Page 1,758«..1020..1,7571,7581,7591,760..1,7701,780..»

Reversible blockchain transactions are key to fighting crime and wide adoption – Cointelegraph

A proposal out of Stanford University to make crypto transactions reversible is adding a wrinkle to discussions of crime and fraud prevention. Researchers suggested that mutability the ability to reverse blockchain transactions would help prevent crime.

One of the advantages of cryptocurrency is that it is possible for the market individuals, traders and banks to decide if reversibility is wanted. Not only would a new (reversible) cryptocurrency be able to test the acceptance or desire for reversible transactions, it would help to test the idea that reversibility reduces crime.

Although cryptocurrency is not a tool of the dark web, its sometimes portrayed as such. Fraud, scams and other forms of crime do happen and are growing in proportion with the amount of money invested and the number of coins traded.

One of the main ways law enforcement addresses crime in crypto markets is with blockchain forensics. Blockchain forensics is a growing field in law enforcement where transactions are analyzed to follow and recover stolen or fraudulently obtained cryptocurrency assets. It first achieved prominence a few years ago when the United States Internal Revenue Service used it to successfully recover the ransom Colonial Pipeline paid to the hackers who took control of it. But in the highly decentralized and risky world of cryptocurrencies and nonfungible tokens, blockchain forensics is becoming an important tool for compliance as well as regulation, creating potential impacts on legitimate traders.

Related: Get ready for the feds to start indicting NFT traders

Investigators closely scrutinize the transactions recorded on blockchains, looking for signs people are trying to hide or disguise their tokens. Some of these include rapidly switching between ledgers, using tools that mask or fake IP addresses, multiple small transactions and using a tumbler or mixer service, where crypto from many sources is pooled together to disguise where its coming from.

Reversibility would make it much easier for law enforcement to recover stolen and fraudulently obtained funds, reducing the potential rewards from crime. That could reduce the risk for banks and other established financial institutions in offering cryptocurrency services to the general public as opposed to being special investments. It would also reduce any problems associated with human error, such as fat finger errors. This would help make cryptocurrency much more useful for exchange, investment and other mundane uses.

On the other hand, reversibility or mutability would also run up against the idea of the blockchain itself. Mutability could make the blockchain as vulnerable to manipulation as any other repository of information, which would stultify one of its key security features. And attempting to impose a standard for when the blockchain could be edited would seemingly violate another important feature: that of decentralization.

The anonymous, decentralized nature of cryptocurrency finance makes tension between regulators and cryptocurrency somewhat inevitable. For ideological or privacy reasons, many people are attracted to the promise of anonymity offered by the blockchain, but those features attract more scrutiny from regulators as that same anonymity can enable transactions that range from those where taxes arent collected to the sale of illegal drugs or weapons or enabling countries such as North Korea evade international sanctions.

As cryptocurrencies become more mainstream, financial institutions and investors will also push regulators and exchanges to adopt protections or weaken the anonymity to comply with securities and Anti-Money Laundering laws.

Related: Bidens anemic crypto framework offered nothing new

Mutability would make blockchain forensics even more important to regulators and investors. As an analogy, various government agencies and financial institutions require that companies and individuals keep accurate financial records. Many fraud schemes require manipulation of these records embezzlers have to cover their tracks, stock waterers try to convince people a company is doing better than it actually is in order to inflate the share price and on and on. When they get discovered, forensic accountants are called in to put together accurate financial statements.

Blockchain forensics firms would end up in charge of protecting the integrity of the blockchain, effectively becoming the de facto central authority and leading to inevitable variations of Can we trust them?

But the final say on making the blockchain reversible or mutable should be the decentralized force of the market itself. The most unique thing about cryptocurrency is that there are and can be so many currencies competing against one another all at once. In early modern Europe, a stable currency emerged out of hundreds of unstable ones, backed by high-purity precious metals and managed by a central bank. This astonishing achievement of men in tights, as economist Nathan Lewis memorably put it, was driven not by power-hungry monarchs but by merchants in places such as London and Amsterdam who demanded stability, while ordinary people benefited because they could rely on their money being valuable.

Unless decentralized finance can come up with an alternative that improves security and stability while not compromising its principles, a similar process may be underway.

Brendan Cochrane is the blockchain and cryptocurrency partner at YK Law. He is also the principal and founder of CryptoCompli, a startup focused on the compliance needs of cryptocurrency businesses.

This article is for general information purposes and is not intended to be and should not be taken as legal or investment advice. The views, thoughts, and opinions expressed here are the authors alone and do not necessarily reflect or represent the views and opinions of Cointelegraph.

Read the rest here:
Reversible blockchain transactions are key to fighting crime and wide adoption - Cointelegraph

Read More..

CME Group Appoints New Global Heads for Equity Index and Cryptocurrency Businesses – PR Newswire

CHICAGO, Oct. 5, 2022 /PRNewswire/ -- CME Group, the world's leading derivatives marketplace, today announced the appointment of two new global heads for its Equity Index and Cryptocurrency businesses to continue driving product innovation and supporting long-term growth.

Paul Woolman, Global Head of Equity Index Products, will oversee the company's Equity Index product portfolio, while Giovanni Vicioso, Global Head of Cryptocurrency Products, will assume responsibility for the company's Cryptocurrency products. Woolman and Vicioso will report to Tim McCourt, who previously led both business lines and was recently named to the CME Group management team as Global Head of Equity and FX Products.

"Our equity and cryptocurrency businesses have experienced tremendous growth in recent years, underpinned by strong customer adoption and continued innovation," said McCourt. "In their expanded roles, Paul and Gio will continue to meet the needs of our clients by providing products and services to manage risk in today's ever-changing marketplace."

Woolman has worked in equity derivatives for more than 20 years. He joined CME Group in 2016 as Senior Director, Head of EMEA Equity Products and Alternative Investments. Prior to CME Group, Woolman served as a Delta One Equity Derivatives Trading Director at Bank of America Merrill Lynch for 11 years, where he managed exposure across futures, ETFs, swaps, and structured products, as well as cash equities and FX. He holds a bachelor's degree in geography from the University of Bristol and an MBA from London Business School.

Vicioso, with nearly 30 years of financial markets experience, joined CME Group in 2012 as Senior Director of Equity Products, in which he also began his involvement in CME Group's Cryptocurrency business. Prior to CME Group, he served as Vice President for RBC Capital Markets' Equity Derivatives Group on their OTC Equity Derivatives desk.Prior to RBC, he worked at Deutsche Bank in the Global Equity Derivatives Division. Vicioso holds a bachelor's degree in mechanical engineering from Rutgers University and an MBA from Columbia Business School.

This new reorganization comes amid a strong surge in growth from CME Group's Equity Index and Cryptocurrency business lines.

Equity Index trading highlights include:

Cryptocurrency trading highlights include:

As the world's leading derivatives marketplace, CME Group (www.cmegroup.com) enables clients to trade futures, options, cash and OTC markets, optimize portfolios, and analyze data empowering market participants worldwide to efficiently manage risk and capture opportunities. CME Group exchanges offer the widest range of global benchmark products across all major asset classes based oninterest rates,equity indexes,foreign exchange,energy,agricultural productsandmetals. The company offers futures and options on futures trading through the CME Globex platform, fixed income trading via BrokerTec and foreign exchange trading on the EBS platform. In addition, it operates one of the world's leading central counterparty clearing providers, CME Clearing.

CME Group, the Globe logo, CME, Chicago Mercantile Exchange, Globex, and, E-miniare trademarks of Chicago Mercantile Exchange Inc. CBOT and Chicago Board of Trade are trademarks of Board of Trade of the City of Chicago, Inc. NYMEX, New York Mercantile Exchange and ClearPort are trademarks of New York Mercantile Exchange, Inc. COMEX is a trademark of Commodity Exchange, Inc. BrokerTec and EBS are trademarks of BrokerTec Europe LTD and EBS Group LTD, respectively.Dow Jones, Dow Jones Industrial Average, S&P 500 and S&P are service and/or trademarks of Dow Jones Trademark Holdings LLC, Standard & Poor's Financial Services LLC and S&P/Dow Jones Indices LLC, as the case may be, and have been licensed for use by Chicago Mercantile Exchange Inc. All other trademarks are the property of their respective owners.

CME-G

SOURCE CME Group

Read more here:
CME Group Appoints New Global Heads for Equity Index and Cryptocurrency Businesses - PR Newswire

Read More..

Pro-Russian groups are raising funds in crypto to prop up military operations and evade U.S. sanctions – CNBC

Pro-Russian groups are raising funds in cryptocurrency to prop up paramilitary operations and evade U.S. sanctions as the war with Ukraine wages on, a research report published Monday revealed.

As of Sept. 22, these fundraising groups had raised $400,000 in cryptocurrency since the start of the invasion on Feb. 24, according to TRM Labs, a digital asset compliance and risk management company.

The research revealed that groups, using encrypted messaging app Telegram, are offering ways for people to send funds which are used to supply Russian-affiliated militia groups and support combat training at locations close to the border with Ukraine.

One group TRM Labs identified raising funds is Task Force Rusich which the U.S. Treasury describes as a "neo-Nazi paramilitary group that has participated in combat alongside Russia's military in Ukraine." The Treasury Department's Office of Foreign Assets Control(OFCA) has sanctioned Task Force Rusich.

On a Telegram channel, TRM Labs discovered this group was looking to raise money for items such as thermal imaging equipment and radios.

Russian paramilitary groups are raising funds in cryptocurrency using messaging app Telegram, according to research published by TRM Labs.

Matt Cardy | Getty Images News | Getty Images

The Novorossia Aid Coordinating Center, which was set up in 2014 to support Russian operations in Ukraine, raised about $21,000 in cryptocurrency, mainly bitcoin, with the aim of buying drones, the report said.

Russia was hit by a number of sanctions after its unprovoked invasion of Ukraine earlier this year that aimed to cut it off from the global financial system. At the time, there were concerns that Russia could use cryptocurrency to evade these penalties. However, experts said that there is not enough liquidity in the crypto system on the scale Russia would require to move money.

But with the paramilitary groups, they're moving money on a smaller scale, which is enough for the items they need to buy.

These groups are likely using exchanges that don't necessarily comply with anti-money laundering and other regulations, according to Ari Redbord, head of legal and government affairs at TRM Labs.

"They're probably using non-compliant exchanges to off-ramp those funds [into fiat currency]," Redbord told CNBC.

"And you can do that. You just can't do that at scale. And I think that's that that's where ... we'll say, will there be more? Of course, there'll be more. But will it be billions of dollars? Highly unlikely."

Redbord said TRM Labs used a combination of publicly available wallet addresses as well as cross-checking other websites and activity online to identify the Russian-linked groups. However, he did say it's not possible to know whether these groups were working with the Russian government or are in any way backed by the Kremlin.

Cryptocurrencies have been thrust into the spotlight during the Russia and Ukraine war. Ukraine has been seeking donations via digital coins, which can be sent quickly across the world. But they're now also being used by Russian paramilitary groups.

"I think an interesting part of this story is that crypto is just a form of payment in these cases. It's a way to move funds. And there's an example of it being used for good and example of it being used for bad in this context," Redbord said.

Excerpt from:
Pro-Russian groups are raising funds in crypto to prop up military operations and evade U.S. sanctions - CNBC

Read More..

Cryptocurrency Elrond’s Price Increased More Than 4% Within 24 hours – Elrond (EGLD/USD) – Benzinga

Over the past 24 hours, Elrond's EGLD/USD price has risen 4.12% to $55.88. This continues its positive trend over the past week where it has experienced a 17.0% gain, moving from $46.53 to its current price. As it stands right now, the coin's all-time high is $545.64.

The chart below compares the price movement and volatility for Elrond over the past 24 hours (left) to its price movement over the past week (right). The gray bands are Bollinger Bands, measuring the volatility for both the daily and weekly price movements. The wider the bands are, or the larger the gray area is at any given moment, the larger the volatility.

The trading volume for the coin has increased 209.0% over the past week while the overall circulating supply of the coin has increased 2.69% to over 23.62 million which makes up an estimated 75.19% of its max supply, which is 31.42 million. The current market cap ranking for EGLD is #43 at $1.31 billion.

Powered by CoinGecko API

This article was generated by Benzinga's automated content engine and reviewed by an editor.

Originally posted here:
Cryptocurrency Elrond's Price Increased More Than 4% Within 24 hours - Elrond (EGLD/USD) - Benzinga

Read More..

Researchers Suggest That Engineering Specific B Cell Response Could Make the First HIV Vaccine Possible – Pharmacy Times

A large collective of researchers may be one step closer to developing a vaccine against HIV after engineering a protein that triggers a widespread antibody response.

Scientists have identified promising broadly neutralizing antibodies (bnAbs) that could be used to create a vaccine against HIV, according to a study conducted by Scripps Research, IAVI, the Ragon Institute, and Moderna, Inc.

Human genes make bnAbs, which are antibodies that can fight against multiple variants of a virus. The idea behind creating this vaccine is to identify the right types of bnAbs and human genes to create an mRNA vaccine that prevents the infection or spread of HIV.

Our 2 studies describe a collaborative effort to genetically and structurally understand bnAbs, and ultimately reverse engineer vaccines to elicit these bnAbs, said senior author William Schief, PhD, a Scripps Research professor and executive director of vaccine design at IAVI's Neutralizing Antibody Center at Scripps Research, in a press release.

The research teams from Scripps and IAVI first engineered a priming immunogen for (what would be) the first dose of the HIV vaccine. This manufactured spike protein would bind to specific nave B cells, also called germline precursors.

Nave B cells are antibody-producing white blood cells, and bnAbs come from these cells. The team analyzed 1.2 billion antibody sequences in a large database, which revealed 2 bnAbs that contained the most nave B cells. The team suggested that these 2 bnAbs would thus be the best defense against HIV.

Finding the bnAbs we need is like searching for a needle in a haystack, said co-first author Zachary Berndsen, PhD, assistant professor of biochemistry at the University of Missouri, in a press release. To make an effective vaccine, we must first find the precursor antibodies that can eventually become bnAbs, while also seeing if those precursor antibodies are common enough throughout the general population to stimulate.

The researchers then collaborated with researchers from Ragon Institute. They tested the engineered HIV spike protein in mice and found that it did elicit a response in germline precursor cells. This results in a nave B cell that expresses the apex bnAbs, which can defend against the virus.

This is a very important step, as it shows that vaccinating with our immunogen can actually elicit responses from the precursors we were targeting, said co-first author Jordan Willis, PhD, senior principal scientist at the IAVI Neutralizing Antibody Center at Scripps Research, in the press release. We also showed that vaccinating with an unmodified HIV protein could not elicit those responses, which proves that our affinity engineering was required."

The HIV mRNA vaccine, which would come from Moderna, would be similar to the COVID-19 vaccine. The benefits are that mRNA vaccines are easier and faster to manufacture, and provide better antibody responses compared to a normal vaccine. The researchers anticipate that they will eventually test this vaccine in human clinical trials.

We and our collaborators are building on this approach, developing and testing immunogens to drive the later stages of bnAb maturation, said Facundo Batista, PhD, associate director of the Ragon Institute, in the press release.

Reference

Scripps Research Institute. Scientists design and validate promising HIV vaccine strategy. EurekAlert. October 3, 2022. Accessed on October 5, 2022. https://www.eurekalert.org/news-releases/966725

See the original post here:

Researchers Suggest That Engineering Specific B Cell Response Could Make the First HIV Vaccine Possible - Pharmacy Times

Read More..

Prioritization of the Detection Engineering Backlog – Security Boulevard

Written by Joshua Prager and EmilyLeidy

Strategically maturing a detection engineering function requires us to divide the overall function into smaller discrete problems. One such seemingly innocuous area of detection engineering is the technique backlog (a.k.a. the detection engineering backlog, attack technique backlog, or detection backlog).

The concept of incorporating a backlog into the detection engineering function as a medium for receiving and storing attack techniques for detection generation is not a novel concept for most organizations. However, very few security organizations consider how best to prioritize these attack techniques found within this backlog. By combining input-based prioritization and the Center for Threat Informed Defenses Top Ten Technique Calculator, detection engineers can confidently select target techniques with some sense of direction.

The detection engineering backlog is the starting point from which a mature detection engineering function should begin. This backlog is essentially an input chokepoint for other functions within a security organizations detection and response program to provide techniques for detection generation. These inputs may come from other functions where the detection engineering function is a stakeholder in the other functions research and output. An example of the type of function mentioned is cyber threat intelligence (CTI). Another function that can act as an input into the detection engineering backlog is the threat hunting function. This function can provide hypotheses, research, and queries to the detection engineering backlog, servicing a critical need for cross-functional collaboration.

Most functions within a security organizations detection and response program may leverage backlogs within its development process. However, many of these functions do not require input to drive their functional operation. The detection engineering function, specifically, requires the direction of cross-functional input to avoid making ad-hoc decisions for resource utilization. In other words, detection engineering must be steered by the detection and response program or resources could be devoted in the wrong direction at the wrongtime.

An example, we often utilize when describing the differences between the threat hunting function and the detection engineering function; is to highlight the expected operation of each function as a mature process. The threat hunting function requires very little input from any other function. Most threat hunting functions will be a stakeholder to CTI, at a minimum. However, the concept of proactive hunting leverages the assumption that there are no external stimuli needed to develop a hypothesis, research, and develop proactive huntingqueries.

In contrast, the detection engineering function requires the external stimuli of other detection and response inputs to accurately prioritize detection generation. Inputs into the detection engineering backlog can be of multiple types such as a gap in a defensive posture, a historical look-back query from threat hunting, or a research-centric goal of generating detections along a specific technique type. Regardless of the input type, the detection engineering function requires the inputs of other functions to know which detections to generate.

Consulting SpecterOps clients have afforded our detection services team the benefit of exposure to a wide array of strategic methods for capturing the required input for detection engineering. For each of our clients, SpecterOps avoids putting an emphasis on a particular tool or solution for providing input opportunities to the detection and response program. Instead, we provide the minimum criteria of what is needed for mature detection engineering functions to receive quality inputs as well as define the methodology by which to organize and prioritize thisbacklog.

Most of our clients utilize a ticketing platform of some kind to offer a portal for the other functions of detection and response to interact with detection engineering. These ticketing platforms, regardless of the actual software, should inquire about the same details as those that provide the input. The minimum requirements for use of a ticketing system as an input into the detection backlog are asfollows:

Most of the above criteria are common-sense requirements for any ticketing platform, however, there are quite a few organizations that rely upon methods such as email or chat platforms as an official method of requesting new detections. When consulting organizations tell us, Direct messages or email is the approved method of requesting the generation of a detection; in general, this creates concerns for us around the following twoareas:

2. The detection engineering backlog does not exist or it is utilizedad-hoc.

Ideally, we want a large list of techniques and methods of execution within the backlog from which to develop detections. Additionally, you may have noticed that we did not list the need for attaching documents or reports to the list of minimum requirements. This detail ties into the problem of the input from other functions being non-operational. Many CTI functions will provide input to the detection engineering backlog in the form of an intelligence report or a spreadsheet of Indicators-of-Compromise (IOC)s. Mature cross-functional communication between CTI and detection engineering should involve the necessary metadata to accomplish the goal of generating a detection. For example, CTI can provide a list of all known methods of Kerberoasting via links to blogs and open-source proofs-of-concept (POC)s, instead of an attached intelligence report PDF of 15 high-level explanations of Tactics, Techniques, and Procedures (TTP)s. The former of the above example provides useful information that detection engineers can use to gauge the completeness of technique coverage, and the latter provides very little actionable information for a detection engineer.

Detection engineering teams that have cross-functional communication providing inputs into their detection backlog, generally, select target techniques to research sequentially. This method sometimes assumes that the backlog is prioritized already; however, the backlog is simply listed via the creation timestamp.

We at SpecterOps have aimed to solve this problem for multiple clients, and what we have settled on is a priority based on input, with priority 0 as the highest priority and priority 4 as the lowest priority. When asked to explain this methodology to clients, we usually provide the following analogy.

When living within a house, or in a community, which of these is the greater concern? A stranger knocking on our shut and locked front door or our front porch window that is open without any screen or glass protection? If you thought, The window, because the stranger at the front door can just come through it, then you would be correct. Though the stranger knocking at our door is an attention-grabbing concern, the front door is locked and preventing, securing, and detecting that which it is designed to. However, the open window is cause for immediate concern because the window is a known vulnerability or gap in our ability to prevent, secure, ordetect.

The same can be applied to detection engineering where the input comes from gap analysis, purple team assessments, and defensive capability assessments. The highest priority of generating net new detections is to focus on known target techniques for which the organization has the least amount of coverage.

Following up with the house scenario, which of these two is the greater concern? A stranger knocking on the shut and locked front door or a community post about intruders knocking on your neighbors doors and attempting to barge in? Though the community post is definitely a frightening scenario, it doesnt directly affect us at this time. Our immediate concern is the stranger knocking on our front door. Luckily, our front doors lock is stopping any possible intrusion by preventing and detecting the possible intruder. This method of identifying the techniques used against our organization is a form of internal intelligence. Examples of internal intelligence are techniques derived from identified phishing attempts, incidents, and honeynets.

Internal intelligence can provide a wealth of opportunities to justify the prioritization of one group of TTPs over another. An example of mature organizations is those that aim to automate this input by way of forwarding prevented phishing attempt samples to cloud-hosted sandboxes. Next, the samples are cataloged and TTPs are disseminated to the detection engineering backlog via quantitative analysis of the TTPs. The detection engineers prioritize these TTPs provided from internal intelligence of prevented phishing attempts to design detections around the TTPs utilized against our organization in the case that the prevention fails and the execution of the phishing attempt is successful.

Continuing with our analogy of prioritization, we see the issue of the community post stating intruders are knocking on doors and barging in. This scenario is not ideal, however, we have not directly been attacked with this issue yet. As homeowners, we do have similarities with our neighbors and we should heed their warnings, but we should not prioritize this information over the current concerns that are at our doorstep (the open window and the stranger at our door). This part of the analogy represents external intelligence, and the techniques selected from this type of intelligence must be held against a stricter standard before acting as an input into the detection backlog.

Aligning with another organizations business vertical is not enough to filter out that which may not pertain to our organization and that which does not belong in our backlog. Instead, TTPs from this input should match pre-defined criteria that are unique to each organization. The attributes of the organizations threat landscape make for a great starting point for filters to dismiss unusable techniques and procedures requested from external intelligence. By prioritizing the detection backlog with internal intelligence before external intelligence, detection engineering can more accurately assign resources first to threats that are actively testing the defenses.

Let us progress a bit in our analogy. In the same community post above, there is a sub-comment where another person states, Sometimes the intruders knock on the door, but other times they break the glass window on the front door to unlock the deadbolt. Here, the analogy is representing new tradecraft discovered while generating a detection for a similar technique. Jared Atkinson explains that by aiming abstraction at maximizing the representation of the possible variations we may discover procedurally unique instances that are sub-technical synonyms [1]. In this case, the methods by which the intruders are gaining access to the homes differ; however they are sub-technical synonyms.

As defenders research and validate each hypothesis, procedurally unique instances of tradecraft can be discovered for which control may not yet be implemented. When these newly discovered forms of tradecraft are an input into the detection engineer backlog, they can often be somewhat theoretical and further testing and validation are often needed to determine if the new tradecraft poses a legitimate threat to the organizations environment.

Finalizing our analogy, we received a phone notification from our local police department that there has been a severe 5% increase in break-ins in our area of the city. The final part of the analogy represents the generation of metric-based queries and a threshold of alerts for non-threat detection-based concerns.

Operational metrics and key performance indicators are desired across the purview of detection and response. The requests for this type of alert often make their way to the detection backlog due to the expertise in query development and data aggregation that most detection engineers have. These metrics are focused on situational awareness and provide very little operational impact to Defense in Depth, thus they should be held at the lowest priority.

Below is a flow chart that SpecterOps has developed in an attempt to visualize this methodology based on input into the detection backlog. The flow chart provides questions that should enable the detection engineers to approve or disapprove additions to the backlog based on the context. This flow chart is a generalized starting point, and organizations that utilize this methodology should be prepared to operationalize this knowledge by clipping it on the unique structure of their organization.

There are several important considerations when implementing this methodology into your organization.

The process of determining the prioritization is subjective and may contain overlap. For example, detection engineering may receive an external intelligence report that identifies a critical TTP for which your organization is vulnerable. In this scenario, the original input (external intelligence) would indicate a level of priority 2, but the information contained in the report would be a level of priority 0. If this pertinent information is known upon prioritization; always default to the higher-priority level.

Detection prioritization requires industry and organizational context, which aids the prioritization lead in minimizing errors. These errors could lead to unidentified and un-remediated vulnerabilities sitting in the backlog. Especially, if the input is from a less mature function and does not contain needed operational information. The input may take a less experienced engineer more resources to analyze the input and prioritize correctly. Regardless of who is prioritizing, visibility bias should be considered. When the prioritizer has researched a particular high-priority attack, other unknown or unfamiliar critical inputs may be incorrectly demoted.

Finally, as mentioned before, non-operational input from other less mature functions may make this process difficult or time-consuming. Feedback loops should be implemented to streamline this process and reduce the amount of time spent dissecting theinput.

For some organizations the above methodology is sufficient as their teams are somewhat small and their inputs into the backlog are in a manageable state; however, for other organizations, the above methodology is a good starting point but may still leave those wondering how to drill down even further to have a sense of micro-control in the prioritization structure. For that, we recommend combining the Input-Based Priority structure above with the Center for Threat Informed Defenses (The Center) Top 10 Technique Calculator to prioritize the target techniques for each of the Input-Based Priority structures [2].

The Top 10 Technique Calculator has a spreadsheet version found on GitHub that represents the backend of the web-based version [3]. This spreadsheet can be tuned and customized to match the techniques within the detection backlog per priority area. The user can then further customize this spreadsheet to represent a high-level example of coverage for specific data sources. Based on The Centers methodology, the techniques selected, the coverage for data sources, and specific prevention controls; the calculator will format a list of the top ten most critical techniques.

For example, if the detection engineering function has 15 Priority 0 techniques within the detection engineering backlog, we can utilize the Top 10 Calculator to prioritize that list of 15 detection requests to select the most critical for detection generation, first.

The centers methodology for scoring the 500 techniques and sub-techniques found within MITREs knowledge base is derived from combining prevalence, chokepoints, and actionability [4]. To gain deeper insight into the methodology, The Center recently released a blog focused on the methodology and the actionability of the Top 10 Technique Calculator [5].

To summarize, The Center has collected metrics on the prevalence of an attack technique as it relates to adversaries and its frequency of use over historical evidence. By determining how prevalent an attack technique is found within intelligence reports related to specific adversaries, The Center can grade techniques in a way that highlights which techniques have the highest frequency ofuse.

The Center defines chokepoints as the convergence of different techniques to one specific technique were preventing the execution of that technique would inhibit or degrade the ability of the adversary to continue the attack chain. The Center grades this chokepoint based on the mitigations that the user has selected to mitigate this chokepoint, and thus degrade the adversarys ability to execute the attackchain.

Finally, The Center utilizes metrics to determine the actionability of a targeted technique. By quantitatively identifying the number of publicly available methods that a defender can use to mitigate or detect the target technique, an empirical weight is then attributed to the technique. The combined metrics are then utilized to grade the target technique with a score of priority.

The detection engineering backlog is a vital starting point for every detection engineering function. By providing an area of input into the detection engineering backlog, cross-functional efficiency can enhance the capability of the detection engineering function.

The prioritization methods provided are a combination of strategic guidance from SpecterOps and the use of The Centers Top Ten Techniques project. Utilizing these two methods can enhance the prioritization structure of your organizations detection engineering backlog, however, these methods are not perfect. MITREs knowledge base of techniques was never designed to be empirically scored[6].

These methods combined are not a bolt-on method for prioritization and there are limitations and logic gaps with both; however, they provide a stable platform from which to begin prioritizing the detection engineering backlog first and generate more confidence in selecting the most critical of attack techniques.

Prioritization of the Detection Engineering Backlog was originally published in Posts By SpecterOps Team Members on Medium, where people are continuing the conversation by highlighting and responding to this story.

*** This is a Security Bloggers Network syndicated blog from Posts By SpecterOps Team Members - Medium authored by Joshua Prager. Read the original post at: https://posts.specterops.io/prioritization-of-the-detection-engineering-backlog-dcb18a896981?source=rss----f05f8696e3cc---4

Go here to see the original:

Prioritization of the Detection Engineering Backlog - Security Boulevard

Read More..

College of Engineering Presents 2022 Tang Lecture – UMass News and Media Relations

The Shirley and Ting-Wei Tang Endowment Lecture Series, founded in 1999, brings engineering leaders to campus to present a major talk to the University. This years Tang Lecturetitled From Concept to Market: Bringing a Medical Device to Lifewill be presented by Joseph Hidler 94, Founder and CEO of Aretech, LLC.

Aretech is an industry leader in developing advanced rehabilitation technologies, with a focus on robotic body-weight support systems. Aretechs feature product, ZeroG, is designed to provide patients who have experienced a stroke, traumatic brain injury, or other neurological disorders the opportunity to practice walking safely and effectively.

Hidlers lecture will take the audience on the journey of the birth and evolution of a medical device that is now being used by thousands of patients across the world. Discussions of the engineering challenges, economic considerations, regulatory requirements, and business pitfalls will be presented, and a roadmap for aspiring medical device entrepreneurs will be outlined.

Joseph Hidler earned a bachelors degree in mechanical engineering from the University of Massachusetts Amherst in 1994, and his masters degree and Ph.D. in biomedical engineering from Northwestern University. Prior to founding Aretech, he was the director of the Center for Applied Biomechanics and Rehabilitation Research (CABRR) at the National Rehabilitation Hospital in Washington, D.C.

As the University recognizes Disability Awareness Month, this lecture may be of particular interest to students and advocacy groups in support of disabled communities.

The Tang Lecture will be delivered on Thursday, Oct. 13 at 4 p.m. in the Old Chapel. The event is free and open to the public.

More information: https://engineering.umass.edu/tang-lecture

UMass event page: https://www.umass.edu/events/2022-shirley-and-ting-wei-tang-lecture

More here:

College of Engineering Presents 2022 Tang Lecture - UMass News and Media Relations

Read More..

Engineering Researcher Part of USDA Project Quantifying ‘Climate-Smart’ Rice Production – University of Arkansas Newswire

Mary Hightower, UA Division of Agriculture

From left: Kabiraj Khatiwada, Riasad Bin Mahbub, Beatriz Moreno-Garcia, Will Richardson, Elahe Tajfar, U.S. Secretary of Agriculture Tom Vilsack, Benjamin Runkle, Bonan Li, Angelia Seyfferth and Frank Linam. Others are part of Runkle's research team, while Seyfferth and Linam are collaborators from the University of Delaware.

Associate professor Benjamin Runkle is part of a group that received a five-year, $80 million U.S. Department of Agriculture award aimed at reducing greenhouse gas emission associated with rice production.

The USDA Climate Smart Agriculture Initiative project is led by USA Rice and Ducks Unlimited, which will coordinate the development and implementation. Runkle's team will receive approximately $1 million to oversee measurement, monitoring, reporting and verification to help ensure that project goals are met and wellquantified.

"This project is ambitious. It aims to impact approximately one-fifth of all rice acreage in the United States," said Runkle, who teaches in the Department of Biological and Agricultural Engineering. "Farmers will receive incentives to carry out conservation practices that save water and reduce greenhouse gas emissions while maintaining large harvests."

The project is also unique in its focus on involving historically underserved farmers through partnership with the National Black Growers Council and others. The program will also fund infrastructure development for underserved farmers to create the enabling conditions for eventual implementation of conservation practices at their farms.

This grant was one of 70 announced in September comprising a $2.8 billion investment in the creation of Partnerships for Climate Smart Commodities by the USDA. U.S. Secretary of Agriculture Tom Vilsack visited the central Arkansas rice farm of Mark Isbell on Sept. 16 to highlight the project. Vilsack noted that the USA Rice-Ducks Unlimited proposal scored the highest of all applicants.

Vilsack hosted a panel discussion that included representatives from Ducks Unlimited, the National Black Growers Council, Tyson Foods, the Winrock Foundationand U of A System Vice President of Agriculture Deacue Fields III. Both Tyson and Winrock received other awards under the program. The panelists indicated the need to develop trusted labeling of goods as climate-smart that are grounded in good science and supported throughout the supply chain.

Runkle's award will allow him to hire scientific personnel to guide project data collection, document the performance of the proposaland report findings to the USDA and to the broader scientific community. He believes that if the grant team is successful in its implementation, the project could spur spin-off activities to ensure a broader, lasting reduction of the climate impact of rice production through relatively small changes in field management practices.

Because the project will be active in all six U.S. rice producing states, the data collected will also help understanding of how to make effective changes to rice production under different management, soil and climate conditions.

Runkle noted that the project will build on his group's ongoing sustainability research at the Isbell family farm, and it will also use some of the expertise gained from his current projects funded by NASA and the National Science Foundation.

Read coverage of Vilsack's visit in the Stuttgart Daily Leader.

Go here to read the rest:

Engineering Researcher Part of USDA Project Quantifying 'Climate-Smart' Rice Production - University of Arkansas Newswire

Read More..

Microsoft Salaries: See What It Pays Engineers, Analysts, and More – Business Insider

Microsoft Microsoft

Computer Hardware Engineers

Hardware Engineer: $115,000 to $239,591Senior Design Verification Engineer: $160,000 to $173,000Senior Product Engineer: $165,000 to $190,000Silicon Design Engineer: $104,112 to $175,000Silicon Engineer: $94,000 to $239,292

Computer Systems Engineers/Architects

Cloud Solution Architect: $84,500 to $201,014Digital Cloud Solution Architecture: $120,170 to $160,160Escalation Engineer: $124,388 to $147,450Partner Technical Advisor: $92,700 to $123,500Senior Service Engineer: $134,500 to $196,865Service Engineer: $110,000 to $170,000Site Reliability Engineer: $112,500 to $207,959Solution Architecture: $121,256 to $210,000Support Engineer: $77,000 to $135,000Support Escalation Engineer: $94,372Technical Advisor: $128,440 to $151,199Technical Support Advisory: $92,000 to $138,495Technical Support Engineer: $77,900 to $175,000Technology Consulting: $98,600 to $153,420

Electrical Engineers

Digital Signal Processing: $131,250 to $171,480Electrical Engineer: $102,700 to $229,890

Industrial Engineers

Fulfillment and Logistics: $121,000 to $168,180Sourcing Engineer: $121,100 to $171,300

Mechanical Engineers

Mechanical Engineer: $112,500 to $191,205

Network Engineers

Cloud Network Engineer: $109,400 to $208,123Network Engineer: $150,000 to $151,160Senior Cloud Network Engineer: $160,000 to $172,000

Photonics Engineers

Optical Engineer: $143,700 to $198,000

Sales Engineers

Account Technology: $133,570 to $220,000Customer Engineer: $84,500 to $192,600Customer Solutions Architecture: $131,250 to $189,791Premier Field Engineer: $130,000 to $179,000Senior Customer Engineer: $134,100 to $171,000

Validation Engineers

Reliability Engineer: $137,000 to $160,130Software Test Engineer: $113,940 to $154,580

Read more here:

Microsoft Salaries: See What It Pays Engineers, Analysts, and More - Business Insider

Read More..

World’s first fusion reactor will be open in UK by 2040 – Interesting Engineering

The announcement comes after the UK's Business secretary Jacob Rees Mogg disclosed the location at the UK Conservative Party Conference on Monday.

"The plant will be the first of its kind, built by 2040 and capable of putting energy on the grid, he announced.

In doing so, it will prove the commercial viability of fusion energy to the world," he added.

Approximate location of the new reactor.

For the STEP (Spherical Tokamak for Energy Production) program to deliver the fusion energy plant, the government has pledged more than 220 million (252 million). What's more, it will also not be constructed on the virgin ground and instead be built on the site of a to-be-decommissioned coal-fired power station.

Once completed, the project is projected to cost somewhere in the order of 10 billion ($11.42 billion). But, as anyone knows about publically-funded projects of this scale, they rarely come in below budget.

According to the government, the development of the program should also bring more high-tech firms to the UK and generate thousands of high-skilled jobs throughout building and operation.

With a tender anticipated for December, the government started looking for a construction partner for the project in August. Atkins has already been identified as the engineering partner for the project too.

Nuclear fusion is the "Holy Grail" of energy production.

Researchers, however, claim that significant obstacles must be addressed before the technology can be used.

Theoretically, nuclear fusion could produce approximately four million times as much energy as coal, oil, or gas while producing no carbon emissions.

But a functional commercial plant will need to overcome several logistical challenges, not the least of which is heating significant amounts of gas to a temperature of 180 million degrees Fahrenheit (100 million degrees Celsius).

Read more here:

World's first fusion reactor will be open in UK by 2040 - Interesting Engineering

Read More..