Page 2,994«..1020..2,9932,9942,9952,996..3,0003,010..»

Watering hole campaign described. WeTransfer phishing. EtterSilent used to build maldocs. Updates on the old Facebook breach. – The CyberWire

Lumen Technologies' Black Lotus Labs this morning announced their discovery of a watering hole campaign that compromised a number of Ukrainian websites and at least one Canadian site. The campaign affected a range of sectors including manufacturing, oil, media, sport, and investment banking. The unidentified attackers used malicious JavaScript on the sites to induce the victims to send their New Technology LAN Manager (NTLM) hashes to an attacker-controlled server via Server Message Block (SMB) protocol.

Avanan reports that a phishing campaign has been active, in some cases successfully, against users of WeTransfer, another popular file transfer app. The attackers are phishing, as one might expect, for user credentials, and their phishbait is a bogus message telling recipients, "You have received some files."

Elsewhere in the criminal-to-criminal souks, Intel471 has been observing EtterSilent, a tool for building malicious documents that's achieving significant marketshare. EtterSilent, first available on Russophone hacking fora, typically creates a bogus DocuSign template. It's been used to spread Trickbot, the Bazar loader, and three banking Trojans: BokBot, Gozi ISFB and QBot.

The big, and old, Facebook breach remains in the news. Business News points out that Mr. Zuckerberg himself was among the five-hundred-thirty-three-million users affected.Ireland's Data Protection Commission has, the BBC reports, opened an investigation into the incident. The Commission is looking into whether the data recently made freely available are in fact identical to those compromised in 2019. So far the Commission says the data seem to be from the older leak, as Facebook has maintained.

Read more:
Watering hole campaign described. WeTransfer phishing. EtterSilent used to build maldocs. Updates on the old Facebook breach. - The CyberWire

Read More..

What you need to know about the deep and dark web – Security Magazine

What you need to know about the deep and dark web | 2021-04-05 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website Uses CookiesBy closing this message or continuing to use our site, you agree to our cookie policy. Learn MoreThis website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more.

See the original post:
What you need to know about the deep and dark web - Security Magazine

Read More..

Internet Security Market 2021 Will Reflect Significant Growth in Future with Size, Share, Growth, and Key Companies Analysis- HPE, IBM, Intel,…

DataIntelo published a detailed report on Global Internet Security Market for the clients that wants to explore new market avenues, get in-depth insights on the market products, maximize their revenue, and review the strategies implemented by prominent players in the market.

Key Players of the Internet Security Market

HPEIBMIntelSymantecAlienVaultBlackStratusCheck Point Software TechnologiesCiscoCyrenFortinetF-SecureGemaltoKaspersky LabMicrosoftPalo Alto NetworksRSASophosTrend MicroTrustwave HoldingsWurldtech Security Technologies

Get Sample of the Internet Security Report https://dataintelo.com/request-sample/?reportId=90352

Major Highlights of the Internet Security Market Report

The research team at DataIntelo has proximately monitored the market since 2017. During the time, the team has covered the factors that are expected to boost the market performance and impede the growth of the market during the forecast period, 2020-2027. Additionally, it has enlisted the challenges faced by key market players, new entrants, and emerging players in the market.

What is Covered in the Chapter of Impact of COVID-19 Pandemic?

The coronavirus pandemic has disrupted the market dynamics, as it had imposed the restriction on the opening of offices and manufacturing facilities. This, in turn, has persuaded employees to work from home and halted the production of goods across the globe. Moreover, it had increased the gap between demand and supply owing to the restricted trade affairs around the world. However, it has created lucrative opportunities for the key players in certain regions.

The COVID-19 chapter of Internet Security Market includes:

What is Covered in The Segmentation Part of The Internet Security Report?

Products

Malicious softwareDenial-of-service attacksPhishingApplication vulnerabilities

Applications

GovernmentBanking, financial services, and insurance (BFSI)ManufacturingInformation communication and technology (ICT)RetailHealthcare

Regions

Note: Can add country of your choice in the report at no extra cost.

The segmentation part of the report covers:

This segmentation provides the esteemed reader with the comprehensive regional analysis, which includes if the region/country has a potential worth of investment. This analysis is prepared by considering the socio-economic development and government regulations & policies of the country.

Buy the Complete Report https://dataintelo.com/checkout/?reportId=90352

Note: Additional company names can be added in the list.

The report covers the major players of the market and provides information about their product portfolio and strategies deploying regarding the market. This market report includes technological advancements of products by the key players. It lays out the information on collaborations, partnerships, mergers, and agreements carried out by industry players over the years in the market. Furthermore, it covers the factors that have created opportunities and challenges for them.

7 Reasons to Buy Report from DataIntelo

Below is the TOC of the report:

Executive Summary

Assumptions and Acronyms Used

Research Methodology

Internet Security Market Overview

Global Internet Security Market Analysis and Forecast by Type

Global Internet Security Market Analysis and Forecast by Application

Global Internet Security Market Analysis and Forecast by Sales Channel

Global Internet Security Market Analysis and Forecast by Region

North America Internet Security Market Analysis and Forecast

Latin America Internet Security Market Analysis and Forecast

Europe Internet Security Market Analysis and Forecast

Asia Pacific Internet Security Market Analysis and Forecast

Asia Pacific Internet Security Market Size and Volume Forecast by Application

Middle East & Africa Internet Security Market Analysis and Forecast

Competition Landscape

If you have any inquiry of the report, connect with our analyst @ https://dataintelo.com/enquiry-before-buying/?reportId=90352

About DataIntelo

DataIntelo has extensive experience in the creation of tailored market research reports in several industry verticals. We cover in-depth market analysis which includes producing creative business strategies for the new entrants and the emerging players of the market. We take care that our every report goes through intensive primary, secondary research, interviews, and consumer surveys. Our company provides market threat analysis, market opportunity analysis, and deep insights into the current and market scenario.

To provide the utmost quality of the report, we invest in analysts that hold stellar experience in the business domain and have excellent analytical and communication skills. Our dedicated team goes through quarterly training which helps them to acknowledge the latest industry practices and to serve the clients with the foremost consumer experience.

Contact Info:

Name: Alex Mathews

Address: 500 East E Street, Ontario,

CA 91764, United States.

Phone No: USA: +1 909 414 1393

Email:[emailprotected]

Website:https://dataintelo.com

Follow this link:
Internet Security Market 2021 Will Reflect Significant Growth in Future with Size, Share, Growth, and Key Companies Analysis- HPE, IBM, Intel,...

Read More..

Utah is the 2nd State to Create a Safe Harbor for Companies Facing Data Breach Litigation – Lexology

In mid-March, Utah Governor Spencer Cox signed into law the Cybersecurity Affirmative Defense Act (HB80) (the Act), an amendment to Utahs data breach notification law, creating several affirmative defenses for persons (defined below) facing a cause of action arising out of a breach of system security, and establishing the requirements for asserting such a defense.

In short, the Act seeks to incentivize individuals, associations, corporations, and other entities (persons) to maintain reasonable safeguards to protect personal information by providing an affirmative defense in litigation flowing from a data breach. More specifically, a person that creates, maintains, and reasonably complies with a written cybersecurity program that is in place at the time of the breach will be able to take advantage of an affirmative defense to certain claims under the Act:

The written cybersecurity programs must satisfy several requirements to warrant the Acts protection. In part, such programs must provide administrative, technical, and physical safeguards to protect personal information. These safeguards include:

Reasonably conforming to a recognized cybersecurity framework generally means (i) being designed to protect the type of information involved in the breach of system security, and (ii) either (I) constituting a reasonable security program as described in the Act; (II) reasonably conforming to an enumerated security framework, such as the NIST special publication 800-171 or the Center for Internet Security Critical Security Controls for Effective Cyber Defense; or (III) reasonably complying with the federal or state regulations applicable to the personal information obtained in the breach of system security (e.g., complying with HIPAA when protected health information is breached).

A person may not claim an affirmative defense, however, if:

Utah is the second state to establish an affirmative defense to claims arising from a data breach. Back in 2018, Ohio enacted the Ohio Data Protection Act (SB 220), similarly providing a safe harbor for businesses implementing and maintaining reasonable cybersecurity controls.

This affirmative defense model established by both Utah and Ohio is a win for both companies and consumers, as it incentivizes heightened protection of personal data, while providing a safe harbor from certain claims for companies facing data breach litigation. It would not be surprising to see other states take a similar approach. Most recently, the Connecticut General Assembly reviewed HB 6607, An Act Incentivizing the Adoption of Cybersecurity Standards for Businesses, which provides for a similar safe harbor as in Utah and Ohio. Creating, maintaining, and complying with a robust data protection program is a critical risk management and legal compliance step, and one that might provide protection from litigation following a data breach.

Read more:
Utah is the 2nd State to Create a Safe Harbor for Companies Facing Data Breach Litigation - Lexology

Read More..

Unpatched SAP applications are target-rich ground for hackers – ComputerWeekly.com

Hackers are targeting unpatched vulnerabilities in SAP applications, according to areport issued bySAP and cyber threat research company Onapsis.

The report detailed more than 300 successful exploitations of critical vulnerabilities previously patched by SAP through 1,500 attack attempts between June 2020 and March 2021.

It also highlighted that the time window for defenders to act was significantly smaller than previously thought, with examples of SAP vulnerabilities being weaponised in less than 72 hours after the release of patches and new unprotected SAP applications provisioned in cloud (IaaS) environments being discovered and compromised in less than three hours.

The report noted that 18 of the worlds 20 major vaccine producers run their production on SAP, 19 of 28 Nato countries run SAP, and 77% of the worlds transaction revenue touches an SAP system.

A spokesperson for Onapsis said this was the first time SAP had issued an official pressrelease about cyber threats affecting its customers. Onapsis is a security and compliance monitoring software company as well as a security research firm.

The release said both companies had worked in close partnership withtheUS Department of Homeland Security (DHS), the Cybersecurity and Infrastructure Security Agency (CISA) and Germanys Federal Cybersecurity Authority (BSI), advising organisations to take immediate action to apply long-available SAP patches and secure configurations, and perform compromise assessments on critical environments.

The two declared themselves unaware of known customer breaches directly related to this research. The report also did not describe any new vulnerabilities in SAP cloud software as a service or SAPs own corporate IT infrastructure. Both companies, however, noted that many organisations still had not applied relevant mitigations that have long been provided by SAP.

Were releasing the research Onapsis has shared with SAP as part of our commitment to helping our customers ensure their mission-critical applications are protected Tim McKnight, SAP

Were releasing the research Onapsis has shared with SAP as part of our commitment to helping our customers ensure their mission-critical applications are protected, saidTim McKnight, chief security officer at SAP. This includes applying available patches, thoroughly reviewing the security configuration of theirSAPenvironmentsand proactively assessing them for signs of compromise.

Onapsis CEO and co-founderMariano Nunez said the critical findings noted in its report described attacks on vulnerabilities for which patches and secure configuration guidelines had been available for months or even years.

Unfortunately, too many organisations still operate with a major governance gap in terms of the cyber security and compliance of their mission-critical applications, allowing external and internal threat actors to access, exfiltrate and gain full control of their most sensitive and regulated information and processes, he said. Companies that have not prioritised rapid mitigation for these known risks should consider their systems compromised and take immediate and appropriate action.

In the reports foreword, Nunez said: The evidence captured in this report clearly shows that threat actors have the motivation, means and expertise to identify and exploit unprotected mission-critical SAP applications, and are actively doing so. They are directly targeting these applications, including, but not limited to, enterprise resource planning (ERP), supply chain management (SCM), human capital management (HCM), product lifecycle management (PLM), customer relationship management (CRM) and others.

Business applications have been known for some time to be the soft underbelly of many corporate organisations, beyond perimeter security. Nunez, in the foreword, also said: Cloud and internet-exposed mission-critical applications that help foster new processes and business opportunities also increase the attack surface that cyber actors are now targeting.

The release stated that none of the vulnerabilities were present in cloud solutions maintained by SAP.

The DHS CISA has also issued an alert about the potential targeting of critical SAP applications.

Go here to see the original:
Unpatched SAP applications are target-rich ground for hackers - ComputerWeekly.com

Read More..

Bringing China-US ties where they need to be – Chinadaily.com.cn – China Daily

Editor's Note: Thomas L. Friedman, author, political commentator and weekly columnist for The New York Times, and Wang Huiyao, president of the Center for China and Globalization, discussed online the future of globalization and China-US relations on March 29. Following are excerpts from their conversation:

Wang: How do we view the new trend of globalization?

Friedman: So, the world today, actually, is flatter than ever. We have never connected more different nodes than we have today.

The world isn't just flat now. It's fragile. It's fragile because when you connect so many nodes, and then you speed up the connection between those nodes and you take the buffers out, you get fragility.

Wang: I think globalization is accelerating to some extent, thanks to technology. But the flow of capital and goods, and the flow of talents all have actually become faster and more voluminous than before. What do you think about the future trend?

Friedman: The world is fast, fused, deep and open.

When I say the world is fast now, what I mean is that there's been a change in the pace of change.

Second, the world isn't just flat now, it's fused. We're not just interconnected, we're now interdependent. We're fused by technology and by climate.

Third, the world's gotten deep. Deep is the most important word of this era. Because what we've done now is that we (have) put sensors everywhere. Now our knowledge of that is deep. It's very deep. That's why this word deep. We had to coin a new adjectivedeep state, deep mind, deep medicine, deep research, deep faketo describe the fact that this is going deep inside of me. I can sit here right now in Washington and look at publicly available satellite pictures of different parts of China from Google Earth, from the European space satellite.

And lastly, it's getting radically open. With this, every citizen is now a paparazzo, a filmmaker, a journalist, a publisher, with no editor and no filter.

So the world is getting fast, fused, deep and open. That is the central governing challenge today.

How do you govern the world that is that fast, fused, deep and open? That is our challenge.

Wang: With the world changing fast, the system that we've built is based on the Bretton Woods system after the Second World War. So are we equipped enough to cope with all those new challenges?

I'm glad to see President (Joe) Biden sign the order for the US to return to the Paris climate agreement. As you actually interviewed President Biden before he took office, what do you think about these new buffers that we're trying to build? Are we losing that, because global governance is falling behind now?

Friedman: When the world gets this fast, fused, deep and open, the only way we can govern it effectively is with global complex adaptive coalitions. We cannot manage climate change unless America, China and Europe, in particular, India, and Japan and (the Republic of) Korea, the big economies are all working together.

The problem is the need of complex adaptive coalitions. Governments are becoming more nationalistic.

And even inside countries, companies and political parties are becoming more tribal, right when they need to be more open and collaborative, so the world is fighting with this trend.

Wang: Yes, you're right. I think that it looks like global governance is really lagging behind global practice or globalization.

Friedman: But the problem is that there's a whole set of issues now that can only be managed effectively with global governancecyber, financial flows, trade, climate, labor flowsthey require global governance, but there's no global government.

When the US and China, the two biggest economies start fighting in the middle, the situation gets even worse, basically.

Wang: China joined the World Trade Organization 20 years ago and its GDP has grown by 10 to 12 times. China has been able to prosper as it embraced globalization and lifted 800 million people out of poverty. But sometimes, China is blamed for a lot of things by Western countries.

Could it be that every country has its own problems, and China has to tackle its own problems? Particularly, in the (Donald) Trump era, during which he blamed everything on China for the widening gap when China actually managed to lift 800 million people out of poverty. Maybe, we need to have some sort of global consensus, or have some global new narratives.

Friedman: I think the four decades of US-China relations from 1979 to 2019 will go down as an epoch in US-China relations. Unfortunately, that epoch is over. What was that epoch about? That epoch was a period of what I call unconscious integration, unconscious, not because we weren't thinking about it, but because it was so easy.

For most of those 30-40 years, China sold us mostly shallow goods, clothes we wore on our shoulders, shoes we wore on our feet, solar panels we put on our roof. I call those shallow goods. We sold China deep goods, things like computers, software, things that went inside CCG, right in your officeAmerican computers, software, when you were just selling us shallow goods, we didn't care about your political system.

But if you want to sell me deep goods, if you want Huawei to answer my phonesuddenly, the difference in values matters.

That's where the absence of shared trust between our two countries now really matters. Now, we're having a clash on values in a way we didn't during that 40 years' effort. And that is going to be a problem, because our difference in values is really now making it very, very complicated and because China is wealthier now and more powerful. It's also able to assert itself and its values at home and abroad, more powerfully.

And so, we have a lot of work to do. The big question is, can we get back to a joint project, a shared project? Because the relative peace and prosperity of the world for those 40 years1979-2019which was the relative peace and prosperity of the world, at the core, was China-US relations. If we rip that apart, the world will not be as prosperous, and it will not be as peaceful.

When it's getting fast, fused, deep and open, it won't be governed the way it needs to be. So we need to have some very deep conversations.

Wang: You are right, we have to look at values but we also should have some new narrative, because I think what China has been doing for the last 40 years, including opening-up, has transformed it beyond recognition.

Particularly this year, the government has announced they have lifted 800 million people out of poverty and they have completed the 13th Five-Year Plan (2016-20) and the first Centennial Plan and they're now launching the 14th Five-Year Plan (2021-25) and also by 2035 China is hopefully going to double its GDP.

So the success of China is not really based on a purely traditional, old and orthodox system, as some Americans understand it. With a system that now combines technology, democracy, market, economy and meritocracy, China is delivering well on its performance.

As Deng Xiaoping said, it doesn't matter if it's a white cat or a black cat, as long as it can catch mice. So if China can lift 800 million people out of poverty, and also keep the COVID-19 toll very low, that's probably the biggest human rights achievement in such a situation.

And maybe we should be a little bit more tolerant of different systems. Like President Biden said, we have competition, even fierce competition, but we can cooperate as well. And as Chinese (State Councilor and) Foreign Minister Wang Yi said at the annual National People's Congress session, for the first time we can have peaceful competition and cooperation. Thus, let's not have another Cold War and a lot of people in China think there's a lot of catch-up to do with each other.

Friedman: The two of us can destroy each other, we can destroy the global economy, we can destroy the global climate. So we are doomed to work together. What bothers me right now is that we're not having the kind of frank but respectful dialogue that we need to. And then walking away from that dialogue with a to-do list.

The 40 years from 1979 to 2019 will be seen as a golden era of global relative prosperity and peace. And the core of it was the US and China. If you rip out that corner, the world will have a bad year, year after year, if we don't find a way for us and China to work together.

Wang: Yes I think as the two largest economies in the world, we have a moral responsibility and duty now to really work together. I agree with you, so journalism should resume, so should the US consulate, and we should intensify the exchanges. China has about 400,000 students in the US and the US has only about 10,000 in ChinaI hope that we can attract more US students to China.

You also mentioned decoupling; I think it's very hard to decouple. When you talked about Huawei, maybe you were saying that we should really let it experiment in the US so as to build trust. Like you said, trust building between us should be given a new start during the Biden administration.

Friedman: I feel very strongly about that because if we go to a tech Cold War, I believe that will be not bad for the world (only) but bad for America (as well). I think the best thing in the world is mutual interdependence. I want China (to be) dependent on Intel chips and I'm totally comfortable if America is dependent on Chinese supply chains. I think the more interdependent we become, the more the politics will follow.

Countries move at different pace, like three steps forward and half (a) step back. I am confident that as China develops not just out of poverty, but also grows a middle class that wants to travel and have its students that go everywhere in the world, the trend line toward openness will continue. So we should have a little confidence in that, too. I think the more we integrate, the more that will happen. But we do have this core trust problem.

There will be trade issues and questions of fairness that are very serious, which we need to address but we need to get away from the Alaska kind of meeting, away from public name calling and get down to some really hard doing on issues such as trade. That's what will actually change the dynamic in the relationship.

Wang: That's right. I saw that President Biden didn't talk about rivalry but competition at the Munich Security Conference. The US administration doesn't seek confrontation. And China always emphasizes peaceful coexistence.

As you said, both sides can do a lot of things. If we have common values such as the prosperity of the world, we can really abandon some old-style mentality and then look at the facts and focus on effectiveness and efficiency.

One of the things I noticed is that there are probably two consensuses in the US Congress. One is on China and another one on infrastructure. The US needs to renovate its infrastructure and China is the best in the world at thatthe longest fast-train network, longest bridges, 80 percent of the longest bridges have been built in China. So maybe the US and China can collaborate.

Maybe, we can elevate the Asian Infrastructure Investment Bank, the AIIB, to the World Infrastructure Investment Bank, which the US and Japan can join, the only two major economies that are still not there. So that's something we can collaborate on.

After 75 years of the UN and after the COVID-19 pandemic, we can have a new addition to global governance. A new mechanism that can secure peace and security, rather than no governance and everybody fighting, and then we'd be really on the brink of a war.

Graham Allison is right, we will face huge mutual destruction if we are not very careful.

So how can we improve relations? I think that opinion leaders like you are great. There's a little bit of cultural difference rather than ideological difference, and we probably need to be more careful when we see the differences.

Friedman: China has a formula for success. We had a formula for success, but we've gotten away from our formula for success. If we are the most dynamic, attractive, compelling economy and society in the world, to me, that's the best policy because people would look at us and say, "we want more of that".

Wang: You're absolutely right. The US and China, as the two largest economies in the world, have to work together. Let's have peaceful competition rather than confrontation and rivalry. We have our differences but let's build a more transparent system with rules in terms of competition.

Friedman: You only get one chance to make a second impression. Not the first impressionyou only have one chance to make a second impression. China and America really need to make a second impression on each other right now. We both need to give each other a new look, a second look. I think that will only happen if we each do something a little hard.

Wang: There is a better way to tell the story of China. And I was glad to see Secretary (of State Antony) Blinken saying that the US now no longer needs to topple any foreign governments. There is more peaceful coexistence now, and China and the US need each other to maintain global stability.

Friedman: I think what happened in Alaska was a necessary throat clearing for both sides. And Joe Biden is a stable president, he is not like Trump. He's a partner for a serious dialogue and I'm still hopeful that both sides have kind of got everything off their chest so that they can sit down and have the kind of dialogue that you and I are having which is honest, frank and respectful but also where we actually agreed to do something and bring the relationship where it needs to be.

The views don't necessarily represent those of China Daily.

Read more from the original source:
Bringing China-US ties where they need to be - Chinadaily.com.cn - China Daily

Read More..

Deep in the heart of the Texas Butterfly Ranch – The Picayune

A monarch butterfly lays eggs on an orange butterfly weed, a native plant common to Central Texas. Although it is sometimes called orange milkweed, it does not produce a milky sap like milkweed. iStock image

The Texas Butterfly Ranch is more a state of mind than a place, although it is a location, both online and on the ground in Central Texas. No, there is no mailing address, at least not for snail mail, and you cannot drive up to a building or walk through an office door. To find it online, visit texasbutterflyranch.com.

To find the physical location, step outside anywhere around the Highland Lakes, San Antonio, and Austin in the spring or fall and look for the millions of butterflies migrating through the so-called Texas Funnel. Thats the Butterfly Ranch: the Central Texas Hill Country.

Central Texas serves as a funnel to several migration flyways that come in from the north. When the butterflies are heading south in the fall, they come from across the United States and Canada, heading for the heart of Texas on their way to Mexico. In the spring, they head back the same way.

Monarchs are the only butterfly to make a two-way migration, which is the norm for birds. They are able to overwinter as larvae, pupae, or even adults. They use environmental clues to know when its time to pack up and leave.

It can take up to five generations of butterflies to make the entire 3,000-mile trip when the insects are flying north for summer. The trip south in the fall is a different story.

The monarchs that head south to Mexico for the winter are known as a super generation. They can fly up to 50 miles a day, catching free rides on thermal air currents a mile above the Earths surface. These insects live eight times longer up to eight months than the generation that flew south before them. They can also travel 10 times farther.

The super generation store fat in their caterpillar and butterfly stages, waiting until spring to lay up to 700 eggs.

Both migrations are timed to optimal conditions so that milkweed is in season along the way on which to feed and lay eggs. Milkweed serves as a nursery for monarchs. They lay their eggs on the leaves, which the larvae then eat when they hatch.

The spring migration begins in Mexico with the super generation laying the eggs for Generation 1. When the first generation takes flight, it heads for Central Texas, which is the first stop on the trip north. This is where Generation 1 typically lays its own eggs and Generation 2 is born to continue the trip north.

Each year, the Texas Butterfly Ranch celebrates the bi-annual migration with a butterfly festival, which happens any and everywhere and supports conservation efforts to help stop the declining butterfly population. The virtual events are usually held in the fall.

The festival includes online shopping opportunities for native plants loved by butterflies and virtual workshops in tracking and identifying pollinators in your own environment.

The Texas Butterfly Ranch is located at texasbutterflyranch.com and in the hearts, minds, and backyards of nature lovers deep in the heart of Texas.

editor@thepicayune.com

Find more articles like this in 101 News

Continued here:
Deep in the heart of the Texas Butterfly Ranch - The Picayune

Read More..

Cultivating a Diverse and Inclusive Culture: Recruiting – ATD – ATD – ATD

Over the next handful of blog posts, we will examine the multiple stages of crafting a culture from the beginning of searching for talent, onboarding, and supporting the employee life cycle and growth and retention. Even while writing this Im taking a deep breath as I consider the work that goes into all of these stages, and it bears reminding that this is a journey and takes time. Like most culture work, its best to think of it in stages and over time, always keeping the bigger picture in the back of your mind while you take deeper dives annually to build upon, develop, and grow your staff, processes, and culture.

These roles are not just skill based or being a great recruiter; those who fill them must have the understanding, knowledge, and background of unconscious bias as well as the desired internal culture and the skills required. They also need to be nuanced in having challenging conversations and influence. When you have this combination, you and your teams are better set for success.

DEI no longer sits on the side but is an integrated function of all areas. This means the partnerships between HR, L&D, and DEI needs to be present and visible to assist in change and education along the way. This journey does not live in these functions alone as it needs care and attention to grow and go deep within the organization. Its pivotal to understand your role in the organization and this movement.

Start by partnering and looking at what skills are needed to do the job. While this is changing, there is still an inclination by hiring managers and others to exaggerate what is required to do the job. We must separate the need versus the want. Dig in deeper with curiosity on what the need is. What do they need to do? What are those skills and behaviors?

With this in mind, examine how and where you post and advertise for the role. If you want to diversify your candidate pool, then you need to diversify where and how you post your jobs. Seek out or expand partnership with community groups who have knowledge of candidates in underrepresented groups and areas.

With so many roles moving to remote work, this has shown you can expand your candidate pools. You can pivot and adapt. If you are committed to diversity, look at offering relocation to roles you previously didnt offer that to.

Examine the language you use in your posting. Is it inclusive? Does it support your goal to attract more diverse candidates? Ask others to examine and offer insight. Above all, stay open and build a curiosity mindset within the hiring group.

The rest is here:
Cultivating a Diverse and Inclusive Culture: Recruiting - ATD - ATD - ATD

Read More..

‘I can’t unsee them’: Rockland woman copes with trauma from Haiti earthquake by writing – Enterprise News

ROCKLAND In the mountainous countryside of Des Cayes, Haiti, young Islande Schettini tucks herself away from the outside world.

Sitting next to a low hanging tree, overlooking a shallow river, Schettini loses herself in a fictional world of a good book, not knowing one day she'd publish a book of her own in a country far away.

The self-published author who currently lives in Rockland and previously lived in Brocktonfound writing poetry as an outlet to release the inner trauma. The poetry book "Strength in the Darkness" by Author House publishing is composed of 40 poems about love, the earthquake in Haiti, God, past heartbreaks from a divorce and the crippling nostalgia of leaving Haiti.

"I never learned how to write professionally. Sometimes I feel like I have to write to get my emotions out. I take my pen and start writing. I have these stories in my mind, the plot, the setting. I read so many books, so writing has become so natural to me," Schettini, 36, said.

Schettini fell in love with books at a young age and used them to disappear from reality. After the death of her father and other family members, she would sit somewhere far from human interaction to enjoy her newfound dimension in the spine of a good book.

On Jan. 12, 2010, Schettini's life was flipped upside down as a magnitude 7.0 earthquake ripped through her beloved country, killing three of hercousins in the process.

"Words cannot explain the images I saw during the earthquake. I cannot erase them from my mind. It was horrible. I can't unsee them," Schettini said. "I saw people injured bleeding in the streets, crushed under buildings, bodies being burned because there were so many of them, and the smell in the air, I will never forget it."

More: BSU grad faces her demons writing during COVID. And you can too at her poetry slams.

At the time of the earthquake, Schettini was living in the United States and visiting family inHaiti. She hadplanned to stay for a few weeks then return to the states, but the vacation to see her family was cut short.

Schettini took her belongings and her son, who was born in America and was 7 years old at the time, and flew back to the America, leaving her family behind. She felt guilty leaving everyone abruptly after the earthquake, especially in light of Haiti's devastation.

Schettini was fighting suicidal thoughts and survivor's remorse once she returned to America.

"I kept saying if God kept me alive, that means he has a mission for me. He kept me alive for a reason, and my mom lost her house with everything inside," Schettini said.

During the earthquake, Schettini was sleeping at her aunt's house and was woken by a frantic family member saying to evacuate the home. The aunt's house was the only structure standing on the street.

All the neighbors' houses collapsed into piles of dust and debris. It was a miracle her aunt's house was left untouched, Schettini said.

Despite the house standing, the family was anxious and worried about it collapsing at any point, so they slept outside in tents with the rest of the neighborhood, who lost everything. The transition from living in a home to be exposed to the immediate elements was difficult.

Writing became a new way to heal the depressionand PTSD Schettini was feeling during this dark time in her life, she said. In Haitian culture, depression is a taboo subject. It's not something widely talked about, according to Schettini.

"I never told anyone how I felt, and I was sinking in my deep depression. In my community in Haiti, they don't know what depression is. We don't have time to be depressed," Schettini said.

Schettini was able to power through her depression and eventually heal herself through poetry, she said.

She earned an associate's degree in psychology from Quincy College and went on to receive a bachelor's in psychology from Southern New Hampshire University.

As an elective, Schettini took a poetry course at Quincy college, andthe class assignmentwas to write 20 poems. Herprofessor was impressed by herwork and urged her to publish it.

As an immigrant, she didn't feel confident in her English due to the fact she was still learning, but the encouragement gave her an extra boost of confidence.

And in February, "Strength in the Darkness" was published.

"There's a lot of things immigrants go through, but people don't know about your struggles with English, how people treat you as an immigrant and just your overall confidence as an outsider trying to fit in," Schettini said.

Schettiniis the process of writing short stories and encourages people to follow their dreams, no matter what obstacles are in the way.

As someone new to English, publishing a poetry book in a foreign language was a distant dream that became a reality, Schettini said.

Enterprise Alisha Saint-Ciel can be reached by email at stciela@gannett.comYou can follow heron Twitter at @alishaspeakss.Support local journalism by purchasing a digital or print subscription to The Enterprise today.

Read more:
'I can't unsee them': Rockland woman copes with trauma from Haiti earthquake by writing - Enterprise News

Read More..

The Mavericks Who Brought AI to the World – Review of Genius Makers by Cade Metz – Forbes

Cover of "Genius Makers" by Cade Metz

Cade Metz has had a dream job for the last decade. He has been hanging out with the people responsible for the most important technological developments of our time. He has had a ringside seat at what may turn out to be the pivotal episode in human history.

The book he has written about it, Genius Makers is based on 400 interviews conducted over eight years for Wired and The New York Times, plus another 100 carried out specifically for the book. Many of the people he has interviewed are larger-than-life characters, and given the egos involved and the prizes at stake, there is plenty of drama. If he isnt already in negotiations with someone over the film rights, he probably should be.

Unsurprisingly for a journalist, Metz has a breezy style that is easy and fun to read. He has collected some great anecdotes and aphorisms. If you have already been following closely the events the book describes, you might not learn much, but it will deepen your appreciation for the characters. If you havent been following the development of modern AI, then it will help you understand why there is so much fuss about it.

Many of the anecdotes are about Geoff Hinton, the British AI researcher who kept a flame burning for neural networks through many dark years, and Metz opens and closes his story with him. Hinton is an eccentric, clever, and complicated man: his response to an email asking whether he preferred to be called Geoffrey or Geoff "was equal parts clever and endearing:

I prefer Geoffrey.

Thanks,

Geoff

Several times, the book describes the difficulties caused by the fact that for fifteen years, Hinton has been unable to sit down, due to a badly slipped disc. He can lie down, or he can stand. Hinton explains it with his characteristic laconic humour: Its been a long-standing problem.

Most of the people in this book are very clever indeed, and they like to display it in their humour. Googles senior engineer Jeff Dean is revered for his ability to wrangle large computer systems; Googlers say that the speed of light in a vacuum used to be 35mph, until Jeff Dean spent a weekend optimising physics. They quip that Deans PIN code is easy to hack in theory. It is the last four digits of Pi.

The book isnt organised this way, but Metz describes five phases in the rise of deep learning, which has brought AI to such prominent public attention. In the first phase, Marvin Minsky kills the neural net idea pioneered by Frank Rosenblatt. Minsky is something of a villain in this narrative. The second phase is Hintons Long March. The Chinese Communists only had to march for a year; poor Geoff Hinton had to keep his faith alive for three decades.

He was finally vindicated in the third phase, the AI Big Bang of 2012, when he and his students won the ImageNet competition for image recognition, which led to Google paying $44m for his company in a bidding war against Microsoft and Baidu. Even this was small beer compared with the $650m that Google then paid for DeepMind, a company with 50 employees and no revenues.

The fourth phase was the disappointment and disarray which set in over fake news, and bias in decision-making algorithms. This confusion was lifted slightly in the fifth phase by the arrival of BERT, which stands for bi-directional encoded transformers, a type of natural language processing AI which has produced astonishing results in translation, search, and prose composition.

It is slightly disappointing that Metz doesnt try harder to explain how these technologies actually work. He echoes Richard Feynmans comment that if he could explain the work that won him the Nobel Prize to a layperson, then it wouldnt have been worth the Prize. But Feynman also said that if you cant explain something in simple terms, then you havent really understood it.

Another quibble is that Metz never gives his own assessment of how far AI has really advanced. There is a fierce debate in AI circles about whether the technology has made genuine progress, or whether it is mostly hype. Some think artificial general intelligence is near, while others say that todays systems show no sign of intelligence at all. Some of this boils down to people using different definitions of intelligence, but the answer is hugely significant. There is also resentment on the part of people who have been using the same tools for decades at being told there is a new kid on the block, just because the compute power available is vastly increased, and there is also a great deal more data. It would have been interesting to hear Metzs thoughts on this.

But the book is undeniably charming, and part of that charm is that Metz greatly likes and admires many of his characters. The elegiac final chapter featuring Hinton is genuinely moving. There are also characters about whom Metz is not so sure. Gary Marcus, the contrarian who continually denigrates the achievements of AI systems, is a lovable narcissist, and Metz seems none too keen on Google chairman Eric Schmidt, whom he describes as addressing his audience as he always didas if he knew more than anyone else in the room. He also seems ambivalent about Facebooks Mark Zuckerberg, who has an almost robotic demeanour, blinking his eyes unusually often and, from time to time, making an unconscious clicking sound at the back of his throat that seems like some sort of glitch in the machine.

The reader is left with an intriguing comparison between the worlds two most significant AI labs. Both of them have the avowed goal of creating artificial general intelligence. Both of them think this development is inevitable, and that it should be an overwhelmingly beneficial outcome for humanity. They differ about the timescale - but not by all that much, in the scheme of things. DeepMinds CEO Demis Hassabis thinks AGI might arrive by the end of this century. OpenAIs CEO Sam Altman thinks it will arrive much sooner, maybe within a couple of decades. If either of them is right, we should probably all be paying a lot more attention to the implications.

Cade Metz

Go here to see the original:
The Mavericks Who Brought AI to the World - Review of Genius Makers by Cade Metz - Forbes

Read More..