Page 2,277«..1020..2,2762,2772,2782,279..2,2902,300..»

What the Duck? Why an EU Proposal to Require "QWACs" Will Hurt Internet Security – EFF

It's become easier over the years for websites to improve their security, thanks to tools that allow more people to automate and easily set-up secure measures for web applications and the services they provide. A proposed amendment to Article 45 in the EUs Digital Identity Framework (eIDAS) would roll back these gains by requiring outdated ideas for security and authentication of websites. The amendment states that web-browsers shall ensure that the identity data provided using any of the methods is displayed in a user-friendly manner. The amendment proposal emphasizes a specific type of documentation, Qualified Web Authentication Certificates, or QWACs, to accomplish this goal. The problem is that, simply put, the approach the amendment suggests has already been debunked as an effective way to convey security to users.

QWACs use guidelines similar to Extended Validation (EV) certificates. Both are digital certificates issued to domain owners with an added process that establishes an identity check on the domain owner. This approach has been proven ineffective over the years.

For a short while, browsers made a point of showing EV certificates to the user, displaying the certificate details in green. They assumed that this clear marker would indicate more security for users. However, nefarious parties ended up obtaining EV Certificates and hosting phishing sites. This highlights that HTTPSsupported by certificatesestablishes a secure connection between you and that website, but does not guarantee the website itself is storing or using the information you may submit to it ethically. Nor is it an assurance that a company's business practices are sound. That is what consumer protection laws are for.

Because emphasizing these certificates proved ineffective in helping user security, Chrome and Firefox in 2019 decided to no longer emphasize EV Certified websites in the URL bar. Safari stopped in late 2018. However, EV certificates are significantly more expensive and some Certificate Authorities (CAs) that sell them still inaccurately suggest that browsers emphasize EV certificates in their sales pitch for these products. Requiring that QWACs be displayed in the same fashion is just further pursuing the illusion that displaying identity information to the user will be worth the effort.

Requiring browsers to trust these certificates by EU government-mandated CAs, could impact users outside the EU as well. Rather than improve security as intended, this would likely force the adoption of a security-hindering feature into the internet experiences of users within and outside the EU. People could be susceptible to poor response of security incidents with EU-mandated CAs, breach of privacy, or malware targeting.

Its even been ludicrously suggested by Entrust (a CA) that any website that doesnt use QWACs or EV certificates be flagged by the browser with a warning to the user when they submit data. Such a warning would make no sense, because standard Domain Validation (DV) certificates provide the same security for data in transit as EV does.

Trust Services Forum - CA Day 2021

Transport Layer Security (TLS) is the backbone to secure your connection to a website. When this occurs, it is called HTTPS. Think of it as HTTP(S)ecure.

Browsers have worked for years to show people that their connection is secure without confusing them. This proposal would undo much of that user education by potentially unleashing a flood of warnings for sites that were actually adequately secured with DV certificates.

This amendment also makes problematic assumptions about how much consumers know about the identity of companies. Large corporations like Unilever own many products and brands, for example, and consumers may not realize that. Some well known brands, like Volvo automobiles, are owned by companies with seemingly unrelated names. Its also not impossible for two companies that offer completely different products to share a name; the marketing term brand twins describes this. Examples include Delta Airlines and Delta Faucet, or Apple Records and tech giant Apple, Inc.

Researcher Ian Carroll filed the necessary paperwork to incorporate a business called Stripe Inc

For these reasons, it is nearly impossible for a QWAC to achieve its stated goal of making the entity that owns a domain easily apparent to the people visiting a websiteespecially across the globe. QWACs also put up a weak defense against the simplest and most effective forms of hacking: social engineering. The very peoplescammers, phishers, etc.who are allegedly hindered with an EV or QWAC certificate, have and will find a way around them, because the validation process is still led by humans. Also, we shouldnt endorse the dangerous premise that only the right people in other words, those who can afford itshould have encrypted services.

This proposal to bind TLS to a legal identity across all domains that qualify is not achievable or scalable. QWACs will not readily solve this issue on the modern web or with mobile applications either; even with their slight technical differences from EV. Mozilla and other vendors (Apple, Google, Microsoft, Opera, and Vivaldi) have made sufficient suggestions for eIDAS to validate identity without binding identity to the TLS deployment process itself or using TLS Certificates at all. The push to use QWACs to achieve this goal is a detrimental framework that would discourage affordable and more efficient TLS.

Interoperability across borders is a great ideal to have, but the mandate to emphasize QWACs in the browser ironically hinders interoperability. The eIDAS Article 45 proposal attempts to guarantee the legal and safe identity of the website ownerbut that is not the problem TLS was built to solve.

Standard Domain Validated certificates by CAs have achieved the level of security that website visitors need globally. Tools like Certbot and the free CA Lets Encrypt have contributed to making TLS deployment and automation more widespread and accessible. Today, domain owners can utilize automated hosting services for services between businesses and with their own customers that alleviate traffic-handling and optimizing costs. Mandating QWAC emphasis threatens to set us back. Domain owners will likely have to use self-managed certificate options to maintain their web security. That would increase inequality across the internet. A large company can acquire the infrastructure to do this; They may even achieve partial automation, as has happened with EV certificates. However, smaller companies and individuals may not be able to acquire these tools as easily. Requiring all domain owners to have the technical expertise and the monetary resources to self-manage their certificates sets TLS deployment back 6 years, by raising the difficulty and barriers to complying with the eIDAS regulation.

This is all very reminiscent of a time when TLS deployment was more difficult, costly, and time consuming. This amendment to emphasize QWACs in the browser frames free security as bad security. In this case, that is neither truthful nor useful to internet users everywhere.

This post was updated on 2/9/22 to correct the involvement of the joint position paper linked in this post: https://blog.mozilla.org/netpolicy/files/2020/10/2020-10-01-eIDAS-Open-Public-Consultation-EU-Commission-.pdf

See the rest here:
What the Duck? Why an EU Proposal to Require "QWACs" Will Hurt Internet Security - EFF

Read More..

Avast’s Online Protection and Secure Browser Products Win Latest Anti-Phishing Comparison Test – PRNewswire

AV-Comparatives' study, which ran from 13 January to 28 January 2022, tested all browser and antivirus products in parallel, exposing each to 250 valid and independently-selected phishing URLs, and 250 clean URLs for false alarm detection. The phishing protection provided by the AV products was tested on Windows 10 using Google Chrome 97.0 with Google Safebrowsing disabled. The browser extensions of the AVs were installed and enabled, and the competing browsers were tested without an antivirus program running. At the time of testing, all products were updated to their latest software versions.

"For many years, Avast's threat detection engine has been a standout performer achieving excellent results in the Malware Protection, Advanced Threat Protection and Real-World Protection Tests," said Andreas Clementi, Founder and CEO of AV-Comparatives. "Recently, Avast has excelled in the anti-phishing category, which is bad news for opportunistic cybercriminals who often depend on the high success rates of phishing attacks as a means of generating greater return on investment."

In 2021, our threat detection engine has identified and blocked nearly four million unique phishing URLs each month on average," said Siggi Stefnisson, Head of Threat Labs, at Avast. "Phishing is one of the most common threats for both businesses and consumers, often because it's easier to exploit the human condition through urgency, fear or pressure than it is to hack a system. Phishing attacks, particularly those which are targeted and personalized, and phishing URLs have become so widespread, hard to identify as malicious and successful in achieving their goals of theft, fraud and corporate espionage, that it's of paramount importance we maintain an industry-leading detection rate to apply to our products and services so our customers remain safe and secure online."

*This report was commissioned by Avast, however, AV-Comparatives' anti-phishing test of all products was carried out impartially and under identical conditions. The phishing sites were selected independently by AV-Comparatives without instruction, influence, dispute or review from Avast or any of the tested parties.

A complete breakdown of the antivirus and browsers products tested are listed below:

Antivirus Products:Avast Free Antivirus 21.11, Avast One Essential 21.11, Avira Free Antivirus 15.0, Bitdefender Internet Security 26.0, ESET Internet Security 21.3, Malwarebytes Premium 4.5, McAfee Total Protection 16.0, Microsoft Defender 4.18 (with Defender browser plugin for Chrome), NortonLifeLock Norton 360 22.21.

Browsers:Avast Secure Browser 97.0, Google Chrome 97.0 (with Safebrowsing), Microsoft Edge 97.0, Mozilla Firefox 96.0, Opera 82.0.

About Avast:Avast (LSE:AVST), a FTSE 100 company, is a global leader in digital security and privacy, headquartered in Prague, Czech Republic. With over 435 million users online, Avast offers products under the Avast and AVG brands that protect people from threats on the internet and the evolving IoT threat landscape. The company's threat detection network is among the most advanced in the world, using machine learning and artificial intelligence technologies to detect and stop threats in real time. Avast digital security products for Mobile, PC or Mac are top-ranked and certified by VB100, AV-Comparatives, AV-Test, SE Labs and others. Avast is a member of Coalition Against Stalkerware, No More Ransom, and the Internet Watch Foundation. Visit:www.avast.com.

Keep in touch with Avast:

Media Contact:[emailprotected]

SOURCE Avast Software, Inc.

See more here:
Avast's Online Protection and Secure Browser Products Win Latest Anti-Phishing Comparison Test - PRNewswire

Read More..

Pandemic helps heartless romance fraudsters infect the internet – The Guardian

Fraudsters who engage in romance scams are becoming increasingly brazen about how they operate and are willing to spend five months building up a relationship with their victims, according to a security expert.

In some cases, criminals will even have video calls with victims, luring them into a false sense of security that they are involved with someone who is genuinely interested in them.

The number of romance scams, where people hand over money to someone they believe they are in a relationship with, doubled during the pandemic with the average victim losing 6,100, according to figures from TSB. Women are twice as likely to be victims as men.

Jake Moore, a cyber-security adviser at internet security firm ESET, says fraudsters can spend four to five months in establishing a fake relationship before carrying out the crime. During this time, they will often be working on several victims.

Theyre very good at remembering all the stories that lead along that journey [ending in] an elaborate scam as to why they want the money, he says.

These scams can be as simple as a person claiming their car has broken down on the way to visit and that they need money to repair it, he explains. In another instance reported by TSB, a soldier claimed he needed funds to get home from a foreign posting.

Victims, who TSB says are an average age of 47, have been increasingly targeted through social media and dating apps.

There have been warnings to consumers to beware of scams before Valentines Day .

Many scammers used restrictions on movement during the pandemic as an excuse not to meet up with victims. Refusing to meet in real-life, or face to face for a video call, are both things that should ring alarm bells.

However, Moore says that criminals are now taking more risks and making face-to-face video calls where they are fully visible.

There are male and female fraudsters who put in video calls every night, really creating this perfect story as to how this relationship unfolds.

He advises daters to change the times of the calls and to be spontaneous about when they happen, as this could upset a fraudsters timetable.

If they are controlling and saying its got to be this time then that could be a red flag, he says.

Katherine Hart from the Chartered Trading Standards Institute, which represents trading standards officers, says the pandemic increased peoples reliance on indirect communications through phones.

Theres the thinking that theyre protected by a computer screen to a certain extent, and will easily, and quite readily, pass on a lot of personal information via text or emails, she says.

Unfortunately, quite often we only find out about these things when somebody has actually intervened, whether that be a bank or a family member, or the victim has caused themselves such mental anguish there is a referral from social services.

In some instances, criminals will scan the death announcements and target lonely widowers in the following months with the promise of companionship, she says.

Action Fraud reported instances of romance fraud were up 40% in the year to April last year with almost 74m being lost.

Read more:
Pandemic helps heartless romance fraudsters infect the internet - The Guardian

Read More..

Industrial Internet of Things Raises New Security Implications – Journal of Petroleum Technology

Industry implementation of the industrial Internet of Things (IIoT) for oil and gas operations will result in a significant alteration of the existing operations technology/information technology (OT/IT) digital architecture, causing a change in cyber-physical security because of new and additional cybersecurity vulnerabilities.

The conventional defense strategies for cybersecurity are based primarily on traditional IT network security designs and practices, such as assuring data integrity and protecting the confidentiality of data and intellectual property. The primary threat to oil and gas operations, however, comes from the growth in attacks designed and directed at OT systems, which can result in significant negative operational events. In recent years, this has spurred the development of expanded OT defense strategies and the technical hardening of industrial control systems.

The U.S. Department of Homeland Security has recorded the annual cyber incidents relating to different sectors (Fig. 1). The results indicate that the energy sector (including petroleum) is one of the primary potential attack targets.

Source: U.S. Department of Homeland Security

Changes in digital technologies and architectures arising from the implementation of the IIoT in oil and gas operations have brought intrinsic changes in the security landscape. The goal of this paper is to aid oilfield security planning and design processes through improved recognition of the cyber-physical security effects arising from the implementation of IIoT architectures and technologies into field OT domains.

The paper identifies and compares the current oilfield OT logical structures with the designs emerging through the IIoT implementations. The analysis includes extensive review of developing standards, such as those proposed by Industrial Internet Consortium, and ongoing published experiences to find the primary points of transition.

The security risks stemming from IIoT implementation appear to raise significant concerns with regard to potentially severe cybersecurity outcomes, which could materially affect the integrity and safety of oilfield operations. The study concentrated on the cybersecurity threats that could pose negative physical and operational conditions resulting from loss of visibility or loss of control of the operational processes in field facilities.

Extensive literature reviews were the basis for identifying the implications of cybersecurity risks in the ongoing stages of integrating the IIoT into the field. The reviews identified the modified strategies for cyber-physical systems, including potential threats and countermeasurements for the field IIoT model. These proposed strategies, however, still miss a fundamental denominator: The assessments generally ignore that it is the fundamental nature of IIoT structure itself that creates cyber-security vulnerabilities.

To investigate further, the authors performed a contrasting analysis based on specific case studies of field IIoT devices such as the pumpoff controller and OT architectures. The following three foundational threat implications emerged on the transformation of IIoT architecture into the oil field:

The cornerstone of the distinctive IIoT attributes illustrated in the paper contributes to the potential loss of control, leading to the potential for serious damages to operational outcomes in the field.

Download the complete paper from SPEs Health, Safety, Environment, and Sustainability Technical Discipline page for free until 23 February.

Find paper SPE 200858 on OnePetro here.

See the article here:
Industrial Internet of Things Raises New Security Implications - Journal of Petroleum Technology

Read More..

Internet security company issue warning over sextortion scam doing the rounds in Irish… – The Irish Sun

AN internet security company have issued a warning about a 'sextortion' scam doing the rounds in Irish.

ESET, an online security company that offers anti-virus and firewalls, is urging people not to interact with the bogus email.

2

2

The scam email, which is written to the sender in Irish, comes from a South Korean address.

The scammer claims that they have a video of the sender watching pornography and threatens to make the footage public.

They then asks for 1,200 in bitcoin to make the footage go away.

The terrifying letter warns: "Final warning! All your data was copied. The login was successful.

"Greetings. Your system is compromised by the Trojan virus. It entered your device through the adult portals you visit.

"Some racy videos have malicious code that acts after being posted. All data has already been copied to my servers.

Most read in The Irish Sun

"I have full control over the device you have access to on the Internet.

"I can see your screen, use your microphone and camera. You wont notice it accordingly. Ive already done a screen recording."

They then ask for 1,200 in bitcoin at which point they say they will remove the virus from the person's device.

ESET said it is important to note that most sextortion letters are bluffs and the sender does not have the footage they are claiming.

They said: "It is important to note that most of these sextortion letters are bluffs and the sender doesnt actually have anything.

"These mails are just spammed out to millions of email addresses in hope someone will bite."

They urged the public not to respond to such emails and instead flag them as spam and warn their friends not to fall for it.

They added: "However in some cases the extortionists do have something and offer proof, they should be reported toAnGardaSochnas Cyber Crime Bureau."

Link:
Internet security company issue warning over sextortion scam doing the rounds in Irish... - The Irish Sun

Read More..

Right of Boom Live Blog: MSP Security Conference Takeaways – MSSP Alert

by Joe Panettieri Feb 10, 2022

Andrew Morgan, founder, Cyber Nation & CyberCall

The Right of Boom security conference for MSPs is under way in Tampa, Florida. Both MSSP Alert and ChannelE2E are on-hand to cover the event. Keep checking this blog for ongoing updates from the event, which is hosted by Andrew Morgan founder of The Cyber Nation and host of The CyberCall.

Heres what weve heard from the event so far:

1. Can Your MSP Really Survive a Cyberattack? We raised and explored that topic ahead of the event. Among our areas of concern: What percentage of MSPs are really qualified to offer MDR (Managed Detection and Response), and how many of those MDR-focused service providers actually offer credible response capabilities? Well be seeking answers at the event.

Beau Bullock, Black Hills Information Security

2. Top 10 Cloud Security Risks MSPs and MSSPs Need to Mitigate: This topic surfaced during a pre-conference workshop led by Beau Bullock of Black Hills Information Security.

3. MSP Ecosystem Embraces Physical and Virtual CISOs: Full-time chief information security officers, virtual CISOs and associated technology startups are popping up across the MSP software industry leading a multi-year journey that is starting to deliver improved MSP industry security and enhanced risk mitigation. Its a safe bet the vCISO trend as well as actual CISOs including Dattos Ryan Weeks will be on hand at the conference.

Wes Spencer

4. Laggards In This Journey Get Left Behind: Thats the key takeaway from Wes Spencer, who called on the MSP sector to move together, continue to shift right and make sure no MSP gets left behind in the cyber journey especially as MSPs begin to master detection and extend their focus to effective right.

5. Wes Spencer Joins Rewst: Details about Spencer joining Rewst are here from ChannelE2E. Rewst is a Robotic Process Automation (RPA) software startup focused on MSPs.

Jon Murchison, CEO, Blackpoint Cyber

6. MSP Security Progress: In the past three years, the MSP industry has made 10 years of progress, Morgan asserted. I agree.

7. Blackpoint Cyber CEO Jon Murchison: Most of the initial targeting involves RDP being open to the Internet, an unpatched firewall or phishing. Youd be surprised how many Exchange Servers remain unpatched. Also, be careful of rogue RMM (remote monitoring and management) installs and related free trials that may not be secure, he noted.

Phyllis Lee, Center for Internet Security

8. DMZs Are Dead: Move to the Zero Trust Model for a proper path forward, Murchison said.

9. Get to Know the Center for Internet Security: A key name to know is Phyllis Lee, senior director for controls at the Center for Internet Security. Lee pointed out that MSPs need to really understand effective cyber hygiene to maintain a proper posture, and be aware of where you data is going, records you care about and the fact that your network ends at your employees and partners fingertips. Also, read up on the Microsoft 365 security guidance from CIS, Murchison said.

John Hammond, Huntress

Jennifer VanderWier, F1 Solutions

10. The Year of Supply Chain Vulnerabilities and Mass Exploitation: Here, guest speakers John Hammond of Huntress and Jennifer VanderWier of F1 Solutions emphasized that MSPs have to look beyond their RMM to really analyze the security of every toolset the test/adopt. In F1 Solutions case, the MSP created a standardized list of security questions that team members ask their tool vendors. And in many cases, F1 Solutions will ask multiple sources at a software company about their cyber posture to see if all the statements match.

11. Ten Security Vendors MSPs Should Ask Their Software Suppliers: Thank you to VanderWier and Hammond for the list.

Sounil Yu

12. The Irony of Automation: A great paper, recommended by keynote speaker Sounil Yu, CISO & head of research at JupiterOne.

13. Resources from Sounil Yu: Thank you to Kyle Jackson, senior program manager at ConnectWise, for that high-value link.

14. The Cyber Defense Matrix: The grid is below. For more info, check out Sounil Yus website. The site is required reading for MSPs and MSSPs. The grid is all about helping organizations to map and improve their security controls.

14. The Cyber Defense Matrix Where MSPs and MSSPs fit:Whats the difference between an MSP and an MSSP? Generally speaking, I often say that MSPs are in the shallow-end of the security pool and also offer general purpose IT support. MSSPs are in the deep-end of the security pool and focus purely on security. Thats my spin. But Yu gets even more granular by mapping out MSP and MSSP capabilities in the Cyber Defense Matrix. Note: Yus mapping is meant to be a general perspective rather than any type of official, firm guide for the services that MSPs and MSSPs generally offer. Heres the mapping:

15. Additional News Updates: Keep checking this blog for more updates. And if youd like to meet or say hi at the conference, then send me an email ([emailprotected]).

Read more:
Right of Boom Live Blog: MSP Security Conference Takeaways - MSSP Alert

Read More..

Donald Trump Would Have Been Executed Over Server Access Claims, Son Says – Newsweek

Eric Trump has suggested that his father would have been subjected to "capital punishment" if he was found to have gained access to the servers of the Barack Obama administration, while discussing the recent allegations highlighted by John Durham.

Speaking to Fox News' Sean Hannity, the son of the former president questioned why the media was not making a bigger deal of the claims made by Durham, the special counsel appointed to investigate the FBI's investigation into Russian interference in the 2016 election, in court filings submitted on Friday.

Durham alleged that a tech executive for company Neustar had accessed White House servers in order to look at internet traffic from Trump Tower and the White House to uncover "derogatory" information about the former president.

"At what point is it acceptable to break into the servers at the White House? That's the most cherished building in this country that has the most top secrets, everything in this country that runs our government," Eric Trump told Hannity.

"And it's okay just to break into servers? Why, Because you're a Democrat? Can you imagine if my father broke into servers in the Obama administration? It would be capital punishment, Sean."

Eric Trump was referencing the documents filed by Durham that allege that the person named in the legal filings as "Tech Executive-1"believed to be Rodney Joffeused his domain name system (DNS) to find out which computers and servers the White House servers were accessing while looking into supposed links between the Trump Organization and Alfa Bank of Russia.

The details were listed by Durham as part of a case brought against Michael Sussmann, a cybersecurity lawyer with links to the Clinton campaign who has been charged with making a false statement to the FBI during a 2016 meeting where he shared information about the Trump Organization and the Russian bank. Sussmann has pleaded not guilty to the allegations.

The filings suggest that Sussmann had obtained that information that a Russian-made smartphone, YotaPhone, had been used from networks serving the White House and Trump Tower from Joffe, a client of his.

"Tech Executive-1's employer, Internet Company-1, had come to access and maintain dedicated servers for the EOP [Executive Office of the President] as part of a sensitive arrangement whereby it provided DNS resolution services to the EOP. Tech Executive-1 and his associates exploited this arrangement by mining the EOP's DNS traffic and other data for the purpose of gathering derogatory information about Donald Trump," the filing stated.

Fox News had reported the claims as Clinton's presidential campaign paying a technology company to "infiltrate" servers tied to Trump, despite the word "infiltrate" not appearing in the motion.

Trump took the allegations as validation for his cries that the Obama administration had been spying on him during his time in office, even though the claim is now against the Clinton campaign, and that the Russian interference probe was nothing more than a "hoax."

Trump also appeared to suggest that members of Clinton's campaign staff should have been executed over the allegations.

"The latest pleading from Special Counsel Robert [sic] Durham provides indisputable evidence that my campaign and presidency were spied on by operatives paid by the Hillary Clinton Campaign in an effort to develop a completely fabricated connection to Russia," Trump said in a February 12 statement.

"In a stronger period of time in our country, this crime would have been punishable by death."

In a Monday statement, Trump speculated that "all hell would break loose and the electric chair would immediately come out of retirement" if the roles were reversed and he got "caught illegally spying"a claim that was echoed by his son Eric on Fox News.

Ohio congressman Jim Jordan also appeared to back Trump's calls for Clinton's aides to face the death sentence over the allegations, telling Fox and Friends that the former president was "right on target" with his remark.

In a statement to The Washington Post, a spokesman for Joffe said: "Contrary to the allegations in this recent filing, Mr. Joffe is an apolitical Internet security expert with decades of service to the U.S. Government who has never worked for a political party, and who legally provided access to DNS data obtained from a private client that separately was providing DNS services to the Executive Office of the President (EOP)."

The statement added that Joffe's contract meant he had lawful access to analyze DNS data in order to identify and analyze security breaches or threats.

Read more:
Donald Trump Would Have Been Executed Over Server Access Claims, Son Says - Newsweek

Read More..

What Is Zero Trust? A Guide to the Cybersecurity Approach – Government Technology

The term zero trust is rapidly gaining attention as agencies move away from the more traditional castle and moat models of cybersecurity.

Zero trust refers to a cybersecurity strategy or set of principles based in the understanding that just because an account or device is associated with the organization or has seemed trustworthy in the past doesnt mean they should be assumed to be trustworthy in the future. The mindset assumes an attacker could be in the network already and emphasizes limiting a bad actors ability to access data and other resources.

Organizations adopting zero-trust principles require users and devices to continually prove they are who they claim to be, whenever they want to access data or services. This stands in contrast to older thinking in which users may have only had to authenticate themselves once to enter the organizations network, such as by logging in, and then were granted access to a wide swathe of internal resources.

Core zero-trust principles also involve restricting users access privileges to the minimum amount they need to do their jobs, something known as the principle of least privilege (POLP).

But many of todays organizations rely on workforces that are no longer on premise and on assets stored in the cloud meaning theres no longer a castle to wrap the moat around. Remote employees connect to the network from a variety of locations, through personal Internet networks and, sometimes, on personal devices outside of an organizations control. Cloud-based data also remains outside of the defense of the organizations perimeter firewalls.

Malicious actors can attempt to pass themselves off as employees using new devices or may seize control of employees accounts or devices that are already familiar to the organization, then move within the network.

Organizations need to avoid locking out legitimate employees, but enabling the wrong device or allowing the wrong level of access privileges creates significant cyber risks.

To thread the needle, organizations that adopt the zero-trust approach require devices and users to verify themselves repeatedly and monitor continually. Reducing each accounts privileges to only what is essential also minimizes the damage that a bad actor or malicious insider would be able to achieve.

The federal government has thrown its support behind the idea, with Bidens executive order asking federal agencies to transition to zero trust.

The National Institute of Standards and Technology (NIST) outlines seven tenets in a 2021 draft white paper and 2020 publication:

1. Network identity governance: Organizations need policies and tools to ensure that only authorized users who have gone through a sufficient level of authentication are granted access to enterprise data and services, and that they are only able to perform authorized actions.

2. Secure end devices: Zero-trust plans need to address end devices such as mobile devices, remote sensors and compute resources.

3. Monitor, defend and defend against owned and associated assets: Organizations should attend closely to their data and services defenses including understanding how they are configured and maintained as well as continually monitor for signs of compromise and respond quickly to events like new patches or indicators of vulnerabilities. They may also need to block connections or restrict access to those devices over which they have less control.

4. Secure all communication: Organizations must safeguard the integrity and privacy of all data in transit even for communications within the network. Otherwise, an attacker hiding on the network could view or tamper with the communications.

5. Users should only be given access to individual enterprise resources on a per-session basis: Organizations should try to tightly control access to data, services and devices. To the extent possible, organizations should require users to clear authentication and authorization checks each time they seek to perform unique operation[s]. Users also should only be given the minimum access privileges required to complete their objectives. Adopting logging, backups and versioning tools can also help recovery if unauthorized activity does occur.

6. Thoroughly and dynamically vet access requests: Limit access to enterprise resources only to members of an allow-list who also both prove their identities and their genuine need to access the particular asset in question. Identities should be verified in robust ways. Organizations may continually monitor accounts and devices for suspicious behaviors and characteristics as well as require MFA to access some systems or data and require reauthentication at various points.

7. Gather information to understand and improve security posture: Organizations should collect and analyze as much data as they can about the status of their assets, network infrastructure and communications to help them identify ways to improve policies.

More here:
What Is Zero Trust? A Guide to the Cybersecurity Approach - Government Technology

Read More..

WTF is deep work? Here’s beginner’s guide to the concept – cosmopolitan.com

Ohhh I might just make myself a cuppa. I stop writing mid email. I settle myself back at my desk. Where's my tea? Oops, must have left it in the kitchen. Right, what was I doing? Oh yes, that email. But I might just check one of the approx 10,437 tabs I've got open. Hang on, I might put a wash on, that pile of dirty clothes has been building up and I'm distracted. Then I'll really be able to concentrate. Okay, back at my desk. Urm, what was I doing?

WFH life isn't for everyone. But for lots of us the pandemic means we spend much more of our work-life at home. And now there's news of a four-day week (yes, please). A pilot scheme by 4 Day Week has been taken up by over 30 UK companies, that will be trialling a four-day working week later this year.

On both counts, we really need to be better at getting down to it and being productive when we're actually on the clock. So I caught up with tech entrepreneur Alicia Navarro founder and CEO of startup FLOWN, which creates deep work resources to find out if the concept of deep work might help me get my working hours in order and mean I could potentially get the same amount of work done in four days as five...

So what exactly is 'deep work'? "It's like being in a state of flow: when you're so in the moment, that you aren't aware of time passing. When you're deep into something complex, and you're making connections and getting through meaty tasks faster and more effectively than you normally do. If you're immersed in a piece of writing, or a complicated spreadsheet, or working through some contemplative thinking... this is all deep work."

Deep work is like being in a state of flow

So how does it work IRL, could I set a timer so I can immerse myself in tasks? "Setting yourself blocks of time to do deep work absolutely works, and having that time boxed can give you that motivating push. But there's no one-solution-fits-all to deep work. Everyone approaches focus in different ways. The best thing you can do is experiment with your own psychology: try using live deep work sessions [which are available if you join FLOWN, free trial also available FYI] to see if that works for you.

"Many people swear by the Pomodoro technique, which is a 25 minute timer to get smaller tasks done. However, for proper deep work, you need a couple of hours, as it can take 25 minutes to get into a deep work state once youve been distracted."

Okay, so how do I actually get myself into a deep work state? When I'm WFH, I'm distracted my never-ending laundry bin, but when I'm in the office, I can't resist a chat with my colleagues... "To get into the state of deep work you generally need an uninterrupted expanse of time, because if you're also attending to emails or Slack notifications or in-person conversations, you'll never get into that deep flow state you need. To get that uninterrupted expanse of time, you need to prioritise deep work into your day, so that the "shallow work" emails, calls, chores doesn't fill your entire day.

"You know when you finish your work day sometimes, and you feel like you've achieved nothing, but you haven't actually stopped working all day? Usually that's because you've prioritised shallow work. Often, our best days are when we know we tackled something complex, and got it done. Deep work is about reorganising the way you work so you feel this way every day.

Come up with your own ritual that you repeat whenever you want to get into a deep work state

"Deep work prioritises challenging tasks, and working on them in a focused, distraction-free manner. Distractions are everywhere, you cant escape them. But we can train our brain to resist them. Rituals help rituals are habits or routines that you repeat regularly with intention. Come up with your own deep work ritual that you repeat whenever you want to get into a deep work state (for example, setting a timer or moving to a different space). With repetition and intention, youll train your brain to focus when you commence this ritual."

Nora Carol PhotographyGetty Images

Okay what's some tips for creating the best space to do deep work? "One of the best ways to achieve deep work is to get away from your day-to-day. This means deliberately going somewhere else perhaps somewhere close to nature to work on a particular project. The reason this is so effective is that by making the decision to go somewhere different, your mind focuses more deeply on the task, and makes it easier to get into a deep work state. Also, changing one's environment is a key ingredient to boosting your mental powers and accessing creative reserves that may otherwise lie dormant when you are stuck in the same mental and physical space, day after day."

What can you do in between periods? "The key to maintaining focus when you work is to deliberately not work between sessions. Play is vital: it's restorative as well as the source of creative spark, so play with your dog or child, do something silly, or explore a new idea with an inquisitive mind."

Could you actually get as much done in a four-day week? "Great ideas often come when you're in the shower, or going for a jog, or talking to someone interesting. So, we recommend weaving these activities into your life to imbue your work with more energy. On an individual level, if youre able to teach yourself to focus in bursts of time where before you might have spent too much time procrastinating, then a shorter work week is totally achievable."

This content is created and maintained by a third party, and imported onto this page to help users provide their email addresses. You may be able to find more information about this and similar content at piano.io

Visit link:
WTF is deep work? Here's beginner's guide to the concept - cosmopolitan.com

Read More..

15 2 Chainz deep cuts that prove his greatness – British GQ

He even cites the ubiquity of Johnny Manziel during his Texas A&M days as an example of a wildly popular athlete who wasnt able to profit off of his fame at the college level. Since June 2021, the NCAA has changed its rules to allow players to earn money off their name, image, and likeness. Were not saying its all thanks to 2 Chainz, but he certainly made a compelling argument.

Statute of Limitations (Rap or Go to the League)

Ex-drug dealer, ex-athlete, 2 Chainz raps succinctly on this efficient summary of two key tenets of his identity. Statute of Limitations'', easily one of the standout tracks from his fifth studio album, focuses primarily on the first role (it was even originally titled Ex-Drug Dealer).

Over a rattling Mike Will Made-It beat, Chainz recalls his hustling days with the candour and the name-dropping of a tell-all memoir. He talks about selling to Atlanta stalwarts (Lil Jon, Young Jeezy) and out-of-towners like Young Buck and Raekwon. Hell, even a few NBA players get mentioned as former customers even though its worth taking all of that with a grain of salt. The vocal delivery is first-rate, too. 2 Chainz is nimble and dexterous but preternaturally calm, the way youd expect someone who made a living selling drugs to celebrities would be.

Toni (So Help Me God!)

Like a lot of what he does, 2 Chainz adopting the moniker Toni seemed like another goofy, bombastic quirk, but held a deeper significance. Toni derives from the neighbourhood Im from, Old National: Everybody who sold powder or anything like that, their name was Tony. You would get called Tony: Black Tony, White Tony, Big Tony, Lil Tony all the different likenesses. Im just Big Toni at this particular point in my career. The biggest Toni, he told Apple Music.

Toni is a real chest-pounder, right down to its brief inclusion of David Banners classic Like a Pimp beat. Chainzs consistent cadence and the way both verses are entirely rapped in the third person allows the listener to zero in on the lyrics and note the juxtaposition between outlandish boasts (Toni used to buy the lean by the fuckin' keg) and the more nuanced (Toni used the same stove for the turkey bacon).

Free B.G. (Dope Dont Sell Itself)

This content can also be viewed on the site it originates from.

2 Chainz isnt just a longtime friend of Lil Waynes, hes a devout acolyte of the Hot Boys. Theyve inspired one of his most fun singles (Used 2) and are on the forefront of his mind on Free B.G., one of the stronger tracks off Dope Dont Sell Itself.

Atop a menacing, Mannie Fresh co-produced beat, Chainz sounds invigorated and in vintage form. Hes using a PPP loan to buy weight. Hes leaving his car parked in public, knowing no one would dare try to jack it. Hes taking his jewellery on vacation, which he says in a way that sounds more like hes bringing the chains on a romantic getaway, and less like hes just packing a suitcase. Clocking in under two minutes, Free B.G. isnt a major addition to the 2 Chainz discography, but it can slot in on a playlist with any of his best solo tracks and keep the momentum going.

NOW READ

Saba is ready to return to the light

Robert Glasper is a Kenny G stan, too

Free Digga D! A rare interview with the most influential British rapper of our time

Read this article:
15 2 Chainz deep cuts that prove his greatness - British GQ

Read More..