal data to become fodder for AI? There is a long list of possible reasons, not least the fact OpenAI never asked permission in the first place despite privacy being a human right. Put another way, people may be concerned about what such a powerful and highly accessible technology could be used to reveal about named individuals. Or indeed take issue with the core flaw of large language models (LLMs) making up false information.

ChatGPT has quickly shown itself to be an accomplished liar, including about named individuals with the risk of reputational damage or other types of harm flowing if AI is able to automate fake news about you or people close to you.

And just imagine what a highly trained mimic of how you personally converse might be able to do to you (or to your loved ones) were such an AI model to be misused.

Another batch of issues relate to intellectual property rights. If you have a white collar job you might be worried about generative AI driving push-button commercial exploitation of a particular writing style or some other core professional expertise which could make your own labor redundant or less valuable. And, again, the tech giants behind these AI models typically arent offering individuals any compensation for exploiting their data for profit.

You may also have a non-individual concern such as the risk of AI chatbots scaling bias and discrimination and simply wish for your information not to play any part.

Or perhaps you worry about the future of competitive markets and innovation if vast amounts of data continue to accumulate with a handful of tech giants in an era of data-dependent AI services. And while removing your own data from the pool is just a drop in an ocean its one way to register active dissent which could also encourage others to do the same scaling into an act of collective protest.

Additionally, you might be uncomfortable your data is being used so opaquely before more robust laws have been passed to govern how AI can be applied. So ahead of a proper legal governance framework for safe and trustworthy usage of such a powerful technology you may prefer to hold back your data; i.e. to wait until there are stronger checks and balances applied to generative AI operators.

While there are lots of reasons why individuals might want to shield their information from big data mining AI giants there are for now only limited controls on offer. And these limited controls are mostly only available to users in Europe where data protection laws do already apply.

Scroll lower down for details on how to exercise available data rights or read on for the context.

ChatGPT has been impossible to miss this year. The virality of the ask-it-anything general purpose AI chatbot has seen the tech travelling all over the mainstream media in recent months as commentators from across the subject spectrum kick its tyres and get wowed by a simulacrum of human responsiveness which, nonetheless, is not human. Its just been trained on lots of our web-based chatter (among other data sources) to function as an accomplished mimic of how people communicate.

However the existence of such a capable-seeming natural language technology has directed attention onto the detail of how ChatGPT was developed.

Notably, the buzz around ChatPT has drawn particular attention from privacy and data protection regulators in the European Union where an early intervention by Italys data protection watchdog at the end of March, acting on powers it has under the blocs General Data Protection Regulation (GDPR), led to a temporary suspension of ChatGPT at the start of last month.

A major concern raised by the watchdog is whether OpenAI used peoples data lawfully when it developed the technology. And it is continuing to investigate this question.

Italys watchdog has also taken issue with the quality of information OpenAI provides about how its using peoples data. Without proper disclosures there are questions about whether its meeting the GDPRs fairness and accountability requirements, too.

Additionally, the regulator has said its worried about the safety of minors accessing ChatGPT. And it wants the company to add age verification tech.

The blocs General Data Protection Regulation (GDPR) also provides people in the region with a suite of data control rights such as the ability to ask for incorrect info about them to be corrected or for their data to be deleted. And if weve learnt anything about AI chatbots over the last few months its how readily they lie. (Aka hallucinate in techno-solutionist speak).

Shortly after Italys DPA stepped in to warn OpenAI that it suspected a series of GDPR breaches, the company launched some new privacy tools giving users a button to switch off a chat history feature which logged all their interactions with the chatbot, saying this would result in conversations started when the history feature had been disabled not being used to train and improve its AI models.

That was followed by OpenAI making some privacy disclosures and presenting additional controls timed to meet a deadline set by the Italian DPA for it to implement a preliminary package of measures in order to comply with the blocs privacy rules. The upshot is OpenAI now provides web users with some say over what it does with their information although most of the concessions its offered are region-specific. So the first step to protecting your information from big data-driven AI miners is to live in the Europe Union (or European Economic Area), where data protection rights exist and are being actively enforced.

As it stands, U.K. citizens still benefit from the EU data protection framework being embedded in their national law so also have the full sweep of GDPR rights although the governments post-Brexit reforms look set to water down the national data protection regime, so it remains to be seen how the domestic approach might change. (U.K. ministers also recently signalled they dont intend to bring in any bespoke rules for applying AI for the foreseeable future.)

Beyond Europe, Canadas privacy commissioner is investigating complaints about the technology. Other countries have passed GDPR-style data protection regimes so powers exist for regulators to flex.

OpenAI has said that individuals in certain jurisdictions (such as the EU) can object to the processing of their personal information by its AI models by filling out this form. This includes the ability to make requests for deletion of AI-generated references about you. Although OpenAI notes it may not grant every request since it must balance privacy requests against freedom of expression in accordance with applicable laws.

The web form for making a deletion of data about you request is entitled OpenAI Personal Data Removal Request. Heres the link to it: https://share.hsforms.com/1UPy6xqxZSEqTrGDh4ywo_g4sk30

Web users are asked to provide it with their contact data and details of the data subject for whom the request is being made; the country whose laws apply in this persons case; to specify whether they are a public figure or not (and if the former, to provide more context about what type of public figure they are); to provide evidence of data processing in the form of prompts that generated responses from the model which mentioned the data subject and screenshots of relevant outputs.

Users are also asked to make sworn statements that the information provided is accurate and acknowledge that incomplete submissions may not be acted upon by OpenAI prior to submitting the form.

The process is similar to the right to be forgottenweb form Google has provided for years initially for Europeans seeking to exercise GDPR rights by having inaccurate, outdated or irrelevant personal data delisted from its search engine results.

The GDPR provides individuals with several rights other than requesting data deletion such as asking for their information to be corrected, restricted, or for a transfer of their personal data.

OpenAI stipulates that individuals can seek to exercise such rights over personal information that may be included in its training information by emailing dsar@openai.com. However the company told the Italian regulator that correcting inaccurate data generated by its models is not technically feasible at this point. So it will presumably respond to emailed requests for a correction of AI-generated disinformation by offering to delete personal data instead. (But if youve made such a request and had a respond from OpenAI get in touch by emailing tips@techcrunch.com.)

In its blog post, OpenAI also warns that it could deny (and/or otherwise only partially act on) requests for other reasons, writing: Please be aware that, in accordance with privacy laws, some rights may not be absolute. We may decline a request if we have a lawful reason for doing so. However, we strive to prioritize the protection of personal information and comply with all applicable privacy laws. If you feel we have not adequately addressed an issue, you have the right to lodge a complaint with your local supervisory authority.

How the company handles Europeans Data Subject Access Requests (DSARs) may determine whether ChatGPT faces a wave of user complaints which could lead to more regulatory enforcement in the region in future.

Since OpenAI has not established a local legal entity thats responsible for its processing of EU user data, watchdogs in any Member State are empowered to act on concerns on their patch. Hence Italys quick action.

Following the Italian DPAs intervention OpenAI revised its privacy policy to state that the legal basis it relies upon for processing peoples data to train its AIs is something thats referred to in the GDPR as legitimate interests (LI).

In its privacy policy, OpenAI writes that its legal bases for processing your Personal Information include [emphasis ours]:

Our legitimate interests in protecting our Services from abuse, fraud, or security risks, or in developing, improving, or promoting our Services, including when we train our models. This may include the processing of Account Information, Content, Social Information, and Technical Information.

There is still a question mark over whether relying on LI for a general purpose AI chatbot will be deemed an appropriate and valid legal basis for the processing under the GDPR, as the Italian watchdog (and others) continues to investigate.

These detailed investigations are likely to take some time before we have any final decisions which could, potentially, lead to orders that it stop using LI for this processing (which would leave OpenAI with the option of asking users for their consent, complicating its ability to develop the technology at the kind of scale and velocity it has to date). Although EU DPAs may ultimately decide its use of LI in this context is okay.

In the meanwhile, OpenAI is legally required to provide users with certain rights as a consequence of its claim to be relying upon LI notably this means it must offer a right to object to the processing.

Facebook was also recently forced to offer such an opt out to European users i.e. to its processing of their data for targeting behavioral ads also after switching to claiming LI as its legal basis for processing peoples information. (Additionally the company is facing a class action style lawsuit in the U.K. for its prior failure to offer an opt out for ad targeting processing, given the GDPR contains an absolute requirement for any data processing for direct marketing which perhaps goes some way to explaining OpenAIs keenness to emphasize its not in the same business as adtech giant Facebook, hence its claim that: We dont use data for selling our services, advertising, or building profiles of people we use data to make our models more helpful for people.)

In its privacy policy, the ChatGPT maker makes a passing acknowledgement of the objection requirements attached to relying on LI, pointing users towards more information about requesting an opt out when it writes: Seehere for instructions on how you can opt out of our use of your information to train our models.

This link opens to another blog post where it promotes the notion that AI will improve over time, at the same time as encouraging users not to exercise their right to object to the personal data processing by claiming that shar[ing] your data with us helps our models become more accurate and better at solving your specific problems and it also helps improve their general capabilities and safety. (But, well, can we call it sharing data if the stuff was already taken without asking?)

OpenAI then offers users a couple of choices for opting out their data out of its training: Either via (another) web form or directly in account settings.

You can opt out of your data being used to train its AI by filling in this web form which is for individual users of ChatGPT and called a User content opt out request.

Users can also disable training on their data via ChatGPT account settings (under Data Controls). Assuming they have an account.

But be warned! the settings route to opt out is replete with dark patterns seeking to discourage the user from shutting off OpenAIs ability to use their data to train its AI models.

(And in neither case is it clear how non-users of ChatGPT can opt out of their data being processed since the company either requires you have an account or requests your account details via the form; so weve asked it for clarity.)

To find the Data Controls menu you click on the three dots next to your account name at the bottom left of the screen (under the chat history bar); then click Settings; then click to Show the aforementioned Data Controls (nice dark pattern hiding this toggle!); then slide the toggle to switch off Chat History & Training.

To say OpenAI is discouraging users from using the settings route to opt out of training is an understatement. Not least because its linked this action to the inconvenience of losing access to your ChatGPT history. But the moment you toggle it back on your chats reappear (at least if you re-enable history within 30 days, per its previously disclosed data retention policy.)

Additionally, after youve disabled training the sidebar of your historical chats is replaced by a brightly colored button thats displayed around the eyeline which sits there permanently nudging users to Enable chat history. Theres no mention on this button that clicking it toggles back on OpenAIs ability to train on your data. Instead OpenAI has found space for a meaningless power button icon presumably as another visual trick to encourage users to power up the feature so it can regain access to their data.

Given that users who opt for the settings method to block training will lose ChatGPTs chat history functionality, submitting the web form looks to offer a better path since, in theory, you might be able to retain the functionality despite asking for your conversations not to be training fodder. (And, at the least, you have recorded your objection in a formal format which should perhaps count for more than toggling on/off a bright green button.)

That said, at the time of writing its not clear whether OpenAI will, in the case of objecting via the form, disable chat history functionality anyway, once its processed a web form submission asking for data not to be used for training AIs. (Again, weve asked the company for clarity on this point and will update this report if we get it.)

Theres a further caveat in OpenAIs blog post where it writes of opting out that:

We retain certain data from your interactions with us, but we take steps to reduce the amount of personal information in our training datasets before they are used to improve our models. This data helps us better understand user needs and preferences, allowing our model to become more efficient over time.

So its also not even clear what exact personal data are being firewalled from its training pool when users ask for their info not to be AI training fodder vs other types of information you input which it may still carry on processing anywayIn short, this smells like fudge. (Or whats known in the industry as compliance theatre.)

Thing is, the GDPR has a broad definition of personal data meaning its not just direct identifiers (such as names and email addresses) which fall under the regulations framework but many types of information that could be used and/or combined to identify a natural person. So that means another key question here is how much of a reduction is OpenAI actually applying to its data processing activities when users opt out? Transparency and fairness are other key principles within the GDPR. So these sorts of questions are likely to keep European data protection agencies busy for the foreseeable future.

The rest is here:

How to ask OpenAI for your personal data to be deleted or not used to train its AIs - TechCrunch

Read More..

First Person: The young leader bringing clean power to Tanzanian … – UN News

Mr. Kawago is the founder and Chief Technical Officer of WAGA, a company which produces solar lamps, power banks and mini-power walls, to help rural dwellers access off-grid clean and affordable energy for lighting and power solutions, and urban dwellers to cope with power cuts.

Currently, Mr. Kawago is working with Tanzanian radio station Wasafi FM, educating over 13 million people on solving digital problems and raising awareness of new technologies.

He spoke to UN News during the 2023 ECOSOC Youth Forum, which took place at the end of April.

Gibson Kawago, a member of UN Young Leaders class of 2022 from Tanzania standing in his workshop where he makes battery powered products from recycled lithium-ion batteries

Because there was no electricity in my village when I was growing up, those with mobile phones couldnt charge them when the battery ran out. So, I would bring five to 10 phones with me on a bicycle, and travel around thirty miles to the nearest town with power.

But sometimes it would take two days to recharge the phones, because there was a queue. This made it very hard for people to communicate with the outside world, but we had no choice.

This made want to find solutions to this problem, of living in a community that was not connected to the electricity grid. Thats why I set up Waga, but we work together with NGOs and the government to solve the problem together.

Gibson Kawago, Young Leader for the SDGs

I decided to get involved with Wasafi FM because radio is powerful. You can listen on the public transport, at home or on your mobile phone. And nowadays we can live stream online.

At the moment, I have a daily five-minute segment, where I share information about the latest trends in technology. I talk about things like internet security, explaining how young people can make their social media accounts more secure, because a lot of them dont know how to do this. I also teach them about phishing attacks, and how to protect themselves from hackers who will try to steal their accounts.

So, I educate them on how they can secure their accounts, but also I to get them on new technologies. There are so many technologies that me as gives them I have access to and have knowledge about. But those people living in rural places who listen to radios can't access the internet.

We often look to the bosses of big companies to change things, but we can also make a difference. At WAGA, we are also trying to help people to fight climate change in Tanzania with our e-mobility solutions. We make powerpacks, for example, that can turn regular motorbikes into electric bikes. But first we need to change peoples mindsets. They need to understand why its important to use electric bikes and, for that to happen, they need to be educated.

Young people have a lot of potential to change the world. And, as we have seen at the Youth Forum, although we come from many different backgrounds, we are united in our common aim, to achieve the Sustainable Development Goals.

The world makes a road for those who know where they are going. And we know where we are going.

Excerpt from:
First Person: The young leader bringing clean power to Tanzanian ... - UN News

Read More..

Navigating the threat landscape: The growing menace of cybercrime – Security Magazine

Navigating the threat landscape: The growing menace of cybercrime | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website Uses CookiesBy closing this message or continuing to use our site, you agree to our cookie policy. Learn MoreThis website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more.

Continue reading here:

Navigating the threat landscape: The growing menace of cybercrime - Security Magazine

Read More..

Phishing Protection in Anti-Virus Products and Browsers: New AV-Comparatives Results Revealed – EIN News

Phishing Protection in Anti-Virus Products and Browsers: New AV-Comparatives Results Revealed

AV-Comparatives Announces Latest Anti-Phishing Test Results: McAfee, Trend Micro, Bitdefender and Avast with highest protection

Read the full report here: https://www.av-comparatives.org/wp-content/uploads/2023/05/gen_phishing_04-2023.pdf

AV-Comparatives conducted the test using up-to-date products that were tested in parallel and with active internet/cloud access on Windows 10. The antivirus products tested included Avast Free Antivirus, Avira Free Security, Bitdefender Internet Security, ESET Internet Security, Kaspersky Standard, Malwarebytes Premium, McAfee Total Protection, Microsoft Defender, and Norton 360 Deluxe. The browsers tested were Avast Secure Browser, Google Chrome, Microsoft Edge, Mozilla Firefox, and Opera.

The test used 250 valid phishing URLs, and the number of clean URLs for false alarm detection was also 250. The results showed that McAfee Total Protection, Trend Micro Internet Security, Bitdefender Internet Security, and Avast Free Antivirus had the highest block rate at 95 to 97%. Microsoft Defender with Chrome Plugin had a block rate of 77%, while Malwarebytes Premium had a block rate of only 57%. In terms of false alarms, Avira Free Security had the most with 3, while McAfee Total Protection and Norton 360 Deluxe each had 2.

It is worth noting that anti-phishing protection is crucial for all operating systems and IoT devices. Cybercriminals can use phishing attacks to steal personal and financial information, install malware, and cause other types of damage. By using effective anti-phishing protection, users can reduce their risk of falling victim to these types of attacks.

AV-Comparatives will continue to conduct tests to evaluate the effectiveness of anti-phishing protection and other cybersecurity solutions. Users can use these test results to make informed decisions about which products to use to protect themselves from cyber threats.

About AV-Comparatives AV-Comparatives is an independent testing lab that evaluates and rates anti-virus software, internet security suites, and other cybersecurity products based on their performance, protection, and usability. The organisation is ISO certified and recognised as a reliable and independent source of information by end users, consumers, and the cybersecurity industry as a whole.

For more information, visit https://www.av-comparatives.org

Disclaimer: Gen Digital supported the test. The selection of products was done independently by AV-Comparatives, and all vendors were treated equally. Neither Gen Digital nor any other tested vendor was pre-informed about the test date or given any further insights, in order to eliminate any potential advantage, influence or bias. AV-Comparatives is ISO-certified for the scope of "Independent Tests of Anti-Virus Software".

Peter StelzhammerAV-Comparatives+43 512 287788media@av-comparatives.orgVisit us on social media:FacebookTwitterLinkedIn

Phishing Protection in Anti-Virus Products and Browsers: New AV-Comparatives Results Revealed

Read more:
Phishing Protection in Anti-Virus Products and Browsers: New AV-Comparatives Results Revealed - EIN News

Read More..

Tech forum to highlight bird migration | News, Sports, Jobs – Daily Mining Gazette

By CHRISTIE MASTRIC

For the Mining Gazette

HOUGHTON More than half of the 836 U.S. species of migratory birds are in decline. Since 1970, U.S. songbirds have declined 30%, which is almost 3 billion birds gone.

Seventy-eight species are now considered as threatened while 14 are listed as endangered.

These sobering statistics, provided by service forester Gary Willis of the Michigan Department of Natural Resources Customer Service Center in Baraga, indicate that further action is needed.

A Bird Migration Forum is set for 6 to 9 p.m. May 9 at 135 Fisher Hall at Michigan Technological University. Giving the opening and closing remarks will be DNR wildlife biologist John DePue. Research associate Joseph Youngman will talk about Migration of Waterbirds, Raptors and Passerines through the Keweenaw Peninsula while Jennifer Owen, associate professor at Michigan State University, will talk about Birds and Berries: The Importance of Native Fruit-Bearing Shrubs for Migrating Land Birds and the Challenges Migratory Birds Face as They Navigate a Changing Landscape.

This event is the latest in a fascinating series of Wildlife Through Forestry forums held in the western Upper Peninsula since 2017, said John Pepin, DNR deputy public information officer.

These sessions link wildlife topics to the numerous ways habitat for birds and animals may be developed and enhanced for a range of species on private lands, Pepin said in a news release.

The greatest threat to birds and all wildlife continues to be loss and/or degradation of habitat due to human development and disturbance, the DNR said. For migratory birds and other species that require multiple areas for wintering, breeding and stop-over points, the effects of habitat loss can be complex and far-reaching.

Proactive habitat enhancement across the landscape creates a healthier environment for animals and people, the DNR said, and researchers are determining those factors essential for migratory bird survival.

The purpose of the Bird Migration Forum is to bring awareness of the plight of migratory bird populations and provide instruction direct from researchers so that the landowner/homeowner can take decisive action to enhance the habitat on their land, the DNR said. The forum also will include a summary of bird migration and population numbers in the Keweenaw Peninsula.

Scientists are pointing to the success of waterfowl and waterbird recoveries over the same time that are the direct result of research and resulting conservation efforts to restore and protect wetlands, Willis said. Swift conservation action can bring at risk birds back from the brink of extinction.

Speaker backgrounds

Owen has extensively studied avian diseases and the vectors of transmission. She has conducted comparative research on the effects of invasive plant versus native plant communities on migrating bird and leads a Michigan State University research team that is partnering with colleagues from the U.S. and other countries to develop bio-surveillance plans for the U.S. Department of Defense to monitor and prevent infectious disease spread by migratory birds.

Since 1955, Youngman has studied bird migration to and through the western Upper Peninsula and has collected field data for numerous ornithological studies on the Keweenaw Peninsula and Isle Royale.

Michigan Tech Professor David Flaspohler, interim dean of the School of Forest Resources and Environmental Science, also will speak at the forum. His research and teaching focus on understanding how human activities influence animal and plant populations. He has studied migratory birds in the upper Midwest as well as Hawaii, Costa Rica, Mexico, Argentina and Brazil.

The forum is free and open to the public.

Today's breaking news and more in your inbox

Originally posted here:

Tech forum to highlight bird migration | News, Sports, Jobs - Daily Mining Gazette

Read More..

RF Test Equipment Market Is Expected To Witness an Upsurge In … – Digital Journal

PRESS RELEASE

Published May 5, 2023

The Global RF Test Equipment Market Research Report, which was recently released, provides a detailed assessment of key and emerging players in the industry. The report showcases company profiles, product/service offerings, market prices, and sales revenue to better estimate the market size.

This RF Test Equipment market research report assists businesses in making informed decisions, tackling tough business questions, and reducing the risk of failure. The competitive analysis carried out in this market report highlights the moves of key players in the industry, such as new product launches, expansions, agreements, joint ventures, partnerships, and recent acquisitions. By understanding and taking into account customer requirements, one or a combination of many steps has been taken to create this excellent RF Test Equipment market research report.

The report also highlights current and future market trends and analyzes the impact of buyers, substitutes, new entrants, competitors, and suppliers on the market. The report provides estimations on market status, growth rate, future trends, market drivers, opportunities, challenges, entry barriers, risks, sales channels, and distributors. The key research methodology employed by the DBMR research team is data triangulation, which involves data mining, analysis of the impact of data variables on the market, and primary (industry expert) validation. The Global RF Test Equipment market report includes company profiles of major market players and brands.

Radio frequency (RF) test equipment market is expected to gain market growth in the forecast period of 2022 to 2029. Data Bridge Market Research analyses the radio frequency (RF) test equipment market to exhibit a CAGR of 5.38% for the forecast period of 2022 to 2029.

Request A Sample PDF Brochure + All Related Graphs & Charts @ https://www.databridgemarketresearch.com/request-a-sample/?dbmr=global-rf-test-equipment-market

The rising adoption of wireless network in buildingcommunicationsystem and the surging penetration of modular instrumentation will emerge as the major factor driving market growth. The various growth determinants such as the increasing applications of internet of technology based devices from various economies and introduction of mimo technologiesare estimated to boost the overall growth of the market for the forecast period of 2022 to 2029. In addition to this, the factors such as its increased used for various purposes, such as activating cruise control systems and GPSnavigation systemsand other characteristic technologies will further aggravate the market value for the forecast period of 2022 to 2029. On the other hand, the flexibility and size issues, evolution of RF standards and loner timelines, act as a restraint for the market.

List of Key Players Profiled in the study includes market overview, business strategies, financials, Development activities, Market Share and SWOT analysis:

Some of the major players operating in the radio frequency (RF) test equipment market report are ROHDE&SCHWARZ, Keysight Technologies, Fortive., Anritsu, NATIONAL INSTRUMENTS CORP., Cobham Limited, EXFO Inc., Teradyne Inc., VIAVI Solutions Inc., Giga-tronics Incorporated., Yokogawa Test & Measurement Corporation, CHROMA ATE INC., Good Will Instrument Co., Ltd., B&K Precision Corporation, Keysight Technologies, Infinite Electronics International, Inc., ERA Instruments, Freedom Communication Technologies., and Saluki Technology among others.

Data Source & Research Methodology:

Data collection and base year analysis are done using data collection modules with large sample sizes. The market data is analyzed and estimated using market statistical and coherent models. In addition, market share analysis and key trend analysis are the major success factors in the market report. The key research methodology used by the DBMR research team is data triangulation which involves data mining, analysis of the impact of data variables on the market, and primary (industry expert) validation. Apart from this, data models include Vendor Positioning Grid, Market Time Line Analysis, Market Overview and Guide, Company Positioning Grid, Company Market Share Analysis, Standards of Measurement, GCC Vs Regional, and Vendor Share Analysis. Please request an analyst call in case of further inquiry.

Against challenges Faced by Industry, RF Test Equipment Market Study discusses and shed light on:

The resulting overview to understand why and how the Global RF Test Equipment Market is expected to change.

Where the RF Test Equipment industry is heading and what are the top priorities. To elaborate it, DBMR turned to the manufacturers to draw insights like financial analysis, the survey of RF Test Equipment companies, and from interviews with upstream suppliers and downstream buyers and industry experts.

How RF Test Equipment Company in this diverse set of players can best navigate the emerging new industry landscape and develop strategy to gain market position.

Know More about the Study | Visit @ https://www.databridgemarketresearch.com/reports/global-rf-test-equipment-market

Key Market Segmentation

Radio frequency (RF) test equipment market on the basis of product has been segmented as oscilloscopes, signal generators, spectrum analyzers, network analyzers and others.

Based on type, the radio frequency (RF) test equipment market has been segmented into modular GP instrumentation, traditional GP instrumentation, semiconductor ATE, rental GP and other types.

On the basis of form factor, the radio frequency (RF) test equipment market has been segmented into benchtop, portable and modular.

On the basis of application, the radio frequency (RF) test equipment market has been segmented into telecommunications, consumer electronics, automotive, industrial, aerospace and defense, medical and research and education.

The radio frequency (RF) test equipment market has also been segmented on the basis of frequency into less than 1 GHz, 1 GHz to 6 GHz and more than 6 GHz.

This comprehensive report provides:

Browse Summary and Complete Table of Content @ https://www.databridgemarketresearch.com/toc/?dbmr=global-rf-test-equipment-market

Explore Trending Reports By DBMR

https://www.databridgemarketresearch.com/reports/global-gallium-nitride-gan-radio-frequency-rf-semiconductor-market

https://www.databridgemarketresearch.com/reports/global-infrastructure-inspection-market

https://www.databridgemarketresearch.com/reports/global-aerospace-fluid-conveyance-systems-market

https://www.databridgemarketresearch.com/reports/global-private-cloud-migration-market

https://www.databridgemarketresearch.com/reports/global-alloy-safety-valve-market

https://www.databridgemarketresearch.com/reports/global-automotive-plastics-for-electrical-vehicle-market

https://www.databridgemarketresearch.com/reports/global-high-performance-computing-as-a-service-hpcaas

https://www.databridgemarketresearch.com/reports/global-fully-autonomous-delivery-robots-market

https://www.databridgemarketresearch.com/reports/global-automotive-weather-strips-market

https://www.databridgemarketresearch.com/reports/global-automation-as-a-service-market

https://www.databridgemarketresearch.com/reports/global-mica-based-flexible-heater-market

https://www.databridgemarketresearch.com/reports/global-cloud-communication-platform-market

https://www.databridgemarketresearch.com/reports/global-art-capacitive-stylus-market

https://www.databridgemarketresearch.com/reports/global-ftir-portable-spectrometer-market

https://www.databridgemarketresearch.com/reports/global-automotive-wheel-rims-market

https://www.databridgemarketresearch.com/reports/global-smart-highway-market

https://www.databridgemarketresearch.com/reports/global-variable-rate-precision-farming-market

https://www.databridgemarketresearch.com/reports/global-vibration-energy-harvesting-market

https://www.databridgemarketresearch.com/reports/global-smart-waste-management-market

https://www.databridgemarketresearch.com/reports/global-automotive-pressure-plates-market

About Data Bridge Market Research, Private Ltd

Data Bridge Market ResearchPvtLtdis a multinational management consulting firm with offices in India and Canada. As an innovative and neoteric market analysis and advisory company with unmatched durability level and advanced approaches. We are committed to uncover the best consumer prospects and to foster useful knowledge for your company to succeed in the market.

Data Bridge Market Research has over 500 analysts working in different industries. We have catered more than 40% of the fortune 500 companies globally and have a network of more than 5000+ clientele around the globe. Our coverage of industries includes

Contact Us

US: +1 888 387 2818UK: +44 208 089 1725Hong Kong: +852 8192 7475Email [emailprotected]

Read more from the original source:

RF Test Equipment Market Is Expected To Witness an Upsurge In ... - Digital Journal

Read More..

Your Internet Browser and the Secrets They Keep – Arise News

Web browsers are an essential tool for accessing the internet and all the information and resources it has to offer. However, many users may not be aware of the secrets that browsers keep without their knowledge.

One of the biggest secrets that browsers keep is your browsing history. Every website you visit is recorded and stored in your browsers history, which can be accessed by anyone who has access to your device. This can be a concern for users who want to keep their browsing activity private.

Browsers also store cookies, which are small files that contain information about your browsing activity. Cookies can be used by websites to remember your preferences and login information, but they can also be used for tracking purposes, which can be a privacy concern.

Another secret that browsers keep is your search history. When you use a search engine, your search terms are recorded and stored in your browsers history. This can be a concern for users who want to keep their search activity private, as search terms can reveal a lot about a users interests and personal information.

Browsers also store cache files, which are temporary files that are used to speed up website loading times. However, these files can also contain sensitive information, such as images and other media that you may have viewed.

In addition to these secrets, browsers may also have vulnerabilities that can be exploited by hackers and other malicious actors. This can put your personal and sensitive information at risk, including login credentials and other personal data.

To protect your privacy and security while using a browser, there are several steps you can take. You can regularly clear your browsing history and cache files, use a virtual private network (VPN) to encrypt your internet traffic, and use privacy-focused browser extensions and settings.

When it comes to browsing the internet, security and privacy are two of the most important considerations for users. Heres a comparison of the security and privacy features of some of the top best browsers:

In conclusion, browsers keep many secrets without your knowledge, including your browsing history, cookies, search history, and cache files. These secrets can put your privacy and security at risk, so its important to take steps to protect yourself while using a browser.

Each of these top best browsers offers unique security and privacy features, and the best choice for you will depend on your individual needs and preferences. Its important to regularly update your browser and take steps to protect your privacy and security while browsing the internet.

George Ogunleye

See the original post here:
Your Internet Browser and the Secrets They Keep - Arise News

Read More..

The 2023 National Cybersecurity Strategy: How Does America Think … – Middle East Institute

Read in PDF

Background

On March 2, 2023, the Biden administration released the new National Cybersecurity Strategy, replacing the 2018 Trump administration Cybersecurity Strategy. The new strategy builds on the previous one, continuing the momentum on many of its priorities while seeking to carry forward and evolve many of the strategic efforts originally initiated by the 2008 Comprehensive National Cybersecurity Initiative.

Dividing the strategy into five pillars, the Biden administration focuses on defending critical infrastructure, disrupting and dismantling threat actors, shaping market forces to drive security and resilience, investing in a resilient future, and forging international partnerships to pursue shared goals.

The new strategy underlines two fundamental shifts: rebalancing the responsibility to defend cyberspace and realigning incentives to favor long-term investments. It takes a fresh look at the balance between the government and the private sector in terms of roles and responsibilities toward mitigating cyber risks. It recognizes the present realities where the end users bear a disproportionate burden for reducing such risks and, in an ambitious outlook change, seeks a legislative mechanism to enforce liability on providers when they fail to meet basic security standards. While underlining the governments role to protect its own systems and engage in diplomacy, law enforcement, and the collection of intelligence, the strategy places an emphasis on the need for private entities to protect their systems.

The Biden administration's strategy highlights the need to make substantial public sector investments in the sector to assure that the U.S. continues to stay ahead of the curve in modern technology and innovation, maintaining its global leadership role. For this, the Biden administration deems it necessary to incentivize decision-making while balancing short-term imperatives against a long-term vision.

An Overview of the Priorities in Five Pillars

1.Defend Critical Infrastructure

2.Disrupt and Dismantle Threat Actors

3. Shape Market Forces to Drive Security and Resilience

4.Invest in a Resilient Future

5.Forge International Partnerships to Pursue Shared Goals

Decoding the Strategy: What Does it All Mean?

Focus on Public-Private Cooperation

The strategy underlines that the industry and government must drive effective and equitable collaboration to correct market failures, minimize the harm from cyber incidents to society's most vulnerable members, and defend the shared digital ecosystem. It appreciates the commitments made by private sector entities to engage in collaborative defense efforts like the "Shields Up" campaign, which preceded the beginning of the ongoing Russia-Ukraine war, to proactively increase preparedness and promote effective measures to combat malicious activity.

The strategy encourages private sector partners to come together and organize efforts through one or more non-profit organizations that can serve as hubs for operational collaboration with the federal government.

This collaborative approach is of great interest to countries worldwide struggling to evolve a robust mechanism for policy inputs. Those working to craft a national cybersecurity strategy can benefit from policy inputs from non-profits through a structural and institutionalized framework. As countries look to decide whether or not to adopt strict data localization policies, factors like the identification of gaps in authorities to drive better cybersecurity practices in the cloud computing industry and other third-party services will be of great value. This is where expanded collaboration can play an important role.

Focus on Investments

Assuring the continued U.S. leadership in technology and innovation, the new strategy reemphasizes that a resilient and flourishing digital future tomorrow begins with investments made today. Toward this goal, it states that the federal government must leverage strategic public investments in innovation, R&D, and education to drive outcomes that are economically sustainable and serve the national interest.

The Biden administration also seeks to support non-governmental standards developing organizations (SDOs) to partner with industry leaders, international allies, academic institutions, and professional societies to secure emerging technologies. In particular, it aims to secure three families of technologies: quantum computing and AI, biotechnology, and clean energy. This investment focus will likely resonate in countries engaged in developing their own technology and governance visions for the decade ahead.

Calling Out Adversaries

The new strategy puts the spotlight on the governments of Russia, China, Iran, North Korea, and other autocratic states with revisionist intentions that are aggressively using advanced cyber capabilities to pursue objectives that run counter to accepted international norms as well as against U.S. interests.

It calls out the Peoples Republic of China as the broadest, most active, and most persistent threat to government and private sector networks and the only country with both the intent to reshape the international order and, increasingly, the economic, diplomatic, military, and technological power to do so.

It highlights that Russia remains a persistent cyber threat, refining its cyber espionage, attack, influence, and disinformation capabilities to coerce sovereign countries; harboring transnational criminal actors; aiming to weaken U.S. alliances and partnerships; and subverting the rules-based international system. It further recognizes the growing sophistication and willingness of the governments of Iran and North Korea to carry out malicious activities in cyberspace. The new strategy highlights the immediate need to counter further advances in both countries capabilities, underlining in particular Irans use of its cyber capabilities to threaten U.S. allies in the Middle East, chief among them Israel and the Arab Gulf states, and both Iran and North Koreas exploitation of cyberspace and cryptocurrency platforms to generate revenues to help reduce fiscal deficits caused by severe Western sanctions.

In recent years, the U.S. has along with allies like the U.K. and Australia taken an active stance toward public and collective attribution of malicious activities in cyberspace. As it looks toward expanding partnerships, Washington can aim to bring closer countries like India that face similar threats, but do not yet have an attribution framework or a clearly defined policy.

Focus on Values and Foundations

The core theme of the new strategy is an ambition for the further values-driven development of the digital ecosystem. It stresses that the U.S. must seize the opportunity to instill its most cherished values, as embodied by the Declaration for the Future of the Internet (DFI) and the Freedom Online Coalition, in future cyberspace governance models.

Taking note of the inherently vulnerable nature of cyberspace, it emphasizes the need to make fundamental changes to the underlying dynamics of the digital ecosystem, shifting the advantage to its defenders and frustrating the forces that would threaten it.

Focus on Resilience

The strategy states that the Biden administration is committed to improving federal cybersecurity through long-term efforts to implement a zero-trust architecture strategy and modernize IT and OT infrastructure. In doing so, it hopes that the federal cybersecurity program can be a model for critical infrastructure across the U.S. for how to successfully build and operate secure and resilient systems.

Along with this, the Biden administration seeks to embark on a clean-up effort to reduce systemic risks and the most pressing security challenges, without disrupting the existing platforms and services. This includes the technical foundations of the digital ecosystem, which are inherently vulnerable.

Considering the long-standing pioneer position of the U.S. in terms of digital innovation and in shaping the contours of cyber policies, how the U.S. government aspires to re-envision, re-shape, and re-vitalize this ecosystem will be critical for all countries.

Focus on Offensive Approach for Deterrence

The strategy states that the U.S. will use all of its instruments of national power to disrupt and dismantle threat actors whose actions threaten its interests. These efforts may integrate diplomatic, information, military (both kinetic and cyber), financial, intelligence, and law enforcement capabilities.

It complements the Department of Defense's strategic approach, as laid out in the 2018 Cyber Strategy, of defending forward, stating that it has helped generate insights on threat actors, identify and expose malware, and disrupt malicious activity before it could affect its intended targets.

As active offense increasingly becomes the operational norm, countries worldwide might deem it necessary to refine and expand their capabilities. This could potentially lead to an accelerating arms race in the near future.

Focus on Threat Monitoring and Intelligence Sharing

The new strategy recognizes the need to increase the speed and scale of cyber threat intelligence sharing to proactively warn cyber defenders and notify victims when the government has information that an organization is being actively targeted or may already be compromised. It affirms that the federal government will work with cloud and other internet infrastructure providers to quickly identify malicious use of U.S.-based infrastructure, share reports of malicious use with the government, make it easier for victims to report abuse of these systems, and make it more difficult for malicious actors to gain access to these resources in the first place.

Focus on Ransomware

Acknowledging ransomware's impact on key critical infrastructure services, the new strategy states that the U.S. will employ all elements of national power to counter the threat by leveraging international cooperation to disrupt the ransomware ecosystem, investigating crimes to disrupt infrastructure and actors, bolstering critical infrastructure resilience to withstand attacks, and addressing the abuse of virtual currency to launder ransom payments.

It highlights that the White House has convened the Counter-Ransomware Initiative (CRI) with participation from more than 30 countries.

Focus on Legislative Reform and Regulations

Underscoring that regulation can level the playing field and enable healthy competition without sacrificing cybersecurity or operational resilience, the Biden administration deems it vital that the new and updated cybersecurity regulations be calibrated to meet the needs of national security and public safety, harmonized to reduce duplication, complementary to public-private collaboration, and cognizant of the cost of implementation.

The strategy states that regulations should be performance-based, leverage existing cybersecurity frameworks and international standards in a manner consistent with current policy and law, and when necessary, pursue cross-border regulatory harmonization to prevent cybersecurity requirements from impeding digital trade flows.

The administration supports legislative efforts to impose robust, clear limits on the ability to collect, use, transfer, and maintain personal data and aims to work with Congress and the private sector to develop legislation that establishes liability for software products and services.

With an increasing number of high-impact ransomware and other cyberattacks in recent years, cyber insurance has become a critical focus around the world. As private insurers continue to recalibrate their strategies to avoid overexposure to risk in cases of catastrophic mass-scale cyber events, there are growing calls for a greater federal role, including in the provision of insurance, in response to such events. The new strategy states that the federal government could be called upon to stabilize the economy and facilitate recovery and that the administration will assess possible federal insurance structures to support the cyber insurance market.

Focus on Capacity Building

The strategy highlights the hundreds and thousands of unfilled vacancies in cybersecurity positions nationwide and resolves to develop a national strategy to strengthen the U.S. cyber workforce. Recognizing that recruiting and training the next generation of cybersecurity professionals will require federal leadership, the document lays out plans to develop a National Cyber Workforce and Education Strategy to take a comprehensive and coordinated approach to expanding the national cyber workforce, improving its diversity, and increasing access to cyber educational and training pathways.

Establishing an effective cybersecurity workforce has been a thorn in the side of almost every country in the world. Standing as the lone cyber superpower, how the U.S. tackles this challenge will remain of great interest to all others.

Focus on International Partnerships

As the world watches the accelerating tech decoupling between the West and China, the focus on international partnerships is bound to take on increasing significance.

Aiming to rejuvenate U.S. cyber diplomacy on international platforms, the new strategy reinforces the applicability of existing international law and calls for upholding globally accepted voluntary norms of responsible state behavior during peacetime in cyberspace. It reaffirms the focus on securing global supply chains and commits to building on the National Strategy to Secure 5G in collaboration with partners around the globe. This underlines the U.S. commitment to international partnerships on cyber issues, emphasizing the importance of working with allies and partners to build a defensible, resilient, and values-aligned digital ecosystem. The strategy highlights that, through multilateral mechanisms like the Quad, AUKUS, Indo-Pacific Economic Framework for Prosperity, and the Americas Partnership for Prosperity, the U.S. and its international allies and partners are advancing shared goals for cyberspace.

Taking note of the supply chain disruptions during the pandemic, the new strategy aims to secure global supply chains for ICT and OT products and services. Considering the emerging tech war and decoupling between China on the one hand and the West and many of its partners on the other, the new strategy mentions that the U.S. is partnering with allies to develop trustworthy and reliable supply chains for 5G and other critical technologies.

Data-Driven Implementation

The new strategy states that the U.S. is laying the foundations for real-time global collaboration by leveraging vast amounts of data and computing power that will unlock scientific discoveries. The federal government will take a data-driven approach toward the implementation of the new strategy and will measure investments made, progress toward implementation, ultimate outcomes, and the effectiveness of these efforts.

Opportunities for Partners and Allies in the Middle East

The U.S. cybersecurity strategy provides a framework for Washington to collaborate with its Middle Eastern partners in sharing threat intelligence and other critical information with the aim of identifying and addressing potential cyber attacks before they occur. Additionally, the U.S. can help build up its Middle Eastern partners' cyber capabilities through training and technical assistance, including establishing cyber defense teams, improving network security, and sharing cybersecurity best practices. In an even more advanced level of cyber cooperation, regional partners and the United States could jointly conduct cyber exercises to enhance their capabilities and coordination in responding to cyber attacks from malicious actors. The U.S. could also work closely with regional partners to develop norms of behavior for cyberspace, promote regional cooperation on cybersecurity, and address the malicious use of cyber tools.

Conclusion

The National Cybersecurity Strategy 2023 should be recognized as the product of U.S. ambitions to continue to shape the future of global cyberspace, which is highly dependent on U.S. infrastructure. The highlighted themes and objectives are consistent with how Washington is navigating the global technological decoupling and will surely support the U.S.s economic resilience and cybersecurity in an age of multipolar global disorder. As recognized in the strategy, national cybersecurity cannot be future-proofed, and the governments response to current threats and those not yet conceived will rely on the ability of government agencies, regulators, the private sector, and users to collaborate on the Biden administrations approach.

In looking forward, implementation will be a key concern for this strategy and its impact on tech manufacturers, service providers, and users. The successful implementation of this strategy will dictate the security and resilience of U.S. cyberspace and also shape broader dynamics, as allies look to follow suit and adversaries look to use cyber tools to threaten U.S. security. The potential for the strategy to result in inclusive regulation will depend on how quickly and effectively lawmakers and the private sector can align on the tenets of the Biden administrations approach. Considering the diversity of ways in which private sector entities are relevant to the strategy and its proposed policy approaches, this could be simple in some areas but remain complex in most.

Divyanshu Jindal is a Non-Resident Scholar with MEIs Strategic Technologies and Cyber Security Program and a Research Associate at NatStrat, India. His work focuses on the geopolitics of tech and cyber and Indias cyber diplomacy.

Mohammed Soliman is the director of MEIs Strategic Technologies and Cyber Security Program, and a Manager at McLarty Associates MENA Practice. His work focuses on the intersection of technology, geopolitics, and business in emerging markets.

Photo by Celal Gunes/Anadolu Agency via Getty Images.

The Middle East Institute (MEI) is an independent, non-partisan, non-for-profit, educational organization. It does not engage in advocacy and its scholars opinions are their own. MEI welcomes financial donations, but retains sole editorial control over its work and its publications reflect only the authors views. For a listing of MEI donors, please click here.

Visit link:
The 2023 National Cybersecurity Strategy: How Does America Think ... - Middle East Institute

Read More..

Uranium speculation comes knocking on Bears Ears’ doorstep – Salt Lake Tribune

(Neal Clark | Southern Utah Wilderness Alliance) Harts Point, located northwest of Monticello just outside Bears Ears National Monument, is being eyed for uranium development by two Canadian companies that say they hold 324 mining claims and permits from the BLM to drill 25 exploratory wells here.

| May 5, 2023, 3:21 p.m.

| Updated: 10:12 p.m.

Two Canadian uranium mining companies on Tuesday announced plans to drill 25 exploratory wells on the edge of Bears Ears National Monument, raising the possibility of large-scale industrial development on some of the nations most sensitive lands without much in the way of environmental review.

Atomic Minerals Corp. holds 324 mining claims covering 6,480 acres of public land at Harts Point in San Juan County, northwest of Monticello, according to a company news release that announces a binding agreement with a second firm called Kraken Energy to develop the claims. Both companies are headquartered in Vancouver, B.C. and their shares are traded on Canadian exchanges.

(Christopher Cherrington | The Salt Lake Tribune)

Claiming this land could hold some of the nations richest uranium deposits, Atomic says it already holds permits from the Bureau of Land Management for the wells which can be drilled once a $58,000 bond is posted.

The announcement stunned Utah wilderness advocates who say the project highlights so much that is wrong with the nations antiquated mining laws.

You have an operator who, with very minimal notice and very minimal review, can go out, literally a stones throw from Bears Ears, and drill 25 wells, said Landon Newell, a staff attorney with the Southern Utah Wilderness Alliance. Thats crazy.

Last October, Atomic Minerals announced its U.S. subsidiary Recoupment Exploration Co. LLC staked the 324 20-acre uranium claims at Harts Point. The claims were staked under the 1872 Mining Law, enacted at a time when the government prioritized mineral development over other uses on public land.

Federal land managers are on record declaring that the 1872 Mining Law gives them no choice but to permit mining, no matter if the land is better used for recreation, conservation, renewable energy, or even fossil fuel extraction, states EarthWorks, a nonprofit devoted to reforming the law, in a policy statement. Loose regulations allow mining companies to come in, dig riches out of the ground, and leave the mess. Too often, taxpayers not the polluters are paying for cleanup.

Newell contends the Canadian uranium companies are relying on outdated and irrelevant reports to support speculation that uranium deposits worth mining exist at Harts Point.

They are trying to make themselves sound important to drive investor interest, Newell said. They are acting like they found the mother load, at the same time they are threatening one of the most scenic landscapes in all of Utah and doing it without public involvement or agency review.

The BLM could not provide timely comment for this story. An Atomic Minerals officer did not respond to a voicemail.

The uranium boom of yesteryear inflicted a legacy of well-documented toxic exposures on tribal communities in the Four Corners region still felt to this day. It would be ironic for the federal government to now allow industry to develop new uranium assets on public lands the Navajo, Ute and Hopi tribes consider sacred without any tribal consultation.

Harts Point is located on land these tribes had originally proposed for inclusion in Bears Ears National Monument.

The companies announcements, which are aimed at potential investors, make no mention of the claims proximity to the 1.3-million-acre national monument designated in 2016 by President Barack Obama to protect the regions countless archaeological sites. The controversial designation came at the request of Native American tribes with cultural and ancestral ties to the landscape in San Juan County.

But the companies did highlight the Harts Points proximity to the nations only operating uranium mill, located 40 road miles away in White Mesa.

Why does Atomic Minerals say uranium could be found here?

According to company chairman Garrett Ainsworth, data from three oil and gas wells drilled decades ago show off-scale radioactivity, indicating that deposits could be analogous to the once-productive Lisbon Valley mining district, about 19 miles to the west.

The Lisbon district, where up to 17 mines operated between 1948 and 1988, yielded 80 million pounds of ore containing 0.34% uranium oxide, according to the companies news releases.

Newell dismissed the companys conclusions as speculation.

They looked at old well data, the core samples, and they see theres allegedly this world-class amount of uranium, Newell said. Thats just pure speculation, because the wells are 50 years old. Theyre dry holes and theyve been public knowledge forever. So anybody could have looked at these.

Get the latest news by subscribing to ourOpen Lands newsletter. Enter your email belowto receive more stories like these right to your inbox.

The drilling will target the Chinle Formation, between 1,200 and 1,400 feet below the surface, which company officials suspect is harboring rich ores. During the uranium boom in the 1950s, this formation was tapped by four mines 7 miles west of Harts Point in what was then known as the Upper Indian District.

With drilling permits in place and targets selected at Harts Point, our team is eager to begin work on this property in the most prominent uranium mining jurisdiction in the United States, said Kraken CEO Matthew Schwab in Krakens news release.

Under the agreement between the two companies, Kraken is to spend $1.5 million developing the play within 18 months to earn a 65% stake in the claims, and another $2 million within 30 months to secure a 75% stake. The resulting mines would be operated as a joint venture between Kraken and Atomic Minerals.

View original post here:

Uranium speculation comes knocking on Bears Ears' doorstep - Salt Lake Tribune

Read More..

Cyber Security in Pakistan: Government Initiatives and Internet … – Dispatch news Desk

Internet technology in Pakistan has grown rapidly creating a digital revolution. As a result, the social and economic growth of the country has also greatly improved. But unfortunately, it has also made the country vulnerable to new threats, specifically, when it comes to cybersecurity. Lately, cyber-attacks have become more rampant, costly, and sophisticated. It does not only affect individuals but government institutions and businesses as well. Here, we are going to explore cybersecurity in Pakistan including the challenges and improvements that need to be done.

The digital economy in Pakistan is continuously expanding. In fact, there are over 100 million internet users in the country. At the same time, the number of e-commerce businesses has also grown. Pakistan has a sluggish approach toward cybersecurity and social media and recently, there is an increase in cybersecurity incidents. In fact, in 2020 alone, there was a 300 percent increase in cyber-attacks.

Is cyber security important to Pakistan?, Unfortunately, Pakistans cybersecurity is facing a lot of challenges due to several factors. One of its major challenges is the peoples lack of understanding about cybersecurity. Most internet users in the country are not implementing cybersecurity measures, such as keeping their software and applications up to date, using strong passwords, or using VPNs. There are a lot of VPNs out there but unveiling ExpressVPNs security and speed keeps you protected.

The lack of resources and expertise is also another challenge in Pakistans cybersecurity. Most organizations do not have sufficient funds, making them unable to invest in expertise and cybersecurity infrastructure. Due to this lack of resources, these organizations became exposed to cyber threats since they cant protect themselves against these attacks.

Another crucial challenge is the absence of cybersecurity laws and regulations in the country. Currently, the laws and regulations in Pakistan do not provide substantial protection against cyber threats. As a result, individuals and businesses have become more vulnerable to cyber-attacks.

Despite having a lot of challenges in the cybersecurity infrastructure of Pakistan, there is still a lot of room for improvement. For instance, increasing awareness about cybersecurity among the general public. This can be accomplished by launching education and training programs so that the people will know what are the basic cybersecurity measures and how they can protect themselves against cyber attacks.

Another way is to encourage businesses to invest funds for expertise and cybersecurity infrastructure. This can help in protecting your business against financial damage caused by cyber-attacks. It can also make your company competitive and reputable, as a result, customers will be impressed since you are taking cybersecurity seriously.

One of the major concerns of individuals, businesses, and the government of Pakistan is their cybersecurity infrastructure. This is because cyber-attacks can likely lead to serious financial damage. At the same time, it can also greatly affect the reputation of the company. Unfortunately, the current cybersecurity infrastructure of the country is not sufficient enough to address the increasing cyber threats. However, there are ways that this can be improved such as investing in expertise and cybersecurity infrastructure, extending awareness, and most of all strengthening laws and regulations. By accomplishing these necessary steps, Pakistan can enjoy a safer and more secure digital environment.

Read more from the original source:
Cyber Security in Pakistan: Government Initiatives and Internet ... - Dispatch news Desk

Read More..