Page 2,264«..1020..2,2632,2642,2652,266..2,2702,280..»

Chinese Experts Uncover Details of Equation Group’s Bvp47 Covert Hacking Tool – The Hacker News

Researchers from China's Pangu Lab have disclosed details of a "top-tier" backdoor put to use by the Equation Group, an advanced persistent threat (APT) with alleged ties to the cyber-warfare intelligence-gathering unit of the U.S. National Security Agency (NSA).

Dubbed "Bvp47" owing to numerous references to the string "Bvp" and the numerical value "0x47" used in the encryption algorithm, the backdoor was extracted from Linux systems "during an in-depth forensic investigation of a host in a key domestic department" in 2013.

Pangu Lab codenamed the attacks involving the deployment of Bvp47 "Operation Telescreen," with the implant featuring an "advanced covert channel behavior based on TCP SYN packets, code obfuscation, system hiding, and self-destruction design."

Equation Group, dubbed the "crown creator of cyber espionage" by Russian security firm Kaspersky, is the name assigned to a sophisticated adversary that's been active since at least 2001 and has used previously undisclosed zero-day exploits to "infect victims, retrieve data and hide activity in an outstandingly professional way," some of which were later incorporated into Stuxnet.

The attacks have targeted a variety of sectors in no less than 42 countries, including governments, telecom, aerospace, energy, nuclear research, oil and gas, military, nanotechnology, Islamic activists and scholars, media, transportation, financial institutions, and companies developing encryption technologies.

The group is believed to be linked to the NSA's Tailored Access Operations (TAO) unit, while intrusion activities pertaining to a second collective dubbed Longhorn (aka The Lamberts) have been attributed to the U.S. Central Intelligence Agency (CIA).

Equation Group's malware toolset became public knowledge in 2016 when a group calling itself the Shadow Brokers leaked the entire tranche of exploits used by the elite hacking team, with Kaspersky uncovering code-level similarities between the stolen files and that of samples identified as used by the threat actor.

The incident analyzed by Pangu Lab comprises two internally compromised servers, an email and an enterprise server named V1 and V2 respectively, and an external domain (dubbed A), sporting a novel two-way communication mechanism to exfiltrate sensitive data from the systems.

"There is abnormal communication between external host A and the V1 server," the researchers said. "Specifically, A first sends a SYN packet with a 264-byte payload to port 80 of the V1 server, and then the V1 server immediately initiates an external connection to the high-end port of the A machine and maintains a large amount of exchange data."

Simultaneously, V1 connects to V2 via the SMB service to perform a number of operations, including logging in to the latter with an administrator account, trying to open terminal services, enumerating directories, and executing PowerShell scripts through scheduled tasks.

V2, for its part, also connects to V1 to retrieve a PowerShell script and an encrypted second-stage payload, the encrypted execution results of which are sent back to V1, which, according to the researchers, "acts as a data transfer between the A machine and the V2 server."

The Bvp47 backdoor installed on the servers consists of two parts, a loader which is responsible for decoding and loading the actual payload into memory. "Bvp47 generally lives in the Linux operating system in the demilitarized zone that communicates with the Internet," the researchers said. "It mainly assumes the core control bridge communication role in the overall attack."

Pangu Lab's attribution to Equation Group stems from overlaps with exploits contained in a GPG-encrypted archive file published by the Shadow Brokers "eqgrp-auction-file.tar.xz.gpg" as part of a failed auction of the cyber weapons in August 2016.

"In the process of analyzing the 'eqgrp-auction-file.tar.xz.gpg' file, it was found that Bvp47 and the attacking tools in the compressed package were technically deterministic, mainly including 'dewdrops,' 'suctionchar_agents,' 'tipoffs,' 'StoicSurgeon,' 'incision' and other directories," the researchers explained.

"The 'tipoffs' directory contains the RSA asymmetric algorithm private key used in the Bvp47 covert channel [for] command execution and other operations. On this basis, it can be confirmed that Bvp47 is from [the] Equation group."

The findings mark the second time hitherto undocumented malware developed by the Equation Group has come to light in as many months. In late December 2021, Check Point Research disclosed details of a diagnostic utility called "DoubleFeature" that's used in conjunction with the DanderSpritz malware framework.

"Judging from the attack tools related to the organization, including Bvp47, Equation group is indeed a first-class hacking group," the researchers concluded.

"The tool is well-designed, powerful, and widely adapted. Its network attack capability equipped by 0day vulnerabilities was unstoppable, and its data acquisition under covert control was with little effort. The Equation Group is in a dominant position in national-level cyberspace confrontation."

Read the original post:
Chinese Experts Uncover Details of Equation Group's Bvp47 Covert Hacking Tool - The Hacker News

Read More..

Incredible Growth for Hardware-based Full Disk Encryption Market 2022 is Expected to Register Massive CAGR by 2028 Materials Handling – Materials…

This comprehensive Report of Hardware-based Full Disk Encryption Market provides real information about the statistics and state of the global and regional market. Its scope study extends from the market situation to comparative pricing between the main players, spending in specific market areas, and profits. It represents a comprehensive and succinct analysis report of the main competitor and price statistics with a view to helping beginners establish their place and survive in the market. In addition, it also focuses on the market overview for the coming period from 2022 to 2028. This proved to be a great help for entrepreneurs. This detailed market research is heavily based on information received during interviews with key leaders, research, and innovative resources.

Download Sample Copy with TOC, Graphs & List of Figures @https://www.stratagemmarketinsights.com/sample/86871

In addition to the information presented in this report on the Hardware-based Full Disk Encryption Market market, it includes financial losses incurred as a result of COVID-19. It also explains how the most important business sectors in the market are coping with the epidemic and how to get out of it. This market report is a way to present accurate information on company profiles and competitiveness analyses in an orderly manner. It anticipates competition in the market for the planned period from 2022 to 2028. This Hardware-based Full Disk Encryption Market market study also looks at industry channels and performance rates to help key players stay ahead of the competition.

Introduction

The report highlights the latest trends in revenue and market progress, and all realistic statistics on ventures. It provides prevention and pre-planned management and highlights a summary of the global Hardware-based Full Disk Encryption Market market, along with classification, definition, and market chain structure. The Global Report highlights issues affecting the global Hardware-based Full Disk Encryption Market market, including gross margin, cost, market share, capacity utilization, income, capacity, and supply. It also highlights the future scope of the global Hardware-based Full Disk Encryption Market market during the upcoming period.

Marketing Statistics

The Global Hardware-based Full Disk Encryption Market Market Report estimates upfront data and statistics that make the report a very valuable guide for individuals dealing with advertising, advisors, and industry decision-making processes in the global Hardware-based Full Disk Encryption Market market. Provides regional analysis for the market. This report provides essential data from the Hardware-based Full Disk Encryption Market industry to guide new entrants in the global Hardware-based Full Disk Encryption Market market.

Dont miss out on business opportunities in Hardware-based Full Disk Encryption Market Market. Speak to our analyst and gain crucial industry insights that will help your business grow @https://www.stratagemmarketinsights.com/speakanalyst/86871

Market Dynamics

The global report shows details related to the most dominant players in the global Hardware-based Full Disk Encryption Market market, along with contact details, sales, and accurate figures of the worldwide market. Various data and detailed analyses collected from various trusted institutions of the global Hardware-based Full Disk Encryption Market market are presented in the Global Hardware-based Full Disk Encryption Market Research Report.

The major players covered in Hardware-based Full Disk Encryption Market Market:

Ethicon Endo-Surgery, Olympus, Medtronic(Covidien ), Stryker, Smith & Nephew, Karl Storz, Boston Scientific, Richard Wolf, Aesculap(B. Braun), Intuitive Surgical, Apollo Endosurgery (Allergan), Tiansong, Medical Optical, Shenda, Shikonghou, HAWK, xinxing

The Regional analysis covers:

North America (U.S. and Canada)Latin America (Mexico, Brazil, Peru, Chile, and others)Western Europe (Germany, U.K., France, Spain, Italy, Nordic countries, Belgium, Netherlands, and Luxembourg)Eastern Europe (Poland and Russia)Asia Pacific (China, India, Japan, ASEAN, Australia, and New Zealand) The Middle East and Africa (GCC, Southern Africa, and North Africa)

The study accurately predicts the size and volume of the market in the present and future. The report offers a comprehensive study of the Hardware-based Full Disk Encryption Market industry and information on foreseeable future trends that will have a significant impact on the development of the market. The weekly then looks at the key global players in the industry.

Market Segmentation of Hardware-based Full Disk Encryption Market:

Hardware-based Full Disk Encryption Market market is divided by type and application. For the period 2022-2028, cross-segment growth provides accurate calculations and forecasts of sales by Type and Application in terms of volume and value. This analysis can help you grow your business by targeting qualified niche markets.

Industry analysis can be an effective tool to help an organization devise strategies and policies for a business. Stratagem Market Insights investigates gaps in the existing market space and aligns clients outlook of the market by providing advanced data, research, and analytics. These research outcomes may offer valuable insights to our clients, thereby aiding them to project long-term and short-term future industry trends, consumer needs, cutting overall cost, etc. Stratagem Market Insights has skilled research analysts that leverage their knowledge perfected with years of expertise and that adopt advanced analytical tools to offer an unbiased competitive research analysis to assist our invaluable clients to align their strategies with their long-term growth targets.

WHY CHOOSE STRATAGEM MARKET INSIGHTS INDUSTRY ANALYSIS SERVICE?

Buy-Now this Premium Reporthttps://www.stratagemmarketinsights.com/cart/86871

This Hardware-based Full Disk Encryption Market reportsmarket status and outlook of global and major regions, from angles of players, countries, product types, and end industries; this report analyzes the top players in the global industry and splits by product type and applications/end industries. This report also includes the impact of COVID-19 on the Hardware-based Full Disk Encryption Market industry. Global Hardware-based Full Disk Encryption Market Industry 2022 Market Research Report is spread across120+ pagesand provides exclusive vital statistics, data, information, market trends, and competitive landscape details in this niche sector.

Contact Us:

Mr. ShahStratagem Market InsightsTel: US +1 415 871 0703 / JAPAN +81-50-5539-1737Email:[emailprotected]

AJ

Link:
Incredible Growth for Hardware-based Full Disk Encryption Market 2022 is Expected to Register Massive CAGR by 2028 Materials Handling - Materials...

Read More..

Sunway University: One Academia for All Things Data Science, Analytics and Beyond – Analytics Insight

Sunway University is Malaysias leading, not-for-profit private university that is dedicated to quality education. With a research-focused aspect on key global problems under the umbrella of Planetary Health and the Sustainable Development Goals, the university supports innovation and entrepreneurship.

Sunway University is based in Sunway City, a thriving green resort and digital smart city that is built on reclaimed former tin-mining land on the western side of Kuala Lumpur in the heart of the Klang Valley. The University was established in 2011 and is relatively young by the global standards, but is already ranked within the top 2% of universities in the world (QS World University Rankings), in the top 1.5% of universities in Asia, as well as in the top 150 universities in the world under 50 years old. Sunway University has a 5-star excellent rating by the Malaysian government (in the latest Setara assessment exercise) and is one of just eleven universities in Malaysia to be awarded the special Premier Digital Technology University status. It has developed a close collaboration with many leading international universities including Harvard University and the Universities of Oxford and Cambridge. These are named after the founder of Sunway City and of the University, Tan Sri Jeffrey Cheah, who is also the Chairman of Sunway Group, one of Malaysias leading industrial conglomerates and the developer of Sunway City. The university also has a very close relationship with Lancaster University in the UK, enabling students on many programmes and qualifying them for Lancaster degrees.

Sunway Universitys vision is to be a World Class University and its mission is to nurture all-around individuals and devote them towards the discovery, advancement, transmission and application of knowledge that meet the needs of the society and the global community. Sunway University will carry out its mission with integrity and unwavering dedication to excellence, enterprise, professionalism, financial self-reliance, innovation, mutual respect and team spirit.

Ts Dr Angela Lee Siew Hoong is an Associate Professor at Sunway University. She introduced, developed, and is currently teaching Analytics and Data Science programmes at Sunway University. Angela has been developing a data science curriculum since 2009. She prepares her students to enter the analytics workforce by staying up to date with the industry needs and considers herself an advocate of data science. Angela is the key person to introduce the Analytics and Data Science degree at Sunway University. She was recognized by the SAS Institute as the 2021s Distinguished Analytics Educator of the Year and regularly speaks at data science and analytics conferences. Angela has developed many innovative ways to use analytics and data science tools from the most elementary level to advanced analytics. She teaches Social Media Analytics, Visual Analytics, Advanced Analytics and Business Intelligence and has authored many published articles in the area of churn analytics, sentiment analysis and predictive analytics.

Angela says that the development of the analytics curriculum at Sunway University started off in 2009 by embedding four analytics subjects into the universitys existing Information Systems degree programme. In 2016, the University launched its full fledge and of its kind Analytics degree programme to become the first and only private university in Malaysia to have this full-fledged analytics undergrad degree. In this programme, Sunway University has 11 subjects related to analytics. She adds that the Universitys teachings and the curriculum were built along with the concept of making sure that their students know how to leverage data and how to generate actionable outcomes for future tech companies. They need to identify areas in the company where data science expertise might be put to good use. The ultimate outcome of this programme is to allow the student to learn about the many data science algorithms that are utilised to produce outcomes.

Angela claims that Sunway University Analytics and Data Science programme offers the students the diversity of applying analytics to many different industries. The programme is designed in such a way that it allows the learners to apply their analytics knowledge to solve multiple different industries with real-world problems. The curriculum is up to date with the latest technology and tools that are being taught in the programme to close off the gaps between the needs of industry and the graduates skills. She highlights that the University has embedded SAS, Alibaba, and AWS syllabus into the programme to empower students with the competencies and capacity to contribute back to the fast-changing economic, social and technological world. Sunway University prepares graduates to be career-ready to lead a productive, fulfilling and meaningful life with integrity and, by being ethical, accountable, resilient, caring and responsible members of the society. Angela reveals that at Sunway University, a multidisciplinary approach has been adopted with regard to data science. Its students are taught to be flexible and creative and they are genuinely immersed in data science. So at its core, one will find that its comparable across all industries and it is believed that one of the reasons the university has been able to collaborate with so many firms in the region and successful in partnering with many companies to provide students with the edge in analytics and data science. Angela adds that Sunway University has a very high employability rate since the students would have already gotten their job before they even graduated from the programme.

Angela mentions that students at Sunway University Bachelor of Science (Hons) Information Systems (Data Analytics) are required to complete both an internship and a capstone project. This internship usually takes place over 3 months for the final year student. At this point in the programme, the student would have taken courses including Social Media Analytics, Data Mining, Linear Algebra, Big Data in the cloud, and Analytics Engineering and they would have learned to program with Python, SAS, R and Java and familiar with SQL and relational databases. She adds that on top of the internship programme, the capstone project also plays an important role as the analytics industry project will be tied to the student capstone project. These projects allow students to take part in solving real-world analytics problems and work closely with companies that provide them with the data. They get a chance to formulate the problems, propose the methodological process and analytics solutions to the companies. Angela claims that this programme allows the companies to temporarily extend their resources to tackle short-term projects and the students will be supervised by the Sunway University Professor and a corporate sponsor. Over the years, to name a few the sponsors of the capstone projects include Sunway Berhard, Sunway Medical Hospital, Sunway Property, Coway, DHL, BonusLink, Citibank, SAS, UOB, RHB, Carsome and Royal Commission Medical Centre, Saudi Arabia. This equips the students to manage a large-scale data science and analytics project from the moment they arrive at work.

Angela opines that by 2025, Malaysias big data analytics industry is anticipated to be valued at US$1.9 billion. Malaysia has big intentions to grow its digital economy, with initiatives like the Malaysian Digital Economy Blueprint indicating that data and digital technology would be a big part of the future. In this environment, its apparent that data science expertise will be in great demand and one that is already seeing a significant rise in both demands for personnel and prospective remuneration. Industry 4.0 is predicted to generate between 3.3 million and 6 million employment in Malaysia. As new and developing data-driven positions fuel connected employment future, data science and analysis will continue to be a primary career growth potential in this landscape, she says.

Angela highlights that the Master of Data Science and Bachelor of Science Information Systems (Data Analytics) at Sunway University is designed to develop the data scientists of tomorrow by combining great academic achievement with real-world experience to help students to grow their data abilities and open doors to new possibilities. The universitys programme also appeared in the Top 10 degree in Graduates Tracer studies, having 97% of graduates getting a job after they graduate.

Sunway University has proven to be the best in many areas and hence it has received many awards and accolades for its immense effort to exhibit excellence.

Angela says that it is not so much about the challenges that the university is facing in delivering the programme but it is more about the overall analytics ecosystem and community. Talking about the challenges that data analytics faces, she mentions that every sector of the globe, including the emergency services, health care, research and space, as well as the business sector, has seen a significant change in the way they manage and operate their activities on a daily basis as a result of data science. All of these sectors now have the ability to forecast future outcomes by making more appropriate crucial decisions and by taking more effective actions. Thanks to big data analytics. Theyre using big data analytical tools to get their users data and access their personal information, such as their interests, behavioural patterns, ideas, security details, personal interactions and so on to their advantage. Angela believes that this is the primary source of ethical concern among various leaders and experts that is concerning the scope of personal information that can be accessed, as well as their safety. Many corporations may now theoretically manage their consumers wants, needs and actions with big data analytics innovation and execution; hence this can lead to intellectual property and organisations right on their ideas and creations. While big data analytics has an immense promise, it also raises serious ethical (security and privacy) challenges that, if left unresolved, might become substantial hurdles to the realisation of projected benefits and the long-term success of big data, says Angela.

Angela believes that the big data industry will continue to grow so long so asserts that there is a dire need for data being used in companies. The global big data analytics in the education industry grew significantly with the onset of the COVID-19 pandemic.

Because governments in the majority of countries have implemented lockdowns, there has been a large increase in the acceptance of online teaching culture among students and teachers. This, in turn, has a favourable impact on the global market for big data analytics in education. Furthermore, measuring students performance, identifying students main areas and tracking the students after they graduate from college are just a few of the many important benefits of big data and business analytics in education, all of which contribute to market growth and which this will lead to more university/institute in implementing analytics curriculum to support the needs that arise due to the pandemic, concludes Angela.

See more here:

Sunway University: One Academia for All Things Data Science, Analytics and Beyond - Analytics Insight

Read More..

Bitcoin mining as a grid resource? ‘It’s complicated.’ – Utility Dive

Energy use by the Bitcoin network in the United States and globally could grow significantly in the next five years, adding many gigawatts of demand, according to some experts. With concerns increasing about utilities'carbon footprints, there is a growing push within the cryptocurrencyindustry to reimagine cryptomining systems as potential grid assets that can help balance demand and encourage renewable energy.

For those not up on cryptocurrencies,there are several, of which Bitcoin is the largest by market capitalization and energy use. "Mining" operations race to solve complex math problems, which allows them to validate new entries in a distributed ledger called a blockchain and, in turn, be rewarded with Bitcoin. The system is designed to make calculations increasingly difficult as demand for Bitcoin grows and the supply remains fixed.Solving the calculations requires growing amounts of energy consumed by large data farms.

Bitcoin mining operations now routinely participate in demand response programs, boosting their revenues by providing grid services. But critics say they are sometimes consuming fossil fuels that would otherwise go unused, and their potential as demand-side resources may be overstated.

Can Bitcoin be a grid asset? Or are the industry's claims a kind of crypto-greenwashing?

"It's complicated," said Eric Hittinger, interim chair of the Department of Public Policy at the Rochester Institute of Technology. "It's never quite clear to me where the line is between exaggeration and fabrication."

The electricity load used for crypto mining in the United States will reach almost 10,000 MW in the next five years, according to some estimates. Texas alone could see 5,000 MW of new demand by 2023, according to crypto miners in the state.

"There are going to be many, many gigawatts of additional incremental power demand in the United States" for Bitcoin on an ongoing basis, Digital Power Optimization CEO Andrew Webber said. The company offers "cryptocurrency mining as a service" and helps miners manage their energy use.

In the face of growing climate concern and potential regulation, miners say they have been consuming a cleaner mix of energy and working with utilities and grid operators to provide needed demand flexibility. The industry also touts its ability to spur the development of renewable energy, consume otherwise curtailed energy, and even help revitalize some of the country's aging hydropower assets.

At a recent congressional hearing on Bitcoin, lawmakers appeared open to blockchain innovations and their potential as a grid resource, while also raising concerns about the technology's energy consumption.

Blockchain technology has "numerous potential applications beyond cryptocurrency that will likely soon make our lives more efficient and secure," Rep. Diana DeGette, D-Colo., said at the Jan. 20 House Subcommittee on Oversight and Investigations hearing.

Bitcoin can provide grid flexibility and consume excess renewable generation, but there is often another side to the ledger involving increased electricity demand and carbon emissions, said Hittinger.

"I think crypto does provide some flexibility to electricity grids. It does introduce additional demand in, maybe, some of the right places," he said. However, "we could usually use that electricity for something that is maybe more socially valuable than mining crypto."

The widely-cited Cambridge Bitcoin Electricity Consumption Index puts annualized global Bitcoin consumption at around 125 Twh and estimated demand at 14-15 GW.Those bullish on Bitcoin say energy demand could triple or quadruple in the coming years.

"From a public policy perspective, the most relevant question should be energy production rather than energy consumption," Brian Brooks, CEO of Bitfury Group, told the congressional subcommittee Jan. 20. He said Bitcoin mining in 2021 used about 58% sustainable energy,and was sourced from a cleaner energy mix than the bulk of U.S. electricity.

Regardless of that energy mix,DeGette noted examples in upstate New York and Pennsylvania where crypto mining operations are burning fossil fuels at power plants that might otherwise be closed. "Given our current climate objectives, examples like this are deeply concerning," she said.

The Greenidge power plant in Dresden, N.Y., is an example of how older power plants are being kept online to mine cryptocurrency and the environmental issues they raise.Private equity firm Atlas Holdings bought the defunct coal plant in 2014 and converted it to burn natural gas. It now primarily powers the company's Bitcoin operation, but the plant also sends energy back to the state's grid operator.

The Greenidge generation facility has a nameplate capacity rating of 112.5 MW and in 2020 injected 231.5 GWh of energy onto the bulk electric system, according to the New York Independent System Operator's 2021 Gold Book, which compiles load and capacity data. State regulators are currently reviewing its air permits.

More groups are focused on increasing the sustainability of the energy mix used for crypto.

Energy research nonprofit RMI is developing standards and solutions that can help cryptocurrency miners to decarbonize, said Marc Johnson, a senior associate in its climate intelligence program.

Through the Crypto Climate Accord, RMI is helping to provide guidance on how miners can "more comprehensively account for the emissions associated with their activities, and then providing some ways in which they can source the appropriate mitigation tools," Johnson said. Those mitigation methods potentially include renewable energy credits or other offsets.

The accord, inspired by the Paris Climate Agreement,has the support of more than 200 companies and individuals across the cryptocurrency, finance, technology, climate and energy sectors.Participants have committed to achieving net-zero emissions related to their crypto operations by 2030.

Other countries have similarly questioned the high energy needs of crypto mining. China banned Bitcoin mining in 2021 over concern for the stability of its financial institutions, prompting operations to move to other areas with cheap power, including Texas, New York and parts of the U.S. Southeast.

Cheap renewable generation in parts of the Southwest and Midwest could also attract crypto miners, say experts.

"These mining operations are enormous. They represent the single largest electricity loads in the world today," said Gregg Dixon, CEO of demand response provider Voltus.

Voltus is working with crypto miners to provide flexibility and services to grid operators.This month it announced plans to connect a 100-MW virtual power plant into the PJM Interconnection through a partnership with cryptocurrency miner Mawson Infrastructure Group.

Crypto benefits for curtailing activities through demand response

The ability of miners to rapidly modulate their operations makes them prime candidates for demand response participation, and that flexibility is worth millions of dollars, say Bitcoin experts.

Crypto miners can start, stop or pause computing processes, which allows for the addition of more flexible loads, Soluna Computing CEO John Belizaire told lawmakers at the congressional hearing. The company develops small-footprint data centers for cryptocurrency mining, helping ensure renewable generators can find a buyer for all of their output.

"This flexible load can help increase grid resilience," Belizaire said, likening computing power to "a better battery" that can help integrate more renewables onto the grid.

"Crypto mines are very different data center beasts," said Dixon, in that they can shut down "instantly." And that flexibility can be more valuable than the cryptocurrency being mined. Providing services back to the electric grid can generate anywhere from 2% to 10% of a mines revenue, he said.

Crypto miners are generally looking to pay between $0.03 and $0.04 per kWh, and they achieve that total cost of power by seeking out low-cost electricity and providing services back to the grid, said Dixon. Crypto miners typically curtail their usage from 100 to 500 hours per year in instances when what they can make off of the grid is more than what they would make mining," he said.

But not all flexibility is the same, according to Hittinger.The cryptocurrency industry's demand response usefulness may be overstated. Crypto miners are happy to stop using energy when prices get high, he said, the same as any other factory. That's a good resource to have, but it only gets you so far.

"That helps us manage the grid when demand is really high," he said. "It doesn't help us use extra electricity when demand is low and supply is high." For that, something like an electric vehicle would be ideal: It consumes a certain amount of energy each day, but it's indifferent as to when it charges.

Crypto miners don't provide this flexibility because "if there was pretty cheap energy, they would just run 24/7," Hittinger said.

While the demand response capabilities of Bitcoin may still be debated, the cryptocurrency industry is forging ahead, and grid operators appear to be on board.

Republican Sen. Ted Cruz has touted Bitcoin's potential to help stabilize the Texas grid and said crypto could be "a way to strengthen our energy infrastructure.Crypto mining operations are helping grow the local economy and consume renewables that would otherwise be curtailed, according to the Electric Reliability Council of Texas (ERCOT), which operates most of the state's grid.

Crypto miners in West Texas "take advantage of negatively-priced electricity during times of low electric demand, and shut down when prices rise to a certain point," ERCOT said in a statement. "This supports their business, the Texas economy and uses a resource that would otherwise go unused."

"We have also seen crypto miners respond during grid events by rapidly reducing their electric use," the Texas grid operator continued. "During Winter Storm Uri, we saw them reduce their demand to zero which helped make power available to others during a grid emergency."

In practice, grid operators may not single out cryptocurrency miners as a particular segment, said Dixon, as they see the facilities as similar to any industrial resource. However, ERCOT said that as policy discussions around demand response continue, crypto "is a market segment that could play a larger role to quickly reduce demand when needed."

Along with providing demand flexibility, the crypto mining industry can help bolster the grid and develop clean energy in a variety of others ways,crypto miners say, often by taking advantage of crypto mining wherever there is cheap energy and internet access.

Crypto miners can consume energy that would otherwise be curtailed, said Bitfury's Brooks, by locating near renewable generators and providing baseload consumption for solar and wind. They can also consume natural gas that would otherwise be flared at oil drilling operations "to turn that dead-weight loss into economic value," he said.

That same locational flexibility can help with transmission losses and distribution grid efficiency, he said.

"The mobility of Bitcoin mining allows the industry to construct data centers close to the power generation source, thus reducing these losses and turning the associated power into economic value while also reducing the need for additional investments in transmission and distribution infrastructure," Brooks said.

Digital Power Optimization's Webber said his company is also looking at how cryptocurrency mining can help revitalize the United States' aging hydroelectric infrastructure.

"There's a lot of defunct and underfunded hydroelectric assets around North America and elsewhere, frankly, that maybe haven't had their maintenance ... kept up to date," he said. "There's a lot of opportunity there to repair some of America's infrastructure."

"Crypto mining can actually revitalize disused, underused, underfunded energy assets that are 100 years old," he said. "And on top of that, whatever you're not using for your Bitcoin mine, you can then sell into the grid."

Read more from the original source:

Bitcoin mining as a grid resource? 'It's complicated.' - Utility Dive

Read More..

The Ins and Outs of Qumulos AWS GovCloud for Public Sector – Techwire.net

What does this mean for our government customers?

Along with the rapid growth of unstructured file data, U.S. government agencies have unique data challenges as they are also balancing regulatory compliance requirements, mandates to move to the cloud, and strict protocols for data security. To help manage all this, Qumulo for AWS GovCloud (US) provides federal agencies as well as state and local government organizations the powerful file data platform they need to manage unstructured data securely, at scale, and across clouds with increased compliance and control.

Qumulo for AWS GovCloud (US) is designed to address specific regulatory and compliance requirements of U.S. government agencies at the federal, state, and local level, as well as contractors, educational institutions, and other U.S. customers that run sensitive workloads in the cloud. AWS GovCloud (US) is an isolated region of the AWS cloud for the public sector and compliant with the most stringent regulations, including FedRAMP, DOD Security Requirements Guide and HIPAA.

Qumulos AWS Marketplace listings simplify software procurement for government organizations by allowing the consumption of Qumulo services on any approved AWS contracts and vehicles that customers may already have in place.

How public sector organizations are accelerating innovation with Qumulo

With Qumulo, public sector organizations can leverage both legacy and cloud-native applications and services to accelerate workflows, become more productive, and be more responsive to their constituents. Weve partnered with a growing number ofpublic sector organizations on a wide range of use cases, including:

Qumulo for AWS GovCloud (US) compliments Qumulo Shift for Amazon S3

Qumulo Shift for Amazon S3 enables data-driven workflows by making it simple to replicate unstructured data at scale on Amazon Simple Storage Service or Amazon S3. The Qumulo Shift data service is built right into the Qumulo file data platform, providing a way to move data in its native file format onto Amazon S3.

This means customers can copy file data from the Qumulo file platform (running in a private cloud or public cloud) to Amazon S3 object enabling data access to the full suite of cloud-native applications, such as machine learning (ML) and artificial intelligence (AI) services.

The result? Customers can now get the best of both worlds using high-performance file where it fits best, and data-in-object when needed. Qumulo Shift for Amazon S3 brings the power of data and application innovation, and effective collaboration for devOps to organizations with sensitive data via AWS GovCloud (US).

Interested in learning more? If you deal with highly regulated and sensitive data, visit our Qumulo for AWS GovCloud (US) page or contact us for a demo.

Qumulo is the leader in enterprise-proven hybrid cloud file storage and file services, providing real-time visibility, scale and control of your data across on-prem and the cloud. The Qumulo experience makes storage simple, with continuous new features, a single solution for all workloads, and access to customer success experts on your schedule.

View post:

The Ins and Outs of Qumulos AWS GovCloud for Public Sector - Techwire.net

Read More..

Filings buzz in the mining industry: 94% increase in robotics mentions in Q3 of 2021 – Mining Technology

Mentions of robotics within the filings of companies in the mining industry rose 94% between the second and third quarters of 2021.

In total, the frequency of sentences related to robotics between October 2020 and September 2021 was 700% higher than in 2016 when GlobalData, from whom our data for this article is taken, first began to track the key issues referred to in company filings.

When companies in the mining industry publish annual and quarterly reports, ESG reports and other filings, GlobalData analyses the text and identifies individual sentences that relate to disruptive forces facing companies in the coming years. Robotics is one of these topics companies that excel and invest in these areas are thought to be better prepared for the future business landscape and better equipped to survive unforeseen challenges.

To assess whether robotics is featuring more in the summaries and strategies of companies in the mining industry, two measures were calculated. Firstly, we looked at the percentage of companies that have mentioned robotics at least once in filings during the past twelve months this was 28% compared to 7% in 2016. Secondly, we calculated the percentage of total analysed sentences that referred to robotics.

Of the 50 biggest employers in the mining industry, Metalurgica Gerdau was the company that referred to robotics the most between October 2020 and September 2021. GlobalData identified five robotics-related sentences in the Brazil-based company's filings 0.5% of all sentences. Atlas Copco mentioned robotics the second most the issue was referred to in 0.2% of sentences in the company's filings. Other top employers with high robotics mentions included Hoa Phat Group, Magnitogorsk Metallurgicheskiy Kombinat, and MMC Norilsk Nickel.

Across all companies in the mining industry, the filing published in the third quarter of 2021 that exhibited the greatest focus on robotics came from Metalurgica Gerdau. Of the document's 1,030 sentences, five (0.5%) referred to robotics.

This analysis provides an approximate indication of which companies are focusing on robotics and how important the issue is considered within the mining industry, but it also has limitations and should be interpreted carefully. For example, a company mentioning robotics more regularly is not necessarily proof that they are utilising new techniques or prioritising the issue, nor does it indicate whether the company's ventures into robotics have been successes or failures.

In the last quarter, companies in the mining industry based in Eastern Europe were most likely to mention robotics with 0.06% of sentences in company filings referring to the issue. In contrast, companies with their headquarters in Canada mentioned robotics in just 0.01% of sentences.

Mine Closure, Project Management, Environmental Advisory and Site Environmental Management Services

Bearings and Units, Seals, Lubrication Systems, Remanufacturing

Excerpt from:

Filings buzz in the mining industry: 94% increase in robotics mentions in Q3 of 2021 - Mining Technology

Read More..

What is the importance of blockchain in the RegTech ecosystem? – Cointelegraph

Financial regulators and service providers are looking for the best and most cost-effective solutions to help the banks and other financial institutions comply with the rules and do business in a compliant regulatory environment.

As blockchain is already disrupting the conventional ways of doing businesses, thanks to its benefits in terms of enhanced transparency, faster procedures, decentralized and most importantly, cost-effective nature.

In essence, blockchain provides the solutions for the existing problems faced by financial institutions in terms of Anti-Money Laundering (AML) and Know Your Customer (KYC) regulations. As the transactions in the blockchain system are immutable, they cannot be changed and altered, providing transparency regarding AML and KYC compliance.

Customer onboarding screening, enhanced due diligence, transaction monitoring, blacklist screening, change in customer prospect status are the areas where blockchain technology plays a crucial role in handling AML and KYC-related issues.

Customer names can be screened through the automated regulatory compliance system; data can be verified in real-time, and compliance officers can automatically monitor transactions. The Danish banking solution is an example of implementing regulatory technology that aims to improve conventional payments related to significant card systems by using KYC data and compliance information with the help of blockchain technology.

All the financial institutions are required to collect the customer data like IDs, employer’s data, expected business activities before doing business with them, which are a part of KYC and AML compliance procedures.

Traditionally, all the relevant data needs to be verified through independent sources and updated regularly or when the expected business activities change. Abiding by all these procedures manually is time-consuming and costly for the business. Blockchain applications already provide AML software in the cryptocurrency space where all KYC is handled efficiently and cost-effectively.

Similarly, the identity management crisis is another issue for the banks that needs to be stopped and prevent fraudulent activities. Current KYC systems frequently rely on a third party to authenticate a user's identity, which adds another layer of data sharing and risk to the transaction.

This antiquated practice may be addressed with trustless blockchain technology, which allows users to authenticate their identity securely while still maintaining control over their data. Additionally, blockchain can help verify the identity of a politically exposed person through biometrics analytics and social media analytics.

The second significant service offered by regtech providers is monitoring the clients’ transactions in real-time.

Machine learning and artificial intelligence technologies algorithmically observe the behavior of clients while doing transactions and develop patterns to alert the compliance team if it finds any suspicious activities or red flags. Companies like Skry and Elliptic are developing this kind of solution.

Skry offers a data platform that offers regtech for financial services institutions and allows law enforcement agencies to generate real-time business intelligence and risk assessments from blockchains and decentralized applications.

Elliptic is a blockchain analysis tool that delivers anti-money laundering software to financial services and crypto exchanges. In addition, law enforcement has utilized the company's forensics tools to track Bitcoin terrorist funding.

Storing the data and then retrieving it can be challenging for internal use like auditing and operational use, but failing to protect it against hackers is also the key concern of financial institutions.

Despite their necessity, KYC processes are inefficient, involving time-consuming and labor-intensive manual processes, duplication of work and the possibility of error.

However, with blockchain, each time a KYC transaction occurs at a participating institution, the most up-to-date information is entered into the shared distributed ledger, allowing different institutions to rely on the same checks and information up to a certain level. Unlike a bank or financial accounting system, the ledger is distributed to all computers in the chain rather than being centralized.

A blockchain KYC utility could also provide authorities with a clearer knowledge of how users have been onboarded and how the underlying KYC information has been applied. Companies like PeerNova monitor data quality and manage exceptions across internal and external data sources for financial institutions.

See the original post here:

What is the importance of blockchain in the RegTech ecosystem? - Cointelegraph

Read More..

Cyber Security Today, Feb. 21, 2022 – Data on Internet Society members exposed, an alert to Linux administrators, Microsoft Teams users get tricked…

Data on Internet Society members exposed, an alert to Linux administrators, Microsoft Teams users get tricked and more.

Welcome to Cyber Security Today. Its Monday February 21st. Im Howard Solomon, contributing reporter on cybersecurity for ITWorldCanada.com.

People are still being clumsy with the way data is stored on the internet. The latest example: Files with names, email addresses and login details of thousands of members of the Internet Society were recently found in an unsecured Microsoft Azure blob. The Internet Society is an international non-profit that lobbies for a resilient internet. What happened? According to security researchers who found the flaw, the Internet Society blames the association management software it uses. That software, which allows membership information to be stored in the cloud, was configured incorrectly. As a result, if someone knew where to look the information was open to be copied. It isnt known if anyone other than the researchers found those open files. Misconfigurations are a prime cause of data exposures. Credit for the discovery goes to researchers at Clario and independent researcher Bob Diachenko.

Last week I reported on a vulnerability in Adobe Commerce and Magento e-commerce platforms. However, the patch Adobe issued to fix this flaw wasnt enough. A new security update has been released for some versions of Commerce and Magento. Check with the Adobe website to see if your implementation needs this patch.

Attention Linux administrators: Security researchers at Qualys have discovered multiple vulnerabilities in the snap-confine function on Linux operating systems. One of them can be exploited to escalate privileges to gain root privileges. And once an attacker has root privileges they can do pretty much anything. Snapis a software packaging and deployment system allowing software developers to distribute their applications directly to Linux systems. Administrators are urged to apply security patches from their Linux distributions as soon as possible to plug this hole.

Researchers at Avanan have detailed a scam for tricking people using the Microsoft Teams collaboration service into downloading malware. It works like this: A hacker gets into a Teams discussion by one of several ways. If it involves people in two companies, one of the firms might have been hacked. Or the hacker has compromised a persons email address or Microsoft password to access Teams. Then in the middle of a conversation they attach a compromised file to one or all of the participants. This is a trick that can work with any collaboration or chat application. But hackers often chose Microsoft Teams because Microsoft products are widely used by organizations. To defend against this IT administrators need to add anti-malware protection that sandboxes and scans attachments in collaboration software.

Canadians are getting recorded phone calls from someone claiming to be from the the department of Service Canada. This is a fraud. The goal is to get your government of Canada or bank passwords and then your personal information. Just hang up.

Attention WordPress administrators: If you use the free or paid UpdraftPlus backup and recovery plugin, install the latest security patch fast. It fixes a serious vulnerability that allows anyone not just an administrator who logs into a WordPress console to compromise a backup. The developer says it would take a very skilled hacker to do that, but assume a few of them are around. Administrators using UpdraftPlus Premiums feature for encrypting a database backup are protected against data theft.

Finally, The U.S. Cybersecurity and Infrastructure Security Agency is making it easier for IT and business leaders to access its free cybersecurity resources. The agency has created a new online portal. It has resources under titles like Fix the known security flaws in software, and Halt bad practices. If you type CISA free youll find the link. Its also included here. The government of Canadas free online advisory resources are at the Canadian Centre for Cyber Security. The U.K. resources are at the National Cyber Security Centre. All three are great places to start looking for advice on everything from stopping ransomware to setting up a cybersecurity program.

Remember links to details about podcast stories are in the text version at ITWorldCanada.com. Thats where youll also find other stories of mine.

You can follow Cyber Security Today on Apple Podcasts, Google Podcasts or add us to your Flash Briefing on your smart speaker.

Read more:
Cyber Security Today, Feb. 21, 2022 - Data on Internet Society members exposed, an alert to Linux administrators, Microsoft Teams users get tricked...

Read More..

Psaki won’t comment on Clinton-linked tech exec ‘mining’ WH records – New York Post

White House press secretary Jen Psaki declined to comment Wednesday on special counsel John Durhams allegation that tech executive Rodney Joffe mined non-public White House internet records to find dirt on former President Donald Trump.

Fox News correspondent Jacqui Heinrich asked Psaki during her regular briefing if there was still a DNS resolver server extracting White House data and whether its alleged review by a Hillary Clinton ally constituted spying.

Durham says there was an outside company with ties to the Clinton camp monitoring server data info on the Executive Office of the President through the Obama administration, possibly into the Trump administration, Heinrich began her questioning.

Do you know if theres still a system picking up server data on the EOP and if not, when it stopped?

I know you asked my colleague a few questions about this the other day, but I would point you any questions about this to the Department of Justice, replied Psaki, referencing Heinrich raising the matter at a Monday briefing with deputy press secretary Karine Jean-Pierre.

Is what was described in the filings there monitoring internet traffic is that generally speaking, would that be considered something along the lines of spying? Heinrich followed up.

Again, I would point you to the Department of Justice, Psaki said.

Trump cited Durhams Friday filing as evidence that he was the victim of a hoax linking him to Russia in the 2016 election. However, Joffe said through a spokesperson he did nothing wrong.

Joffe, a now-retired senior vice president at Virginia-based company Neustar who is identified as Tech Executive-1, exploited domain name system (DNS) Internet traffic pertaining to the Executive Office of the President, as well as two Trump properties and a healthcare provider, the Durham filing said.

[Neustar] had come to access and maintain dedicated servers for the EOP as part of a sensitive arrangement whereby it provided DNS resolution services to the EOP, the filing went on. [Joffe] and his associates exploited this arrangement by mining the EOPs DNS traffic and other data for the purpose of gathering derogatory information about Donald Trump.

Clinton campaign attorney Michael Sussmann allegedly gave the DNS records to the CIA in early 2017. Sussmann is awaiting trial for allegedly lying to the FBI about his links to the Clinton campaign while hawking a later-debunked theory linking Trump to Russia-based Alfa-Bank.

The Friday court filing alleged that [Joffe] indicated that he was seeking to please certain VIPs referring to individuals at [Sussmanns law firm] and the Clinton Campaign.

A DNS resolver server helps fulfill computer requests to visit websites such as WhiteHouse.gov. But the precise data points analyzed and circulated by Joffe and Sussmann have not been divulged.

A spokesperson for Joffe said Monday that he is an apolitical internet security expert who legally provided access to DNS data obtained from a private client that separately was providing DNS services to the Executive Office of the President (EOP).

Under the terms of the contract, the data could be accessed to identify and analyze any security breaches or threats, Joffes rep said.

As a result of the hacks of EOP and DNC servers in 2015 and 2016, respectively, there were serious and legitimate national security concerns about Russian attempts to infiltrate the 2016 election, the statement continued. Upon identifying DNS queries from Russian-made Yota phones in proximity to the Trump campaign and the EOP, respected cyber-security researchers were deeply concerned about the anomalies they found in the data and prepared a report of their findings, which was subsequently shared with theCIA.

Sussmanns legal team said in a court filing Monday that the DNS records in question dated to former President Barack Obamas administrations and not Trumps, which began on Jan. 20, 2017. The rebuttal also said Sussmann never billed the Clinton Campaign for the Feb. 9, 2017, meeting where he gave the records to the CIA.

The significance of Joffes access to DNS records and potential privacy concerns remain murky, in part because its unclear what exactly was accessed and shared. Joffe has declined The Posts request for an interview.

A 2020 document from the federal Cybersecurity & Infrastructure Security Agency emphasized that US agencies should pursue encryption when selecting from private-sector DNS resolver servers to enhance user security and privacy by preventing eavesdropping and manipulation of DNS data.

In recent years, the government has taken an increasingly active role in the process of hardening the security of federal DNS services.

Here is the original post:
Psaki won't comment on Clinton-linked tech exec 'mining' WH records - New York Post

Read More..

Grand Junction man negotiates with ransomware bad guys’ – The Grand Junction Daily Sentinel

Eastern Europe can be perilous if you have the kind of job Kurtis Minder has.

Its a line of work featuring regular correspondence with the FBI and familiarity with the U.S. Treasury Departments Office of Foreign Asset Control Sanctions list.

Minder operates in the sprawling world of cybersecurity, drawing interest for his work in ransomware negotiation. Ransomware, the cybercrime du jour that shut down Colonial Pipeline last May and ground the city of Atlanta to a halt in 2018, refers to bad actors infiltrating businesses, nonprofit agencies or government services, encrypting important data and then demanding payment to unlock the files.

Its an interesting field in which to hang a shingle.

A local friend made the introduction, recalled John Marshall, president of Colorado Mesa University, of the first time he met Minder. And he told me this wild story about how hes grown this wild business.

We just fortuitously stumbled across literally the world expert in this hot field.

NOT VERY FRIENDLY

After a ransomware victim gets a demand from the attackers is where Minder, who co-founded the company GroupSense, steps in. He specializes in a sort of cyber reconnaissance, in addition to the negotiation work. He closed his first such negotiation in July 2020 and has become a significant figure in the world of ransomware negotiations and cybersecurity, having been interviewed in outlets ranging from The New Yorker, to Vice on HBO.

Of course, that notoriety extends to the world of cybercriminals, who Minder discusses the way a football coach might talk about a division rival.

They dont generally like firms like us, so its generally not very friendly. Theyre not saying, like, Im going to go get Kurtis or something like that, Minder told The Daily Sentinel, before offering this caveat: Although, there has been dark web chatter to that degree. But I dont know if theyre ransomware actors or just other bad guys. Because we make enemies of a lot of bad guys other than just ransomware.

Minder doesnt boast of the dangers of his job the way those who meet him might. He also regularly credits his staff, many of whom are former law enforcement or intelligence professionals.

Still, its not a boring job, either, and Minder tells a good story, be it about the curious world of cybercrime or a recent motorcycle ride down Colorado Highway 141 to Gateway.

Take for example the firm Minders company owns in Sofia, which he wont be visiting for awhile for decidedly non-COVID-19 reasons.

That team, I wanted to go see them and I was sort of told off the record to stay out of Bulgaria for right now, Minder said. Its weird. I never imagined myself getting pushed into a white van or anything.

While he doesnt see himself as a future tenant of the back of a van, Minder does know the same people hacking into companies he works with are always trying to embarrass him. Minder jokes that his security team hates me.

It does make us a target and were paranoid sufficiently, he said.

Though international, corporate and legal intrigue headline Minders profile, in person hes a polite character who loves BMW motorcycles and earnestly wants to help his clients as well as nonprofits or small businesses who happen to open the wrong email.

I dont poke the bear, Minder said, referring to his digital opponents in the cyber underground. Im just trying to help people.

HOW IT WORKS

GroupSense sports an impressive list of clients that includes some major companies, but not every problem needs the attention of the companys co-founder. Minder, who is partnering with Colorado Mesa University on a nonprofit aimed at helping small organizations with cybersecurity, now works on two ends of the negotiation spectrum.

If the asking price for the bad guy is above eight figures, so above $10 million, then Im involved, Minder said. And then the only other time is when the company is so small that they cant afford to pay our fees and I do it for free.

That pro bono work is valuable in a realm as specialized as this. Beyond ransomware negotiation, GroupSense helps companies know what they might be vulnerable to. Minder compares it to intelligence agencies spying on foreign countries to find out what they might be capable of and what they might attack.

Intelligence in business, and specifically in cyber, is the exact same thing. What are the bad guys doing right now, what kinds of tools are they using? Minder said.

Ransomware attacks, like the Colonial Pipeline attack that threatened one of the nations largest fuel providers, often target internet carelessness.

An employee might use their work email to sign up for something at a different website Minder, when explaining the problem, cites iloveknitting.com as an example, since the domain doesnt exist yet. If that other website is hacked, that email and the password are compromised and, since people often reuse passwords, its easy enough for a hacker to use the credentials they found at iloveknitting.com to log into the company they can extort.

That site gets hacked opportunistically Minder said. Theyre not targeting the knitting lady; she just has a site with some vulnerabilities.

Once the bad actors have access, they lock down important files and demand payment in the form of cryptocurrency like Bitcoin.

GroupSense helps clients first determine if its even worth it to retrieve the lost information. If a company can recover their data, or do without, for less than the cost of the ransom, theyll cut their losses.

If, however, the locked information is valuable enough, then Minder will go to work using a handful of tactics that he certainly didnt learn in school and that, until recently, had not been used in this application. Its something GroupSense has gotten pretty good at.

We traditionally get the rate down below 10% of the original asking on a pretty regular basis. Or below, Minder said, adding that the cyber insurance companies he talks with note that success rate to be pretty ing good.

Minder, 44, grew up in central Illinois Not near Chicago, hell preemptively quip and spent about a semester and a half in community college before ditching the pursuit altogether.

We were poor. I was not a great student in high school so I didnt get any scholarships. I was about a C/D student. I did start going to the local community college with the intent of getting to the point where I might do a four-year degree, Minder said.

But, by that time Minder was well into his tech career, having gotten a job when he was 16 working nearly full time at an internet service provider. In high school he was writing papers about how users could fake their identity in the early days of the internet and, after reading one of the preeminent books on computer hacking at the time, Minder was already combing through logs at his internet company and kicking out early hackers.

By the time he was taking classes, he was well ahead of what most universities were capable of teaching at the time.

The stuff I was doing at work wasnt slightly ahead of what they were teaching, it was years ahead of what they were teaching, Minder said.

That knack for independent learning carried through Minders career all the way into his evolution as a negotiator, where he picked up tips from his colleagues as well as former FBI negotiator Chris Voss, whose book Minder read and who Minder now texts regarding negotiating tactics.

However, what Minder was dealing with talking someone on another continent down off their opening offer does not conform to the standards that negotiating dogma relies on.

They rely on the ability to see my opponent or hear them so eye contact, body language, tone. Thats not true here, Minder said.

And its not just that millions of dollars are being discussed via keyboard.

It also assumes that theres some asymmetry to the leverage. Not true. Bad guy has almost all the leverage. Especially if they took a copy of your financials. Cant even lie about how much money you have.

Then theres the most basic of differences.

It assumes you speak the same language, Minder said. Not true.

As Minder adapted the craft with, as he often credits, help from others at his company the work he was doing drew interest from the Harvard Negotiation Project, which is more or less exactly what it sounds like.

Minder worked with the Harvard Negotiation Project on translating that analog field of study into a digital world. The effort culminated in a presentation Minder did with Voss, the ex-negotiator whose book Minder read when he was starting out.

KARMA AND THE WESTERN SLOPE

Minder believes both that you get out of the universe what you put into it and that BMW produces some of the finest motorcycles around.

While those principles have little in common, Minder is living them both in Grand Junction, having left his GroupSense headquarters outside of Washington D.C. during the pandemic.

We had this amazing office. Such a bummer, Minder said of the Ballston, Virginia location. Super startup-y with the concrete floors and all that.

After enough days skateboarding around an empty office, Minder mentioned on a conference call that he was moving west, possibly Arizona. Thankfully for the Grand Valley, GroupSense Chief Operating Officer Kelly Milan had just added another property to his Grand Junction real estate portfolio, and he was looking to rent it out.

I was like, give me the keys. And that was it. And I still rent that house, Minder said.

After the move, Minder needed a few things that his home office didnt yet afford and in that, Marshall, the CMU president, saw opportunity.

It started with, he needed a room for a zoom call, Marshall said. And the president was happy to oblige, hoping that the right background and a goodbye from Grand Junction and CMU, send off from the conference call might get the Mavericks in front of a bigger tech audience.

It started as a cheap publicity stunt and just kind of grew, Marshall said.

What its grown into is a partnership for a long-running GroupSense effort. Minder is looking to park the philanthropic arm of his work, dubbed GoodSense, in Grand Junction and Colorado Mesa University is ready to help.

The 501c3 non-profit paperwork for GoodSense is now wending its way through the system, but the spirit of providing pro bono help on cyber security matters has a track record at Minders company.

Were all very altruistic in nature, Minder said, adding that staffers at GroupSense will bring up different organizations or groups to help and be empowered to do so. Essentially, GoodSense will formalize that effort and allow Minder and his colleagues to continue helping out small organizations, something hes already started to do through some relationships in Grand Junction.

And Minder builds these relationships quickly. He has a knack for getting to know people he doesnt just know who he might see on a motorcycle trip to Gateway, but also how many miles theyve got on their Indian Chieftain and has already provided some help for companies and organizations in Grand Junction.

Cyber security changes quickly and Minder doesnt scoff at those who arent sufficiently protected because, he says, the scope of the problem is such that no one person could be expected to stay on top of it.

Fortunately, he thinks theres some low-hanging solutions to the issue that dont involve FBI investigations or international diplomacy.

A common refrain about cybersecurity is to describe it as a war, which Minder says is only partially true.

Its kind of a weird war. The bad guys have a bunch of spears, and theyre going to throw the spears at us, and we have a bunch of shields on the ground.

Much like the axiom that most burglaries are crimes of opportunity targeting unlocked houses or cars left running in the driveway cybercrimes go after easy targets and picking up the shields in Minders metaphor is a good place to start.

Eventually theyd run out of spears or theyd throw spears at someone else, Minder said.

GoodSense will help do that. The idea melds the acumen and resources of GroupSense with the talent pool at CMU to create a nonprofit that can scale up to help Main Street America become as savvy to the perils of the online world as Fortune 500 companies have.

Were going to provide ransomware (help) but also cyber hygiene instruction and services for small businesses that meet a certain criteria for free, Minder said, adding that the board of the nonprofit will range from Grand Junction locals to big names in the cyber security industry.

The nonprofit organization creates enormous potential for CMU and Grand Junction, from protecting local businesses from dubious emails all the way up to a pipeline of future cyber experts graduating from CMU.

Marshall, who is used to partnering with experts across industry, said an opportunity like this is difficult to fathom for a place like CMU.

To state the obvious, Kurtis doesnt really need us, Marshall quipped.

But for Minder, a believer in karma, the priority is the same whether its a $10 million negotiation for a top client or creating an opportunity for a junior in college.

Hes just trying to help.

Read the rest here:
Grand Junction man negotiates with ransomware bad guys' - The Grand Junction Daily Sentinel

Read More..