Page 2,841«..1020..2,8402,8412,8422,843..2,8502,860..»

Taming the Overprivileged Cloud | eWEEK – eWeek

Enterprises are struggling with a swelling number of cloud identities, credentials sprawl and privilege creep. Gartner has sounded the alarm: by 2023, 75% of cloud security failures will result from inadequate management of identities, access and privileges.

Its time to tame the beast.

But first, we need to understand the components of an entitlement that can put security at risk. They can be broken down into: entities, identities, permissions and resources.

An entity is just what it sounds likea person, machine, service or application that needs access.

Identities can be cloud identity systems, on-premise identity systems, SaaS applications, etc. And theyre not always humans; they could be compute resources needed to complete a business function, like an application or a virtual machine using a service identity.

Identities do not necessarily have to belong to users or applications within your organization. We are seeing a sharp growth in what we call third-party identities belonging to vendors that need access to your public cloud infrastructure in order to provide some operational or business value. These can include security vendors, cost optimization vendors, etc.

These identities become more complicated depending on which public cloud infrastructure youre using. Each cloud platform manages identities differently, for example Microsoft Azure uses Azure Active Directory.

Meanwhile, many organizations also use on-premises identity systems, which are external to the cloud service provider. In these hybrid environments, users have two (or more) identities, a cloud platform specific identity and a federated identity to access the cloud infrastructure from on-premises identity systems.

Finally, every identity has entitlements or permissions such as the ability to read and write files, granted by policies associatedwith the cloud platform or custom-written by the organization based on the identitys roles and access. In addition, entitlements are linked to a specific resource or a group of resources, which could be virtual machines, containers, databases, serversor secrets such as encryption keys.

Entitlements can also be granted to identities in a number of ways that further complicate their management. These include:

To start connecting the dots between entities, identities, permissions and resources, an organization first needs to understand the permission structure of each cloud provider, whether its AWS, Azure, GCP or whomever. Each uses pre-baked permission policies that can lead to privilege creep. These policies tend to be extremely over-provisioned; we see many cases of DevOps or developers assigning administrative-type of policies to applications and resources such as databases, storage and machine IDs.

There are very few applications that really need the ability to read, write and delete all the storage services in your environment. Usually an application would be using a specific storage service to fulfill its business function. Savvy organizations are recognizing this risk and moving to custom-managed policies or policies that allow them to granularly control permissions.

Managing permissions starts with visibility. You have to be able to discover all the human and machine identities in the environment. Then you have to be able to map all the permission structures, identities and resources to answer one basic question: Who can access sensitive data in my environment?

Answering that question requires mapping permissions and analyzing the broader security context of your resources, such as their network exposure and who can update their configurations. You have to be able to remove stale access and do it at scale. In most cases, the number of permissions that the environment really requires is around 10% to 20% of the actual number that are provisioned.

This requires determining riskwhich users and machines have access to sensitive resources. You have to be able to identify excessive permissions, right-size them and remediate security problems such as lack of multi-factor authentication or failing to rotate access keys. This includes detecting and automatically removing inactive identities.

The biggest barrier to this exercise is the effort involved. Its impossible to do it manually; were talking about hundreds of thousands of users and resources, maybe even millions. Analytics can help you review access policies to provide a clearer picture of the organizations security posture vis-a-vis identities and their entitlements.

Its also difficult to address these challenges using tools that come with each cloud platform since they lack the granularity to capture and unravel the complexities of all the privileges attached to identities. They can look at a specific user and understand the permissions attached to that user directly, but they will miss groupings, or chaining of identities inside your organization that can introduce risk. They also miss the broader network context, like the ability to understand if an application is exposed to the internet.

If you are using more than one cloud platform, cloud provider tools will not be able to manage identities and permissions in other cloud infrastructures.

Cloud platform agonistic automation technology is available for managing identities and permissions at scale. By providing visibility into over privileged user and machine accounts its possible to tame the wilderness that cloud entitlements have become for many organizations.

ABOUT THE AUTHOR

Arick Goomanovsky, Chief Business Officer of Ermetic

Excerpt from:
Taming the Overprivileged Cloud | eWEEK - eWeek

Read More..

GitLab fixes serious SSRF flaw that exposed orgs internal servers – The Daily Swig

John Leyden17 June 2021 at 15:03 UTC Updated: 17 June 2021 at 15:06 UTC

DevSecOops

Programming code-share platform GitLab has fixed a server-side request forgery (SSRF) issue in a software library after the problem was flagged by a security researcher.

Server-side request forgery is a class of web security vulnerability that allows, for example, an attacker to force a vulnerable server to make a connection to internal services within an organizations infrastructure.

Researcher Vin01 discovered that GitLabs CI Lint API, a library related to code handling and managing developer workflows, was flawed.

Catch up with the latest DevOps news and analysis

After discovering the problem last December, the researcher reported it to GitLab, which responded by publishing a temporary fix in February.

GitLab followed up with a more complete patch early this month, clearing the way for Vin01 to publish a detailed technical write-up of their findings.

The affected CI Lint API is used to validate CI/CD YAML configuration for GitLab instances. A flaw in the technology, if left unaddressed, created a means for miscreants to steal sensitive info such as passwords and cloud service credentials, Vin01 told The Daily Swig.

Installations which had a particular configuration in place to allow internal network requests from GitLab were vulnerable to server-side request forgery (SSRF), where an attacker could have sent a request to internal servers by jumping from the public facing GitLab servers.

These internal servers are usually not exposed to the internet as they are only meant to be used internally and may contain sensitive information like passwords, API keys, cloud service credentials, which could have been stolen as a result of this vulnerability.

Public facing GitLab servers are quite common, and the issue in hand was exacerbated because no authentication was required in order to exploit it.

The vulnerabilities are tracked as CVE-2021-22175 and CVE-2021-22214.

READ MORE Vulnerability in Microsoft Teams granted attackers access to emails, messages, and personal files

In my research I saw hundreds of vulnerable GitLab servers including but not limited to many open source projects, government departments and universities which use GitLab for hosting their code and integrate it with their infrastructure, Vin01 added.

The security researcher has put together a small script to test if a GitLab server is vulnerable, availableon GitHub.

Vin01 praised GitLabs handling of the disclosure process, adding that even though they have since privately warned many affected organizations about their exposure to the flaw, there are still many vulnerable instances.

RELATED Security researcher turns Apache Airflow into bug bounty cash cow

See the article here:
GitLab fixes serious SSRF flaw that exposed orgs internal servers - The Daily Swig

Read More..

Easily transfer VMs to the cloud with Microsoft Azure Migrate – Illinoisnewstoday.com

Planning a cloud migration is like going on a trip. Its important to double-check that everything you need is in your suitcase and make sure that all travel sections are on time. When an administrator moves a VM to the cloud, they need to make sure they have the right tools and enough storage to move all their critical virtual infrastructure. Microsofts Azure Migrate can help with this type of task.

Microsoft Azure Migrate It provides IT teams with a centralized portal for discovering, evaluating, and migrating systems and data from their on-premises infrastructure to the Azure cloud.

Administrators can use the portal to move physical and virtual servers, VDIs, databases, web applications, and large datasets. You can use Azure Migrate to migrate your VMs to Azure in private and public clouds. This service is included in your Azure subscription at no additional cost.

Azure Migrate provides a single portal for managing the entire VM migration process. The portal guides administrators through the discovery, evaluation, and migration phases and provides end-to-end operational visibility. Administrators can start, run, track, and analyze workflows.

These tools allow administrators to perform a variety of tasks based on the system or data type they plan to migrate. Organizations need to be aware that Azure Migrate is a one-way service specifically designed to move servers, applications, and data to Azure.

The portal includes:

Azure Migrate also integrates several third-party tools such as Carbonite, Lakeside, RackWare, and UnifyCloud.

For certain operations, the administrator Install a lightweight appliance For infrastructure setup. Azure Migrate uses this appliance to discover and evaluate physical servers, VMware VMs, and Hyper-V VMs. A single Azure Migrate appliance can discover up to 1,000 physical servers, 10,000 VMware VMs, and 5,000 Hyper-V VMs. You can also use the appliance to perform agentless migration of your on-premises VMware VMs.

For administrators who are already using Azure, the service is free, so try Azure Migrate to minimize the risk. However, you may still incur charges if you are using integrated third-party tools or certain Azure services. The Database Migration Service Tool is free for the first 180 days only.

To better understand how Azure Migrate works, administrators need to refer to specific use cases. Suppose your IT department decides to migrate your on-premises Hyper-V VM to an Azure VM.

For this, administrators can use server evaluation and server migration tools with the Azure Migrate appliance. The entire migration process can be divided into three basic phases: discovery, evaluation, and migration.

These steps are short versions of the steps that an administrator must perform on a Hyper-V VM, but they should serve as an overview.

Before attempting to migrate a VM, please refer to the Azure Migrate documentation and pay close attention to potential limits and workload requirements.

Administrators can discover and evaluate up to 35,000 Hyper-V VMs in a single Azure Migrate project. However, a single appliance instance can only detect 5,000 Hyper-V VMs, distributed across 300 Hyper-V hosts. That said, administrators can deploy multiple appliances and create multiple projects. The project can include physical servers, VMware VMs, and Hyper-V VMs.

Hyper-V hosts can be standalone machines or deployed in clusters. It can be used as a server core installation, but the host must have administrator privileges.In addition, the system PowerShell remoting must be enabled, And Hyper-V Integration Services must run on the evaluated VM.

Administrators should consider port settings and storage limits. Azure Migrate only supports Integrated Drive Electronics and SCSI virtual controllers. The system cannot detect machine metadata or dynamic performance data for Hyper-V VMs, but it can for VMware VMs. However, even VMware VMs are limited to detection, not evaluation.

Read more from the original source:
Easily transfer VMs to the cloud with Microsoft Azure Migrate - Illinoisnewstoday.com

Read More..

Invest in cloud security to future-proof your organization – TechTarget

During the COVID-19 pandemic, many enterprises faced immense operational resilience challenges. As such, the pandemic accelerated the shift to the cloud. This sudden shift to an online, no-contact economy prompted what Microsoft CEO Satya Nadella said was "two years' worth of digital transformation in two months."

Cloud platforms helped companies deploy new digital customer experiences in days rather than months, supporting analytics, agility and scalability that would be uneconomical or impossible with legacy platforms.

Yet, at the same time, numerous opportunities were presented to cybercriminals who exploited the new operating environment and preyed on a remote and vulnerable workforce. Data residing on premises and in the cloud quickly became a natural target for bad actors. The seemingly overnight shift of enterprise data to the cloud increased the number of possible failure points in security systems. In fact, McAfee reported a 630% increase in attack attempts from external threat actors on its customer's cloud accounts in early 2020.

This reality has driven enterprises to build an effective cloud security architecture and strategy -- but the path to achieving this has not been an easy one.

While organizational inertia to move to the cloud might have been overcome due to the pandemic, the shift itself is not without three major complexities:

Challenge No. 1: Confusion around the shared responsibility model hasn't helped the situation.

Public cloud providers take responsibility for their clouds' security, but they don't take responsibility for their clients' applications, servers and data security. Companies must encrypt and secure their own data. Yet, many enterprises leave data unencrypted on the cloud or do not implement available encryption tools and management services. Additionally, companies need to invest in a variety of tools, including antimalware, antivirus and secure web gateways, from cloud service providers to protect their data.

Challenge No. 2: CISOs must establish a solid foundation for their cloud security architecture on a security framework that can help define and prioritize risk areas.

Begin by identifying organizational requirements and completing security risk assessments. Next, implement safeguards to ensure infrastructure can self-sustain during an attack. The framework will have to use detection systems to monitor networks and identify security-related events, which will then launch countermeasures to combat potential or active threats. Finally, the framework will need inbuilt recovery capabilities to restore system capabilities and network services in the event of a disruption.

Challenge No. 3: CISOs have to prepare for the worst and hope for the best.

Focus remediation efforts and align security policies across the digital landscape by embedding security in the enterprise architecture. When migrating workloads to the cloud, the security architecture will clearly define how an organization should identify users and manage their access, and protect applications and data, with appropriate security controls across networks, data and applications. It also helps provide visibility into security, compliance and threat posture while injecting security-based principles into the development and operation of cloud-based services.

Cybersecurity regulations are evolving rapidly with the threat landscape, so architectures should design strict security policies and governances to meet compliance standards. CISOs also have the challenge of designing systems that cater to authentication and authorization needs of both on-premises and cloud workloads, which have different protocols. Finally, the IT team should build a centralized dashboard and reporting for security metrics before cloud operations begin.

Security concerns within the cloud landscape are complex due to rapid development. This complexity requires a paradigm shift to protect applications. It can be achieved by migrating from a perimeter-based approach to one where security moves closer to dynamic workloads that are identified based on attributes and metadata. This approach identifies and secures workloads to meet the scale needs of cloud-native applications while accommodating constant flux.

The cloud paradigm requires enterprises to upgrade their legacy technologies and increase automation in the application security lifecycle and secure-by-design architectures. Cloud-native security can be modeled in distinct phases that constitute the application lifecycle -- development, distribution, deployment and operation. This ensures security is embedded throughout these phases instead of separately managed. In addition to cloud-native security controls, add-on components such as security groups and network access control lists for firewalls and distributed denial-of-service attack mitigation must be implemented. AI will also become a core component of all cybersecurity systems to address vulnerabilities and detect security issues.

Cloud security services should safeguard physical infrastructure, applications, data, networks and endpoint devices with a proven technology reference architecture for quality assurance and risk management. Adapting existing authentication methods to enable consistent access control for cloud and on-premises network resources is the route toward greater security. Use real-time security monitoring and reporting to address cloud-specific, industry and compliance standards.

Cloud architects and systems designers must incorporate network security appliances at the design stage for unified control of distributed IT resources. Security protocols should combine multifactor authentication protocols and role-based access control systems. Cloud security itself remains an interdisciplinary field that cannot be isolated from the development lifecycle or treated as a purely technical domain. In the same vein, cybersecurity is not just an IT problem, it is a business problem. For it to be ultimately effective, organizations must focus on people, process and technology to make necessary changes and ensure security is practiced and embedded as part of the company's DNA.

About the author

Anant R. Adya is the senior vice president of cloud, infrastructure and security (CIS) services at Infosys. Adya is responsible for growth of the CIS service line in the Americas and Asia-Pacific regions for Infosys. In his 25 years of professional experience, he has worked closely with many global clients to help define and build their cloud and infrastructure strategies and run end-to-end IT operations. He currently works with customers and the industry sales and engagement teams on the digital transformation journey. He defines digital transformation as helping customers determine the location of workloads, using new-age development tools for cloud apps, enabling DevOps and, most importantly, keeping the environment secure and enhancing customer experience.

Here is the original post:
Invest in cloud security to future-proof your organization - TechTarget

Read More..

Wills and Probate: Why Your Firm Needs Cloud-Based Solutions – Today’s Wills & Probate

As of last year, 88% of UK businesses had adopted cloud-based technology. Has your wills and probate law firm done so yet for all your practice management needs?

Chances are youre already using some cloud-based technology. Most lawyers use the cloud as part of other internet-related services, whether those be professional or personal: Dropbox, Gmail, Evernote, Facebook, and Amazon all run on cloud technology. For professional usage, the cloud is here to stay for legal firms across the world, a change that has been accelerated by the events of the past 18 months.

Previously, many legal practices relied on on-premise, server-based software, but remote working has exposed many limitations to that sort of system. While firms may prefer the idea of having information stored in-office, there are a number of inherent problems:

As more of us have worked from home, the problems of relying on a server-based systemespecially one that is supplemented by paper files stored in filing cabinetshave been highlighted. By contrast, cloud-based technologies offer seamless remote access, greater time savings, better security, 99.9% uptime guarantees, and significant long-term cost savings.

To read more about the benefits of a cloud-based approach for your firm, check out Clios The Quick Guide to Cloud Computing for Law Firms.

Or, give the worlds leading cloud-based legal practice management software a try. Speak with a Clio expert to ask for your free demonstration today.

This article was submitted to be published by Clio as part of their advertising agreement with Todays Wills and Probate. The views expressed in this article are those of the submitter and not those of Todays Wills and Probate.

Read more:
Wills and Probate: Why Your Firm Needs Cloud-Based Solutions - Today's Wills & Probate

Read More..

Nutanix and HPE to scale cloud adoption with new Database as a Service offering – ITP.net

Nutanix and Hewlett Packard Enterprise (HPE) have extended their collaboration to drive hybrid cloud and multi-cloud adoption by offering a multi-database operations and management solution, Nutanix Era bundled with HPE ProLiant servers, as a service through HPE GreenLake.

According to the technology leaders, the fully managed cloud service enables customers to deploy applications and databases in minutes and benefit from the agile, elastic, and pay-per-use capabilities of the cloud while gaining the governance, visibility and compliance of an on-premises environment.

Customers want to simplify database operations and management to move away from IT siloes that can often lead to higher maintenance costs, security risks, and lack of flexibility to deploy and run solutions, said Keith White, senior vice president and general manager, HPE GreenLake Cloud Services at Hewlett Packard Enterprise. By building on our successful collaboration with Nutanix, together the HPE GreenLake and the Nutanix Era database operations and management software solution will increase agility, simplify operations and cut costs by delivering a fully managed cloud offering.

By combining Nutanix Era on HPE ProLiant servers, and delivering the solution as a cloud service through HPE GreenLake, customers can transform database management with one cloud-ready platform. The solutions will allow customers to modernise, consolidate, and automate tasks across their databases and gain support for multi-database operations management, including Oracle Database, Microsoft SQL Server, MySQL, PostgresSQL, and MariaDB.

We continue to see tremendous success in our partnership, and HPE GreenLake with Nutanix Era for databases provides one more opportunity to strengthen our joint offerings and further serve customers, said Tarkan Maner, chief commercial officer at Nutanix. As customers are looking for solutions to help them in their journey to hybrid and multicloud, HPE and Nutanix deliver strong, integrated solutions to support them on their journey by providing performance, control, and security available as a full breadth of portfolio whether its solely using HPE ProLiant DX series of servers for private clouds or combining with HPE GreenLake cloud services to run this environment as a managed cloud.

Customers can turn on these new capabilities quickly with pre-sized, pre-priced packages inclusive of: Nutanix software licensing and HPE pay-as-you-go infrastructure capacity as well as startup services for the new solution, until December 31, 2021.

HPE GreenLake with Nutanix Era for databases is currently available to customers, with metering billing capabilities available in July.

More here:
Nutanix and HPE to scale cloud adoption with new Database as a Service offering - ITP.net

Read More..

Trump’s Memoir Is Bringing Publishers to a Long-Overdue Reckoning With Truth – Esquire

The first ex-president to publish a memoir during his lifetime was James Buchanan, who retired from public office in disgrace in 1861, leaving behind a nation torn asunder by slavery and the impending secession of the southern states. Buchanans untitled memoir was abysmal, according to presidential historian Craig Fehrman, author of Author in Chief: The Untold Story of Our Presidents and the Books They Wrote. Buchanans is definitely the worst presidential memoir Ive read, Fehrman told Smithsonian Magazine. Its mostly just James Buchanan trying to blame everyone except James Buchanan for the war and its aftermath. The kicker: it was terrible, but it sold.

How fitting that Buchanan would set the precedent now reaching its apex with Donald Trump, his successor for the title of American historys worst president. In the publishing world, Trump is regarded as an untouchable, even though his post-White House memoir would assuredly top the bestseller charts and generate a windfall for the publisher foolhardy enough to touch it. Never before has a modern president struggled to score a cushy book deal after leaving office, but as ever, Trump has notched another ignoble first. Members of the Big Five publishing houses see his memoir as a third rail, fearing that such a book would be closer to a work of fiction than memoir. Keith Urbahn, president and founding partner of the creative and literary agency Javelin, told Politico, Any editor bold enough to acquire the Trump memoir is looking at a fact-checking nightmare, an exodus of other authors, and a staff uprising.

Author in Chief: The Untold Story of Our Presidents and the Books They Wrote

Trump, for his part, claims to be writing the book of all books, and insists that his memoir has prestigious suitors. In a statement last Friday, he claimed to have received and rejected two offers from the most unlikely of publishers; in a second statement on Monday, he said, Two of the biggest and most prestigious publishing houses have made very substantial offers, which I have rejected. Senior sources at the Big Five tell Politico that no such offers have been extended. Speculation abounds that the most unlikely of publishers could include All Seasons Press, a brand new publisher whose stated mission is to publish the best writers, politicians, and pundits in the conservative movement. Founded by publishing veterans Louise Burke, who tried and failed to publish Milo Yiannopoulos at an imprint of Simon & Schuster, and Kate Hartson, who was fired from Center Street after publishing such Trumpworld figures as Donald Trump Jr. and Jeanine Pirro, All Seasons Press has already lined up books from Trump chief of staff Mark Meadows and Trump advisor Peter Navarro. Alexei Woltornist, who co-founded Axios and worked in Trumps Department of Homeland Security, told The New York Times, Conservatives are getting serious in setting up our own parallel infrastructure. We cant be reliant on people who are hostile to our ideas to continue hosting us.

In the wake of the Trump administration, publishing has become an island of misfit toys for Trumpworld figures. Former Vice President Mike Pence received the splashiest book deal, signing with Simon & Schuster to write two memoirs for upwards of seven figures, which reportedly grated on Trump and drove thousands of objectors to circulate a petition demanding that Simon & Schuster stop inking deals with Trumpworld alums. Other high profile members of the administration with books slated to appear on shelves include advisor Kellyanne Conway, former education secretary Betsy DeVos, former press secretary Sarah Huckabee Sanders, former attorney general William Barr, and former first son-in-law Jared Kushner.

Pool

Publishing has always depended on blockbuster books to finance limited run titles by lesser-known writers, but where once blockbuster conservative books meant titles by ideologues like Ann Coulter, it now means multimillion-dollar memoirs by alums of a hateful and dangerous presidential administration, who feel no fealty to truth or facts. This business model has always been precarious at best, but now, it crosses into the realm of malicious profiteering, with the moral and financial stakes higher than ever. All of this leads us to a question: in 2021, what good is the political memoir genre doing us? Political memoirs can and should exist, but the genre's current iteration operates like the Wild West, where even disgraced politicians facing criminal investigation can treat publishing as a bully pulpit for falsehoods, with a fat check as a reward.

Publishing is laboring under a long-outdated assumption: that political figures are entitled to seven-figure book deals, no questions asked. These books are selling aggressively, with sales jumping a staggering 60% between 2019 and 2020, but at what cost? The books are all too frequently ghostwritten, factually inaccurate, and, quite simply, bad. They offer little in the way of insight, analysis, or introspection; rather, theyre simply celebrations of a politicians accomplishments, justifications for their mistakes, or efforts to control the historical record. Some political memoirs, written by the outer ring of a politicians acolytes, are next to useless. As Fehrman said of presidential memoirs, Its a genre where a lot of good writers have lost the thread, become too focused on settling scores, or listing every person at a meeting. If publishers want to collect the colossal profits these books can turn, they owe their readers due diligence on the back end to ensure high standards of quality, usefulness, and truth.

In an era of vicious mendacity, it's more important than ever that publishers take and hold a firm stance about unimpeachable (no pun intended) truth.

It's time to do away with the assumption that all prominent political figures have something worth saying, no edits required, to the tune of seven figures and a $27.99 hardcover. Certainly well-edited political books have value, and publishing should welcome voices from both sides of the aisle, but Democrats and Republicans both should be subject to rigorous fact-checking. Anyone who wont agree to a good, clean fact-check should consider their right to a mainstream book deal forfeit. That said, convincing publishing to invest in fact-checking will be an uphill climb; as an Esquire investigation revealed, publishers rarely agree to finance fact-checking, and even more rarely require it as a barrier to publication. Convincing conservatives to submit to fact-checking or take a hike will be even harder, but the policy needs to cut both ways, for the good of the American public. It remains unclear if A Promised Land, Barack Obama's runaway bestseller, was subjected to fact-checking; this is every bit as concerning as the complete abdication of fact-checking with Trumpworld memoirs. Until fact-checking becomes an industry standard, this wave of half-baked, "collect your seven figure advance and pass go" political books will continue to be a blight on public life. They are not important contributions to the historical record, as some claim, but rather, they are mercenary, profit-motivated volleys at any semblance of shared objective reality. In an era of vicious mendacity, it's more important than ever that publishers take and hold a firm stance about unimpeachable (no pun intended) truth.

In Trumps statement about his alleged offers from prestigious publishers, he went on to say of the Big Five, Does anybody really believe that they are above making a lot of money? Some of the biggest sleezebags [sic] on earth run these companies. No morals, no nothing, just the bottom line. And they sure wouldnt admit it before the fact. But after the fact, they will stand by and say, Lets go.

It might just be the first true thing hes ever said.

This content is created and maintained by a third party, and imported onto this page to help users provide their email addresses. You may be able to find more information about this and similar content at piano.io

View original post here:
Trump's Memoir Is Bringing Publishers to a Long-Overdue Reckoning With Truth - Esquire

Read More..

Betty Gilpin Interview: The Tomorrow War and More /Film – /FILM – /FILM

Theres an elephant in the room when you talk to Betty Gilpin about her role in The Tomorrow War. Even though the star of GLOW and The Hunt brings humor and charm to her role as the wife of Chris Pratts former solider who is recruited to travel through time to fight aliens in an apocalyptic future, shes still playingyou know, the wife who stays home and doesnt get to fight the aliens.

But do you know who doesnt care about that? Betty Gilpin. I was very happy to be eating bagels in baggy sweaters, waving at everyone as they went off to gun training and stunt training and were icing their knees and stuff, she told me over Zoom. My knees feel great.

The Tomorrow War allows Gilpin to be funny, which is a good thing, because shes a very funny performer. Shes even funny during exhausting press days, when she answered my questions about the possibility of GLOW ever coming back and why shes no longer playing Ann Coulter in the upcoming season of American Crime Story. Theres a honesty in her humor as well not many interviews end with an actor excited about what happens when the wrinkles show up on [their] face.

I really enjoyed the movie. I wasnt sure what to expect from it, but its an absolute blast.

Great!

Have you seen it yet?

I have, yeah. I saw it. My husband was so mad. We watched a screener of it, and it said Betty Gilpin in huge letters across the center of the screen, which felt unsustainable, but I forced him to watch the entire thing like that.

Theres a real 90s vibe to it in the best possible way. I felt like I was watching Independence Day or Stargate or Armageddon. It has that tone.

Yes, totally. Yes. Thats great.

Were those conversations you had with Chris Pratt? Did you guys ever say, Yes, this is my Independence Day. This is my Roland Emmerich movie.

Its all he said. He kept saying it on repeat while he was shaking. Holding protein shakes.

I bought you and Chris Pratt as couple in this movie. I feel like sometimes movies say, Oh, heres our heroic action guyand theres the wife. But I feel like you two have a real believable dynamic. I bought the relationship. I bought the chemistry.

Oh, Im so glad. Yeah. I think that it was important to me to sort of evolve away from action movie wife, just sort of being squinting and stoic, holding up laundry baskets and a cashmere diaper basically. And so I wanted her to feel like a real person and for their marriage to feel like a real marriage. And I think that she sees Dan very clearly and sees that the guy that she fell in love with who wanted to do great things and have purpose in his life has sort of disappeared. She knows hes not where he needs to be. And I think thats the beauty of being married. That you can sort of have the persons number and have the speech prepared for them of heres what you need to do to change your life, to be the person that I know is buried there, but also be flirty and talking about appetizers. Because life.

Yeah. Im curious if this was a script thing, a [director Chris McKay] thing, a you and Chris Pratt thing? The movie lets you both be funny, and funny together.

Its funny because a lot of the stuff that we shot was so dramatic and so emotional, and then we would do one funny take and the funny takes all made it in. I watched it at first and was like wow, this is way funnier than I remember. I remember doing a lot of sobbing. We improvd a lot and yeah, we had such a good time. I love Chris so much. For someone whos such a huge movie star, hes such a team player and so open. Yeah, it was a ton of fun.

And the other Chris here, director Chris McKay, he has an animation background. His previous movie [The LEGO Batman Movie] was really funny. So I kind of had a gut reaction going in that he was going to find some humor in this apocalypse. It sounds like he encouraged you to do funny takes.

Yeah. I think it was important to Chris McKay to find what was real. Things you could hold on to. If you dont believe the relationships, youre never going to believe that people up here from the future announcing that theres a war on humanity with aliens. Its pretty far-fetched. So if you believe that we were married, maybe theres a chance you believe that aliens really came and fought Chris Pratt.

I think its refreshing the movie does not set up a sequel directly. Its not like, Tomorrow War 2 is coming. Its a definitive ending for these characters. But I have to ask you: if they said, Were making a sequel, Betty Gilpin. Do you want to put on an army suit and machine gun some aliens?, Im assuming youd be willing?

I would certainly be willing. I have to say having done many stunt-heavy projects, I was very happy to be eating bagels in baggy sweaters, waving at everyone as they went off to gun training and stunt training and were icing their knees and stuff. I was like, my knees feel great.

A movie of yours that I feel like is an interesting companion piece to this one isThe Hunt. A movie where you are the opposite of comfortable.

My costume was pretty comfortable though, but yeah, I was throwing my body into the ground a lot.

I feel like both these movies are cut from a similar cloth, or at least they are different opposite ends of the same coin. Theyre both socially conscious genre movies. Theyre both about the here and now and in very distinctive ways.

I love it. Theyre certainly both kind of hide your vegetables movies in terms of, they deal with real issues of today. But its sort of hidden inside a big popcorny action movie. Yeah. I think its important. Especially now that were so polarized and where were getting our news and were farther and farther apart from each other, and its almost like movies are sort of the last same church that were all going to seeing the same thing. And I think there are two responsibilities in the entertainment industry, create fluff for people to zone out from a really depressing existence and slip in some vegetables and say, hey, this is not a niche issue. Climate change isnt a niche issue. Racism isnt a niche issue. Okay. Go back to your bubble.

Yeah. Delicious asparagus wrapped around popcorn or vice versa.

Yeah. Chocolate covered brussel sprouts.

Sounds delicious.

Im sure some hipster has done it.

Im sure. Well find someone who serves that. I suppose no interview would be complete without me asking this. I apologize for asking the question. Youve probably been asked many times, but has there been any rumblings on GLOW getting a finale movie or anything like that? Because I miss GLOW.

Yeah. I miss GLOW too. My hip flexors dont missGLOW and my scapula doesnt miss GLOW and my skull doesnt missGLOW but my soul does. I dont know. I feel like itll be like the beginning of a Mark Wahlberg action movie where hes in the woods with a long beard. And hes like, I dont do that kind of work anymore. And then gets the call. I feel like Ill be a pottery teacher in Maine and theyll call me, like, Season four. Were doing it. But Im retired. All right, Ill do it.

Im running out of time. I got to ask about this. Maybe early last year you joined the cast of Impeachment: American Crime Story. Is that still happening?

I am not going to be in it anymore. COVID-wise. It sucks. The schedules just didnt line up. Yeah. I listened to all those Ann Coulter audio books for nothing.

Well, with all due respect to people who may have different opinions than me, that sounds like the most miserable form of research possible.

Yeah, it really was. I have an Ann Coulter impression thats pretty down pat with nowhere to go. So if only I was on Cameo, no, I dont want to be on that.

Do you think you can share some of that impression?

No, because I want it to be[Gilpin pauses, thinks for a moment, and then launches into a pretty damn impressive Ann Coulter impression]She sort of talks like this and its just sort of Ann Coulter and is a certain kind of person who is possibly a demon.

That was incredible. My whole plan here was to end talking about Impeachment, but since thats not happening, what do you want to do next? Assuming you dont want to hurt your knees shooting aliens, whats your dream project?

I think that I have been trying to I think internally I am like a layered, insane, witch person inside of a kind of glittery shell and Im sort of rapidly aging out of the glittery shell. Im excited to see what happens when the wrinkles show up on my face. They already are. And I think that, I dont know, as my dad right now is playing a Butler on HBOsThe Gilded Age. And he sort of always has internally been a butler and is now at his prime. And I think Ive internally always been more of a Mare of Easttown than a Paris Hilton. Im so excited for the Mare of Easttown stuff.

***

The Tomorrow War hits Amazon Prime Video on July 2, 2021.

Link:
Betty Gilpin Interview: The Tomorrow War and More /Film - /FILM - /FILM

Read More..

Altcoins Are Riding Elon Musk’s Twitter to the Moon – Investorplace.com

Perhaps few people are as responsible for the rise of altcoins as Elon Musk, the CEO of Tesla(NASDAQ:TSLA).

A number of cryptic jokes and memes by Teslastenacious CEO have garnered huge influence over the crypto markets, pushing digital currencies to new highs. While Bitcoin (CCC:BTC-USD), the OG crypto, continues it to remain the most popular crypto, tweets by Musk such as Everything to the moon! paved the way for various altcoins. (As the name suggests, alternate or altcoins are cryptocurrencies that are not Bitcoin.)

The recent price rally in altcoins has young investors incredibly bullish on some of the top crypto names. However, many traders fueling the rise are in it for the jokes, the memes and the profits. Few are concerned about the utility or long-term potential of these digital currencies.

Experts have issued warnings about the speculative quality of altcoins stating that investors should be ready to lose their money if the bubble bursts. This is because many altcoins that retail traders are piling their money into offer little to no fundamental value.

However, in todays meme-stock era fueled by Musks tweets, the excitement factor plays a big role and investors are willing to take that risk.

Heres a look at three altcoins riding Elon Musks Twitter to the moon:

Source: Shutterstock

Dogecoins incredible price rally this year can almost entirely be attributed to Musk. While there is little to show for as far as the fundamentals go, DOGE has been one of the best-performing assets this year.

The altcoin is up a whopping 12,000% in the last 12 months as jokes and memes encouraged investors to throw in their support.

The Shiba Inu-themed coin got its claim to fame after Musk tweeted a Lion King meme, with the caption Who let the Doge out? Other celebrities followed suit and before long Dogecoin became one of the most valuable cryptos in terms of market value.

Although its price dipped after Musks jokes about the coin on Saturday Night Live, DOGE continues to remain one of the most popular altcoins on the market.

Now on to the important stuff: fundamental value. In terms of intrinsic bearing, DOGE has little going for it. For one, the currency is highly volatile, going as low as 40% in a single month. Adding to this, Dogecoin has few use cases and is not accepted by many merchants.

Given its speculative quality and lack of competitive advantage, there is little reason to believe in this altcoins long-term potential. However, the digital currency continues to leap higher in a meme-fueled world.

Source: shutterstock

A second altcoin thats worth watching (and investing in) is Ethereum. Ether or Ethereum is the second-largest crypto after Bitcoin in terms of market cap.

The currency, unlike Dogecoin which is fundamentally lacking, derives its value from its blockchain technology. Ethereum operates what is known as a smart contract which serves as the basis for DeFi apps, or decentralized finance apps. Companies that run their apps on the smart contract on Ethereums blockchain need to pay the network a fee in its digital currency Ether.

As DeFi apps and metaverses (also built on Ethereums blockchain technology) gain more traction, the altcoin has plenty of room for growth. The crypto also received praise from Musk, who supported the idea of potentially building a bridge between Dogecoin and Ethereum so that investors could trade DOGE at greater volumes.

Ethereum is currently in the process of building out version 2.0 of its blockchain technology. The new platform will decrease the fees associated with hosting DeFi apps on the smart contract and will transition from a proof-of-work (PoW) to a proof-of-stake (PoS) model.

Ethereum aims to solve the problems affecting Bitcoin and with plenty of improvements in the pipeline, this is one of the top altcoins to get behind.

Source: Shutterstock

One major reason for Bitcoins recent plunge was concerns surrounding the environmental impact of bitcoin mining. Heres the gist: every crypto transaction is stored on the public ledger and in order to ensure transparency and security, it requires additional storage space known as blocks. Validating these blocks requires miners to run code around the clock which uses up energy. Thus increasing the carbon footprint associated with bitcoin mining.

Arguments against mining BTC resurfaced last month after Musk tweeted about its negative effects, stating Tesla will no longer accept Bitcoin as payment. However, he recently added that the company will accept bitcoin when miners use more renewable energy sources.

While Musk didnt tweet about ADA, investors who pulled their money out of BTC after his tweet looked for more eco-friendly cryptos. Enter Cardano, the crypto that uses a fraction of the energy consumed by Bitcoin and Ethereum. ADA is still very much a work in progress and is actively working to improve its offering. The crypto recently launched the Alonzo Testnet with its first-ever fully functional smart contract.

With the price of ADA up a whopping 750% so far this year, Cardano poses a major threat to its bigger altcoin peers. The coins technical prowess and environmental focus make it a strong contender to other altcoins. Investors looking to get into the crypto action this year will find Cardano a great long-term bet.

On the date of publication, Divya Premkumarheld a LONG position in BTC.The opinions expressed in this article are those of the writer, subject to theInvestorPlace.comPublishing Guidelines.

Excerpt from:
Altcoins Are Riding Elon Musk's Twitter to the Moon - Investorplace.com

Read More..

Garlicoin – The Best-kept Altcoin Secret – Cryptonews

The text below is an advertorial article that was not written by Cryptonews.com journalists.

The secret of the best performing crypto traders is that they know how to keep a secret. They will invest in a cryptocurrency before everybody else finds out.

And from that point, the hype can begin.

The thing when you're an early bird is that you buy into a cryptocurrency at a discount price.

And when you buy so low and wait for it to grow, you have a lot of room for market fluctuation.

Imagine that in March 2020, Bitcoins price had gotten so low that some people bought it for 5,000 USD while the market was in extreme fear.

Those traders then waited for Bitcoin to rise in value, and to everyone's surprise, in April, BTC rose over 65,000 USD.

In June 2020, we saw BTC under 40k, but those that caught Bitcoin on sale can wait very well for it to go to a new all-time high.

And let's say BTC is tumbling down. Those that bought it for 5K are still in profit even if BTC goes down to 6k.

And aside from Bitcoin, which is the most popular cryptocurrency, let's take Polkadot. Even though Polkadot is a WEB3 Foundation project, you could barely hear anyone talking about the project back in August 2020, when it had a price of less than 3 USD. But it became viral once its price rose over 20 USD, reaching the top 10 cryptocurrencies by market cap.

And the examples can continue all day long, but let's not stretch this article pointlessly.

Believe it or not, Dogecoin is the cryptocurrency everybody knows about, but most traders won't invest in it because it's "just a meme" altcoin.

And who could blame them? On January 1st, 2021, Doge was valued a little less than half a penny.

Furthermore, they all knew that some guy, namely Jackson Palmer, photoshopped the doge meme over a coin and created a whole fake cryptocurrency brand to mock the greed in the market and the clone coins popping out everywhere.

Indeed, Dogecoin became a real cryptocurrency, being implementing over a Litecoin fork. But even so, the project was never thought out to scale.

Most crypto enthusiasts used it to play around with a less intimidating cryptocurrency and to tip other Reddit users.

People would remember Dogecoin every once in a while, especially when Elon Musk would tweet about it. But that wasn't more than a bit of hype.

Even with significant growth from 0.002 USD to 0.005 USD, Doge would still be dismissed.

However, Dogecoin showed that a meme has more power than any kind of reasoning.

The Dogecoiners started getting behind the meme and pushing it to 1 USD without anyone realizing what's going on.

By the time the whole cryptocurrency world had realized what's going on, Dogecoin rose over 1 cent.

And the trend prevails even as cryptocurrencies have calmed down a little. The altcoin nobody is telling you about yet follows the path Dogecoin open is called Garlicoin.

Garlicoin is a cryptocurrency started back in 2018 by a Reddit user, DigitalizedOrange, who published a post titled "If this post gets 30,000 upvotes, I will make a garlic bread cryptocurrency called Garlicoin,"

The cryptocurrency is based on the garlic bread meme, which was especially popular at that time. And speaking of memes, did Elon Musk send a secret message to the garlic community? I guess thats something we will never find out.

The Garlicoin community has recently increased its activity on Reddit, and the memes have started flowing once more with a funny community-based vocabulary such as tasty garlic bread fresh out of the oven, an unofficial garlic anthem, and a monthly meme challenge.

And as the community gets bigger, the support for GRLC increases. From 0.01 USD, the price has risen over 0.1 USD, and it's increasing steadily.

And considering that Garlic has a max supply of 69 million GRLC and a market cap of 7 million USD at the price of 0.1 USD, the project can easily reach new all-time highs as the community grows.

Visit link:
Garlicoin - The Best-kept Altcoin Secret - Cryptonews

Read More..