Page 2,536«..1020..2,5352,5362,5372,538..2,5502,560..»

Northwell Health and Aegis Ventures to form first-of-its-kind artificial intelligence venture to drive better, more equitable, and lower-cost…

NEW HYDE PARK, N.Y.--(BUSINESS WIRE)--Northwell Health, New Yorks largest healthcare provider, and Aegis Ventures, a New York-based startup studio, today announced they are forming a joint venture (JV) that will ideate, launch, and scale AI-driven companies to address healthcares most challenging quality, equity, and cost problems. The JV will assemble leading medical, technology, and business resources to create a first-of-its-kind company creation platform for healthcare innovation. Aegis Ventures intends to invest at least $100 million of seed-stage funds through the platform to catalyze a significant multiple of that amount from the venture capital and investment community.

The JV will work with stakeholders across the Northwell system to create new patient care solutions through collaboration with frontline clinicians, working side-by-side from ideation to implementation, to develop innovations that use AI to predict, diagnose, and manage health conditions. The parties have already started work on solutions related to improving maternal health outcomes and chronic disease prediction. Alongside this disease focus, the JV will use AI to identify and eliminate operational inefficiencies in healthcare delivery. All technologies and tools will be identified, developed, and validated within the secure Northwell Health environment to maximize data integrity and privacy. Ultimately, the aim of the JV will be to accelerate the speed with which new lifesaving AI solutions reach the patients bedside.

New York was at the epicenter of the COVID-19 crisis, and todays announcement places it at the epicenter of innovation that will tackle healthcares most pressing problems, said Michael Dowling, President and CEO of Northwell Health. This joint venture will leverage data from Northwells patient population, one of the most diverse in the world, along with Northwells intellectual capital in AI technology. Working together, Northwell and Aegis will create companies that bring higher quality, lower cost healthcare to those who need it most.

Northwell has a track record of success in AI research, including the development of a landmark algorithm that predicts patients overnight stability to reduce the need to wake them for vital sign checks. Developed using 26 million measurements from 2.3 million patient visits, the algorithm helps reduce nighttime disturbances to speed patients recovery and discharge. In addition, Northwell serves one of the most diverse patient populations in the United States. Caring for more than 2 million people annually across 23 hospitals and hundreds of other facilities provides the health systems clinicians and researchers with a unique vantage point into the health and wellbeing of traditionally underserved communities. This perspective will be a key aspect of the Northwell-Aegis JV, which will prioritize innovation to reduce racial and socioeconomic biases that drive health inequities and have impaired existing AI solutions.

Aegis experience in commercialization and Northwells experience in clinical care complement each other perfectly, said Aegis Ventures Chairman Bill Schoenfeld. Our joint platform will bring together the medical, technological, and investment talent to launch new companies that address healthcares most pressing challenges.

In addition to linking clinicians, researchers, patients, and other healthcare stakeholders, the Northwell-Aegis JV platform team will include exceptional entrepreneurs, data scientists, engineers, and industry leaders with the commercial acumen needed to bring these innovations to the patients bedside. From day one, the JV will prioritize the needs of patients and clinicians, and develop best practices in ideation, research, and company creation to significantly accelerate the pace of AI development and adoption. This represents a new, more targeted approach to the way in which venture capitalists and healthcare systems can work together to solve major healthcare challenges.

Our mission is to catalyze a new Moores Law in healthcare where, as we continually improve access, we continually reduce cost, said Tom Manning, Chairman of the Northwell-Aegis JV and former Chairman & CEO of Dun & Bradstreet, the leading global provider of corporate information and data analytics. This new effort promises to transform the model for innovation in healthcare and improve outcomes for everyone, but particularly for people who may be lost in the shuffle and most need our help.

Through the launch of the JV, Northwell and Aegis are committed to building an exceptional team who will embrace this unique opportunity to create impact. To learn more about the JV or register your interest in joining the team that will further these unique opportunities, please visit https://aegisventures.com/healthcare-ai/.

About Northwell Health

Northwell Health is New York States largest health care provider and private employer, with 23 hospitals, 830 outpatient facilities and more than 16,600 affiliated physicians. We care for over two million people annually in the New York metro area and beyond, thanks to philanthropic support from our communities. Our 77,000 employees 18,900 nurses and 4,800 employed doctors, including members of Northwell Health Physician Partners are working to change health care for the better. Were making breakthroughs in medicine at the Feinstein Institutes for Medical Research. We're training the next generation of medical professionals at the visionary Donald and Barbara Zucker School of Medicine at Hofstra/Northwell and the Hofstra Northwell School of Nursing and Physician Assistant Studies. For information on our more than 100 medical specialties, visit Northwell.edu and follow us @NorthwellHealth on Facebook, Twitter, Instagram and LinkedIn.

About Aegis Ventures

Aegis Ventures is a next-generation startup studio that partners with entrepreneurs and industry leaders to originate, launch, and scale transformative companies. Our platform brings together market-shaping ideas, permanent growth capital, and ambitious individuals driven to solve major societal problems. We aim to build companies with the capacity for vast impact, with an initial focus on three key areas: data and automation, health and wellness, and digital health and health technologies. Within these verticals, Aegis seeks to create companies that leverage technology to better optimize tradeoffs between quality, access, and cost, focusing on innovations that promote seamless continuity of care, patient empowerment, and better-informed clinical decision-making. To learn more about Aegis, visit our website aegisventures.com and follow us on LinkedIn.

More here:
Northwell Health and Aegis Ventures to form first-of-its-kind artificial intelligence venture to drive better, more equitable, and lower-cost...

Read More..

An artificial intelligence tool is helping retailers and manufacturers weather the holidays by simulating supply chain issues before they happen -…

Visitors watch a digital twins simulation service system for sports venues by Intel at the Apsara Conference, a cloud computing and artificial intelligence (AI) conference, in Hangzhou, in China's eastern Zhejiang province on October 19, 2021. Photo by STR/AFP via Getty Images

Digital twins are used by businesses to run simulations and identify issues before they occur.

Companies are using digital twins to stress-test their supply chains, Technology Review reported.

Digital twins use data on social media, consumers, and global factors to run simulations.

As supply chain disruptions pummel industries across the globe ahead of the holiday season, a simulation tool powered by artificial intelligence (AI) has the power to help businesses predict disruptions to their supply chains and minimize their effects, according to MIT Technology Review.

Digital twins are virtual representations of real-world objects or systems, such as global supply chains, that are used to run simulations and identify issues before they occur. MIT Data Science Lab Director David Simchi-Levi told Technology Review that an increasing number of companies are using this tool to stress-test their supply chains.

"What if there's a drought in Taiwan and the water shortage shuts down microchip manufacturing? A digital twin could predict the risk of this happening, trace the impact it would have on your supply chain, and - using reinforcement learning - suggest what actions to take to minimize the harm," Technology Review reported.

From consumer behavior to geopolitical implications and social media trends, digital twins use vast amounts of data on a variety of factors to run simulations, which trains their AIs to analyze the data and make predictions, according to Technology Review.

For example, British consumer goods manufacturer Unilever PLC owns over 400 brands and offers its products in more than 190 countries. The company teamed up with Microsoft in 2019 to create digital twins of its 300 global plants to optimize their operation, The Wall Street Journal reported.

A pilot digital twin was created for a Unilever facility in Valinhos, Brazil, that saved the company $2.8 million dollars by cutting down on energy use and driving productivity, the company told WSJ.

While it's mostly large companies currently utilizing the technology, Simchi-Levi told Technology Review that with a million dollars and 18 months, a company could enjoy "many of the benefits" of digital twins.

Read the original article on Business Insider

Go here to see the original:
An artificial intelligence tool is helping retailers and manufacturers weather the holidays by simulating supply chain issues before they happen -...

Read More..

China Rapidly Developing Artificial Intelligence, Officials Warn – The National Interest

Officials at the U.S. National Counterintelligence and Security Center (NCSC)warned on Fridaythat Chinas pursuit of artificial intelligence (AI) technology could havemajor implications for the future of the military and economic competition between the two nations. Among other topics, the warnings restated the U.S. warning against private companies in key areas allowing Chinese investment or expertise, urging them to take significant precautions in protecting their intellectual property.

Under the Trump and Biden administrations, relations between Washington and Beijing have steadily become more acrimonious, with increasing consensus from Americas national security agencies that China represents a strategic threat to the United States. Although Biden has made statements advising againstthe creation of a new Cold War with China, and advocated in favor of working together on mutual concerns such as climate change, relations have still remained tenseparticularly since the onset of thecoronaviruspandemic, when the United States reproached China over for its failure to share certain information about the viruss origins. For its part, Beijing has accused Washington of acting in bad faith.

Artificial intelligence has taken on a particularly prominent role in the Chinese government, which has pushed it, along with other high-tech industries such as robotics, as part of its Made in China 2025 development strategy. It is beyond dispute that much of the know-how for these projects was obtained, licitly or illicitly, from the United States, whichby the Trump administrations estimateloses $600billionof intellectual property to China each year.

The acting director of the NCSC, Michael Orlando, told reporters in a rare press conference that the United Statescould not afford to lose the race to develop new technology with China inkey high-security areas, including AI technology, quantum computing, and semiconductor development.

Orlando, however, stopped short of advising businesses to ban Chinese investment or recommending other policies to reverse the loss of intellectual property.

One area of particular concern to the NCSC has been biotechnology and pharmaceuticals, where China has made considerable acquisitions in the past two years. The agency has warned that Chinese-linked firms in the United Statesbenefit from American medical data, which is returned to Beijing.

Orlando underlined that these developments had to be understood as part of Beijings desire to expand its technical knowledge, rather than the initiative of individual Chinese corporations, which were subservient to the state.

TrevorFilsethis a current and foreign affairs writer for theNational Interest.

Image: Reuters

Follow this link:
China Rapidly Developing Artificial Intelligence, Officials Warn - The National Interest

Read More..

Comodo Internet Security – Free download and software reviews …

Comodo Internet Security is the awarding winning and free security solution for Windows that uses a powerful combination of antivirus, firewall, auto-sandbox, host intrusion prevention and website filtering to immediately protect your computer from all known and unknown malware. Our real-time scanner constantly monitors your computer for threats, protecting you from the moment you start Windows. Our cloud-based scanner uses real-time virus blacklists, so you don't have to download updates before you receive protection against newly discovered threats. Did you know traditional antivirus software can only detect around 40% of the viruses in circulation? The other 60% of viruses are allowed to run because they are 'unknown' to antivirus software. Comodo Internet Security protects you against this other 60% by automatically isolating all unknown files in a secure container called the sandbox. Applications in the sandbox run with restricted privileges, write to a virtual file system and registry, and are not allowed to access other processes or your private data. This means any potential new malware is securely locked away instead of being allowed to run amok as it would in other antiviruses. Our Secure Shopping feature provides the next-generation of security for online banking and shopping. Under Secure Shopping, websites will open inside a virtual environment which is isolated from the rest of your system, so nothing you download can infect your computer. No other processes are allowed to interfere with your browser, and your online session also benefits from SSL certificate checking, key-logger protection, website filtering, screen-shot blocking and remote connection prevention. This creates a direct, threat-resistant tunnel between you and your target website which cannot be hacked by malware or online thieves. Whether you are an IT novice or an experienced user, Comodo Internet Security is the ultimate protection against today's dangerous online world.

See more here:
Comodo Internet Security - Free download and software reviews ...

Read More..

What Is Internet Security? | Free Internet Security Suite For PC

Reading Time: 5 minutes

Internet security is a branch of computer security which comprises various security measures exercised for ensuring the security of transactions done online. In the process, the internet security prevents attacks targeted at browsers, network, operating systems, and other applications. Today, businesses and governments are more concerned about safeguarding from Cyber attacks and malware programs that originate from the internet. The main aim of Internet security is to set up precise rules and regulations that can deflect attacks that arise from the Internet.

Internet security relies on particular resources and criteria for safeguarding the data that is communicated or transferred online. The safeguarding techniques include different kinds of encryption such as Pretty Good Privacy (PGP). Besides, the other features of a secure Web setup can include firewalls that prevent undesired traffic, and anti-spyware, anti-malware, and anti-virus programs that work from particular networks or devices to watch online traffic for malicious attachments.

An excellent Internet security safeguards financial details and much more of what is controlled by a company or agencys servers and network hardware. Inadequate Internet security can bring down any business where data (Financial or Sensitive) gets routed over the Web.

One of the best examples of the internet security scams is the internet security essentials a rogue security software behaving to protect the Windows computers against malware and viruses installs itself through the use of a trojan horse. The fake antivirus program affected Microsoft operating systems namely the Windows 9x, 2000, XP, Vista, Windows 7 and Windows 8. It relates to the FakeVimes family of fake antivirus malware!

Internet Security Essentials Alert is a fake program which is part of a scam chiefly devised to deceive the user into paying money for malware.

Internet Security Essentials works like a rogue antivirus software. It uses the scare tactics and fakes the user into believing that it has an association with Windows in order to make the user pay for the malware/virus removal. The symptoms of Internet Security Essentials infection are pretty standard. When the computer gets the infection, the user will notice a fake home screen, which is made to look as if it is a window within Windows, as a system component. The fake interface will run phony system scans to deceive the user.

One of the best examples of the internet security scams is the internet security essentials a rogue security software behaving to protect the Windows computers against malware and viruses installs itself through the use of a trojan horse. The fake antivirus program affected Microsoft operating systems namely the Windows 9x, 2000, XP, Vista, Windows 7 and Windows 8. It relates to the FakeVimes family of fake antivirus malware!

Internet Security Essentials Alert is a fake program which is part of a scam chiefly devised to deceive the user into paying money for malware.

Internet Security Essentials works like a rogue anti-virus software. It uses the scare tactics and fakes the user into believing that it has an association with Windows in order to make the user pay for the malware/virus removal. The symptoms of Internet Security Essentials infection are pretty standard. When the computer gets the infection, the user will notice a fake home screen, which is made to look as if it is a window within Windows, as a system component. The fake interface will run phony system scans to deceive the user.

The scan comes back with details of many threats found on the user computer which arent actually present. However, few fake malware/virus files are actually planted by the malicious Internet Security Essentials program. Thereafter, the user is requested to click on a button that says Remove all, but when the user tries doing it, the fake Internet Security Essentials comes back with a message asking the user to pay for the full version of its software to complete the malware cleaning process. The user is directed to a false website that alleges to be the company website of Internet Security Essentials, however, thats just the payment site for the scam.

A variety of Internet security devices and tools that can be used for businesses and government organizations are needed today. One type needs to help detect the intrusion while the other is should help prevent the intrusion. These tools will greatly help the IT staff when it comes to recognizing issues and in keeping the computer networks safe from threats.

The sophisticated programs are meant to be capable of recognizing a range of threats and ward off attacks respectively. The whole process would include the detection of viruses, spyware, malware, worms, etc. The detection tools will closely observe the system and raise the alarm for the system team to look into the issue when there is a malicious activity happening on the network. On the other hand, the prevention systems (anti-malware systems) enable live monitoring and has the potential to prevent attacks.

As a matter of fact, the Comodo Internet Security packs it all and provides complete protection 24/7 even when a user is not monitoring their computer!

The Comodo Internet Security Suite protects from most of the online attacks and malware activities that can steal the sensitive data stored on a computer. The security suite will robustly stop hackers from accessing financial details and personal information.

Malware arising from the internet can hold a system as a hostage and demand money, secretly gather sensitive information about the computing habits of users, internet activity, keystrokes, etc. Stay protected from all of these threats with the latest version of Comodo Internet Security!

For more insights, take a look at the official page of Comodo Internet Security!

Related Resource:

Remote Access Software

Continued here:
What Is Internet Security? | Free Internet Security Suite For PC

Read More..

VirnetX Zero Trust Networking Technology Implemented by Credit Union Advisor for Ransomware Protection – WSAZ-TV

With Asgard's Zero-Trust EverSafe Backup and Disaster Recovery Service

Published: Oct. 26, 2021 at 9:00 AM EDT|Updated: 11 hours ago

ZEPHYR COVE, Nev., Oct. 26, 2021 /PRNewswire/ -- VirnetX Holding Corporation (NYSE: VHC), an Internet security software and technology company, announced today that the National Credit Union ISAO ("NCU-ISAO"), enhancing Credit Union cyber resilience through information sharing, intelligence, operational guidance, and workforce education, has implemented VirnetX's Zero Trust Networking Technology with Asgard's Zero-Trust EverSafe Backup and Disaster Recovery Service for ransomware protection. EverSafe is built on VirnetX's Zero Trust Networking Technology platform.

VirnetX's Zero Trust Networking Technology with Asgard's Zero-Trust EverSafe Backup and Disaster Recovery Service protects data backups, data in transit, and data at rest on private secure domains, separate and invisible from the public Internet, therefore ensuring data integrity and availability.

Ransomware is the biggest threat to banking organizations with a 1,318% increase in attacks year over year from 2020 to 2021 and depends on the vulnerability of data backups for a successful attack to ensure payment of ransoms. Secure backup and recovery capabilities are the last line of defense against ransomware. Additionally, zero trust security is now recognized as a critical component of any security strategy with 76% of organizations in the process of implementing zero trust security.

"We believe in VirnetX's Zero Trust Networking Technology and were interested to learn more about how Asgard's EverSafe solution could leverage it to create a safe, zero trust backup solution," said Brian Hinze, NCU-ISAO Director and Vice President. "After implementing the solution at NCU-ISAO, the value of the product quickly became clear when we could not see a visible path to our backups, as was advertised.A trusted partner of ours recently said, 'You can't hack what you can't see,' and it certainly holds true in action."

"VirnetX Zero Trust Networking Technology enables EverSafe to improve upon Veeam's best in class backup and recovery platform with unparalleled zero trust security delivering the most secure data protection available anywhere to our clients," said Asgard Chief Executive Officer Brian Waltermire.

About VirnetX

VirnetX Holding Corporation is an Internet security software and technology company with patented technology for secure communications including 4G LTE and 5G security. The Company's software and technology solutions, including its secure domain name registry and Gabriel Connection Technology, are designed to facilitate secure communications and to create a secure environment for real-time communication applications such as instant messaging, VoIP, smart phones, e-Readers and video conferencing. The Company's patent portfolio includes over 190 U.S. and foreign granted patents, validations and pending applications. For more information, please visit http://www.virnetx.com/.

About the National Credit Union ISAO

The mission of the NCU-ISAO is to enable and sustain Credit Union critical infrastructure cyber resilience and preserve the public trust by advancing trusted security coordination and collaboration to identify, protect, detect, respond and recover from threats and vulnerabilities. For more information, please visit https://ncuisao.org/.

About Asgard

Asgard is the leader in zero trust cloud backup and data recovery solutions servicing clients ranging from government municipalities to the small enterprise organization. Located in New York, New York, Asgard leverages data centers around the world to provide these much needed zero trust data recovery solutions to its valued clients wherever they may be. For more information, please visit http://www.asgardmsp.com.

Forward-Looking Statements

Statements in this press release that are not statements of historical or current fact, including the statement regarding VirnetX's technology, may constitute "forward-looking statements" within the meaning of the Private Securities Litigation Reform Act of 1995. Such forward-looking statements are based on expectations, estimates and projections, and certain assumptions made by management and involve known and unknown risks, uncertainties and other unknown factors that could cause the actual results of VirnetXto be materially different from the historical results or from any future results expressed or implied by such forward-looking statements, including but not limited to,including but not limited to (1) the outcome of any legal proceedings that have been or may be initiated by VirnetXor that may be initiated against VirnetX; (2) the ability to capitalize on patent portfolio and generate licensing fees and revenues; (3) the ability of VirnetXto be successful in entering into licensing relationships with its targeted customers on commercially acceptable terms; (4) potential challenges to the validity of VirnetX's patents underlying its licensing opportunities; (5) the ability of the VirnetXto achieve widespread customer adoption of its Gabriel Communication Technology and its secure domain name registry; (6) the level of adoption of the 3GPP Series 33 security specifications; (7) whether or not VirnetX's patents or patent applications may be determined to be or become essential to any standards or specifications in the 3GPP LTE, SAE project or otherwise; (8) the extent to which specifications relating to any of VirnetX's patents or patent applicationsmay beadopted as a final standard, if at all; and (9) the possibility VirnetXmay be adversely affected by other economic, business, and/or competitive factors. The forward-looking statements contained herein are also subject generally to other risks and uncertainties that are described from time to time in VirnetX's reports and registration statements filed with the Securities and Exchange Commission, including those under the heading "Risk Factors" in VirnetX's Quarterly Report on Form 10-Q filed on August 6, 2021 and subsequent filings with the Securities and Exchange Commission, as applicable. Many of the factors that will determine the outcome of the subject matter of this press release are beyond VirnetX's ability to control or predict. Except as required by law, VirnetXis under no duty to update any of the forward-looking statements after the date of this press release to conform to actual results.

Contact:Investor RelationsVirnetX Holding Corporation415.505.0456ir@virnetx.com

View original content:

SOURCE VirnetX Holding Corporation

The above press release was provided courtesy of PRNewswire. The views, opinions and statements in the press release are not endorsed by Gray Media Group nor do they necessarily state or reflect those of Gray Media Group, Inc.

Here is the original post:
VirnetX Zero Trust Networking Technology Implemented by Credit Union Advisor for Ransomware Protection - WSAZ-TV

Read More..

Unified Technology Solution – An InfoNetworks Service that Delivers Managed IT & Network Security Plus Voice and Internet Solutions – Business…

LOS ANGELES--(BUSINESS WIRE)--InfoNetworks today announced a new and unique service called Unified Technology Solution. Promoted as the answer to fill an existing void in the marketplace, InfoNetworks Unified Technology Solution offers businesses managed IT services, complete network security, voice and telephony services, and connectivity via a complete package from a single provider.

For more than a year, businesses worldwide have faced unprecedented global events that are dictating policies and procedures. Companies have necessarily cut key budget items, face new challenges, and manage their businesses with reduced workforce. Many of these organizations have been tasked with creating remote infrastructure to help mitigate the ever-changing landscape and support work-from-home or hybrid work environments.

InfoNetworks Unified Technology Solution is designed to address these challenges with an all-inclusive platform that allows employees, managers, and executives to stay connected and secure both in the office and remotely. InfoNetworks data connections support the added influx of traffic to the office while the included cloud-based PBX allows for extensions to be accessible via mobile device or laptop. The Unified Technology Solution network supports a mix of Desktop, Softphones, Teams, SIP and PRI interfaces. All technologies are managed by InfoNetworks experienced Technical Support and Network Engineering Teams and are monitored 24 hours a day, seven days a week by the watchful eye of CyberSecure(SM), an advanced Network Security Software capable of locking-down up to 500,000 end points.

Our Unified Technology Solution is a four-pronged approach, said Bruce Hakimi, Senior Executive at InfoNetworks. By delivering Managed IT, Network Security, Voice and Data under one source, we can maximize the efficiency and productivity of any organization. He further explained: By being able to oversee all network elements from the data connection to internal Local or Cloud based Network, InfoNetworks has the advantage of acting and resolving issues quickly without having to wait for other vendors.

Although some data carriers may offer a cloud infrastructure, it is not a true Managed IT service. Their support is mostly limited to their equipment and servers and does not cover software applications, internal equipment such as PCs, Laptops, Printers, scanners, WiFi Routers and internal network security. If a printer is not working, a server is down or a laptop is hacked, their help desk will not assist. InfoNetworks Unified Technology Solution offers full LAN support giving businesses the advantages of having an IT team at their fingertips without the overhead cost.

It is like having an in-house IT Department that manages and maintains your entire network, from your voice services to your laptops, said Hakimi. Just think about it: how many companies can direct you to one support number for every type of trouble on your platform from your internet being down to an issue with your Network Security?

Visit link:
Unified Technology Solution - An InfoNetworks Service that Delivers Managed IT & Network Security Plus Voice and Internet Solutions - Business...

Read More..

Mapping home internet activity during COVID-19 lockdown to identify occupation related inequalities | Scientific Reports – Nature.com

Our analysis focused on the urban areas of Sydney and Melbourne during a pre-COVID period (which we use as a baseline), during the first pandemic wave in March and April 2020 (with Australia-wide transmission and mobility restrictions), and during the second wave from July 2020 (with substantial transmission and mobility restrictions in Melbourne but not in Sydney). We identify positive correlations between income security and changes to internet activity during COVID-19. These correlations are consistent with the hypothesis that higher income security is associated with more people working from home during lockdown. This hypothesis is further supported by individual-level data from the CARE survey. We observe that in Sydney this trend persists after the release of lockdown restrictions, indicating the possibility of a new normal of remote working conditions, particularly for occupations associated with higher income security. In Melbourne, we find that the role of children conducting their studies online disrupts these correlations due to an inverse relationship between income security and the proportion of families with children.

Income security is distributed spatially according to distinct patterns, with high values in the central and northeast suburbs of both Sydney and Melbourne (Fig. 2a,b). The upper 50% income security quantile (Fig. 2c) favours managerial and office-based occupations, while the lower 50% quantile (Fig. 2d) contains more service staff and other socially-oriented occupations. The frequency distributions of average income security among SA2s in Sydney and Melbourne (respectively) are provided in the Supplementary Fig. S4, which demonstrates that the distributions in the two regions are not significantly different (two sample t-test, (p = 0.552)). High resolution choropleth maps of income security by region can be found in the Supplementary Fig. S6a.

Geospatial and occupational distribution of income security. The choropleth maps in (a) and (b) demonstrate the geospatial distribution of income security in Greater Melbourne and Greater Sydney (respectively) on the scale of Statistical Area Level 2 (SA2). Areas below the median income security index of 0.1809 are colored orange while those above the median are colored purple. The histograms in (c) and (d) demonstrate the distribution of the population in these regions over the income security spectrum, with indicative occupation types for each bin shown in the bottom y-axis labels (the label corresponding to the most prevalent occupation classification for each bin is shown). For both histograms, waiters have the lowest income security, while anaesthetists have the highest.

To examine the qualitative association between income security and the ability to work from home indicated by the distributions in Fig. 2c,d, we apply the occupation classification method developed by Dingel and Neiman37. This results in a binary (0 or 1) value indicating whether or not a particular occupation type can be performed from home. We found a strong association between income security and the ability to work from home (Fig. 3). This association was observed both by occupation (Fig. 3a) and by geographic region (Fig. 3b). See the Supplementary Fig. S5 for histograms of the distributions shown in Fig. 3a as well as the distributions of the x- and y-axis variables used in Fig. 3b.

Relationship between income security and the ability to work from home. Box plots in (a) compare the distributions of log-transformed income security, grouped by the ability to work from home for each of 321 occupations classified by 4-digit ANZSCO codes. The distributions in (a) are computed from the HILDA survey, 2018. The scatter plot in (b) demonstrates the correlation between average income security for each SA2 region, and the corresponding average proportion of individuals who can work from home, computed from the occupation distribution of each SA2 in the Greater Sydney and Greater Melbourne regions released in the 2016 ABS Census. [Note: the log-transformed income security data in (a) omits 24 occupations that had a value of 0 for income security (no securely employed HILDA respondents), of these, 2 were grouped into the can work from home category and 22 into the cannot work from home category].

To quantify changes to home internet use during COVID-19 restrictions, we aggregated internet activity data from all SA2 regions within Greater Sydney and Greater Melbourne (respectively). Over the pre-COVID baseline, we averaged the per-user upload and download rates from the hours of 9 a.m. to 12 p.m. in order to capture a baseline measurement of putative remote work-related internet activity (see Methods). During the first and second waves of COVID-19 in Australia, peaks in case incidence coincided with the implementation of the most restrictive policies, and were followed by increases in total internet use, which peaked approximately 1 to 3 weeks after implementation of the tightest level of restrictions (Fig. 4).

After identifying time intervals representative of the changes induced by the first- and second-waves of restrictions, we examined spatial variation among individual SA2 regions during those periods. The grey bands in Fig. 4 show the periods over which nbn data was averaged for each individual SA2 in order to examine the spatial distribution of changes to internet activity during first and second waves of COVID-19. For visualisation of spatial trends, high-resolution choropleth maps of internet activity changes relative to baseline can be found in the Supplementary Fig. S6b,c.

Timeseries plots of average daytime internet use, COVID-19 case incidence, and restriction policy implementation for (a) New South Wales and (b) Victoria, Australia. Daily average upload rates per household, per 30 min interval between 9 a.m. and 12 p.m. are shown as blue dots for weekdays (blue dots, the blue line is the 7-day average). Daily case incidence is shown as black dots (the black line is the 7 day average), and dates on which restriction policies were modified are shown as vertical dashed lines for increasing (red) and decreasing (green) restriction levels. The grey bands indicate the dates over which nbn data was averaged for our analysis of first- and second-wave changes. See the Supplementary Fig. S1 for an equivalent timeseries presenting average downloads rather than uploads.

We found that during the first period of restrictions, areas with higher income security tended to exhibit larger increases in internet volume per household (Fig. 5ac). However, these trends were produced by qualitatively different changes for downloads and uploads, respectively:

During the pre-COVID baseline period, absolute download volume tended to decrease with income security, becoming uncorrelated during the first wave of restrictions (Fig. 5a). This transition produces larger increases in download volume in areas with higher average income security (Fig. 5b,c).

On the other hand, absolute upload volume shows baseline rates that are initially uncorrelated with income security and transition to an increasing trend during the first wave of restrictions (Fig. 5d). This produces changes in upload volume that have similar correlations with income security to those observed for downloads (Fig. 5e,f), but that occur due to the emergence of a positive correlation rather than the removal of a negative correlation with the onset of restrictions.

The negative baseline trend of download rates with income security may result from the activity of children. We observed a strong positive correlation between the proportion of families with children and baseline download rates ((rho ~=~0.72~95%;text {CI}~[0.68,~0.75])), and a negative correlation between the proportion of families with children and income security ((rho ~=~-0.39~95%;text {CI}~[-0.45,~-0.32])). This suggests that children engaged in online activity may establish the negative baseline correlation between download rates and income security (Fig. 5a).

Childrens activities also appear to influence the changes observed during lockdown. During the time interval selected to represent the first wave of restrictions (April 18th to April 24th), school holidays were still in effect in Greater Sydney while in Melbourne, children had returned to their studies remotely. Because regions with higher income security tend to have a lower proportion of families with children, remote learning activity weakens the positive association between upload activity and income security produced by adults working from home. Correlations between income security, the proportion of families with children, and internet activity in Sydney and Melbourne (respectively) during the first wave of COVID-19 restrictions are shown in the Supplementary Tables S2 and S3.

Changes to internet use during the 1st wave of COVID-19 restrictions in Australia, plotted against income security for each SA2 region. (a) Shows absolute average household download rates before (black dots) and during (green dots) the selected period (April 18th to April 24th, 2020). (b) Plots the absolute change in average per-household download rate during the first-wave period, and (c) plots the change in download rate relative to baseline. (d) Shows absolute upload rates before (black) and during (green) COVID-19, while (e) shows absolute changes to upload volume, and (f) shows changes to upload volume relative to baseline. In each subplot, the internet traffic quantifiers are plotted against the income security score for the corresponding SA2 region, and Pearsons correlation coefficients with 95% CI intervals are shown in the legends.

For the second wave of COVID-19 (and associated restrictions), we selected the appropriate time period using internet data from Victoria, where the second epidemic wave was concentrated. In Victoria during the second wave, internet activity peaked during the week of August 8th to August 14th. As for the first wave, this home internet activity peak immediately followed the implementation of the highest level of restrictions (Fig. 4b).

Because of the substantially different epidemiological and policy situations in Sydney (New South Wales) and Melbourne (Victoria) during the second-wave period (Fig. 4), we examined the relationship between internet traffic, lockdown policy, and income security for each city separately. Comparing the two cities provides insight regarding changes in behaviour related to the contrasting scenarios. During the second wave, Greater Sydney experienced a series of localised outbreaks with minimal social restrictions, while in Melbourne there was a large-scale epidemic with mandatory movement restrictions.

While household internet traffic declines in Sydney during the second wave relative to the first wave, the positive correlation between income security and internet activity relative to baseline remains prominent for both downloads (Fig. 6a,c), and uploads (Fig. 6d,f). This is despite the absence of formal stay-at-home orders in the Greater Sydney region at that time (though some restrictions on social gatherings remained in place). The time interval between the first and second waves was long enough to support the assertion that behavioural changes made in response to COVID-19 lockdown policies remain observable after those policies have been formally relaxed.

Greater Melbourne behaves similarly in both waves with respect to changes in download traffic as a function of income security (compare Figs. 5a,c, 6a,b). However, changes to upload volumes do not mirror the correlations observed during the first wave (compare Figs. 5d,f, 6d,e). In fact, there are many areas of Melbourne with high income security that show substantial reductions in upload traffic during the second wave, relative to the first. While our data gives no immediate explanation for this counter-intuitive trend, we speculate that it may be due to alterations in work habits that occurred as the lockdown became protracted. Decreases in upload traffic without corresponding decreases in download traffic could result from individuals continuing to perform work activities from home, but participating in less face-to-face online interaction. Conversely, widespread adoption of remote schooling practices could help explain the increase in upload rates for regions in the mid-range of the income security spectrum. Such an effect is consistent with the weak but positive correlations between the proportion of families with children and changes to upload volumes ((rho = 0.15~ 95%~ text {CI}~ [0.033, 0.25]), see Supplementary Table S5). This suggestion is also consistent with the observation that daytime internet activity increases during school holidays, when children are more likely to be in the home (Fig. 1b).

We hypothesise that schooling in the home had a greater impact on internet volume in general, and upload rates in particular, than working remotely from home during the second wave of COVID-19 restrictions in Melbourne. This hypothesis is supported by a preliminary principal component analysis, summarised in the Supplementary Fig. S2. This 3-component PCA shows an increased role of children in determining upload rates in Greater Melbourne during the second-wave period. Specifically, Supplementary Fig. S2 demonstrates a qualitative change in the relationship between the proportion of families with children, income security, and second-wave changes to upload activity. Upload rate is positively associated with the proportion of families with children in the first component (explaining 55% of the variance) and positively associated with income security in the second component (explaining 32% of the variance). In both components, income security and the proportion of families with children are negatively associated. These PCA results support the suggestion that occupation-related correlations between net changes to upload activity and income security are disrupted by the activities of children in online schooling. This may be explained as a competing effect because lower average income security is associated with a higher proportion of families with children ((rho = -0.45~ 95%~ text {CI}~ [-0.53, -0.35]), Supplementary Table S5), while the capacity to work from home increases with income security ((rho = 0.90~ 95% ~text {CI}~ [0.88, 0.91]), Fig. 3b).

Changes to internet use during the second wave of COVID-19 restrictions in Australia, plotted against income security for each SA2 region. (a) Shows absolute download volumes averaged over the baseline period and second wave of COVID-19 restriction policies (August 8th to August 14th, 2020), which includes baseline (black dots), 2nd wave values for Greater Sydney (blue squares), and second wave values for Greater Melbourne (orange triangles). Plots (b) and (c) show the change in download volumes relative to pre-COVID baseline as a function of income security index for each SA2 in Sydney and Melbourne, respectively. Plots (d), (e) and (f) show the same analysis as (a), (b), and (c), respectively, for uploads rather than downloads. In each subplot, the internet traffic quantifiers are plotted against the income security score for the corresponding SA2 region, and Pearsons correlation coefficients with 95% CI intervals are shown in the legends.

To confirm that the household-level trends inferred from SA2-level aggregate variables corresponded to observations made on the individual level, we analysed representative data from Victoria collected by the CARE study. While the CARE study did not collect data on income security per-se, it did record the annual income bracket reported by each respondent.

One of the survey questions was posed as follows: Have you personally experienced a change in work environment (working from home) because of COVID-19 and the measures to prevent its spread? (yes or no). We computed the proportion of respondents who reported income above and below (or within) the median income bracket for the sample (sample median annual income was $AUD 60,000 to 69,999) who answered yes to this question. We then performed a two-tailed Fishers exact test to determine the resulting odds ratio between the two groups, and its statistical significance given the response numbers (see Table 1). The results demonstrate a strong positive relationship between income and switching to work from home, with an odds ratio of 2.15 (95% CI [1.59, 2.92], (p = 6.8times 10^{-7})) computed for the above-median income group, relative to the median-and-below income group. While the income data tabulated by the CARE survey is not an exact representation of the income security score used in our analysis of internet trends (which incorporated contract classification), this result supports the same conclusion: those with higher financial security have more capacity to change their work environments in response to COVID-19 restrictions.

In summary, our results support the hypothesis that occupational factors link the ability to work from home with income security, and clearly show how this link produces strong positive correlations between income security and increases to home internet activity during COVID-19 restrictions. These correlations are consistent with the assertion that higher income security is associated with more people working from home during lockdown. This assertion is further supported by individual-level data from the CARE survey. We observe that in Sydney this trend persists after the release of lockdown restrictions, indicating the possibility of a new normal of remote working conditions, particularly for occupations associated with higher income security. In Melbourne, we find that the role of children conducting their studies online disrupts these correlations due to an inverse relationship between income security and the proportion of families with children.

Read more:
Mapping home internet activity during COVID-19 lockdown to identify occupation related inequalities | Scientific Reports - Nature.com

Read More..

Adams Township clerk speaks out after being removed from election responsibilities – The Hillsdale Daily News

The Michigan Bureau of Elections has relieved Adams Township Clerk Stephanie Scott of her duties in administering elections, including next week's vote.

The Michigan Secretary of States Office pressrelease indicated Scott failed to comply with legal requirements necessary to ensure the safety and security of upcoming elections and that Hillsdale County Clerk Marley Kasts office will supervise elections in Adams Township until further notice.

The voters of Adams Township expect, deserve, and have a right to have their election carried out in accordance with all state and federal laws, said Secretary of State Jocelyn Benson. I am confident that the Hillsdale County Clerk's office will administer the election in a manner that ensures that it is legal, transparent, and secure.

The release said the Adams Township clerk did not allow preventative maintenance on voting equipment, a necessary safeguard to ensure tabulators and voter assist terminals used by voters with disabilities are functioning properly on election day.

According to the Secretary of State, Scott also stated she was unwilling to complete required certifications of Public Accuracy Testing of voting machines which confirms vote counting machines are accurate and is done transparently with public viewing allowed to affirm faith in their performance.

Reportedly, Scott also said she may try to conduct future elections without the certified voting equipment selected by Hillsdale County.

Following multiple letters from the Bureau of Elections, she refused to confirm that she would fulfill her legal requirements, the release stated.

In a telephone interview Tuesday morning, Scott, who was elected in November 2020, said her issues started with the March special election in Adams Township where she had questions surrounding the ballot tabulator that were not being answered.

Scott said she was not provided enough ballots to properly test the machine to verify its accuracy in March and when she brought the issue to Kasts office, she was deferred to an outside third party.

Then, following Marchs election, Scott was asked to turn in the tabulator to the clerks office for maintenance, but she declined to do so.

Scott said the tabulator contained a cell card and a modem, which led her to believe the device is capable of connecting to the internet and, therefore, susceptible to hacking.

As a clerk, I have no control over that internet security, it all sits at the county level, Scott said. People need to contact the county clerks office to ask if the machines could be online during a vote. Im not saying anyones up to nefarious activities, but that should raise enough flags for anyone to have concerns over.

And Scott said she is now being threatened with misdemeanor charges because of her actions, in addition to having her access to certain materials or databases removed, effectively diminishing her ability to do the job Adams Township residents elected her to do.

In a follow-up conversation with Kast regarding Scotts concerns, Kast said the tabulators print unofficial results following an election and then electronically send results to her office via cell towers. The results are then compared to the print-out and certified by the Board of Canvassers whichworks diligently to certify election results.

Kast said the equipment is tested annually to verify it has not been tampered with by outside sources in order to reassure the public on election integrity at the direction from the state of Michigan.

The news release on Oct. 25 from the Michigan Secretary of State, Jocelyn Benson, speaks for itself, Kast said. I can tell you that I am not happy about running this upcoming Nov. 2 special election in Adams Township as my staff is already taxed to the limit. However, I am willing to serve the electors and run this election in the North Adams-Jerome Public School District during this difficult time.

Voters in Adams Township will take to the ballot box to decide the fate of a school operating millage for the North Adams-Jerome Public Schools Nov. 2.

Go here to see the original:
Adams Township clerk speaks out after being removed from election responsibilities - The Hillsdale Daily News

Read More..

Conti’s business model. BillQuick bug exploited to serve ransomware. Hitting BlackMatter. Protecting software supply chains. – The CyberWire

Attacks, Threats, and Vulnerabilities

Cash-Starved North Korea Eyed in Brazen Bank Hack (Daily Beast) Hackers who stole tens of millions of dollars to fund North Koreas nuclear weapons program in 2016 tried hitting another bank last year, The Daily Beast has learned.

Hacker Attacks Hit Indonesian Agency: Calling for Cyber War? (D-Insights) A cyber attack hits National Cyber and Encryption Agencys (BSSN) website, highlighting the latent threat of cyber warfare.

Operation Secondary Infektion Targets Pfizer Vaccine | Recorded Future (Recorded Future) A fake letter has been discovered that is highly likely an attempt to generate vaccine hesitancy and distrust.

Conti Ransom Gang Starts Selling Access to Victims (KrebsOnSecurity) The Conti ransomware affiliate program appears to have altered its business plan recently. Organizations infected with Conti's malware who refuse to negotiate a ransom payment are added to Conti's victim shaming blog, where confidential files stolen from victims may be

Ransomware Gang Says the Real Ransomware Gang Is the Federal Government (Vice) A day after it was revealed that the US and its allies hacked the infamous REvil ransomware gang, a competing gang published an anti-government rant on its website.

BlackMatter botched tens of millions in ransoms after coding bug caught by Emsisoft (SC Media) Cybersecurity firm helped victims without publicly announcing bug in BlackMatter ransomware, which has since been fixed by the threat group.

Emsisoft cracked BlackMatter ransomware, recovered victims' data (SearchSecurity) Emsisoft found a critical flaw in BlackMatter ransomware, as well as other ransomware families, that helped to decrypt files without paying.

Hackers used billing software zero-day to deploy ransomware (BleepingComputer) An unknown ransomware group is exploiting a critical SQL injection bug found in the BillQuick Web Suite time and billing solution to deploy ransomware on their targets' networks in ongoing attacks.

SolarWinds Hackers Target Another Weak Point in Tech Supply Chain (Wall Street Journal) Firms that resell or manage cloud services are springboards for bigger attacks.

US being hit by huge cyber attacks, Microsoft warns (The Independent) Hundreds of companies and organisations are being hit by a wave of cyber attacks, Microsoft has warned.

Hundreds of U.S. Networks Targeted by Russian Cyber Attack, Microsoft Says (Insurance Journal) The Russian-based agency behind last year's massive SolarWinds cyberattack has targeted hundreds more companies and organizations in its latest wave of

Russia-Linked SolarWinds Hackers Continue Supply Chain Attack Rampage (SecurityWeek) Microsoft warns that the Russia-linked threat group that targeted SolarWinds continues launching supply chain attacks.

Russian Hackers Behind SolarWinds Attack Are Targeting The Supply Chain, Microsoft Says (Daily Caller) The same group of Russian hackers behind the December 2020 SolarWinds attack are targeting companies in the U.S. technology supply chain, Microsoft says.

Russian Cyber Spies Flout Sanctions, Target Tech Sector (Law360) Russian spies behind a cyberattack on software provider SolarWinds that led to breaches at nine U.S. federal agencies have flouted White House sanctions with a new campaign targeting cloud service companies, Microsoft Corp. said Monday.

The Russian hacker group behind the SolarWinds attack is at it again, Microsoft says (NPR.org) According to Microsoft, the group is targeting technology companies that resell and provide cloud services and has been using phishing and password spray to gain entry to targeted networks.

Wave of cyberattacks hitting American companies, Microsoft warns (Newsweek) Microsoft has accused the Russian hacking group Nobelium of being responsible for the attack.

Urgency, Mail Relay Serve Phishers Well on Craigslist (INKY) Craigslist, that old fashioned website people still use to find things locally and urgently has become the latest phishing vector. In addition to the inherent time pressure of its marketplace, a feature on the site that appeals to phishers is the mail relay function. In the service of safety and anonymity, Craigslist lets people seeking or offering things send an email through the system to anyone else.

Cracking WiFi at Scale with One Simple Trick (Cracking WiFi at Scale with One Simple Trick) How I Cracked 70% of Tel Avivs Wifi Networks (from a Sample of 5,000 Gathered WiFi). In the past seven years that Ive lived in Tel Aviv, Ive changed apartments four times. Every time I...

NYT journalist describes his iPhone being hacked, and the precautions he now takes (9to5Mac) A New York Times journalist covering the Middle East has described the experience of his iPhone being hacked, and the security precautions ...

Old Hollywood CCTV camera hack actually works on modern security cameras (CoolTechZone) We decided to prove multiple Hollywood scenes about spoofing video of security cameras and show that in our hands-on research

Janesville schools hit with ransomware attack locking digital systems (Channel3000.com) The School District of Janesville says it was hit with a ransomware attack over the weekend, locking students, staff and parents out of several web-based systems and programs.

Bulletin (SB21-298) Vulnerability Summary for the Week of October 18, 2021 (CISA) The CISA Vulnerability Bulletin provides a summary of new vulnerabilities that have been recorded by the National Institute of Standards and Technology (NIST) National Vulnerability Database (NVD) in the past week. NVD is sponsored by CISA. In some cases, the vulnerabilities in the bulletin may not yet have assigned CVSS scores. Please visit NVD for updated vulnerability entries, which include CVSS scores once they are available.

CISA Raises Alarm on Critical Vulnerability in Discourse Forum Software (SecurityWeek) CISA over the weekend issued an alert on a critical vulnerability in open source discussion platform Discourse.

Critical RCE Vulnerability in Discourse (CISA) Discoursean open source discussion platformhas released a security advisory to address a critical remote code execution (RCE) vulnerability (CVE-2021-41163) in Discourse versions 2.7.8 and earlier.CISA urges developers to update to patched versions 2.7.9 or later or apply the necessary workarounds.

2021 Unisys Security Index | Global and Country Insights (Unisys) The Unisys Security Index measures global consumer concerns related to national, personal, financial and Internet security.

Threat Labs Report - September 2021 (Netskope) Cloud-enabled threats: Google Drive remains the app for which Netskope blocks the most malware. Google Gmail, previously not in the top 5, rose as attackers delivered malicious Office documents via email attachments

Appsec Stats Flash (WhiteHat Security) The state of application security is rapidly evolving and there is a need for a more frequent analysis of the threat landscape.

Deepfakes, Cryptocurrency and Mobile Wallets: Cybercriminals Find New Opportunities in 2022 (Check Point Software) Check Point Software 2022 Cyber-security Predictions also anticipates an increase in supply chain attacks in the new year Check Point Software

Menlo Security Survey Sees Orgs Reevaluating Remote Access Strategy (Security Boulevard) A survey of 545 IT decision-makers from organizations in the U.S. and United Kingdom (UK) found three-quarters of respondents (75%) are reevaluating their

As Cyber Events Plague U.S. Execs, Some Still Have No Cyber Plan (PRNewswire) Deloitte's 2021 Future of Cyber survey shows similarities, differences in U.S. and non-U.S. C-suite responses

Its October. Are you aware of cybersecurity yet? (StateScoop) Cybersecurity awareness month gets a ton of flak, especially from those working in cybersecurity. Does it need revision?

(ISC) 2021 Cybersecurity Workforce Study ((ISC)) The (ISC) Cybersecurity Workforce Study includes the Cybersecurity Workforce Estimate, the Cybersecurity Workforce Gap and insights on the challenges and opportunities surrounding cybersecurity workforce development.

How We Can Narrow the Talent Shortage in Cybersecurity (Dark Reading) Filling crucial roles in cybersecurity and addressing the talent shortage requires rethinking who qualifies as a "cybersecurity professional" and rewriting traditional job descriptions.

Cybersecurity M&A Roundup for October 11-24, 2021 (SecurityWeek) A total of 15 cybersecurity-related acquisitions were announced October 11-24, 2021.

Piiano Raises $9M Seed Round to Transform Enterprise Data Privacy (BusinessWire) Piiano, a pioneer of data privacy engineering for the cloud, announced today that it has raised a $9M seed round. The round was led by cybersecurity-f

Devo Whips Up $250M Series E At $1.5B Valuation (Crunchbase News) Cambridge, Massachusetts-based cybersecurity firm Devo Technology has closed a $250 million Series E as the company hopes to ride its strong growth and disrupt the security analytics market.

Onfido acquires EYN to provide innovative acoustic-based liveness detection amid record-breaking global revenue growth (Onfido) -Increased investment in research and development spurs EYN acquisition, pioneers in industry-first acoustic-based anti-spoofing technology-Key strategic hires in CFO and CCO

TransUnion Enhances Consumer Identity Protection Offerings with Agreement to Acquire Sontiq for $638 million (GlobeNewswire News Room) The combined company will offer comprehensive identity solutions, further empowering consumers and businesses to shape and protect their financial futures...

Amentum again hits accelerator with PAE acquisition (Washington Technology) Amentum in year one of its relaunch as a standalone company went out and acquired DynCorp International. Now in year two, Amentum has set its sights on a second major transaction and this time it's buying PAE.

BackBox closes $32 million Series A for the hybrid multi-cloud era (CTECH) The news also comes with the appointment of Andrew Kahl as the new CEO and a move to Dallas

2019 Cybersecurity Workforce Study ((ISC)) The (ISC) Cybersecurity Workforce Study, 2019 is downloadable here. The study is conducted annually to assess the cybersecurity workforce or skills gap and how to recruit, build and strengthen cybersecurity staff or teams.

Researcher Earns $2 Million for Critical Vulnerability in Polygon (SecurityWeek) Security researcher Gerhard Wagner earned a $2 million bug bounty reward for a critical vulnerability in Polygons Plasma Bridge that could have allowed a malicious user to submit the same withdrawal transaction 224 times.

GCHQ 'signs deal with Amazon' to host top-secret material (Computing) The UK's spy agencies will use the cloud to boost the use of AI, analytics and other technologies

Amazon signs deal with British spy agencies to boost use of AI for espionage -FT (Reuters) Britain's spy agencies have given a contract to Amazon Web Services (AWS) to host classified material in a deal aimed at boosting the use of data analytics and artificial intelligence (AI) for espionage, the Financial Times reported on Monday.

Northern Virginia Technology Council Announces 2021 NVTC Capital Cyber (PRWeb) The Northern Virginia Technology Council (NVTC), the trade association representing the national capital regions technology community, today announced the wi

Salt Security Named 2021 CISO Choice Award Winner for Application Security (PR Newswire) Salt Security, the leading API security company, today announced it was named the winner in the Application Security category of the 2021 CISO...

Darktrace Plunges After Peel Hunt Forecasts 50% Downside (Bloomberg) Some experts consider product a gimmick, broker says. Spokeswoman says firm provides protection, customers satisfied.

Cybersecurity firm Darktrace tumbles after brokers bearish note (Times) A high flying cybersecurity specialist lost just over a fifth of its market value yesterday after concerns were raised over the quality of Darktraces products and size of its target market. The group, which listed on Londons main market in April, is set to enter the FTSE 100 tomorrow, replacing th

US retail giants pull Chinese surveillance tech from shelves (TechCrunch) Home Depot, Best Buy, and Lowe's removed the Chinese video surveillance makers over links to human rights abuses.

Cofense Joins Microsoft Intelligent Security Association (MISA) (BusinessWire) Nominated for membership based on Cofense PhishMe's Recipient Sync feature, Cofense has joined the Microsoft Intelligent Security Association (MISA).

CIS Mobile Launches Mobile Integration Center in Northern Virginia Headquarters (EIN) Company Partners with Multiple Tech Providers to Secure Mobile Devices In, Around Federal Facilities

Aryaka Names Ed Pearce as National Channel Director North America (BusinessWire) Aryaka, the leader in fully managed SD-WAN and SASE, chooses Ed Pearce as National Channel Director for North America

Keeper Security Expands Leadership Team with Tristen Yancey as VP of Public Sector (PR Newswire) Keeper Security, the leading provider of zero-knowledge security and encryption software covering password management, dark web monitoring,...

Rick Waddell, Lieutenant General (Ret.), U.S. Army Reserve Joins KnectIQ Advisory Board (PR Newswire) KnectIQ Inc., an innovator in cybersecurity technology, today announced Rick L. Waddell, Lieutenant General (Ret.), U.S. Army Reserve has...

Jumio Launches End-to-End Orchestration for its KYX Platform to Deliver Holistic View of Consumer Identities and Risk (BusinessWire) Jumio, the leading provider of AI-powered end-to-end identity verification, eKYC and AML solutions, today announced the launch of an intuitive no-code

Quest Releases SharePlex 10.1.1 to Expand Oracle Data Replication to Azure Cloud Services, Maximizing Resiliency, Lowering Costs and Reducing Risk (GlobeNewswire News Room) SharePlex 10.1.1 helps customers move their Oracle data in real-time into Microsoft Azure cloud servicesFacilitates continuous high-speed replication of...

AT&T Launches 5G Managed Advanced Security Capabilities to Further Protect Enterprise Network Infrastructure (PR Newswire) What's the news? AT&T* is introducing comprehensive, managed advanced security capabilities for 5G network deployments. The first security...

Illumio Introduces Illumio CloudSecure for Cloud-Native Application Visibility and Control to Accelerate the Path to Zero Trust (Illumio) New Agentless Solution Delivers Zero Trust Segmentation of Cloud-Native Applications in Multi- and Hybrid Cloud Environments

Check Point Software Brings Infosec Institute's Award-Winning Security Awareness Training to Leading Cyber Solutions Platform (Yahoo Finance) Infosec Institute, the leading cybersecurity education company, today announced it has partnered with Check Point Software Technologies to bring its award-winning security awareness training and phishing simulator to the Check Point Technology Partner Alliance. Check Point Software is a leading provider of cybersecurity solutions to governments and corporate enterprises globally.

Group-IB Fraud Hunting Platform Delivers Substantial ROI (PR Newswire) Group-IB, one of the leading providers of solutions dedicated to detecting and preventing cyberattacks, identifying online fraud, investigation...

CrowdStrike & AWS Provide Protection Against Ransomware & Identity-Based Threats (CrowdStrike) CrowdStrike announced new features to the Falcon platform that work with Amazon Web Services to protect customers from complex ransomware & cyber attacks.

ionir Extends Support for CI/CD Pipeline Acceleration (PR Newswire) ionir, a leader in Kubernetes Data Services, today announced updates to its cloud-native data services platform with new capabilities focused...

Veriff Launches New Account Onboarding, Arming FinTech Companies with Next-Gen Security Features (WIBW) Innovative, built-in KYC requirements ensure trust between businesses and consumers online

Hiscox CyberClear Offering Expands to 50 States (Hiscox) Florida is the latest and final state to be admitted

Ivanti Extends Neurons Platform to Help Customers Further Improve Network Security, Automate Compliance, and Maximize Productivity (Ivanti) Ivanti, the provider of the Ivanti Neurons automation platform that discovers, manages, secures, and services IT assets from cloud to edge, today anno

Remediation and Hardening Strategies for Microsoft 365 to Defend Against UNC2452 (Mandiant) In December 2020, FireEye uncovered and publicly disclosed a widespread campaign conducted by the threat group we track as UNC2452. In some, but not all, of the intrusions associated with this campaign where Mandiant has visibility, the attacker used their access to on-premises networks to gain unauthorized access to the victims Microsoft 365 environment.

Expert Q&A: How to use honeypots to lure and trap bots (PerimeterX) As bots become more sophisticated, detection and blocking need to stay one step ahead of them.

Dev-Sec Convergence: New Research Details Progress and Challenges on the Road to Secure Innovation (PR Newswire) Nearly all organizations are increasing their investment in application security this year, but they continue to struggle to fully embrace...

Socure Publishes Industrys First Digital Identity Fairness and Inclusion Report (BusinessWire) Socure, the leading provider of digital identity verification and fraud solutions, today at Money 20/20 announced the industrys first Digital Identit

What is a cybersecurity degree? (ZDNet) Thinking about pursuing cybersecurity training? A cybersecurity degree could boost your future career. Here's what to expect in cybersecurity school.

New hacking efforts show Russia undeterred by US actions (TheHill) A year after Russian government hackers compromised almost a dozen U.S. federal agencies, renewed efforts by the same group to target the global IT supply chain are painting a picture of a defiant Russia undeterred by U.S.

China is accused of exporting authoritarian technology. But the west has done so, too, more covertly (The Conversation) While it may be difficult to enact a global set of regulations on surveillance technologies, individual countries can take the lead with enhanced monitoring and stronger laws.

Facebook Whistleblower Frances Haugen Calls for New Tech Laws in Europe (Wall Street Journal) Frances Haugen tells U.K. lawmakers that social-media platforms should be required to disclose actions to combat misinformation and hate speech.

Facebook whistleblower testifies to UK parliament (TechCrunch) Frances Haugen, one of (now) multiple Facebook whistleblowers who have come forward in recent years with damning testimony related to product safety, gave testimony in front of the UK parliament today where, in one key moment, she was invited to clarify her views on end-to-end encryption fo

Britain Wants to Use Its New Cyber Command to 'Hunt' Ransomware Gangs (Gizmodo) A week or so after revelations about an FBI plot to hack a prominent ransomware gang, Britain has announced new offensive operations against cybercrime groups.

Australia plans to force parental consent for minors on social media (Reuters) Australia unveiled plans on Monday to make social media companies obtain parental consent for users under the age of 16, with multimillion dollar fines for failing to comply.

YouTube, TikTok Defend Teen Privacy Plans Amid Facebook Scrutiny (Bloomberg) Senators say Facebook shows protection needed across the board. Companies to argue they have existing protections in place.

WSJ News Exclusive | State Department to Form New Cyber Office to Face Proliferating Global Challenges (Wall Street Journal) The organizational changes are intended to confront cybersecurity challenges like ransomware and waning global digital freedom, the latest overhauls by the administration aimed at prioritizing cyber threats as a top-tier national security issue.

State Department will form new cyber bureau (CNN) The Biden administration is launching a new bureau for cyberspace and digital policy at the State Department as part of an effort to strengthen diplomats' cyber expertise, Secretary of State Tony Blinken announced in an email to the department's workforce on Monday.

US State Department to establish new cyber bureau led by ambassador ( The Jerusalem Post | JPost.com ) The US State Department said on Monday it plans to establish a bureau of cyberspace and digital policy that will be led by a Senate-confirmed ambassador at large, spokesperson Ned Price said.

First on CNN: Biden administration expected to name GOP official who challenged Trump's lies to key election security role (CNN) The Biden administration is expected to name Kim Wyman, a Republican secretary of state who challenged former President Donald Trump's false claims of election fraud, to lead the Department of Homeland Security's efforts to protect future elections from foreign and domestic interference, multiple people familiar with the matter tell CNN.

Julian Assange: what to expect from the extradition appeal (the Guardian) US has assured courts he could be jailed in native Australia and not held under maximum security

Kansas Man Admits Hacking Public Water Facility (SecurityWeek) Roughly seven months after being indicted for his actions, a Kansas man admitted in court to tampering with the systems at the Post Rock Rural Water District.

Secure email group Proton wins Swiss appeal over surveillance rules (Reuters) Geneva-based Proton AG, the company behind ProtonMail and ProtonVPN, has won an appeal regarding its treatment under Swiss law governing telecommunications surveillance, a Swiss court said on Friday.

New Standard Contractual Clauses: 10 Things You Need to Know (cyber/data/privacy insights) On the third anniversary of the General Data Protection Regulation, Cooley launched a series of webinar focused on the GDPR. The GDPR permits the transfer of data from the European Union and the European Economic Area (EEA) to third countries using standard contractual clauses (SCCs), which are a

FBI Given Power To Unlock Capitol Riot Suspect Phone With His Fingerprint (Forbes) January 6 investigators get a warrant to open devices using a defendants fingerprint. Though hed been accused of assaulting officers with pepper spray, forced fingerprint unlocks remain a legally-questionable power.

See more here:
Conti's business model. BillQuick bug exploited to serve ransomware. Hitting BlackMatter. Protecting software supply chains. - The CyberWire

Read More..