Page 2,447«..1020..2,4462,4472,4482,449..2,4602,470..»

Shares of companies in the metals and mining space are trading lower as omicron concerns and worse-than-expected US job growth data weigh on economic…

This headline-only article is meant to show you why a stock is moving, the most difficult aspect of stock trading. Every day we publish hundreds of headlines on any catalyst that could move the stocks you care about on Benzinga Pro, our flagship platform for fast, actionable information that promotes faster, smarter trading.

Benzinga Pro has an intuitively designed workspace that delivers powerful market insight, and is the solution of choice for thousands of professional and retail traders across the world.

Stop Googling for information and check out Benzinga Pro. You will never again be left in the dark on when a stock moves. Youll have what you need to act in real-time before the crowd.

Start your FREE 14-day trial of Benzinga Pro today.

See original here:

Shares of companies in the metals and mining space are trading lower as omicron concerns and worse-than-expected US job growth data weigh on economic...

Read More..

Did the Cybersecurity Stakes Get Even Higher in 2021? – GovTech

In 2021, cybersecurity got more serious. Already a growing threat, ransomware exploded, with attacks becoming more frequent and costly. The volume of ransomware attacks against U.S. targets rose 185 percent year over year in the first half of 2021, according to Internet security solutions provider SonicWall. Criminals also leaned hard on double extortion and turned their efforts against organizations like food supplier JBS and Colonial Pipeline, where system interruptions wouldnt just harm the victim and their clients, but also a broad swath of society.

Federal response got more serious, too, homing in on defending critical infrastructure, and states havent sat on the sidelines, either. Several moved to ban ransom payments and direct more resources toward defending against the threats, although researchers say fully tackling the problem requires national and international coordination.

Nation-state-driven cyber espionage by Russia and China also loomed heavy in public consciousness, particularly the SolarWinds incident, attributed to Russia. That saw a compromised security patch spread malware to clients, including government agencies, and woke up the U.S. to the need for software supply chain security. Calls for reviewing software development environments and creating a software bill of materials became more pressing.

The federal government also turned attention to states and localities, where efforts to modernize legacy systems and upgrade defenses are often held back by shortages of money, people and guidance on how to invest most impactfully. The Cybersecurity and Infrastructure Security Agency (CISA) has been working to become a go-to resource, however, and could gain more powers and programs next year under the National Defense Authorization Act (NDAA) for Fiscal Year 2022, which has not yet passed at time of writing. Federal efforts like these are also unleashing more dollars, but states and municipalities will need sustained funding.

Even so, agencies cannot just hire their way into safety. They also need to continually train and retrain existing staff about best practices for staying safe and properly implementing technologies. Artificial intelligence tools are helping scan for vulnerabilities and suspicious activity, but cyber criminals will always find plenty of traction in tricking humans. Phishing is the jumping off point for many successful scams and ransomware attacks, with one email fraud incident costing a New Hampshire town $2.3 million. Agencies, therefore, must keep employees cyber awareness fresh.

Not all cyber risks come from deliberate, malicious action, either. Staffs technological mistakes can also be devastating, with failures to adhere to the correct procedures resulting in the Dallas Police Department permanently deleting troves of case materials and Wyoming leaking residents health data, to name just two 2021 examples.

Agencies are becoming more attuned to the need to safeguard residents privacy, whether through security measures intended to thwart data breaches or by simply avoiding ever collecting or retaining information beyond whats strictly necessary. States continued to add chief privacy officer posts in 2021, underscoring the growing attention put on such concerns.

State and local governments are still grappling with unfounded allegations of 2020 voting fraud, with Maricopa County, Ariz.s widely panned Cyber Ninjas election audit only concluding in September, and Wisconsin and Pennsylvania looking to launch their own.

Meanwhile, mis- and disinformation aimed at undermining trust and misleading voters spurred the Jan. 6 insurrection and death threats against election workers. Advocates in 2021 have increasingly drawn attention to how social media platforms amplify falsehoods, and combatting false information as well as curbing other social media harms will remain a major concern of policymakers.

Go here to read the rest:
Did the Cybersecurity Stakes Get Even Higher in 2021? - GovTech

Read More..

Tharoor and team say net blackouts cost India $2.8 billion in 2020, suggest banning social media for public security – Times Now

Shashi Tharoor-led parliamentary committee on Information and Technology has flagged the issue of internet shutdowns in India.  |  Photo Credit: PTI

There is a price for the frequent internet shutdowns in the country and it is not cheap. The Parliamentary Standing Committee on Information Technology, led by Congress leader Shashi Tharoor presented a report titled, Suspension of Telecom and Internet Services and Its Impact in the Lok Sabha on Wednesday.

The report highlights how frequent shutting down of telecom services and the internet affected life and liberty of people. It goes on to say that the frequent internet shutdowns cost the country $2.8 billion in 2020 and called for defining the parameters and a robust mechanism for internet shutdown.

Team Shashi Tharoor has a good reason to be miffed. The governments at both, the Centre and State levels in India have been infamous for frequently shutting down internet services at the drop of the hat. A report by Forbes goes on to say that India shuts its internet down more frequently than any other democracy in the world.At the dawn of this year, the Centre ordered a series of internet lockdowns. In January 2021 alone, the country had seen seven incidences of internet shutdowns which included the ones around the farmers protest site in Haryana and the national capital region. While the internet services were suspended around the protest site and not extended at the protest site, it had nevertheless attracted worldwide criticism.

This was not the only time. Data shows that between 2017 and early 2021, India had witnessed 409 incidences of internet shutdown. The worlds longest internet shutdown was also reported in India when services were blacked out in Jammu and Kashmir for 223 days between August 4, 2019, and March 4, 2020 after Article 370 was abrogatedin the Parliament. Besides J&K, maximum internet shutdowns have been witnessed in Rajasthan, Uttar Pradesh, West Bengal, Haryana, and Maharashtra, with blackouts lasting for days at a stretch 21 shutdowns in 2017, five in 2018, and six shutdowns in 2019 lasted for more than three days.

And this provision to shut down the internet has been facilitated by the law. The Temporary Suspension of Telecom Services (Public Emergency or Public Safety) Rules, 2017, under the Department of Telecommunications (DoT) allows temporarily suspending the telecom services, including that of the internet in an area. It can be ordered either by the Union Home Secretary or the State Home Secretary in an event of public emergency or the interest of public safety.

And it is this ambiguity of public emergency that the report by Tharoor and team highlights. As of now, "there is no clear-cut definition of what constitutes a public emergency and public safety" says the report adding that in the light of such ambiguity, shutdowns have been ordered purely based on subjective assessment and reading of the ground situations by district level officers and are largely based on executive decisions.

The committee further added that the suspension rules have been "grossly misused" and this has led to untold suffering to the public, massive economic losses and more importantly, reputational damage to the country.

The committee also pulled up the State governments over the lack of proper records relating to telecom services/internet shutdowns ordered by them and recommended that both DoT and Ministry of Home Affairs should establish a mechanism at the earliest to maintain a centralised database of all internet shutdown orders in the country.

The question now comes to what is to be done in case of a genuine crisis dealing with a public emergency or public safety situation. The committee has an answer. It recommends that instead of shutting down the internet, the government can explore the option of banning of selective services, such as Facebook, WhatsApp, Telegram, etc. instead of banning the internet as a whole.

Read the original post:
Tharoor and team say net blackouts cost India $2.8 billion in 2020, suggest banning social media for public security - Times Now

Read More..

GTT Partners With Palo Alto Networks to Power Its SASE Platform – GlobeNewswire

MCLEAN, Va., Nov. 30, 2021 (GLOBE NEWSWIRE) -- GTT Communications, Inc., a leading global cloud networking provider to multinational clients, has announced a managed security service partnership with Palo Alto Networks, the global cybersecurity leader, to power its new SASE platform that will enhance the security, efficiency and control functionality of enterprise networks. The partnership will leverage industry-leading networking and security capabilities of the two companies to fortify the security of network access and use of cloud applications from any location and any device as enterprises adapt their networks to the more dynamic requirements of a hybrid workforce. IDC estimates that 53% of workers are planning to continue to work remotely or adopt a hybrid home-office arrangement as a result of the pandemic.1

The new GTT SASE platform, which utilizes Palo Alto Networks Prisma Access, will deploy a comprehensive set of security features into a single cloud-delivered platform that protects all application traffic, providing seamless connectivity to GTTs global Tier 1 network for the best possible application performance and user experience for customers. The integrated networking and security functions reduce complexity, increase centralized control and efficiency, improve network performance and latency, and enable businesses to adopt a zero-trust network access approach that mitigates security vulnerabilities that can result from a work-from-anywhere model. With the new GTT SASE platform, users will gain access to the network based on their identity, device and application rather than the IP address or physical location enabling seamless and secure networking between users, private and public clouds, and the enterprise data center.

According to Gartner, Digitalization, work from anywhere and cloud-based computing have accelerated cloud-delivered SASE offerings to enable anywhere, anytime access from any device. Gartner projects that by 2025, at least 60% of enterprises will have explicit strategies and timelines for SASE adoption encompassing user, branch and edge access,up from10% in 2020.2

Customers are seeking highly secure and flexible global network solutions to adapt to the rapidly changing business environment, new workforce models and ever-expanding security threat landscape, stated Don MacNeil, GTT COO. Adopting the most advanced security and networking technologies, and enabling our customers to leverage them readily, is the centerpiece of our product strategy, and we are pleased to partner with Palo Alto Networks to meet the stringent security requirements of our customers that GTTs SASE global network services platform will deliver.

Kumar Ramachandran, SVP of Products at Palo Alto Networks, stated, Our partnership with GTT will bring forth an exciting opportunity for customers. Many organizations are now turning to managed security service providers to achieve security that is easily implemented as an overlay service to simplify deployments at the branch. As a result, this new partnership will bring secure cloud scalability to the customers of GTT.

__________________________1 IDC, Enterprise Networking: Emergence of the New Normal Survey, December 2020, U.S.2 Gartner, 2021 Strategic Roadmap for SASE Convergence, Neil McDonald et al., 25 March 2021.

About GTT

GTT provides secure global connectivity, improving network performance and agility for your people, places, applications and clouds. We operate a global Tier 1 internet network and provide a comprehensive suite of cloud networking and managed solutions that utilize advanced software-defined networking and security technologies. We serve thousands of businesses with a portfolio that includes SD-WAN and other WAN services, internet, security and voice services. Our customers benefit from a customer-first service experience underpinned by our commitment to operational excellence. For more information on GTT, please visit http://www.gtt.net.

GTT Media Inquiries:Ed Stevenson, LEWIS+44-207-802-2626gttuk@teamlewis.com

GTT Investor Relations:Charlie Lucas, GTTVP of Financeinvestorrelations@gtt.net

Read more from the original source:
GTT Partners With Palo Alto Networks to Power Its SASE Platform - GlobeNewswire

Read More..

Cloud computing is changing everything about IT skills. Here’s what that means for your job – ZDNet

Cloud adoption is booming, with low-code and automation tools having proved extremely popular in the past two years.

Multi-cloud is increasingly winning favour among organizations looking to diversify their technology stacks and pick and choose cloud-computing services from different providers according to their needs.

Managing the Multicloud

It's easier than ever for enterprises to take a multicloud approach, as AWS, Azure, and Google Cloud Platform all share customers. Here's a look at the issues, vendors and tools involved in the management of multiple clouds.

Read More

As businesses increasingly shift their infrastructures, employees will likewise require a broader range of technical skills.

SEE:Remote working jobs row shows how much tech has changed

Milind Govekar, chief of research at Gartner, says one of the biggest changes in the workforce will come as organizations lean harder into automation -- which he calls "the centrepiece" of cloud business strategies.

"Automation changes the entire mindset of the IT organization, particularly the infrastructure and operations organization, where they need to stop being administrators and become programmers -- completely different skillsets," Govekar tells ZDNet.

Automation has spiked in popularity in response to the digital skills gap and businesses' need to launch digital services quickly because of the pandemic.

Low-code and no-code tools, for example, have become a favourite among businesses that need to get products and services onto the cloud quickly. Gartner believes this popularity will continue, and predicts that the use of low-code and no-code tools will triple by 2025.

Low-code and no-code tools may prove to be useful assets for administrators juggling multi-cloud environments, but this doesn't necessarily equate to a downturn in the need for traditional software development and coding skills.

"More than ever there's a huge demand for software skills, especially to solve complex problems -- many of which cannot be solved singlehandedly by low-code tools," says Tracy Woo, senior analyst at Forrester.

Using low-code tools frees up experts on tech teams to focus on more advanced issues and services, says Woo: "This in turn means that skill sets required will focus on expertise or comfort with these tools along with overall comfort and experience with managing and handling cloud environments."

Increased automation as a result of cloud adoption may, however, lead to a reconfiguration of other roles and responsibilities. For instance, as routine tasks increasingly become automated, workers previously charged with administrative, monitoring or maintenance duties may be reskilled, or deployed elsewhere.

According to Pega's November 2021 Future of IT report, automation could also make it more difficult for managers to rise through the ranks. With so many tasks being automated or outsourced to the cloud, IT management as a competency will either disappear or become less relevant, it says. This was the opinion of more than 40% of the 750 IT leaders surveyed by the software company.

The upshot, says Pega, is more time to spend on creative work, while "changes to the nature of their work mean jobs will still feel easier and more streamlined."

The report adds: "Many different technology trends, including intelligent automation and data analytics, are fuelling a reduction in workload. Time saved will be used to make a bigger impact through strategic deployment of tech to solve business problems."

Non-IT employees will also require better knowledge of cloud tools, particularly as remote working becomes commonplace.

A recent report by Amazon Web Services (AWS) found that cloud dominated the list of key digital skills employers say will be most in-demand by 2025. And yet it found that just 45% of workers have trained or are training in cloud skills.

More advanced cloud skills will also be in high demand, such as the ability to move organizations from on-premises facilities to the cloud (cloud migration), as well as cloud architecture expertise. Just 16% and 15% of workers are trained in these areas respectively, AWS found.

"Applications are shifting from monolithic apps to multi-tiered line-of-business apps that use smaller units of code that developers can both scale and modify independently," says Woo.

"As a result, companies are looking for automation skills, familiarity with continuous integration and continuous delivery tooling, knowledge of infrastructure-as-code solutions, and those that can collaborate closely among the app developers and infrastructure teams, as each will need to lean on and learn from each other coding and infrastructure principles."

SEE:Digital transformation is changing what it means to work in tech

Govekar believes the biggest challenge for business leaders now is to anticipate the skills they will need in the future and the roles that will be key to the organization several months, or even years, down the line.

"Recruiters often talk about back filling roles. For cloud, you need to do forward filling," he says.

Forward filling means looking and recruiting for skills that you are going to need in the future.

This requirement is likely to present an exceptional recruitment challenge for companies who are already struggling to fill critical IT and tech roles, particularly as many business leaders appear reluctant to invest in upskilling their existing workforces.

"Very few organizations are putting aside money for that kind of training," Govekar adds. "Many organizations are finding it very difficult to understand what the balance is between doing [training] on the job, versus taking a more systematic approach.

"I was talking to another organization recently who said, 'The moment I upskill and train my person in AWS and Google or Azure, or anything else, they are [offered] more somewhere else -- I am literally training them up for someone to grab."

More here:
Cloud computing is changing everything about IT skills. Here's what that means for your job - ZDNet

Read More..

re:Invent recap: Amazon showcases cloud computing innovation – VentureBeat

Hear from CIOs, CTOs, and other C-level and senior execs on data and AI strategies at the Future of Work Summit this January 12, 2022. Learn more

Amazon held its 10th re:Invent conference this week. The annual event, held this year in Las Vegas as well as online, reveals new technologies designed to support its Amazon Web Services (AWS) arm, one of the leading platforms for cloud computing.

The tech giants first AWS re:Invent in 2012 was a humble affair with only 6,000 attendees, dominated by startups and emerging technology partners. Fast-forward to 2021: Its now a well-attended conference for the industrys top IT execs and technical decision-makers.

The in-person event featured keynote speakers, announcements about its latest tech innovations, as well as training and certification opportunities.

Amazon revealed the latest it has to offer, but a few announcements took center stage. The following is a collective overview of VentureBeats coverage on the top news coming out of AWS re:Invent 2021.

AWSs CEO Adam Selipsky revealed news of accelerated chips, effortless machine learning models, fortified artificial intelligence, robotics technology, data lakes, and more.

were making it even easier to prepare and gather data for machine learning to train models faster and expand machine learning to an even broader audience, Selipsky said. Its really going to enable a whole new group of users to leverage their data and to use machine learning to create new business insights.

The announcements that followed Selipskys keynote would only prove to bolster that statement. AWS re:Invent 2021 largely focused on tools that are both bolstered to provide strong data and analytics infrastructures, and enhance efficiency for those using the many tools across the swath of Amazons cloud computing platform.

As the cloud computing industry is rapidly evolving, so is the demand for faster, more efficient developer-friendly tools. Cybersecurity threats and ransomware are rampant and growing. Against this backdrop, AWS announced automation for the management of vulnerabilities on its platform, to address vital security requirements in the cloud.

The sharp pivot to increased digitization for companies across industries, sparked by the coronavirus pandemic, has increased the use of cloud-native tech and platforms. In an interview, VentureBeat heard the concerns and perspectives from 10 startup companies regarding AWS security. A key takeaway: cloud securitys most notable advantages include lower cost and lower demand on resources than on-premises security.

Amid the rise in popularity of digital twin simulations, the company also announced IoT TwinMaker and IoT FleetWise for AWS. The tools are designed with user accessibility in mind: making it easier and more cost-effective to innovate. Its IoT TwinMaker allows developers to easily create digital twins of real-time systems such as factories, industrial equipment, product lines etc. The IoT FleetWise tool is specifically tailored for automakers to efficiently collect, transform, and transfer vehicle data in the cloud at a faster rate.

In addition, Amazon also announced its dabbling in the quantum computing arena with the announcement of AWSs cloud quantum offering known as Braket.

Bracket allows users to write quantum algorithms and lease time on quantum processors without a commitment. At re:Invent 2021, AWS shared that its Braket service can now run quantum algorithms as hybrid jobs. For now, theres no integration with many other tools, but as quantum computing grows in accessibility and popularity, this integration is likely to be announced at a future conference.

With such rapid growth both in size of its AWS re:Invent conferenceand in the tech featured at it on the past 10 years, looking ahead at the innovation the next 10 years will produce, AWS re:Invent in the year 2032 will undoubtedly pave the way for further transformation in the tech industry transformation that minds have yet to even consider possible.

Here is the original post:
re:Invent recap: Amazon showcases cloud computing innovation - VentureBeat

Read More..

What is ‘The Cloud’ and How Does it Pervade Our Lives? – Scientific American

Youre surrounded by it.

You cant send an e-mail without touching it.

You cant watch your favorite streaming series without welcoming it into your home.

You dont know where youre going, but its tracking your every move and telling you to turn left.

It is the cloud, and whether you realize it or not, it has probably taken over your digital life.

But what is the cloud actually?

The cloud is a system of millions of hard drives, computer servers, signal routers and fiber-optic cables.

These elements are, in a way, like the water droplets, ice crystals and aerosols that make up a true cloud.

They are nebulous. They are constantly shifting. But they are in close connection with one another over large distances of space and time.

The clouds true purpose is to float unseen all around us, silently, creating ever present connectivity.

And just like a real cloud, it can bring benefitsand danger. The cloud is making services more affordable and accessible to people all over the world. It helps businesses update products for their customers and enables remote work across industries. But it also opens us up to behavior tracking at each and every Web site we visit. It can put our virtual privacy in the hands of tech giants. And should the cloud ever fail, our increasing, mostly unknowing dependency on it will become painfully clear.

To understand why, lets take a step back to the early days of the cold war with the Soviet Union.

After the Soviets beat the Americans to space in 1957, the U.S. Department of Defense decided it needed to work harder on research and development. The following year, it formed the Advanced Research Projects Agency. That agency would create the rough draft of the Internet a decade later. It was called ARPANET, and it connected four university computers via telephone lines.

ARPANET was the offspring of a novel and controversial view of computers championed by engineer and psychologist J.C.R. Licklider.

In 1962 Licklider, known as Lick, was put in charge of the agencys Information Processing Techniques Office. And with his budget, he advanced a view of these machines that was very different from that of his peers.

Lick didnt believe in building new computers for every project. Instead he wanted to consolidate resources into a network of thinking centers that individuals could access as needed. This vision, which became the basis for ARPANET and later the Internet, is the premise of cloud computing.

When you access data on the Internet, youre actually requesting files from a server. The files are broken into tiny packets of information, which may travel together or take completely different routes back to your device, where theyre reassembled. The particulars may get a bit complicated, but all that really matters is that youre connected to the network.

One of the firstvisual representations of a network as a cloud comes from 1971.

The previous year, telecom giant AT&T introduced Pittsburgh to the Picturephone, a kind of early videoconferencing system. It was meant to run over digital systems and phone lines. In 1971 Irwin Dorros, then at the companys Bell Telephone Laboratories, published a schematic of the system.

It showed a couple of cloudlike shapes that would tie together the hardware neededeven if Dorros didnt know which computers or phone lines would be working together at any one time.

By the early 1990s, engineers had gotten used to referring to the Internet this way. But the idea of cloud computing really went mainstream in the 2000s. In March 2006 Amazon launched its first cloud-based service as part of its Amazon Web Services, or AWS.

Initially, Amazon just planned to build a platform to help other companies set up online shops. But it quickly started to recognize that many of the tools and databases it was building could be useful outside of e-commerce.

Amazon began renting out server space and database tools that allowed companies to launch and maintain applications much more cheaply than starting from scratch. For instance, Zillow, the online real estate Web site, uses AWS to store 100 terabytes of house pictures and data rather than maintaining the necessary servers itself.

Using an outside server can be safer than managing your own, because its much less likely to overload, and many of these servers will back up your files for you. Most cloud computing services also come with optimization tools to handle traffic spikes and lulls, and many have data centers around the world, making sites load faster for international users.

The cloud can also give you access to more computational power than you can easily get on your own, letting you effectively use a supercomputer from your smartphone.

Cloud services generally fall into three categories: software, platforms and infrastructure.

Cloud-based software are just applications that run on the Internet so users dont have to download anything. This category is especially popular for widely used programs such as the instant messaging platform Slack or the file sharing app, Dropbox.

Next, cloud platforms, such as Googles App Engine, are digital environments that developers build their software to run on.

Last, cloud infrastructure provides server space that a customer manages remotely.

Consolidating the digital world onto a few powerful servers is extremely efficient. And the cloud brings us unprecedented connectivity. Its the basis for the Internet of Things, in which embedded sensors connect physical objects such as farm vehicles or building thermostats to the Internet. Once connected to the cloud, all of these things can act autonomouslydoing work for us without human intervention.

But while the cloud can make our jobs more efficient and our lives more flexible, we pay for those privileges with our data and security. With every action we take online, we hand personal information to companies trying to maximize how much they can profit on us. Many Web sites and apps regularly track our digital movements and sell those data to marketers. Cloud service providers can also collect data from applications built on their servers. This is often done to monitor efficiency, but some worry the data could be abused.

As we connect more of our daily lives to the cloud, we become reliant on a network that controls everything from who we meet on dating apps to whether our credit cards work.

We also lose sight of how fragile the system is. The cloud only exists because of physical parts, such as paper-thin fiber-optic wires that are easily damaged and degrade over time. And when software issues from a company youve never heard of can knock huge chunks of the Internet offline, its hard not to wonder if weve made a bad bargain.

Read more here:
What is 'The Cloud' and How Does it Pervade Our Lives? - Scientific American

Read More..

Cyber Security Today, Dec. 1, 2021 – The FBI seizes alleged ransomware gang member’s funds, a cloud computing security report from Google and more -…

The FBI seizes alleged ransomware gang members funds, a cloud computing security report from Google and more malware found in the Android store.

Welcome to Cyber Security Today. Its Wednesday, December 1st. Im Howard Solomon, contributing writer on cybersecurity for ITWorldCanada.com.

The FBI continues to make some progress against ransomware groups. According to the Bleeping Computer news service, the feds seized bitcoin worth just over $2 million in August from a digital wallet in Texas. The money is allegedly traceable to attacks carried out by the REvil ransomware gang. The digital wallet allegedly belongs to a resident of Russia.

Separately, a report from the NCC Group says the use by ransomware gangs of the double extortion tactic is going up. In October there were 314 double-extortion victims around the world, an increase of 65 per cent over September. Double-extortion is stealing some data and threatening to release it to the public or sell it to other crooks in addition to encrypting the rest of an organizations data. The report also notes that one threat actor, dubbed SnapMC, doesnt bother encrypting data. It only steals data and holds it for ransom.

Cloud computing has several advantages for IT departments. One is that they dont have to worry about rushing to install security updates. The cloud application provider Gmail, Salesforce, Microsoft 365 finds bugs and installs updates fast. However, organizations still have to make sure their systems arent vulnerable to misconfigurations and other errors by employees. In its first cloud threat intelligence report Google says many successful attacks on applications are caused by poor cyber hygiene and a lack of basic security controls. What kinds of problems can happen? Looking at its own service, the report says 86 per cent of compromised Google Cloud Platform instances were used for stealing compute cycles for cryptocurrency mining. Other abuses of Google Cloud included using resources to scan targets, to launch cyberattacks and to host malware. Forty-eight per cent of compromises were blamed on customer accounts that had either no password or a weak password. Another 26 per cent of compromises were due to vulnerabilities in third-party software that organizations installed themselves. One piece of advice Google offers for better security of its cloud customers applies to users of any cloud service: Employees should have to use two-factor authentication for logins. Google also provides a range of security services such as web scanning, a security command center and other capabilities. When IT departments look for cloud providers they should ask if similar services are available and what they cover.

Ive said before that Google makes good efforts to keep malware out of the Android Play store. However, cyber crooks try just as hard to squirm past defences. A report this month from a Dutch cybersecurity company called Threat Fabric shows how some groups do it. They create mobile apps that include a dropper. A dropper is a small piece of code that calls back to a crooks server to download malware onto a victims device. The small size of the dropper code makes it hard to detect. Researchers at Threat Fabric recently discovered 11 apps in the Play store able to infect victims Android devices with dozens of pieces of malware aimed at stealing bank login passwords. Threat Fabric believes the malware has been downloaded over 300,000 times. As is often the case these bad apps pretend to be utilities like QR code scanners, PDF scanners, cryptocurrency apps and fitness trainers. Crooks know that many people love finding new apps to play with on their smart phones. Always remember that when you want to download an app. Be sure from reading reviews and talking to people you trust that an app is trustworthy.

Thats it for now Remember links to details about podcast stories are in the text version at ITWorldCanada.com.

Follow Cyber Security Today on Apple Podcasts, Google Podcasts or add us to your Flash Briefing on your smart speaker.

See the rest here:
Cyber Security Today, Dec. 1, 2021 - The FBI seizes alleged ransomware gang member's funds, a cloud computing security report from Google and more -...

Read More..

How are Organizations Doing with Cloud? – InformationWeek

Enterprises continue to flock to the cloud, anxious to eliminate huge capital expenses in data centers -- but should we demand more from cloud providers?

Its no secret that cloud services providers are prime targets for hackers, and that they can also make mistakes that invite security breaches and data theft.

In 2020, disgruntled Amazon employees released a number of Amazon customer email addresses to third parties.In 2021, Microsoft warned thousands of its Azure cloud computing customers about a vulnerability that left their data completely exposed for the last two years.

Many cloud providers include disclaimers in their contracts for any data loss that clients might experience. If you are a small or mid-sized company, you don't have much leverage to renegotiate these boilerplate provisions, so you are left in a position of both trusting the cloud provider and hoping that your data isn't exposed.

It wasnt that long ago that a public cloud provider shared with me that cloud services platforms were notorious for shortcutting on security and governance practices. So where does that leave their clients?

One step cloud users can take is to ensure that their own liability insurance covers a data breach incident on the cloud. Another step is to thoroughly review a cloud providers guarantees on security and governance before entering into any contract. A third step is to play a more active role in managing and enforcing your own security and governance over your IT assets in the cloud.

All of these steps assist in bullet-proofing cloud users from the cloud security breaches that could occur in the future.

The message for cloud providers is to improve their security and governance practices so clients can feel more comfortable.

The complexity of cloud pricing models can make CIOs long for the days of the internal data center with its fixed, discretionary and amortized costs.

Jonathan Shanks, CEO and co-founder of Kubernetes delivery platform Appvia, discusses a cloud scenario in which four separate cloud platforms, each with its own pricing structure, were engaged.

Lets take a look at AWS Lambda as an example, said Shanks. Imagine you have a web application using the CloudFront CDN [content delivery network]. When a user interacts with the application it triggers a HTTP request through an API gateway that invokes a Lambda function that takes in the data and stores it in DynamoDB.

The requirement here seems quite straightforward. However, you're now consuming four AWS cloud services: CloudFront CDN for caching, API Gateway for routing the HTTP requests, Lambda for execution and handling the request, and DynamoDB for storing data based on that request made by the user. Each of these has its own pricing structure, with some free tiers mixed in.

Needless to say, its difficult to decipher the bill and to understand what youre really paying for -- and its a major reason why one-third of companies are overrunning their cloud budgets by 40%.

Cloud services providers should simplify billings so clients know what they are paying for and can make informed decisions at budget time.

The process for managing a cloud budget as it stands wastes tons of time and resources, said Shanks. Its riddled with frustrations and inefficiencies that are damaging to morale and the operation of teams.

Many organizations offload resources to the cloud and then let cloud services providers manage these resources. When companies make these decisions, they have no guarantee that the cloud provider will manage their resources with the same best practice and security/governance guidelines that the companies would use themselves if they managed these resources in-house.

I don't know why companies complain about this, said one major cloud provider spokesperson to me in this year. If our clients looked at all of the ways and tools that we give them in the cloud to manage their own security and governance and took advantage of these tools, there wouldnt be a problem.

The spokesperson is right. There isn't a single major cloud platform that doesnt offer a plethora of security and governance tools that clients can use.

The problem is many cloud clients arent aware of these tools.

Cloud providers can help by discussing the security and governance tools that are available to clients at the time that contracts are entered into or renewed.

Hybrid computing, characterized by a mix of on-premises IT and multiple clouds, is here to stay. Within this fluid environment, it will be necessary for companies to move from cloud to cloud and in some cases, to terminate cloud services.

The challenge here for companies is the same challenge that they faced whenever computer brands are changed: vendor lock-in.

Companies can help themselves by continuously backing up data that they cloud-host, so they have a current copy of the data that is non-cloud-resident; or by ensuring that multiple copies of the same data are on multiple cloud platforms. For this strategy to work, data must be kept in a standard data format that most clouds understand.

As for cloud providers, it is to their advantage to coexist with other cloud platforms, because their clients certainly will.

Read this article:
How are Organizations Doing with Cloud? - InformationWeek

Read More..

Amazon Way Behind Microsoft, Salesforce, and Oracle in Cloud Software – Business Insider

Amazon Web Services is considered the market leader in cloud computing because of its dominance in the infrastructure space, such as computing power and storage services that enable other applications.

But it still lags behind its biggest competitors, like Microsoft, Salesforce, and Oracle, in one major piece of cloud computing: business applications, more broadly called software as a service, or SaaS.

In a recent survey of this sector bySynergy Research Group, five companies Microsoft, Salesforce, Adobe, Oracle, and SAP accounted for over 50% of the market. AWS, meanwhile, failed to crack the top 20.

"For SaaS, AWS is more of a channel to market for software vendors rather than a SaaS provider in its own right," John Dinsdale, Synergy's chief analyst and research director, told Insider.

For AWS, it's a big market to miss out on. The market for business applications, including everything from Microsoft Office 365 and Salesforce sales and marketing software to Zoom's videoconferencing app, is forecast to be the largest segment among all cloud services, reaching $145.4 billion in 2022,according to Gartner.

Amazon is aware of this. For years, the company has tried to build and grow its own applications business, across email, word processing, and video conferencing, to name a few. But those efforts have so far failed to gain traction, both internally and externally, as Insider previously reported.

To solve this, Amazon recently discussed the idea of acquiring a more high-profile software company to make a splash. Among the list of companies discussed was HubSpot, the $40 billion marketing software maker, as Insider previously reported.

"We have several applications that are very large successes," Amazon's representative wrote in a statement to Insider, highlighting Amazon WorkSpaces and Amazon AppStream, which support tens of thousands of active customers. "Others are earlier in their journey, but we continue to believe they have meaningful potential."

Do you work at Amazon? Contact the reporter Eugene Kim via the encrypted messaging apps Signal or Telegram (+1-650-942-3061) or email (ekim@insider.com). Reach out using a nonwork device.Check out Insider's source guidefor other tips on sharing information securely.

Here is the original post:
Amazon Way Behind Microsoft, Salesforce, and Oracle in Cloud Software - Business Insider

Read More..