Page 2,822«..1020..2,8212,8222,8232,824..2,8302,840..»

Tanzania cbank says it is working on president’s cryptocurrency push – Reuters

DAR ES SALAAM, June 25 (Reuters) - Tanzania's central bank has said it is working on President Samia Suluhu Hassan's directive to prepare for cryptocurrencies, pointing to a possible reversal of a ban it put in place in 2019.

The new president, who came to power after the death of her predecessor in March, said this month the arrival of digital currencies in the East Africa nation was inevitable.

"In the financial sector, we have witnessed the emergence of blockchain technology or cryptocurrency," Hassan said during the opening a new central bank branch in the northern town of Mwanza this month.

"Many countries in the world have not accepted or started using these currencies. However, I would like to advise the central bank to start working on those issues. Just be prepared."

Her comments made shortly after El Salvador became the first country in the world to adopt bitcoin as a legal tender, prompted fresh debate over the role of cryptocurrencies in economies and remittance transfers. read more

Tanzania's central bank banned cryptocurrencies in November 2019, saying they were not recognised by local law, but it now says it is adapting following the president's comments.

"The bank is working on the directives given," a Bank of Tanzania spokesperson told Reuters this week, declining to give further detail.

GRADUAL PREPARATIONS

The spokesperson did not respond to questions on whether the bank plans to adopt existing cryptocurrencies such as bitcoin, or was looking to issue its own digital currency as China has done.

Hassan's comments reflect her much more open attitude to foreign investment, a shift from the stance of her predecessor John Magufuli, who tussled with foreign gold miners and even locked horns with neighbouring Kenya over access to the market.

Tanzania Bankers' Association chairman Abdulmajid Nsekela welcomed Hassan's push, for the $63 billion economy still relies heavily on cash transactions.

"The most challenging element for regulators is to be caught by surprise by innovations," he said. Gradual preparations would help the central bank assess the risks and come up with ways of addressing them in advance, he added.

Analysts warned that progress might be slow.

"The change in tone from Tanzania's president is clear, but wait to see whether the central bank will take concrete steps towards embracing cryptocurrencies," said Faith Mwangi, an analyst at Tellimer.

Mwangi pointed to Uganda, where President Yoweri Museveni made similar comments back in 2017, but the central bank has yet to rescind its ban on cryptocurrencies.

Reporting by Nuzulack Dausen in Dar es Salaam and Duncan Miriri in Nairobi; Additional reporting by Omar Mohammed; Writing by Duncan Miriri; Editing by Karin Strohecker and Andrew Heavens

Our Standards: The Thomson Reuters Trust Principles.

See more here:
Tanzania cbank says it is working on president's cryptocurrency push - Reuters

Read More..

Cryptocurrency: Breaking Down the Basics – Yahoo Finance

gopixa / iStock.com

If you asked 10 random people if they ever used cryptocurrency, youd likely get 10 nos, but it seems like the digital alt-money is trending more every day. Its easy to understand why. Bitcoin, the first and most famous cryptocurrency, is the investment story of the decade and perhaps of all time. Bitcoin was worth a fraction of a cent when it first emerged in 2009. In March 2021, it peaked above $60,000. When a penny turns into a Porsche in a little more than a decade, it tends to draw attention. Heres what you need to know about cryptocurrency.

Find Out: Where Does Cryptocurrency Come From?Read More: Binance Coin (BNB): Why Its So Interesting to the Cryptocurrency World

Cryptocurrency is often described as a digital asset, but dont mistake it for a digitized version of cash like the kind you spend with PayPal. You can pay for things with Bitcoin and other cryptocurrencies, just like dollars, yen and euros, but the difference is that those and all other traditional currencies are issued and backed by central authorities like governments or banks.

The Economy and Your Money: All You Need To Know

Cryptocurrencies like Bitcoin are not. Instead, theyre awarded as digital tokens to miners for their work in maintaining blockchains, the encrypted ledgers where cryptocurrency ownership is recorded, stored and validated.

Bitcoin Cash (BCH): Hows It Differ From Bitcoin and Whats It Worth?

Cryptocurrency is:

Decentralized, traded on a peer-to-peer basis and exchanged with neither the scrutiny nor the security that comes with a central authority like a bank or government

Anonymous privacy is one of cryptos primary selling points

Secured in a special digital wallet, not a bank account

Cryptocurrency is not yet a realistic day-to-day alternative to money as the world knows it for the average person, but it has certainly come a long way from its early days in the online underground. Most recently, Visa announced it would accept cryptocurrency. Before that, PayPal added crypto capabilities to its own platform. Everyone from Burger King to Overstock.com accepts it as payment and several big, publicly traded companies most notably Tesla have added large crypto positions to their portfolios.

Story continues

But its not just big corporations. A 2020 HSB study found that more than one-third of small- and medium-sized businesses accept cryptocurrency, too.

Find Out: What Is Chainlink and Why Is It Important in the World of Cryptocurrency?

Bitcoin was the first cryptocurrency and its still the most widely known and widely used by far. Its success has spawned thousands of crypto spinoffs. Among the best-known challengers are Ethereum and Binance Coin, but Bitcoin is still the king of the hill. In fact, all cryptocurrencies that arent Bitcoin are known collectively as altcoin.

Read: Dogecoin: Is It a Worthwhile Investment?

Bitcoins first decade was a story of fairytale gains spun out of pinball-machine volatility that would send the average investor scrambling for cover. Along with wild price swings, the first years of cryptocurrency were riddled with headline-grabbing cases of fraud, theft, hacking and other scandals.

Ethereum (ETH): What It Is, What Its Worth and Should You Be Investing?

Not only is crypto investing a highly speculative and turbulent undertaking, but the actual process of investing is unfamiliar and outside the mainstream. Unlike the stock market, which is heavily regulated by the Securities and Exchange Commission, there is no central authority that oversees the exchange of cryptocurrency. Some crypto exchanges are regulated, some are not. Big ones like Coinbase and Kraken are located in the U.S. Many others are scattered across the globe.

Since the SEC doesnt recognize the exchanges where cryptocurrency is traded, there are no ETFs that track cryptocurrency directly the way there are for gold and traditional currency. So-called crypto ETFs only track companies that are indirectly connected to cryptocurrency.

Read: The Hype Around NFTs: What Are They? And How Pricey Do They Get?

In short, crypto is still fast-lane investing that constitutes a minority position, if any, in most portfolios. What can be said today that could not in years past, however, is that its now clear that cryptocurrency is here to stay.

More From GOBankingRates

Last updated: March 31, 2021

This article originally appeared on GOBankingRates.com: Cryptocurrency: Breaking Down the Basics

See more here:
Cryptocurrency: Breaking Down the Basics - Yahoo Finance

Read More..

Here’s all you need to know before starting cryptocurrency trading – Moneycontrol.com

Ambiguous regulations in the cryptocurrency space allow for massive room for new crypto outlets to thrive unchecked.

Everyone around you seems to be trading in cryptocurrency and discussions around ethereum and bitcoin seem to be commonplace these days, right? If youre also surrounded by the crypto frenzy and want to dabble in the newest asset class in town, here are some tips for you.

Delhi-based Shivam Srivastava, a trading mentor and a day-trader himself, stresses the importance of risk management and domain understanding before anything else. While trading advice remains mostly the same across all asset classes, cryptocurrency trading needs additional emphasis on risk management strategies, since the leverage involved is super high, he said.

Here are a few points you should stick to, so that youre able to trade sensibly and profitably, without incurring massive losses in your trades.

Start small

Bitcoin hit its all-time high of $64,863 in April 2021. But if you trace its 52-week trend, youll find that the alternative currency was also valued at $8,900 within this year. It's no surprise that bitcoin has a mouth-watering ROI (Return on Investment) of almost 24,000percent since its inception.

Considered to be fundamentally stronger, ethereum, which has an ROI of almost 68,000percent since its launch, did not fare much differently. Over the last three months, its prices have dipped as much as $1,600 and risen to almost $4,300. Its 52-week trend is on the same lines as bitcoin, trading at just $219 to rising sharply to $4,362.

These numbers can be tempting, but remember to start small and invest only what you are willing to lose, despite a voracious risk appetite when you are starting out. The cryptocurrency market is extremely volatile and overnight crashes are entirely within the scene.

Every investor, irrespective of their risk-taking capabilities, makes specific portfolio allocations for blue-chip companies in the market- stable, large, and well-known companies that are known to deliver good returns consistently.

In the cryptocurrency world, bitcoin and ethereum are somewhat of blue chips. Sure, it is tempting to buy relatively unknown cryptocurrencies that become an overnight sensation at low prices and benefit from their dips and rises, but since bitcoin and ethereum dominate the cryptocurrency market, there are fewer chances of them being rigged and manipulated, unlike other currencies in the league.

Ambiguous regulations in the cryptocurrency space allow for massive room for new crypto outlets to thrive unchecked. But with this rise, there has also been a sharp ascent in the number of scams and investor fraud. The recent case of the Cajee brothers, who vanished, along with Bitcoin worth $3.6 billion from their cryptocurrency investment platform in South Africa, brings this to light.

Recently, FTC (Federal Trade Commission) also reported that around 7,000 US consumers lost more than $80 million on various cryptocurrency scams between October 2020 and March 2021, with an average of $1,900 per transaction.

Srivastava recommends trading via trusted platforms that have a solid market reputation, along with having a cryptocurrency wallet. This wallet, which can either be a device or a program, will protect your crucial information like storing public and private keys of your cryptocurrency transactions.

If youre looking to invest in cryptocurrency from a long-term perspective and do not plan to engage in frequent transactions, having a hardware wallet is a must since they are very secure. Otherwise, platforms like Binance and WazirX also provide such wallet services. If youre a frequent trader, a software wallet would serve your purpose well, he said.

Elon Musk tweeting about bitcoin, China cracking down on cryptocurrency mining, El Salvador legalising bitcoin, the RBI clarifying its stand and support with the Supreme Court circular that permitted cryptocurrency trading- all of these are key developments that dramatically affected the market movement. Be sure to stay abreast with all decisions, both in India and globally, that affect the price of these alternative currencies.

Also remember to disclose your income from cryptocurrency trading, since the current IT rules, despite having no clear provisions for cryptocurrency, do not exempt income earned from this source. Sources have also notified that the government may categorise them as capital assets and not as currency, which would mean that they will be subject to different tax treatment.

See the article here:
Here's all you need to know before starting cryptocurrency trading - Moneycontrol.com

Read More..

Cryptocurrency companies fight for top talent, hundreds of jobs on offer – Business Standard

Booming cryptocurrency firms say theyre struggling to find the right candidates to fill hundreds of positions as a frenzy of interest in digital currencies and other assets pits them against some of the worlds biggest financial institutions.

Despite a rout in May, cryptocurrencies total market value is up 400% over the past year to about $1.4 trillion, and traditional financial firms such as Goldman Sachs Group Inc., Bank of New York Mellon Corp. and DBS Group Holdings Ltd. are starting to offer services and trading. Meanwhile, the likes of CME Group Inc. are expanding crypto derivatives offerings -- all of which is helping the asset class to mature.

Thats leaving fewer candidates for crypto firms who need dozens or hundreds of new workers to expand their business.

Binance, the worlds largest crypto exchange, is advertising for some 370 positions globally, according to its LinkedIn recruitment portal. New York-based Gemini plans to boost its Singapore headcount to 50 from 30 by December. Hong Kong-based Crypto.com, currently lists more than 200 openings, with over half of them based in Asia.

Zhao Changpeng, chief executive officer of Binance. (Photo: Bloomberg)

We are hiring aggressively, Binance Chief Executive Officer Changpeng CZ Zhao said by email. We see the industry growing exponentially on a year-to-year basis, and we need to scale our team to cope with it. He added, We are a geo-equal-opportunity employer. We dont mind where people are, as long as they produce results.

ALSO READ: Blockchain, cryptocurrency can help democratise financial services: PayPal

Hundreds of Applicants

For potential candidates, interest in crypto jobs has risen by about five to 10 times in the past nine months, according to Neil Dundon, the founder of recruitment agency Crypto Recruit. A single job posting can attract hundreds of applicants, he said.

Despite the boom, finding candidates with relevant experience can be difficult, meaning that some companies are lowering their expectations or changing job criteria.

In terms of length of experience, one or two years is good enough these days, said Dundon. The skills shortage is so bad at the moment that companies are casting a wider net.

Both Geminis Asia-Pacific head Jeremy Ng and Crypto.coms director of talent acquisition, Tom Lau, agree that experience is a major challenge.

If you want to find someone with strong crypto knowledge, that wouldnt be easy to come by, said Ng, an alumnus of Goldman Sachs Group Inc. and Deutsche Bank AG.

Gemini is considering expanding into markets such as Hong Kong and Australia over the next 12 months and is offering benefits including unlimited vacation and a profit-sharing program to attract talent globally, Ng said.

Ng and Binances Zhao like candidates with expertise in banking and fintech because such skills can be transfered to a new position.

Developers and customer support are the two larger teams in our organization, and typically have the highest demand from a recruiting perspective, Zhao said. Luckily, these are the same skill sets used by large internet companies. We see a lot of interest from people in internet companies and other crypto projects.

Remote Roles

Bobby Ong, the co-founder and chief operating officer of crypto-data firm CoinGecko.com, said recently on Twitter that its getting increasingly hard to find the right people in Malaysia. The firm made internal adjustments and is now offering some roles that can be fully remote anywhere around the globe, he said.

Despite the rush, some job offers may fall through if the prospective employee decides the leap to crypto isnt worth it. Some compensation packages include a token component -- and deals may have to be renegotiated particularly if the token price plunges during the hiring process, Dundon said.

Still, Crypto.coms Lau, who claims that its pay packages are better than those at banks, doesnt expect the crypto hiring boon to die down anytime soon.

We are competing with companies like investment banks or major technology companies, so we have to pay on par or a premium, he said. This is going to make the market even hotter.

Continued here:
Cryptocurrency companies fight for top talent, hundreds of jobs on offer - Business Standard

Read More..

Why Inspecting Encrypted Traffic Is A Must – Security Boulevard

What You Dont See Can Harm You

As we emerge from the COVID-19 lockdown, we see a rash of malicious ransomware attacks trying to shut down many sectors of the economy Colonial Pipeline, J.B.S, C.N.A Financial for profit. Why? Because crime pays. Even more threatening are the ones we dont hear about those from the users inside of the organization.

The same encryption mechanism using a public key to secure our communication transport level security (TLS) a.k.a Secure Sockets Layer (SSL) can be used by malicious users or programs to access sensitive information.

Initially, botnets were used for DDoS attacks. Now, some of these command-and-control malware use the resources of infected machines for ransom and profit (ransomware and crypto-mining), significantly affecting an enterprises performance and increasing operating costs as well as wear on the commandeered machines. These attacks can also be a conduit for additional future malware delivery.

Most malware threatens the availability, integrity, and security of a network.

As we have seen recently, ransomware attacks can often result in information theft and hijacking in addition to disrupting an organizations mission-critical operations.

When the malware activates, it may open an encrypted session to an external server. The only information the malware requires to secure the communication with the external server is the external servers public key. Since the sending organization (of the user or malware program) does not have the private key to this encrypted communication, it cannot decipher this session and thus is blind to any information that is being sent outside.

As the usage of encrypted traffic increases, this challenge will become even more pervasive. We are already beginning to see such cyber-attacks on many organizations for financial gain and access to valuable confidential data.

Many traffic inspection solutions such as data leakage prevention (DLP), intrusion prevention systems (IPS), and firewalls may not have the ability to decrypt outbound encrypted traffic, and therefore are blind to cyber threats initiated from within the organization to external servers. Furthermore, even when they can decrypt, the ability comes with a steep cost-performance impact and expense, making these systems less scalable and thus uneconomical.

Inspection and Visibility The Necessary Disinfectant

The key to protecting against such attacks is to inspect SSL traffic. So, how does the SSL traffic inspection work?

The SSL inspection systems take advantage of the fact that the security is between two endpoints and not end-to-end. Sometimes referred to as legitimate man-in-the-middle (MiTM), the SSL inspection solution intercepts and decrypts SSL sessions destined to and from the enterprise. These SSL inspection solutions appear as the intended external server for internal users or programs initiating secure communication to external servers. For the recipient servers, the SSL inspection system appears as the initiating user or malware program.

For ease of deployment, SSL inspection solutions may provide both transparent inspection without requiring the need to re-engineer the network or as explicit proxy that require all users to pass through a predefined SSL proxy configured via a users browser.

Then, the decrypted traffic is steered to any content inspection solution such as firewalls, anti-malware, or data leakage protection systems already deployed in the enterprise to check against an organizations security policies. Sessions that pass the security inspection are then re-encrypted by the SSL inspection solution and forwarded to their destination server.

[Like this post? Subscribe now to get the latest Radware content in your inbox weekly plus exclusive access to Radwares Premium Content. ]

For efficiency, some traffic may be untouched if a particular site is trusted by the enterprise or is related to employee privacy (online banking, healthcare). For productivity reasons, other traffic may be blocked, typically online gaming or known malware servers.

Since SSL decryption and re-encryption are computationally intensive operations and may impact latency, use best practices such as hardware acceleration if you have many users and encrypted traffic. Be selective with decryption by using filtering and whitelists to bypass decryption for sites that you trust, and choose solutions that reduce the number of devices you require to scale and are cost-effective.

Decrypting, inspecting, and gaining visibility to network traffic using SSL inspection solution helps identify red flags that may indicate malware. Furthermore, adopting the best practices: least privilege access, multi-factor authentication while stopping web malware injections using web application firewalls, and protecting network perimeter against denial of service while educating the workforce on cybersecurity practices help reduce an enterprises exposure to these malware threats.

[You may also like: How to Respond to a DDoS Ransom Note]

More:
Why Inspecting Encrypted Traffic Is A Must - Security Boulevard

Read More..

Researchers: 2G Connection Encryption Deliberately Weakened To Comply With Cryptowar Export Restrictions – Techdirt

from the endangering-phone-users-in-the-name-of-public-safety dept

Researchers have discovered a backdoor in 2G encryption, one that was deliberately created. As this report by Lorenzo Franchesi-Bicchierai for Motherboard points out, the researchers didn't necessarily know it was deliberate when they discovered it.

Researchers from several universities in Europe found that the encryption algorithm GEA-1, which was used in cellphones when the industry adopted GPRS standards in 2G networks, was intentionally designed to include a weakness that at least one cryptography expert sees as a backdoor. The researchers said they obtained two encryption algorithms, GEA-1 and GEA-2, which are proprietary and thus not public, "from a source." They then analyzed them and realized they were vulnerable to attacks that allowed for decryption of all traffic.

The researchers said in their research paper the backdoor appeared to be deliberate. They reverse-engineered the algorithm, trying to randomly replicate the weakness in the random number generator they'd discovered. They were unable to do so. After observing this, they came to a pretty dead-on conclusion:

This implies that the weakness in GEA-1 is unlikely to occur by chance, indicating that the security level of 40 bits is due to export regulations.

This was confirmed shortly after the paper [PDF] was published.

A spokesperson for the organization that designed the GEA-1 algorithm, the European Telecommunications Standards Institute (ETSI), admitted that the algorithm contained a weakness, but said it was introduced because the export regulations at the time did not allow for stronger encryption.

This algorithm hasn't been in common use for years. The 2G standard has been abandoned in favor of 3G and 4G, eliminating this deliberately induced weakness. Export regulations no longer require deliberate weakening of encryption, so current standards are far more secure.

But even though 2G networks haven't been in common use since the early 2000's, this weakness (which still exists) still has relevance. One of the features of Stingray devices and other cell site simulators is the ability to force all connecting phones to utilize a 2G connection.

Handsets operating on 2G will readily accept communication from another device purporting to be a valid cell tower, like a stingray. So the stingray takes advantage of this feature by jamming the 3G and 4G signals, forcing the phone to use a 2G signal.

This means anyone using a cell site simulator can break the weakened encryption and intercept communications or force connecting devices to cough up precise location data. While law enforcement agencies (including the FBI) claim not to use any features that allow interception, the US is not the only customer for these devices. And there's been no confirmation that any US agency isn't using these to intercept communications they feel aren't protected by the Fourth Amendment, like conversations occurring in other countries (remember: the military had Stingrays first) or close to our nation's borders.

This revelation adds more info to the body of work dealing with the first cryptowar that began all the way back in the 1990s. Back then, the US government considered the export of strong encryption to be a criminal act. The NSA was one of the beneficiaries of this determination. This determination -- and the NSA's input -- resulted in the standardization of weakened encryption by the RSA. Even after the US government abandoned its criminalization of strong encryption, state-sponsored hackers (including our own NSA) were often able to force to force sites and content delivery services to utilize "export grade" encryption rather than stronger options in order to intercept communications and content.

Fortunately, most of that is behind us now. Our communications are now protected by encryption that hasn't been deliberately weakened. But it's still out there. And it can still be exploited by attackers with the right tools.

Thank you for reading this Techdirt post. With so many things competing for everyones attention these days, we really appreciate you giving us your time. We work hard every day to put quality content out there for our community.

Techdirt is one of the few remaining truly independent media outlets. We do not have a giant corporation behind us, and we rely heavily on our community to support us, in an age when advertisers are increasingly uninterested in sponsoring small, independent sites especially a site like ours that is unwilling to pull punches in its reporting and analysis.

While other websites have resorted to paywalls, registration requirements, and increasingly annoying/intrusive advertising, we have always kept Techdirt open and available to anyone. But in order to continue doing so, we need your support. We offer a variety of ways for our readers to support us, from direct donations to special subscriptions and cool merchandise and every little bit helps. Thank you.

The Techdirt Team

Filed Under: 2g, backdoor, encryption, gea-1, weakened

See the original post here:
Researchers: 2G Connection Encryption Deliberately Weakened To Comply With Cryptowar Export Restrictions - Techdirt

Read More..

The Ultimate Guide to Key Management Systems – Hashed Out by The SSL Store – Hashed Out by The SSL Store

If Your Private Key Gets Compromised, So Will Your Encrypted Data Its Why Key Management Systems Are Critical For Any Business Using Encryption

Do you know where your car keys are right now? Your house keys? Considering how important they are, we hope so (or else youll be taking an Uber home and then calling a locksmith). You also probably have a set place for them to reside when you arent using them somewhere secure, like inside your house or in your pocket.

If youre using encryption for any purpose, then you should have a similar system in place for your private keys. They are the critical piece of the cryptographic equation that, when combined with an algorithm, is the key (pun very much intended) to transforming encrypted ciphertext into plaintext that you and I can read.

One of the best things about encryption is that, if used properly, it is essentially impossible to crack. The private keys are one of the weak points, however. If someone gets their hands on yours then theyll be able to decipher the sensitive information that you intended to keep safe and secure. Thus, cryptography keys are one of the most crucial assets that any company has, with the value of the key being equal to that of your most vital data.

Whats the best way to keep your encryption keys safe from cybercriminals? Thats where key management systems come into play. They play a critical role in protecting and managing your keys, which can be especially difficult as a business scales and a handful of keys suddenly turns into hundreds, thousands, or more.

So, what does key management mean, exactly? What are the benefits of using a key management system? And what are the different types of key management platforms?

Lets hash it out.

When we talk about key management, were referring to all the tasks relating to cryptographic keys in an encryption system creation, usage, storage, exchanging, archiving, deleting, and replacing. The overall goal is to protect every key that an organization has, preventing attackers and unauthorized users from getting their hands on the data that has been secured via encryption.

Nowadays, companies possess more data than ever, with significant portions of it being sensitive information that must be protected. Because of the potential value of this data to cybercriminals, more and more businesses have turned to encryption to protect against an uptick in security breaches, prevent costly data losses, and remain compliant to regulatory requirements. Its now to the point that having thousands of cryptographic keys is commonplace, with key management systems (KMS) becoming the primary way of safely, securely, and efficiently handling them all.

Key management covers all of the keys in a cryptosystem at the user level, between either users or the system itself. An effective key management system should be robust and have comprehensive policies for:

There are three broad approaches that can be taken for key management systems:

We recommend a centralized approach in the vast majority of situations, finding that one single system is much easier to manage (with less potential for mistakes or oversights) and avoids contradictions or conflicts between teams or users. Even if different departments have drastically different needs, it is still better to make sure that everyone is on the same page as far as the basic protocols and requirements. Centralize your KMS as much as possible.

Without a proper management system in place, keys can be lost or compromised, resulting in lost access to critical data. Unfortunately, key management gets harder and harder as the size and complexity of your cryptographic ecosystem increases. Key management systems are designed to address the challenges that organizations face when dealing with cryptographic keys, things like:

Now lets go into more detail regarding the benefits that key management bring to a business and the reasons for implementing such systems.

The features of key management systems help boost security thanks to technical elements that help prevent lost, stolen, or misused keys by:

Many organizations turn to encryption because its a requirement of local laws or industry regulations. The specifics of the requirements can vary widely depending on industry, location, and other factors, but no matter what, companies want to avoid the costly fines and penalties that result from non-compliance.

Therefore, key management systems act as a kind of insurance, adding an extra layer of security for data that must be kept safe and confirming that the necessary precautions have been taken ahead of time in order to remain compliant with standards like:

Key management systems are designed to simplify, automate, and scale, which translates to reduced costs for organizations by:

Its the primary goal of encryption in the first place, and key management systems help maximize data protection. It empowers businesses to be selective about key access, only allowing certain employees, applications, or devices to access the keys, and thus the encrypted data they protect. The controls provided by key management systems play a crucial role in preventing valuable information from making its way into the hands of unauthorized or hostile users.

If a simple spreadsheet or list of keys sounds like a good idea, think again. Modern key management systems give users the ability to easily and efficiently manage their keys at every point in the lifecycle. There are different types of key management platforms that have different advantages and disadvantages depending on the needs of the end user. Regardless though, theres a few attributes you always want to look for:

As far as the platforms themselves, they can be broken down into a few basic types:

HSM stands for hardware security module, and is a kind of server that has additional levels of security levels in order to prevent breaches:

HSMs can be used to generate keys, keep them safe from electronic or physical attacks, and make use of the keys within while performing encryption or decryption tasks. An HSM can be used as a key management system, but there are downsides:

This is the same as above, except that the HSM is in the cloud, hosted by a third party provider. These are ideal for companies that are lacking in security resources and cant properly implement an HSM themselves or want to move their security off-site for any other reason. The same hardening measures are still present on the HSMs themselves, theyre just in a different physical location than the end user.

Virtual instances of key management systems offer a few different advantages over HSMs. First off, deployment is usually a much quicker process. HSMs are a physical product that need to be shipped somewhere. Then, a physical installation is needed. A virtual instance on the other hand, can be downloaded from a vendors server in a few minutes and no physical installation is required. Virtual systems also provide more flexibility than HSMs, since they can be installed on any machine that supports the virtual platform running the key manager, such as VMWare.

The virtual element can also be a downside, however. Because theres no physical components, the software of the key manager cannot be FIPS 140-2 validated it can only be FIPS 140-2 compliant. If youre required to have FIPS-140-2 validation by any particular regulations, then youll have to go with an HSM instead. Usually, though, the level of security given by a FIPS 140-2 compliant key manager system is more than enough for the average company.

A key manager system can also be dedicated, or as a service. This kind of configuration is offered by cloud providers like Amazon Web Services (AWS) or Microsoft Azure, which have marketplace offerings in addition to their own key management as a service (KMaaS) systems. These systems are usually multi-tenant, which can be viewed as a negative since it means that several different end users will have their keys stored on the same key manager instance. For clients with security concerns, this type of system is not ideal. Because of this, dedicated services are also usually offered by providers via independent vendors.

Its critical that every organization make key security a high priority, no matter what type of key management system they end up going with in the end. Key management systems make life much easier for end users, while maximizing security at the same time. Sensitive data needs to be restricted, and key management systems provide the kind of organization and control that will ultimately keep it out of the hands of attackers.

Link:
The Ultimate Guide to Key Management Systems - Hashed Out by The SSL Store - Hashed Out by The SSL Store

Read More..

Will regulation adapt to encryption, or will encryption adapt to regulation?Expert answers – QNT

Blockchain technology is expected to provide humanity and freedom with the rise of blockchain technology Web 3.0, a truly decentralized Internet. Some people even think that Significant rise of decentralized finance (DeFi) Department has become an important sign of conceptualization From centralized service to decentralized service, Web 3.0 is its cornerstone.

and, Some even compare The invention of blockchain technology revolutionized the emergence of the Internet itself.Symbolically, the original source code of the World Wide Web developed by British computer scientist Tim Berners-Lee is Will be auctioned June 23 at Sothebys Irreplaceable tokens, Or NFT. All three of them NFT, DeFi and Web 3.0 tangled together. But with the comparison between the Internet and the blockchain, a crucial concept has emerged: Without proper supervision In the field of encryption and blockchain, technological innovation will not be as successful as we have seen in the past 25 years. It will change the world as we know it.

It is now obvious that a Lack of regulation will hurt crypto innovation. With the significant growth in the field of decentralized technology, this field has begun to attract more and more attention from global regulators. Their goal is Stablecoin, Go to financial institution, NFT, Crypto assets, Smart contract, Non-custodial wallet, Central Bank Digital Currency and many more.At the same time, some experts such as Caitlin LongTake the founder and CEO of Avanti Financial as an example, see the beginning Crypto regulation crackdownAs a positive trend, this will only benefit innovators. Others have proposed The right way to supervise encryption.

On the other hand, current supervision is not suitable for encryption, and adjustments to newly emerging decentralized technologies may undermine the core value of decentralization. Let us return to where we started: centralized parties control the space. In order to become a regulated industry, is this the price we are willing to pay?

related: Decentralization and Centralization: Where is the future?Expert answers

In order to find the right balance, the encryption space needs deeper and closer working relationships, which will Including regulators and innovators. Only in conversation Crypto companies and regulators, Is it possible for the authorities and industry representatives to find the right way to supervise the emerging technology industry? Through smart supervision And the space that is expected to change our lives this promise was realized at the turn of the last century through appropriate Internet regulations.

In order to understand the opinions of the crypto and blockchain industry representatives on this regulatory dilemma, Cointelegraph contacted some of them and asked them for their opinions on the following issues: Will encryption lose its core value in the process of being regulated, or will regulation adapt to decentralized technology and its benefits to society?

Read the original here:
Will regulation adapt to encryption, or will encryption adapt to regulation?Expert answers - QNT

Read More..

China ‘all in’ on its own encryption brand – BollyInside

China is actually all in on crypto. Make no mistake about that, Haun said on Squawk Box, despite its latest crackdown on bitcoin mining and crypto services. The Chinese governments five-year plan drafted earlier this year for the first time mentioned blockchain, which is the decentralized digital ledger technology that underpins cryptocurrencies such as bitcoin.

Chinas most recent actions to restrict bitcoin mining in the country and apply pressure to financial services firms against providing crypto-related services has weighed on sentiment in crypto markets.

However, she stressed that Chinese President Xi Jinping and other officials are all in on their brand of crypto, which is a closed permission system. Kind of at odds with the open, decentralized protocols we see as the future of the crypto system.

Bitcoin on Tuesday fell below $30,000 and, at one point even further, briefly losing all of its 2021 gains. The worlds largest cryptocurrency has recovered somewhat, trading at nearly $34,000 on Thursday.

This is hardly the first time China has put restrictions on bitcoin, Haun noted. In 2017, the country moved to shutdown local crypto exchanges, which forced them to move offshore. It did not, however, put an end to the influence of Chinese bitcoin traders.

China also has long been home to more than half of the worlds bitcoin mining capacity; so-called miners use high-powered computers to verify transactions across the blockchain network and are rewarded for their efforts with bitcoin.

The fact China is now ratcheting up its crackdown, Haun said, ultimately reflects the staying power of open decentralized crypto like bitcoin because weve seen this happen before.

Hauns appearance on CNBC came shortly after Andreessen Horowitz announced it was launching a $2.2 billion cryptocurrency-focused fund.

So, I think China is going all in on crypto in a big way and this is a big opening for western societies, and the U.S. included, to lean in, she said.

The well-known Silicon Valley venture capital firm has been involved in the digital asset industry for years, debuting its first dedicated fund in 2018 even as bitcoin and other cryptocurrencies withered during the so-called crypto winter. Haun, also a former Justice Department prosecutor, and Chris Dixon, who founded and ran two start-ups, are in charge of Andreessen Horowitzs crypto group.

Andreessen Horowitz was also the largest outside investor in Coinbase at the time of the crypto exchanges direct listing in April. Haun is a Coinbase board member.

Bitcoins all-time high of nearly $65,000 came on the same day of Coinbases public debut. That day, April 14, was also when Coinbase hit its intraday record of $429.54 per share.

Both the cryptocurrency and Coinbase shares are currently well below those levels. Coinbase traded at around $228 per share Thursday.

Disclaimer: If you need to update/edit/remove this news or article then please contact our support team.

See original here:
China 'all in' on its own encryption brand - BollyInside

Read More..

Amazon Recognizes Computer Science Educators with 2021 Teacher of the Year Award – Business Wire

SEATTLE--(BUSINESS WIRE)--Amazon (Nasdaq:AMZN) is thrilled to announce the 2021 class of Amazon Future Engineer Teacher of the Year Award recipients. Each year, Amazon recognizes ten dynamic teachers for their work to inspire students from underserved and historically underrepresented communities to pursue careers in computer science and robotics. The following educators are this year's recipients:

"It has been an especially difficult year for teachers, so we are excited to recognize their hard work and commitment to their students' successes," said Victor Reinoso, Global Director, Amazon Future Engineer, Amazon in the Community. "The Amazon Future Engineer Teacher of the Year Award recipients work diligently to help students in underserved and underrepresented communities build life-changing skills to propel their futures in computer science. We celebrate their tireless efforts to increase access to technology and computer literacy in their classrooms and beyond."

Recipients were chosen based on a variety of criteria, including a commitment to promoting diversity and inclusion within computer science education, a recommendation from a school administrator, and compelling, personal anecdotes about their schools and students. Scholarship America reviewed the applications and selected the ten award recipients.

Teachers learned of the honor when their principals and fellow colleagues surprised them with an Amazon box filled with Amazon Future Engineer swag. Each of the award-winning teachers received a prize package valued at more than $30,000, which includes $25,000 to expand computer science and/or robotics education at their respective schools, as well as a $5,000 cash award for each educator to celebrate their exemplary work with students.

Receiving this award meant the hard work and dedication that I have devoted to students paid off for them. I introduced my students to coding because I understand we live in a digital age and our children are our future, said Dr. Melissa Collins, computer science teacher at John P. Freeman Optional School. We have to work with our future generation so they can help change the narrative and become STEM professionals who help motivate and encourage other students.

Amazon Future Engineer is a childhood-to-career computer science education program intended to inspire and educate millions of students globally, including hundreds of thousands of students in the U.S. each year. Students explore computer science through school curriculum and project-based learning, using code to make music, program robots, and solve problems. Amazon Future Engineer also awards 100 students each year with four-year, $40,000 scholarships and paid internships at Amazon. Now in its second year, the Amazon Future Engineer Teacher of the Year Award program is part of Amazon's commitment to STEM and computer science education. For 2021, Amazon has a goal to reach 1.6 million students from historically underrepresented communities globally through Amazon Future Engineer with real-world-inspired virtual and hands-on computer science project learning. The program is currently available in the U.S., U.K., France, and Canada.

Computer science is the fastest-growing profession within the Science, Technology, Engineering, and Math (STEM) field, but only 8% of STEM graduates earn a computer science degree, with a small percentage from underrepresented communities. The Bureau of Labor Statistics projects the market for computer science professionals will grow 11% between 2019 and 2029, much faster than the average for all other occupations.

Learn more about a few of our 2021 Amazon Future Engineer Teacher of the Year Award recipients at About Amazon.

If you or someone you know would like to be considered for this honor, sign up for an email reminder to apply this fall for the Amazon Future Engineer Teacher of the Year Award.

About Amazon

Amazon is guided by four principles: customer obsession rather than competitor focus, passion for invention, commitment to operational excellence, and long-term thinking. Amazon strives to be Earths Most Customer-Centric Company, Earths Best Employer, and Earths Safest Place to Work. Customer reviews, 1-Click shopping, personalized recommendations, Prime, Fulfillment by Amazon, AWS, Kindle Direct Publishing, Kindle, Career Choice, Fire tablets, Fire TV, Amazon Echo, Alexa, Just Walk Out technology, Amazon Studios, and The Climate Pledge are some of the things pioneered by Amazon. For more information, visit amazon.com/about and follow @AmazonNews.

Read the original here:

Amazon Recognizes Computer Science Educators with 2021 Teacher of the Year Award - Business Wire

Read More..