Page 2,762«..1020..2,7612,7622,7632,764..2,7702,780..»

The Benefits of Cloud Object Storage for Higher Education – EdTech Magazine: Focus on Higher Education

The pandemic has accelerated the push to go off-premises. As InfoWorld notes, the growth of cloud is unlikely to slow over the next few years, especially as universities and colleges prioritize quality hybrid learning experiences for students.

But storage remains a challenge for many higher education institutions that continue to support blended or online learning. While traditional storage options such as storage area networking (SAN) and network-attached storage (NAS) still make sense for structured data storage, these options are not ideal for unstructured assets. With unstructured data now accounting for 80 percent of organizational information, postsecondary schools need a new way to handle the explosion of data.

The most familiar file storage systems are hierarchical. Files are stored in layered directories that are logically segmented and rigidly defined. Block storage systems emerged as cloud offerings gained ground. These solutions store data as evenly sized blocks of information, each with its own unique identifier.

According to Jon Toor, chief marketing officer ofCloudian, cloud object storage takes a different approach. Cloud object storage is a flat-file system, he says. It has an addressing structure that lets you directly address a lot of data. And the amount of data we can address is essentially limitless, up to multiple exabytes. In practice, object-based storage sees data assets defined as unique objects that arent uniform in size and include metadata descriptors. As a result, these systems are ideal for unstructured data that doesnt conform to rigid file formats.

Toor offers a postsecondary example: Say youre storing a genome in a research institution. With cloud object storage, you can do analysis and take out key facts and store them in the metadata. Now, you have a searchable database with metadata that you can search, just likeGoogle.

Solutions such as SAN and NAS offer the benefit of onsite data storage, which is best suited for hierarchical file systems. Typical cloud-based systems, meanwhile, shift the heavy lifting away from data centers and into public or hybrid cloud frameworks.

But cloud object storage offers the best of both worlds. The easiest way to think of it: Its cloud tech that resides in your own data center behind your own firewall, says Toor. Its close by and easy to use. And its part of your own infrastructure. Thanks to their modular nature, object-based solutions can be easily expanded as storage requirements grow, offering capacity on demand with zero downtime.

Compared with other solutions, this approach offers better data security. You get the same visibility around whos accessing your data as with traditional cloud technology, says Toor. You can spot if its being accessed improperly and set up alerts to notify you.

Toor also highlights the persistent nature of this storage solution. This is an evergreen environment, he says. We sell a complete box, and you create a cluster by tying three boxes together. You add new boxes over time. As they age, they need to be swapped out. After five years, you simply add new boxes, migrate the data transparently in the background and decommission the service with no disruption and no downtime.

MORE ON EDTECH: Here's 4 ways to manage multicloud environments in higher ed.

Toor points to three substantive benefits for postsecondary schools transitioning to cloud object storage:

Consider theUniversity of Leicesters recent adoption of Cloudian S3 compatible object storage. Not only did the school improve accessibility by eliminating its single-point-of-failure backup system, it also reduced storage space requirements by 50 percent, saving 25 percent in storage costs.

When it comes to adopting object-based storage for postsecondary schools, Toor puts it simply: You can build it across multiple locations and can scale to any size. Thats why people move to cloud object storage.

Read this article:
The Benefits of Cloud Object Storage for Higher Education - EdTech Magazine: Focus on Higher Education

Read More..

Insurance Applications in the Hundreds of Thousands Exposed – Lexology

Insurance technology startup BackNine has announced that it has made public hundreds of thousands of insurance applications. This happened after one of its web host left cloud servers without protection on the internet.

TechCrunch reports that the California-based startup develops back-office software to assist larger insurance companies. The larger companies sell and maintain life and disability insurance policies. Chances are good that BackNine may have processed your personal information if you applied for insurance in the past several years.

The startup partners with some of Americas largest insurance carriers. Many of the insurance applications found in the exposed bucket were for Prudential TransAmerica, John Hancock, Lincoln Financial Group, and AIG.

In addition to this work, BackNine also provides a white-labeled web form for smaller or independent financial planners who sell insurance plans on their own websites.

BackNine Servers Hosted by Amazon

Amazons cloud hosts BackNines storage servers. The startup says that Amazon misconfigured this server to permit members of the public access to the more than 711,000 files inside. This data includes completed insurance applications that contain applicants extremely sensitive personal and medical information. Moreover, the files contained images of individuals signatures and other internal BackNine files.

Editors at TechCrunch reviewed some of the materials and found contact information, such as full names, addresses, and phone numbers, along with also Social Security numbers, medical diagnoses, medications taken and detailed completed questionnaires about an applicants health, past and present.

Other files for insurance applications included lab and test results, like blood work and electrocardiograms. Plus, there were applications that contained drivers license numbers. The exposed documents date back to 2015, and as recently as this month.

Permissions Changed on Amazon Storage Bucket

Amazon names its storage servers buckets, which are private by default. However, it BackNines case, someone with control of the buckets appears to have changed its insurance applications permissions to public. Sadly, none of the data was encrypted.

Amazon Web Services (AWS) is an adopted cloud platform that offers more than 200 fully-featured services from global data centers. Millions of customersincluding fast-growing startupsuse AWS.

Its website says that AWS plans to be the most flexible and secure cloud computing environment available today. The company has designed its core infrastructure to satisfy the security requirements for the military, global banks, and other high-sensitivity organizations. AWS says

[T]his is backed by a deep set of cloud security tools, with 230 security, compliance, and governance services and features. AWS supports 90 security standards and compliance certifications, and all 117 AWS services that store customer data offer the ability to encrypt that data.

Vice President Alerted and Locks Down Insurance Applications Data

TechCrunch contacted BackNine vice president Reid Tattersall but received no response. However, within minutes of providing Tattersall with the name of the exposed bucket, the data was locked down. The news source asked Tattersall if the startup alerted local authorities per state data breach notification laws. Alternative, did the company have any plans to notify the affected individuals who suffered data exposure? They didnt get an answer.

Companies can face stiff financial and civil penalties for failing to disclose a cybersecurity incident such as exposing insurance applications. BackNine is based in California, a state with some of the most aggressive data protections laws in the country. The California Consumer Privacy Act provides for the imposition of penalties for violations. The California Attorney Generals Office is authorized to seek civil penalties of $2,500 for each violation or $7,500 for each intentional violation.

The CCPA applies to for-profit organizations that operate in California and satisfy one of these criteria:

These criteria could render BackNine liable for exposing client insurance applications.

See more here:
Insurance Applications in the Hundreds of Thousands Exposed - Lexology

Read More..

Leaked memo shows Oracles flagship cloud unit told employees to ramp up for 247 work on projects that insiders say have fallen behind schedule – Times…

Oracle cofounder and CTO Larry Ellison

Reuters/Robert Galbraith

Oracle Cloud Infrastructure, the database giants flagship cloud unit and its answer to the dominant Amazon Web Services, has instructed its employees to focus on an updated set of priorities for the next several quarters, according to a memo viewed by Insider.

Other feature and development work is paused to assist in this effort, said the memo, sent to OCIs over 10,000 employees last week.

We know this change impacts many of the teams directly and indirectly. We appreciate your ability to Expect and Embrace Change, and your ability to continue to iterate and deliver a world class platform, the memo said, referring to the units leadership principles. Oracle declined to comment for this story.

The email lists those priorities in order of importance, starting with security (e.g. patching), followed by operations & support, region build for big customers (Telesis, NRI) and gov work [sic], and finally, region build for all other regions.

Two Oracle insiders say that several of the region build projects, with deadlines before the end of the year, are running behind schedule. In industry parlance, a region generally refers to the cloud servers or data centers intended to serve a particular area or country, and a region build is the process of setting those up. New regions would help expand Oracles reach and make it more appealing for large customers and government deals.

The memo says that its highest-priority region after those built for customers and the government right now is in Israel, followed by other dedicated regions including Oman, then rest of commercial. Oracles dedicated cloud regions only serve particular areas or countries.

Region bootstrap, across regions, will need to happen on a 247 basis in order to hit our delivery dates. All teams will need to resource appropriately to accommodate this expectation. This means, in some cases, temporarily reallocating personnel from other projects, teams, or orgs, the memo says, further calling on teams to facilitate war rooms on a 247 basis to troubleshoot issues and create 24-hour-a-day on-call rotations.

Notably, however, three Oracle employees told Insider that company leadership has since reduced the schedules to 147 after widespread discontent that one person characterized as a backlash.

Two people close to OCI speculate the updated priorities could be, at least in part, related to the fact that Oracle wants to make itself a stronger competitor for the Pentagons Joint Warfighter Cloud Capability contract, the successor to the now-scrapped $10 billion JEDI deal. Oracle lost out on the JEDI contract, which was awarded to Microsoft, but was ultimately canceled amid a lengthy legal challenge from Amazon.

The email suggests security is OCIs new top priority. The company recently reorganized the cloud security organization, which has a few hundred employees, and replaced its leader after only about a year, according to company insiders and an internal email viewed by Insider.

The changes come as OCIs workplace culture comes under scrutiny. More than a dozen current and former Oracle employees and executives recently told Insider that OCI is led by what one person described as a culture of fear, telling Insider that OCI boss Clay Magouyrk is known for trying to get results by beating down employees emotionally.

Magouyrks leadership style was cited in a pair of lawsuits filed by former vice presidents against the company and an executive. One of the former VPs who sued Oracle died by suicide in April. An attorney for the VPs said the cases are headed for arbitration.

Do you work at Oracle? Contact reporter Ashley Stewart via encrypted messaging app Signal (+1-425-344-8242) or email ([emailprotected]).

See the rest here:
Leaked memo shows Oracles flagship cloud unit told employees to ramp up for 247 work on projects that insiders say have fallen behind schedule - Times...

Read More..

Multiple encryption flaws uncovered in Telegram messaging protocol – The Daily Swig

Vulnerabilities highlight risks of knit-your-own crypto

UPDATED An analysis of the popular Telegram secure messaging protocol has identified four cryptographic vulnerabilities.

Although none of the flaws are particularly serious or easy to exploit, security researchers have nonetheless warned that the software falls short on some essential data security guarantees.

Computer scientists from from ETH Zurich and Royal Holloway, University of London, uncovered the vulnerabilities after examining the open source code used to provide encryption services to the Telegram app. The audit excluded any attempt to attack any of Telegrams live systems.

The researchers found that Telegrams proprietary system falls short of the security guarantees enjoyed by other, widely deployed cryptographic protocols such as Transport Layer Security (TLS).

ETH Zurich professor Kenny Paterson commented that encryption services could be done better, more securely, and in a more trustworthy manner with a standard approach to cryptography.

Catch up with the latest encryption-related news and analysis

The most significant vulnerability among the quartet makes it possible for an attacker to manipulate the sequencing of messages coming from a client to one of the cloud servers operate by Telegram.

A second flaw made it possible for an attacker on the network to detect which of two messages are encrypted by a client or a server, an issue more of interest to cryptographers than hostile parties, the researchers suggest.

The third security issue involves a potential manipulator-in-the-middle attack targeting initial key negotiation between the client and the server. This assault could only succeed after sending billions of messages.

A fourth security weakness made it possible (at least in theory) for an attacker to recover some plain text from encrypted messages a timing-based side-channel attack that would require an attacker to send millions of messages and observe how long the responses take to be delivered. The researchers admit the attack is impractical while Telegram goes further and categorises it as a non-threat.

"The researchers did not discover a way to decipher messages," a representative of Telegram told The Daily Swig.

In a statement, the firm welcomed the research

The traits of MTProto pointed out by the group of researchers from the University of London and ETH Zurich were not critical, as they didn't allow anyone to decipher Telegram messages. That said, we welcome any research that helps make our protocol even more secure.

These particular findings helped further improve the theoretical security of the protocol: the latest versions of official Telegram apps already contain the changes that make the four observations made by the researchers no longer relevant.

The researchers notified Telegram about their research in April. Telegram has since patched all four flaws, clearing the way for researchers to go public with their findings through a detailed technical blog post.

Royal Holloway professor Martin Albrecht told The Daily Swig that the researchers offered lessons for other developers of secure messaging apps for example, industry standard TLS encryption should be a preferred design choice.

The mode of Telegram we looked at was when messages are encrypted between the client and the server only, Albrecht explained.

This is no different from running Facebook Messenger or IRC [Internet Relay Chat] over TLS. Here it makes little sense to not use TLS (or its UDP variants). It is well studied, including its implementations, it does not need special assumptions, it is less brittle than [for example] MTProto.

MTProto is the encryption scheme used by Telegram.

READ Kaspersky Password Manager lambasted for multiple cryptographic flaws

Telegram already relies on TLS for its security for messages from the server to Android clients, but it relies on proprietary approaches elsewhere.

Whether apps are built using TLS as a foundation or not, an audit by cryptographers is highly advisable.

Albrecht commented: When we talk about secure messaging apps specifically, i.e messages are encrypted between the parties not just the transport layer between client and server, they should have cryptographers on staff who formally reason about the design. In the future this should get easier with the MLS standard.

The research into Telegram was motivated by use of technology by participants in large-scale protests such as those seen in 2019/2020 in Hong Kong.

We found that protesters critically relied on Telegram to coordinate their activities, but that Telegram had not received a security check from cryptographers, according to Albrecht.

Albrecht was part of a team that researched what makes the Telegram platform attractive to high-risk users involved in mass protests, who are likely to be targeted by surveillance.

Telegram does seem to have the advantage of staying up in light of government crackdown in contrast to other social networks and seemingly not complying all that much with government requests, according to Albrecht.

YOU MAY LIKE Threema, the European rival to Signal, wins pivotal privacy battle in Swiss Court

Although mobile messaging apps such as Signal are often recommended and used by the security-savvy, features and utility are more important for mainstream users and go some way to explaining use of Telegram among protesters in Hong Kong and beyond.

It might be better to compare Telegram to Facebook or Twitter (in terms of features and appeal) than to, say, Signal, he added.

Telegram may be preferred to Facebook even if the latter is likely better or at stricter when it comes to data governance, Albrecht concluded.

On the flip side, it is not clear what security policies, processes and safeguards Telegram have in place to, e.g continuously vet their (server and client) code for software vulnerabilities, to prevent their own staff from snooping.

This story was updated to add comment from Telegram that welcomed the work of the researchers but disputed the impact of one of the admitted vulnerabilities.

RELATED Encryption issues account for minority of flaws in encryption libraries research

Excerpt from:
Multiple encryption flaws uncovered in Telegram messaging protocol - The Daily Swig

Read More..

MSPs upbeat but wary of increased competition – ComputerWeekly.com

Interest across the channel in the managed service model has continued to rise, with the coronavirus pandemic only accelerating that trend over the past year.

Datto has made efforts to try to capture the mood of the market with its latest Global State of the MSP Report, with the main findings reinforcing the idea that this is becoming the dominant delivery model in the channel.

The firm found that among UK managed service providers, there was plenty of positivism, with 98% agreeing that now is a good time to be an MSP and 81% reporting that they came through the pandemic with revenues either unchanged or improved. That sense of optimism could also be seen in the 97% of UK MSPs that expect revenues to increase over the next three years.

When it came to hunting out the potential problems, Datto found that revenue growth, competition and profitability were all issues that caused concern for MSPs.

On a technical front, security remained top of the pile for those MSPs looking to help SME customers with their top demands. Almost all (99%) of those quizzed by Datto for the report said they offered a managed security service. That can come from different sources, with UK channel players happy to offer co-managed security tools, partner with an MSSP or with some other form of security expert.

The impact of the pandemic could also be seen in the attitudes towards cloud, with 58% of UK respondents indicating that their customers now have between 50% and 75% of their workloads in the cloud. Those included email servers, databases and application servers. In terms of the public cloud players, AWS leads the way, slightly ahead of Microsoft Azure with Google Cloud coming in third.

The global picture showed that increased competition was the main concern for MSPs, with it clear that there was a lot at stake for those that gained trusted adviser status with an SME customer. This is the first time that competition has topped the list of global concerns, which Datto saw as a sign that the MSP market was maturing and there was pressure on partners to offer differentiated and relevant solutions.

Demand for security and an increasing shift by users towards the cloud were also seen across the world. The majority of those responding to the research agreed that those areas offered opportunities going forward.

Businesses have had to rethink operations and explore new avenues for managed services, said Tim Weller, CEO of Datto. Over the last year and a half, MSPs were the unsung heroes for SMEs, enabling them to run their business while the MSPs themselves faced many of the same challenges of remote/hybrid work and economic uncertainty.

This accelerated MSP and SME digital transformation. This research reflects that MSPs are focused on cloud migration, increased collaboration, and investment in security solutions. With this new mindset, MSPs can support SMEs for the transformation to come.

The research reflected the state of the market and David Carr, director at ATG, said MSPs were already responding to changing customer needs. Ensuring all systems are fully secure is the essential foundation of our business, he said. Our clients are no longer fearful of putting their critical data in the cloud there has been a culture shift as they have learned to rely on us to keep their data safe.

As that trusted MSSP, it is our job to recommend services to clients which will enhance their productivity and processes, all in a secure way.

Andrew Allen, chief executive at Aabyss, said the emergence of competition as the main global concern also gave MSPs some food for thought. While the report revealed that MSP revenue will increase over the next three years, 34% of respondents cited competition as their biggest concern, he said.

It is encouraging that MSPs are striving to improve standards with greater technology adoption. However, the challenge is that technologists do not tend to be business leaders. Therefore, it is recognised within the MSP community that to remain competitive and grow revenue, there is a clear need for education in business management.

Read this article:
MSPs upbeat but wary of increased competition - ComputerWeekly.com

Read More..

An insurtech startup exposed thousands of sensitive insurance applications TechCrunch Bestgamingpro – Best gaming pro

A safety lapse at insurance coverage expertise startup BackNine uncovered lots of of 1000s of insurance coverage purposes after certainly one of its cloud servers was left unprotected on the web.

BackNine may be an organization youre not accustomed to, but it surely may need processed your private info when you utilized for insurance coverage previously few years. The California-based firm builds back-office software program to assist greater insurance coverage carriers promote and preserve life and incapacity insurance coverage insurance policies. It additionally affords a white-labeled quote internet kind for smaller or impartial monetary planners who promote insurance policy by their very own web sites.

However one of many firms storage servers, hosted Nows cloud, was misconfigured to permit anybody entry to the 711,000 recordsdata inside, together with accomplished insurance coverage purposes that include extremely delicate private and medical info on the applicant and their household. It additionally contained photos of people signatures in addition to different inner BackNine recordsdata.

Of the paperwork reviewed, TechCrunch discovered contact info, like full names, addresses and telephone numbers, but in addition Social Safety numbers, medical diagnoses, medicines taken and detailed accomplished questionnaires about an applicants well being, previous and current. Different recordsdata included lab and check outcomes, corresponding to blood work and electrocardiograms. Some purposes additionally contained drivers license numbers.

The uncovered paperwork date again to 2015, and as just lately as this month.

As a result of Amazon storage servers, generally known as buckets, are personal by default, somebody with management of the buckets will need to have modified its permissions to public. Not one of the information was encrypted.

Safety researcher Bob Diachenko discovered the uncovered storage bucket and emailed particulars of the lapse to the corporate in early June, however after receiving an preliminary response, he didnt hear again and the bucket remained open.

We reached out to BackNine vice chairman Reid Tattersall, with whom Diachenko was in touch and ignored. TechCrunch, too, was ignored. However inside minutes of offering Tattersall and him solely with the title of the uncovered bucket, the information was locked down. TechCrunch has but to obtain a response from Tattersall, or his father Mark, the corporates chief government, who was copied on a later electronic mail.

TechCrunch requested Tattersall if the corporate has alerted native authorities per state information breach notification legal guidelines, or if the corporate has any plans to inform the affected people whose information was uncovered. We didnt obtain a solution. Corporations can face stiff monetary and civil penalties for failing to reveal a cybersecurity incident.

BackNine works with a few of Americas largest insurance coverage carriers. Lots of the insurance coverage purposes discovered within the uncovered bucket have been for AIG, TransAmerica, John Hancock, Lincoln Monetary Group and Prudential. When reached previous to publication, spokespeople for the insurance coverage giants didnt remark.

Learn extra:

Read more here:
An insurtech startup exposed thousands of sensitive insurance applications TechCrunch Bestgamingpro - Best gaming pro

Read More..

A DNS outage just took down a large chunk of the internet – TechCrunch

A large chunk of the internet dropped offline on Thursday. Some of the most popular sites, apps and services on the internet were down, including UPS and FedEx (which have since come back online), Airbnb, Fidelity, and others are reporting Steam, LastPass, and the PlayStation Network are all experiencing downtime.

Many other websites around the world are also affected, including media outlets in Europe.

What appears to be the cause is an outage at Akamai, an internet security giant that provides networking and content delivery services to companies. At around 11 a.m. ET, Akamai reported an issue with its Edge DNS, a service thats designed to keep websites, apps and services running smoothly and securely.

DNS services are critically important to how the internet works, but are known to have bugs and can be easily manipulated by malicious actors. Companies like Akamai have built their own DNS services that are meant to solve some of these problems for their customers. But when things go wrong or theres an outage, it can cause a knock-on effect to all of the customer websites and services that rely on it.

Akamai said it was actively investigating the issue, but when reached a spokesperson would not say if its outage was the cause of the disruption to other sites and services that are currently offline. A spokesperson for ThousandEyes, an internet monitoring company bought by Cisco in 2020, attributed the outage to Akamai.

Akamai would not say what caused the issue but that it was already in recovery.

We have implemented a fix for this issue, and based on current observations, the service is resuming normal operations. We will continue to monitor to ensure that the impact has been fully mitigated, Akamai told TechCrunch.

In a follow-up tweet, the company said it was not a result of a cyberattack.

Its not the first time weve seen an outage this big. Last year Cloudflare, which also provides networking services to companies around the world, had a similar outage following a bug that caused major sites to stop loading, including Shopify, Discord and Politico. In November, Amazons cloud service also stumbled, which prevented it from updating its own status page during the incident. Online workspace startup Notion also had a high-profile outage this year, forcing the company to turn to Twitter to ask for help.

Read more here:
A DNS outage just took down a large chunk of the internet - TechCrunch

Read More..

Meet the UAB students training to stop ransomware and other digital threats – UAB News

UABs cybersecurity masters program is preparing a new workforce for a booming field with ever-increasing demand and a shortage of skills. The program has a unique focus on both cyber defense and cyber investigations.

Lindsey Sandlin Photo by: Andrea MabryJust weeks before Colonial Pipeline was devastated by the most high-profile infrastructure cyberattack in United States history in May, the company posted an ad on LinkedIn for Manager, Cyber Security. Colonial was searching for a masters-trained professional who could create and maintain an incident response plan and processes to address potential threats, according to Bloomberg News.

Colonials position, like many others in the hot cybersecurity job market, went unfilled, resulting in a catastrophic shutdown, global headlines and long lines at pumps across the eastern United States.

The stakes are not always this high; but according to the 2021 State of the CIO survey from the publication CIO, cybersecurity jobs are the most challenging IT jobs to fill right now, surpassing AI/machine learning and data science/analytics. The U.S. Bureau of Labor Statistics projects that jobs in the information security analyst category will grow 31 percent (adding more than 40,000 jobs) by 2029, much faster than the average. The pay is attractive as well; the median salary in 2020 was $103,590 per year.

All of this is not news to Nitesh Saxena, Ph.D., professor in the Department of Computer Science and co-director of the Master of Science in Cyber-Security program at the University of Alabama at Birmingham, a joint program of the computer science department and the Department of Criminal Justice.

This is a very popular area with ever-increasing demand and a shortage of skilled applicants, Saxena said. Most of our students go straight into jobs in industry with private companies and government organizations.

Ransomware is clearly an important threat, Saxena said. But our program actually focuses on much broader issues. Our goal is for our students to have holistic experience in cyberattack prevention, detection, forensics and recovery. We graduate lifelong learners who can adapt to address the new challenges that will always appear in this ever-changing area.

Despite the soaring media coverage, ransomware is one of the lower entries on the FBIs 2020 Internet Crime Report. Business Email Compromise, the leading category, totaled $1.8 billion in reported losses in 2020. (Ransomware totaled just over $29 million, although the FBI notes that this number does not include estimate of lost business, time, wages, files or equipment.) More than 30 separate categories of attack are detailed in the Internet Crime Report, from confidence fraud and identity theft to credit card fraud, extortion and corporate data breaches. Overall, internet crime complaints rose 70 percent in 2020 over 2019, with reported losses exceeding $4.2 billion.

Graduates of UABs masters program are trained to make an impact on these staggering figures. One key differentiating factor of UABs program is that it is run jointly with the criminal justice department, Saxena said. It has a typical Cyber Defense track, but also a Cyber Crime Investigations track, which is unique across the entire nation and worldwide.

The Cyber Crime Investigations track enables students to move beyond simply responding to an attack and into determining where it came from and who was behind it, says Jeffery Walker, Ph.D., professor and chair of the Department of Criminal Justice and co-director of the Cyber-Security masters program. This can aid in stopping the attackers before they strike again. Students in the program also have the opportunity to work in the Computer Forensic Research lab at UAB, Walker said: Here they work directly on large-scale cybersecurity projects for financial institutions, corporations and the federal government. This gives them an added advantage when they graduate because they have real-world experience.

Students in the program also have the opportunity to work in the Computer Forensic Research lab at UAB: Here they work directly on large-scale cybersecurity projects for financial institutions, corporations and the federal government. This gives them an added advantage when they graduate because they have real-world experience.

The Cyber Crime Investigations track was particularly appealing to current student Lindsey Sandlin, who has an undergraduate degree in criminal justice with a minor in cyber criminology. The masters program at UAB is ideal for a student like me who wants a combination of both specialties, she said. Sandlin has taken a special interest in digital forensics courses that have trained her in everything from investigating email spam to learning how to examine encrypted phones.

Sandlin also was attracted by UABs designation as a site for the National Science Foundation Cybercorps Scholarship for Service program, which offers stipends of $34,000 per year, covers expenses including education-related fees, professional development and books, and even includes a health insurance reimbursement allowance. In return, students complete an internship with a federal, state, local or tribal government organization in a position related to cybersecurity and work in such an organization after graduation for a period equal to the length of their scholarship.

The NSF pays scholarships for bright students to pursue degrees in cybersecurity, and these students then work for the government in cybersecurity fields, Saxena said. It is a win-win for both students and the government.

Sandlin has already received a job offer and will be moving to Washington, D.C., after graduation in August 2021. I plan on continuing employment within the government working in digital forensics for the long term, she said.

Payton Walker, who earned his masters degree at UAB in 2019, is now pursuing a doctoral degree with Saxena as his mentor. When I started reading about the cybersecurity field, I immediately became interested, Walker said. The idea of working to improve national security was very appealing.

Walker researched UABs masters program and thought it was a good fit. He also was intrigued by the studies going on in Saxenas SPIES (Security and Privacy in Emerging computing and networking Systems) research group. They were working on some very interesting projects that sparked my curiosity about conducting research, including an analysis of how smartphone motion sensors can be used to eavesdrop on private conversations, Walker said. I was able to shadow and work under the lead student on this project, Abhishek Anand, and later expanded on this research area for my Ph.D. work.

Walker, like Sandlin, has earned an NSF CyberCorps scholarship. I chose to pursue a Ph.D. mainly for additional training for the workforce, he said. I would like to work for a federal agency or federally funded research center as a research scientist. Walkers one-year work commitment is deferred while he is finishing his doctorate, but afterward I will be expected to work for a federal agency or other institute that is federally funded, he said. But this is exactly what he wanted, Walker explains. I am most interested in working for the federal government and conducting research to aid national security, he said. Ideally, I would like to work for a federal agency like the Department of Energy in one of their cybersecurity research laboratories and participate in the cutting-edge research that they do.

Walker already has considerable experience in groundbreaking cybersecurity investigations and is a co-author on four publications so far thanks to his work with the SPIES lab. My research focuses on side-channel speech attacks in the vibration domain as well as speech attacks against modern voice-controllable Internet of Things systems, such as smart speakers from companies such as Google and Amazon, he said.

Our students get the chance to contribute to research that is pushing the boundaries of cybersecurity, and they present their work at major conferences and meetings, Saxena said. This is invaluable experience, no matter where they choose to work, whether in industry or in government.

Read more from the original source:
Meet the UAB students training to stop ransomware and other digital threats - UAB News

Read More..

Connecticut pushes cybersecurity with offers of punitive damage protection – GCN.com

Connecticut pushes cybersecurity with offers of punitive damage protection

Connecticut Gov. Ned Lamontsigned a bill designed to encourage businesses in the state to beef up their cybersecurity.

An Act Incentivizing the Adoption of Cybersecurity Standards for Businesses will protect businesses from punitive damages resulting from a breach of personal data if they have adopted and adhere to industry-standard cybersecurity measures.

The new law requires businesses to secure individuals names, Social Security numbers, taxpayer ID numbers, driver's license numbers or other government identifiers; financial account numbers and passwords; medical or health insurance information; biometric information; and names or email address that are used in combination with a password or security to access online accounts.

To be exempt from damages, an organization must conform to the current version of any recognized security framework such as the National Institute of Standards and Technologys Framework for Improving Critical Infrastructure Cybersecurity; Special Publications 800-171, 800-53 and 800-53a; the Federal Risk and Authorization Management Program's FedRAMP Security Assessment Framework; the Center for Internet Security's Critical Security Controls for Effective Cyber Defense; or the ISO/IEC 27000 series.

Organizations already regulated by the state or federal government must keep their compliance with the Health Insurance Portability and Accountability Act, the Federal Information Security Modernization Act and the Health Information Technology for Economic and Clinical Health Act in order to avoid paying punitive damages.

Businesses must also comply with the current version of the Payment Card Industry Data Security Standard.

When any of the relied-upon cybersecurity standards are updated, businesses have six months to comply.

The legislation is the latest of Connecticuts efforts to better secure its assets. Earlier this year, Lamontannouncedthe centralization of state IT resources and named Jeff Brown as the states first chief information security officer.

Across the globe, cybersecurity risks continue to rise,Brown said. Connecticut is investing in cybersecurity and technology in new ways to protect our residents and businesses. We are bringing our statewide information technology team together into one, collaborative organization that will help us identify and deter cybersecurity incidents faster, bring everyone onto streamlined platforms, and ultimately protect more private information.

The measure goes into effect on Oct. 1, 2021.

About the Author

Connect with the GCN staff on Twitter @GCNtech.

The rest is here:
Connecticut pushes cybersecurity with offers of punitive damage protection - GCN.com

Read More..

DesignRush Reveals the Best Technology Experts to Hire in 2021 [Q2 Rankings] – Yahoo Finance

DesignRush issued the second quarterly list of top technology companies specialized in various fields ranging from software development, internet security and artificial intelligence, among others.

NEW YORK, July 23, 2021 /PRNewswire-PRWeb/ -- Experts predict that there will be 75 billion interconnected devices worldwide by 2025. From productivity to entertainment, software and hardware solutions are evolving to support the growing market needs and demand.

Whether looking to build custom solutions or leverage a portfolio of commercial software, businesses need reliable technology partners.

DesignRush, a B2B marketplace that connects brands with agencies, has released the second quarterly (Q2) list of the top technology experts to hire. The list features experts in:

The top technology expert companies in Q2, according to DesignRush's Q2 list, are:

Apiumhub - apiumhub.com

Archer Software - archer-soft.co

BiharApps - biharapps.com

CodeStringers - codestringers.com

Codete - codete.com

CrustLab - crustlab.com

Daxx - daxx.com

Digilite - digilite.ca

Digimid - digimid.com

Digital Skynet - digitalskynet.com

Dividato - sf.dividato.com

EDISON Software Development Centre - edsd.com

Emergent Software - emergentsoftware.net

Emorphis Technologies - emorphis.com

Enlab Software - enlabsoftware.com

Exposit - exposit.com

fram^ - wearefram.com

4ire Labs - 4irelabs.com

iFour Technolab Pvt Ltd - ifourtechnolab.com

ISHIR - ishir.com

KindGeek - kindgeek.com

Leobit - leobit.com

mindworks GmbH - mindworks.de

Moblers - moblers.com

Noltic - noltic.com

Onex Software - onexyazilim.com

PanonIT - panonit.com

Prompt Softech - promptsoftech.com

Semaphore Mobile - semaphoremobile.com

SF AppWorks - sfappworks.com

Smazee - smazee.com

Spire Digital - spiredigital.com

Sunrise Software Solutions Corporation - s3corp.com.vn

Synebo - synebo.io

System Logic Solution - systemlogicsolution.com

The Custom Packaging - thecustompackaging.com

The Gnar Company - thegnar.co

Unmetered Technologies - unmeteredtechnologies.com

WaveAccess - wave-access.com

Webspaceteam - webspaceteam.com

Wirefox Design Agency - wirefox.co.uk

Zesium - zesium.com

Zfort Group - zfort.com

Brands can explore the top technology companies by location, size, average hourly rate and portfolio on DesignRush.

Story continues

About DesignRush:

DesignRush.com is a B2B marketplace connecting brands with agencies. DesignRush features the top agencies around the world, including the best Digital Agencies, Logo Design, Branding, Digital Marketing, Website Design, eCommerce Web Design Companies, and more.

Media Contact

Srdjan Rokvic, DesignRush, 8008565417, srdjan@designrush.com

Twitter

SOURCE DesignRush

View original post here:
DesignRush Reveals the Best Technology Experts to Hire in 2021 [Q2 Rankings] - Yahoo Finance

Read More..