Page 1,996«..1020..1,9951,9961,9971,998..2,0102,020..»

Get this Acer convertible laptop for just $399 – PCWorld

If youre in the market for a 2-in-1 laptop, today youre in luck. Right now, you can get an Acer Spin 3 convertible laptop with an Ice Lake processor for $399 at Walmart. Thats $187 off the MSRP.

This version of the Spin 3 has a 14-inch touch display with 1080p resolution. The CPU has an Intel Tiger Lake Core i5-1035G1 with four cores, eight threads, and a boost to 3.6GHz. Thats an older processor, but it still has a solid core count and the speed is fine for everyday uses and productivity.

For RAM, you get 8GB, which is a solid amount for surfing the web and checking e-mail. Onboard storage is a 256GB NVMe SSD. Thats a little light, but it should be enough if you rely on cloud storage or use external storage.

Acer packed this laptop with a Thunderbolt 3 port, two standard USB, a media card reader, and an HDMI out. It comes with a stylus as well, which is useful if you need to mark up a web page or do some drawing. Its also running Windows 10, but it should be upgradeable to Windows 11.

[Todays deal: Acer Spin 3 for $399 at Walmart.]

Read more from the original source:
Get this Acer convertible laptop for just $399 - PCWorld

Read More..

Google Photos vs OneDrive: Which is the best cloud backup solution? – PiunikaWeb

Cloud backup services let users organize media and store a copy in case the original data is compromised. Google Photos has dominated the competition for media backup, AI search features, and editing for quite some time now.

However, the situation took a turn when the company announced that it would no longer offer unlimited storage space.

Several users searched for an alternative, and OneDrive is a name that emerged as one of the fierce competitors.

Microsoft OneDrive is a complete cloud storage solution that will let you create photo galleries and manage smart folders, and it has recently incorporated editing tools.

The Google Photos vs OneDrive debate is a tough one. The major question bothering many users is which platform is better and can be relied on as the ideal media backup companion.

This article aims to guide you through a few points and help you reach a better conclusion.

Google Photos and OneDrive offer cross-platform support. Microsofts product is available on multiple platforms, including Windows, iOS, Android, Web, and Mac, as you can access the same app everywhere.

Google Photos, on the other hand, only offers dedicated apps for iOS and Android. For Mac and Windows, youll have to rely on the web version.

The OneDrive gallery section is also integrated directly with the Photos app on Windows, while Google doesnt provide such integration features. Both also offer widgets across Android and iOS; thus, there isnt much to compete here.

Regarding the user interface, both platforms carry the material design theme guidelines. For efficient navigation, you get a handy bottom bar, and they also support the dark theme.

OneDrive offers built-in fingerprint protection, which Google Photos currently lacks. Although, the latter lets users lock pictures in separate folders inside the application.

OneDrive also provides a personal vault in the app, letting users store sensitive and important files. It is secured by a two-step verification and auto-locking feature and requires biometrics for successful access.

The AI-powered search feature of Google Photos is a definite edge for the platform, and OneDrives auto-tags feature doesnt match Googles powerful AI, which is a major differentiating factor.

Google Photos gets an edge in this category with its robust image editing features. It offers plenty of basic and a few advanced editing options. The auto-generated suggestions and filters are some of its standout attributes.

Microsoft OneDrive offers some editing features, but they are basic, including saturation, brightness, exposure, shadows, contrast, etc.

This concludes our article, and Google Photos is a clear winner due to its amazing editing and security features but yes it lacks in compatibility as compared to OneDrive.

If you want to read more informative content on Google Photos, click here.

PiunikaWeb started as purely an investigative tech journalism website with main focus on breaking or exclusive news. In no time, our stories got picked up by the likes of Forbes, Foxnews, Gizmodo, TechCrunch, Engadget, The Verge, Macrumors, and many others. Want to know more about us? Head here.

Original post:
Google Photos vs OneDrive: Which is the best cloud backup solution? - PiunikaWeb

Read More..

Why organizations must move to a cloud-based infrastructure [Q&A] – BetaNews

The past couple of years have led to lots of new demands on IT and many businesses have turned to the cloud in order to meet them.

Whilst the initial assumption may have been that these changes would be temporary, much of the shift in working patterns looks like becoming permanent. We spoke to Alkira's CEO Amir Khan to find out more about what this means for businesses as they gear up for remote work on a long-term basis.

BN: What are the current challenges facing the cloud industry?

AK: There are a number of challenges in the cloud industry today, but the standouts are the prevalence of shadow IT, IT bloat and the inability to secure the cloud at all access points.

Shadow IT is a huge issue for organizations that have continued to support remote work, as well as organizations that span multiple locations. This has created silos, preventing teams from staying in alignment with each other.

IT bloat is especially common in enterprises that had to shift operations to a remote-first model in response to the COVID-19 pandemic. Folks spun up infrastructure without much thought. Most assumed it would be temporary. Remote work is here to stay. So businesses now need to figure out the right architecture and security model for their users.

BN: How did the industry get to this point?

AK: The current challenges emerged from the influence of a variety of factors. The global pandemic prompted a rapid switch to remote-first work, which few organizations were prepared for. This resulted in quick, panicked cloud deployments to keep businesses operational, and in many cases, these stacks were not the right fit for the organization that rolled them out. Workers continue to work from home and from remote locations. And organizations realize their infrastructure isnt working as well as intended. This means that many organizations have a bit of 'spring cleaning' to do to better optimize their infrastructure, ultimately better protecting their business and saving on overhead costs.

BN: What is so dangerous about IT bloat?

AK: Because deployments were rolled out so quickly, there are a wide range of challenges that were unintentionally created. These include duplicate IP addresses, unsanctioned internet access, unused networks and security resources, misconfigured security group settings and unaccounted for shadow IT resources. These can cause compliance violations, app reliability issues as well as compromise security and incur unnecessary overhead costs.

BN: What solutions are emerging to help combat these challenges? What can organizations do to avoid experiencing larger problems?

AK: It's critical to establish a single point of control which can help organizations modernize and unify the silos that have already been created. Additionally, finding ways to leverage, as opposed to replacing existing infrastructure can help organizations avoid creating even larger problems within the cloud deployment.

BN: How can businesses adapt to permanent remote work while still reducing IT bloat within their infrastructure?

AK: Remote work doesn't inherently create IT bloat. The bloat is created when teams must quickly deploy a new tool or instance to support a specific task and it persists when organizations lack visibility in their environments. With visibility, bloat can be eliminated. To achieve this visibility organizations need a single console to manage multi-cloud environments. This allows multiple teams to access the clouds without needing to go through different interfaces.

Additionally, enterprises can create automated templates. New resources spun up automatically have the right security and operational settings.

BN: What are the benefits of housing data storage and infrastructure in the cloud?

AK: With the right networking and security framework in place, data storage and the organization's infrastructure are much easier to access via the cloud, especially for organizations continuing to support remote workers. This also allows them to spin up additional capacity if and when it is needed.

A major benefit in the current environment is the ability to bypass the current supply chain issues that are impacting hardware-based vendors. Organizations relying on hardware are often waiting months to receive components, hampering modernization efforts and making the business less agile. Since there's no physical set up, additional deployments become easier to roll out, and can be completed in less time.

BN: Why do organizations need to prioritize a unified data storage structure?

AK: They have no choice. Customers are moving from data centers to centers of data that exist across public clouds, private clouds, in co-locations and data centers, and this data needs to be connected via a new type of network. If organizations don't make this unified infrastructure a priority, they risk falling behind and falling victim to the downsides of IT bloat.

Image credit:Nomadsoul1/depositphotos.com

Continued here:
Why organizations must move to a cloud-based infrastructure [Q&A] - BetaNews

Read More..

Dell builds its own partner-based data lakehouse Blocks and Files – Blocks and Files

Dell has devised a reference architecture-type design for a combined data lake/data warehouse using third-party partner software and its own server, storage, and networking hardware and software.

Like Databricks, Dremio, SingleStore, and Snowflake, Dell envisages a single data lakehouse construct. The concept is that you have a single, universal store with no need to run extract, transform and load (ETL) processes to get raw data selected and put into the proper form for use in a data warehouse. It is as if there is a virtual data warehouse inside the data lake.

Chhandomay Mandal, Dells director of ISG solution marketing, has written a blog about this, saying: Traditional data management systems, like data warehouses, have been used for decades to store structured data and make it available for analytics. However, data warehouses arent set up to handle the increasing variety of data Dell has devised a reference architecture-type design for a combined data lake/data warehouse using third-party partner software and its own server, storage and networking hardware and software text, images, video, Internet of things (IoT) nor can they support artificial intelligence (AI) and machine learning (ML) algorithms that require direct access to data.

Data lakes can, he says. Today, many organizations use a data lake in tandem with a data warehouse storing data in the lake and then copying it to the warehouse to make it more accessible but this adds to the complexity and cost of the analytics landscape.

What you need is one platform to do it all and Dells Validated Design for Analytics Data Lakehouse provides it, supporting business intelligence (BI), analytics, realtime data applications, data science, and machine learning. It is based on PowerEdge servers, PowerScale unified block and file arrays, ECS object storage, and PowerSwitch networking. The system can be housed on-premises or in a colocation facility.

The component software technologies include the Robin Cloud Native Platform, Apache Spark (open-source analytics engine), and Kafka (open-source distributed event streaming platform) with Delta Lake technologies. Databricks open-source Delta Lake software is built on top of Apache Spark and Dell is using Databricks Delta Lake in its own data lakehouse.

Dell is also partnering Rakuten-acquired Robin.IO with itsopensource Kubernetes platform.

Dell recently announced an external table access deal with Snowflake and says this data lakehouse validated design concept complements that. Presumably Snowflake external tables could reference the Dell data lakehouse.

With the above Dell graphic, things start to look complicated. A Dell Solution Brief contains more information, along with this table:

Clearly this is not an off-the-shelf system and needs a good deal of careful investigation and component selection and sizing before you cut a deal with Dell.

Interestingly, HPE has a somewhat similar product, Ezmeral Unified Analytics. This also uses Databricks Delta Lake technology, Apache Spark, and Kubernetes. HPE is running a Discover event this week, with many news expected. Perhaps the timing of Dells announcement is no accident.

Read the original here:
Dell builds its own partner-based data lakehouse Blocks and Files - Blocks and Files

Read More..

Ann Coulter: They’ve learned nothing and forgotten nothing – Today’s News-Herald

Bill Barr, two-time attorney general and one of approximately 2.5 members of the Trump administration to leave with his reputation intact, has also written one of only two books about that administration worth reading, One Damn Thing After Another. Ive read em all. At least partially. Most did not merit more than a quick skim.

[For those interested, the other book about the Trump administration worth reading is Michael Wolfes Fire and Fury, but judging by its sales, you probably already have this book.]

Ive been a fan of Barrs since long before he worked for Trump, and was thrilled when he became Trumps A.G. But when I got to Barrs description of Trumps appeal -- which went on for pages and pages! -- I wanted to throw the book out the window.

You can probably guess where Im headed.

By Barrs lights, none of Trumps positives involved ... immigration.

They will not learn. No matter what we do, no matter how many times Americans tell pollsters they want less immigration, no matter how loudly we beg Washington to halt the endless flow of the third world into our country, the ruling class refuses to listen.

If electing a cretinous flimflam artist to the presidency solely on the strength of his promise to be a hard-ass on immigration didnt wake them up, nothing ever will.

The first clue about the absolute thickheadedness of anyone living within 100 miles of our nations capital was this deeply concerning line from Barrs book:

I had long planned on supporting Jeb Bush for the Republican presidential nomination in 2016.

Next, Barr turns to the political landscape that allowed such a preposterous creature as Trump to sail to victory. The source of the problem, as I saw it, he writes, was the growing strength in the Democratic Party of a Far Left progressive ideology that aimed to tear down and remake American society. Trump, Barr writes, was merely the result of our embittered politics, a bitterness engendered not by Trump but by the increasing militance of the Democratic Partys progressive wing.

Yeah, OK, fine. He gets two points for accurately describing how loathsome Democrats have become. How about the elected Republicans we send to Washington to represent us? Its you guys we really hate. If it were only progressive Democrats voters detested, why NOT Jeb-exclamation point? Why not John My Father Was a Postman Kasich?

No one imagines that Democrats give a crap about the country. Its Republicans who run for office, pretending to agree with the voters on immigration -- then get into office and sell out to the Chamber of Commerce.

Oh, you wanted a wall? Yes, absolutely, but first we have to pass these tax cuts, lavish billions of dollars on some foreign country and push through another Wall Street bailout.

For 50 years, in poll after poll, a majority of Americans have said they want LESS immigration.

Even the Cheap Labor Lobby at the Cato Institute produced a poll last year showing that 81% of Americans want less immigration than we have today. Sixty-one percent of respondents want to cut immigration by at least half. Nearly 10% of Americans want zero immigration.

Unfortunately, everything Trump was ever going to accomplish was accomplished at 2:50 a.m. on election night 2016, when he announced his victory over Hillary Clinton. (Everything other than turning judicial selection over to the Federalist Society.) At that moment, the densest Republican had to realize that restricting immigration is so popular that even a lout like Trump could win the presidency on it.

After 2016, how could any sentient mammal begin a sentence, as Barr does, But the main reason Trump won the nomination -- and later the general election -- was ..., and not end it with: IMMIGRATION!? (Ill accept a range of substitutes -- the wall, illegals, Dreamers, Press 1 for English, wages lost to cheap labor immigrants, Kate Steinle, the 9/11 attack -- did the media forget to tell you that was done by immigrants? -- the drug epidemic, etc., etc.)

Not Barr. He reels off the standard RNC suicide pact, prattling about the economy, military power, pro-life and school choice.

Yes, Trump won in 2016 because of school choice.

You could Ctrl + F: immigration through Barrs entire book and get nary a hit, other than general references to the Immigration and Naturalization Service -- and this:

Before one of the 2016 presidential debates, Barr is careful to note that he contacted a friend on the candidates team to suggest that Trump say, we welcome legal immigrants, and ... Latin Americans who come here legally -- people with a strong work ethic and family values -- contribute enormously to the country.

And thats how Jeb-exclamation point won the nomination and the general election!

Just this week, Republican Sen. John Cornyn was spotted on the Senate floor, seeming to propose amnesty, collegially telling a Democrat, First guns, now its immigration.

In Cornyns defense, he is massively stupid.

But Barr? Hes a smart man. And yet he picked up nothing from the Shock-the-World 2016 election of Donald Trump -- except tax cuts and a strong military?

Referring to the monumental arrogance of the Bourbon kings, blithely assuming they could revert to the very behavior that had led to the explosion of the French Revolution in the first place, Charles-Maurice de Talleyrand is supposed to have said, They have learned nothing, and forgotten nothing.

The French nobilitys got nothing on the Republican Party.

See the original post:
Ann Coulter: They've learned nothing and forgotten nothing - Today's News-Herald

Read More..

The Silver Lining of the January 6 Hearings – Newnan Times-Herald

Marc Hyden is a weekly columnist. You can follow him on Twitter at @marc_hyden.

The work of the Committee to Investigate the January 6th Attack on the United States Capitol is well underway. While it is unclear whatif anythingwill come from these hearings, sad revelations continue to emerge.

The committee members have laid bare an episode that was wholly vile and disgraceful, but what I find so striking from the hearings are the harrowing stories of several Republican lawmakers who took principled stands to safeguard the legitimacy of our elections and protect the cornerstone of our republic. In doing so, they risked life, limb and their careers as they countered various purported machinations.

Throughout the extended hearings, the committee has leveled many accusations, including that former President Donald J. Trump and/or his supporters exploredand in some cases began to initiateschemes that were intended to nullify President Joe Bidens victory.

These ploys allegedly ranged from casting doubt on the election, asking state officials to work to overturn the results and requesting policymakers to undermine the Electoral College. Committee member Rep. Adam Schiff (D-Calif.) has expressed concerns that these activities have exposed vulnerabilities in our republican form of government, and the big lie that the election was stolen led activists to storm the U.S. Capitol on January 6.

Violence erupted, police were overwhelmed, and for a short time, the protesters seized and defiled part of the Capitol buildinga sacrosanct structure representing the promise and hope of America, I wrote in early 2021. Despite the rioters egregious behavior and the events that led up to their siege, the January 6 committee has actually given me hope.

Just days ago, the committee members heard accounts from Georgia Secretary of State Brad Raffensperger (R-Ga.), Arizona House of Representatives Speaker Rusty Bowers (R-25) and other Republicans. During a long line of questioning, both Raffensperger and Bowers revealed what sounded like a pressure campaign to persuade them to reverse the presidential elections results.

In a recorded conversation, Trump explained to Raffensperger I need 11,000 votes, give me a break and made unsubstantiated claims of fraud. Despite this and the death threats against the Secretary of States office, Raffensperger refused to bow to the ex-presidents will and commit an illegal act, which would have been tantamount to subverting a legally run election. The numbers dont lie, Raffensperger said. At the end of the day, President Trump came up short.

Similarly, Bowers testified about efforts to coax him into supporting a plan to put forward illegitimate pro-Trump electors, instead of the Biden electors, which would have influenced the outcome of the final Electoral College count. I told [Rudy Giuliani and Trump] I did not want to be used as a pawn, Bowers asserted. He explained that his faith and oath of office prevented him from acquiescing to what would have amounted to an illegal scheme. These were not the only Republican state officials who have revealed similar experiences. Lawmakers from Michigan and Pennsylvania also recounted efforts aimed to unfairly sway the election.

These dont appear to be the limit of such attempts either. An aide to a U.S. senator attempted to arrange a handoff of false, pro-Trump electors from the senator to Mike Pence just minutes before the then-vice president began to count electoral votes on Jan. 6, 2021, writes Politico. As we all know, Pence would have nothing to do with subverting the election even though he was facing intense pressure. Dont forget that January 6 protesters chanted hang Mike Pence.

While Republicans who opposed efforts to illegitimate the election deserve immense credit, I would be remiss if I didnt mention the Democratic officialsat the state and federal levelwho stood with them, and thankfully they did. So long as principled individuals who respect the Constitution hold positions of power, America can reasonably hope for a bright future in which fair elections and the peaceful transfer of power continue to be defining characteristics of the United States.

Even so, there are some who still believe that the election was fraudulent, which flies in the face of all available data. Numerous audits and elections lawsuits have all failed to prove that the election was stolen from Trump. Even Dinesh DSouzas recent documentary 2000 Mules, which purports to show 2000 people dropping off multiple absentee ballots in drop boxes in five battleground states, falls well short of its billing as the smoking gun proving widespread fraud.

While there are ample problems with DSouzas film, the most glaring is that In all five battleground states D'Souza considers, it is perfectly legal for third parties to drop off ballots for others, writes former Trump supporter Ann Coulter.

Rather than continuing to proliferate conspiracy theories, Americans should move on and celebrate the individualsRepublican and Democratwho upheld the rule of law.

Marc Hyden is a weekly columnist. You can follow him on Twitter at @marc_hyden.

Original post:
The Silver Lining of the January 6 Hearings - Newnan Times-Herald

Read More..

Cockroach Labs: The killer factor in the dead heat cloud zone – ComputerWeekly.com

People dont like the poor cockroach.

Although theyre widely despised, generally spurned and definitely a very unpleasant addition to a bathroom, shower, bed or couch once youre on vacation somewhere tropical, the cockroach does have some redeeming qualities.

The cockroach is known for its ability to populate and colonise, be tough and resilient and for its ability to use the resources around it and flourish even if those resources are the rim of a toilet seat.

As noted in this blog discussion, this is some of the thinking behind why Cockroach Labs is called Cockroach Labs i.e. its about an ability to be tough and functional.

The latest chirps from Cockroach Labs (Ed do cockroaches chirrup and chirp?) is the 2022 Cloud Report from Cockroach Labs, published on June 14th 2022, which aims to evaluate the performance of AWS, Microsoft Azure and Google Cloud Platform for common OLTP (OnLine Transaction Processing) workloads.

Researchers at Cockroach Labs ran benchmarks on 56 different instance types and 107 discrete configurations to find that all three providers offered price-competitive offerings.

Looking at the performance of the top cloud providers, AWS, Azure and Google Cloud were in a statistical dead heat when it comes to price and performance. All three providers had at least one instance type and storage combination in the $0.04-$0.05 reserved $/TPM range.

McClellan: More is more, weve scoped out a bigger field for the users.

Additionally, for the first time, AMDs Milan processors outperformed Intel.

In past years, Cockroach Labs saw Intel lead the pack in overall performance with AMD competing on price-for-performance metrics. Now in its fourth year, both the overall performance leader and the price-for-performance leader were AMD-based instances.

According to Cockroach Labs, it expanded and improved its OLTP benchmarking this year, running more than 3,000 different OLTP iterations leveraging CockroachDB and adjusted its testing methodology to narrow the variation of results across runs.

In this report, we aim to provide an unbiased picture of the performance users are paying for when they provision a specific configuration in one of the clouds, said Keith McClellan, lead author on the report and director of partner solutions engineering at Cockroach Labs. If I had to describe the report in a sentence I would say, more is more. This year we tested more instance types, node sizes and 3X as many runs as last year. Altogether, it adds up to more depth.

Among its suggested findings, Cockroach Labs thinks that the hidden costs of storage and data transfer can have a larger impact on total cost than the price of the instances themselves.

It cautions users that the cost of running a workload is much more influenced by the cost of storage and networking than the cost of an instance, especially for consistent workloads.

If there is one point to take away from this years report, especially if I were a CIO or CTO building a globally distributed application concerned about cost when picking a cloud provider(s), I would focus on the network transfer cost where I was planning to operate. Our findings really shine a light on each clouds total cost to operate, said McClellan.

All said and done then, the one bug that we all seek to kill when were on holiday in Greece or Spain (other holiday destinations are available) is actually perceptive enough here to uncover what may perhaps be the killer factor in cloud instance operations right now.

Continued here:
Cockroach Labs: The killer factor in the dead heat cloud zone - ComputerWeekly.com

Read More..

Permiso aims to help customers build a new identity-based security model for the cloud – SC Media

Permiso, a start-up that focuses on cloud identity detection and response for cloud infrastructures, announced earlier this week that it has launched P0 Labs.

The P0 Labs name refers to the companys priority zero mission of detecting and responding to the latest cloud infrastructure attacks for its customers.

SC Media caught up with Paul Nguyen, the companys co-founder and co-CEO and Ian Ahl, vice president and head of P0 Labs, to talk about the companys unique identity-based approach to cloud security, and its plans to expand integrations and help customers adapt as nation-state actors start migrating to the cloud.

Let's begin by providing some background on the company and the story of how you started?

Nguyen: Permiso was started by Jason Martin and I three years ago when we were both executives at FireEye. We decided that cloud security was going to be the next frontier, very similar to the way we saw data centers evolve 20 years ago. We tried to buy a couple of cloud security companies and it gave us some insight into the market. FireEye wanted to look at detection and response as that next evolution for cloud security. Unfortunately, we werent able to execute on that strategy, so Jason and I left to do it on our own. We saw a huge opportunity for detection and response in the cloud security market which is still very much in its infancy. So were excited to do something thats completely white space, never been done before.

Is Permiso mainly a red team pen testing company? Or with your emphasis on detection and response are you taking the purple team approach?

Ahl: We are a cloud detection and response company and have some services built around that. I built the P0 Labs team with incident responders and pen testers for that purple team purpose of insinuating attacks on the red team side and having those responders watch whats going on. Our goal is to find bad guys. We take our knowledge to the front lines and bring it in there, but we also use the purple team approach to create the bad activity first so we can take that knowledge and codify it into our product. So a lot of times what well do is create malicious activity first, monitor what we are doing with the malicious activity, and then write detections associated with the malicious activity.

Whats different about the threat landscape in the cloud that requires a new approach from what the security industry has done in the past?

Ahl: The attackers want to move to the cloud for the same reason everyone else does: speed, scale, and impact. And thats the biggest differential from a capability standpoint. They know they can have a larger impact going to the cloud. Right now, we are at the phase where its mostly commodity attackers, ransomware and bitcoin mining, but now we are seeing advanced attackers starting to come into the cloud space. They have for years, but its just in larger numbers now. For example, APT29 is a group I worked on when I was at Mandiant. Those were the perpetrators of the SolarWinds incident. These are Russian nation-state threat actors, really top-tier when it comes to the groups that are tracked out there. And we know they are shifting now as well. They are getting into the vendor supply chain and are targeting cloud providers and targeting security vendors in the cloud so they can leverage that access to get into other environments.

So what are you doing to counteract this growing threat?

Nguyen: We are using identity as that main mechanism for us to detect evil. One of the main vectors were seeing is compromised credentials or exposed secrets: attackers gaining access via an initial set of credentials they compromise and can then follow that trail, and as they pivot they create other users and run other impact events.

The identity approach is very novel. Traditional approaches have been focused on networks, hosts, and IP addresses, which was a data center construct. In cloud, the cloud service providers are not exposing the network and hosts, they are providing services. The way you instrument those services is via APIs using credential. You hear about S3 buckets, which is data storage. And EC2, which is compute. How do you spin up more S3 or EC2? You have to have valid credentials to execute. Its not about a network or host. Its calling APIs using valid credential to spin up and spin down infrastructure, which is the power of the cloud.

Even if you look at traditional security products, its always about assets and hosts and networks: endpoint detection, network detection, email. In cloud, its completely different, its services. So how do you instrument services to build apps? People have a hard time when they switch to cloud in thinking about the security model in cloud. Our very first angel investor was Jason Chan, who used to be the vice president of information security at Netflix. Chan and his team at Netflix were on a very mature end of cloud and they gave us some of the initial constructs that we thought about in terms of what capabilities the mass security market would need as they start out with security in the cloud just getting in to cloud and finally getting where Netflix has evolved. We deconstructed what Jason Chan had done and said we can bring these capabilities down to where the customers are today.

How will P0 Labs make this happen?

Ahl:There are a lot of products, normal SIEMs that can take an event and let you know when something bad happens. What we do is group things around identity and credentials and pull all those events around attacker techniques and build rules around a session. A session is a grouping of events based on identity and credentials in a period of time. If I went into AWS and clicked create bucket and delete bucket and then attempted to spin up EC2 instances that would create hundreds of events to make that happen. A normal cloud SIEM would look event-by-event. We group that activity into one session. For example the system lets me know any time an identity attempts to escalate privileges within this type of resource. This allows us to describe complex logic because we group it all together.

Nguyen: Have you seen the Avengers movies? Theres the concept of the multiverse: parallel existences of same the person, but they are on different timelines. I may have 10 credentials in a cloud environment. So thats 10 different timelines and 10 different sessions I have to track independently of one another. Timeline 1 is malicious, timelines 2 and 3 are fine. When we see attackers, they are hopping across timelines and credentials. What we do is follow their trail and we havent seen anyone be able to do that multiverse tracking across sessions.

Permiso made news in January with its $10 million seed funding round. Given a looming recession, what's a realistic timeframe for future funding rounds and meeting your objectives for the future?

Nguyen: We arent thinking about fundraising right now, but we will be raising a round in the next 6-18 months based upon market demands. Were mainly focused on how to find evil in these new frontiers of cloud infrastructure. Today, theres not a lot of tooling to find the bad guys. I think we are a few months ahead of the market. We plan to extend our integrations. We formed a partnership with HashiCorp. to integrate with its vault. Were also looking to work with identity providers such as Okta, Ping, SailPoint, and Azure AD, thats a big part of our story. We also have customers requesting integrations into their CI/CD DevOps pipelines. Our heritage is former FireEye, former Mandiant. We know what evil looks like and Ian and his team know how to respond to evil. Ian has been responsible for tracking these threat actor groups. So our focus is staying ahead of the adversary. Get the best intel to understand where they are going, then build protections for our customers. An attacker can sit in an environment for a long time. We want to shorten that as much as possible.

Read the original here:
Permiso aims to help customers build a new identity-based security model for the cloud - SC Media

Read More..

Demystifying the Role of the Cloud in Platform-Based Association Management – Associations Now

By Chris Shults, Senior Marketing Manager, Fonteva + Protech

The term cloud computing was first coined at an industry conference in August 2006 by Googles then-CEO, Eric Schmidt. Now, more than 15 years later, the cloud is a highly recognizable tech concept, but the details surrounding it types, features, benefits remain foggy for many.

At the most basic level, cloud computing empowers users to remotely access system resources, like databases and software, that are stored on the internet rather than a users hard drive. As a result, multiple users can leverage these resources on-demand from anywhere on any device with an internet connection.

You may be familiar with cloud service models like Google Workspace, Dropbox, Microsoft Dynamics 365, and Salesforce, which are delivered over the internet, freeing users from software installation and maintenance. This software distribution technique is known as software as a service (SaaS).

But not all clouds are created equal. When investing in association management software, leaders should be aware of the difference between true cloud solutions and their fake counterparts.

Its easy to assume that legacy software products installed on an on-premises file server or in a local data center are cloud-based; the same goes for software accessed via a remote desktop connection. In reality, these fake cloud products are merely cloud-hosted and lack the benefits of software that resides only in the cloud.

Making sure that your systems are based on a true cloud platform is a business concept, not just an IT argument, said Dirk Behrends, Vice President, Association Solutions, Fonteva & Protech. If you dont, youre not positioning your association to be able to survive and fulfill its mission.

Fake cloud systems operate through a single tenancy model in which proprietary association management software is hosted in a single physical location. With this model, the associations often-strained (or nonexistent) IT staff is responsible for managing installations, security, and upgrades on every instance of the software.

According to AssociationPlatforms.com, single-tenant modes of operation often mean software upgrades take weeks or months, requiring significant downtime. In addition, this fake cloud approach is typically less efficient and therefore more expensive.

Heres the example that I always use: I used to work with a 100% browser-based system, said Dirk Behrends, Vice President, Association Solutions, Fonteva & Protech. It was in the cloud, but it was hosted through a managed hosting service and all proprietary. So you had to build out duplicate checking; you had to build out the integrations between Outlook and your system. Those types of inconveniences disappear with true cloud, platform-based solutions because the platform provider provides everything for you.

True cloud association management systems also known as platform-based solutions are ideal for associations because they provide subscription-based access to robust applications without the need for expensive infrastructure investments.

Unlike proprietary association management software systems, true cloud, platform-based solutions are purpose-built to function in a secure, multi-tenant architecture, said Jake Fabbri, Chief Marketing Officer at Togetherwork.

Multitenancy, defined by Gartner as the mode of operation of software where multiple independent instances of one or multiple applications operate in a shared environment, offers many advantages. Platform modules and applications, for example, integrate seamlessly within multitenant architecture, better harnessing the ecosystems potential and boosting cost-effectiveness.

True cloud, multi-tenant environments also eliminate the need for high-maintenance, on-site servers while providing adaptability and scalability. Highly adaptable, scalable systems allow associations to quickly adjust to changing member demands meaning theyre less susceptible to outages, even when faced with a sudden influx of users.

This flexibility is perfect for organizations that are growing fast and adapting to changing member expectations, Fabbri said.

Another benefit: The significant monitoring and administration burdens inherent in fake cloud, single-tenant environments are essentially eliminated with true cloud solutions. Instead, data is secured with updates and patches in real-time, helping protect your association from cybercriminals.

True cloud platform solutions help associations manage operations effectively because they leverage the considerable innovation investments made by industry-leading companies like Salesforce and Microsoft.

Protech, built on Microsoft, and Fonteva, powered by Salesforce, have the ability to take advantage of world-class research and development dollars around CRMs, platforms, security, and cloud hosting, Behrends said.

Microsoft, for instance, invested nearly $21 billion in research and development for the 2021 fiscal year, which ended June 30, 2021. Salesforce has an equally impressive engineering focus, particularly when it comes to true cloud investments.

Theyre focusing on how to bring the functionality by connecting your CMS with their front-end tools, said Fontevas Senior Technical Product Manager Shannon Zdanowicz, who has specialized in CRM software for more than 30 years. All this functionality is built by thousands of engineers, and you get to take advantage of that ecosystem with the click of a button, as opposed to writing code or hiring somebody new.

Unsure whether your current association technology can keep up with todays rapidly evolving cloud technology? This quiz at AssociationPlatforms.com identifies gaps between your existing technology and modern association platforms. Be sure to stay awhile to soak in all the site has to offer.

In early 2021, Togetherwork acquired Fonteva, a platform solution built on the robust capabilities of Salesforce. Toward the end of 2021, Togetherwork acquired Protech, an association platform solution built on Microsoft Dynamics 365. Through AssociationPlatforms.com, Fonteva and Protech educate the industry on technology that empowers associations to deliver a modern member experience.

(Handout photo)

Read more:
Demystifying the Role of the Cloud in Platform-Based Association Management - Associations Now

Read More..

The iPhone will be the future of proving our identity, online and offline – 9to5Mac

Weve seen some baby steps towards using our iPhone for proving our identity. But a couple of recent developments point to a future in which an iPhone plus biometrics could let us use our phone as a single means of verifying our identity, both online and in face-to-face interactions.

In all, Apple provides support for four initiatives which I think provide a clear pointer to a future in which the iPhone will be our one-stop device for ID

Apple currently offers support for four separate initiatives:

Each of these form some early stepping stones to what will eventually be a world in which our iPhone will be the primary way in which we prove our identity, both online and offline.

Back in June of last year, Apple announced its plans to allow state ID documents like driving licences in the Wallet app.

To be fully free of your physical wallet, theres one more thing we need to bring to iPhone. And thats your ID. So were bringing identity cards to Apple Wallet. This fall, youll just scan your drivers license or state ID in participating US states. Its that easy. Your ID information is now in Wallet. Encrypted and stored in the Secure Element, the same hardware element technology that makes Apple Pay private and secure.

The company said that the Transportation Security Administration (TSA) would be climbing aboard, allowing iPhone owners to present digital versions of their driving licences as proof of ID for airline travel.

The TSA is working to enable airport security checkpoints as the first place you can use your digital ID.

That didnt happen in the fall of 2021 as scheduled, and when it did finally happen, it was just dipping a toe in the water. As the mDL (mobile driving licence) tracker shows, the system hasnt yet been officially implemented anywhere in the US as yet, and there are just a handful of trials at a tiny number of airports.

The wheels of government grind exceedingly slowly, so the point at which we can flash our iPhone at a TSA checkpoint or traffic cop are some way off yet, but some 30 states have announced that they are at least exploring the idea.

Partnering with Blackboard lets college students store their ID card in the Wallet app, which can then be used for everything from entering campus facilities to paying their laundry bills.

Students who load their IDs into Apple Wallet on iPhone/Apple Watch will be able to have secure access to campus facilities, residence halls, and more in addition to using the digital card for payments at vending machines, dining halls, laundry, and even off-campus retail locations that accept student IDs as payment.

Back in 2020, Apple joined the Fido Alliance, a tech working group dedicated to eliminating passwords. Weve previously explained how FiDO (Fast IDentity Online) works.

Currently, to log in to a website or app, we usually enter a username and a password. What FIDO does is instead allow our device to authenticate us. The logic is this (using an iPhone with Face ID as an example):

At no point is there a password involved: Authentication is performed on your device, not on the website server. The web server trusts your iPhone to authenticate you in exactly the same way that payment terminals trust your phone for Apple Pay transactions.

Apple branded its implementation of FiDO as Passkeys in the Cloud. After a halfway house in iOS 15, the iPhone maker has fully implemented this in iOS 16 and macOS 13.

Of course, it also requires online services to support the login method, and this will again take time.

iOS 16 allows allows us to bypass Captchas in apps and on the web.

A new feature called Private Access Tokens will use a combination of details about your device and your Apple ID to inform a website that you are a legitimate user rather than a robot. In turn, this allows you to completely bypass the CAPTCHA step.

This might seem like an odd thing to mention in this context, as it doesnt actually verify our identity, but it operates on the same principle it carries out a form of user validation, and the authentication needed for this happening entirely on our device.

Again, this requires apps and websites to sign-up, so rollout will take some time, but its an easy way to improve the user experience while reducing friction (points at which people might give up), so Id again expect adoption to be reasonably brisk.

Long-term, Id expect the principles involved here to become the standard way we prove our identity, both online and offline. This is because its safer for all involved individuals, companies, and governments.

Its safer for us both online and offline.

Online data breaches are ridiculously common. Companies keep making ridiculous mistakes like storing customer databases on cloud servers without any protection, or messing up permissions to anyone with access to their network can download customer records. With FiDO, there is no database to hack

Offline, only the necessary personal data is revealed, and that is done in encrypted form. When you show your mobile driving license at a TSA checkpoint, they only receive the actual data they need, not all the data stored on/in your license. Its very much equivalent to Apple Pay, where the payment terminal doesnt get all of the information on your credit card, and relies on your iPhone confirming that it has verified your identity with Face ID or Touch ID.

One of the biggest headaches for businesses is keeping customer data safe from hackers. The financial and reputational cost of a security breach can be extremely costly. With FiDO, no user credentials are stored on the server as the authentication happens entirely on our devices. (Of course, they still have to keep other customer data safe, but removing the need for login credentials is a big win.)

Paper documents can be convincingly forged, despite watermarks and the like, which is why really important ones like passports also rely on electronic security in the form of an embedded RFID chip. Moving all identity documents to electronic versions, with biometric protection, is a huge step forward in security.

I mentioned above that companies will still have to store some customer data, like addresses. But what if they didnt have to? What if you place an online order, and your iPhone or Mac sends an encrypted code which can only be decoded by courier companies?

What if your doctor didnt phone you with test results, but instead sent you a link to a file which can only be read by a device which uses biometric authentication to prove your identity?

What if you didnt have to show your credit card or ID when collecting concert tickets, but your iPhone verified your identity without revealing any of your data?

It doesnt take much imagination to see the massive potential for on-device authentication to be used in any situation in which we need to prove our identity, whether online or offline.

To me, on-device authentication is the future of ID checks, even eventually passports and visas. Personally, I cant wait. What about you? Please take our poll, and share your thoughts in the comments.

FTC: We use income earning auto affiliate links. More.

Check out 9to5Mac on YouTube for more Apple news:

Original post:
The iPhone will be the future of proving our identity, online and offline - 9to5Mac

Read More..