Page 2,771«..1020..2,7702,7712,7722,773..2,7802,790..»

What Is a Container? | Understanding Containerization | SW – Server Watch

Containerization is the solution to the roadblocks posed by traditional virtualization. Since their inception, virtual machines (VMs) have enabled organizations to do more with less. A single physical device can contain several isolated, virtual environments through a hypervisor, and the benefits include reduced overhead, convenient mobility, and scalability.

Sounds great but theres one problem. Virtual machines are heavy units.

Because a significant appeal of virtualization is its use in DevOps, the ability to store and migrate applications between platforms is essential. Coming in to fill this gap is virtualizations younger, lightweight brother: containers.

A container, or application container, is an isolated computing environment in which programs are stored and accessed. Containers are a favorite for contemporary software development and deployment for two reasons.

Whereas virtual machines offer a complete hardware system simulation, containers only emulate the operating system. For the layman, this means containers only virtualize the OS and not a computers entire physical infrastructure like disks, drives, and server equipment.

In virtualization, two frameworks have emerged for modern networks: virtual machines and containers. Neither is mutually exclusive, and both facilitate moving one physical devices contents to another. The crucial difference and advantage for containers is their size or lack thereof.

With a VMs applications, bins and libraries, and the guest OS giving it hardware-level virtualization, a virtual machine takes up gigabytes (GB) of space. By comparison, containers will often contain only a single application and have a footprint in megabytes (MB).

Read more about how servers virtual machines and containerization differ in our Guide to Virtualization vs. Containerization.

Modernizing applications today means migrating programs from legacy on-premises deployments to cloud solutions. Because containers are agile, they enhance an organizations ability to migrate applications and workflows seamlessly. Immutable across environments, containers enable organizations to use the synergy of DevOps to develop and deploy applications more quickly.

The DevOps model is a paradigm shift for software providers. By joining development and operations engineers, organizations enable a faster-paced service delivery model. Whereas before developers and operations teams split work between devices, operating systems, and process steps, containers bridge the gap. This allows an organization to build, test, and ship its services more efficiently.

The microservices architecture allows software developers to produce applications made up of several independent deployable services. Different components of the application hosted in containers are scalable and amenable to updating without disrupting other services.

The modern organization infrastructure balances on-premises appliances, private cloud operations, and (potentially) multiple public cloud platforms. As organizations adopt this diversified approach, containers prove to have several benefits:

While virtualization is hot, hybrid infrastructure is the future. We look at the state of organization infrastructures, and which workloads go where between on-prem, public cloud, and private cloud environments.

Read more about why On-Prem Infrastructure is Here to Stay

A handful of estimates show the global application container industry was worth around $1 billion in 2018. Market research projects those numbers to climb to over $4 billion by 2023 and $8 billion by 2025. Market segments for the container industry include:

Container orchestration services remain a leading revenue segment as organizations attempt to manage a fleet of new containers serving ever-evolving networks. Leading cloud service providers like AWS and Azure have quickly offered cloud-based container management services (CaaS). At the same time, virtualization specialists VMware, Red Hat, and Docker continue to impress industry leaders.

As the dominant cloud service provider, Amazon Web Services (AWS) also offers many container solutions. Features AWS offers include running Kubernetes clusters, building microservices, and migrating existing applications.

In a multi-cloud world, the Cisco Container Platform (CCP) aims to reduce the diaspora of data across environments. Ciscos solution is a turnkey with built-in monitoring and Istio for fast implementation.

Docker, Inc. employs PaaS products based on its open-source technology, Docker, for containerization. Started in 2008, Docker has been so dominant in the container space that its flagship name is almost synonymous with containers themselves.

Informed by the rise of Docker and responsible for developing Kubernetes technology, the Google Cloud Platform (GCP) offers the Google Engines for Containers, Kubernetes, and Compute for virtualization management.

Second only to AWS in cloud service market cap, Azures container technology ranges from cloud-scale job scheduling to fully managed OpenShift clusters and microservice orchestration. Solutions include Azure Kubernetes Service (AKS), Container Instances, Service Fabric, and more.

The Oracle Container Engine for Kubernetes (OKE) offers one-click cluster creation, end-to-end container lifecycle management, and easy integration with Oracles cloud infrastructure. Private Kubernetes clusters come with embedded IAM, CASB, and RBAC.

Acquired by IBM in 2019 for a whopping $34 billion, Red Hats line of open-source and enterprise software is well known, along with its relationships with top industry players. Only behind Google in contributing to Kubernetes code, Red Hats container solution is the industry-respected OpenShift.

Without VMware, its hard to imagine what commercial virtualization would look like today. For containerization, VMwares Tanzu software brings Dev and Ops teams together to secure communication between apps, automate container management, and modernize apps fast.

Considering a container service with added security? Check out this list of 2021s Top Container Security Solutions.

Containers are a proven method for employing virtualization for enterprises of all sizes. While virtual machines are still the favorite for enterprise and critical workload virtualization, containers are gaining ground.

The truth is both virtualization techniques complement each other. Virtual machines address infrastructure by enabling portability of resource-heavy applications and enhanced server utilization. Containers address application development by facilitating DevOps and microservices. Combined, organizations can optimize these innovations with a hybrid approach to virtualization.

Also read: Best Server Virtualization Software for 2021

Link:
What Is a Container? | Understanding Containerization | SW - Server Watch

Read More..

PaaS Rating: An Easier Way to Build Software Applications – Illinoisnewstoday.com

Platform as a Service (PaaS) is software that enables third-party service providers to provide platforms to their customers and develop, run, and manage software applications without having to build and maintain the underlying infrastructure themselves. It is a development enabler.

Most platforms as a service include templates or build packs. opinion How to build a particular type of application is usually centered around the popular ones. 12-element methodology.. This is why PaaS options are often labeled as opinion and are ideal for new greenfield applications.

Appearance of Cloud computing Companies such as Amazon Web Services, Microsoft, and Google put together the key components needed to launch an application on their own platform, with a single command or mouse click on the code.

This simplification makes software development faster and easier, and hides the underlying compute, storage, database, operating system, and network resources needed to run applications, thus increasing the scope of the developers work. It will be reduced. PaaS providers charge for the use of these resources, and in some cases for the use of the platform itself, by the number of applications per user (or seat) or hosted.

Like other cloud services such as Infrastructure as a Service (IaaS) And Software as a Service (SaaS), PaaS is typically accessed over the Internet, but can also be deployed in on-premises or hybrid mode. In any case, the underlying infrastructure on which the application runs is managed by the service provider. In many cases, customers can decide where to physically host their applications and choose the performance or safety of their environment. Often there are additional costs.

The components of a typical PaaS are:

For many, the PaaS and IaaS debate is settled by the market, but the decision to use the underlying building block itself (IaaS) or the opinionable PaaS is to pursue speed. It is a decision that many people make today. Application to the market.

As with any other case of software development, this decision comes with trade-offs and depends on what your organization is trying to achieve.

One of the biggest benefits of using PaaS is the ability to quickly create and deploy applications. You dont have to take the hassle to set up and maintain the environment in which your application runs. This, in theory, allows developers to deploy faster and more regularly, allowing them to focus on differentiators rather than solving problems such as infrastructure provisioning.

PaaS is maintained by the service provider and comes with service level agreements and other guarantees, so developers dont have to worry about cumbersome and repetitive tasks such as patching and upgrading, ensuring the availability and stability of their environment. I can be sure it is expensive. , Although the outage still occurs.

PaaS can also be a convenient gateway to new things Cloud-native development method Program a language without up-front investment to build a new environment

Most of the risks associated with using PaaS result in a loss of control that professional developers must tolerate by handing over their applications to third-party providers. These risks include information security and data resident concerns, fear of vendor lock-in, and unplanned outages.

With PaaS, some team members may find it confusing because developers have a limited range of changes to their development environment. Failure to change the environment or deploy feature requirements by service providers can lead to enterprises. Build your own internal developer platform beyond PaaS..

So Benkepes wrote for Computerworld in 2017, PaaS is widely embedded in container management and automation ideas, and major providers such as Red Hat, VMware, and Big Three cloud providers are properly pivoting towards facilitating container adoption. Kubernetes in recent years.

That doesnt mean PaaS is deadInevitably, that PaaS has evolved as the industry has made widespread migration to containerized applications coordinated by Kubernetes. There is always a market that simplifies software development, but the underlying platforms for doing so are changing over time.

PaaS example

Some of the major PaaS providers include: Amazon web services (AWS), Google Cloud, Microsoft Azure, Red Hat, and Salesforce Heroku..

Big three cloud providers on AWS, Microsoft Azure, and Google Cloud have all made significant investments over the last decade to facilitate adoption of their services, integrating their own cloud components to facilitate adoption.

The major PaaS options still on the market include:

One of the first PaaS options, AWS Elastic Beanstalk, enables rapid deployment and management of cloud applications without having to learn about the underlying infrastructure. Elastic Beanstalk handles capacity provisioning, load balancing, scaling, and application health monitoring details automatically.

Cloud Foundry is an open source PaaS managed by the Cloud Foundry Foundation (CFF). Originally developed by VMware, it was transferred to Pivotal Software, a joint venture between EMC, VMware and General Electric, and then to CFF in 2015. Like OpenShift, Cloud Foundry is designed to build and run container-based applications. Kubernetes For orchestration.

Google App Engine is a PaaS offering for developing and hosting web applications in Google-managed data centers. Applications are sandboxed, run, and automatically scaled across multiple servers.

Microsoft Azure App Service is a fully managed PaaS that combines various Azure services on a single platform.

Red Hat OpenShift is a family of PaaS offerings that you can host or deploy on-premises in the cloud to build and deploy containerized applications. The flagship product is the OpenShift Container Platform. It is an on-premises PaaS built on Red Hat Enterprise Linux and built around a Docker container orchestrated and managed by Kubernetes.

Early very beloved PaaS, Heroku may have gone astray Since being acquired by SaaS giant Salesforce in 2010, Heroku has been part of a wide range of Salesforce platforms for developer tools, supporting a wide range of languages and thousands of developers running applications on them. I will. In fact, to use Heroku, you need to build a common runtime deployed in a virtualized Linux container. Dynos, As Heroku calls them, its spread across the dyno grid on AWS servers.

Platform as a Service has matured into its own important cloud service category, but containers (and Managed Container-as-a-Service (CaaS) option Developed by major vendors), Serverless computing,and Function as a service (FaaS) optionOffers many of the same benefits as PaaS, but for portability, flexibility, and serverless computing, it promises an environment where you pay only for what you use.

Error: Please check your email address.

tag paas

See the original post here:
PaaS Rating: An Easier Way to Build Software Applications - Illinoisnewstoday.com

Read More..

Center For Internet Security Updates CIS Controls With Focus On Cloud, Mobile, And Remote Work – Technology – United States – Mondaq News Alerts

Now is a great time to review your security posture, as you havea new tool to help you. On May 18, 2021, the Center for InternetSecurity (CIS) released Version 8 of its CIS Controls, formerly knownas the CIS Critical Security Controls (and often called the"CIS Top 20").

CIS intends the new version to better address some of the majordevelopments in IT and cybersecurity over the past several years,including the movement to cloud solutions, increased mobility, andnormalization of remote work. CIS is also updating the ecosystem oftools that support the Controls, including self-assessment toolsand a method for risk assessments that helps to justify securityinvestments.

The Version 8 update is likely to garner a lot of attention fromcompanies looking to address the "reasonable security"requirements referenced in California law (see Cal. Civ. Code1798.81.5(b), 1798.150(a)(1)), including in the forthcomingCalifornia Privacy Rights Act (CPRA), as well as numerous otherstate laws.

Then-California Attorney General (now Vice President) KamalaHarris concluded in her 2016 data breach report that anorganization's failure to implement all applicable CIS Controls"constitutes a lack of reasonable security." Since thatreport, many companies have used the CIS Controls as a primary wayfor evaluating their compliance with reasonable securityprovisions.

At their core, the CIS Controls are a list of security bestpractices similar to security frameworks such as NIST 800-53 andthe ISO 27000-series. Prior to Version 8, the CIS Controls wereorganized into 20 top-level controls that addressed, for example,access control, vulnerability assessment, audit log maintenance,and other foundational controls that mitigate security risk. Eachtop-level control includes specific "safeguards"(previously called "sub-controls"), which are actions,tools, or other resources that support the top-level control.

The key difference between the CIS Controls and other frameworksis their organization of the controls into "ImplementationGroups" (IGs), which define a set of recommended securitycontrols based on risk. Organizations may choose the IG appropriateto their risk and budget, then implement the controls listed forthat IG.

This grouping makes the CIS Controls an attractive option forbusinesses of varying sizes and risk profiles, including small- andmedium-sized businesses focused on basic cyber hygiene anddefense.

In addition to creating IGs, Version 8 consolidates severaltop-level controls, thereby reducing the total number from 20 to18, renames many of the controls, and reorganizes the relationshipbetween the controls and many of their underlying safeguards. TheVersion 8 safeguards place much more emphasis on mobile and cloudsecurity than prior versions' sub-controls.

In large part, these changes reflect CIS's goal of focusingmore holistically on system and asset security-regardless of wherethose systems or assets reside (within the corporate network, inthe cloud, at an employee's home, etc.) and which IT teamsmight be responsible for them. For example, Version 7.1 has acontrol specifically for "Wireless Access Control," whichincludes a sub-control to "Leverage the Advanced EncryptionStandard (AES) to Encrypt Wireless Data" (among others).

In Version 8, there is no control singularly focused on wirelesssecurity. Instead, wireless safeguards are dispersed throughout,and encryption of wireless traffic is rolled into a more generalsafeguard to "Encrypt Sensitive Data in Transit" underthe "Data Protocol" control. Version 8 notes that"[p]hysical devices, fixed boundaries, and discrete islands ofsecurity implementation are less important" in computing nowthan they were when prior versions were adopted.

New data privacy and security laws are increasing pressure onorganizations to adopt "reasonable" security controls forpersonal data. For instance, the New York Stop Hacks and Improve Electronic DataSecurity (SHIELD) Act, which went into effect in March 2020,requires businesses to "implement and maintain reasonablesafeguards to protect the security, confidentiality and integrityof the private information."

On the other side of the country, the CPRA will updateCalifornia law as of January 1, 2023, to require "[a] businessthat collects a consumer's personal information [to] implementreasonable security procedures and practices appropriate to thenature of the personal information to protect the personalinformation from unauthorized or illegal access, destruction, use,modification, or disclosure in accordance with Section1798.81.5."

Likewise, the Virginia Consumer Data Protection Act, which alsobecomes operative on January 1, 2023, requires businesses to"[e]stablish, implement, and maintain reasonableadministrative, technical, and physical data security practices toprotect the confidentiality, integrity, and accessibility ofpersonal data."

The White House, too, has joined the fray with its recent Executive Order on Improving the Nation'sCybersecurity (which we previously covered here). Intentionally or not, Version 8'smore holistic approach to security and increased emphasis on cloudand mobile technologies echoes many provisions of the ExecutiveOrder.

Among other things, the Executive Order directs the governmentto accelerate its movement to cloud systems and to adopt"zero-trust architecture" (ZTA), a security model thatchallenges the traditional notion of a security"perimeter" and focuses on the defense of computingassets wherever they reside.1Government contractors and suppliers who may need to shift towardscloud-based systems and ZTA-based security might consult the newCIS Controls to evaluate and develop their security programs.

Organizations of all sizes face some degree of informationsecurity risk to confidential or personal data. CIS ControlsVersion 8 makes mitigating those risks even more accessible andprovides a great excuse to take account of your securityposture.

Footnote

The National Institute of Standards and Technology (NIST) statesthat ZTA's "focus on protecting resources rather thannetwork segments is a response to enterprise trends that includeremote users and cloud-based assets that are not located within anenterprise-owned network boundary."

Originally published 05.24.21

The content of this article is intended to provide a generalguide to the subject matter. Specialist advice should be soughtabout your specific circumstances.

Read the rest here:
Center For Internet Security Updates CIS Controls With Focus On Cloud, Mobile, And Remote Work - Technology - United States - Mondaq News Alerts

Read More..

Cloudflare Solves the Internet’s Need for Speed and Security – InvestorPlace

Cloudflare(NYSE:NET) investors had to ride a roller coaster for the first five months of 2021. However, since mid-May, NET stock has been in growth mode, posting gains of over 50% from its low point. On July 9, it closed at $108.97, a new all-time high, though it has since eased back. Still within spitting distance of that record close, will NET stock run out of momentum, or does it still have room for growth?

I would argue that Cloudflare is a company with the right product mix at the right time to continue fueling long-term growth. Online shopping is only continuing to grow in popularity. Other services are moving online, including the transition from cable TV to streaming video services.

Cloudflare provides the critical services that keep online services fast, and keep them safe. Its even a big part of exploding IoT (Internet of Things) growth. This Portfolio Grader B rated stock is up nearly 500% from its September 2019 public debut. Given the business Cloudflare is in, the stock growth may just be getting started.

One of CloudFlares primary lines of business is being a CDN, or content delivery network. That may not sound exciting, but it is an increasingly important service and one that was in the spotlight during the pandemic.

Cloudflare uses local servers to host critical website services so that users enjoy the speed they expect. Even if a user is logging in on a PC across the country from a companys main data center, they hit a Cloudflare regional server first so there is no lag and no overload. That ensures online shopping, video conferencing, and other web-based activities offer a positive experience for all users, regardless of their location.

Now, more than ever, slow-loading websites are simply not acceptable. As Forbes Jason Hall wrote in 2019:

If a page loads slowly, many people will give up and go somewhere else. That can mean a loss of traffic to your site and a loss of dollars in your pocket. Your conversion rates may suffer, and your bounce rates the number of people who leave your site after only visiting one page may increase.

In addition, loading speed is also a factor in used search engine page rankings. Slow-loading websites show up lower in search results.

What holds true for websites also holds true for internet-based services. Streaming video, social media and mobile apps often rely on CDNs to keep their services fast and responsive no matter where customers are located.

Being a leading CDN is a big part of the NET stock story. Its going to continue to be a big part of the long-term growth story for Cloudflare stock as well.

Cybercrime is on the rise. Ransomware is a big problem, as seen from attacks like the Colonial Pipeline shutdown. Weve also seen an escalation in DDoS (distributed denial of service) attacks, with the volume of attack attempts up 31% in the first quarter. According to stats published by Cybercrime Magazine, damage from these attacks (including destroyed data, theft of money, and disruption to business) cost $3 trillion in 2015. By the time the damages are tallied for 2021, that number is expected to hit $6 trillion.

Boston Universitys Sharon Goldberg explains that taking security measures is a huge step in protection against ransomware attacks:

Attackers are not going to go after the organizations that are hard to breachtheyre going to go after the ones that are weaker.

Cloudflare security solutions protect companies against cyber attacks. This includes DDoS attacks that slow a website or service, even taking it offline. And we know how people react to slow websites. Cloudflare also protects against ransomware attacks. Security is a big market for the company, and its only going to continue to grow.

Is now the time to make a move on NET stock? The company is due to report second quarter earnings in three weeks, so you might want to take that into account. The current rally began shortly after Cloudflare delivered solid Q1 earnings that included 51% year-over-year revenue growth, a 70% increase in large customers, and boosted full-year 2021 guidance. If the market reacts in a similar fashion to Q2 earnings, todays price might seen like a bargain by then.

On the date of publication, Louis Navellier had a long position in NET. Louis Navellier did not have (either directly or indirectly) any other positions in the securities mentioned in this article. InvestorPlace Research Staff member primarily responsible for this article did not hold (either directly or indirectly) any positions in the securities mentioned in this article.

Louis Navellier, who has been called one of the most important money managers of our time, has broken the silence inthis shocking tell all video exposing one of the most shocking events in our countrys history andthe onemoveevery American needs to make today.

Go here to read the rest:
Cloudflare Solves the Internet's Need for Speed and Security - InvestorPlace

Read More..

If your company is held hostage, should you pay the ransom? Or should you be forced to tell the authorities? – ABC News

If someone broke into your home, and held all of your possessions to ransom, you would call the police.Right?

Or would you quietly pay whatever sum the thieves were demanding, and get your life back as quickly and easily as possible?

It might be a simple enough decision in a real-world scenario, but when it comes to cyber crime and ransomware, it seems to be much more complex.

Big companies can make good targets for cyber criminals who, in some cases, can extort millions of dollars with a pretty simple operation.

Ransomware attacks often see cyber criminals steal and encrypt data, or damage internal networks, and demand money to undo it.

More Australians are alert to the threat of cyber attacks but are we doing enough to prepare against the threat?

They might even threaten to publish sensitivestolen information, or offer it to competitors.

Sometimes paying the ransom can be easier than asking for help and fighting back.

Policy experts from the Cyber Security Cooperative Research Centre want to make it mandatory for Australian companies to tell authorities when they are being targeted.

And they want more clarity on whether paying ransoms is legal at all.

They warn a "tsunami of cyber crime" has cost the global economy about $1 trillion, and say Australia is a soft target.

In late March staff at Nine arrived at work on a Sunday morning, ready to put the Today show to air only to find they had been the victim of a near-crippling cyber attack.

It rocked the company's operations, with many Sydney-based staff forced to work from home or temporarily move to Melbourne, and it took weeks for workflows to be back to normal.

Nine was very upfront about the attack, and sought the help of authorities like the Australian Signals Directorate in managing it.

Knocking out the news is one thing, but only a few months ago a huge slice of the US was left scrambling for petrol after a ransomware attack knocked out Colonial Pipeline's networks.

Leanne Sherriff

The company was forced to completely shut down its pipelines, responsible for about half of the US East Coast's fuel supplies, for days.

Colonial later confirmed it paid a $US4.4m ($5.6m) ransom.

Australian logistics giant Toll Holdings was hit in two separate attacks last year.

It too worked with experts from the Australian Signals Directorate, and said at the time it had "no intention of engaging with any ransom demands."

And steaks were on the line when global meat processing company JBS Foods paid a $US11 million ($14.2 million) ransom in bitcoin about a month ago.

Its global operations, including in Australia, were all but brought to a standstill by the attack, and the company said it paid the money to avoid data being stolen.

Some experts warn many Australian companies do not fully appreciate the scale of the threats their companies face.

They compare the amount of money paid for security guards, alarms and sensors to protect a company's physical assets, compared to the relatively little money paid for cyber security.

ABC News

Rachael Falk from the Cyber Security Cooperative Research Centre said it is more common, and more serious, than many businesses appreciate.

"I think businesses are still woefully under prepared," she said.

"There are examples happening all around the world, and in Australia, almost on a weekly basis."

There are two things Ms Falk is suggesting the federal government could do to help companies better defend themselves.

The first is to use tax incentives to encourage businesses to invest in their cyber security.

The second is force them to speak up when they suffer an attack, and let authorities and security agencies know,to help protect others in future.

"We're saying be more transparent, because once it's out in the open, it helps everyone," she said.

"I can understand the need to want to protect the company, protect customers, and also the deep need to want to just get on with remediating what's going on, and not have to shout from the rooftops.

"I entirely understand that, but I think being transparent about it is helpful."

Those ideas are being pitched separately to legislation the government is already considering, imposing greater cyber security obligations on operators ofcritical assets like water, health energy and transport.

In a new policy paper, Ms Falk also argues the federal government has to clarify the legalities of paying ransoms.

While the official advice is always against paying ransoms, and instead working with authorities to combat ransomware attacks, some companies do take up the option.

It gets complex, because it is against the law to "deal with"money that could finish up involved in crime.

It is also illegal to provide funds to terrorist organisations which is another risk, in such a circumstance.

It used to be a business needed a lock on its door and a CCTV camera to protect against criminals, now experts say they need to invest in security they cannot see.

But duress is a defence, given the companies can reasonably believe a threat will be carried out if they do not pay.

Ms Falk does not suggest explicitly criminalising the payment of ransoms, arguing doing so would only further add to the burden of ransomware victims.

But she said those facing that difficult prospect should know legally where they stand.

"It will provide the victims with at least some certainty," she said.

"If we pay this, because we have to, we at least won't be facing some sort of action down the track from the Commonwealth that accuses our board of paying a ransom when we shouldn't have."

But she said better defences, and preventing an attack in the first place, were much simpler solutions.

"Ransomware is entirely foreseeable, and every business is at risk," she said.

"It's not just big organisations and household names, it's small companies.

"If they run a computer connected to the internet, they're at risk."

Continued here:
If your company is held hostage, should you pay the ransom? Or should you be forced to tell the authorities? - ABC News

Read More..

Ericsson to partner with Verizon in $8.3 billion deal to expand 5G coverage – The Dallas Morning News

Ericsson, a Swedish telecom company with its North American headquarters in Plano, will partner with Verizon to expand its U.S. 5G network in a $8.3 billion deal announced Friday.

Under the five-year agreement, Verizon will utilize Ericssons different technology solutions to expand its ultra-wideband 5G coverage. This includes the Massive MIMO, Ericsson Spectrum Sharing and the Ericsson Cloud Radio Access Network.

The deal is the single largest in Ericssons history, which stretches back to 1876.

This is a significant strategic partnership for both companies, and what were most excited about is bringing the benefits of 5G to U.S. consumers, enterprises and the public sector, said Niklas Heuveldop, president and head of Ericsson North America.

Ericsson and Verizon have a long track record of partnering together. In 2020, Verizon became the first communications service provider to receive a commercial 5G base station from the Ericsson smart factory in Lewisville.

Verizon wants to rapidly expand its 5G network as it competes with AT&T and T-Mobile to grant its customers reliable 5G access. The company pledged over $45.5 billion in a C-band auction that closed in February to secure more mid-band spectrum coverage.

5G is really going to change the future, said Karen Schulz, who works in global network and technology communications for Verizon. The fundamental capabilities of 5G will usher in applications and innovations that weve never seen before.

5G has the potential to enhance apps and technologies like augmented reality and the Internet of Things, Schulz said.

In Texas, Verizon users are connected to 5G over 12% of the time, while T-Mobile users are connected 40% of the time and AT&T users are connected over 26% of the time, according to the latest 5G User Experience Report by Opensignal. Nationally, Verizon users are connected to 5G over 10% of the time.

As 5G expands in Texas, businesses are most likely to initially see the largest changes in coverage because they can tap into the networks full capabilities, said Ram Dantu, director of the Center for Information and Cyber Security at the University of North Texas.

Consumers may not be able to see the immediate effects of 5G, Dantu said. Theyll see greater bandwidth, but likely this will be best for enterprise.

Even though 5G is still being rolled out, companies are looking ahead to the next generation of mobile networks. Last week, the University of Texas at Austin announced the launch of the 6G@UT research center in partnership with several industry partners, including AT&T and Samsung.

Ericsson announced its own partnership with the Massachusetts Institute of Technology to research the design of hardware that could power the 6G networks.

Read more from the original source:
Ericsson to partner with Verizon in $8.3 billion deal to expand 5G coverage - The Dallas Morning News

Read More..

Connecticut Becomes Third State to Incentivize Cybersecurity Best Practices for Businesses – PRNewswire

HARTFORD, Conn., July 12, 2021 /PRNewswire/ -- Connecticut Governor, Ned Lamont signed HB 6607, "An Act Incentivizing the Adoption of Cybersecurity Standards for Businesses" into law last week. The bill, introduced by Representative Caroline Simmons, prohibits the Superior Court from assessing punitive damages against an organization that implements reasonable cybersecurity controls, including industry recognized cybersecurity frameworks such as the National Institute of Standards and Technology Cybersecurity Framework (NIST CSF) and the Center for Internet Security (CIS) Critical Security Controls (CIS Controls).

The Connecticut bill states that in the result of a data breach of personal and restricted information, the court may not assess punitive damages if the organization created, maintained, and complied with a written cybersecurity program containing administrative, technical, and physical safeguards for protecting PII and restricted information.

"It is critically important to do a better job of protecting businesses and consumers against cyber-attacks," said Representative Simmons. "In Connecticut, we took a step to accomplish this voluntarily without regulation by incentivizing organizations to adopt cyber best practices, like the NIST framework and the CIS Critical Security Controls."

Connecticut joins Ohio and Utah in legislative efforts to adopt an incentive-based approach for businesses to implement cybersecurity best practices.

"Cybersecurity is largely unregulated today; there is no national statutory minimum standard of information security, making it difficult to improve cybersecurity on a wholesale basis," said CIS Executive Vice President & General Manager, Security Best Practices, Curtis Dukes. "Connecticut's cybersecurity bill introduces a critical interim step: incentivizing the adoption of cyber best practices like the CIS Controls, to improve cybersecurity and protect citizen data."

The CIS Controls are a set of internationally-recognized, prioritized actions that form the foundation of basic cyber hygiene and essential cyber defense. Applying the CIS Controls provides a critical, measurable security value against a wide range of potential attacks. Analysis shows that implementing the CIS Controls mitigates the majority of cyber-attacks when evaluated against attack patterns in the widely referenced ATT&CK framework published by the MITRE Corporation. Specifically, the CIS Controls mitigate:

Further, Implementation Group 1 (IG1), a subset of the Controls that is considered basic cyber hygiene, is effective in mitigating:

Under the bill, organizations have to conform with revisions and amendments to identified industry-recognized cybersecurity frameworks (like the CIS Controls), laws, and regulations within six months after the revised document is published.

The bill becomes law on October 1, 2021.

About CIS:The Center for Internet Security, Inc. (CIS) makes the connected world a safer place for people, businesses, and governments through our core competencies of collaboration and innovation. We are a community-driven nonprofit, responsible for the CIS Controls and CIS Benchmarks, globally recognized best practices for securing IT systems and data. We lead a global community of IT professionals to continuously refine these standards to proactively safeguard against emerging threats. Our CIS Hardened Images provide secure, on-demand, scalable computing environments in the cloud. CIS is home to the Multi-State Information Sharing and Analysis Center (MS-ISAC), the trusted resource for cyber threat prevention, protection, response, and recovery for U.S. State, Local, Tribal, and Territorial (SLTT) government entities, and the Elections Infrastructure Information Sharing and Analysis Center (EI-ISAC), which supports the cybersecurity needs of U.S. elections offices. To learn more, visit CISecurity.org or follow us on Twitter: @CISecurity.

Media Contact: Autum Pylant [emailprotected]518-266-3495

SOURCE Center for Internet Security

Here is the original post:
Connecticut Becomes Third State to Incentivize Cybersecurity Best Practices for Businesses - PRNewswire

Read More..

Israeli company is behind malware that affected Windows PCs: Microsoft – WION

Microsoft believes malware used to infect PCs running its Windows operating system was created by an Israeli organisation.

Microsoft is taking a new effort to reduce internet security issues.

The company has also been looking for government-backed hackers, such as the Chinese organisation Hafnium, which it believes is responsible for attacks on its Exchange Server email software.

The problem was only recently rectified by Microsoft, and it took them a long time to resolve, with several people claiming that it was ineffective for their experience.

The threat actors were revealed to be from the private sector, and the company launched an inquiry to learn more about their genuine motives.

Microsoft's investigation into their latest breach and zero-day vulnerability came from an Israeli private sector business called "Sourgum," according to the company's blog post.

Watch: India rolls out new education policy, teams up with Microsoft

The company in question is a PSOA, or private sector offensive actor, intending to sell "cyberweapons" to its clients to hack them.

Another group discovered in the investigation is known as "Candiru," and they have been related to Sourgum with regards to the recent Microsoft attack.

While the motives of Candiru are unknown, it poses a direct threat to Microsoft and would be subject to an inquiry in the hopes of apprehending the perpetrator.

(With inputs from agencies)

Continued here:
Israeli company is behind malware that affected Windows PCs: Microsoft - WION

Read More..

In the News: Self-Employment is Best for Mental Health – Small Business Trends

To say the past 18 months with COVID-19 have been stressful for business owners is a huge understatement, which has shined the impact the pandemic has had on mental health. The 2021 Self-Employed Mental Health Report produced by Freshbooks in partnership with Mind Share Partners, sheds some light on the issue. And according to the report, people that are self-employed have experienced fewer mental health symptoms.

The data is in this weeks lead roundup up article,Self-employed Faring Better Mentally in Pandemic. The survey of 2,000 self-employed individuals also reveals72% say their mental health is either good or very good. And a total of 85% of small business owners say self-employment is the best form of employment for mental health. This is despite the many challenges brought on by the pandemic. Only 10% of the small business owners say their mental health was very poor.

In addition to this article, this week you can take a look at how to protect your business from cyber attacks by reading about the partnership between McAfee and Visa as well as how to sell your domain names with GoDaddys List for Sale service.

Take a look at the rest of the roundup.

As cybersecurity breaches continue to lead the news, McAfee and Visa have announced the formation of a new partnership. In this agreement, McAfee is going to offer internet security solutions to Visa Business cardholders. McAfee and Visa Partnership to Protect Small Businesses The goal of the partnership is to help protect Visa Business cardholders in North America and EMEA.

If you have domain names you are not using, GoDaddy is making it easy to sell them with List for Sale. This is a tool/service that lets you sell any unused domain names you have easily and quickly as a GoDaddy customer. GoDaddy Launches List for Sale to Sell Domains The goal of List for Sale is to simplify the cumbersome process of selling a domain name online.

If you run a handmade products business, one of the best ways to grow your business is to offer customers new and innovative products. By taking online craft classes, you can not only create more products for your business, but learn new skills that can help you come up with craft ideas to sell.

Have you ever come out of an important meeting feeling confused or frustrated? Was there ever an occasion where you found it difficult to explain yourself to a colleague or customer? When it comes to communication, theres no one-size-fits-all style. All of us communicate differently and sometimes this difference can make matters difficult for your business.

Internal customer service involves everything an organization can do to help their employees fulfill their duties, reach their goals and enjoy their work. It covers how different departments communicate with each other and how individuals interact with their colleagues, subordinates and superiors.

Have you ever wanted to create a captivating photo slideshow? A photo slideshow can be a useful tool to organize and engage with your audiences by letting you deliver compelling stories. Through the use of photo slideshows, you get to provide information via images about your products and services while expanding your brands reach.

You probably hate sales. You think its low or beneath you. Deep down you may believe if you have the best product or service in the marketplace, it will sell itself. More likely, you dont like sales because you have a fear of rejection. On The Small Business Radio Show this week, I talk with Tom Stern who says he was the black sheep in a family of lions.

Image: Depositphotos

See the original post:
In the News: Self-Employment is Best for Mental Health - Small Business Trends

Read More..

How accounting firms can protect against remote work security threats – Accounting Today

The COVID-19 pandemic has fundamentally changed the way people work. Millions of employees have been able to stay productive while working from home during the lockdowns thanks to remote collaboration technologies like Zoom, WebEx and Teams. Very quickly, virtual meetings became ever-present, and people could connect with their managers and clients or give presentations from any location with internet access, including other countries. Even as much of the country returns to business (mostly) as usual, firms instituting flexible or work-from-home policies may need to review their telecommuting policies and practices to help keep data safe.

While working from home has been key to business continuity over the last 15 months, it has also opened up some potentially major security issues for firms. In an office setting, there are multiple ways to secure data, including firewalls and physical security measures such as badges, doors, locks and keys. However, remote employees could be working from their homes, their cars, or at a local coffee shop. They have laptops, mobile phones, tablets and smartwatches all of which communicate with each other and could use several different services (Wi-Fi, Bluetooth, cellular data, RFID).

Being outside a secure office makes these employees, and their data that is, your data and your clients data vulnerable to data leaks and hacks. Even something like a chat or text message could contain confidential information, such as a Social Security number, birth date, tax information, or even medical information.

This is why robust data security is vital for any company. Data breaches that compromise client or employee data are notoriously costly, averaging over $3.9 million in 2020. They not only hurt a firm's reputation and bottom line but can also result in the theft of client information, proprietary information or intellectual property. Think of all the due diligence-related information your firm has on clients who might be preparing for an IPO or merging with another company.

It's these risks, by the way, that drove the American Institute of CPAs to add to its Code of Professional Conduct Confidential Client Information Rule 1.700.001, which deals with disclosure of confidential client information without the specific consent of the client. This rule goes hand in hand with Internal Revenue Code Sec. 7216, where failure to comply can lead to fines and other consequences.

It is against that background that all firms must make a concerted effort to be vigilant about protecting their data and their clients data. Accounting firm leaders must recognize the issues affecting their firms and take measures to educate their professionals. With that in mind, here are a few practical ways to help secure access to data, stay compliant, and mitigate the damage in the event of a breach.

Encryption is your friend

You may have outfitted all of your employees with laptops and a secure virtual private network. While a VPN might be enough protection when employees use their devices on a secure home network, what if theyre traveling or decide to work in a cafe? Many hotels, airports and cafes offer free Wi-Fi, but these unsecured networks can allow hackers to gain access to data that is supposed to be secure. A VPN may protect outbound data, but it still leaves the laptop or tablet itself vulnerable via other potentially active services such as Bluetooth, hotspots or RFID. Encrypting the device itself will make it much harder for criminals to access the data.

Encryption can also help protect a device if it is physically stolen. Unattended computers, tablets or mobile phones are tempting targets for thieves. With the device in their possession, the thief could have a treasure trove of confidential information they can sell or use to scam your clients. If a device is encrypted, the data is safe, and you only lose the device. It could mean the difference between $1,000 or $1,000,000.

Turn off services

Mobile devices are designed to make communication easy. This is a double-edged sword, however, unless there are security protections in place. For example, virtually all mobile devices have Bluetooth, and a growing number can be used as internet hotspots or have radio frequency identification (RFID) technology built right in. If these services are turned on, a hacker could potentially compromise the device. While these services can be beneficial, they do not need to be active 24/7. All employees should be instructed to turn them off until they are needed, especially while traveling.

Make sure to back up your data

With millions of Americans telecommuting, tens of millions of laptops and other devices are floating around filled with potentially sensitive data. This creates a greater chance that data could be lost if a device is lost, stolen or damaged. Employees should back up their devices daily, or at the very minimum, weekly, so the information will remain accessible if there is a catastrophic failure. Moreover, it is vital that employees restrict backups solely to company-approved destinations (e.g., cloud storage, on-premises servers, encrypted hard drives). If they make a backup to another location, it exposes their organizations to a potential data breach they have no control over.

As a firm leader, you should work with your IT team to ensure the mobile devices with access to firm information use properly containerized apps such that your firms data is automatically backed up, even if the rest of the devices data is not. Note that even email and everyday collaboration tools are loaded with documents and sensitive data that could be easily leaked. To reiterate, always (1) encrypt the devices and (2) back up important information.

A few decades ago, it was practically unthinkable that employees would have access to a secure server from their home, or for them to be a potential target for hackers. Accounting firm leaders must adapt their security practices to the time and, perhaps most importantly, educate employees about cybersecurity. Even with just these three relatively simple steps, firms can significantly reduce the chances of being subject to a costly data breach or cybercrime incident.

See more here:
How accounting firms can protect against remote work security threats - Accounting Today

Read More..