Page 1,948«..1020..1,9471,9481,9491,950..1,9601,970..»

Indonesia Data Center Market is expected to reach about USD 3 Billion in terms of Revenue by the year ending 2026F: Ken Research – PR Newswire

GURUGRAM, India, July 20, 2022 /PRNewswire/ --

Government's 'Making Indonesia 4.0' Plan: The Indonesian Government's program 'Making Indonesia 4.0' will putIndonesiaamong the top ten global economies by 2030 by implementing digital transformation in different industry verticals such as manufacturing, finance, healthcare, and more resulting in the higher demand for Data Center services by the end users in the country.

Growth of Internet Economy to Drive Data Center Growth: The growth of the digital economy in Indonesia is expected to reach USD 150+ billion in 2025.With the growing internet economy, the demand for data services and infrastructure is expected to increase exponentially in Indonesia.

New Entrants: New entrants will provide a major boost to market growth during 2022-2026, supporting the wholesale needs of local enterprises and cloud service providers in the region.Companies such as Space DC, PureDC and more are currently building their facilities in the country.

Upcoming Smaller Facilities: PT Solusi Sinergi Digital Tbk or Surge is preparing to build edge data centers in train stations and warehouses of village cooperatives (KUD) across Java Island.

Emergence of 5G Technology: The emergence of 5G technology in Indonesia is likely to grow the adoption of IoT-enabled products in the Indonesian market further contributing to the development of data center industry.

Analysts at Ken Research in their latest publication "Indonesia Data Center Market Outlook to 2026- Growing Tech Savy Population, Internet Penetration Rate and Rising Number of Facilities to Drive the Indonesia Data Center market in the near future" believe that the data center industry in Indonesia has been growing and is expected that it will expand further owing to the rising number of data centers, surge in demand for local data centers, attractive investments from hyper scale cloud providers, additional services provided by the companies such as cloud services, data recovery, security services, cross connect and others. The market is expected to register a positive CAGR of 24% in terms of revenue during the forecast period 2022F-2026F.

Key Segments Covered: -

Managed Data Center

Key Target Audience:-

Time Period Captured in the Report:-

Companies Covered:-

Key Topics Covered in the Report:-

For More Info on the Research Report, Click on the below link: -

Indonesia Data Center Market Analysis

Related Reports by Ken Research: -

KSA Data Center and Cloud Services Market Outlook to 2026F Driven by rising investments in data centers from private sector and government support towards technology and Cloud first policy

KSA is the largest ICT market in the MENA, and it is well-positioned to become a technology service and cloud hub with access to international connectivity through the Red Sea and the Gulf. KSA Data Centre industry is witnessing robust growth in the era of virtualization and cloud computing. Shifts in creative media content towards Content Delivery Networks, IoT, growth of big data and the roll out of 5G is driving the demand for data consumption in KSA. Improvement in network connectivity, government support, and rapid growth in the adoption of big data, and IoT services have been strong enablers for the growth of the KSA data Center market.

KSA Data Center is moderately concentrated market with STC and Mobily are the top player with the greatest number of data centers. Majority of the Data Center operators are in collaborative terms with other market players to expand their business and reach to the rising demand of data usage by end users. KSA Data Center Market is set to grow at a CAGR of 19.5% in terms of revenue generation, over the period 2021-2026F. The KSA government's smart city initiatives, adoption of 5G, Internet of Things (IoT), Artificial Intelligence (AI) and cloud first policy are driving the demand for Data Centers.

UAE Data Center and Cloud Services Market Outlook to 2026F Driven by Rapid Digital Penetration along with Increasing Investments to meet the Rising Demand for Data Storage and Cloud Services

UAE Data Centre industry is witnessing robust growth in the era of virtualization and cloud computing. The increased use of data consumption and internet bandwidth in the country is driven by expanding reach of social media, increased use of smart devices, data localization, increased adoption of cloud services and digital transformation journeys of many UAE Data Center companies.

UAE Data Center is highly fragmented market with Etisalat as the top player with most number of data centers. Majority of the Data Center operators are in collaborative terms with other market players to expand their business and reach to the rising demand of data usage by end users. UAE Data Center Market is set to grow at a CAGR of 18.4% in terms of revenue generation, over the period 2021-2026F. The UAE government's smart city initiatives, adoption of 5G, Internet of Things (IoT), Artificial Intelligence (AI) are driving the demand for Data Centers.

India Data Center and Cloud Services Market Outlook to 2025- Favorable Government Support and Data Localization Leading to Surge in Data Center Adoption

The India data center market was observed to grow with a stable growth pattern in the review period 2014-2020P. Factors such as data localization law, government's digitization drive, rapid movement from cloud computing to the edge computing surge in outsourcing of data center services and others have helped the data center industry to grow in India in terms of revenue.

Malaysia Data Center Market Outlook to 2022 - by Revenue Streams (Colocation, Managed Hosting and Cloud Services), by End Users (Banking & Finance, Federal Government, Content & Technology and Others)

The data centre market in Malaysia is in the growth stage. The support and encouragement provided by the government along with the efforts to promote the country as a hub for data centres have catapulted development in the market in every aspect. The market is an amalgamation of large-sized and mid-sized players that specialize in colocation and managed hosting services. The market has also witnessed a substantial rise in the demand for public and private cloud services. The Johor area (close to Singapore) in the southern part of the country is growing as an attractive investment opportunity for data centre companies. Malaysia data centre market has witnessed substantial growth in the past few years recording a CAGR of ~% during 2012-2017. The market has grown from USD ~ million in 2012 to USD ~ million in 2017 driven Economic Transformation Programme (ETP) launched in Malaysia which has listed development of Data Centre Market in Malaysia as a key Entry Point Projects (EPPs) under the Business Services NKEAs (National Key Economic Areas). The low cost of the establishment along with the infrastructure development has been the major attractions for DC companies in Malaysia. The market has witnessed double-digit growth in the past five years except in the year 2015 when the growth rate of the market fell to ~% from ~% in 2014. The slowdown in the global market restricted companies from outsourcing their data centre services, this restricted the double-digit growth of the market in 2014 to single-digit growth in 2015.

Contact Us: -Ken ResearchAnkur Gupta, Head Marketing & Communications[emailprotected]+91-9015378249

Logo : https://mma.prnewswire.com/media/661352/Ken_Research_Logo.jpg

SOURCE Ken Research

Excerpt from:
Indonesia Data Center Market is expected to reach about USD 3 Billion in terms of Revenue by the year ending 2026F: Ken Research - PR Newswire

Read More..

The Digital Services Act (DSA) Transforms Regulation Of Online Intermediaries – Advertising, Marketing & Branding – United States – Mondaq

On July 5, 2022, the European Parliament voted to approve the final text of the Digital Services Act("DSA" or the "Act"), a landmark regulationthat-along with its sister regulation, the Digital Markets Act("DMA")-is poised to transform the global regulatorylandscape for social media platforms, hosting services like cloudservice providers, and other online intermediaries.

Lawmakers have billed the DSA as implementing the principle that"what is illegal offline, should be illegal online." Inreality, the DSA goes much further, requiring online platforms tonot only take greater accountability for "illegal" and"harmful" content that they host, but also to provideunprecedented transparency around their content moderationpractices, targeted advertising, and recommender algorithms, and tomaintain comprehensive risk management systems for a potentiallywide range of systemic risks-from public health crises to politicalmisinformation.

In this Debevoise Data Blog post, we have provided an update onthe status of the DSA, an overview of the key features of thislandmark regulation, and several take-aways for companies about theimport of the DSA.

The Parliamentary vote was the penultimate step for enactment ofthe DSA, which is now due to be adopted by the European Council inSeptember 2022, formally enacting it as law. The Act was firstintroduced in December 2020, but stalled for negotiations betweenthe European Council and Parliament. A political agreement wasreached in late April 2022, and the text of the Act was finalizedin the subsequent months leading up to the July Parliamentaryvote.

Once adopted, the timeline for its application and enforcementwill be fast-paced. While the full text of the DSA would beginapplying to all covered online intermediary services on January 1,2024, companies designated as very large online platforms("VLOPs") may have to begin complying with a subset ofprovisions at a much earlier date, most likely in early ormid-2023.

The DSA applies to a wide range of "intermediaryservices," which the Act categorizes by the role, size, andimpact of a given company on the online ecosystem."Intermediary services" include a broad range of"mere conduit," "caching," and"hosting" services, with the bulk of the Act'srequirements focused on the following types of companies:

Under the Act, VLOPs and VLOSEs are subject to the moststringent set of requirements, as well as greater regulatoryoversight.

The DSA imposes tiered requirements on different categories ofintermediary services, which means that a different set ofobligations will apply to each type of intermediary covered underthe Act. However, the general requirements of the Act are asfollows:

The DSA imposes outright bans on the following practices for allproviders of online platforms:

The DSA increases intermediaries' obligations to counterillegal goods, services, or content online. In particular,platforms must implement policies to ensure greater traceability ofbusiness users in online market places and must provide a mechanismfor any individual or entity to easily flag illegal content.Requirements for various categories of intermediaries include:

The DSA also establishes stringent transparency requirements forintermediary services regarding targeted advertising and contentmoderation practices. Requirements for various categories ofintermediaries include:

The DSA provides that VLOPs (such as major social mediaplatforms) have "a systemic impact in facilitating publicdebate, economic transactions and the dissemination of information,opinions and ideas." Accordingly, the DSA imposes additional,more stringent obligations on them. In addition to the requirementslisted above, VLOPs will be subject to the followingobligations:

Platforms must comply with crisis responseprotocols developed by the Commission in the event ofa "serious threat to public security or public health,"which may include ordering the platform to "identify and applyspecific, effective and proportionate measures" of theplatform's choice to mitigate the threat, provide informationon the threat, or report back to the Commission on progress inmitigating the threat progress (Art. 27a).

Platforms must conduct externalindependent auditing of the platform'scompliance with the DSA on an annual basis, by auditors with provenexpertise, technical competence, and capabilities in the area ofrisk management (Art. 28).

Platforms mustprovide access toplatform data to regulators and vetted researchersunder certain circumstances (Art. 31).

For most platforms, national-level authoritieswill be primarily responsible for enforcement of the DSA, withsupport from the newly formed European Board for Digital Services.Member states will each authorize an authority as a DigitalServices Coordinator, which shall be responsible for all mattersrelating to supervision and enforcement of the DSA. DigitalServices Coordinators will have the power to, among other remedies,impose fines of up to 6% of the annual worldwide turnovers ofproviders who fail to comply with DSA obligations.

For VLOPs, however, the European Commissionwill be primarily responsible for the supervision and enforcementof the DSA, and will be granted enhanced powers for this purpose.The Commission may impose fines of up to 6% of the platform'sannual global turnover where it finds an infringement or failure tocomply. Other specific powers include the authority to requestinformation from the platform (Art. 52); conduct on-siteinspections (Art. 54); and initiate monitoring actions, wherein theCommission can order a platform to provide access to, andexplanations relating to, its databases and algorithms (Art.57).

The DSA is a groundbreaking legislation that aims to transformthe digital regulatory landscape in the EU and beyond. In order tobe prepared to comply with the new rules, companies will need totake note of additional compliance or reporting requirements thatthe DSA will create for them, and the tight timeline on which theywill need to remedy any compliance gaps. Companies should payspecial attention to any implications for their advertisingplatforms as well as any use of algorithmic decision-making or AI,especially in the context of content moderation and recommendersystems, as those applications will be subject to unprecedentedtransparency requirements and, as a consequence, regulatoryscrutiny.

The authors would like to thank Law Clerk Melissa Muse and Summer Law Clerks JoshGoland, Sharon Shaji, and Annabella Waszkiewicz for theircontributions to this article.

The content of this article is intended to provide a generalguide to the subject matter. Specialist advice should be soughtabout your specific circumstances.

Read the original post:
The Digital Services Act (DSA) Transforms Regulation Of Online Intermediaries - Advertising, Marketing & Branding - United States - Mondaq

Read More..

Big Tech Fights for Its Right to Screw Us Over – Energy & Capital

Theres a trillion-dollar war being waged in America as we speak.

Instead of guns and artillery, its being fought with suspiciously timed opinion pieces and shady special interest groups. Like it or not, none of us can escape the battlefield.

The internet is no longer equal ground. Now that a handful of companies like Amazon and Google control most of the worlds web services, they can direct their own traffic.

Big Tech has been fighting for unlimited control of the internet since long before folks like Jeff Bezos got their hands on it. But under his reign, Amazon took control of close to 40% of the worlds cloud hosting services.

Thats right, Amazon is much more than just online shopping. Every cent of the company's operating profits comes from the tech department.

Amazon plays landlord to almost half of the active websites on the entire internet. Its becoming too close to a monopoly for a few senators comfort, so they're firing back.

Within the next few months, the Senate is expected to vote on the American Innovation and Choice Online Act (AICOA). The bill will limit tech giants ability to pick and choose which content users get to see.

And its no exaggeration to say that Big Tech is terrified.

If they aren't, why are Amazon, Google, Meta, and Apple funding a billion-dollar media firestorm to sway the public against the bill?

Were in an all-out war, and most of the public has no idea it's even happening.

Big Techs arsenal is incredibly sophisticated. Our politicians, on the other hand, have shown their technological ineptitude time and time again.

Either that, or they're just not trying. Bloomberg reported that a few Democrat senators have privately expressed deep reservations about voting for AICOA with the midterm elections looming.

This is a textbook example of big corporations weaponizing the government against consumers. All it takes is a donation from a lobbyist to sway an apathetic politician.

Think about Walmart, for example. The company has spent hundreds of millions of dollars in lobbying efforts since it was founded. Many of its in-house lobbyists have even previously worked in Congress.

With this political shield, Walmart almost single-handedly drove Americas small businesses into the ground. No laws could successfully touch it, and the economic impacts are still being felt today.

Now, imagine if Walmart signed a deal with the government to buy every road in America, and it then started leveling highways and rebuilding so every route led directly to its stores.

But it wouldnt stop there. Any roads that led to other stores would be crowded and riddled with potholes. They might not even show up on your GPS if Walmart has any say.

Thats exactly what has happened to the worlds digital economy.

By controlling the paths users take to their favorite sites, Big Tech wields a huge amount of unseen influence over shopping, banking, and entertainment. Expecting these companies to play fair is naive at best.

Your favorite small business or independent artist will most likely get buried under a blanket of sponsored content and Big Tech Approved links.

And thats only the beginning.

Two of the biggest threats to the free open internet weve seen are Amazon Web Services (AWS) and Googles Accelerated Mobile Pages (AMP).

AWS is an incredibly feature-rich cloud computing platform. It includes data storage/backup, webpage hosting, database solutions, and much more. From what Ive heard, it can be a godsend to developers.

AWS lets businesses take advantage of a massive sea of server farms without needing to actually install anything on-site. If you suddenly need to double in size overnight, all it takes is a few clicks.

The Best Free Investment You'll Ever Make

Our analysts have traveled the world over, dedicated to finding the best and most profitable investments in the global energy markets. All you have to do to join our Energy and Capital investment community is sign up for the daily newsletter below.

You''ll also get our free report, 3 Blue Chip Dividend Stocks to Double by our resident expert Christian DeHaemer.

The fact that Amazon essentially owns the land underneath half of all digital businesses on Earth is incredibly concerning.

AMP is a similar concept but with slightly different execution.

Accelerated Mobile Pages load faster and use less data, boosting performance on mobile devices. The simplified pages also use less data and can run smoothly on a spotty internet connection.

Sounds too good to be true, right?

The problem with this system is that not everything can be streamlined so easily. To force-fit your webpage into the AMP model, critical information is often lost.

To top it off, Googles search engine also reportedly ranks any non-AMP articles below its own AMP content exactly the type of favoritism AICOA wants to ban.

For content creators, it would mean revenue-generating links and advertising money go directly to Google, not you. Its a mafia racket at that point. You're paying for the privilege of having Google take credit for your work.

These tech companies deserve to be knocked down a few pegs.

They have all collectively spent the last decade gaming the system to extract as much money from users as possible.

The current tech sell-off is dragging some stocks to their lowest point all year, so its no wonder Big Tech is desperate for cash.

If this bill passes, the largest names in the sector will most likely take the biggest hit. But smaller tech companies, some with just as much potential as Meta or Google did, could see a once-in-a-lifetime boost.

Up-and-comers like Patreon, Yelp, and DuckDuckGo have all backed the bill. They're hoping to carve out their own niches in corners of the economy that have thus far been dominated by a few giant companies.

But still, even those few are bigger than the stock plays Im looking for.

The computing sector in particular has been forced to play by Big Techs rules for decades now ever since Microsoft and Apple formed their famous duopoly.

Thats all about to change.

New computing technology is currently being developed in every lab across the world. Giants like IBM are racing against an army of small-scale labs to crack a decades-old physics puzzle.

Our analysts at Technology and Opportunity have been searching for the company with the best chance of beating giants like Amazon and IBM, and I think theyve found it.

This small group of researchers is already 10 steps ahead of the competition. Their work almost looks like science fiction until you hear the explanation.

Learn more about it here. If you're looking to invest, Id recommend watching it twice.

To your wealth,

Luke SweeneyContributor, Energy and Capital

Check us out on YouTube!

Lukes technical know-how combined with an insatiable scientific curiosity has helped uncover some of our most promising leads in the tech sector. He has a knack for breaking down complicated scientific concepts into an easy-to-digest format, while still keeping a sharp focus on the core information. His role at Angel is simple: transform piles of obscure data into profitable investment leads. When following our recommendations, rest assured that a truly exhaustive amount of research goes on behind the scenes..

Read the rest here:
Big Tech Fights for Its Right to Screw Us Over - Energy & Capital

Read More..

Broadvoice Wins 2022 Unified Communications Product of the Year Award – PR Newswire

TMC Recognizes Broadvoice b-hive UCaaS Platform for Innovations in Collaboration, Customer Success and Uptime

LOS ANGELES, July 20, 2022 /PRNewswire/ -- TMC has recognized Broadvoice, a provider of hosted voice, unified communications (UC), call center services (CCaaS), and SIP trunking services for businesses, as a 2022 Unified Communications Product of the Year Award winner for its Broadvoice b-hive Unified Communications as a Service (UCaaS) platform.

Broadvoice b-hive is a proprietary UCaaS platform that delivers a range of communications capabilities rarely found together in enterprise cloud solutions, let alone in a platform designed for small and medium businesses (SMBs) with as few as 10 employees and as many as 250. It includes cloud PBX, Unified Communications (UC) and collaboration features with a virtual call center and integrates with Salesforce CRM and the Microsoft Teams collaboration hub.

"Broadvoice's b-hive Communicator gives small businesses' big business' functionality, with features typically found only on enterprise-scale platforms, including mobility, continuity, high-availability connectivity, flexible pricing and an intuitive self-service portal," said Broadvoice Chief Product Officer George Mitsopoulos. "We're also incredibly proud of our team's efforts in creating a customer-first culture, leading to exceptional customer-satisfaction feedback and Net Promoter Scores (NPS)."

Unlike most other providers, Broadvoice has complete control over its UCaaS platform, including app development, geo-redundant data centers and diverse network connections. In the past few years, the company has focused on product-led growth driven by customer needs. This approach has resulted in innovations, such as introducing its:

"It gives me great pleasure to honor Broadvoice as a 2022 recipient of TMC's Unified Communications Product of the Year Award for their innovative solution, Broadvoice b-hive," said Rich Tehrani, CEO of TMC. "Our judges were very impressed with the ingenuity and excellence displayed by Broadvoicein its groundbreaking work on b-hive."

Winners of the 2022 Unified CommunicationsProduct of the Year Award will be announced online and highlighted in INTERNET TELEPHONY magazineonline.

About Broadvoice

Broadvoice simplifies communications for small and medium businesses (SMBs) by combining powerful cloud PBX, UC and collaboration features with virtual call center in one award-winning Unified Communications as a Service (UCaaS) platform that delivers enterprise-class features at affordable rates. The platform is connected to Broadvoice's secure, redundant network and hosting infrastructure, enabling SMBs to connect with customers securely anytime, anywhere and with any device. With network assets and customers spanning four continents, Broadvoice serves the world's SMBs, enhancing collaboration and commerce across the globe.

Media Contact:

Kimberly WayBroadvoice970.289.0854[emailprotected]

SOURCE Broadvoice

Follow this link:
Broadvoice Wins 2022 Unified Communications Product of the Year Award - PR Newswire

Read More..

Can Encryption Key Intercepts Solve The Ransomware Epidemic? – SecurityWeek

California-based Nubeva is building technology to recover encrypted data without making ransomware payments

A San Jose, Calif-based ransomware data recovery firm has announced the successful recovery of encrypted data without requiring any ransom payment. The firm takes a novel approach: it intercepts the encryption process and extracts the keys used by the ransomware. With these, it can recover data without recourse to paying the ransom.

Privately owned Nubeva Technologies gave two examples in June 2022. SecurityWeek talked to CMO Steve Perkins. The first victim was a firm in the architectural, engineering and construction (AEC) sector that had been hit by a new version of REvil. This firm had been ransomed three times in the last few years before it turned to Nubeva. The second firm was an insurance processing firm in the healthcare sector, and was not a customer of Nubeva when its files were encrypted.

The Nubeva solution involves a small agent that operates in the background on each endpoint and server. Using patented technology that the firm calls session key intercept (ski), the process is automatically initiated at the first sign of anomalous or mass encryption. Ski listens in real time to the encryption process and extracts the encryption keys. It stores them in a secret location on the system, with copies in the customers cloud account.

Literally within 48 hours we provide a decryptor. Its usually shorter than that, if we have a decryptor. If its something new and we dont have a decryptor, well build one. Forty-eight hours is our SLA, and youre decrypting on the spot.

In practice, it is not an instant decryption that would likely rebuild files onto an infected system. There must be an intervening forensics stage where an incident response team assesses the systems to ensure that recovery goes to clean computers. Nubeva helps here. It has collected, time-stamped, and stored all the encryption processes. It can give the forensics team a complete fingerprint of the extent of the damage from ground zero which would normally take days to assess manually.

Many companies decide to pay a ransom because they believe it will be the quickest way to recover operations and avoid a lengthy downtime. But this process still involves the time it takes to negotiate with the attackers, obtain the decryptor, and start the rebuild. This period will normally take the best part of three weeks, and there is no guarantee that the decryption will work. Nubeva can dramatically shorten the downtime without paying the ransom, and can recover the files efficiently.

In this instance, the victim was able to recover its data files despite being attacked by REvil, and without paying the ransom.

Some companies decline to pay a ransom because of their own backups. If youve got a simple backup, said Perkins, just do it. The problem is that over 50% of the time people still end up paying a ransom because their backups have been corrupted. And all the time, the downtime clock is ticking.

This problem with backups was illustrated in the second recovery example given by Nubeva. This victim had a good backup process in place when the ransomware struck, but no relationship with Nubeva. The attackers had been resident in the network for several weeks, and the incident response firm warned the victim it would have to restore from backup to a state at least four weeks prior to the encryption to be sure of eliminating the original infection.

This was unacceptable. The company is a healthcare insurance transaction processing firm. All transactions undertaken during the roll back would be lost, and could only be recovered by submitting duplicate transactions leaving the firm open to charges of fraud. The only alternative would be to lose millions of dollars and all track of accounting during the period. The firm told the incident responders that it had to restore to no earlier than the day before the encryption.

The incident response team called in Nubeva, which was installed ahead of the backup recovery. The recovery process to the day prior to encryption was undertaken; and as expected, the infection was reintroduced. This time, however, Nubeva caught the encryption keys and gave the responders the infection process fingerprint. As a result, the systems could be rapidly cleaned, and the data restored again through the keys captured by Nubeva.

Nubeva does not consider itself to be a traditional ransomware prevention product. It is a data recovery product. It does not detect ransomware, nor does it prevent ransomware. There are many other products that promise to do this with varying degrees of success and failure. Nubeva is a data recovery tool for ransomware-encrypted data. It acts like a safety-net for when ransomware succeeds, as it so often does. Nubeva captures the encryption keys, and in conjunction with a forensic response team can restore encrypted data back onto clean systems. It does this in a shorter time than it would take to pay and restore, but without having to pay.

Related: Study Finds Eighty Percent of Ransomware Victims Attacked Again

Related: New Malware Samples Indicate Return of REvil Ransomware

Related: The Psychology of Ransomware Response

Related: SecurityWeek Cyber Insights 2022: Ransomware

Originally posted here:
Can Encryption Key Intercepts Solve The Ransomware Epidemic? - SecurityWeek

Read More..

Why Businesses Must Address Risks of Quantum Computing NOW Rather Than Wait Until Problems Arrive – Joseph Steinberg

There is little doubt that quantum computing will ultimately undermine the security of most of todays encryption systems, and, thereby, render vulnerable to exposure nearly every piece of data that is presently protected through the use of encryption.

What remains uncertain, however, is when the day of so-called quantum supremacy will arrive.

As such, many organizations have hesitated to start preparing for the quantum era after all, they reason, there are enough fires to fight now, and limited resources with which to do so.

But, quantum supremacy is not something that can be addressed when it becomes a fire if we do not start protecting ourselves until encryption-busting devices are known to exist, we are likely to suffer severe consequences. Such an attitude is not alarmist it is reality, whether we like it or not.

Remember, quantum computers already exist. And, while todays commercially-created quantum machines are nowhere near powerful enough to approach quantum supremacy, absolutely nobody knows the true extent of the quantum capabilities of all of the technologically-advanced governments around the world.

Even if no governments can already quickly crack the asymmetric encryption mechanisms used to protect so much of our digital economy, there is no way for the public to known when governments do obtain such capabilities. Unlike commercial sector R&D centers, intelligence agencies certainly are not going to broadcast anything about their accomplishments and advancements. In short, the public is not likely to know when quantum supremacy actually arrives until well after it has arrived.

Another important reason why we must address quantum-supremacy risks well in advance has to do with the nature of data.

Unlike computer hardware and software that are regularly replaced when they become obsolete, data often remains in its original form for many years, if not for decades. As such, one cannot simply address encryption algorithm obsolescence on a forward-thinking basis all of todays sensitive data that is currently protected by encryption will likely need to be identified, decrypted, and re-encrypted with quantum-safe encryption and all copies of the original data in any and all stores in which it resides must be properly destroyed.

Identifying, locating, and converting all data requiring conversion may be a task that is relatively easy for an individual to accomplish, but, for a large enterprise merely identifying and locating the data, never mind actually converting it, is a task is likely to prove complex, time consuming, expensive, and prone to error.

And, of course, the consequences of not fully locating and re-protecting old data can be catastrophic; a single long-forgotten laptop, ZIP disk, CD, or backup tape or even an old floppy disk! could potentially lead to terrible financial losses, legal headaches, and ruined reputations. Organizations that have utilized encryption to protect healthcare information within their possession, for example, could become flagrant violators of HIPAA and face stiff penalties for simply allowing existing backups to remain as is within storage facilities.

On that note, we must realize that at some point in the future, even before encryption-busting quantum computers arrive on the market, those in the know will consider it gross negligence to encrypt data with algorithms known to be vulnerable to quantum compromise. Imagine the reaction from customers, the media, and regulators if IBM announced that it would deliver an encryption-breaking quantum computer in 6 months, and cybersecurity professionals working at a bank reacted by saying that they would wait until after the device arrived on the scene to upgrade their encryption mechanisms? And, again, we wont even get a 6-month warning or any warning at all if, as expected, governments achieve quantum supremacy before industry.

Clearly, there is a need to act in advance and acting takes time. For most organizations, transitioning from todays encryption technologies to quantum-safe encryption mechanisms will likely be a more complex, expensive, and timely process that many people expect, in some cases, even taking years to properly plan and execute. As such, despite the fact that todays known quantum computers are nowhere near ready for prime-time encryption busting, we may already be late vs-a-vis preparing for quantum supremacy; it is possible that we have already reached a point at which it will take the world longer to completely replace its existing encryption mechanisms and re-encrypt its data than it will take for encryption-busting quantum computers to arrive on the scene

One other important note: Sensitive information that is relayed and stored today may remain sensitive in the future, including after quantum computers have rendered todays encryption impotent. In 2022, for example, people around the globe who bank, shop, chat, and use social media online rely on encryption known as TLS to prevent anyone from capturing and viewing communications flowing across the insecure Internet as network traffic. Quantum computing, however, will ultimately render todays TLS impotent; if someone records encrypted sessions as they pass over the Internet now, that party may be able to decrypt such sessions in the future, and expose all of the relevant contents. In short, any data that is captured now can potentially be decrypted and exposed tomorrow; the photos that you just sent your romantic partner over WhatsApp, the results of your recent bloodwork, and your credit report that you accessed over the weekend could all leak. With storage so inexpensive, various governments and perhaps corporations are, in fact, collecting and storing huge amounts of data and who knows how they will use that data once quantum-supremacy arrives. The bottom line is that if we truly want todays communications to remain secret for years to come, we should already be using quantum-safe-encryption to protect it.

Finally, keep in mind that while adding additional transistors to todays classic CPUs grows processing power linearly, quantum computing capabilities expand exponentially with physical system growth; as such, our human experience observing the advancement of technology likely misleads us into wildly underappreciating how fast quantum computing may advance. IBMs recent forecast of its quantum capabilities growing from around 1,000 Qubits next year to over 4,000 Qubits 2 years later, to potentially hundreds of thousands of Qubits shortly thereafter, clearly reinforces the concern about rapid growth delivering quantum supremacy to the market in the not so distant future.

Experts have already identified already several methods of encrypting that we believe will remain safe from quantum cryptanalysis for the foreseeable future yet such technologies are barely leveraged anywhere in the commercial sector. Rather than trying to scramble once we have an unsolvable problem, it would be wise for us to start planning to augment our encryption as needed. NIST has already begun to narrow down its list of recommended ways to address quantums risks to encryption and products have already hit the market already that enable businesses to begin such transitions.

This post is sponsored byIronCAP. Please click the link to learn more about IronCAPs patent protected methods of keeping data safe against not only against todays cyberattacks, but also against future attacks from quantum computers.

Visit link:
Why Businesses Must Address Risks of Quantum Computing NOW Rather Than Wait Until Problems Arrive - Joseph Steinberg

Read More..

The FBI Forced A Suspect To Unlock Amazon’s Encrypted App Wickr With Their Face – Forbes

A warrant allowed FBI agents in Tennessee to force a suspect to unlock his encrypted Amazon messaging app, Wickr, with his face. It's an unprecedented move by the feds.

In November last year, an undercover agent with the FBI was inside a group on Amazon-owned messaging app Wickr, with a name referencing young girls. The group was devoted to sharing child sexual abuse material (CSAM) within the protection of the encrypted app, which is also used by the U.S. government, journalists and activists for private communications. Encryption makes it almost impossible for law enforcement to intercept messages sent over Wickr, but this agent had found a way to infiltrate the chat, where they could start piecing together who was sharing the material.

As part of the investigation into the members of this Wickr group, the FBI used a previously unreported search warrant method to force one member to unlock the encrypted messaging app using his face. The FBI has previously forced users to unlock an iPhone with Face ID, but this search warrant, obtained by Forbes, represents the first known public record of a U.S. law enforcement agency getting a judges permission to unlock an encrypted messaging app with someones biometrics.

According to the warrant, the FBI first tracked down the suspect by sending a request for information, via an unnamed foreign law enforcement partner, to the cloud storage provider hosting the illegal images. That gave them the Gmail address the FBI said belonged to Christopher Terry, a 53-year-old Knoxville, Tennessee resident, who had prior convictions for possession of child exploitation material. It also provided IP addresses used to create the links to the CSAM. From there, investigators asked Google and Comcast via administrative subpoenas (data requests that dont have the same level of legal requirements as search warrants) for more identifying information that helped them track down Terry and raid his home.

When they apprehended Terry, the FBI obtained his unlocked phone as well. But there was a problem: His Wickr account was locked with Apples Face ID facial recognition security. By the time it was made known to the FBI that facial recognition was needed to access the locked application Wickr, Terry had asked for an attorney, the FBI noted in its warrant. Therefore, the United States seeks this additional search warrant seeking Terrys biometric facial recognition to complete the search of Terrys Apple iPhone 11.

Most courts are going to find they can force you to use your face to unlock your phone because it's not compelling you to speak or incriminate yourself...

After the FBI successfully forced Terry to use his face to unlock his Wickr account, Terry was charged in a criminal complaint with distribution and possession of CSAM, but has not yet offered a plea. His lawyer did not respond to a request for comment at the time of publication.

Amazons Wickr hadnt provided comment at time of publication. The FBI, Google and Comcast did not immediately respond to a request for comment.

Forcing people to unlock encrypted messaging with their biometrics is unprecedented and controversial. Thats because of an illogical quirk in U.S. law: Courts across the U.S. have not allowed investigators to compel people to hand over a passcode for phones or apps, but they have allowed them to repeatedly unlock phones using biometrics. Thats despite the obvious fact that the result is the same.

Jerome Greco, a public defender in the Digital Forensics Unit of the Legal Aid Society in New York City, says this is because American law hasnt caught up with the technology. Passcodes, unlike biometric information, are legally considered testimonial, and citizens are not obliged to provide such testimony because the Fifth Amendment protects you from self-incrimination. But body parts are, by their nature, not as private as a persons thoughts, Greco notes.

Most courts are going to find they can force you to use your face to unlock your phone because it's not compelling you to speak or incriminate yourself... similar to fingerprints or DNA, Greco says.

But he believes there will soon be enough diverging case law for the Supreme Court to have to decide whether or not compelled facial recognition unlocks are lawful. We're trying to apply centuries-old constitutional law that no one could have envisioned would have been an issue when the laws were written, he says. I think the fight is coming.

There has been some pushback over such biometric unlocks from judges in some states. That includes two 2019 cases in California and Idaho, where the police wanted to force open phones inside properties relevant to the investigations. The judges in those cases declared biometric data was, in fact, testimonial, and law enforcement couldnt force the owners of those phones to use their faces to unlock them.

But last year, Forbes revealed the Justice Department was continuing to carry out such searches. It had also adopted new language in its warrants that said suspects have a legal right to decline to tell law enforcement whether its your face, your finger, or your eye that unlocks your phone. But even if you dont say what will unlock your phone, the DOJ said investigators could unlock your device by simply holding it up to your face or pressing your finger to it.

The search also comes after years of campaigning by the FBI to have tech giants provide more assistance in providing access to encrypted data. Since the 2015 San Bernardino terrorist attack, where the Justice Department demanded Apple open the shooters iPhone, that debate has intensified. The warrant, however, shows the government does have some techniques it can use to find criminals using the likes of Wickr and its encrypted data.

For now, Greco says the best way a person can protect themselves from such searches is to lock a device with a complex passcode rather than a face. Its possible to do the same with Wickr by disabling Touch ID or Face ID.

Go here to read the rest:
The FBI Forced A Suspect To Unlock Amazon's Encrypted App Wickr With Their Face - Forbes

Read More..

SwithBin Announces First Regulation Crowdfunding on StartEngine – openPR

Overland Park, KS, July 20, 2022 --(PR.com)--SwitchBin, Inc., the automated retail store-in-a-box for smartphones and other connected devices announced they have been selected by StartEngine Capital LLC to kick off their first Regulation Crowdfunding raise on the StartEngine equity crowdfunding platform. StartEngine was founded by Howard Marks, the co-founder of Activision and was joined by the respected businessman and Shark Tank Television judge Kevin OLeary as StartEngines Strategic Advisor and Investor. After being accepted onto the StartEngine platform, SwitchBin, Inc. is now filed with the SEC.

You can see the crowdfunding offering here along with a video of the process: http://www.startengine.com/switchbin

SwitchBin is a technology startup which plans to automate the process of buying and trading in mobile devices with its revolutionary software powered kiosk to both deliver a new device and take back the old, in under 10 minutes. Buying a new phone should not feel like visiting the DMV, and with SwitchBin, the upgrade process has been designed to be simple, fast, and secure. Wireless carriers and retailers need an answer to the labor crisis and SwitchBin believes their automated solution is it. The current product is capable of both delivering a new phone and handling a trade-in without activation. Future development is anticipated to take six months after funding and will allow for the fully designed experience including the app-based solution.

The SwitchBin team and Advisors include an experienced group of tech and retail executives who come from senior roles with major wireless carriers, national retailers, and global supply chain & reverse logistics organizations. Bob Kilinski, CEO, a former head of wireless merchandising and marketing in national retail, has brought in a strong Advisor Board including Glenn Lurie, former CEO of AT&T Mobility, Sally Lange, a former VP at Sprint and T-Mobile, and Mark Anderson, former VP of Enterprise at Ericsson.

Were excited the StartEngine team selected us as a partner on their crowd funding platform, said Bob Kilinski, CEO of SwitchBin. The proceeds from this first funding round will give us the capital to build the full end to end experience, build more machines for market trials, and bring on the resources we need to lead deployments.

Go here to read the rest:
SwithBin Announces First Regulation Crowdfunding on StartEngine - openPR

Read More..

Cloud Encryption Market Size, Scope, Growth Opportunities, Trends by Manufacturers And Forecast to 2029 This Is Ardee – This Is Ardee

New Jersey, United States TheCloud EncryptionMarket research guides new entrants to obtain precise market data and communicates with customers to know their requirements and preferences. It spots outright business opportunities and helps to bring new products into the market. It identifies opportunities in the marketplace. It aims at doing modifications in the business to make business procedures smooth and make business forward. It helps business players to make sound decision making. Cloud Encryption market report helps to reduce business risks and provides ways to deal with upcoming challenges. Market information provided here helps new entrants to take informed decisions making. It emphasizes on major regions of the globe such as Europe, North America, Asia Pacific, Middle East, Africa, and Latin America along with their market size.

Such unique Cloud Encryption Market research report offers some extensive strategic plans that help the players to deal with the current market situation and make your position. It helps in strengthening your business position. It offers better understanding of the market and keep perspective to aid one remain ahead in this competitive market. Organizations can gauze and compare their presentation with others in the market on the basis of this prompt market report. This market report offers a clarified picture of the varying market tactics and thereby helps the business organizations gain bigger profits. You get a clear idea about the product launches, trade regulations and expansion of the market place through this market report.

Get Full PDF Sample Copy of Report: (Including Full TOC, List of Tables & Figures, Chart) @https://www.verifiedmarketresearch.com/download-sample/?rid=2644

Key Players Mentioned in the Cloud Encryption Market Research Report:

Gemalto Symantec Corporation, N.V., Sophos Group plc, Stormshield, Thales e-Security, Skyhigh Networks, Netskope Inc., CipherCloud, Randtronics, HyTrust, Inc.

Cloud EncryptionMarket report consists of important data about the entire market environment of products or services offered by different industry players. It enables industries to know the market scenario of a particular product or service including demand, supply, market structure, pricing structure, and trend analysis. It is of great assistance in the product market development. It further depicts essential data regarding customers, products, competition, and market growth factors. Cloud Encryption market research benefits greatly to make the proper decision. Future trends are also revealed for particular products or services to help business players in making the right investment and launching products into the market.

Cloud EncryptionMarket Segmentation:

Cloud Encryption Market, By Service Model

Platform-as-a-Service Infrastructure-as-a-Service Software-as-a-Service

Cloud Encryption Market, By Component

Solutio

Inquire for a Discount on this Premium Report@ https://www.verifiedmarketresearch.com/ask-for-discount/?rid=2644

For Prepare TOC Our Analyst deep Researched the Following Things:

Report Overview:It includes major players of the Cloud Encryption market covered in the research study, research scope, market segments by type, market segments by application, years considered for the research study, and objectives of the report.

Global Growth Trends:This section focuses on industry trends where market drivers and top market trends are shed light upon. It also provides growth rates of key producers operating in the Cloud Encryption market. Furthermore, it offers production and capacity analysis where marketing pricing trends, capacity, production, and production value of the Cloud Encryption market are discussed.

Market Share by Manufacturers:Here, the report provides details about revenue by manufacturers, production and capacity by manufacturers, price by manufacturers, expansion plans, mergers and acquisitions, and products, market entry dates, distribution, and market areas of key manufacturers.

Market Size by Type:This section concentrates on product type segments where production value market share, price, and production market share by product type are discussed.

Market Size by Application:Besides an overview of the Cloud Encryption market by application, it gives a study on the consumption in the Cloud Encryption market by application.

Production by Region:Here, the production value growth rate, production growth rate, import and export, and key players of each regional market are provided.

Consumption by Region:This section provides information on the consumption in each regional market studied in the report. The consumption is discussed on the basis of country, application, and product type.

Company Profiles:Almost all leading players of the Cloud Encryption market are profiled in this section. The analysts have provided information about their recent developments in the Cloud Encryption market, products, revenue, production, business, and company.

Market Forecast by Production:The production and production value forecasts included in this section are for the Cloud Encryption market as well as for key regional markets.

Market Forecast by Consumption:The consumption and consumption value forecasts included in this section are for the Cloud Encryption market as well as for key regional markets.

Value Chain and Sales Analysis:It deeply analyzes customers, distributors, sales channels, and value chain of the Cloud Encryption market.

Key Findings:This section gives a quick look at the important findings of the research study.

For More Information or Query or Customization Before Buying, Visit @ https://www.verifiedmarketresearch.com/product/global-cloud-encryption-market-size-and-forecast-to-2025/

About Us: Verified Market Research

Verified Market Research is a leading Global Research and Consulting firm that has been providing advanced analytical research solutions, custom consulting and in-depth data analysis for 10+ years to individuals and companies alike that are looking for accurate, reliable and up to date research data and technical consulting. We offer insights into strategic and growth analyses, Data necessary to achieve corporate goals and help make critical revenue decisions.

Our research studies help our clients make superior data-driven decisions, understand market forecast, capitalize on future opportunities and optimize efficiency by working as their partner to deliver accurate and valuable information. The industries we cover span over a large spectrum including Technology, Chemicals, Manufacturing, Energy, Food and Beverages, Automotive, Robotics, Packaging, Construction, Mining & Gas. Etc.

We, at Verified Market Research, assist in understanding holistic market indicating factors and most current and future market trends. Our analysts, with their high expertise in data gathering and governance, utilize industry techniques to collate and examine data at all stages. They are trained to combine modern data collection techniques, superior research methodology, subject expertise and years of collective experience to produce informative and accurate research.

Having serviced over 5000+ clients, we have provided reliable market research services to more than 100 Global Fortune 500 companies such as Amazon, Dell, IBM, Shell, Exxon Mobil, General Electric, Siemens, Microsoft, Sony and Hitachi. We have co-consulted with some of the worlds leading consulting firms like McKinsey & Company, Boston Consulting Group, Bain and Company for custom research and consulting projects for businesses worldwide.

Contact us:

Mr. Edwyne Fernandes

Verified Market Research

US: +1 (650)-781-4080UK: +44 (753)-715-0008APAC: +61 (488)-85-9400US Toll-Free: +1 (800)-782-1768

Email: sales@verifiedmarketresearch.com

Website:- https://www.verifiedmarketresearch.com/

Continued here:
Cloud Encryption Market Size, Scope, Growth Opportunities, Trends by Manufacturers And Forecast to 2029 This Is Ardee - This Is Ardee

Read More..

UPDATE — Think On, Inc. and Lorica Cybersecurity Partner to Deliver Next-Generation Encrypted Data Analytics Solutions – Yahoo Finance

Think On Inc.

Through a multi-year collaboration with Lorica Cybersecurity, ThinkOn is extending its leadership position in cloud data security and privacy-enhancing computation

TORONTO, July 19, 2022 (GLOBE NEWSWIRE) -- Think On, Inc. the only 100% Canadian owned cloud service provider allowed to host sensitive information for the Government of Canada, announces a technology partnership with Lorica Cybersecurity to bring next-generation encrypted data analytics solutions to the ThinkOn cloud computing platform. This partnership is intended to deliver cutting-edge solutions aligned with ThinkOns commitment to privacy, security, and data sovereignty in the cloud.

With data and digital assets coming under ever-greater threat, enterprises are seeking solutions to further protect sensitive data and eliminate the risk of data exposure in the event of a data breach. Over the coming months, Lorica Cybersecuritys cloud-native and quantum-resistant solution based on patented high-performance fully homomorphic encryption (HP-FHE) technology will be made available to ThinkOn partners and end subscribers through the ThinkOn cloud computing platform.

As a leading provider of cloud services to public and private sector enterprises, ThinkOn is committed to providing proven data security and privacy solutions, said Craig McLellan, Founder and CEO, ThinkOn. This partnership represents a unique opportunity for us to provide truly cutting-edge secure data archiving and analytics technology solutions to our partners and customers. We look forward to continued collaboration with the outstanding team at Lorica Cybersecurity.

We are absolutely thrilled to be partnering with ThinkOn, a leading Canadian cloud services provider with a global business footprint, said Glenn Gulak, Co-Founder and CEO, Lorica Cybersecurity. Our patented and highly-optimized encrypted data analytics solutions will provide unmatched data protection and market-leading performance for enterprises on the ThinkOn cloud.

Story continues

About Think On, Inc.Think On, Inc. is a proudly Canadian-owned and operated cloud service provider (CSP) with a global data centre footprint. ThinkOn is a Canadian VMware Sovereign Cloud partner. ThinkOn helps the Canadian government leverage domestic infrastructure technology to deploy sensitive workloads and run digital solutions in the cloud. Providing comprehensive cloud solutions that meet strict compliance, sovereignty and security requirements. ThinkOn enables the Government to operate with increased agility and address complex security controls that are key to deliver a quality user experience for the public sector and the Canadians they serve. Consider them yourdedicated department of data-obsessed experts. They will protect your data like their own, making it more resilient, secure, actionable, and searchable. ThinkOn works with a trusted ecosystem of top technology partners to provide cost-effective Infrastructure-as-a-Service solutions and data management services with predictable pricing and no hidden fees.

http://www.thinkon.com

About Lorica Cybersecurity Inc.Lorica Cybersecurity has developed quantum-resistant cloud data security and privacy solutions that eliminate the risk of data exposure leveraging cutting-edge high-performance fully homomorphic encryption (HP-FHE). Working discreetly with customers in the financial, telecommunications, government and national security sectors, Lorica protects some of the most sensitive data and valuable proprietary information in the world. Headquartered in Toronto, Lorica enables customers to have confidence working with their proprietary data and digital assets in the cloud both now and well into the future.

http://www.loricacyber.com

For further information: (press only) contact Sarah Finney, Director of Marketing, Think On, Inc. sarah.finney@thinkon.com

Read more from the original source:
UPDATE -- Think On, Inc. and Lorica Cybersecurity Partner to Deliver Next-Generation Encrypted Data Analytics Solutions - Yahoo Finance

Read More..