Page 144«..1020..143144145146..150160..»

Stand Alone Cloud Storage Market size is set to grow by USD 97.40 billion from 2024-2028, Reduced capital and … – PR Newswire

NEW YORK, June 5, 2024 /PRNewswire/ -- The globalstand alone cloud storage marketsize is estimated to grow by USD 97.40billion from 2024-2028, according to Technavio. The market is estimated to grow at a CAGR of 30.08% during the forecast period.

For comprehensive forecast and historic data on regions, market segments, customer landscape, and companies- Click for the snapshot of this report

Forecast period

2024-2028

Base Year

2023

Historic Data

2018 - 2022

Segment Covered

End-user (Large enterprises and SMEs), Type (Public, Private, and Hybrid), and Geography (North America, APAC, Europe, South America, and Middle East and Africa)

Region Covered

North America, APAC, Europe, South America, and Middle East and Africa

Key companies profiled

Alphabet Inc., Amazon.com Inc., AT and T Inc., Atos SE, Cloudian Inc., Cognizant Technology Solutions Corp., Dell Technologies Inc., Egnyte Inc., Fidelity National Information Services Inc., Fujitsu Ltd., Hewlett Packard Enterprise Co., International Business Machines Corp., Iron Mountain Inc., Lumen Technologies Inc, Microsoft Corp., Navisite LLC, Quantum Corp., Rackspace Technology Inc., Samsung Electronics Co. Ltd., and Unitied Internet AG

Key Market Trends Fueling Growth

Hybrid stand-alone cloud storage systems offer organizations the ability to manage data effectively by combining the benefits of in-house and public cloud storage. These systems provide improved data management, enhanced IT infrastructure flexibility, and better security and compliance.

As businesses continue to adopt cloud computing, hybrid systems will become increasingly popular due to their cost-effectiveness and seamless workload transition capabilities. With a focus on modernizing applications and retaining business functionalities, the hybrid stand-alone cloud storage market is expected to experience significant growth during the forecast period.

The stand-alone cloud storage market is experiencing significant growth, with technologies like object storage and compression playing key roles. Companies are investing in secure, cost-effective solutions for data management. The use of advanced technologies such as artificial intelligence and machine learning is increasing, enabling automatic data classification and retrieval.

The demand for scalability and flexibility is driving the adoption of cloud storage solutions. Additionally, the trend towards remote work and digital transformation is accelerating the shift towards cloud-based storage systems. Overall, the market for stand-alone cloud storage is expected to continue growing, offering businesses innovative and efficient ways to manage their data.

MarketChallenges

The Stand Alone Cloud Storage Market faces restrictions due to data privacy regulations. These laws require financial firms to protect personal data and allow regulatory authorities access. However, the cloud model's inability to clearly identify and locate physical data storage hinders compliance with some regulations, such as the German Federal Data Protection Act. This limitation may hinder market growth during the forecast period.

The Stand Alone Cloud Storage market faces several challenges. Data security is a major concern, as companies need to ensure their information is protected from unauthorized access and cyber attacks. Cost is another challenge, as businesses must balance the need for affordable storage solutions with the requirement for high levels of security and reliability.

Scalability is also important, as companies need to be able to easily increase or decrease their storage capacity as their needs change. Additionally, interoperability between different cloud storage providers can be a challenge, making it difficult for businesses to seamlessly move data between systems. Finally, compliance with various regulations, such as HIPAA and GDPR, adds complexity to the use of cloud storage.

Research report provides comprehensive data on impact of trend, driver and challenges-Download a Sample Report

Segment Overview

1.1Large enterprises- The Stand Alone Cloud Storage market is experiencing significant growth due to increasing business demand for secure and flexible data management solutions. Companies are adopting stand-alone cloud storage systems to store and manage their data, enabling remote access and collaboration. This shift is driven by the need for scalability, cost savings, and enhanced security features. Businesses of all sizes are embracing stand-alone cloud storage as a strategic tool to streamline operations and improve overall efficiency.

For more information on market segmentation with geographical analysis including forecast (2024-2028) and historic data (2018 - 2022) - Download a Sample Report

Research Analysis

In the current economic climate, the stand-alone cloud storage market continues to experience robust adoption among business enterprises. This trend is driven by the proliferation of data generation and the need for secure, scalable, and seamless monitoring of data. Cloud storage offers convenience and customization, making it an attractive option for enterprise users seeking to reduce their CAPEX and OPEX compared to traditional on-premises storage. Cloud resources, including those from Alibaba Cloud and Microsoft, provide low-cost solutions for data storage, enabling revenue growth for businesses.

The cloud storage market also caters to the increasing demand for technology development in sectors such as gaming and entertainment, remote work, IoT, big data, and agile environments. Edge computing further enhances cloud storage capabilities, ensuring efficient and secure handling of malware and other cybersecurity threats. Overall, the stand-alone cloud storage market offers a cost-effective, flexible, and secure solution for managing and protecting data in today's digital landscape.

Market Research Overview

The Stand Alone Cloud Storage market refers to on-demand digital storage services provided over the internet without the need for local servers or personal computers. This technology offers numerous benefits such as scalability, accessibility, and cost-effectiveness. Companies and individuals can store and manage large volumes of data securely and retrieve it from anywhere at any time.

The market is witnessing significant growth due to the increasing adoption of digital transformation and the need for remote work solutions. Additionally, advancements in technology, such as artificial intelligence and machine learning, are driving innovation in the field, enabling more efficient and automated data management. The market is expected to continue expanding as more businesses and individuals recognize the benefits of cloud storage solutions.

Table of Contents:

1 Executive Summary 2 Market Landscape 3 Market Sizing 4 Historic Market Size 5 Five Forces Analysis 6 Market Segmentation

7Customer Landscape 8 Geographic Landscape 9 Drivers, Challenges, and Trends 10 Company Landscape 11 Company Analysis 12 Appendix

About Technavio

Technavio is a leading global technology research and advisory company. Their research and analysis focuses on emerging market trends and provides actionable insights to help businesses identify market opportunities and develop effective strategies to optimize their market positions.

With over 500 specialized analysts, Technavio's report library consists of more than 17,000 reports and counting, covering 800 technologies, spanning across 50 countries. Their client base consists of enterprises of all sizes, including more than 100 Fortune 500 companies. This growing client base relies on Technavio's comprehensive coverage, extensive research, and actionable market insights to identify opportunities in existing and potential markets and assess their competitive positions within changing market scenarios.

Contacts

Technavio Research Jesse Maida Media & Marketing Executive US: +1 844 364 1100 UK: +44 203 893 3200 Email:[emailprotected] Website:www.technavio.com/

SOURCE Technavio

See the rest here:
Stand Alone Cloud Storage Market size is set to grow by USD 97.40 billion from 2024-2028, Reduced capital and ... - PR Newswire

Read More..

Hacker Claims That Snowflake Cloud Storage Was the Third Party Compromised in the Ticketmaster Data Breach – CPO Magazine

Rumors have been swirling that the Ticketmaster data breach reported last week was caused by compromise of a third party vendor, but there was initially no word of who it might have been. A hacker with the threat group ShinyHunters appears to have confirmed the attack to a security research firm and claims that cloud storage company Snowflake, which is used by numerous major corporations, is the source of the breach.

Snowflake says that it has performed a security review and found that the credentials of a demo account belonging to a former employee were recently used for unauthorized access by a threat actor, but that account did not have access to sensitive data or to the companys production or corporate systems. The company denies that it is the responsible party in the Ticketmaster data breach, and the security firm that posted the story has since removed it from its blog without explanation. But the Australian government has also since issued a direct warning to Snowflake customers that it has become aware of a successful compromise of several companies that use its environments.

A blog post from Israeli security firm Hudson Rock claimed that the company had been in contact with a hacker from ShinyHunters, who confirmed both the Ticketmaster data breach and a hack on Spains Santander Bank. ShinyHunters had already been openly offering the stolen data from these incidents for sale on BreachForums, the underground forum the group is a part owner-operator of, but the new element to the story was the claim that Ticketmaster was breached by way of Snowflake.

Snowflake caters to enterprise needs and has over 9,400 customers, which include Fortune 500 firms and some of the largest companies in the world. ShinyHunters claimed to have breached a number of these other companies as part of the action: Allstate, Anheuser-Busch, Progressive, Neiman Marcus and Mitsubishi among them. In total the threat actor claimed to have breached about 400 of Snowflakes customers.

The hackers were also forthcoming with technical details, claiming that the Ticketmaster data breach can be blamed on stolen credentials for a Snowflake employees ServiceNow account. The credentials were obtained by infecting the employee with Infostealer malware back in October. This access apparently allowed the attackers to generate valid session tokens providing them with further access to thousands of Snowflake clients. The hacker provided Hudson Rock with screenshots appearing to support this level of access to Snowflakes European servers.

ShinyHunters also claimed that they demanded a $20 million ransom from Snowflake for the Santander and Ticketmaster data breaches, but that the company would not communicate with them. The group is thought to have separately attempted to ransom Ticketmaster before putting the stolen data up for sale at a price of $500,000.

Snowflake has thus far acknowledged the breach of a former employees account, but has downplayed the damage and suggested that the stolen data is not legitimate. The fact that Hudson Rocks blog post disappeared without explanation over the weekend has made the story more hazy, but there are other strong indicators that Snowflake has been compromised and that the Ticketmaster data breach (and likely Santander and the others that were claimed) is related.

After the stolen information was posted for sale on the dark web, independent security research team VX-Underground claimed to have made contact with someone from ShinyHunters and confirmed that a third party vendor breach was the cause. The Australian Cyber Security Centre (ACSC) has since issued a warning of increased threat activity targeting Snowflake customers and advised them to take security precautions, and Mandiant Consulting CTO Charles Carmakal has told media sources that the company has been assisting unspecified Snowflake customers with breaches for several weeks now.

While the Ticketmaster data breach has yet to be formally acknowledged by the company, Santander has confirmed that it has been breached. This has left many in the cybersecurity community waiting for the other shoe to drop, so to speak, under the assumption this is another breach in the manner of the MOVEit incident about a year ago that will ultimately prove to have impacted many of Snowflakes downstream customers. ShinyHunters is seeking $20 million for the data stolen from Santander, which includes account and credit card numbers for tens of millions of customers in Spain, Chile and Uruguay as well as internal information about bank employees.

The original Hudson Rock post was archived by the Wayback Machine before being taken down. The company has yet to answer multiple media queries about why the post was removed. While Snowflake is still only admitting to limited damage at this time, it has issued a recommendation to clients to enforce MFA on all accounts and reset and rotate their credentials.

Brian Soby, CTO and co-founder at AppOmni, sees the Ticketmaster data breach and associated attacks as yet another incident that makes the case for zero trust architecture: The incident playing out at Snowflake is due to the same issue were seeing across the market: Companies are not incorporating the security of their SaaS applications into their security architectures Were seeing incident after incident due to companies implementing SSO or Zero Trust solutions like SSE/SASE, but not going far enough to secure the applications themselves. As demonstrated again today, these partial solutions not integrating SaaS Security Posture Management (SSPM) fail to stop a major source of modern data breaches. Incomplete solutions can be trivially bypassed in the vast majority of cases because of poor application security posture and do not allow organizations to leverage behavioral detections for their SaaS applications provided by an SSPM that would have quickly identified a login with stolen credentials.

Go here to read the rest:
Hacker Claims That Snowflake Cloud Storage Was the Third Party Compromised in the Ticketmaster Data Breach - CPO Magazine

Read More..

Cloud Storage Market is Projected to Grow at a CAGR of 20.5% During the Forecast period of 2024-2032 – openPR

Cloud Storage Market

It examines the latest trends and forecasts the market's growth trajectory from 2023 to 2030. With the proliferation of data and the need for efficient storage solutions, businesses are increasingly turning to cloud storage to enhance their operational efficiency and reduce costs.

: https://www.marketdigits.com/request/sample/228

The Cloud Storage Market is Valued USD 110 billion in 2024 and is projected to reach USD 683.3 billion by 2032, growing at a CAGR of 20.5% During the Forecast period of 2024-2032.

Research Methodology: Our research methodology is a blend of primary and secondary research, ensuring comprehensive and accurate market insights. Primary research involves interviews with industry experts, surveys, and feedback from key stakeholders. Secondary research includes extensive analysis of industry reports, company websites, annual reports, and proprietary databases. The data collected is then validated through triangulation methods to provide reliable and actionable insights.

The Report Offers: Market Overview and Segmentation: Detailed insights into the market structure, including segmentation by type (public, private, hybrid), deployment model, organization size, and industry vertical. Market Dynamics: Analysis of key drivers, restraints, opportunities, and challenges influencing the market growth. Competitive Landscape: Comprehensive profiles of leading market players, including their market share, product offerings, strategies, and recent developments. Regional Analysis: In-depth analysis of the market across key regions - North America, Europe, Asia-Pacific, Latin America, and Middle East & Africa. Market Forecast: Detailed market size projections and growth rate forecasts for the next seven years, supported by quantitative and qualitative analysis.

! https://www.marketdigits.com/request/enquiry-before-buying/228

Major Classifications are as follows:

By Component Solution Service

By Deployment Model Public Cloud Private Cloud Hybrid Cloud

By Application Primary Storage Backup and Disaster Recovery Archiving

By Organization size Small and Medium Businesses (SMBs) Large Enterprises

By Vertical Banking, Financial Services, and Insurance (BFSI) Government and Public Sector Healthcare Manufacturing Consumer Goods and Retail Telecommunication and IT Travel & Hospitality Media & Entertainment Others

Why Should Access to This Report?

Strategic Insights: Gain a competitive edge with detailed market intelligence and strategic recommendations. Market Opportunities: Identify potential growth areas and investment opportunities within the cloud storage market. Informed Decision-Making: Make data-driven decisions backed by extensive research and analysis. Risk Mitigation: Understand the challenges and risks in the market to develop effective mitigation strategies. Industry Expertise: Leverage insights from industry experts and comprehensive market analysis to stay ahead of market trends.

@ https://www.marketdigits.com/request/customization/228

Final Thought: The cloud storage market is evolving rapidly, with significant advancements and innovations driving its growth. This comprehensive report equips businesses, investors, and stakeholders with the knowledge and insights needed to navigate the market landscape effectively. By understanding the market dynamics and future trends, stakeholders can make informed decisions and capitalize on emerging opportunities. Access to this report is essential for anyone looking to gain a deeper understanding of the cloud storage market and leverage its potential for sustainable growth.

MarketDigits 1248 CarMia Way Richmond, VA 23235, United States. USA: +1 847 450 0808 Email: sales@marketdigits.com Web: https://www.marketdigits.com

MarketDigits is one of the leading business research and consulting companies that helps clients to tap new and emerging opportunities and revenue areas, thereby assisting them in operational and strategic decision-making. We at MarketDigits believe that a market is a small place and an interface between the supplier and the consumer, thus our focus remains mainly on business research that includes the entire value chain and not only the markets.

We offer services that are most relevant and beneficial to the users, which help businesses to sustain themselves in this competitive market. Our detailed and in-depth analysis of the markets catering to strategic, tactical, and operational data analysis & reporting needs of various industries utilize advanced technology so that our clients get better insights into the markets and identify lucrative opportunities and areas of incremental revenues.

This release was published on openPR.

See original here:
Cloud Storage Market is Projected to Grow at a CAGR of 20.5% During the Forecast period of 2024-2032 - openPR

Read More..

How to Perform Cloud Sync in Only 3 Steps? – TechiExpert.com

In the past decade, more and more people have been willing to use cloud storage space to save all important files, including memories, videos, photos, work documents, email, design files, and more. Its quite easy for you to access anywhere and anytime because you can access them online as long as you have a stable Internet connection.

Compared with local devices, cloud storage has these benefits, more affordable, scalable, accessible, and restorable. If you want more local disk space, you have to buy more hard disks at an high price and it faces the risk of disk failure, virus attacks, electric outage, and other threads. You can restore data quickly from the cloud storage instead of a hard disk. Thus, cloud sync is essential for all of us to make files safe.

Although you store files on a cloud service, most of them provide limited free cloud space, like 2GB (Dropbox), 5GB (OneDrive), 10GB (Box), 15GB (Google Drive), 20GB (MEGA), etc. Its not enough for daily use, so you might have multiple cloud accounts, or upgrade to an advanced plan to enjoy more cloud space.

If you use multiple cloud storage spaces, and you have to manage files in multiple locations, which makes it difficult to manage, you may need to move files from one cloud to another cloud for several reasons, like backup, separate storing, centralized management, and more. Regardless of the reason, how to perform cloud sync to sync files between clouds, or sync files to the cloud or vice versa?

Dont worry, here you can find the best free cloud sync tool for you to achieve that goal, lets get started to explore.

If you are looking for the best free way to move files between clouds directly without downloading, its highly recommended to try the cloud file manager MultCloud. Here are the reasons:

So, how it works to sync files from one cloud to another with the best free cloud file manager, check out the following information.

Here, we will show you to sync Google Drive to OneDrive with the Cloud Sync feature of MultCloud, take it for reference:

1. Please add Google Drive and OneDrive subsequently by clicking Add Cloud after registering and logging in.

2. Tap Cloud Sync > Real Time Sync, choose Google Drive files as the source, and a directory in OneDrive as the target.

3. Press the Sync Now to sync Google Drive to OneDrive in real time.

Tips:

Its a piece of cake for MultCloud to perform cloud sync, only few clicks, it can migrate everything from one cloud to another directly and quickly. Besides, it allows you to sync files from your devices to the cloud. So, why not give it a try now?

See the original post:
How to Perform Cloud Sync in Only 3 Steps? - TechiExpert.com

Read More..

All-flash leads NetApp revenues higher Blocks and Files – Blocks & Files

NetApps latest quarterly revenues swelled higher led by all-flash array demand.

Revenues rose for the third successive time to $1.67 billion in the fourth quarter of NetApps fiscal 2024, ended April 26, 2024, up 6 oercent and exceeding its guidance mid-point. There was a $291 million profit, up 18.8 percent annually, and NetApps 25th successive profitable quarter. This Kurian-led cash machine is so consistent. The all-flash array annual run rate (ARR) beat last quarters record to reach $3.6 billion, with $850 million AFA revenues in the quarter.

Full fy2024 revenues of $6.27 billion were 1 percent down Y/Y with profits of $986 million down 2.2 percent Y/Y.

Hybrid cloud revenues of $1.52 billion in the quarter rose 6.3 percent, basically driving the business. Cloud revenues, meaning public cloud, remain depressingly low at $152 million, a miniscule 0.7 percent higher Y/Y as the Anthony Lye-led buying spree still fails to deliver meaningful revenue increases.

CEO George Kurians results quote said: We concluded fiscal year 2024 on a high note, delivering company records for annual gross margin, operating margin, EPS, operating cash flow, and free cash flow and building positive momentum. In fiscal year 2025, we will remain laser focused on our top priorities of driving growth in all-flash and cloud storage services while maintaining our operational discipline.

NetApp probably has the best public cloud storage service offerings of all the storage suppliers, with its data fabric spanning the on-prem ONTAP world, and SW instantiations on AWS, Azure and GCP, and Blue XP hybrid cloud storage monitoring and management services. Yet significant demand has proved almost illusory and its competitors, notably, Dell, HPE and Pure are slowly but steadily catching up. Indeed Pure has a big announcement coming in this area next month.

Kurian pointed out NetApps public cloud progress in the earnings call, saying: In Q4, we had a good number of takeouts of competitors on-premises infrastructure with cloud storage services based on NetApp ONTAP technology, which helped drive our best quarter for cloud storage services with each of our hyperscaler partners. We are well ahead of the competition in cloud storage services and we are innovating to further extend our leadership position.

He referred to expected public cloud revenue growth, saying: We expect that cloud first-party and marketplace cloud storage should continue to ramp strongly, which will deliver overall growth in cloud, consistent revenue growth in cloud in fiscal year 25, stronger in the second half than in the first half.

Quarterly financial summary

NetApp widened the gap between its own all-flash array revenues and Pure Storage:

The AFA revenues were singled out by Kurian saying: Strong customer demand for our broad portfolio of modern all-flash arrays, particularly the C-series capacity flash and ASA block optimized flash, was again ahead of our expectations.

A look at NetApps quarterly revenue history shows that it reversed the lower Q1 and Q2 revenues this fiscal year with higher ones in Q3 and Q4 to end the year pretty much level pegging with the previous one:

Just like its competitors NetApp is seizing the AI opportunity in front of it, positioning itself as a provider of the data infrastructure foundation for enterprise AI.

Kurian said: Customers choose NetApp to support them at every phase of the AI lifecycle due to our high performance all-flash storage complemented by comprehensive data management capabilities that support requirements from data preparation, model training and tuning, retrieval-augmented generation or RAG, and inferencing, as well as requirements for responsible AI including model and data versioning, data governance and privacy. We continue to strengthen our position in enterprise AI, focusing on making it easier for customers to derive value from their AI investments.

He then said: We had about more than 50 AI wins in Q4 across all elements of the AI landscape I talked about, both in data foundations like data lakes as well as model training and inferencing across all of the geographies. I would tell you that in the AI market, the ramp on AI servers will be much ahead of storage because what clients our doing is theyre building new computing stacks but using their existing data. And so we expect that over time there will be a lot more data created and unified to continue to feed the model. But at this stage, we are in proof of concept. We think that theres a strong opportunity over time for us and all of the AI growth is factored into our guidance for next year.

He reckons that: AI is the opportunity that will become much more meaningful over time. We are well positioned with the huge installed base of unstructured data, which is the fuel for GenAI, and we are focused on helping customers do in-place RAG and inferencing of that data.

Next quarters revenue outlook is $1.455 to $1.605 billion, a $1.53 billion mid-point which would be a 7.0 percent annual rise. The full fiscal 2025 revenue outlook is $6.45 to $6.65 billion, with the $6.5 billion mid-point representing a 4.5 percent Y/Y increase and NetApps highest ever annual revenue.

This would end NetApps 11-year failure to beat its fy2013 $6.332 billion highpoint. George Kurian became CEO in 2015 and reaching a record revenue highpoint in fy2025, after 10 years in office would be quite a satisfying feat.

Wedbush analyst Maat Bryson told subscribers: Q1 and FY25 guidance both presented upside vs. prior Street expectations, while managements tendency towards conservatism, likely means that NTAP will eventually deliver results closer to the high end of the new forecast.

Here is the original post:
All-flash leads NetApp revenues higher Blocks and Files - Blocks & Files

Read More..

How to get the Legendary Khvostov and all Lost Encryption locations in Destiny 2 – Polygon

Khvostov, the fan-favorite auto rifle from the original Destiny, makes its exciting return in Destiny 2s The Final Shape expansion. Sporting a new look and some fancy new tricks like ricocheting bullets, Khvostov is sure to see a lot of use.

As of this writing, the Exotic version of Khvostov has yet to be discovered but players have found a Legendary version, which is heavily assumed to be a requirement for the Exotic.

Even until then, the process of how to unlock the Legendary variant of Khvostov can be a little confusing, so well break it down below, including where to find all of the region chests and Lost Encryption Bits for the new Pale Heart of the Traveler location.

The steps to get the Khvostov in Destiny 2 are as follows:

We can currently only obtain the Legendary version of Khvostov; once we know how to get the Exotic, well update this guide.

Here is every quest step in further detail:

You start the Khvostov quest by collecting the Lost Encryption Bits from the Region Chests and scans from the Cyst missions making 15 in total.

Nine golden region chests are scattered throughout three of the Pale Heart of the Travelers load zones. The Landing, the Blooming, and The Impasse each hold three chests. Well go over each location below.

The first region chest is found just south of The Landing Transmat location. Travel to The Landing and head down to the building embedded in the rock wall.

Use the rocks to jump into the room, as shown in the image above. The chest is located at the back of that room.

The second region chest is located in the tunnels near the right side of The Landing zone. Travel to the location highlighted on the map.

Enter the tunnels and jump down the large hole in the center. Land on the platform shown above, where youll find the chest.

The third and final region chest for The Landing area is in the waterfall below one of the large bridges. Travel to the location highlighted on the map above.

Jump down behind the waterfall to find the chest.

The first Blooming region chest is directly behind the Transmat zone for the area. To reach it, travel to the area on the map and use the tunnel in the nearby rock wall.

Walk to the back of the area. The chest is up on the ledge shown in the above image.

The second Blooming region chest is in the large tree on the north side of the load zone.

Climb to the top to claim the chest.

The third and final Blooming region chest is just to the west of the second chest.

Look to the west from the tree, and you will see the chest along the cliff edge.

The first region chest in The Impasse region is in the large schism on the north side of the area.

Head to the location shown on the map and jump down to claim the chest.

The second chest is on top of the large white structure on the east side of the map.

Climb up to claim the chest.

The third and final region chest is in a small cave near the lost sector. Head to the location on the map and find the cave shown above.

Right inside, youll find the last region chest.

There are six Cyst Missions spread throughout the Pale Heart of the Traveler. You first unlock these by completing the Alone in the Dark mission for Micah-10. You can collect the Lost Encryption Bits from these first versions of the missions, but if you miss them, you can see them on the map and complete them again. Youll be looking for a pile of random technology that allows you to interact with it.

After you complete the mission, go over the lava as you normally would to exit.

Once you get off of the lava, look to your right. There is a small cubby tucked away where youll find the pile of technology.

Once you complete the mission, go through the mouth-like cave shown above. Youll find the pile of tech inside to the right.

Once you enter the mission, go forward until you reach the room with the large Orge. (Its one of the first rooms.) Kill the Orge and jump down as far as you can. The pile of tech is found in one of the small rooms on the right.

Once you complete the mission, look for the room with the purple glow. Enter it and go to the left. Youll find the pile of technology behind the rock.

Once you complete the mission, look for the room above, framed by tree roots. Walk into the room to find the pile of technology.

Go through the mission until you reach the above room. Youll know you're in the right place because there will be a large Orge you must kill. Jump down to the area highlighted above, use the sword relic to destroy the debris blocking the way, and scan the pile.

Once you collect all 15 Lost Encryption Bits, youll be granted the Lost Encryption Code. Travel to the Impasse. Make your way West until you reach the old Cosmodrome-looking area. Enter through the door and make your way to the location above.

Use your Lost Encryption Code to open the chest and obtain the Legendary Khvostov-7G.

With that all done, its now a case of waiting for the community to work out how to get the Exotic version whether its time-gated, or requires an elaborate puzzle to be solved first, is unknown right now but know doing the above steps for the Legendary will give you a leg up for when it becomes available.

All done? If youre after other The Final Shape Exotics, then we have explainers on Ergo Sum, Still Hunt, and Microcosm.

Read the rest here:
How to get the Legendary Khvostov and all Lost Encryption locations in Destiny 2 - Polygon

Read More..

Over and out? Keep Police Radio Public Act faces uncertain future as NYPD encryption moves ahead – amNY

Sign up for our amNewYork email newsletter to get news, updates, and local insights delivered straight to your inbox!

New York lawmakers have until Friday to vote on the Keep Police Radio Public Act to prevent the NYPD and other police departments from shutting the press out of police radio access amid encryption efforts.

The legislation would provide credentialed media access to encrypted police radio channels, and compel the NYPD to allow access to New York City media that have listened to police radio channels as a source of news.

The bill, introduced in the state Senate by Mike Gianaris of Queens and picked up in the Assembly by Karines Reyes of the Bronx, must be passed by both houses on Friday, the end of the current legislative session in Albany. If it doesnt pass, it will have to be reintroduced next year.

Reyes expressed cautious optimism that the bill would move forward.

We are trying to get it through the Assembly, but it never came out of committee. We are trying to reference it to rules, she said. It may be moving in Senate, but the Senate committee had questions on the bill. We tried to get them answers. We believed it to be straightforward, but there must be a willingness to move it.

NYPD officials have opposed the bill; in the past, they have questioned the vetting of journalists credentialed by the Mayors Office of Media and Entertainment, and police officials were seeking a delay in radio transmissions.

The NYPD has yet to provide a plan for keeping the media in the loop to maintain transparency, despite their billion-dollar radio upgrade being in its sixth year. NYPD officials said they planned to have a plan after the encryption program is completed, by late 2025.

In the meantime, seven more precincts in Brooklyn were encrypted last week encompassing much of Brooklyn South areas. All eight Brooklyn North precincts were encrypted in July 2023, and four Staten Island precincts went dark back in March.

Mayor Eric Adams, while not saying he is opposed to the bill, expressed reservations at a press conference on Tuesday at City Hall.

My biggest concern, Ive said this over and over again, bad guys get access to this information. You know, bad guys that commit crimes, Mayor Adams said. This technology, if not used properly, it could be harmful. If you know [that] a police officer is responding, how they responded, how they communicated, we need to get it right. I think we can find the right balance. The New York City Police Department is going to do that.

Recently, members of the News Guild, part of the Communications Workers of America, proclaimed support for the bill, citing transparency and press access. They joined a chorus of support that includes the New York Media Consortium, a group made up of eight press organizations. However, some Guild members have expressed dismay that only the press, not the public, would get radio access in the bill.

Diane Kennedy, president of the New York News Publishers Association has been at the forefront of the effort.

As encryption of police radio communications spreads across New York City, the number of city residents losing access to real-time independent reporting on breaking news events is rising, Kennedy said. Legislation by Senate Deputy Majority Leader Michael Gianaris and Assembly Member Karines Reyes could roll back NYPDs work to bring 90 years of journalists ability to monitor police communications to a halt, but only if the state Legislature passes the bill before adjourning later this week.

Bruce Cotler, president of the New York Press Photographers Association also expressed hope that the bill would pass muster.

More and more, police precincts are going dark, leaving the media who depend upon the ability to know what goes on in the city, in the hands of the NYPD, Cotler said. The NYPD then controls the narrative, and then will be able to decide what is news and what is not. That was our job. We must have transparency or checks and balances will be gone.

The New York Media Consortium has sought out help from the City Council, including Speaker Adrienne Adams, who was critical of the NYPD for dragging their feet on including members of the media in communications.

At an NYPD budget hearing, Chief of Information Technology Ruben Beltran said there were operational reasons and real concerns for security that require the radio transmissions to be encrypted. He told the Council that the NYPD made 55 arrests in 2023 for unlawful possession of radio devices, and read off a list of arrested suspects. None of those were members of the media.

The Speaker was asked whether she or the council plan on taking up the issue should the legislation fail. She did not comment when asked about the issue on Tuesday.

During the March budget hearing, Speaker Adams said, There should be a happy medium herethan throwing the baby out with bathwater. However, the Council has still not taken any action to maintain transparency even as the NYPD came to the Council seeking an additional $81 million for more radios.

A spokesperson for the City Council issued a statement Wednesday:

We support the state legislature advancing a solution to maintain the transparency that is being threatened by efforts to encrypt all radio communication, which would have a negative impact on volunteer first responders, accountability and public safety.

In the past two weeks, 9,000 new radios arrived from Motorola in a no-bid contract.

The legislation would affect other police agencies who have already encrypted their radios, including the Nassau County Police who have been encrypted for several years, leaving Long Island media in the dark. In the meantime, the NYPD currently informs the press of breaking news hours after occurrence, or not at all.

Should the bill fail, Kennedy noted, it will be difficult to resurrect and give the press a lifeline into police communications.

Once the radios go dark, it will be hard to reopen them again, she said.

Mickey Osterriecher, chief counsel for the National Press Photographers Association said a failure to pass the legislation will have a negative national effect as other departments evaluate their encryption policies.

Other major cities are looking to New York to see what happens here if the NYPD is able to encrypt all radios, without any consideration for transparency or accountability, that is only going to encourage other cities to do the same, Osterriecher said. Whats unfortunate, is news organizations can care less and we cant make them do anything.

Read this article:
Over and out? Keep Police Radio Public Act faces uncertain future as NYPD encryption moves ahead - amNY

Read More..

Dante Adds Media Encryption, Enhancing Security Features of the Dante AV-over-IP Platform – Mix

Dante Media Encryption protects end-to-end media flows with AES-256 encryption

PORTLAND, Ore., June 6, 2024 Audinate Group Limited (ASX:AD8), developer of the industry-leading Dante AV-over-IP solution, today announced the addition of Dante Media Encryption to the evolving security features and benefits of the Dante platform. Dante Media Encryption protects the content of media flows using strong AES-256 encryption, safeguarding media from interception or unauthorized access.

Dante is a complete, easy-to-use AV-over-IP platform that is interoperable across morethan 4,000 products from over 600 manufacturers, integrating best-in-class audio, video, control, and management features. This interoperability, combined with the ability to access and route AV signals anywhere in the world, makes Dante uniquely qualified to add end-to-end encryption between connected products.

Designed with security at its core, Dante offers device, network, and media-level protections for Pro AV manufacturers to integrate into their products and system solutions. The accelerating convergence of AV equipment and IT network technologies has increased the need for integrators and manufacturers to provide network protection for system users with security-conscious designs and adherence to emerging IoT (Internet-of-Things) network regulations.

Dante systems and endpoints implement a multilayer security architecture that provides unmatched threat and vulnerability protection to the network and connected devices. The multilayer security architecture provides a solid foundation for manufacturers and systems integrators to follow best practices when configuring Dante and their products to meet new regulations. The addition of Dante Media Encryption enables Pro AV equipment manufacturers to upgrade qualified Dante firmware and software in new or existing designs to support AES-256 encryption security policies on managed Dante networks.

Dante Media Encryption is the only fully interoperable and manufacturer-agnostic solution for AV installations, providing a powerful tool to customers that must adhere to strict security and privacy mandates, says Mark Gerrard, Group Product Manager, Audinate. The introduction of Dante Media Encryption demonstrates Audinates ongoing industry leadership in the Pro AV industry.

Dante Media Encryption capabilities are fully compatible between updated devices in managed Dante networks. Managed networks are fundamental to a secure AV-over-IP system, with Dante Director and Dante Domain Manager (DDM) providing secure access controls, network segmentation, policy management, and event logging as essential protections to an installation. Dante Media Encryption policy is configurable by the AV network administrator through an intuitive user interface on the Dante Director management platform. Dante Director also provides strong key management, including key rotation, for enrolled devices.

Dante product updates for Dante Media Encryption will be available for original equipment manufacturers to integrate with their products in the second half of this year.

###

About Audinate Group Limited:

Audinate Group Limited (ASX:AD8) has a vision to pioneer the future of AV. Audinates award winning Dante AV over IP networking solution is the worldwide leader and used extensively in the professional live sound, commercial installation, broadcast, public address, and recording industries.Dante replaces traditional analogue cables by transmitting perfectly synchronized AV signals across large distances, to multiple locations at once, using nothing more than an Ethernet cable. Audinate is headquartered in Australia and has regional offices in the United States, United Kingdom, Belgium and Hong Kong. Dante technology powers products available from hundreds of leading audio and video partners around the world. The companys ordinary shares are traded on the Australian Securities Exchange (ASX) under the ticker code AD8.

Dante and Audinate are registered trademarks of Audinate Holdings Pty Ltd.

Read more here:
Dante Adds Media Encryption, Enhancing Security Features of the Dante AV-over-IP Platform - Mix

Read More..

A comprehensive study of the novel 4D hyperchaotic system with self-exited multistability and application in the voice … – Nature.com

The block diagrams of voice encryptiondecryption using the new hyperchaotic process are demonstrated in Fig.8 and Fig.9 respectively.

The voice encryption scheme using the new hyperchaotic system.

The voice decryption scheme using the new hyperchaotic system.

As displayed in Fig.8, the encryption process contains two levels: scrambling level and masking level, where both levels depend on the sequence generated by the proposed scheme. Chaotic scrambling is the process of transforming the original voice signal based on a particular algorithm28,29,30. This transformation can be achieved through various techniques, including mathematical transformations, encryption algorithms, or chaotic systems. In our system, the voice signal is scrambled using the x, y, z, and w sequences generated by the new hyperchaotic system according to the following equation:

$${V}_{s}=vleft(tright)+scramblingStrength*({s}_{1}* xleft(tright){.}^{p}+ {s}_{2} * y{left(tright).}^{p2}+{s}_{3}* z{left(tright).}^{p3} + {s}_{4} * wleft(tright){.}^{p4})$$

(8)

The scrambling equation introduces a more sophisticated algorithm by integrating chaos and nonlinearity into the scrambling process. Where Vs is the scrambled voice signal, v(t) is the original voice signal s1, s2, s3, and s4 represent coefficients, and p1, p2, p3, and p4, represent the power terms associated with each state variable w(t), z(t), y(t), and x(t). The power terms add an element of nonlinearity to the scrambling process, making it more complex and potentially enhancing the algorithms security. Adjusting the power terms allows for fine-tuning the scrambling strength and the degree of nonlinearity introduced into the signal. Where the scrambling strength is set to 0.9, and the values of p1 =p2=p3 =p4 =1. The secret keys used in the encryption process are s1 =s2 =s3 =s4 =1.

Then, to add a complexity to the encrypted signal, the resulted scrambled signal Vs(t) is further masked using the state variables generated from the new scheme producing the encrypted voice signal Ve(t) as follows:

$${V}_{e}left(tright)={V}_{s}left(tright)+(xleft(tright)+yleft(tright)+zleft(tright)+wleft(tright))$$

(9)

In masking level, the complete state variables are used for masking the signal to increase the security level of the proposed system.

The decryption procedure is the vice versa of the encryption procedure, it involves generating an unmask signal by subtracting the same state variables from the encrypted signal producing the signal Vd(t) as follows:

$${V}_{d}left(tright)={V}_{e}left(tright)-(xleft(tright)+yleft(tright)+zleft(tright)+wleft(tright)$$

(10)

The produced signal is then unscrambled according to the following equation:

$${V}_{r}={V}_{d}left(tright)-scramblingStrength*({s}_{1}*xleft(tright){.}^{p}+{s}_{2}*y{left(tright).}^{p2}+{s}_{3}*z{left(tright).}^{p3}+{s}_{4} *wleft(tright){.}^{p4})$$

(11)

The resulting signal Vr(t), represents the recovered voice signal. Assuming that the hyperchaotic systems in both the encryption and decryption systems are identical, have the same initial condition, and synchronized. The recovered signal Vr(t) is like the original voice signal v(t). In our system the values of coefficients terms are 0.1 for s1, s2, and s3, and 1 for s4. While the values of the power terms are 1 for p1, p2, p3, and p4, and 0.5 for the scrambling strength term.

MATLAB program was used to acquire the simulation results. The suggested systems effectiveness and security were evaluated using various tests, including waveform analysis, PRD, SNR, and correlation measurements. The voice signals use eight quantization bits at 8000Hz.

The waveforms obtained from the proposed encryption system are illustrated in Fig.10, the recovered, encrypted, and original voice signals, where the original voice transmission is entirely altered by the encrypted signal. Meanwhile, the recovered and original signals are identical.

Waveform plots for the encrypted, recovered, and original voice signals.

Figure11 depicts the histograms of the encrypted, original, and recovered voice signals. The distributed histogram indicates the randomness of the encrypted voice signal, a stark contrast to the histogram of the original and recovered voice signals, which exhibits a normal distribution, rendering it susceptible to attacks. The analysis reveals that our proposed algorithm provides robust security against various statistical attacks, affirming its efficacy in safeguarding voice communication.

The histograms for the encrypted, recovered, and original voice signals.

The Percentage Residual Deviation (PRD), Signal Noise Ratio (SNR), and Correlation Coefficient (CC) are employed to analyse the proposed schemes immunity against statistical intruders31,32,33. Table 2 displays the values that were computed for various voice signals. The (PRD) is a statistical tool used to measure the deviation between encrypted and original audio signals. Low PRD values suggest a similarity between encrypted and original signals, indicating high fidelity and minimal distortion. Conversely, high PRD values imply significant differences, potentially indicating a decline in signal integrity and increased distortion. Table 2 provides the computed percent residual deviation values for a range of original and encrypted voice signals.

One of the widely considered objective metrics for assessing the strength of the original audio signal is the signalnoise ratio (SNR). The measurements of the SNR in Table 2 are highly negative, indicating an enormous quality of the encrypted speech signals. The correlation coefficient is a numerical correlation measure between -1 and 1. Table 2 provides the calculation for various speech signals. The small value of the (CC) obtained demonstrates how severely jumbled the encrypted signal is in comparison to the original voice signal. The higher PRD values suggest a significant deviation between the encrypted and original signals. The large negative SNR value indicates that the noise power is higher than the signal power, which makes it difficult to detect. On the other hand, near-zero correlation values imply a reduced similarity between the encrypted and original signals.

A keysensitivity analysis has been conducted to assess the responsiveness of the new encryption scheme to slight variations in the key values. A small change in one key, for example, the initial value of the x state variable is changed by 0.000000000000001, will entirely deviate the decrypted signal, as shown in Fig.12, which reflects the immunity of the proposed encryption system against attacks.

Decrypted speech signal with a bit of change in the initial values0.

Utilizing the NIST 80022 test package, which is provided by the US National Institute of Standards and Technology, we examined the randomness of the encrypted speech signal in this test. This research primarily aimsto test the randomness of encrypted and original voice signals. As indicated in Table 3, the tests were used to investigate the degree of randomness ofeach signal. The bit-stream of the original speech signal passed only 2 of the NIST tests. The results also suggest that the encrypted voice signal performs favorably in several statistical tests, meeting the criteria for randomness and passing certain NIST assessments.

Continue reading here:
A comprehensive study of the novel 4D hyperchaotic system with self-exited multistability and application in the voice ... - Nature.com

Read More..

RansomHub ransomware’s origins uncovered | SC Media – SC Media

Emergent RansomHub ransomware which was leveraged in attacks against Change Healthcare, Frontier Communications, and Christie's auction house was discovered by Symantec researchers to be an evolved iteration of the Knight ransomware, also known as Cyclops 2.0, reports The Hacker News.

Only a new "sleep" option within the command-line help menu and distinct commands executed by cmd.exe differentiated RansomHub from Knight ransomware, both of which were based on the Go programming language and had the same obfuscation approach, ransom notes, and safe mode restarts prior to encryption, according to the Symantec report.

The findings also showed that both Notchy and Scattered Spider, which were previously affiliated with the ALPHV/BlackCat ransomware operation, have entered a partnership with RansomHub, echoing a recent report from Mandiant.

"The speed at which RansomHub has established its business suggests that the group may consist of veteran operators with experience and contacts in the cyber underground," said researchers.

Read more:
RansomHub ransomware's origins uncovered | SC Media - SC Media

Read More..