Page 1,960«..1020..1,9591,9601,9611,962..1,9701,980..»

The Man at the Center of the New Cyber World War – POLITICO

Few people have been more instrumental in protecting Ukraines private and government data, along with the countrys ongoing connectivity, than Shchyhol, who is the head of the State Service of Special Communications and Information Protection, the Ukrainian equivalent of the U.S. Cybersecurity and Infrastructure Security Agency. Since the hours before the ground invasion in February, when cyberattacks struck government and banking websites across Ukraine, Shchyhol has been coordinating with the U.S. and EU from a secure location in Kyiv, responding to cyberattacks while sharing with international allies his insights into strategies used by Russian hackers.

Overall, Ukraine has been doing much better in the cyberwar than expected few thought the country could repel a ground invasion and consistent cyberattacks simultaneously. There were certain losses: Russian forces eventually took control of the power plant near Zaporizhzhia, along with large swaths of the countrys southeast while establishing a botnet computer server near Kharkiv to spam cell phones with malicious text messages. Separate operations severely damaged governmental data centers. But despite constant aerial and cyber bombardment by Russian forces, SSSCIP has ensured those attacks were largely unsuccessful; civilians have been able to access government services and support directly from their mobile devices and computers.

I spoke with Shchyhol about the challenges of a digital war of attrition, how partner countries like the U.S. are assisting in that fight and what he sees as the future of cyberwarfare. We spoke through an interpreter over Zoom on June 27, less than a week after the European Commission and EU leaders granted Ukraine candidate status, the first step toward formal membership within the bloc.

This interview has been condensed and edited for clarity.

Kenneth R. Rosen: Viasat communications services went down as Russian forces invaded Ukraine, hindering communication by Ukrainian forces. But one of those high-speed satellite broadband connections was in my own home in northern Italy. Some 50,000 other European residents on the morning of the invasion found their internet routers inoperable. Its one instance Ive used to illustrate to my colleagues and peers the long reach of cyberattacks in the Russo-Ukrainian conflict. Was that a wake-up call for your European intelligence-sharing partners and a way for you as well to explain the difficulties faced by Ukraine?

Yurii Shchyhol: For Ukrainians, the first cyber world war started on Jan. 14, 2022, when there were attacks launched at the websites owned by state authorities. Twenty websites were defaced, and more than 90 information systems belonging to those government authorities were damaged.

In the early morning that day, I started talking to our European partners as well as our U.S. partners, their respective lines, ministries and government institutions, like CISA, and we started receiving and are still receiving assistance from them on a daily basis.

Right before the full-fledged invasion, the cyberattack, like you said, happened against Viasat. Some routers were deleted, especially those that were targeted to provide telecom services to the military units. In Germany, 5,000 wind turbines were attacked, so we can safely claim that it was not just a cyberattack on the whole of Ukraine, but against the civilized world.

So yes, youre right. The world has been awakened and we can observe that countries are more willing to cooperate on those issues and the level of cooperation will only intensify.

But what we need are not further sanctions and further efforts to curb cyberattacks, we also need for global security companies to leave the market of the Russian Federation. Only then can we ensure the victory will be ours, especially in cyberspace.

Rosen: While some of those cyberattacks were against government and military installations, others frequently hit telecommunications services, internet providers, hospitals, first responders and humanitarian aid organizations. What are some of the challenges faced by Ukraine in protecting such a wide, vulnerable attack surface?

Shchyhol: For the first four months of this invasion roughly more than 90 percent of cyberattacks were carried out against civilian sites. Of course, we were preparing ourselves for this, and in the last 18 months most of our preparations in advance were to be able to withstand widespread attacks against multiple targets. We ensured uninterrupted exchange of information between all [government and civil organizations], sharing information regarding the criteria for compromising networks. We also worked on building up the technical capabilities of government institutions so they could quickly gather server data, make copies, and share those copies with us [ahead of a Russian attack].

In all those efforts we had very strong support from our private sector. Its worth mentioning that a lot of private sector IT cybersecurity experts are either directly serving in the Armed Forces of Ukraine or my State Service or otherwise are indirectly involved in fighting against cyberattacks, and those private sector assistants of ours are world class experts who used to work in leading global companies taking care of their cybersecurity.

Rosen: When I last spoke with your colleague Victor Zoha, in February, he described the UA30 Cyber Center training facility your special service developed for the private sector. How has that grown since and was that instrumental in training the IT experts?

Shchyhol: This training center of ours launched into operation more than one year ago and over that period of time we conducted more than 100 training sessions for civilian contractors, private sector, military operators, all focused on cybersecurity. We conducted a number of hackathons and competitions. Even though we conducted a few training sessions after the beginning of the renewed conflict, the location of the training center is not safe. So were not using it that much right now.

This center was aimed to deepen the knowledge-sharing between the private sector and the government, those tasked with overseeing information protection across various government bodies and institutions. Its a hub that fosters the knowledge of the private sector. We treat it as a competence center that allows all the industries and sectors involved to grow by helping each other.

Rosen: Were referring to the efforts of private citizens, in part, when we talk about the private sector. Perhaps for the first time ever, hundreds of private citizens from across Ukraine and the world have volunteered to prevent, counteract and launch their own attacks in cyberspace in defense of Ukraine. The unifying force in defense of one country, which as far as campaigns go, continues to be rather unique. What has been the impact of the so-called civilian IT Army on Ukraines ability to defend against cyberattacks?

Shchyhol: This is the first time in the history of Ukraine, for sure, probably in the world, when the private sector, the cyberprofessionals, are not only doing what they can professionally defending the cyberspace of their country but they are also willing to defend it by any means. What youre referring to is an army currently comprised of more than 270,000 volunteers who are self-coordinating their efforts and who can decide, plan and execute any strikes on the Russian cyber infrastructure without even Ukraine getting involved in any shape or form. They do it on their own.

Other cybersecurity experts, under the guidance of my State Service, have been helpful in providing consultations to government institutions as to how to properly arrange the cybersecurity efforts, especially in the energy sector and critical infrastructure sites. Thats probably the reason none of the cyberattacks that were carried out in the past four months of this invasion has allowed the enemy to destroy any databases or cause any private data leakage.

Rosen: What are some of the lessons, over these last four months, of these ongoing attacks, that perhaps werent known or anticipated before February?

Shchyhol: In terms of their technical capabilities, so far the attackers have been using modified viruses and software that weve been exposed to before, like the Indestroyer2 virus, when they targeted and damaged our energy station here. Its nothing more than a modification of the virus they developed back in 2017. We all have to be aware that those enemy hackers are very well-sponsored and have access to unlimited finances, especially when they want to take something off the shelf and modify it and update it.

Rosen: At the beginning of our conversation you said that international technology companies should withdraw from the Russian Federation and youve written that the world should restrict Russias access to modern technologies. Such an effort to restrict their access, youve written, should be viewed as an international security priority. What technology specifically? Hardware, like servers and data processing computers? Or software, like those sold by western countries for law enforcement and data manipulation? Telecommunications?

Shchyhol: Any equipment that allows their software to be installed on servers, by way of restricting the use of those services globally so they wouldnt have access to them.

Were also urging the international organizations such as the ITU (International Telecommunication Union) that Russia should no longer be its member. Why? Because they otherwise can get access to innovations, research results by virtue of attending conferences, common meetings. So we are very much strongly in favor of getting Russia out of those organizations, especially those watchdogs that oversee the telecommunications industry of the world. They should not be able to participate in any events and get any IT information.

Rosen: Noting that you already work closely with NATOs cybersecurity command, and the international community, what does this further restriction, cooperation and a more efficient cyber-umbrella look like?

Shchyhol: The cyber-umbrella is something that should be placed over the whole world, not just Ukraine. It should be like an impenetrable wall. Russia would not gain access to any modern IT developments, not have access to innovations or new designs coming from the U.S., U.K. and Japan.

This is something that would pummel Russias ability to develop for themselves. Of course, they could design their own software, but without access to modern IT developments and without the ability to install it on any modern hardware those efforts would soon become obsolete.

We also have dire need for more competency and skills and knowledge; we dont have enough qualified staff. In order to raise more qualified personnel, we need to ensure the expedient exchange of information and coordination between professional and government institutions. That should be the global project for the next five to 10 years. Today the enemy can attack Ukraine, tomorrow the United States, or any other country helping to defend our land. Cyberspace is a unified space for everyone, not divided by borders. Thats why we need to learn to operate there together, especially in recognition of this attack on the civilized world perpetrated by Russia.

Rosen: How have U.S. Cyber Command and the National Security Agency operations been able to assist Ukraine with those aims in mind?

Shchyhol: Its an ongoing, continuous war, including the war in cyberspace. Thats why I wont share any details with you, but let me tell you that we do enjoy continuous cooperation. There is a constant synergy with them, both in terms of providing us with the assistance that we need to ensure proper protection and safety of our websites and our cyberspace, especially of government institutions and military-related installations, but also they help us with their experts, some of whom are on-site here in Ukraine and are providing on-going consultations.

Like in further supply of heavy weapons and other forms of weaponry, the same is true for cybersecurity. We expect that level of assistance, of those supplies, will only increase because only in this manner can we together ensure our joint victory against our common enemy.

Rosen: Weve talked a great deal about the hidden cyberwarfare, of a war without borders, but what digital communications devices, or physical gear and assets, sent by the U.S. in aid packages have been helpful and why?

Shchyhol: The most helpful so far was the SpaceX technology, the Starlinks, weve been sent. So far weve received more than 10,000 terminals. What those have helped us with was a relaunch of destroyed infrastructure in those communities were liberating, providing backup copying services to regional and local governments whose digital services [like healthcare cards, tax and travel documents, vehicle and home registrations] are accessed by Ukrainian civilians. It has also aided the repair of critical infrastructure sites.

Second to this have been the servers and mobile data centers. Those have allowed us in a very short time span to arrange backup copies of our government institutions, agencies, state registries, and locate them in safe regions, or at least locations that the enemy couldnt easily access. Its allowed for the continuous operation of our government.

And, the third I wouldnt say its the last as we dont have time for the exhaustive list are software and technologies that weve received access to now [that were too expensive before the invasion]. After the invasion, industry leaders started providing software free of charge or allowing us full access like Amazon, which provided Ukraine with a private cloud, allowing us to administer data from the state registries.

It goes without saying that were not only consuming someone elses services especially when they come free of charge. Even now, when the war is still raging, were taking care of our cybersecurity by investing more funds into procuring what we need. Last week, the government allocated additional funds from the national budget to finalize the preparation of a national backup center. Were ready to buy if its exactly what we need.

Rosen: Most of those vendors are Western-based companies. In April, the U.S., U.K., Canada, Australia and New Zealand, part of the Five Eyes intelligence sharing cooperative, said that Russia was planning a largescale cyberattack against those countries supporting Ukraine. Back then there was no shortage of protracted fears in the security industry that a global cyberwar could trigger Article 5 of NATO. But that constant threat to Western nations seems to have been downgraded in the news cycle along with coverage of the war.

Shchyhol: Russia is already attacking the whole world. Those cyberattacks will continue regardless of whats happening on land. Ukraine can win this war with conventional weapons, but the war in cyberspace will not be over. Ukraine is not capable of destroying Russia as a country, its more likely to destroy itself.

Thats why we all have to be ready for the following scenario to unfold: Those western countries and companies that are supporting the Ukrainian fight against Russia will be and are already under the constant threat of cyberattacks. This cyberwar will continue even after the conventional war stops.

The fact that in the last two months there was a relative lull in the number and quality of cyberattacks of our enemy, both against Ukraine and the rest of the world, only follows the usual Russian tactics, which are that they are accumulating efforts and resources, readying themselves for a new attack which will be coming. It will be widespread, probably global. Right now our task here is not to miss it, to stay awake and aware to that threat.

Here is the original post:
The Man at the Center of the New Cyber World War - POLITICO

Read More..

Cleartrip reports cyberattack but tells customers their sensitive data is safe – CNBCTV18

Flight booking platform Cleartrip on July 18 said its internal systems were breached by unnamed perpetrators.

In an e-mail sent to customers, Cleartrip said, This is to inform you that there has been a security anomaly that entailed illegal and unauthorised access to a part of Cleartrips internal systems."

In the e-mail, Cleartrip informed that apart from a person's profile, "no sensitive information pertaining to your Cleartrip account has been compromised as a result of this anomaly of our systems."

"As per our protocols, we have immediately intimated the relevant cyber authorities and are taking appropriate legal action and recourse to ensure necessary steps are being taken as per the law," the company said.

Reacting to the data breach, a Cleartrip spokesperson said, "We have identified a security anomaly in a few of our internal systems. Our information security team is currently investigating the matter along with a leading external forensics partner and is taking the necessary action. Appropriate legal action and recourse are being evaluated and steps are being taken as per the law."

In April this year, the Indian Computer Emergency Response Team (CERT-In) had asked all government and private agencies, including internet service providers, social media platforms and data centres, to mandatorily report cyber security breach incidents to it within six hours of noticing them.

(Edited by : Shoma Bhattacharjee)

Continue reading here:
Cleartrip reports cyberattack but tells customers their sensitive data is safe - CNBCTV18

Read More..

Automotive Cybersecurity Market Size to Grow by USD 1.91 million with 46% of the growth contribution from North America – Exclusive Technavio Reports…

Key Market Segment Highlights:

The automotive cybersecurity market report is segmented by Application (passenger vehicles and commercial vehicles) and Geographic (North America, APAC, Europe, South America, and MEA).

Revenue-generating Segment Insights: The passenger vehicles application segment held the largest automotive cybersecurity market share in 2020. The segment will continue to account for the highest revenue throughout the forecast period. The growth of this segment can be attributed to thegrowing adoption of automated passenger cars and vendors' focus on extending their product portfolio.

Regional Opportunities:46% of the market's growth will originate from North America during the forecast period. The US and Canada are the key markets for the automotive cybersecurity market in North America. Market growth in this region will be faster than the growth of the market in regions. The adoption of automated passenger cars will propel the automotive cybersecurity market growth in North America over the forecast period.

Download Sample Report Copyfor segment-based market share contribution and regional opportunities

Vendor Landscape

Top Companies Mentioned with their Offerings

Some more players covered in the report are:

Related Reports:

Internet Security Market by Solution and Geography - Forecast and Analysis 2022-2026

Threat Intelligence Security Market by End-user and Geography - Forecast and Analysis 2022-2026

Industrial Control Systems Security Market by End-user and Geography - Forecast and Analysis 2021-2025

Automotive Cybersecurity Market Scope

Report Coverage

Details

Page number

120

Base year

2020

Forecast period

2021-2025

Growth momentum & CAGR

Accelerate at a CAGR of almost 16.58%

Market growth 2021-2025

USD 1.91 million

Market structure

Fragmented

YoY growth (%)

13.34

Regional analysis

North America, APAC, Europe, South America, and MEA

Performing market contribution

North America at 46%

Key consumer countries

US, China, Germany, Canada, UK, and Japan

Competitive landscape

Leading companies, competitive strategies, consumer engagement scope

Companies profiled

Aptiv Plc, Argus Cyber Security Ltd., Arilou Information Security Technologies Ltd., ESCRYPT GmbH, Infineon Technologies AG, Karamba Security Ltd., Lear Corp., RunSafe Security Inc., Samsung Electronics Co. Ltd., and secunet Security Networks AG

Market Dynamics

Parent market analysis, Market growth inducers and obstacles, Fast-growing and slow-growing segment analysis, COVID 19 impact and future consumer dynamics, market condition analysis for forecast period.

Customization purview

If our report has not included the data that you are looking for, you can reach out to our analysts and get segments customized.

Key Topics Covered:

1 Executive Summary

2 Market Landscape

3 Market Sizing

4 Five Forces Analysis

5 Market Segmentation by Application

6 Customer landscape

7 Geographic Landscape

8 Drivers, Challenges, and Trends

9 Vendor Landscape

10 Vendor Analysis

11 Appendix

About UsTechnavio is a leading global technology research and advisory company. Their research and analysis focuses on emerging market trends and provides actionable insights to help businesses identify market opportunities and develop effective strategies to optimize their market positions. With over 500 specialized analysts, Technavio's report library Their client base consists of enterprises of all sizes, including more than 100 Fortune 500 companies. This growing client base relies on Technavio's comprehensive coverage, extensive research, and actionable market insights to identify opportunities in existing and potential markets and assess their competitive positions within changing market scenarios.

ContactTechnavio ResearchJesse MaidaMedia & Marketing ExecutiveUS: +1 844 364 1100UK: +44 203 893 3200Email:[emailprotected]Website:www.technavio.com/

SOURCE Technavio

Read the rest here:
Automotive Cybersecurity Market Size to Grow by USD 1.91 million with 46% of the growth contribution from North America - Exclusive Technavio Reports...

Read More..

EXPLAINED: How to store your crypto safely and avoid hacks – Business Today

In light of the various hacks and liquidations of crypto exchanges and Decentralise Finance (DeFi) platforms, experts advise crypto investors to not keep their crypto funds in any such places. But what other options do investors have?

Well, investors have not just one, but several other options, based on their requirements. But let us first understand why it is not safe to store your crypto in the aforementioned places.

Why should you not store your crypto on an exchange or on any DeFi platform?

It is advisable to not store one's crypto holdings on any centralised platform like exchanges or DeFi platforms. It is because the custody of the funds is with the platform itself and not the investor. Moreover, these platforms are prone to hacks.

In the recent past, DeFi platforms, like the Celsius Network, 3 Arrows Capital, Voyager Digital, Vauld, and other faced financial strains because of which investors' funds became inaccessible.And hence investors are advised to store their cryptos in different types of crypto wallets.

But what are crypto wallets?

Crypto wallets are pieces of hardware or software used to store your crypto assets. Every crypto wallet has an identity, which comprises a pair of private keys and public keys.

What are public and private keys and what do they do?

Public and private keys provide an alphanumeric identifier for your crypto wallet, which is called, your wallet address.

What does a crypto wallet address do?

The crypto wallet address specifies where the crypto tokens can be sent on the blockchain network. The private keys of a crypto wallet are never supposed to be disclosed. The public key is disclosed to sender of cryptos to identify the address.

Crypto wallets can be divided into groups

a) Based on how frequently they are connected to the internet and

b) Based on their technology.

Based on internet connectivity, they are divided into two categories

1. Hot Wallets

Hot wallets are regularly connected to the internet. They are more user-friendly but less secure since they are frequently connected to the Internet. Hot wallets are usually utilised for daily transactions. They offer immediate access to the funds and are easy to set up.

2. Cold Wallets

Cold wallets are not connected to the internet frequently. As a result, they are highly secure. HODLers benefit most from cold wallets.

Cryptowallets are split into two broad categories based on the underlying technology with which they are built

1. HardwareWallets

2.Wallets for software

Hardwarewallets are further subdivided into:

i. USB flash drives

These devices use USB ports to connect to your computer or laptop. Coldwallets are frequently used for long-term storage.

ii. Bluetooth

These gadgets use Bluetooth to communicate with your PC, laptop, or mobile phone. Coldwallets are also commonly utilised for long-term storage.

iii. PaperWallets

The QR codes of the receiver are printed on paper in paperwallets. These are no longer relevant. Their main disadvantage is that they do not permit partial fund transfers.

Softwarewallets are further classified as follows:

(a)DesktopWallets

These are software packages that may be installed on numerous operating systems and are becoming more popular over time. Anti-virus protection is required since any computer linked to the internet poses significant security hazards. Desktopcryptowallets are preferable over holdingcryptocurrency on an exchange because of incessant hacks on exchanges.

b) Mobile Applications

Mobile apps are similar to desktopwallets. Thesewallets are designed to be utilised on mobile phones. They are particularly convenient because they conduct transactions using QR codes. They are appropriate for frequent everyday use. However, they are vulnerable to malware attacks. Encryption is required for mobilewallets. They are portable and convenient, yet they are vulnerable to viruses. Two popular mobilewallets are Coinomi and Mycelium.

(c) Browser basedwallets

Thesewallets can be added as browser extensions on your browser. It is worth noting that private keys in the case of browser extensionwallets are susceptible to DDOS attacks. They can be hosted by themselves or by a third party. Being self-hosted is preferred since money is always in the investors control. Two examples of browser extensionwallets are MetaMask and Coinbase.

Also Read:MATIC crypto zooms 20%, Polygon Joins Disneys 2022 Accelerator Program - BusinessToday

Also Read:Bitcoin reclaims $21,000, Polygon rallies 6% as crypto markets recover after rout - BusinessToday

Excerpt from:
EXPLAINED: How to store your crypto safely and avoid hacks - Business Today

Read More..

Trusting machines to defend against the humans | BCS – BCS

An Advanced Persistent Threat has successfully installed malware on one of the development servers in your network. Maybe one of your engineers clicked on a phishing link? Maybe they hacked in through some vulnerability in your firewall? Maybe its an insider who snuck in a USB stick loaded with the program?

That doesnt matter now. All you can think of is your intellectual property. All of the code you have invested thousands of hours and millions of pounds into is on those servers. You scramble to put together a team to investigate this. Meanwhile the attackers start looking through all that valuable code on the server.

You desperately try to identify the compromised machine and shut it down. You struggle to find it. Should you just pull every plug now? The disruption would cost a fortune, effectively leaving all of your 135 developers unable to work. Meanwhile, the attacker silently disappears back into the internet. They achieved their objective.

There are inherent limitations when it comes to securing a network using a human security team. People are expensive. Salaries are almost certainly the largest chunk of your budget, because you pay more for skilled people who know the current state of the threat landscape and can adapt as it shifts.

They must also sleep, take holidays and sometimes fall ill. 24/7 monitoring is key to ensuring you are protected from attackers who are never off the scene, but achieving this with a human team is prohibitively expensive for many organisations. And there is still a risk of something being overlooked or an undetected insider threat.

In the world of security, defenders are at a distinct disadvantage. In our new world, we face an avalanche of increasingly sophisticated threats. The devices on our corporate networks are increasingly heterogeneous and may not even be entirely managed by us.

In the face of all that, we have to be secure all of the time. From John in Accounting who needs to avoid clicking on that funny-looking link; to Sara in development who has to mitigate against SQL injection vulnerabilities in her code. Threat is persistent and pernicious.

Often, attackers can be inside a system without your knowledge for months. In 2020, a supply chain attack on Solarwinds Orion (dubbed Sunburst) affected at least 200 organisations worldwide. Most notably, attackers had access to the systems of the US federal government for eight to nine months.

While the idea that an attack could go unnoticed is horrifying, there are steps that can be taken to mitigate risk. In the world of cybersecurity there is a new concept emerging which aims to support organisations in their fight against existing and emerging threats. Defence through machine learning.

Machine learning (ML) is already revolutionising many industries, and is starting to become more prevalent in the cybersecurity industry. The key question we hope to answer is why?

Why should you use ML-based solutions in your security management? And why should you choose them instead of or alongside more traditional solutions?

As you type, user inputs from a keyboard are transferred over a wired or wireless connection, decoded and mapped to a specific letter. All within milliseconds. Computers are astonishingly fast, and can make decisions at the speed of light.

Humans find traversing and analysing large data sets laborious, and sometimes impossible. We are great at being creative and solving problems, but computers are way better at maths. This is useful to apply in cybersecurity, because we can hand the tedium of searching our log files or network traffic over to ML.

Then, once an anomaly is detected in the data, we can hand it back to a person who can investigate it further and determine what actions need to be taken. This idea is called anomaly detection, and was originally proposed for application to Intrusion Detection Systems (IDS) in 1986 by Dorothy Denning, an American security researcher.

In more modern applications of ML to cybersecurity, decisions can be made by the computer in order to provide an instant response to anomalies.

For example, if we detected that credentials that belong to an employee based out of a London office were suddenly being used by someone using a residential IP address in Kolkata, something fishy is probably happening. In response to this anomaly, we could automatically shut down the connection and block them before they try to escalate privilege.

This, of course, could be done by a person looking at graphs and log files, but in a large organisation (or a small one with a large IT inventory), youre going to need a lot of people. The key thing to note here is that we arent using a traditional approach of defining and detecting misuse, were constantly analysing data to define what can be considered normal and then detecting things that significantly differ from that.

This is a really great advantage to applying ML techniques to cybersecurity.

ML is designed to adapt. Thats the great thing about it, and why its becoming so widespread in its use from learning about user activity to tailor content to them (think Netflix and YouTube), to identifying different types of plant species and performing speech recognition.

See the original post here:
Trusting machines to defend against the humans | BCS - BCS

Read More..

Escalating emigration and the drought in Iran’s IT industry – Middle East Institute

For many years, Irans educated elites have been leaving the country in growing numbers. From doctors to scientists and researchers to engineers, they are emigrating, mostly to Western countries, for various reasons, but chief among them are poor economic conditions and a lack of political and social freedoms at home.

While estimates of the actual number of Iranians who have left the country differ, researchers agree that the overall size of this emigration wave has been growing like never before. According to the 2021 Iran Migration Outlook report, produced by the Iran Migration Observatory research institution, the number of Iranian migrants has more than doubled over the past three decades, rising from a total of around 800,000 in 1990 to 1.8 million in 2020.

While the growing quantity of mostly skilled and young people heading abroad clearly affects the country in multiple ways, Irans information technology sector is among those hit hardest due to the burgeoning outflow of its experts in recent years. Thanks to the relatively fast-paced expansion of telecommunications infrastructure and increased access to the internet the country has nearly 107 million internet subscribers with a penetration rate of over 127% the share of the digital economy in Irans GDP has grown from just 2.6% to 6.87% over the past decade.

According to official government data released by the Statistical Center of Iran, the value of the national digital economy during the past Iranian calendar year of 1400 (March 23, 2020 to March 22, 2021) was around $45 billion. The authorities aim to increase the digital economys share to 10% of GDP over the next three years, but in light of the escalating brain drain of Iranian IT experts, many have warned about the growing challenges to achieving this objective.

Drought of IT professionals

According to the above-mentioned Iran Migration Outlook report, 50% of those involved in Irans startup community, along with 44% of university students and graduates, are planning to emigrate. The report adds that 55% of those active in the startup community believe they will definitely not return after leaving the country. While there is no clear data on the number of IT experts who have left Iran, the growing emigration trend has rattled officials and businesses, including tech startups.

Adel Talebi, the secretary of the Internet Business Association, was quoted by local Iranian media last month as saying that the country faces a shortage of highly skilled individuals due to emigration. This has affected not only the field of cyber security but all areas of information technology, including development, software engineering, and programming. Back in February, Hamid Behnegar, a senior member of the Iran Chamber of Commerce, Industries, Mines and Agriculture, also warned about what he described as a drought of specialized manpower in the IT industry.

Similar sentiment is expressed by members of the Iranian startup community. For example, Ehsan, a Tehran-based entrepreneur who managed a company of around 40 employees until last year, told the author that despite managing to survive the countrys poor economic conditions, his firm went bankrupt after several key members of his team decided to leave Iran for better working conditions abroad. The shortage in human resources in the IT sector is a crisis. Global demand for IT professionals has grown, and Iranian companies are unable to compete with them when it comes to recruitment, Ehsan noted.

But the deteriorating conditions do not stop there. Some professionals, while remaining in their home country, have turned to virtual migration and are now doing remote work for foreign companies and benefiting from much higher wages without having to bear the hardships of emigration.

Why do they leave?

A broad array of reasons motivates some highly educated Iranians to leave Iran, including the countrys poor economic conditions, a lack of political stability, and absence of social freedoms. However, for those active in Irans IT industry, the governments restrictive measures on internet use and the censorship of popular social media platforms, along with the unpredictability of regulations in this regard, can be seen as important factors behind the tsunami of IT experts leaving Iran.

Mohammad, 32, is illustrative of the above-described trend. A computer programmer, he initially moved to Istanbul before his second migration to the Netherlands, which has become a popular stop for many Iranian IT professionals. For him, political instability, deteriorating economic conditions, and social obstructions were the main factors that triggered his decision to leave Iran. Morteza, 38, is another Iranian IT professional who left Iran last year and shares Mohammads views. As he noted in an interview with this author, I could not bear the harassments of different regulatory institutions and the internet censorship that was directly affecting my work.

Future of Irans IT industry

Experts warn that the loss of human capital in this industry will have widespread consequences due to the expanding role of technology in all businesses and industries. According to entrepreneurs like Ehsan, Iranian startup companies have suffered the most because of the current situation. Many of these firms are being forced to shut down or postpone launching new services or products because they cannot afford or even find the talented experts needed to help them reach their targets. Since a large number of top IT professionals have left the country over the past couple of years, the demand for the remaining professionals is very high; and therefore, only the large companies can afford to pay a salary as high as $2,000 or even $3,000 a month, literally pushing the small companies out of the market, he contended.

Yet the consequences of such an exodus do not end there. According to many experts, Irans growing cyber vulnerabilities in different businesses, industries, and national infrastructure are already costing the country both in terms of economic loss and growing insecurity. Iran has been targeted by a number of cyber attacks in recent years, many of which the authorities have blamed on the United States and Israel. Cyber attacks against Irans railway system (July 2021), the countrys national fuel distribution system (October 2021), a number of major steel producers (June 2022), and the municipal government website of Tehran (June 2022) are just a few examples.

As Iran tries to assert increasing control over the internet and amid growing local discontent and stalled international negotiations over reviving the 2015 nuclear agreement many expect the flight of the country's IT professionals to continue. This worsening drought in highly skilled human capital will only further burden an already struggling industry.

Maysam Bizaer is an analyst and commentator who focuses mostly on Iran's foreign policy, politics, and economy. He is a frequent contributor to a number of international media and U.S.-based think tanks. Follow Maysam on Twitter@m_bizar.The views expressed in this piece are his own.

Photo by Scott Peterson/Getty Images

The Middle East Institute (MEI) is an independent, non-partisan, non-for-profit, educational organization. It does not engage in advocacy and its scholars opinions are their own. MEI welcomes financial donations, but retains sole editorial control over its work and its publications reflect only the authors views. For a listing of MEI donors, please click here.

Follow this link:
Escalating emigration and the drought in Iran's IT industry - Middle East Institute

Read More..

Artificial Intelligence: Advancing the Workforce of the Future – Diverse: Issues in Higher Education

Steven R. GonzalesArtificial intelligence, or AI, is a rapidly growing industry that has the potential to lead our workforce into the future, with its unique ability to not only create jobs in its own field but also modernize other fields with cutting-edge technologies and machines

Skills in AI are highly sought after and give students a competitive edge when entering the job market. According to Kimberly Doyle at Infosec Resources, which tracks trends in security education, cyberthreats, and career development, more than 50,000 job openings are currently posted on Indeed for artificial intelligence. The Bureau of Labor Statistics projects a 15% increase in computer and information research jobs from 2019 to 2029, including positions like AI specialists and machine learning engineers. According to the 2021 Stanford AI Index report, AI has permeated nearly every industry in the global job market.

Arizona and Phoenix, which are home to the ten Maricopa Community Colleges, were projected to see 21,535 AI employment opportunities in 2020, which was 6% above the national average. Our local demand for AI talent is increasing in Maricopa County, and careers are projected to grow faster than the average rate for all employment over the next decade. Research done by our districts Workforce and Economic Development Office estimates an increase of 22.4% for these roles by 2029, according to Economic Modeling Specialists Inc.

At the Maricopa County Community College District, or MCCCD, our programs are designed to ensure students have the skills required for success in the workforce of the future, covering topics such as cloud computing, automotive technology, cybersecurity, welding, bilingual nursing, drone training, and a variety of STEM areas. Early on, we identified the potential for growth in artificial intelligence and were fortunate to partner with Intel in launching the countrys first artificial intelligence program through its AI for Workforce initiative.

In collaboration with Intel and the Arizona Commerce Authority, we created Arizonas first artificial intelligence certificate and degree program in 2020, enabling tens of thousands of students to land careers in healthcare, automotive, industrial, and aerospace fields. This established the Maricopa Community Colleges as the first in the U.S. to train workers for the regions driving demands in AI technology, allowing access for more students to master skills valuable across many occupations and industry sectors and ultimately improving the nations workforce, economy, and community.

The program enables our students to develop traditional skills such as data collection, AI model training, coding, and exploring the societal impact of AI technology. Occupations requiring AI skills include business analyst, java developer, data engineer, marketing manager, health manager, engineer, product manager, developer, front end developer, architect, etc. Top employers requesting these skills include Intel, IBM, Wells Fargo, Deloitte, American Express, and more.

Moreover, the most important result from implementing this program at the Maricopa Community Colleges is the ability to expand access to technology skills needed for current and future jobs and bridge the equity gap. Community colleges typically welcome a more diverse student population, with more representation from minority groups, older students, adults seeking reskilling and upskilling opportunities, and students in a lower financial demographic. Serving these traditionally underserved student populations with a first-of-its-kind STEM program allows more diverse members of the future job market to enter the AI community and shape the perspective of what our communities need.

Last spring, MCCCD launched more than 15,000 graduates into roles that directly impact the local workforce and have added more than $7.2 billion in income to the Maricopa County economy. There soon will be opportunities to complete a bachelor's degree in high-demand fields. Our colleges are evolving and enhancing our capability to nimbly respond to rapidly-evolving workforce needs and empower individuals with the skills they need to immediately succeed in their chosen career path.

Our success is directly related to our incredible faculty who work tirelessly to develop innovative programs that ensure our students are competitive and have access to high demand programs.

We are proud to be a catalyst for change by providing expertise and training in emerging fields such as artificial intelligence. We will continue to seek partnerships with companies such as Intel to deliver learning experiences to our students and help prepare the future workforce for impact and success. For additional information about the program, visit the dedicated AI website at: https://www.maricopa.edu/artificial-intelligence.

Dr. Steven R. Gonzales serves as interim chancellor of the Maricopa County Community College District (Ariz.).

The Roueche Center Forum is co-edited by Drs. John E. Roueche and Margaretta B. Mathis of the John E. Roueche Center for Community College Leadership, Department of Educational Leadership, College of Education, Kansas State University.

Here is the original post:
Artificial Intelligence: Advancing the Workforce of the Future - Diverse: Issues in Higher Education

Read More..

Artificial Intelligence Tasked To Help Protect Bees From Certain Pesticides – Growing Produce

Researchers in the Oregon State University College of Engineering have harnessed the power of artificial intelligence to help protect bees from pesticides.

Cory Simon, Assistant Professor of chemical engineering, and Xiaoli Fern, Associate Professor of computer science, led the project, which involved training a machine learning model to predict whether any proposed new herbicide, fungicide, or insecticide would be toxic to honey bees based on the compounds molecular structure.

The findings, featured on the cover of The Journal of Chemical Physics in a special issue, Chemical Design by Artificial Intelligence, are important because many fruit, nut, vegetable, and seed crops rely on bee pollination.

Without bees to transfer the pollen needed for reproduction, almost 100 commercial crops in the U.S. would vanish. Bees global economic impact is annually estimated to exceed $100 billion.

Pesticides are widely used in agriculture, which increase crop yield and provide food security, but pesticides can harm off-target species like bees, Simon says. And since insects, weeds, etc. eventually evolve resistance, new pesticides must continually be developed, ones that dont harm bees.

Graduate students Ping Yang and Adrian Henle used honey bee toxicity data from pesticide exposure experiments, involving nearly 400 different pesticide molecules, to train an algorithm to predict if a new pesticide molecule would be toxic to honey bees.

The model represents pesticide molecules by the set of random walks on their molecular graphs, Yang says.

For more, continue reading at ScienceDaily.com.

ScienceDaily features breaking news about the latest discoveries in science, health, the environment, technology, and more, from leading universities, scientific journals, and research organizations. See all author stories here.

Read the rest here:
Artificial Intelligence Tasked To Help Protect Bees From Certain Pesticides - Growing Produce

Read More..

Artificial Intelligence Has A Baby’s Understanding Of Physics (Which Is Impressive) – IFLScience

The new AI developed an "intuitive physics", just as human babies do. Image: Olga Belyaevskaya/Shutterstock.com

From driverless vehicles to weapons systems, artificial intelligence (AI) models are being trusted with an awful lot of responsibility these days, so youd like to think the technology has some idea of whats going on. Fortunately, we can all now rest assured thanks to the whizzes at DeepMind, who have created the first ever AI with a grasp of physics comparable to that of a human baby.

Writing in the journal Nature Human Behaviour, the researchers explain how we develop intuitive physics within the first months of life, quickly coming to understand certain fundamental laws governing the material world. For example, infants tend to comprehend the concepts of permanence whereby objects dont simply vanish plus solidity and continuity, referring to the inability of objects to pass through one another or to suddenly alter their trajectory through time and space.

However, the authors go on to state that current artificial intelligence systems pale in their understanding of intuitive physics, in comparison to even very young children. To help the bots catch up, the team turned to the field of developmental psychology to develop an AI that is capable of learning in the same way as a baby.

For instance, by the age of about three months, human infants are capable of showing surprise when an object disobeys one of the three pillars of our intuitive physics. This ability is known as the violation-of-expectation (VoE) paradigm, and provides the inspiration behind the new AI.

Called PLATO standing for Physics Learning through Auto-encoding and Tracking Objects the deep-learning system was trained on a series of videos of balls moving through space and interacting with one another. The video dataset was specifically designed to represent the concepts of permanence, solidity and continuity, as well as two extra concepts known as unchangeableness and inertia. These relate to the fact that objects do not suddenly alter their basic characteristics or disobey the laws that govern speed and direction.

When PLATO was later shown videos of scenarios that contravened any of these five tenets, it successfully reacted with a VoE signal. After training PLATO on videos of simple physical interactions, we found that PLATO passed the tests in our Physical Concepts dataset, explained study author Luis Piloto in a statement.

By varying the amount of training data used by PLATO, we found that PLATO could learn our physical concepts with as little as 28 hours of visual experience.

Impressively, the AI could even identify transgressions of the laws of physics when looking at a separate video dataset featuring objects that it had never seen before. PLATO passed, without any re-training, despite being tested on entirely new stimuli, says Piloto.

This breakthrough certainly bodes well for the future of AI, since, As Piloto points out, if were to deploy safe and helpful systems in the real world, we want these models to share our intuitive sense of physics.

Obviously theres still a way to go, but baby smarts aint a bad start.

Here is the original post:
Artificial Intelligence Has A Baby's Understanding Of Physics (Which Is Impressive) - IFLScience

Read More..

Trainual Uses AI and Machine Learning to Give Small Business Owners a Faster Way to Onboard and Train – PR Newswire

New "Suggested Roles and Responsibilities" features from Trainual increase accountability and streamline documentation

SCOTTSDALE, Ariz., July 18, 2022 /PRNewswire/ -- Trainual, the leading training management system for small businesses and growing teams, today released an AI-powered documentation engine for outlining roles and responsibilities. The "Suggested Roles" and "Suggested Responsibilities" features allow users of its platform to leverage the learnings of thousands of growing organizations around the world by recommending roles by company type, along with the responsibilities associated with those roles. Trainual accomplishes this with proprietary data that connects which types of trainings have been assigned to comparable job titles from similar businesses in every industry.

Small businesses create 1.5 million jobs annually in the United States, accounting for 64% of annual averages (source). With Suggested Roles and Responsibilities, small business owners and leaders have tools to quickly identify the duties for new roles within their organization, and map training materials to them.

"Every small business is unique. As they grow, so does their employee count and the mix of different roles they have within their companies. And along with each role comes a new set of responsibilities that can take lots of time to think up and document," said Chris Ronzio, CEO and Founder of Trainual. "We decided to make that process easier. Using artificial intelligence (AI) and machine learning, Trainual is providing small business owners and managers the tools to easily keep their roles up-to-date and the people that hold them, trained in record time."

The process is simple. When a company goes to add a new role, they'll automatically see a list of roles (AKA job titles) that similar businesses have added to their companies. After accepting a suggested role in the Trainual app, they'll see a list of suggested responsibilities, curated utilizing AI and Trainual's own machine learning engine. Owners, managers, and employees can then easily add context to all of the responsibilities for every role in the business by documenting or assigning existing content that's most relevant for onboarding and ongoing training.

For more information, or to get started with Trainual and try out Suggested Roles and Responsibilities, visit Trainual.com.

About Trainual

Trainual is a training and knowledge management platform designed to help business teams get people up to speed faster, keep them aligned from anywhere, streamline their systems and processes, and increase productivity. Built with small business budgets and ease of use in mind, Trainual makes online training manuals easy to build and simple to scale. More than 7,500 companies in over 180 countries are building their business playbooks, training their teams, and improving their operations with Trainual.

For more information, visit Trainual.com

Media Contact: Becky Winter(602)550-4914[emailprotected]Trainual.com

SOURCE Trainual

Read the original here:
Trainual Uses AI and Machine Learning to Give Small Business Owners a Faster Way to Onboard and Train - PR Newswire

Read More..