Page 2,949«..1020..2,9482,9492,9502,951..2,9602,970..»

Ring in the 2021 summer semester with these virtual events – News@Northeastern

Learn about the sustainability of cycling. Hear from trailblazing Northeastern graduates. Ponder the future of nursing. These events and more are on tap for May.

Cycling is the most sustainable means of urban travel, and promotes physical, social, and mental agility. Join the Department of Civil and Environmental Engineering for a seminar to explore how cycling can help make cities more sustainable on Tuesday, May 4, at 6:30 p.m. EDT.

Online targeting isolates individual consumers, causing what University of Oxford scholar Silvia Milano calls epistemic fragmentation. Tune in to a virtual discussion with Milano about the civic governance of online advertising on Wednesday, May 5, at 10 a.m. EDT.

Tune in to a workshop hosted by Global Student Success to discover new ways to keep busy during Bostons effervescent summer. Join on Wednesday, May 5, at 1 p.m. EDT.

Take time to congratulate Khoury College of Computer Sciences 2021 graduates in a special event to kick off Commencement. Undergraduate students will be recognized on Thursday, May 6, at 12 p.m. EDT and graduate students will be recognized on Friday, May 7, at 12 p.m. EDT.

In a special research talk hosted by Hazel Sive, dean of the College of Science, discuss how the Extreme Anterior Domain can be a target for microcephaly in developing infants. Join virtually on Friday, May 7, at 12 p.m. EDT.

Head to the Friedman Diamond for the Northeastern Baseball Senior Day celebration on Sunday, May 9, at 1 p.m. to support the first-place Huskies as they look to win their first-ever CAA North Division championship.

Positive messaging and seeing the experiences of peers, trusted faculty, and support staff could be the missing piece that inspires our learners to get vaccinated. Submit a photo or short video of yourself after receiving your COVID-19 vaccine to participate in the I Got My COVID-19 Vaccine campaign. Submit all materials here by Friday, May 14, by 8 p.m. EDT.

In a talk titled Adapt or Die: Transgenerational Inheritance of Pathogen Avoidance, hear from Princeton professor Coleen Murphy as she discusses the intricacies of food poisoning and intergenerational transmission. Tune in on Monday, May 10, at 12 p.m. EDT.

Pondering Python? Tantalized by text analysis? Wondering how Jupyter notebooks work? Join a workshop sponsored by NULab for Texts, Maps, and Networks and Research Data Services to learn basic Python while working in Jupyter notebooks. Get involved on Monday, May 10, at 2 p.m. EDT.

Join a discussion with associate professor of physics Meni Wanunu to discuss their research on biosystems at the nanoscale. Tune in on Tuesday, May 11, at 12 p.m. EDT.

Tune in to Northeastern Nurses Week 2021 to celebrate the spirit of nursing, particularly throughout the COVID-19 pandemic, and the ways in which nurses contribute to the Northeastern community. Join the celebration on Tuesday, May 11, at 5 p.m. EDT.

Recently, U.S. regulation, legislation, and compliance requirements have driven Chinese businesses to go public on non-U.S. stock exchanges. What does this mean for the U.S. stock market? Learn more in a talk with professor David Sherman on Wednesday, May 12, at 6 p.m. EDT.

In a discussion titled The Journey after Huntington Avenue: How Three Trailblazing Black Alumnae Found Their Paths, learn how three former students tapped into Northeasterns resources to develop into the socially responsible professional they are today. Tune in on Monday, May 17, at 12 p.m. EDT.

Join Cornell professor Neil Lewis Jr. in a lecture hosted by Northeasterns Social Impact Lab to discuss Mechanisms of Explanation vs. Mechanisms of Change: Tensions Between Basic Theory Construction and Practical Application. Learn more on Monday, May 17, at 12 p.m. EDT.

Learn about the journey of chef Erin French as she overcame adversity and founded her own restaurant located in the wilds of Maine. Hear excerpts from her new memoir Finding Freedom in a virtual discussion on Tuesday, May 18, at 12 p.m. EDT.

In part two of the Fourth Annual David B. Schulman Distinguished Lecture hosted by the Institute on Race and Justice, learn how monetary sanctions create and exacerbate racial and economic inequality in the U.S. criminal legal system from University of Washington professor Alexes Harris. Tune in on Tuesday, May 18, at 5 p.m. EDT.

In the 1980s, Massachusetts embraced the War on Drugs, enacting harsh mandatory minimum sentences for nonviolent drug offenses. It took decades for institutions to confront the reality that mandatory minimums resulted in the pervasive and disproportionate incarceration of Black individuals. Tune in to a panel discussion to examine this troubling history and the prospects for reforming policies on Wednesday, May 19, at 6 p.m. EDT.

Northeasterns Align Masters in Data Science is a unique interdisciplinary program for students from any background. Hear more about the program and its ties to the world of data science in a webinar on Thursday, May 20, at 7 p.m. EDT.

Join the school of laws annual Women in the Law Conference on Friday, May 21, starting at 8:30 a.m. EDT to examine how the industry can promote the reimagination of inclusive workspaces.

Join a talk with industry experts to discuss the future of nursing from 2020-2030, and the ways in which nursing can be a force in advancing health equity. Tune in on Monday, May 24, at 3:30 p.m. EDT.

For media inquiries, please contact media@northeastern.edu.

View post:

Ring in the 2021 summer semester with these virtual events - News@Northeastern

Read More..

Global Data Science and Machine Learning Service Market is growing at a High CAGR during the forecast period 2020-2026. The increasing interest of the…

Global Data Science and Machine Learning Service Marketresearch report is the new statistical data source added byA2Z Market Research.

Get the PDF Sample Copy (Including FULL TOC, Graphs and Tables) of this report:

https://www.a2zmarketresearch.com/sample?reportId=394072

Note In order to provide more accurate market forecast, all our reports will be updated before delivery by considering the impact of COVID-19.

Global Data Science and Machine Learning Service Marketresearch is an intelligence report with meticulous efforts undertaken to study the right and valuable information. The data which has been looked upon is done considering both, the existing top players and the upcoming competitors. Business strategies of the key players and the new entering market industries are studied in detail. Well explained SWOT analysis, revenue share and contact information are shared in this report analysis.

Top Key Players Profiled in this report are:

Various factors are responsible for the markets growth trajectory, which are studied at length in the report. In addition, the report lists down the restraints that are posing threat to the global Data Science and Machine Learning Service market. It also gauges the bargaining power of suppliers and buyers, threat from new entrants and product substitute, and the degree of competition prevailing in the market. The influence of the latest government guidelines is also analyzed in detail in the report. It studies the Global Data Science and Machine Learning Service markets trajectory between forecast periods.

Table of Contents

Global Data Science and Machine Learning Service Market Research Report 2020 2026

Chapter 1 Global Data Science and Machine Learning Service Market Overview

Chapter 2 Global Economic Impact on Industry

Chapter 3 Global Market Competition by Manufacturers

Chapter 4 Global Production, Revenue (Value) by Region

Chapter 5 Global Supply (Production), Consumption, Export, Import by Regions

Chapter 6 Global Production, Revenue (Value), Price Trend by Type

Chapter 7 Global Market Analysis by Application

Chapter 8 Manufacturing Cost Analysis

Chapter 9 Industrial Chain, Sourcing Strategy and Downstream Buyers

Chapter 10 Marketing Strategy Analysis, Distributors/Traders

Chapter 11 Market Effect Factors Analysis

Chapter 12 Global Data Science and Machine Learning Service Market Forecast

The key questions answered in this report:

Get up to 20% Discount on this Premium Report:

https://www.a2zmarketresearch.com/discount?reportId=394072

The cost analysis of the Global Data Science and Machine Learning Service Market has been performed while keeping in view manufacturing expenses, labor cost, and raw materials and their market concentration rate, suppliers, and price trend. Other factors such as Supply chain, downstream buyers, and sourcing strategy have been assessed to provide a complete and in-depth view of the market. Buyers of the report will also be exposed to a study on market positioning with factors such as target client, brand strategy, and price strategy taken into consideration.

Regions Covered in the Global Data Science and Machine Learning Service Market Report 2020:The Middle East and Africa(GCC Countries and Egypt)North America(the United States, Mexico, and Canada)South America(Brazil etc.)Europe(Turkey, Germany, Russia UK, Italy, France, etc.)Asia-Pacific(Vietnam, China, Malaysia, Japan, Philippines, Korea, Thailand, India, Indonesia, and Australia)

The report provides insights on the following pointers:

Market Penetration:Comprehensive information on the product portfolios of the top players in the Global Data Science and Machine Learning Service market.

Product Development/Innovation:Detailed insights on the upcoming technologies, R&D activities, and product launches in the market.

Competitive Assessment: In-depth assessment of the market strategies, geographic and business segments of the leading players in the market.

Market Development:Comprehensive information about emerging markets. This report analyzes the market for various segments across geographies.

Market Diversification:Exhaustive information about new products, untapped geographies, recent developments, and investments in the Global Data Science and Machine Learning Service market.

Buy Exclusive Report @:

https://www.a2zmarketresearch.com/buy?reportId=394072

If you have any special requirements, please let us know and we will offer you the report as you want.

About A2Z Market Research:

The A2Z Market Research library provides syndication reports from market researchers around the world. Ready-to-buy syndication Market research studies will help you find the most relevant business intelligence.

Our Research Analyst Provides business insights and market research reports for large and small businesses.

The company helps clients build business policies and grow in that market area. A2Z Market Research is not only interested in industry reports dealing with telecommunications, healthcare, pharmaceuticals, financial services, energy, technology, real estate, logistics, F & B, media, etc. but also your company data, country profiles, trends, information and analysis on the sector of your interest.

Contact Us:

Roger Smith

1887 WHITNEY MESA DR HENDERSON, NV 89014

sales@a2zmarketresearch.com

+1 775 237 4147

Continued here:

Global Data Science and Machine Learning Service Market is growing at a High CAGR during the forecast period 2020-2026. The increasing interest of the...

Read More..

Global Data Science Platform Market To Expand with an ASTONISHING CAGR During The Forecast Period 2020-2026 The Courier – The Courier

The business report released by Zion Market Research onGlobal Data Science Platform Market To Expand with an ASTONISHING CAGR During The Forecast Period 2020-2026is focused to facilitate a deep understanding of the market definition, potential, and scope. The report is curate after deep research and analysis by experts. It consists of an organized and methodical explanation of current market trends to assist the users to entail in-depth market analysis. The report encompasses a comprehensive assessment of different strategies like mergers & acquisitions, product developments, and research & developments adopted by prominent market leaders to stay at the forefront in the global market.

FREE | Request Sample is Available @https://www.zionmarketresearch.com/sample/data-science-platform-market

The major players in the globalData Science Platform MarketareIBM, Microsoft Corporation, RapidMiner Inc., Dataiku, Continuum AnalyticsInc., Domino Data Lab, Wolfram, Sense Inc., DataRobot Inc., and AlteryxInc.

Along with contributing significant value to the users, the report by Zion Market Research has focused on Porters Five Forces analysis to put forward the wide scope of the market in terms of opportunities, threats, and challenges. The information extracted through different business models like SWOT and PESTEL is represented in the form of pie charts, diagrams, and other pictorial representations for a better and faster understanding of facts. The report can be divided into following main parts.

Growth drivers:

The report provides an accurate and professional study of global Data Science Platform Market business scenarios. The complex analysis of opportunities, growth drivers, and the future forecast is presented in simple and easily understandable formats. The report comprehends the Data Science Platform Market by elaborating the technology dynamics, financial position, growth strategy, product portfolio during the forecast period.

Download Free PDF Report Brochure @https://www.zionmarketresearch.com/requestbrochure/data-science-platform-market

Segmentation:

The report is curate on the basis of segmentation and sub-segmentation that are aggregated from primary and secondary research. Segmentation and sub-segmentation is a consolidation of industry segment, type segment, channel segment, and many more. Further, the report is expanded to provide you thorough insights on each segment.

Regional analysis:

The report covers all the regions in the world showing regional developmental status, the market volume, size, and value. It facilitates users valuable regional insights that will provide a complete competitive landscape of the regional market. Further, different regional markets along with their size and value are illustrated thoroughly in the report for precise insights.

Inquire more about this report @https://www.zionmarketresearch.com/inquiry/data-science-platform-market

Competitive analysis:

The report is curate after a SWOT analysis of major market leaders. It contains detailed and strategic inputs from global leaders to help users understand the strength and weaknesses of the key leaders. Expert analysts in the field are following players who are profiled as prominent leaders in the Data Science Platform Market. The report also contains the competitive strategy adopted by these market leaders to the market value. Their research and development process was explained well enough by experts in the global Data Science Platform Market to help users understand their working process.

Key Details of the Existing Report Study:

Frequently Asked Questions

Thanks for reading this article;you can also get individual chapter wise section or region wise report version like North America, Europe or Asia.

About Us:

Zion Market Research is an obligated company. We create futuristic, cutting-edge, informative reports ranging from industry reports, the company reports to country reports. We provide our clients not only with market statistics unveiled by avowed private publishers and public organizations but also with vogue and newest industry reports along with pre-eminent and niche company profiles. Our database of market research reports comprises a wide variety of reports from cardinal industries. Our database is been updated constantly in order to fulfill our clients with prompt and direct online access to our database. Keeping in mind the clients needs, we have included expert insights on global industries, products, and market trends in this database. Last but not the least, we make it our duty to ensure the success of clients connected to usafter allif you do well, a little of the light shines on us.

Contact Us:

Zion Market Research244 Fifth Avenue, Suite N202New York, 10001, United StatesTel: +49-322 210 92714USA/Canada Toll-Free No.1-855-465-4651Email:sales@zionmarketresearch.comWebsite:https://www.zionmarketresearch.com

Read the rest here:

Global Data Science Platform Market To Expand with an ASTONISHING CAGR During The Forecast Period 2020-2026 The Courier - The Courier

Read More..

Quantum Computing Professor, Researcher Yacoby Elected to American Academy of Arts & Sciences – HPCwire

We are honoring the excellence of these individuals, celebrating what they have achieved so far, and imagining what they will continue to accomplish, said David Oxtoby, President of the American Academy. The past year has been replete with evidence of how things can get worse; this is an opportunity to illuminate the importance of art, ideas, knowledge, and leadership that can make a better world.

Yacoby holds appointments in the Physics Department and at theHarvard John A. Paulson School of Engineering and Applied Sciences(SEAS)and is a member of the National Academy of Science.

Yacobys research explores topological quantum computing, interacting electrons in layered materials, spin-based quantum computing and the development of novel quantum sensing probes such as scanning single electron transistors and color centers in diamond for unraveling the underlying microscopic physics of correlated electron systems.

Yacoby is leading a research area at theDepartment of Energys Quantum Information Science (QIS) Research Centerat Oak Ridge National Laboratory, where his work will focus on using quantum sensing techniques to explore quantum materials.

Yacoby is a member and sits on the executive committee of theHarvard QuantumInitiativeand a participant in theCenter for Integrated Quantum Materials(CIQM), a National Science Foundation Science and Technology Center, based at SEAS. CIQM is dedicated to studying new quantum materials with non-conventional properties that could transform signal processing and computation.

Source: Harvard University

The rest is here:
Quantum Computing Professor, Researcher Yacoby Elected to American Academy of Arts & Sciences - HPCwire

Read More..

AV-Comparatives Announces Internet Security Comparison Test for Real-World and Malware Protection for Q1 2021 – PRNewswire

The Real-World Protection Test results released by AV-Comparatives are based on 354 live test cases including working exploits and URLs pointing directly to malware. The test-cases used cover a wide range of current malicious sites, highlighting the quality of protection offered by various products. This AV-test by AV-Comparatives provides detailed insights into the actual capabilities of as many as 17 popular anti-virus products. The results of the false-positives test are also available in the factsheet. The full results, covering four months of on-going testing, will be published in June.

As per the test results published by AV-Comparatives, the tested products were Avast Free Antivirus, AVG Free Antivirus, Avira Antivirus Pro, Bitdefender Internet Security, ESET Internet Security, G Data Total Security, K7 Total Security, Kaspersky Internet Security, Malwarebytes Premium, McAfee Total Protection, Microsoft Defender Antivirus, NortonLifeLock Norton 360, Panda Free Antivirus, Total AV Total Security, Total Defense Essential Antivirus, Trend Micro Internet Security and VIPRE Advanced Security.

"Our Real-World Protection Test is currently one of the most comprehensive and complex tests available, using a relatively large number of test cases. Currently, we are running this test under updated Microsoft Windows 10 Pro 64 Bit with up-to-date third-party software," said Peter Stelzhammer, co-founder of AV-Comparatives. "Every few months, we update the charts on our website showing the protection rates of the various tested products over the past months. The interactive charts for February and March 2021 are now available on our website."

AV-Comparatives has also released the results of its Malware Protection Test for consumer security solutions. 17 popular anti-malware apps were evaluated to assess their ability to protect a system against infection by malicious files before, during or after execution. In addition to detection rates, the test also examines a product's ability to prevent a malicious program from making any changes to the system. The test set used for this test consisted of 10,013 malware. To ensure that the tested programs do not protect the system at the expense of high false-alarm rates, a false-positives test is also run.

To access the just published test results from AV-Comparatives, please visithttps://www.av-comparatives.org.

Real-World Protection Tests:https://www.av-comparatives.org/consumer/testmethod/real-world-protection-tests/Malware Protection Tests:https://www.av-comparatives.org/consumer/testmethod/malware-protection-tests/

About AV-Comparatives: AV-Comparatives is an independent organisation offering systematic testing to examine the efficacy of security software products and mobile security solutions. Using one of the largest sample collection systems worldwide, it has created a real-world environment for truly accurate testing. AV-Comparatives offers freely accessible results to individuals, news organisations and scientific institutions. Certification by AV-Comparatives provides a globally recognised official seal of approval for software performance.

Photo - https://mma.prnewswire.com/media/1499115/AV_Comparatives_1.jpgPhoto - https://mma.prnewswire.com/media/1499116/AV_Comparatives_2.jpgLogo - https://mma.prnewswire.com/media/1341278/AV_Comparatives_Logo.jpg

Contact: Peter Stelzhammer[emailprotected]+43 720115542

SOURCE AV-Comparatives

Home

Continued here:
AV-Comparatives Announces Internet Security Comparison Test for Real-World and Malware Protection for Q1 2021 - PRNewswire

Read More..

Cyber Security Begins Abroad – War on the Rocks

The Russian Foreign Intelligence Services compromise of U.S. company SolarWinds and a variety of other information technology infrastructures has been described as the greatest cyber intrusion, perhaps, in the history of the world. According to the Biden administration, the hack gave the Russians the ability to compromise or disrupt potentially 16,000 computer systems worldwide, enabling collection of vast amounts of information from federal departments and agencies, private companies, and other victims.

On April 15, the Biden administration outlined its response. The White House formally attributed the campaign to the Russian Foreign Intelligence Service, expelled Russian diplomats from the United States, imposed sanctions on six Russian technology companies that support the intelligence services cyber operations, and issued a new directive imposing sovereign debt sanctions on Russia. The administrations actions were impressive in terms of their scope, drawing on many U.S. response options simultaneously.

While the most newsworthy aspects of Washingtons response to Russia was featured in the first two-thirds of the April 15 statement, the last section outlined important steps that will guide Americas international cyber policy for years to come. The Biden administration explained that it would be supporting a global cybersecurity approach through international capacity-building projects focused on enhancing understanding of the policy and technical aspects of publicly attributing cyber incidents and the provision of training to foreign partners on the applicability of international law in cyberspace. This effort highlights an often overlooked element of U.S. national security and cyberspace policy: Improved cyber security around the world and improved capacity to identify and hold accountable malign actors in cyberspace make the Internet safe for American users and everyone else. When the United States helps its international partners improve their own cyber security, the benefits reverberate across cyberspace.

For the United States, working with foreign governments to make the internet a more secure place is not just a diplomatic opportunity. It should be a key national security priority. International capacity building is particularly critical in cyberspace because threats from hackers, cyber criminals, and hostile intelligence services originate from all over the world. In addition, ensuring the resiliency of cyberspace on a global scale is imperative in countering Chinas growing digital footprint and influence.

As staff of the Cyberspace Solarium Commission, we were tasked with examining all tools of statecraft that contribute to defending the United States from cyber attacks. Not only is it often (unwisely) passed over as a security priority, but current capacity-building infrastructure is inadequate, largely due to outdated legal authorities and processes that insufficiently meet the demands of modern diplomacy and security issues. International cyber security capacity building has a clear and direct benefit for U.S. national security. Congress is currently poised to make major changes to cyberspace policy at the State Department. As it does so, legislators would be wise to ensure that the department has sufficient funding, flexibility, and agility to build global cyber capacity around the globe by creating a fund specifically for cyber capacity building and corresponding authorities to provide emergency assistance.

Capacity Building as a National Security Priority

Capacity-building programs are vehicles for investing strategically in the international community. With respect to cyber security, such programs generally focus on improving national capacity to effectively deliver cyber security (referred to as cyber maturity) and equipping foreign governments with the resources and expertise essential to prevent, detect, withstand, and recover from cyber attacks. In particular, capacity building can help countries build national strategies for enhanced cyber security, collaborate and share information with the private sector on cyber risk management, revise criminal laws and procedures to mitigate cyber crime, bolster incident response and recovery capabilities, advance national cyber security awareness, and grow national cyber security workforces.

Multilateral efforts in the capacity-building arena are well established and supported by U.N. groups and other organizations alike. In particular, the Global Forum on Cyber Expertise has emerged as a leader via its role as a resource clearinghouse. Apart from these multilateral efforts, several states have pursued bilateral or regional cyber capacity-building initiatives. For example, the Australian government has specifically focused on the Indo-Pacific region in its efforts and works with partners across sectors to strengthen cyber security among its neighbors.

Cyber security capacity building serves U.S. national security interests in three ways. First, enabling foreign governments to undertake actions like responding rapidly and effectively to cyber security incidents or tamping down cyber crime makes all of cyberspace a safer place. The United States is not unique in recognizing this. For example, the Canadian government has clearly articulated the linkages between national security and international capacity: The security of Canada is linked to that of other states. When foreign states lack these resources, it can put the security of Canadians and Canadian interests at risk, both at home and abroad. In this sense, cyber security capacity building is a straightforward example of a rising tide lifting all boats.

Second, stronger partners make better partners in countering malign behavior in cyberspace. For example, the United States and Ukraine have worked together for years on cyber security issues, including promoting legal and regulatory reform, cyber workforce development, and private sector engagement. Given the countries longstanding tradition of partnership on law enforcement investigations, not to mention Ukraines unique local cyber security environment, the United States directly strengthens its own security by ensuring that Ukraine is a highly capable cyber security partner. Equipping partner and allied nations with resources for cyber capacity building ensures that beneficiaries are protected from the coercive influence of cyber attacks and enabled to respond effectively. The strength of U.S. partners also helps expand the capacity for enforcing rules of responsible state behavior in cyberspace, promoting collaboration among states that share the U.S. vision for an open, interoperable, reliable, and secure internet. For example, foreign governments must have the independent capability to identify and analyze a cyber attack rapidly in order to engage in the growing trend of issuing a joint attribution and response. This joint enforcement minimizes the burdens any single state faces in holding accountable those who violate rules of responsible state behavior and encourages stability in cyberspace by reinforcing cyber security norms. Projects focused on enhancing joint enforcement and reinforcing cyber norms were precisely those that the Biden administration pledged to support in response to Russian malicious cyber activity, which focused on expanding attribution capacity and providing training regarding the applicability of international law in cyberspace.

Efforts to bolster foreign cyber capacity are distinct from military support for foreign partners in furtherance of hunt forward operations. In hunt forward operations, the U.S. military deploys to other countries to counter threats on foreign networks in partnership with those countries militaries. Capacity-building efforts that strengthen the overall cyber maturity of partner nations can pick up where these efforts leave off, promoting resilience and civilian cyber security without direct engagement of U.S. military personnel. Moreover, these military programs are distinct from incident response teams, whose primary role is to assist victims in the immediate aftermath of a cyber attack. The United States needs different tools for different problems. Capacity-building programs are broader in scope and go even further than existing military programs in strengthening the ability of partners to prevent, withstand, and respond to cyber attacks.

Finally, the national security value of capacity building also implicates efforts to counter Chinas growing investment and influence in the digital infrastructure of countries in the Global South. As countries scramble to keep pace with the digital age, some governments may not have the economic resources to be picky about a source of technical assistance, and the cheapest technology is not always the best suited for promoting open societies. A report from the German Marshall Fund cites as an example, After installing Huawei 4G equipment, video surveillance software, and facial recognition technology, Kenya, Tanzania, Vietnam, and Zimbabwe have to varying degrees seen the adoption of draconian cybercrime laws restricting Internet freedom and clamping down on speech against the government.

Through projects like the Belt and Road Initiative and the Digital Silk Road, leaders in Beijing have found opportunities to both tap into a global customer base for their goods and spur the uptake of technology that aligns with state policy objectives. To give a sense of scale, in 2018, for the second year in a row, investment in African information and communications technology development projects from China alone eclipsed funding from the Infrastructure Consortium for Africa, the organization that combines the efforts of G8 countries and other governments with multilateral efforts like those of the World Bank and the African Development Bank.

U.S. capacity building and cyber diplomacy generally can and should counter growing influence from the Chinese government in the countries that have been dubbed the digital deciders (e.g., Brazil, India, Mexico, and Indonesia). The choices of these actors will have a critical impact on global technology governance and the balance of states that favor an open, global digital infrastructure that protects rights like privacy versus those that favor a closed, sovereign version that enables human rights abuses. U.S. national security reaps very tangible benefits from ensuring that the United States, alongside its partners and allies, is the first and trusted source for cybersecurity expertise, particularly as authoritarian adversaries like the Chinese government compete to influence the future of the internet. Bolstering cyber security capacity enables the United States to advance a free, open, and interoperable Internet and insulates beneficiary nations from Beijings efforts to project power abroad through infrastructure projects.

What Congress Can Do

Congress should create a new capacity-building fund dedicated to cyber security with the authority to provide assistance to countries of all income levels, in all parts of the world, especially during times of crisis. Despite the importance of capacity building as a national security priority, the legal authorities that enable U.S. cyber capacity building are inflexible and slow, often cobbled together from programs that were designed for Cold War-era diplomacy. These tools are insufficient to enable the United States led by the State Department to support foreign partners working to mature their cyber security systems, much less to meet the needs of partner and allied nations during times of crisis. Without specifically dedicated funds, cyber security is forced to compete with a variety of other foreign assistance priorities.

Existing frameworks for distributing aid make it difficult for the United States to support the cyber priorities of certain countries. These difficulties relate to the way foreign governments structure oversight of their cyber security policy and strategy, and to foreign assistance eligibility criteria that are tied to country income level or geographic location.

In the first case, the difficulty stems from otherwise practical limitations like those in the legislation authorizing the Economic Support Fund one of the primary vehicles through which the State Department can fund foreign assistance projects. The law stipulates that the Economic Support Fund may not be used for military or paramilitary purposes. While this is important for ensuring the United States does not fund the development of offensive cyber operations programs in foreign countries, it hamstrings Americas ability to help countries bolster their civilian cyber security when such programs are overseen by military organizations. Colombia, for example, runs its national computer emergency response team through its Ministry of Defense, as does Latvia, and in Spain, the function sits under the national intelligence agency.

In the second case, the difficulty stems from the eligibility requirements associated with the use of certain foreign assistance funds. Congress should consider expanding criteria for cyber security capacity-building programs to allow for the provision of aid to middle-income countries, irrespective of geography. Some funds, like those earmarked for the Assistance to Europe, Eurasia, and Central Asia Fund, are limited to a particular geographic region. Other funds are generally aimed at providing assistance to low- and lower middle-income countries, which is an important means of ensuring that foreign aid is channeled to those countries in greatest need of support. When it comes to cyber security, however, some strategically important countries do not meet these criteria. Singapore, Taiwan, Indonesia, and Thailand, for example, are all considered upper-middle-income economies or high-income economies by the World Bank, but both private companies and government entities have been the target of economically and geopolitically motivated attacks, some of which have been attributed to Chinese groups. As currently structured, existing authorities can make it slow and bureaucratic to get funding to countries such as these, but given the regions strategic importance, there are occasions when doing so may be both critical and time-sensitive.

A specific account dedicated to cyber security could allow Congress to ensure that all foreign assistance priorities including cyber security receive sufficient funding and resources. The March 2020 report of the U.S. Cyberspace Solarium Commission, a congressionally mandated body examining cyberspace policy, specifically recommended legislative action to untangle this issue. Both of the problems highlighted above speak to the short-term priority for strengthening U.S. abilities to build cyber security capacity: building flexible, consolidated funds for cyber security to overcome competing priorities for foreign assistance. Though funds can be cobbled together from the alphabet soup of foreign assistance funds, the absence of a designated fund means that cyber security competes with priorities like bolstering democracy and the rule of law, encouraging the development of free markets, or building peace in conflict-ridden regions. Additionally, a distinct fund would allow for the development of flexible eligibility criteria that are specifically tailored to strategic cyber-related objectives.

Anticipating Challenges

Existing U.S. capacity-building programs also face challenges related to agility and are inadequately positioned within broader efforts to counter Beijings growing influence abroad. Foreign assistance moves slowly. Capacity-building programs are aimed at boosting the cyber maturity of partner and allied nations, a process that can take years, if not decades. And even countries with the most mature cyber capabilities are not immune to crisis. When such crises arrive, it may be critical for the United States to move money immediately to aid with incident response and remediation. Congress should ask the State Department to review in consultation with other federal departments and agencies the process of delivering foreign aid in times of crisis and how the process for cyber security capacity building can be streamlined or expedited during exigent circumstances so that the State Department can support foreign partners when they need it most. Such assistance would be similar to the rapid humanitarian and disaster relief aid that the State Department and USAID distribute during times of crisis.

Additionally, departments and agencies with responsibility for allocating foreign assistance and implementing capacity-building projects should think about how these projects and programs fit into broader U.S. efforts to counter Beijings influence and investment in the Global South. In the face of such a concerted effort, the United States needs a careful, thoughtful strategy, connecting capacity-building efforts with diplomacy, law enforcement, private sector engagement, and more. The Cyber Diplomacy Acts proposed Bureau of International Cyberspace Policy would be an ideal place for some of this coordination to take place.

Beyond the geopolitical issue of China, the Bureau of International Cyberspace Policy is an important place to align capacity-building efforts with broader cyber diplomacy goals addressing competing models of internet governance. Similarly, improved coordination at the White House level via the new office of the national cyber director can help align international capacity-building efforts across U.S. government agencies. In addition to the State Departments work, the Department of Homeland Security is planning an international cyber security capacity-building sprint. Meanwhile, the Cybersecurity and Infrastructure Security Agency launched an international strategy, CISA Global, which aims also to support the State Departments work with international partners on capacity building.

When it comes to international capability in cyberspace, U.S. civilian agencies should take the lead. While the Defense Department has a huge role to play in keeping the country safe in cyberspace, U.S. diplomats are better positioned to advance U.S. cyber security interests in foreign capitals. Ensuring that all tools of international engagement including military, diplomatic, and foreign assistance are aligned is imperative to strengthening the credibility of Americas actions in cyberspace, and the Bureau of International Cyberspace Policy is a good focal point for that coordination within the State Department.

Looking Ahead

The Biden administrations emphasis on capacity building in response to Russian malicious cyber activity is an important reminder that, in cyberspace, Americas safety is wound up with that of the rest of the world. As Congress works to improve the governments structure for engaging internationally on cyber security, it should ensure that the State Department has the authority to provide aid in a timely and concerted fashion. By doing its part to help partners and allies, the United States can take a crucial step in building a resilient cyberspace and protecting vital U.S. interests.

Natalie Thompson is a research analyst with the U.S. Cyberspace Solarium Commission. Previously, she was a research assistant and James C. Gaither Junior Fellow at the Carnegie Endowment for International Peace, working with the Technology and International Affairs Program on projects related to disinformation and cybersecurity. She tweets at @natalierthom.

Zoe Peach-Riley is a research intern with the U.S. Cyberspace Solarium Commission. She is a current student at the University of Southern California, where she is pursuing a major in intelligence & cyber-operations.

Laura Bate is a senior director with the U.S. Cyberspace Solarium Commission and a 2021 Next Generation National Security Fellow with the Center for a New American Security. Previously, she was a policy analyst with New Americas Cybersecurity Initiative and remains an International Security Program Fellow. She tweets at @Laura_K_Bate.

Image: State Department

More:
Cyber Security Begins Abroad - War on the Rocks

Read More..

The Security Issues Holding Back the Rollout of the Industrial Internet of Things – CMSWire

Many of the discussions about the Internet of Things, or IoT, focus on the positives of having a connected home or a connected workplace. But there's also been a focus on the weaknesses and flaws in the IoT. High on that list is security and concerns about the safety and integrity of all those devices that we're connecting together.

If security problems can cause serious problems for consumers, compromised security for the Industrial IoT (IIoT) can be devastating for organizations involved and result in a significant reputational hit when devices are hacked, and even a shutdown if the attack is serious enough. As the world has become more connected over the past year, that has pushedIIoT security to the top of security professionals' agenda.

The bad news is that many of those responding to a recent survey say they are not prepared to protect their organizations infrastructure. In March 2021, Tripwire, a Portland, Ore.-based provider of security and compliance solutions for enterprises, surveyed 312 security professionals whomanage IoT and IIoT devices across their organization.

According to the survey, 99% of security professionals report challenges with the security of their IoT and IIoT devices, and 95% are concerned about risks associated with these connected devices. More than three quarters of those surveyed said that connected devices do not easily fit into their existing security approach, and 88% required (or still require) additional resources to meet their IoT and IIoT security needs.

This is of particular concern for those in the industrial space, as more than half (53%) said they are unable to fully monitor connected systems entering their controlled environment, and 61% have limited visibility into changes in security vendors within their supply chain.

Related Article: The Future of IoT and the Digital Workplace

One of the most significant technologies of the 21st century, IoT has the power to revolutionize our daily functions and how we interact with our homes and each other. The mass usage of IIoT is a massive opportunity but it comes with many problems that manufacturers have yet to answer, said Ondrej Krehel, CEO ofLIFARS, a New York City-based cybersecurity firm. The biggest potential downside is that they are not safe from cybercriminals.

In 2021, there is no device in the world that is 100% safe from all outside threats," he said. "Any Internet-connected device anywhere is vulnerable to some type of attack. However, considering the interconnectivity of IoT devices, a simple breach could be catastrophic and expose problems to an entire network of devices [across the enterprise], instead of just one. Those threats include:

Related Article: How the Internet of Things Enables Remote Workers

The security of IIoT devices is easily its biggest problem. Manufacturers and service providers should prioritize the security and privacy of their products and should also provide encryption and authorization by default to protect users as much as possible.

Tom Winter, HR tech recruitment advisor and co-founder of New York City-based DevSkiller, pointed out that while IoT has been a great factor in the proliferation of smart homes, smart offices have yet to take flight in the same way. The fact that companies and organizations have significant security issues is one of the reasons why industrial IoT implementation has not caught on in the workplace.

There is a clear disconnect between organizational IoT systems and their users. Yet, the importance of these systems is inevitable and organizations must educate their users to build knowledge and awareness. There is one more factor: the maturity of the commercial products in the market today.

Perhaps they are not yet ready for all types of offices just yet," Winter said. "There may need to be some time for the market to adjust to the needs of various organizations."

The proliferation of 5G networks will vastly improve both the security and performance of these IoT systems. Because not all regions globally have access to this technology yet, there needs to be patience on the part of companies before IoT workspaces become a full-fledged phenomenon.

Organizations and chief information security officers are right to be concerned by IIoT security, but the benefits and market potential are such that companies cannot sit idly by either, said Hatem Oueslati, co-founder and CEO of France-based IoTerop. One positive is that Europe, the UK, and the US all recently introduced cybersecurity regulations highlighting the importance of security, but even these suggestions can be problematic. Take firmware updates, for example. Poorly implemented FOTA mechanisms can create vulnerabilities.

Security should be an integral pillar of product strategy. No one buys thousands of smart meters without looking closely at security. Security is one reason original equipment manufacturers are attracted to the lightweight M2M standard (LwM2M). Initially, they want to reduce time to market and improve solution quality. However, standardized device management services like zero-touch device commissioning and PKI provisioning, monitoring, authentication and encryption are crucial to operating secure, cost-effective IoT solutions.

Soon, billions of devices will deliver the goods and services we need to live, like healthcare, electricity and more," Oueslati said. "From the device to the cloud, everything must be secure and standardized so the risks are not hidden.

There are other issues, too. The hype around IoT years ago was off the charts, said Ron Exler, director and principal analyst at the Stamford, Conn.-basedInformation Services Group. The excessive predictions about its spread explain why there are questions over why it has not spread as fast as might have been expected.

It also explains the lack of scale in enterprise deployments. Many IoT pilots launched amidst the hype but many did not scale because they could not show adequate ROI, and many enterprises are still concerned about security.

The result, Exler said, is that service providers will not do pilots. Instead, they show the ROI for full deployments, get executive buy in and then go. What is left in the enterprises are the closed systems, such as factories. In these environments, even small improvements in productivity are important and can be more easily measured. These environments are also more conducive to 5G deployment.

The lack of standards and interoperability is also a problem for enterprise IoT. Enterprises seek to lower risk and one way to do that is to rely on a multiple vendors. Plus, multi-vendor solutions can be more robust. The IT systems connecting to the operational systems are critical, too. Without adequate standards for data exchange and security, the idea of the IoT will not reach its full potential, Exler said.

Underlying all this is the fact that security is an afterthought. Every device is a potential entry point for hackers yet it is an open secret in the industry that the IoT ecosystem of vendors is more concerned with getting new products to market than securing them. Most consumers do not pay attention but many enterprise buyers do. The security risks simply are not worth it for them, especially when the ROI is unpredictable or fleeting.

Exler argued that while AI can help IoT, especially at the edge to collect and process the right data, it could also help with security. But it is not a panacea. 5G will help for some applications where speed and network latency are critical.

Go here to read the rest:
The Security Issues Holding Back the Rollout of the Industrial Internet of Things - CMSWire

Read More..

ISC urges updates of DNS servers to wipe out new BIND vulnerabilities – ZDNet

The Internet Systems Consortium (ISC) has released an advisory outlining a trio of vulnerabilities that could impact the safety of DNS systems.

This week, the organization said the vulnerabilities impact ISC Berkeley Internet Name Domain (BIND) 9, widely used as a DNS system and maintained as an open source project.

The first vulnerability is tracked as CVE-2021-25216 and has been issued a CVSS severity score of 8.1 (32-bit) or 7.4 (64-bit). Threat actors can remotely trigger the flaw by performing a buffer overflow attack against BIND's GSSAPI security policy negotiation mechanism for the GSS-TSIG protocol, potentially leading to wider exploits including crashes and remote code execution.

However, under configurations using default BIND settings, vulnerable code paths are not exposed -- unless a server's values (tkey-gssapi-keytab/tkey-gssapi-credential) are set otherwise.

"Although the default configuration is not vulnerable, GSS-TSIG is frequently used in networks where BIND is integrated with Samba, as well as in mixed-server environments that combine BIND servers with Active Directory domain controllers," the advisory reads. "For servers that meet these conditions, the ISC SPNEGO implementation is vulnerable to various attacks, depending on the CPU architecture for which BIND was built."

The second security flaw, CVE-2021-25215, has earned a CVSS score of 7.5. CVE-2021-25215 is a remotely-exploitable flaw found in the way DNAME records are processed and may cause process crashes due to failed assertions.

The least dangerous bug, tracked as CVE-2021-25214, has been issued a CVSS score of 6.5. This issue was found in incremental zone transfers (IXFR) and if a named server receives a malformed IXFR, this causes the named process to crash due to a failed assertion.

The ISC is not aware of any active exploits for any of the bugs.

Vulnerabilities in BIND are treated seriously as it can take just one bug, successfully exploited, to cause widespread disruption to services.

"Most of the vulnerabilities discovered in BIND 9 are ways to trigger INSIST or ASSERT failures, which cause BIND to exit," the ISC says. "When an external user can reliably cause the BIND process to exit, that is a very effective denial of service (DoS) attack. Nanny scripts can restart BIND 9, but in some cases, it may take hours to reload, and the server is vulnerable to being shut down again."

Subscribers are notified of security flaws ahead of public disclosure, and if patches have not been applied for the latest trio of vulnerabilities, fixes should be issued as quickly as possible.

BIND 9.11.31, 9.16.15, and 9.17.12 all contain patches and the appropriate update should be applied.

CISA has also issued an alert on the security issues.

In other security news this week, Microsoft has disclosed bad memory allocation operations in code used in Internet of Things (IoT) and industrial technologies, with a range of vulnerabilities classified under the name "BadAlloc". Microsoft is working with the US Department of Homeland Security (DHS) to alert impacted vendors.

Have a tip? Get in touch securely via WhatsApp | Signal at +447713 025 499, or over at Keybase: charlie0

Follow this link:
ISC urges updates of DNS servers to wipe out new BIND vulnerabilities - ZDNet

Read More..

Dedicated core network is the cornerstone of secure IoT – Ericsson

A proprietary network created specifically for IoT use can not only facilitate the management of a plethora of connected devices, but also provide a sound basis for protecting traffic.

The number of IoT (Internet of Things) connections will rise to 5.9 billion by 2026, representing a growth of about three and a half times from 1.7 billion counted last year. Protecting this enormous pool of online devices is already extremely important, but as it grows, it will become increasingly critical. With the IoT Accelerator solution, abbreviated as IoTA, Ericsson paves the way for a brisky and safe offer on the IoT landscape. For large enterprise customers and telecommunications companies, the solution offers a dedicated IoT network as a service i.e., as part of the "as-a-service business model which includes a number of additional services and functions that are available on demand, from telematics and subscription management to the management of vehicles with online connectivity.

IoTA also offers extensive eSIM support to manage IoT fleets as flexibly as possible. There are currently a total of about 80 million traditional SIMs and eSIMs connected to the IoTA network worldwide, covering more than seven thousand large enterprise customers and more than 35 telecommunications providers - in more than 100 countries.

The reliability of the protection is already well illustrated by the user base; IoTA also supports public customers, and in their case the platform is considered a Critical National Infrastructure (CNI), so it is subject to extremely strict regulations. In addition to GDPR compliance that is a fundamental requirement in the EU, such regulations include, for example, the NCSC (National Cyber Security Center) guidelines in the UK and a series of country-specific, detailed specifications that are regularly checked by customers through random audits.

This is understandable, as there are many IoT projects that handle extremely sensitive data it is enough to think about the fleet management of vehicles with online connectivity or even information from health sensors. In developing and operating IoTA, Ericsson therefore pays special attention to security - the system eliminates, among other things, the top ten security risks identified by the global Open Web Application Security Project (OWASP) which specializes in software security.

Ericsson's customers who actively use IoTA include Sony, specifically its Soy Network Communications Europe division, which uses it to lay the foundations for various mobile IoT platforms such as Visilion or mSafety. Visilion is an advanced tracking solution used in the logistics and healthcare segments that provides real-time location data based on a variety of sensors in applications covering shipped goods, various values, or even people. mSafety is an eSIM-enabled, wearable device-based platform with a cloud-based backend. The latter can be connected to devices either on an LTE or on an NB-IoT network to transmit various measured health data. The two systems can used to implement services such as SafeTrx, which monitors the location of people doing sports in the open, such as surfers, and notifies the appropriate authorities in an emergency.

For similar applications, both adequate network protection and reliable, stable operation are essential, which Ericsson is willing to provide to its partners who can connect to the company's core network and use all the modular services available on it. These include subscription management or user administration, but they can also take advantage of APIs provided through Ericssons developer portal to develop applications for the platform themselves, which is also protected by a multi-layered authentication solution with role-based access control.

In addition, the integration of Ericsson Security Manager is already in progress on the IoTA platform the company's well-proven bastion will also offer extensive security features, with real-time, automated network protection supported by risk-based security policies and artificial intelligence.

The artificial intelligence-based protection builds on behavioral analytics it monitors homogeneous groups of devices, learns the usual characteristics of the group, and alerts you when a device exhibits behavior that is significantly different from its group. For example, if the system detects more unidirectional traffic than is usual in your environment, it can alert operators to a potential DoS attack. The development of such and similar services is now possible in Hungary as well, as Ericsson's Budapest team has also been participating in the international cooperation since the end of last year. The local team is constantly expanding, and is set to play an increasingly strategic role in the IoTA organization in the coming years.

Check out our open positions: ericsson.hu/jobs

Go here to see the original:
Dedicated core network is the cornerstone of secure IoT - Ericsson

Read More..

The U.S. Should Make Leverage the Foundation of Its Cyber Strategy – Council on Foreign Relations

Justin Sherman (@jshermcyber) is a fellow at the Atlantic Councils Cyber Statecraft Initiative. Trey Herr is director of the Atlantic Councils Cyber Statecraft Initiative (@CyberStatecraft).

The SolarWinds incident spurred a flurry of debates about whether the U.S. Department of Defenses 2018 defend forward strategy should, or could, have prevented the calamity. Putting aside that the Russian operation was cyber espionagestealing data rather than denying, disrupting, degrading, or destroying systemssome of these arguments reflected an idea that the United States should defend forward or persistently engage everywhere, all the time.

More on:

Cybersecurity

Digital Policy

However, this idea is not only unrealistic, with resource constraints (in personnel, target information, access to adversary networks, organizational capacity, etc.) limiting the collective reach of U.S. cyber operations at any given time; it also ignores the concept of points of leverage in the broader internet ecosystem.

Net Politics

CFR experts investigate the impact of information and communication technologies on security, privacy, and international affairs.2-4 times weekly.

Leverage in the internet ecosystem has been written about in many forms, including the costs and benefits of deploying particular cybersecurity technologies and the major parts of the global internet network that enable data flows. Yet discourse on persistent engagement that seems to suggest a constant engagement on all parts of the network ignores the very idea of leverage that should be the foundation for the conversation itselfunderstanding how defensive and offensive actions can shift points of leverage on the internet.

The New York Cyber Task Forces 2017 report discusses the idea of leverage, for instance, in a somewhat productized sense vis--vis software and internet security. Cybersecuritys most successful innovations, they wrote, have provided leverage in that they operate on an internet-wide scale and impose the highest costs (roughly measured in both dollars and effort) on attackers with the least cost to defenders. Encryption, automatic software updates, and secure-by-design software were just three examples provided by the task force. The cost-benefit of their deployment favors the defender.

A new report from the Atlantic Council on lessons from the Sunburst campaign likewise argues that government and industry should embrace an idea of persistent flow in cybersecurity, emphasizing that effective cybersecurity is more about speed, agility, and concentrated action than trying to do everything, everywhere, all at once. This concentration is necessary because just as there are cybersecurity technologies that give leverage to a defender, some vectors of compromise give disproportionate leverage to attackers.

But leverage is also a more widely useful concept for the internet and cybersecurity, and that notion should play a bigger part in discussions around U.S. cyber strategy. Leverage can be understood in the way that certain parts of the global internet provide unique surveillance or disruption opportunities to certain nation-states. Henry Farrell and Abraham Newman write in their 2019 article Weaponized Interdependence [PDF] about panopticons in networks, which states can use to gather strategically valuable information, and chokepoints in networks, which provide opportunities to deny network access to adversaries. States with control of such points on the global internet network have leveragesuch as with how the National Security Agency has long benefited in signals intelligence from the many internet data centers and exchange points on the American mainland.

More on:

Cybersecurity

Digital Policy

Similarly, points in the global internet architecture can serve as places of leverage for nation-states looking to secure them or exploit their vulnerabilities. Data routing security is one such example. The Domain Name System, the internets phone book for addressing traffic, and the Border Gateway Protocol, the internets GPS for routing traffic, were both designed with a preference for speed and reliability over security. Both systems are crucial to the global internets very function and yet remain fundamentally insecurevulnerable to outright manipulation. They are also both areas where small changes would yield massive gains in cybersecurity, underscoring that, as we previously argued, one of the best ways to approach a U.S. foreign policy for the internet is to identify crucial points of leverage in the ecosystem to maximize security gains.

This raises the distinction between chokepoints and leverage, however, where leverage provides highly scalable effects on cybersecurity (i.e., small inputs yielding outsized change across a system or ecosystem) and imposes significant costs for comparatively small input. Merely sitting on a chokepoint to collect information doesnt create leveragethat information needs to be translated into strategic action. Information sharing about threats, absent a strong model for interagency collaboration and a specific desired end state, is not enough. Points of leverage on the internet can shift at varying speeds, whether from defensive and offensive cyber actions or physical alterations to the internets topology. U.S. cyber strategy should therefore emphasize that steps within the cyber domain to exploit or protect those points of leverage do more than alter the position of each actor involvedthey also alter the cyber environment itself.

Digital and Cyberspace Update

Digital and Cyberspace Policy program updates on cybersecurity, digital trade, internet governance, and online privacy.Bimonthly.

The Sunburst campaign provides myriad reasons for the U.S. government and industry to reassess their policies and practices on the likes of both cloud and supply chain security[PDF]. Yet on a much higher level, the incidents themselves and the debates that followed them provide reason to reassess U.S. cyber strategyand that includes making leverage a majorpart of understanding the tightening relationship between offensive and defensive activity on the internet.

Read the rest here:
The U.S. Should Make Leverage the Foundation of Its Cyber Strategy - Council on Foreign Relations

Read More..