Page 1,832«..1020..1,8311,8321,8331,834..1,8401,850..»

Avoiding the Perils of a Connected World: New Best Practices for Risk Mitigation – McMillan LLP

August 31, 2022 Business Law Bulletin 3 minute read

On August 25, 2022, the Canadian Center for Cyber Security (CCCS) released updated guidance on risk mitigation when using internet of things (IoT) devices, which provides new and important considerations for business activity.[1]

What is Internet of Things?

IoT refers to the network of everyday web-enabled objects that can connect and exchange information, and are often referred to as smart objects. Items that use the IoT network include not only laptops and smartphones, but also items like personal fitness trackers, TVs, thermostats, connected cars and home surveillance devices. IoT devices use the Internet to send data to the cloud for processing, where it is then shared with other network-connected devices through the use of Bluetooth, Wi-Fi or RFID technology.

Why is this guidance important?

The use of proper security and privacy protection is increasingly important in the context of these devices, with CCCS projecting that by 2025, there will be more than 30 billion IoT connections with an average of four IoT devices per person.

With capabilities to improve workflow and productivity, IoT devices are often used to make routine tasks more efficient and convenient. For example, using a mobile phone payment device attached to a smartphone makes for for a simple, convenient payment method. From an organizational perspective, uses for IoT devices include teleconferencing equipment, voice activated devices, networked security cameras, and corporate mobile phones, among many others.

What are the privacy and security implications of IoT technology?

IoT technology can create incredible upside for companies that wish to leverage the technology to facilitate a more creative, efficient and innovative environment for employees to succeed in their roles, but can also pose a high level of security risk for the business. Organizations that allow employees to bring their own smart devices to work can pose even more risk to security.

Without proper oversight and consideration, IoT devices can leave a business network and data vulnerable to numerous potential threats. Threat actors can take advantage of these vulnerabilities, causing a compromise of internal systems, including unauthorized security access to items like mobile Internet-enabled microphones without consent to listen in on conversations, or maliciously disrupting Internet access.

In a broader context, the security of IoT devices also applies to critical infrastructure used in industrial operations (i.e. mining, energy, transportation or medical) which can pose a broader risk to the public and business community at large.

How can businesses protect against IoT threats?

Organizations must carefully consider the implications of deploying these devices in connection with their businesses. To keep IoT devices secure, the CCCS recommends implementing or updating an organizations plans and policies that identify the security capabilities and possible vulnerabilities of an organizations network. In particular, the updated guidance recommends:

Additionally, the CCCS recommends that organizations remember that IoT devices can help find efficiencies in workflows and processes, but an organization inherits the security issues of any connected device on the network. If used in the workplace, the organization should implement policies to ensure IoT devices are introduced, used, and managed securely. Finally, there should also be policies enforcing appropriate data storage on all devices.

If you have any questions about these guidelines, maintaining compliant privacy and cybersecurity policies, or about privacy and cybersecurity more generally, a member of ourPrivacy & Data Protection Groupwould be happy to assist you.

[1] Canadian Centre for Cyber Security, Internet of Things: CCCS Best Practices for Risk Mitigation (August 25, 2022), available here.

by Robert Piasentin, Kristen Shaw and Hailey Lonsdale (Articled Student)

A Cautionary Note

The foregoing provides only an overview and does not constitute legal advice. Readers are cautioned against making any decisions based on this material alone. Rather, specific legal advice should be obtained.

McMillan LLP 2022

Visit link:
Avoiding the Perils of a Connected World: New Best Practices for Risk Mitigation - McMillan LLP

Read More..

How the Pandemic Forced F5 to Flex its Software Side – Entrepreneur

Multi-cloud application network and cybersecurity solutions provider F5 (NASDAQ: FFIV) stock has fallen (-35%) for the year. F5 enables organizations and data centers to defend its networks and applications from hackers and bots. The Company has largely pursued a growth by acquisition strategy to enter into and expand footprints in its operating segments. The Company is benefiting from the robust cloud and internet security tailwinds that are also driving growth for its competitors like Palo Alto Networks (NASDAQ: PANW) and Crowdstrike (NASDAQ: CRWD). The pandemic created the global supply chain disruption causing F5 networks to concentrate on its software business to mitigate the backlog in its hardware business. It bolstered its portfolio with Volterra and Threat Shack acquisitions in 2021 to double its total addressable market (TAM) in the cloud and application security segment. Supply chain disruptions have forced the Company to pivot more towards software and away from hardware. This has enabled its software segment to bring in 40% of its total revenues, up from under 24% pre-pandemic in 2019. Its also enabled the Company is generate 72% of its revenues from recurring sources. While the supply volume havent improved, there hasnt been any further deterioration since June 2022. This could set-up for a second half improvements as its suppliers expect to grow additional capacity by the end of 2022.

F5 originally sold application network controllers (ADCs) to data centers, internet service providers, and governments. ADCs allow application management of internet traffic between network devices and servers. Two catalysts forced the Company to transition towards growing its software business through a subscription model. First, the migration to cloud based applications has hurt the demand for on premise ADCs. Secondly, the global supply chain disruption has limited the ability to ship systems despite strong demand. The Company saw 38% growth in software sales that drove 4% revenue growth.

On July 25, 2022, F5 released its fiscal third-quarter earnings report for the quarter ending June 2022. The Company saw earnings-per-share (EPS) of $2.57, excluding non-recurring items, versus consensus analyst estimates of $2.23, beating by $0.34. Revenues rose 3.5% year-over-year (YoY) to $674.49 million beating analyst estimates for $667.81 million. The Company announced an additional $1 billion stock buyback program added to the remaining 272 million buyback program. F5 Networks CEO Francois Locoh-Donou commented, Customers depend on F5 to secure and deliver extraordinary digital experiences that drive their businesses and fuel their brands. Demand for security across all customer verticals fueled sales in our third quarter resulting in 4% total revenue growth despite ongoing semiconductor shortages.

F5 raised its guidance for Q4 2023 EPS of $2.45 to $2.57 verse $2.28 consensus analyst estimates. The Company estimates revenues of $680 million to $700 million versus $690.89 million consensus analyst estimates. Security concerns continue to drive most of its customer engagements fueling demand in both software and hardware as customers add and scale applications.

F5 continues to get wins and gain market share. A major global retailer choose F5 over an existing bot defense provider after a head-to-head three month proof of concept against its existing solution. Its distributed cloud bot solutions proved to be more efficient and convinced the client to deploy F5 for the protection of their apps and customers. F5 enables enterprises to simplify and secure their operations using both traditional and modern architectures. The launch of its new software-as-a-service (SaaS) platform offering in February of its distributed cloud services that enable the delivery of security, multi-cloud networking, and edge computing solutions is gaining traction. The Company is also seeing service providers scale and secure 4G cores and are beginning to move 5G cores into production. F5 is set to grow from software growth drivers and its distributed cloud services SaaS offerings.

Lets analyze FFIV on the daily and weekly time frames through the rifle charts. The weekly rifle chart uptrend has a rising 5-period moving average (MA) at $168.82 followed by the 15-period MA support at $160.89. The weekly 200-period support sits at $166.40. The weekly stochastic is rising towards the 70-band. This would normally be a bullish looking chart if not for the aggressive rug pull that caused shares to collapse straight through the weekly 5-period, 15-period, and 200-period MAs in a single candle to attempt to make a bottom near the $159.93 Fibonacci (fib) level. Bulls will need to protect the market structure low (MSL) buy trigger at the $157.43. The indicators especially the weekly stochastic will update as time goes on. The daily rifle chart is in the downtrend thats testing the 50-period MA support at $160.34. The daily 5-period MA resistance is falling at $164.86 followed by the 15-period MA at $169.16. The daily lower Bollinger Bands (BBs) are testing at $159.87. The daily stochastic has made a full oscillation down through the oversold 20-band. Attractive pullback levels are at the $157.43 weekly MSL trigger, $151.66, $147.54 fib, $142.43, $139.82 fib, $133.04 fib, and the $130.42 fib level.

Read more from the original source:
How the Pandemic Forced F5 to Flex its Software Side - Entrepreneur

Read More..

WISeKey is Implementing PostQuantum Algorithms in its Root of Trust Services and Semiconductors for IoT Security – StreetInsider.com

News and research before you hear about it on CNBC and others. Claim your 1-week free trial to StreetInsider Premium here.

WISeKey is Implementing PostQuantum Algorithms in its Root of Trust Services and Semiconductors for IoT Security

Geneva August 31, 2022 WISeKey International Holding Ltd (WISeKey ) (SIX: WIHN, NASDAQ: WKEY), a leading global cybersecurity, Blockchain and IoT company, today announced advances in its Post-Quantum strategy designed to support a new grade of future-proof PKI services.

WISeKey is developing a new range of Trust Services, that will take advantage of the latest developments in post-quantum encryption (PQE) to be applied in real-world applications of digital signatures and encryption using PKI and digital certificates, such as secure communication channels (TLS), enhanced Key Exchanges and email security (S/MIME). These services are currently based in standards that can be improved to be resilient to quantum attacks and offer backwards compatibility with existing counterparts. WISeKey implementation of PQE is done around the concept of hybrid signatures which combine in a single X.509 certificate a conventional signature with a second signature using a PQE algorithm. This approach ensures backwards compatibility and opens a new horizon of cybersecurity services.

Later this year, WISeKey plans to offer a first Root of Trust based in PQE algorithms promoted currently by the NIST as valid candidates, which will be the foundation of a new portfolio of Trust Services and secure several IoT projects on which WISeKey is already working.

Previously WISeKey provided updates on its progress in developing post-quantum resistant algorithms by establishing strategic R&D partnerships with MINES Saint-Etienne Research Institute. WISeKeys R&D group has been working with several NISTs candidates for the MS600X Common Criteria products, such as Crystals-Kyber and Crystals-Dilithium, aiming to develop a complete post-quantum cryptography toolbox to be combined with new PKI-related Trust Services delivered by WISeKey.

These post-quantum cryptography initiatives will play a key role in controlling vulnerability and other risks related to quantum computers technologies which when used by hackers can give them the ability to crack cryptography algorithms, corrupt cybersecurity and compromise global economy by undermining the security foundations of the current financial and governmental services. These initiatives have received tremendous support by many government entities around the world through the sponsoring of public/private R&D projects. In particular, WISeKey is active in key initiatives promoted by French Agency for Cybersecurity (ANSSI), and by the National Cybersecurity Center of Excellence of the US NIST.

WISeKey is, once more, demonstrating a clear focus on playing an active role shaping the future of the internet security. We have a solid approach in developing new products to implement post-quantum encryption technologies, and for this we will be dedicating all the necessary R&D resources, said Carlos Moreira, Founder and CEO of WISeKey.

WISeKeysstrategy to further expand its U.S. operations will also benefit from its recent collaboration with NIST for the NCCoE Trusted IoT Device Network-Layer Onboarding and Lifecycle Management Consortium project. Additional information on this consortium can be found at:http://www.nccoe.nist.gov/projects/trusted-iot-device-network-layer-onboarding-and-lifecycle-management. For this project, WISeKey is working with NIST to define recommended practices for performing trusted network-layer onboarding, which will aid in the implementation and use of trusted onboarding solutions for IoT devices at scale. The WISeKey contributions to the project will be Trust Services for credentials and secure semiconductors to keep the credentials secure. Specifically, WISeKey will offer INeS Certificate Management Service (CMS) for issuing credentials and VaultIC secure semiconductors to provide tamperproof key storage and cryptographic acceleration.

About WISeKeyWISeKey (NASDAQ: WKEY; SIX Swiss Exchange: WIHN) is a leading global cybersecurity company currently deploying large-scale digital identity ecosystems for people and objects using Blockchain, AI, and IoT respecting the Human as the Fulcrum of the Internet. WISeKey microprocessors secure the pervasive computing shaping todays Internet of Everything. WISeKey IoT has an installed base of over 1.6 billion microchips in virtually all IoT sectors (connected cars, smart cities, drones, agricultural sensors, anti-counterfeiting, smart lighting, servers, computers, mobile phones, crypto tokens, etc.). WISeKey is uniquely positioned to be at the leading edge of IoT as our semiconductors produce a huge amount of Big Data that, when analyzed with Artificial Intelligence (AI), can help industrial applications predict the failure of their equipment before it happens.

Our technology is Trusted by the OISTE/WISeKeys Swiss-based cryptographic Root of Trust (RoT) provides secure authentication and identification, in both physical and virtual environments, for the Internet of Things, Blockchain, and Artificial Intelligence. The WISeKey RoT serves as a common trust anchor to ensure the integrity of online transactions among objects and between objects and people. For more information, visitwww.wisekey.com.

Press and investor contacts

Disclaimer:This communication expressly or implicitly contains certain forward-looking statements concerning WISeKey International Holding Ltd and its business. Such statements involve certain known and unknown risks, uncertainties and other factors, which could cause the actual results, financial condition, performance or achievements of WISeKey International Holding Ltd to be materially different from any future results, performance or achievements expressed or implied by such forward-looking statements. WISeKey International Holding Ltd is providing this communication as of this date and does not undertake to update any forward-looking statements contained herein as a result of new information, future events or otherwise.

This press release does not constitute an offer to sell, or a solicitation of an offer to buy, any securities, and it does not constitute an offering prospectus within the meaning of article 652a or article 1156 of the Swiss Code of Obligations or a listing prospectus within the meaning of the listing rules of the SIX Swiss Exchange. Investors must rely on their own evaluation of WISeKey and its securities, including the merits and risks involved. Nothing contained herein is or shall be relied on as, a promise or representation as to the future performance of WISeKey.

Read the original post:
WISeKey is Implementing PostQuantum Algorithms in its Root of Trust Services and Semiconductors for IoT Security - StreetInsider.com

Read More..

With Billions Stolen from DeFi Platforms in 2022, FBI Asks Users to Tread Cautiously – Spiceworks News and Insights

The FBI warned individuals to vet decentralized finance (DeFi) platforms carefully before investing in cryptocurrency. In an advisory released on Monday by the FBIs Internet Crime Complaint Center (IC3), the federal agency highlighted how cybercriminals are making a killing on the DeFi platforms.

IC3 cited the latest report from blockchain analysis company Chainalysis that puts the total value of cryptocurrency stolen in Q1 2022 at $1.3 billion. From January through July 2022 (H1 2022), hackers indirectly ripped off individuals $1.9 billion, 97% of which was through DeFi platforms.

During H1 2021, crypto heists amounted to $1.2 billion, thus signifying an increase of just under 60% YoY this year. A cause of concern indeed. Chainalysis believes there are no indications that the cybercriminal activity against cryptocurrency and DeFi platforms will slow down. The Nomad crypto bridge attack in H2 2022 (August) is a prime example. The incident allowed thousands of regular internet users to steal almost $190 million from the system.

Cryptocurrency Theft Data | Source: Chainalysis

One of the major culprits is security gaps in DeFi protocols which cybercriminals love to exploit. Surja Chatterjea, head of product and alliances at Skybox Security, told Spiceworks, This is the latest urgent reminder that cybercriminals are increasingly targeting known vulnerabilities hiding in plain sight and turning them into backdoors to deploy complex attacks that are increasing at record rates.

DeFi protocols, including that of Nomad and others, offer features such as blockchain interoperability, i.e., the ability to transfer and trade cryptocurrency tokens between multiple blockchain networks like Ethereum, Solana, etc.

Users leverage programs called smart contracts that are used to store crypto assets, and that execute when predetermined conditions are met. Smart contracts are complex and exist across decentralized blockchain networks.

See More: Bad Code Update Lets Hackers Steal $190M From Cryptocurrency Bridge Nomad

However, these DeFi protocols are often vulnerable to bugs and fall prey to malicious actors on the prowl for a quick payoff. If organizations are relying on conventional approaches to vulnerability management, they may only move to patch the highest severity vulnerabilities first based on the Common Vulnerability Scoring System (CVSS), Chatterjea added.

Cybercriminals know this is how many companies handle their cybersecurity, so theyve learned to take advantage of vulnerabilities seen as less critical to carry out their attacks. Skybox Research Lab recently found that new cryptojacking programs were up 75% year-over-year.

As noted by the FBI, vulnerabilities were exploited to carry out a flash loan attack that caused losses of $35 million in one incident, and $3 million in another, going up as much as $320 million.

Vulnerabilities are also the reason behind the most prominent crypto incident, the $620 million heist from Axie Infinitys Ronin Bridge, as well as others, including the $326 million Wormhole heist, the $100 million Harmony heist, the $80 million Fei Protocol heist, and the more recent $190 million Nomad heist, and others.

FBI advised individuals to conduct due diligence of the DeFi platform before investing, which includes considering whether the platform has been audited for its code, smart contracts, and the risk of crowdsourced vulnerability identification.

For companies operating in the DeFi space, Chatterjea advised a proactive approach to vulnerability management and quantifying the economic impact. Proactive approaches to vulnerability management can significantly reduce time and resources spent by threat hunting teams in reactive enterprise-wide searches for indicators of compromise (IoCs) and indicators of attack (IoAs), Chatterjea explained.

A mature risk management program explicitly links vulnerabilities with their associated malware names and types (Cryptocurrency Miner, for example) to improve MTTD/MTTR and drive down breach risk across the enterprise. Organizations should ensure they have solutions in place capable of quantifying the business impact of cyber risks into economic impact, she added.

This will help them identify and prioritize the most critical threats based on the size of financial impact, among other risk analyses such as exposure-based risk scores. Its essential for organizations to increase the maturity of their vulnerability management programs to ensure they can quickly discover if they are impacted by vulnerabilities and how urgent it is to remediate.

Let us know if you enjoyed reading this news on LinkedIn, Twitter, or Facebook. We would love to hear from you!

Read this article:
With Billions Stolen from DeFi Platforms in 2022, FBI Asks Users to Tread Cautiously - Spiceworks News and Insights

Read More..

Analytics and Data Science News for the Week of September 2; Updates from Alteryx, AWS, Teradata, and More – Solutions Review

The editors at Solutions Review have curated this list of the most noteworthy analytics and data science news items for the week of September 2, 2022.

Keeping tabs on all the most relevant analytics and data science news can be a time-consuming task. As a result, our editorial team aims to provide a summary of the top headlines from the last month, in this space. Solutions Review editors will curate vendor product news, mergers and acquisitions, venture capital funding, talent acquisition, and other noteworthy analytics and data science news items.

The launch of Server-FIPS is monumental for the use of analytics in public sector environments that require enhanced data encryption. Alteryx Server-FIPS is a FIPS-capable and scalable server-based product for scheduling, sharing, and running apps and models created in Alteryx Designer-FIPS for others in the organization to leverage.

Read on for more.

With this new feature, Amazon QuickSight customers can easily provide insights to end-users where they need them most by embedding individual visualizations from Amazon QuickSight dashboards into high-trac webpages and applications without the need for server or software setup or infrastructure management.

Read on for more.

The 9th annual report examines data science and machine learning end user deployment and trends, covering analytical features and functions, neural networks, data preparation, tool usability, model operations, scalability, and open source and big data.

Read on for more.

The pairing of CXOs purpose-built, web-based Enterprise Performance Management (EPM) reporting and Longviews modular suite of integrated products for tax, transfer pricing, close, plan, and consolidation will allow organizations to deliver richer narrative behind their data with built-in commentary and dynamic dashboards.

Read on for more.

Read on for more.

With these new capabilities, Vantage customers can now take advantage of the most in-database analytic functions anywhere in the market and critical artificial intelligence/machine learning (AI/ML) model management tools. This new functionality in combination with the launch ofTeradata VantageCloud Lake is intended to provide customers the ability to activate massive amounts of data and solve complex business challenges.

Read on for more.

For consideration in future analytics and data science news roundups, send your announcements to the editor: tking@solutionsreview.com.

Widget not in any sidebars

Tim is Solutions Review's Editorial Director and leads coverage on big data, business intelligence, and data analytics. A 2017 and 2018 Most Influential Business Journalist and 2021 "Who's Who" in data management and data integration, Tim is a recognized influencer and thought leader in enterprise business software. Reach him via tking at solutionsreview dot com.

Read more:

Analytics and Data Science News for the Week of September 2; Updates from Alteryx, AWS, Teradata, and More - Solutions Review

Read More..

NASA Oceo Pre-Submission Webinar: Appendix N: MUREP PBI/HBCU Data Science Equity, Access and Priority for Research and Education (DEAP) – Space Ref

Press Release

NASA

September 2, 2022

Engagement Opportunities in NASA STEM 2022 (EONS2022)Appendix N: MUREP PBI/HBCU Data Science Equity, Access and Priority for Research and Education (DEAP)

Pre-Submission Webinar is Scheduled for Wednesday, September 14, 2022at 4:00 pm 5:00 pm Eastern Time

Pre-Registration Link:https://nasaenterprise.webex.com/nasaenterprise/j.php?RGID=r618b325e3a1b4c80ee1380b7f88d6a08

Pre-Registration is required (link to participate will be sent to your email after pre-registration is completed and approved.)

During this session, the MUREP DEAP team will give an in-depth overview of the opportunity and highlight information contained in the EONS 2022 document regarding proposal preparation and requirements. Please visit the MUREP DEAP website for details on how to join the call. Any changes to this session will be posted there as well. Proposers are strongly advised to check for updates prior to the call.

For more information regarding this opportunity, please visit the ENGAGEMENT OPPORTUNITIES IN NASA STEM (EONS 2022) on the NASA Solicitation and Proposal Integrated Review and Evaluation System (NSPIRES) website and click on List of Open Program Elements.

Please submit your questions to MUREPDEAP@nasaprs.com. A recording of this webinar will be made available after the session.

Should you or your colleagues be interested in this opportunity, please apply at the MUREP DEAP website

SpaceRef co-founder, Explorers Club Fellow, ex-NASA, Away Teams, Journalist, Space & Astrobiology, Lapsed climber.

More here:

NASA Oceo Pre-Submission Webinar: Appendix N: MUREP PBI/HBCU Data Science Equity, Access and Priority for Research and Education (DEAP) - Space Ref

Read More..

Augmenting the Analyst: Using data science, training, tools, and techniques to enhance performance – Security Boulevard

The increasing demand for cybersecurity analysts is a combination of playing catch-up, keeping up with growing threats/attacker capabilities, and a globally expanding IT footprint. With relief for the growing security skills gap nearly a decade out, we must find ways to support the analysts that are already working to protect us. In this blog, we discuss ways to augment their efforts and maximize their time by overcoming some of the key challenges they face.

Why do we need to augment our analysts?The global cybersecurity landscape is in crisis due to the lack of available skilled talent. A recent U.S. survey by Emsi Burning Glass (now Lightcast) showed that one million cybersecurity professionals are working in the industry, yet there are more than 700,000 open roles to be filled. The situation is similarly critical throughout Europe according to LinkedIn data, which indicates a 22% increase in demand for talent last year alone with no sign of slowing down.

Educational institutions, government efforts, and private training programs are creating new candidates as quickly as possible, but it takes five to ten years to create an experienced L3 security operations center (SOC) analyst. Thats clearly a solution for the future. So, what do we do in the meantime?

What about artificial intelligence, machine learning, and data science?Many people believe that machine learning (ML) and artificial intelligence (AI) are going to replace SOC analysts. But thats not going to happen, at least any time in the next couple of decades.

Yes, we have self-driving cars, and yes, a self-driving car that drives on the road without crashing is impressive. But they are as much enabled by advances in computer vision as they are by AI/ML, Using the same tools to decide if a 10,000-endpoint company network is secure is like keeping 10,000 cars on the road simultaneously when youre not 100 percent sure where youre going or what the road looks like.

AI/ML techniques arent magic bullets to solve the whole problem. They are a collection of solutions to very specific parts of the problem, such as inferring facts about security data that may be difficult or impossible for a human to determine. For example, AI/ML can detect a predictable pattern to user logon failures which highlights it as an automated activity thats using low and slow timing to try and evade detection. Or it can identify anomalous user behavior and connect it to other anomalous system activity such as when an admin suddenly logs onto the system at 3:00am from a new location.

Does the use of AI/ML need any extra training?Data science is a vocation that most security analysts are not skilled or experienced in. AI/ML systems have started to help stem the tide of alerts, but it can become problematic if analysts are not able to understand what these tools are doing.

Early AI/ML tools, for instance, were famous for presenting a result such as anomalous behavior detected, but with no context for the analyst to determine why the behavior was anomalous. The lack of insight had the potential to devolve analysts into a state of environment blindness, allowing critical threats to go unnoticed.

Training provides benefits because security operations center (SOC) analysts want to improve the way they work. Its baked into every modern SOC as the core principle of continual improvement. If we give analysts additional ways to approach the problem space, they will use them to innovate and iterate better ways of creating and delivering security value.

Outside of the data science domain, SOC analysts regularly acquire and keep certifications up to date. But with an expanding number of SOC training courses and certifications available, it is essential that analysts focus on the courses that provide tangible benefits, are relevant to the security domain, and lead to demonstrable improvements in analyst performance and capability.

What tools can help SOC analysts to do more?Modern SOC tools can help make an analyst more effective and productive. These tools take advantage of all types of available security-related data to help analysts perform meaningful analytics. Data is prioritized and presented to the analysts, so they know what to look at first, making it quicker to drill into the important areas.

Similar to AI/ML, automation within SOC tools was cited historically as a way to eliminate the need for analysts. While that debate seems to have ended (for now), some important developments did come out of it.

Specifically, the term Security Orchestration Automation Response (SOAR) has become a key grouping for automated activities. SOAR, though, is much more than this. Its a way to let SOC analysts directly automate the parts of their job which can be automated in a structured, yet collaborative and freeform way with their peers.

For example, SOAR tools can pre-aggregate additional information that an analyst might want to review upon being fed an alert. This is a tremendous time-saver because it cuts out the manual steps of requesting that data.

Click Tax is also a major consideration that doesnt get much attention. This is a colloquial measurement for the time it takes an analyst to interact with and use tools such as loading times, complex chains of UI interactions, the distance of mouse movements, and the potential for errors in selecting or entering data. Click Tax increases the time it takes an analyst to complete a task, and gets in the way of the analysis throughflow. Saving just 30 seconds in Click Tax per alert could save an entire day of SOC analyst time. The title of a recent Forrester report sums it up: Analyst Experience (AX): Security Analysts Finally Escape the Shackles of Bad UX.

ConclusionThe crisis of staffing in the cybersecurity field is going to get worse before it gets better. The good news is that we can help current security analysts be more efficient and effective. We see the best results when cutting-edge technology is used correctly, training is available to help analysts make the best use of it, and tooling is focused on enhancing and augmenting SOC teams to do more better and faster. Combining data science, training, tools, and techniques with great analysts is where the magic happens.

*** This is a Security Bloggers Network syndicated blog from SilverSky authored by michele-johnston. Read the original post at: https://www.silversky.com/blog/augmenting-the-analyst-using-data-science-training-tools-and-techniques-to-enhance-performance/

Continued here:

Augmenting the Analyst: Using data science, training, tools, and techniques to enhance performance - Security Boulevard

Read More..

Black Knight’s Rapid Analytics Platform transforms the way companies leverage data and enable analytics – HousingWire

The fintech solutions today may have been unimaginable just a few years ago. But between the shift to an online business landscape brought on by the pandemic and increasing demand for digital-first solutions, the mortgage industry was quick to adapt to the new normal of conducting transactions through the virtual world.

Black Knight, a leader in providing innovations that enhance how businesses work with technology, data and analytics, has stayed ahead of the digital mortgage revolution since day one. The companys Rapid Analytics Platform (RAP), for example, launched in 2019 andsimplifies a clients data and analytics workflow. RAP enables users to easily connect to diverse data assets and run advanced analytics on a single platform with real-time, high-speed processing capabilities to deliver fast results even in the most complex cases.

Described as a virtual lab, RAP is being utilized by forward-thinking mortgage, real estate and capital markets professionals for the most advanced capabilities. From portfolio retention strategy, equity analysis and valuation to prepayment and default analytics, pre- and post-bid due diligence, performance benchmarking, and more, RAP significantly reduces the time, effort and cost for organizations in the mortgage industry to analyze large data sets and create models.

Behind RAPs distinctive innovation is Black Knights team of experienced mortgage professionals who knew that clients could benefit significantly by realizing the business value of the companys data and analytics. But in order for clients to glean actionable intelligence from that data about customers, prospects, opportunities and risk, an innovative tool would have to be built first. This led to the creation of RAP a single, cloud-based environment with massive storage, compute and data science capabilities.

Since the launch of RAP, client adoption has accelerated quickly. As a result, Black Knight continues to make valuable platform enhancements, such as increasing scalability and adding new data sets.

The assets available within RAP include nationwide public-records property and MLS information, loan-level and historical mortgage performance data, daily rate lock data, AVMs, home price indices and more. Users have the choice to build their own analytics or leverage Black Knights highly experienced professionals to develop and deliver customized analytics, providing an extra level of available support.

With RAP, clients have a unique tool that arms them with the information needed to better allocate their resources more effectively. From risk management and portfolio research to economic modeling, benchmarking and investor reporting, RAP transforms how companies leverage data and support decision science strategies in their workflow.

By delivering computational power significantly greater than what most organizations have in-house, RAP is democratizing access to big data and analytics allowing mid-sized and smaller lenders to contend in a competitive industry.

With an array of tailored features and a cutting-edge approach, RAP is truly fintech at the forefront of digital mortgage transformation.

View original post here:

Black Knight's Rapid Analytics Platform transforms the way companies leverage data and enable analytics - HousingWire

Read More..

Introducing the Class of 2026: Selina Manua | BU Today – Boston University

Working for educational equality in Indonesia since sixth grade

Computing and data science major Selina Manua (CDS26) aims to blend her coding skills with her concern for equality in education while at BU. Photo by Cydney Scott

Student ProfileWorking for educational equality in Indonesia since sixth grade

A quick snapshot of the Class of 2026, the highest achieving and most diverse class in BU history: of the 3,620 entering freshmen, 19.4 percent are first-generation students and 21.2 percent are from underrepresented groups. They hail from 47 states (with Mississippi, West Virginia, and North Dakota the exceptions) and 65 countries and regions (23 percent are international students). The class is 59 percent female, 41 percent male, and has an average GPA of 3.9 percent.

But those are just numbers. To give you a better sense of just how accomplished the Class of 2026 is, we introduce four students who share their inspiring stories.

Many students find their involvement in activism and commitment to social justice ratchets up when they get to college. For Selina Manua, growing up in Jakarta, Indonesia, it started in sixth grade.

A family friend shared a news report about a bare-bones one-room school serving the children of a shantytown under a toll bridge. The school was set to be demolished for a public works project, and adults were movingsuccessfully in the endto save it. But Manua (CDS26) asked her mother to take her there, a 30-minute drive from their home, to see the school for herself. When she did, she volunteered to teach math to the children, who were only a few years younger than her, on Saturdays.

But she wanted to do more for the schools 60 students, boys and girls age 6 to 10.

I was shocked about the conditions they were in, Manua says. There was no [insulation] so it was very hot and there was water dripping from the roof, the children had to sit on the floor all the time, and it was poorly lit.

I was in schools that had nice facilities, so I decided to help them have better conditions, because we need to have equality, she says. Thats when I started a group called Reading Train.

Manuas parents, who encourage her giving back, work in real estate development, so she lived in a nicer part of the city and knew people and companies that could help. She set about raising money, collecting in-kind donations, such as furniture, and selling T-shirts. In six months, she collected the equivalent of $10,000, along with in-kind donations to the school, called Sekolah Anak Kolong Tol Jembatan Tiga.

Theres no official translation for the school name, but if it were to be translated, it would be School for Children under the Toll Bridge, Manua says. It sounds sadly Dickensian, but there is a bit of a happy ending.

We raised enough funds to renovate the school and make it a better place for the children and also renovate the small building next to it so they will have, like, a mini-library, she says. We fixed the roof, we painted the walls, we bought new bookshelves, desks and chairs, and insulation and fans, and fixed the floor because the tiles were all broken.

She is still involved with the school, and even wrote and published a reading primer for the students. She continued to teach there on Saturdays, when the students all get a free lunch and are sometimes treated to special events, like a magician.

She wont be there this fall, though. Manua arrived at BU a few days ago and hopes to continue working toward educational equity for women and underserved populations while here. She is a Presidential Scholar and is joining the inaugural class of data science majors in the new Faculty of Computing & Data Sciences.

Reading Train was hardly her only prosocial activity back home though.

Manua attended the same K-12 school through her high school freshman year, and STEM was a major focus there. Thats where my interest really blossomed, she says. There were a lot of math olympiads and competitions, and our teachers really supported us in learning about science and performing experiments.

As a freshman, she studied writing computer code and found her (other) calling. The reason is, coding is more logic-based, and there are a multitude of ways to get the same outcome, she says. It just depends on how you think and how your logic flows.

When she changed schools after freshman year, she formed sheSTEM, an all-female club, because of what she saw among poor girls in the shantytown school and others where she volunteered.

Since theyre raised in a more traditional setting, theyre engineered to think that science or STEM is a scary thing for women, she says. They havent been exposed to the modern thinking that science is for everyone. Thats when I realized we need more inclusivity in STEM, especially for women.

The club, which has about 20 members, organizes events for schools and other nonprofit groups, such as an introduction to the history of women Nobel Prize winners in science and an actual visit to the shantytown school from a woman scientist who conducted an experiment with the kids.

I was in schools that had nice facilities, so I decided to help them have better conditions, because we need to have equality.

Afterward a lot of them said, Oh, this is so fun, especially hearing from the guest talking about what she does as a woman in STEM, Manua says. She hopes the students will realize that STEM shouldnt be for just a single gender, but for everyone in the world.

She strongly believes that a good education is for everyone in the world, and shes set about working to help other students. One of the problems in that school was that the parents are illiterate, she says. Literacy to me is everything, you need it for every job in life. And in the bigger cities, people at least have access to some education, but in rural villages that privilege is taken away. A lot of places do not even have proper schools because of problems like land scarcity and lack of teachers.

So she launched Roda Belajar (in English, Learning Wheels), a plan to create a mobile school that can travel to remote villages with a teacher on board, providing an education that would not otherwise be available. She envisions a classroom inside a bus that will travel to two or three towns a dayyounger kids, she notes, have short attention spansto provide a few hours of lessons, repeating the route daily. Manua has already designed the bus, she says, and is talking to the Ministry of Education about her idea in hopes of getting it up and running next year, when she is home for the summer.

She also put her nascent programming skills to work on the project.

We need data to identify which areas need the mobile school the most, she says. I looked at data from the Ministry of Education on things like student-teacher ratio and found the places where it was the worst. And I made a route using algorithmic optimization with the data to find out where the mobile school should go first and where it should end.

She does have interests outside STEM and education, including playing tennis and cooking Japanese and Korean food. Her older sister attends the University of Washington, and when asked why she chose BU, she points to the multitude of student organizations she can get involved in.

But the most essential reason Manua came here connects to her major: its the new Center for Computing & Data Sciences, rising 19 stories above Commonwealth Avenue, which is set to open in December.

That they dedicated a whole new building to computing and data science really sparked my interest, because thats where my passion lies, she says. By building that building, they really showed that they are ready to invest in the field, and that its going to be one of their main focuses. That looks like the best building at BU.

Read the original here:

Introducing the Class of 2026: Selina Manua | BU Today - Boston University

Read More..

From a small village in China to MD Anderson: Genomic medicine researcher looks to the future of big data in cancer care – MD Anderson Cancer Center

As an associate professor in Genomic Medicine, Linghua Wang, M.D., Ph.D., studies how normal cells become cancerous and how cancer cells develop resistance to drugs.

She and her lab are working to identify the earliest events during tumor progression from precancerous diseases to discover new biomarkers and targets for the development of effective interception strategies.

The lab is also focused on understanding cellular plasticity, which is how cancer cells adapt to the microenvironment and avoid being attacked by the immune system or cancer treatments.

Cellular plasticity contributes to cancer development, progression and metastasis. If we can better understand this process, we can develop effective treatment strategies to overcome drug resistance, Wang says.

As she looks toward the future, she reflects on the challenges shes overcome to get to where she is today.

A desire for a different path

Growing up in a small village in China, Wang was expected to follow a traditional path for young women to become a housewife and take care of children. In fact, with three younger brothers at home to take care of, she wasnt supposed to advance beyond middle school.

I knew I wanted a different life for myself, Wang says. She worked hard and earned great grades, which caught the attention of her teachers and the school principal, who encouraged Wangs parents to let her continue her education.

Wang did so well in school that she earned scholarships to pay for college, where her love of learning grew. I never had books of my own to read growing up, she says. The first time I saw the library, I couldnt believe there were so many books.

Earning an M.D., then Ph.D.

Wang grew up with the goal of becoming a doctor so she could help people. After medical school, she earned a license to practice ophthalmology. But a few months later, her husband was admitted to a Ph.D. program in Tokyo, Japan.

I didnt want to live apart, but I knew I would have had to start my medical school all over again to be able to practice in Japan, so I decided to move with my husband and find a new career, she says.

For the first few months in Japan, Wang wasnt sure what she wanted to do with her life. But she did know one thing: I didnt want to be just a housewife, so I started looking for a job that would keep me constantly learning. She was hired as a research fellow in a cancer genetics laboratory.

I learned about cancer cells and couldnt wait to learn more, she says. So, she enrolled in a Ph.D. program in cancer genomics at the University of Tokyo, studying pancreatic cancer.

It opened a whole new world for me and fueled my passion, Wang says. I realized that studying the cancer genome can transform cancerdiagnosis and treatment and help cancer patients. After that, I was hooked on cancer genomics and data science.

Making connections at MD Anderson

After earning her Ph.D., Wang and her family moved to Houston in 2012, where she completed her postdoctoral training at Baylor College of Medicine and joined their research faculty.

She wanted to become an independent investigator so that she could build and grow her own lab. In 2016, she was invited to speak at the Annual Human Genome Meeting, where she met Andy Futreal, Ph.D., chair of Genomic Medicine at MD Anderson.

I walked up to him and asked if he had any tenure-track faculty positions, she recalls. I felt so lucky to meet Dr. Futreal, who recruited me to MD Anderson. He is always there whenever I need his support and he provided the platform for me to find my own way to shine.

Wang credits MD Andersons team science approach for her interest in establishing a lab here in 2017. MD Anderson is an exceptional place to work with resources and facilities unlike anywhere else. We have so many talented scientists here, and it is such a wonderful place to collaborate. Working closely as a team, were making meaningful contributions to patient care, she says.

Wangs lab aims to harness the potential of big data to fight cancer. Im thrilled about the future of big data in cancer care and the work were doing in the lab. I want to bring in new researchers who love the work and are just as motivated and ambitious as I am.

Finding a balance between work and home life

With three young kids at home, Wang says being a mother helps her be a better leader. Parenthood has taught me to communicate more effectively, and to be more compassionate with members of my lab, she says.

It also helps her manage her time. I have a very busy schedule, constantly going from one meeting to the next, and with tight deadlines for grants and manuscripts, she says. So, I have to manage my time wisely to make sure I can spend quality time with my family, too.

Outside the lab, she likes to travel with her family and finds that cooking meals for them feeds her creative side. I love testing new recipes and seeing my family enjoy trying something new, she says. Cooking is my mental break, and its nice to make something without having to look at a screen, like I do throughout the workday.

The future of genomic medicine

Wang believes the rise in data science, machine learning and artificial intelligence will advance precision and predictive oncology and accelerate drug development.

We will be able to accurately predict patients response to therapy as well as the risk of recurrence and adverse effects and choose the best possible treatment for patients, she says.

And, perhaps most importantly, by using big data and predictive analytics to determine cancer risk, Wang believes researchers will be able to identify better biomarkers to detect cancer early and develop better prevention strategies to reduce the risk of getting cancer.

I expect to see successful integration of data science and clinical practice in the near future, Wang says.

Request an appointment at MD Anderson online or by calling 1-877-632-6789.

Read the original here:

From a small village in China to MD Anderson: Genomic medicine researcher looks to the future of big data in cancer care - MD Anderson Cancer Center

Read More..