Page 2,603«..1020..2,6022,6032,6042,605..2,6102,620..»

Artificial intelligence predicts the risk of recurrence for women with the most common breast cancer – EurekAlert

21-09-2021, New York, NY and Paris, France The RACE AI study conducted by Gustave Roussy and the startup Owkin, as part of the AI for Health Challenge organized by the Ile-de-France Region in 2019, was presented as a proffered paper at ESMO (European Society of Medical Oncology). This study shows that thanks to deep learning analysis applied to digitized pathology slides, artificial intelligence can classify patients with localized breast cancer between high risk and low risk of metastatic relapse in the next five years . This AI could thus become an aid to therapeutic decision making and avoid unnecessary chemotherapy and its impact on personal, professional and social lives for low risk women. This is one of the first proofs of concept illustrating the power of an AI model for identifying parameters associated with relapse that the human brain could not detect.

With 59,000 new cases per year, breast cancer ranks first among cancers in women, clearly ahead of lung cancer and colorectal cancer. It is also the cancer that causes the greatest number of deaths in women, with 14%1 of female cancer deaths in 2018,. 80%1 of breast cancers are said to be hormone-sensitive or hormone-dependent. But these cancers are extremely heterogeneous and about 20% of patients will relapse with distant metastasis.

RACE AI is a retrospective study that was conducted on a cohort of 1400 patients managed at Gustave-Roussy between 2005 and 2013 for localized hormone-sensitive (HR+, HER2-) breast cancer. These women were treated with surgery, radiotherapy, hormone therapy, and sometimes chemotherapy to reduce the risk of distant relapse.

Chemotherapy is not routinely administered because not all women will benefit from it due to a naturally favorable prognosis. The practitioner's choice is based on clinico-pathological criteria (age of the patient, size and aggressiveness of the tumor, lymph node invasion, etc.) and the decision to administer or not adjuvant chemotherapy varies between oncology centers. Genomic signatures exist today to help identify women who benefit from chemotherapy, but they are not recommended by the French National Authority for Health and are not reimbursed by the French National Health Insurance (although they are included on the RIHN reimbursement list), which makes their access and use heterogeneous in France.

Gustave Roussy and Owkin have taken up the challenge of proposing a new method that is simple, inexpensive and easy to use in all oncology centers as a therapeutic decision-making tool. Ultimately, the goal is to direct patients identified as being at high risk towards new innovative therapies and to avoid unnecessary chemotherapy for low-risk patients.

In the RACE AI study, Owkin's Data Scientists, guided by Gustave Roussy's research physicians, developed an AI model capable of reliably assessing the risk of relapse with an AUC of 81% to help the practitioner determine the benefit/risk balance of chemotherapy. This calculation is based on the patient's clinical data combined with the analysis of stained and digitized histological slides of the tumor. These slides, used daily in pathology departments by anatomo-pathologists, contain very rich and decisive information for the management of cancer. It is not necessary to develop a new technique or to equip a specific technical platform. The only essential equipment is a slide scanner, which is a common piece of equipment in laboratories. Like an office scanner that digitizes text, this scanner digitizes the morphological information present on the slide.

The results of this first study by the Owkin and Gustave Roussy teams open up strong prospects and next steps include prospectively validating the model on an independent cohort of patients treated outside Gustave Roussy. If the results are confirmed, through providing reliable information to clinicians, this AI tool will prove to be a valuable aid to therapeutic decisions.

1Institut national du cancer(France):

https://www.e-cancer.fr/Professionnels-de-sante/Les-chiffres-du-cancer-en-France/Epidemiologie-des-cancers/Les-cancers-les-plus-frequents/Cancer-du-sein

https://www.e-cancer.fr/Patients-et-proches/Les-cancers/Cancer-du-sein/Hormonotherapie

Source

ESMO 2021 Oral Session

Proffered paper: Translational research

Prediction of distant relapse in patients with invasive breast cancer from deep learning models applied to digital pathology slides

Prsentation n 1124O Channel 5 14h20-14h30 Sunday 19th Septembre 2021

Speaker : Ingrid J. Garberis, Gustave Roussy

About Gustave Roussy

Classed as the leading European Cancer Centre and the fifth on the world stage, Gustave Roussy is a centre with comprehensive expertise and is devoted entirely to patients suffering with cancer. The Institute is a founding member of the Paris Saclay Cancer Cluster. It is a source of diagnostic and therapeutic advances. It caters for almost 50,000 patients per year and its approach is one that integrates research, patient care and teaching. It is specialized in the treatment of rare cancers and complex tumors and it treats all cancers in patients of any age. Its care is personalized and combines the most advanced medical methods with an appreciation of the patients human requirements. In addition to the quality of treatment offered, the physical, psychological and social aspects of the patients life are respected. 3,200 health professionals work on its two campuses: Villejuif and Chevilly-Larue. Gustave Roussy brings together the skills, which are essential for the highest quality research in oncology: a quarter of patients treated are included in clinical trials.

For further information: http://www.gustaveroussy.fr/en, Twitter, Facebook, LinkedIn, Instagram

About Owkin

Owkin is a French-American startup that specialises in AI and Federated Learning for medical research. Owkins mission is to connect the global healthcare industry through the safe and responsible use of data and application of artificial intelligence, for faster and more effective research. Owkin was founded in 2016 by Dr Thomas Clozel M.D., a clinical research doctor and former assistant professor in clinical hematology, and Dr Gilles Wainrib, Ph.D., a pioneer in the field of artificial intelligence in biology.

Owkin leverages life science and machine learning expertise to make drug development and clinical trial design more targeted and cost effective. Owkin applies its cutting-edge machine learning algorithms across a broad network of academic medical centers, creating dynamic models that not only predicts disease evolution and treatment outcomes, but can also be used in clinical trials for enhanced analysis, high-value subgroup identification, development of novel biomarkers, and the creation of both synthetic control arms and surrogate endpoints. The end result? Better treatments for patients, developed faster, and at a lower cost.

Owkin has published several high-profile scientific achievements in top journals such as Nature Medicine, Nature Communications, Hepatology and presented results at conferences such as the American Society of Clinical Oncology.

For more information, please visit http://www.owkin.com, follow @OWKINscience on Twitter

Media contact: Talia Lliteras at Talia.Lliteras@owkin.com

Disclaimer: AAAS and EurekAlert! are not responsible for the accuracy of news releases posted to EurekAlert! by contributing institutions or for the use of any information through the EurekAlert system.

The rest is here:
Artificial intelligence predicts the risk of recurrence for women with the most common breast cancer - EurekAlert

Read More..

Will Artificial Intelligence replace human authors in the near future? – The New Indian Express

About one year ago, British newspaper The Guardian ran an article titled A robot wrote this entire article. Are you scared yet, human?, written by an Artificial Intelligence (AI)-enabled robot called GPT-3 (Generative Pre-trained Transformer 3). It is an autoregressive language model that uses deep learning to produce human-like text. GPT-3 was fed a short introduction and was instructed to write an op-ed of around 500 words in simple language, focusing on why humans have nothing to fear from AI. In response, it produced eight different essays. The Guardian picked the best parts of each and ran the edited piece. GPT-3 even quoted Mahatma Gandhi in its article.

A rapid revolution in the field of AI and Natural Language Processing (NLP) is going on. While the worlds first-ever AI-written novel was published in Russia in 2008, the first full-length Korean novel, written by an AI named Birampung, hit the shelves in August. Birampung refers to a fierce storm that strikes at the beginning and end of the universes creation. The 560-page novel was directed by the novelist and mathematician Kim Tae-yon. Kim was reluctant to share the details of the technology involved. But 1,000 books were loaded in Birampungs operating system and it was equipped with the most advanced deep autonomous learning algorithm. Like a true film director, Kim picked the storyline, background and characters, but the actual writing process and the composition were made by Birampung. The novel, the name of which has been translated in English as The World from Now On, took seven years to complete and it consists of five stories in which the protagonistsa disabled amateur mathematician, a math professor and entrepreneur, a psychiatrist, an astrophysicist, and a Buddhist monkwere drawn to each other in their individual quests to understand the meaning of human existence.

Is there any existential threat for writers now? Consider GPT-3, the third-generation language prediction model in the series created by OpenAI, an artificial intelligence research company founded by Tesla billionaire Elon Musk among others. What exactly is going on inside GPT-3? An MIT Technology Review article stated: What it seems to be good at is synthesising text it has found elsewhere on the internet, making it a kind of vast, eclectic scrapbook created from millions and millions of snippets of text that it then glues together in weird and wonderful wayson demand.

GPT-3 can also produce pastiches of particular writers. For instance, when given the title, the authors name, and the initial word It, the AI produced a short story called The importance of being on Twitter, written in the style of Jerome K Jerome. It even wrote a reasonably informative article about GPT-3.

Playing with GPT-3 feels like seeing the future, is what some experts feel. There are plenty of shortcomings of AIs though. Their language is not always polished. And many people spotted a lack of depth, with the text reading more like cut-and-paste jobs. Some experts have felt that GPT-3s program does nothing more than match words and phrases based on statistical correlations among those in its database. In a March 2021 article published in the journal Nature, Matthew Hutson discusses the rise and risks of language-generating AI. Hutson opines that a remarkable AI can write like humans, but it still lacks common sense in the process of understanding how the world works, physically and socially. For example, when asked, How many rainbows does it take to jump from Hawaii to seventeen? GPT-3 responded: It takes two rainbows to jump from Hawaii to seventeen.

In The Guardian piece, GPT-3 wrote: I am only a set of code, governed by lines upon lines of code that encompass my mission statement. GPT-3 had been trained in around 200 billion words, at an estimated cost of tens of millions of dollars. The AI thus still needs a human editor to tether its writings to reality. In fact, a few days after the op-ed written by GPT-3 was published, a follow-up letter titled A human wrote this article. You shouldnt be scared of GPT-3 was published in The Guardian. The author, Albert Fox Cahn, argued that while GPT-3 is quite impressive it is useless without human input and edits. GPT-3 is just the latest example of computer-assisted authorship, the process by which human authors use technology to enhance the writing process, Cahn wrote. American programmer-poet Allison Parrish also noted: Attributing (The Guardian article) to AI is sort of like attributing the pyramids to the Pharaoh. Pharaoh didnt do that. The workers did.

GPT-3 is an artificial neural network with over 175 billion parameters that uses only 0.12% of its cognitive capacity. Its certainly a big leap forward from GPT-2 that had 1.5 billion parameters. When GPT-4 or GPT-5 rolls around in the future, should human writers really feel dread? Will AI measure up to J K Rowling or Kazuo Ishiguro, or report on Afghanistan? In his Nature paper, Hutson wrote: Its possible that a bigger model would do betterwith more parameters, more training data, more time to learn. But this will get increasingly expensive and cant be continued indefinitely. The opaque complexity of language models creates another limitation. Still, would some GPT-n or equivalent AI be able to produce a Tagores song or a Shakespeares play in the near future? A new technological anxiety would, however, invariably evolve around it.

P.S: This article has been completely written by a human being, not an AI.

Atanu BiswasProfessor of Statistics, Indian Statistical Institute, Kolkata(appubabale@gmail.com

View post:
Will Artificial Intelligence replace human authors in the near future? - The New Indian Express

Read More..

Get a lifetime of easy, automatic encryption for all of the files on your computer for just $30 – ZDNet

With the frequency and severity of malware attacks growing practically every day, the files and folders on our computers have never been more at risk. Sure, there have been solutions for strong protection available, but they tend to be so cumbersome and inconvenient to use that few of us would bother. Fortunately, a lifetime subscription to the powerful yet easy-to-use GhostVolt Encryption Software is currently very affordable.

GhostVolt will automatically add enterprise-level 256-bit AES encryption to your data and permanently maintains it on your computer or home network. For added security, the program will automatically log you out after a period of inactivity. It will even check your passwords against over 600 million exposed ones.

File management couldn't be easier since the app is designed just like your regular file explorer, so there's no learning curve. You can just add your files and folders as you normally would, and they will also be automatically re-encrypted after any editing. You can both preview and share files securely.

Many convenience features are built-in, including integration with Microsoft OneDrive, light and dark modes, backup encryption keys, and more. The program is multilingual, as well, for English, Spanish, French, German, Italian, and Portuguese. Users are really satisfied with GhostVolt, rating it 4.3 out of 5 stars on TrustPilot and 4.7 out of 5 stars on Softpedia.

If you tend to use a laptop more often than a desktop and spend any time at all on public Wi-Fi networks, and want to take even further precautions, you might like this powerful VPN bundled with two extra displays. But GhostVolt will offer you the ultimate in privacy and protection against data or identity theft. Because the encryption will completely obscure all of your personal information, so it will be unreadable to criminals even if it is stolen, hacked, or breached.

You really don't want to pass up this opportunity to protect all of your most sensitive files when it is so easy and affordable to do; getGhostVolt Encryption Software: Lifetime Subscription while it is on sale for only $29.99.

Read more here:
Get a lifetime of easy, automatic encryption for all of the files on your computer for just $30 - ZDNet

Read More..

Tide encryption is ready to end the cyber breach pandemic – TechCrunch

The global pandemic, along with the digital transformation it accelerated, broadened corporate attack surfaces exponentially. As a result, there were almost 1,800 publicly reported data breaches in the first six months of 2021 alone, accounting for the exposure of 18.8 billion records. Among these were devastating, large-scale breaches of consumer names, contact details and financial records, such as the ongoing Accellion compromise that has impacted over 100 companies, organizations and government agencies, and the recent T-Mobile breach that exposed the details of 47 million customers.

Tide Foundation, a Sydney-based, five-person startup competing in TechCrunch Disrupt Startup Battlefield this week, claims that its first-of-its-kind encryption protocol could make this so-called cyber breach pandemic a tagline the nonprofit was using before the global crisis struck a thing of the past.

However, tackling cybercrime hasnt always been the mission of Tide co-founders Michael Loewy and Yuval Hertzog. In fact, the startup was born out of the teams prior business, a marketing platform called Ziva that helped to connect enterprises with consumers over Internet of Things (IoT) devices. While the business grew quickly, attracting a number of big-name enterprise clients, Ziva soon ran into a privacy problem when architecting a campaign for Kelloggs. The campaign in question was a Special K Fitness Challenge, with participants sharing data from wearables with rewards based on the number of kilometers completed.

We collected accounts of tens of thousands of people, and we knew everything about their lives way beyond what they knew themselves; their habits, health and even their nutrition, said Hertzog, who runs the technology side of the startup. This was a treasure trove for enterprises, but we couldnt avoid the fact that were sitting on very sensitive information.

Tide realized that it needed to safeguard this data but failed to find an existing solution that ticked all of the boxes. Thats when Tide, a blockchain-based encryption method, was masterminded.

The protocol, which the startup claims is the first true zero trust authentication method, can be deployed into an organization to encrypt sensitive data, such as customer records and financial information. Each record has its own encryption key, and each key is controlled by a decentralized guardian.

No one has nailed a proper zero trust model, because no one really has zero in their trust model. We are the only one offering an entirely zero trust model, said Loewy.

Tide founders, L-R Dominique Valladolid, Michael Loewy and Yuval Hertzog. Image Credits: Tide Foundation

Its virtually impossible to hack, too, according to the startup. The key issplit between a group of nodes, and no node has access to or knowledge of the whole key, or the authority to act on its own. This makes malicious access to your key almost impossible.

When not if you hack it, you have to invest resources to hack at least 20 computers, at 20 locations around the world, and even then you reach a fraction of the data you are after, said Hertzog, adding that while Tide has worked to make its technology hacker-proof, its also been keen to ensure it passes the grandpa test.

This link between the human world and the computer world is very challenging. We put a lot of effort into human interaction, and we built a way for human beings to engage with the system through the simplest mechanism that exists today, which is username and password, said Hertzog. Its definitely not foolproof, but at least with us, its billions of times harder to attack you using a password. Saying that, our technology starts with supporting usernames and passwords, but it can support biometric authentication.

To date, the Tide Foundation has raised the equivalent of $2 million, primarily from Angel investors, and the five-year-old startup has also secured the backing of some big names in the cybersecurity world. Willy Susilo, a distinguished professor at the School of Computing and Information Technology in Wollongong, Australia,is an adviser to the company, alongside the likes of formerMicrosoft director Peter Ostick and Tom Dery, former global chairman of M&C Saatchi.

The well-supported startup is now focused on getting Tide out to the market, and as a result of the pandemic and the cybersecurity chaos that ensued, its already in demand.

We were talking to companies abut privacy and protection before the pandemic, and the response we got was that if we get hacked, were in good company, Hertzog said. The conversation changes after COVID. Weve been chased down by the academic world, healthcare, law practices and critical infrastructure an entire area that is completely exposed.

Read more from the original source:
Tide encryption is ready to end the cyber breach pandemic - TechCrunch

Read More..

Braves non-tracking, browser-based video conferencing tool is out of beta – TechCrunch

Brave, the startup behind the eponymous non-tracking browser, has launched a non-tracking video conferencing add-on out of beta letting all users make and receive video calls straight from their browser.

The tool, called Brave Talk, has been in beta testing since May last year. And Brave told us its had some 14,000 daily active users over this period aka, earlier adopters and developers tapping in via Braves test version.

Now its been made open access with Brave making a pitch to internet users of privacy-focused video conferencing.

Many other video conferencing providers, including Zoom, monitor calls, metadata, and images, and the records of that data can be sold or shared without user consent, it writes in a blog post announcing the wider launch.

Brave Talk users can enable multiple layers of encryption on calls, so an eavesdropper cannot listen in on users calls, and our servers dont save metadata, so calls, images, and activities are never recorded or shared without user consent, it adds.

The video calling software is a subscription offering costing $7 per month for premium features (like group calls and call recording) but basic one-to-one calls are free and unlimited. (NB: Braves Android and iOS apps only currently offer Brave Talk Premium but will have the free version too in the coming weeks).

Users initiating a video call must do so from within the Brave browser; however, recipients need only be using any modern browser (so basically Chrome, Firefox, Safari, Edge, Opera etc.) to participate in a video chat.

While Brave is touting its non-tracking credentials as a differentiating plus for the video conferencing software versus mainstream players like Zoom, its worth noting that Brave Talk does not (yet) have end-to-end encryption rolled out.

Brave says its using the Jitsi as a Service open source video meeting platform from 88 which relies on WebRTC open source technology to enable developers to embed HD video directly into the browser.

On encryption it says users can enable different layers in the settings. It describes the current strongest level of encryption available in both free and premium versions of Brave Talk as Video Bridge Encryption.

This setting ensures that the video and audio streams are encrypted using keys generated by the participants, which prevents eavesdropping on the Video Bridge Server, said co-founder and CEO Brendan Eich. Video Bridge Encryption can be enabled under Security Options.

Because we find the phrase end to end encryption to be confusing and overloaded, Brave Talk refers to the setting as Video Bridge Encryption, he also told us, adding: End to end encrypted calls are just one dimension of privacy and security when participating in video calls. Even when using encryption, most of the Big Tech video tools actively collect and store data about your call: Who the participants were, when the call took place and for how long, and a host of other information.

The anonymous credential system employed by Brave Talk ensures that we dont know who users are and who they are talking to, and we cant link them across sessions. Brave Talk is a privacy-by-default tool that does not track users.

Pushed for more clarity on the difference between Video Bridge Encryption (VBE) and E2EE, he also told TechCrunch: The reason that we refer to it as Video Bridge Encryption and not End to End Encryption is that, while VBE does ensure that audio and video remain encrypted from Brave, 88, and any other passive eavesdroppers, we are still working with 88 on a way to make this more robust against active attackers by automatically authenticating meeting participants.

When that work is complete, we will feel comfortable introducing it as full end to end encryption, and it will provide significant advantages over platforms like Zoom, which require participants to read a security code out loud to confirm end to end encryption is working.

Internet users wanting to kick the tyres of Brave Talk which was previously called Brave Together will first need to download the Brave browser in order to initiate a call. Receiving calls doesnt require using Brave, as mentioned earlier.

Per Eich, Brave recently passed 36 million monthly active users across its suite of anti-tracking products which also includes a search engine and a Firewall+VPN.

Read the original here:
Braves non-tracking, browser-based video conferencing tool is out of beta - TechCrunch

Read More..

The FBI has kept the presence of the encryption key secret from Casey for three weeks. – Cheraw Chronicle

The FBI has kept the cryptocurrency secret for almost three weeks. The Washington Post writes.

Casey, a management software developer who was the victim of a major Revel ransomware attack in early July, said in the fourth week of July that it had a global key to share with its customers. The cyber attack, which spread through Kasia VSAs software in early July, affected more than a thousand companies worldwide.

The hackers entered a vulnerable spot in the software and were able to take hostages of more than a thousand company systems. The hackers demanded $ 70 million to release the keys that would allow the victim to regain access to their files. In Sweden, among other things, 800 coupe supermarkets had to close because cash register systems no longer work due to the hack.

The key was reportedly obtained by the FBI in early July, but was not shared with other parties until three weeks later. No FBI Director Christopher Wray confirmed Tuesday. The key was obtained by accessing the servers of the Russian-based criminal gang behind the attack. Immediate sharing helped save millions of dollars in recovery costs for victims, including schools and hospitals.

But the FBI had the keys with the consent of other companies. Reeve planned to launch an operation to deal with the hackers so that service would not stop them. Furthermore, the government assessment found that the damage was not as severe as initially feared. The hacker groups planned removal eventually did not happen because Revils site went offline in mid July without US government intervention and the hackers disappeared before the FBI could implement its plan.

The FBI finally shared the key with Casey July 21-19. Kasaya immediately asked New Zealand-based security firm MCSoft to develop a new encryption tool, which Kasaya released the next day.

After the Russian hacking group disappeared from the Internet, Revil suddenly appeared on the Internet earlier this month. Meanwhile, the group is said to have carried out several new hacking attacks.

Read more:
The FBI has kept the presence of the encryption key secret from Casey for three weeks. - Cheraw Chronicle

Read More..

5 ways to stay ahead of government-targeted ransomware – GCN.com

INDUSTRY INSIGHT

It is no surprise that governments around the world are among the most highly targeted and impacted victims of ransomware. Last years SolarWinds data breach in the U.S. was a reminder of the ability of cyberattacks to penetrate public-sector agencies and unleash damage across a federal agencies.

According to new independent research from Sophos, over the past year, 40% of central governments and non-departmental public bodies across the globe were attacked by ransomware. This put central governments and NDPBs fourth in a ranking of industries most afflicted by ransomware, surpassed only by retail, education and business/professional services. Considering that federal governments employ trained IT staff, the fact that four in 10 were unable to stop a ransomware attack speaks to the ability of cyber attackers to penetrate even the best defenses. More than one-third (34%) of local governments also reported experiencing a ransomware attack over the past year curious, considering that local government agencies would presumably have a fewer resources to defend their systems.

Extortion-style ransomware disproportionately aimed at central governments

One disturbing trend seen in ransomware over the past year has been the emergence of extortion-style attacks. Ransomware typically involves encrypting a victims data and then exchanging the decryption key for payment. Lately, extortion-style attacks where the attacker steals the data rather than encrypting it and threatens to release it (either to the dark web or to the public) in exchange for a ransom payment have started to pick up steam.

This is especially acute in the government sector. Central governments and NDPBs experience extortion-style ransomware at nearly double the rate of all industries. That said, encryption-based attacks still remain the most dominant strain of ransomware, comprising almost half (49%) of attacks faced by central government and NDPBs.

In ransomware attacks against local governments, 69% of victims saw their data encrypted a staggering 20 points greater than what central governments had experienced. These numbers point to an interesting split: Ransomware attacks against central governments are slowly moving from encryption-style to extortion-style attacks, while encryption-based attacks against local governments remain extremely high and extortion-based attacks rare (2%). This difference may be because central governments have relatively higher-value data to steal and hold for extortion, and local government agencies, on the other hand, dont have the kind of national secrets that central governments do, perhaps sparking less interest among attackers.

Why its not worth paying the ransom

In the heat of a ransomware attack, its easy to see why just paying the ransom to get data back (or prevent public release) can feel like the path of least resistance. Thats what attackers are counting on, after all. But its not necessary. The survey reveals that most (61%) central governments and NDPBs hit with ransomware restored their data from backups. Only 26% ended up paying the ransom to get their data back. In total, nearly all (96%) of central government victims ended up with their data restored. These findings speak to both the need to back up data proactively and how unnecessary it is to pay the ransom to get data returned.

The findings may also point to central governments awareness about data backups that may not be shared by their smaller counterparts. Among local government organizations that were hit by ransomware, there was an even split between those who restored data through backups and those who paid ransoms to get their data back 42% for both indicating that smaller agencies perhaps have a greater need to pay ransoms in order to restore their data, as well as a lack of backups to draw from.

Five ways to stay ahead of government-targeted ransomware

Governments are some of the least prepared organizations in the world to recover from a major malware incident like ransomware. Among all industries surveyed on their malware incident recovery planning preparedness, both central and local governments ranked at the bottom of the list. This cannot continue to be the status quo particularly when so many central and local governments have either been attacked by ransomware already or expect to be attacked in the future.

Staying ahead of the ransomware curve calls for more preparedness. Here are five easy steps that central and local government agencies take now to mitigate the probability of a ransomware attack and improve their chances of recovering from one.

About the Author

Dan Schiappa is the chief product officer at Sophos.

Read the original here:
5 ways to stay ahead of government-targeted ransomware - GCN.com

Read More..

Encryption Software Market expectation surges with rising demand and changing trends by industry analysis through 2026 Stillwater Current -…

The business report delivered by Zion Market Research on Global Encryption Software Market What Industry Holds for the Future post Covid? Development Analysis and Complete Insights 2020 2026 is engaged to work with a profound comprehension of the market definition, potential, and extension. The report is minister after profound examination and investigation by specialists. It comprises of a coordinated and precise clarification of current market patterns to help the clients to involve inside and out market investigation. The report includes an extensive appraisal of various techniques like consolidations and acquisitions, item advancements, and exploration and improvements embraced by noticeable market pioneers to remain at the bleeding edge in the worldwide market.

Key participants for business development are BM, Microsoft, Sophos ltd, Gemalto, Net App Inc, Hewlett- Packard, Vormetric, Oracle, Intel and Symantec

Sample Copy of The Encryption Software MarketReport:https://www.zionmarketresearch.com/sample/encryption-software-market

The Encryption Software Market Report is a straightforward record introducing segment by-area insights regarding the worldwide market. Beginning with a short layout of the general market, it will show the by and large assessed market measurements and various boundaries for the gauge time frame (2020-2026). Also, the report will clarify the primary factors that are driving or obstructing the extension of the worldwide Encryption Software Market. Moreover, it presents the dangers and roads that the organization or market members can look during the coming time frame alongside potential answers for beat them. Furthermore, the report remembers continuous and possible patterns for the market that could move the development direction of the worldwide Encryption Software Market. Moreover, broadly set forward the common and past market advancement procedures like M&A, associations, coordinated efforts, and so on taken by market members and government associations.

Development drivers:

The report gives a precise and expert investigation of worldwide Encryption Software Market business situations. The perplexing examination of chances, development drivers, and the future estimate is introduced in basic and effectively justifiable configurations. The report fathoms the Encryption Software Market by expounding the innovation elements, monetary position, development technique, item portfolio during the estimate time frame.

Request Free Brochure of theEncryption Software MarketReport:https://www.zionmarketresearch.com/requestbrochure/encryption-software-market

Report Scope:

The information presented in the report will help the clients in improving their capacity to settle on educated choices in regards to the business under the Encryption Software Market. The report likewise centres around current and future guidelines and arrangements that will be given by government organizations, which can improve or smother market development. To improve the data reasonable, experts and experts have included graphs, insights, stream outlines and models in the worldwide Encryption Software Market report. Alongside this, the report passes on logical data through market division on a geographic level. In conclusion, the worldwide Encryption Software Market gives peruses a total outline of the market during the figure time frame from

Enquire Here to Get Customization, Methodology & Check Discount for the Encryption Software Market Report:https://www.zionmarketresearch.com/inquiry/encryption-software-market

2020-2026 which will help them in making the right business. decisions that will prompt the improvement of their organization.

Moreover, the Encryption Software Market report will keep on introducing the size of the worldwide Encryption Software Market as far as volume and worth. It will likewise assess worldwide market division dependent on different perspectives like [Product, Application, End User and Key Region]. The report further classifies the worldwide market by area and gives an outline of the different districts and market development and conceivable development openings in the locale. To wrap things up; The report additionally incorporates the effect of the continuous Corona infection pandemic on market development on a territorial and worldwide scale. The quick effect of a pandemic contrasts dependent on market interest. While a few business sectors might observer a decrease sought after, numerous others will stay flawless and show potential development openings. In like manner, our Encryption Software Market report will offer you an exhaustive investigation of the worldwide market alongside the effect of COVID-19 on the worldwide Encryption Software Market.

Table Of Content:

Chapter No. 1 Introduction

Chapter No. 2 Executive Summary

Chapter No. 3 COVID 19 Impact Analysis

Chapter No. 4 Encryption Software Market Type Segment Analysis

Chapter No. 5: Encryption Software Market Industry Analysis

Chapter No. 6: Encryption Software Market Industry Analysis

Chapter No. 7: Competitive Landscape

Chapter No. 8: Company Profiles

Chapter No. 9: Marketing Strategy Analysis

Reference for other Reports:

Green Cement Market :https://www.stillwatercurrent.com/green-cement-market-to-surge-at-a-robust-pace-in-terms-of-revenue-over-2020-2026/

Key Questions Answered In The Market Report:What will be the growth rate of the global Encryption Software Market?Who are the key market leaders of the global Encryption Software Market?What are the sales, price, and revenue analyses of the global Encryption Software Market?What are the market opportunities, and threats faced by the new entrants in the global Encryption Software Market?What are the key factors which increase the growth of the global Encryption Software Market?

Thanks for reading this article; you can also get individual chapter wise section or region wise report version like North America, Europe or Asia.

Read the rest here:
Encryption Software Market expectation surges with rising demand and changing trends by industry analysis through 2026 Stillwater Current -...

Read More..

What Is a Hardware Security Module? HSMs Explained – Hashed Out by The SSL Store

Hardware security modules are specialized computing devices designed to securely store and use cryptographic keys. Lets break down what HSMs are, how they work, and why theyre so important to public key infrastructure

Demand for hardware security modules (HSMs) is booming. Data from Entrusts 2021 Global Encryption Trends Study shows that HSM usage has been steadily increasing over the last eight years, increasing from 26% in fiscal year 2012 to 49% in 2020. According to data from 360 Market Updates, the HSM market is expected to reach $2.75 billion by the end of 2026.

What is an HSM and what does it do? Why are so many companies using HSMs? And what are the practical uses for HSMs in enterprise environments?

Lets hash it out.

Encrypted data isnt secure if the keys you use to encrypt it are exposed this is where HSMs can save the day. Hardware security modules (HSMs) are tamper- and intrusion-resistant hardware components that organizations use to protect and store their cryptographic keys while still making them available for use by authorized users. Their purpose is to control access and limit risk to your companys sensitive private keys.

HSMs enable your employees to use of your organizations private keys without needing direct access to them. Basically, your software (for example, hosted on a web server) can execute cryptographic functions and authentication without loading a copy of your private key into memory on your web server (where it could be vulnerable to attack). The cryptographic functions are all done within the confines of an HSMs secure environment. Performing these operations within this secure little bubble keeps your sensitive data from becoming compromised by keeping the private keys hidden away in a secure location.

To better understand this concept, think of an HSM like a vending machine. A vending machine stores drinks and food items within an isolated internal environment. Its designed to accept user inputs (i.e., your item selections) and generate outputs (i.e., pop out a tasty snack), and you cant access the inside of the vending machine or alter its functions.

Similarly, an HSM accepts user inputs and generates outputs (such as signed certificates or software) without users (or applications) seeing, accessing, or altering your cryptographic keys. Thats because its functions are executed within the confines of its secure environment, and no key can be wholly exported, extracted or removed from an HSM in a readable format. So, like a vending machine, you can use it to get your desired output but you cant see or access the internal workings of the device and all of its individual components that made it possible.

Heres a quick overview of how hardware security modules work:

You may be wondering why you need to use a hardware security module at all. I mean, why should you go through the hassle and cost of setting up an HSM when you can simply use your web servers built-in functionalities?

Well, for one thing, an HSM provides significantly more secure key storage than what youd get from using a traditional web server. When companies use their web servers to run many applications, this can result in vulnerabilities that cybercriminals can exploit. HSMs are devices with limited usages and attack vectors. This is why:

Using an HSM helps you secure your private code signing keys and avoid exposure issues like what HashiCorp faced earlier this year. On April 22, HashiCorp informed customers that the GPG private key they use to sign official product downloads and updates was exposed as the result of a third-party (Codecov) security incident.

Basically, the crux of the situation is that an unauthorized user exploited a vulnerability that gave them the ability to export sensitive data from Codecovs continuous integration (CI) environments. HashiCorps CI environment which housed the companys GPG private key and other sensitive secrets among were among those exposed CI environments. If HashiCorp stored their key in a secure HSM instead of the CI, then it wouldnt have been exposed.

There are also many other purposes and uses that HSMs serve in terms of PKI and general cybersecurity. You can use an HSM to:

Heres a breakdown of the top 10 HSM use cases in 2021, according to data from Entrust and the Ponemon Institute:

Having options for secure cryptographic storage is important for all businesses, particularly as their needs evolve with the growth of their operations. The good news is that HSMs vary in terms of both their physical sizes and applications. Some HSMs are small plug-in cards or USB devices while others are large external devices and appliances that companies store on premises within secure locations.

Hardware security modules can be very cost-prohibitive for many businesses. A 2018 article in SecurityToday.com says that the cost of deploying a single HSM can range upwards of $40,000 and that price doesnt include other related costs such as additional hardware, support, and maintenance. So, doing everything yourself may not be a viable option.

But just because your company cant afford to buy one or more of these devices outright doesnt mean that you cant still enjoy the advantages of using HSMs. Some vendors (such as Thales and Amazon Web Services) now offer cloud-based HSM products and services.

There are a few different options when it comes to using cloud HSMs:

The idea here is rather than having to buy an expensive physical appliance that you need to protect on site, you can instead rent a dedicated physical appliance or pay for access to the functionalities of one controlled by a third-party vendor for less cost.

As you can imagine, there are advantages and disadvantages to each approach, but youre ultimately the one who needs to decide which approach is best for your organization or business. Just be sure to carefully read the service level agreement (SLA) to ensure theyre what you need.

Of course, there is a way you can have your cake and eat it, too meaning that you can use an HSM without having to buy or rent one. This is possible when you partner with a managed PKI (mPKI) service provider. For example, DigiCert is an mPKI provider whose platform was built using an HSM. When you use their platform, you can capitalize on their secure HSM on the backend without having to buy or rent this expensive hardware.

If you think that an HSM sounds a lot like a trusted platform module, or TPM, there are a couple good reasons.

But are these two devices the same? No. TPMs are device-specific components within individual devices whereas HSMs are external devices with wider applications at handling operations relating to many or all devices and applications across an organizations network.

TPMs are basically computer chips that physically attach to individual devices motherboards to secure their PKI keys while keeping them separate from the devices CPU memory. They help to ensure device integrity and provide an isolated environment for the devices cryptographic operations.

HSMs, on the other hand, are hardware devices that arent limited to individual machines. Theyre intended for use at-scale by applications and servers across your organization.

To learn more about what trusted platform modules are and how they work, be sure to check out our other article relating to that specific topic.

The National Institute of Standards and Technology (NIST) Special Publication Recommendation for Key Management: Part 2 Best Practices for Key Management Organizations (SP-800-57 part 2, rev 1) describes hardware security modules as critical key management components. Theyre part of the physical infrastructure that makes secure key storage and cryptographic operations possible.

HSMS are used by organizations across virtually all industries, some of which include:

Thats quite a spread in terms of industries, am I right? This variation is, in part, due to the fact that hardware security modules come in two main varieties (which well explore momentarily) for organizations various usages.

Hardware security modules are typically used for securely storing cryptographic keys and payment-related information. However, their uses span the gamut in terms of current and future applications. Here are some of the ways youll currently find HSMs in use globally:

When we talk about HSMs here at Hashed Out, were typically talking about general purpose HSMs. However, its important to note that this isnt the only category of HSMs Thales Group describes a second category of HSM devices as Payment HSMs. Now that we know what HSMs are and some of their applications, lets explore the two types of HSMs a bit more in depth.

General purpose HSMs are those that all types of organizations use as part of their organizations overall cyber security. These are like the devices we described in the What Is a Hardware Security Module (HSM)? section near the beginning of the article.

These devices typically use vendor-neutral APIs to facilitate communication and cryptographic services for your applications. Thats because general purpose HSMs rely on the public key cryptography standards #11 (PKCS#11), which are a group of standards that outline how applications and HSMs can interact and communicate for cryptographic operations. (This enabled interoperability between applications and devices from various manufacturers.)

They also must meet geographic or industry security validation and trustworthiness requirements and standards such as:

As you can probably guess from the name, this second category of HSMs focus on the payment industry and are more specialized. Like general purpose HSMs, payment HSMs are also tamper-resistant hardware components that enable businesses to store and protecting keys and data. However, these keys relate to financial applications and transactions and do jobs such as storing customer PINs

Payment HSMs are designed to meet many different standards and use various interfaces. They also require different protocols and certifications from their general purpose HSM counterparts, some of which include the Payment Card Industry PTS Hardware Security Module (PCI PTS HSM) Modular Security Requirements and FIPS 140-2 validation requirements (level 3 or higher), and various regional security requirements.

For the purpose of this article, were primarily focusing on general purpose HSM functionalities, so were not going to get into the nitty-gritty of payment HSMs here. However, weve put together a quick side-by-side comparison table to help you better understand the differences between the two types of hardware security modules:

We touched on some of the uses of general purpose HSMs within organizational environments. Now, lets explore some practical applications.

A hardware security module provides the foundational security and trust your PKI needs. This is why it should be part of your organizations public key infrastructure from the get-go and not just added later on. (Technically, you can add an HSM to your private PKI architecture later however, it does require a lot of extra work and configurations that you can avoid by making the device part of your initial PKI.)

HSMs allow you to store your organizations cryptographic keys and create the PKI certificates that are necessary to enable user, device and software authentication. Furthermore, the authentication processes themselves can occur within the HSMs internal environment. This keeps the keys secure by not requiring them to be accessed directly, copied or moved.

You can use your hardware security module for cryptographic offloading (such as for SSL/TLS). The purpose of SSL/TLS offloading is to ease the burden on your web server that stems from encrypting and decrypting traffic by shifting those functions to another device (such as a load balancer).

If you opt to store your private keys in an HSM instead of your web server, you can shift the cryptographic functions relating to that traffic to your HSM.

The Open Web Application Security Projects (OWASP) Key Management Cheat Sheet specifies that if you choose to secure your cryptographic keys offline or in devices such as HSMs, you should encrypt them using key encryption keys, or KEKs.

If you want to avoid the costs and responsibilities associated with in-house management of an HSM for your private PKI, then choose an mPKI provider whose platform was built using an HSM. Doing this enables your authorized users to use your organizations HSM-stored keys remotely without accessing or touching the keys. For example, users can sign EV code signing certificates without the necessary risk of keeping individual tokens on hand that could get lost or stolen.

While HSMs are great security tools, they require you to take steps to keep them (and the keys the contain) secure. This includes physical security measures as well as digital access.

The first aspect entails keeping your hardware security modules stored in secure physical locations (such as a secure data center or server room). Your HSM should never be stored in an open or insecure location where unauthorized individuals can access it.

HSMs require strong access controls, policies and processes to keep your cryptographic keys secure and ensure that only authorized users can use it. This way, no unauthorized employees or nefarious external parties (i.e., cybercriminals) can use your cryptographic keys against you to digitally sign data, applications, or certificates.

Also be sure to monitor your HSM event logs. This way, you know who tries to access or use your cryptographic keys and how they used them.

Read more here:
What Is a Hardware Security Module? HSMs Explained - Hashed Out by The SSL Store

Read More..

Brave, the startup behind untracked browser-based video conferencing tool is out of beta – Security News – BollyInside

Brave, the startup behind the eponymous non-tracking browser, has launched a non-tracking video conferencing add-on out of beta letting all users make and receive video calls straight from their browser.

Now its been made open access with Brave making a pitch to internet users of privacy-focused video conferencing.

The tool, called Brave Talk, has been in beta testing since May last year. And Brave told us its had some 14,000 daily active users over this period aka, earlier adopters and developers tapping in via Braves test version.

Many other video conferencing providers, including Zoom, monitor calls, metadata, and images, and the records of that data can be sold or shared without user consent, it writes in a blog post announcing the wider launch.

Users initiating a video call must do so from within the Brave browser; however, recipients need only be using any modern browser (so basically Chrome, Firefox, Safari, Edge, Opera etc.) to participate in a video chat.

Brave Talk users can enable multiple layers of encryption on calls, so an eavesdropper cannot listen in on users calls, and our servers dont save metadata, so calls, images, and activities are never recorded or shared without user consent, it adds.The video calling software is a subscription offering costing $7 per month for premium features (like group calls and call recording) but basic one-to-one calls are free and unlimited. (NB: Braves Android and iOS apps only currently offer Brave Talk Premium but will have the free version too in the coming weeks).

While Brave is touting its non-tracking credentials as a differentiating plus for the video conferencing software versus mainstream players like Zoom, its worth noting that Brave Talk does not (yet) have end-to-end encryption rolled out.

Brave says its using the Jitsi as a Service open source video meeting platform from 88 which relies on WebRTC open source technology to enable developers to embed HD video directly into the browser.

On encryption it says users can enable different layers in the settings. It describes the current strongest level of encryption available in both free and premium versions of Brave Talk as Video Bridge Encryption. This setting ensures that the video and audio streams are encrypted using keys generated by the participants, which prevents eavesdropping on the Video Bridge Server, said co-founder and CEO Brendan Eich. Video Bridge Encryption can be enabled under Security Options.

Because we find the phrase end to end encryption to be confusing and overloaded, Brave Talk refers to the setting as Video Bridge Encryption, he also told us, adding: End to end encrypted calls are just one dimension of privacy and security when participating in video calls. Even when using encryption, most of the Big Tech video tools actively collect and store data about your call: Who the participants were, when the call took place and for how long, and a host of other information. The anonymous credential system employed by Brave Talk ensures that we dont know who users are and who they are talking to, and we cant link them across sessions. Brave Talk is a privacy-by-default tool that does not track users.

Pushed for more clarity on the difference between Video Bridge Encryption (VBE) and E2EE, he also told TechCrunch: The reason that we refer to it as Video Bridge Encryption and not End to End Encryption is that, while VBE does ensure that audio and video remain encrypted from Brave, 88, and any other passive eavesdroppers, we are still working with 88 on a way to make this more robust against active attackers by automatically authenticating meeting participants. When that work is complete, we will feel comfortable introducing it as full end to end encryption, and it will provide significant advantages over platforms like Zoom, which require participants to read a security code out loud to confirm end to end encryption is working.

Internet users wanting to kick the tyres of Brave Talk which was previously called Brave Together will first need to download the Brave browser in order to initiate a call. Receiving calls doesnt require using Brave, as mentioned earlier. Per Eich, Brave recently passed 36 million monthly active users across its suite of anti-tracking products which also includes a search engine and a Firewall+VPN.

News Summary:

More here:
Brave, the startup behind untracked browser-based video conferencing tool is out of beta - Security News - BollyInside

Read More..