Page 3,345«..1020..3,3443,3453,3463,347..3,3503,360..»

EARN IT Act a Dire Threat to Encryption, Speech Online, Critics Say – Decrypt

In brief

The controversial EARN IT Act has been watered down for its recent move to the US House of Representatives, but encryption and cryptocurrency experts are still echoing what theyve said for months: Legislation that could regulate the internet is inherently dangerous. The proposed law would erode Section 230 of the Communications Decency Act, which protects online platform providersanyone from Facebook to small website ownersfrom being held liable for what their users post.

But under the EARN IT Act, which made its way through the Senate Judiciary Committee in September and was introduced in the House last week, platforms could be sued for users content as long as the complaint is related to crimes against children, like child pornography.

The bill features a last-minute amendment guaranteeing legal protection to platforms that use end-to-end encryption, a system by which platforms cant read users messages. But experts are still wary, partly because they think website owners will bump up content surveillance to avoid pricey litigation battles in the first place, said Marta Belcher, a blockchain law expert and special counsel for the Electronic Frontier Foundation.

If you have platforms that suddenly are going to be subject to these lawsuits, they're going to have to really closely monitor and censor users, she said.

The acts original version was more stringent, and interest groups called it a thinly veiled attempt to allow law enforcement access to private content. But even with its new protections, the bills current version still has serious loopholes when it comes to encryption, Belcher said.

For instance, CDA 230 prevents states from passing laws to control the internet. But if the EARN IT Act passes, this door would then open, giving non-federal jurisdictions more regulatory leeway.

I can definitely see governments using this as a hammer to go after any service that allows any kind of encrypted communication, said Matthew Green, a cryptography professor at Johns Hopkins University and one of the developers of the protocol behind the Zcash cryptocurrency.The effects the proposed legislation would have on the cryptocurrency sphere remain murky. Some crypto networks use encryption to host user contentwhich could leave them vulnerable to lawsuits under the EARN IT Actand others dont. Either way, the bill is a direct departure from the cypherpunk ethos that created cryptocurrency, said Chris Troutner, who founded the Bitcoin Cash-powered messaging service bch-encrypt.

We need end-to-end encryption, and we need uncensorable money, Troutner said. These arent nice-to-haves. Theyre absolute requirements.

The leadership behind the EARN IT Act is also raising red flags for the crypto community. If passed, the law would create a commission that recommends ways to prevent child exploitation online. U.S. Attorney General William Barr, who favors backdoor access to encrypted data, would lead the 19-member group. In turn, the commissions recommendations could disincentivize state legislatures from upholding privacy practices, said India McKinney, director of federal affairs with the EFF.

This kind of legislation isnt new. Bipartisan efforts to bypass encryption protocols have been around for years, and the EARN IT Act is just the latest gimmick, Matthew Green said.

It is something to be worried about, even if we dont know how its going to develop, said Green.

Editor's note: This article was updated after publication to clarify that India McKinney is EFF's director of federal affairs.

Read this article:
EARN IT Act a Dire Threat to Encryption, Speech Online, Critics Say - Decrypt

Read More..

Analyzing Impacts of Covid-19 on Cloud Encryption Software Market Effects, Aftermath, Global Industry Challenges, Business Overview and Forecast To…

Global Cloud Encryption Software Market research report provides excellent vision to analysis Global as well as regional industry. This research report delivers a detailed analysis of distinguishable strategies for industrial growth that will help to determine commanding segments and know distinct factors. Scope of different segments and applications that can potentially influence the global Cloud Encryption Software market in the future has been analyzed further in the report. The report acknowledges major industry vendors, key regions, demand & supply, applications, innovations, revenue cost, and challenges. The report covers trends, restraints, and drivers that transform the global Cloud Encryption Software market in either a positive or negative manner.

The Cloud Encryption Software Market research report presents a comprehensive analysis of the market and contains thoughtful insights, facts, historical data, and statistically supported and industry-validated market data. It additionally contains projections applying a suitable set of assumptions and methodologies. The research report provides analysis and information according to market segments such as geographies, application, and industry by considering major players.

Moreover, the Cloud Encryption Software Market report clarifies the Industry segmentation based on various parameters and attributes that can be classified on geographical region, product types and market applications.

Request a sample of Cloud Encryption Software Market report @https://hongchunresearch.com/request-a-sample/84556

Key players in the global Cloud Encryption Software market covered in Chapter 4:CiphercloudBoxcryptorTrend MicroSophosPerspecsysVoltage SecuritySkycryptGoogleSafenetVaultiveHitachiPorticorViivoSymantec.HPVormetric

In Chapter 11 and 13.3, on the basis of types, the Cloud Encryption Software market from 2015 to 2026 is primarily split into:Infrastructure-as-a-ServiceSoftware-as-a-ServicePlatform-as-a-Service

In Chapter 12 and 13.4, on the basis of applications, the Cloud Encryption Software market from 2015 to 2026 covers:Banking, Financial Services, and Insurance (BFSI)HealthcareGovernment and Public UtilitiesTelecom and ITRetailAerospace and DefenseOthers (manufacturing, education, and media and entertainment)

Geographically, the detailed analysis of consumption, revenue, market share and growth rate, historic and forecast (2015-2026) of the following regions are covered in Chapter 5, 6, 7, 8, 9, 10, 13:North America (Covered in Chapter 6 and 13)United StatesCanadaMexicoEurope (Covered in Chapter 7 and 13)GermanyUKFranceItalySpainRussiaOthersAsia-Pacific (Covered in Chapter 8 and 13)ChinaJapanSouth KoreaAustraliaIndiaSoutheast AsiaOthersMiddle East and Africa (Covered in Chapter 9 and 13)Saudi ArabiaUAEEgyptNigeriaSouth AfricaOthersSouth America (Covered in Chapter 10 and 13)BrazilArgentinaColumbiaChileOthers

Access this Cloud Encryption Software Market Research Report @https://hongchunresearch.com/report/cloud-encryption-software-market-size-2020-84556

This is a very detailed market research report, the report analyzed different types of market products, downstream applications, development in various regions, as well as the development trend, the opportunities and challenges, etc. The data section covers price, revenue, production, sales, gross margin, production cost etc.

The report also focuses on developing market trends, preferred market channels and market drivers & restraints to name a few.

Major Points from Table of Contents:

Chapter One: Study Scope IntroductionMarket Definition, Study Scope, Regions Markets Covered, Types Markets Covered, Applications Markets Covered, Currency and Pricing, Stakeholders ,..

Chapter Two: Cloud Encryption Software Industry Chain AnalysisIndustry Chain Structure, Upstream Analysis, Downstream Analysis, Market Dynamics, Mergers & Acquisitions, Production Technology Development ,..

Chapter Three: Global Cloud Encryption Software Market Analysis by PlayersGlobal Consumption (Unit) and Market Share (%) by PlayersGlobal Revenue (Million USD) and Share by Players (2019-2020)Global Price (USD/Unit) by Players (2015-2020)Global Gross Margin by Players (2015-2020)

Chapter Four: Global Cloud Encryption Software Production Market Analysis by RegionsGlobal Cloud Encryption Software Production (Unit) and Market Share (%) by Regions (Market Production and Growth Rate Analysis in USA, Europe, China, Japan, India, Middle East, South America , South Africa)Global Price (USD/Unit) by Region (2015-2020)Global Production Value (Million USD) and Share by Regions (2015-2020)Global Gross Margin by Regions (2015-2020)

Chapter Five: Global Cloud Encryption Software Consumption Market Analysis by RegionsGlobal Cloud Encryption Software Consumption (Unit) Market by Regions (Market Production, Consumption, Import and Export Analysis Globally and in regions like USA, Europe, China, Japan, India, South America, South Africa)

Chapter Six: Global Cloud Encryption Software Market Analysis by Types

Chapter Seven: Global Cloud Encryption Software Market Analysis by Applications

Chapter Eight: Global Main Cloud Encryption Software Market Players Analysis

Chapter Nine: Global Cloud Encryption Software Market Forecast (2018-2023)

Chapter Ten: Cloud Encryption Software Market Research Methodology

Chapter Eleven: Cloud Encryption Software Market Research Conclusions

Make an Enquiry before buying Cloud Encryption Software Market research Report @https://hongchunresearch.com/enquiry-before-buying/84556

NOTE: Our report does take into account the impact of coronavirus pandemic and dedicates qualitative as well as quantitative sections of information within the report that emphasizes the impact of COVID-19.

As this pandemic is ongoing and leading to dynamic shifts in stocks and businesses worldwide, we take into account the current condition and forecast the market data taking into consideration the micro and macroeconomic factors that will be affected by the pandemic.

Our trending Report Links:Oleophilic Material Market Size 2020, Share, Global Industry Analysis and Competitive Landscape (Effect of the COVID-19 Pandemic)@ https://dsportstimes.com/2020/10/05/analyzing-impacts-of-covid-19-on-oleophilic-material-market-effects-aftermath-global-industry-challenges-business-overview-and-forecast-to-2026/

Worldwide Protein Characterization and Identification Market Report 2019 by Key Players, Types, Applications, Countries, Market Size, Forecast to 2025 (Based on 2020 COVID-19 Global Spread)@ https://crypto-daily.news/uncategorized/556154/analyzing-impacts-of-covid-19-on-protein-characterization-and-identification-market-effects-aftermath-global-industry-challenges-business-overview-and-forecast-to-2026/

About HongChun Research:HongChun Research main aim is to assist our clients in order to give a detailed perspective on the current market trends and build long-lasting connections with our clientele. Our studies are designed to provide solid quantitative facts combined with strategic industrial insights that are acquired from proprietary sources and an in-house model.

Contact Details:Jennifer GrayManager Global Sales+ 852 8170 0792[emailprotected]

Go here to read the rest:
Analyzing Impacts of Covid-19 on Cloud Encryption Software Market Effects, Aftermath, Global Industry Challenges, Business Overview and Forecast To...

Read More..

Internet Security Market with COVID-19 Recovery Analysis 2020 | Rapid Adoption of BYOD Policy to Boost Market Growth | Technavio – Business Wire

LONDON--(BUSINESS WIRE)--The global internet security market size is poised to grow by USD 20.41 billion during 2020-2024, progressing at a CAGR of 10% throughout the forecast period, according to the latest report by Technavio. The report offers an up-to-date analysis regarding the current market scenario, latest trends and drivers, and the overall market environment. The report also provides the market impact and new opportunities created due to the COVID-19 pandemic. Download a Free Sample of REPORT with COVID-19 Crisis and Recovery Analysis.

The Internet security market is driven by the rapid adoption of BYOD policy. The perpetual changes in work locations, time zone barriers, as well as the pressing need to access official and confidential data on an employees personal device are resulting in the adoption of bring your own device (BYOD) policy. The increased adoption of the BYOD policy requires a secure network management suite that can be provided by commercial routers. SMEs and individual customers who have a high rate of data usage are focusing more on 3G/4G wireless routers. Thus, the market will experience continuous growth during the forecast period due to the abundant benefits of mobility.

Register for a free trial today and gain instant access to 17,000+ market research reports.

Technavio's SUBSCRIPTION platform

Report Highlights:

Read the full report here: https://www.technavio.com/report/report/internet-security-market-industry-analysis

Growing Need for Secure and Compliant Cloud Solutions will be a Key Market Trend

The growing adoption of Internet of Things (IoT) in sectors, including medical, retail, and finance, which have strict security standards, has triggered the need for secure and compliant cloud solutions. Privacy of information is so vital that nearly half of the digital consumers are cautious about their shared information due to a lack of confidence in online security. Thus, the need for Internet security solutions increases among organizations in order to maintain data confidentiality. Issues such as data breach can be mitigated or prevented altogether with comprehensive and centrally managed security systems. Thus, the growing need for secure and compliant cloud solutions will drive the growth of the market.

Technavios sample reports are free of charge and contain multiple sections of the report, such as the market size and forecast, drivers, challenges, trends, and more. Request a free sample report

Internet Security Market 2020-2024: Key Highlights

Buy 1 Technavio report and get the second for 50% off. Buy 2 Technavio reports and get the third for free.

View market snapshot before purchasing

Executive Summary

Market Landscape

Market Sizing

Five Forces Analysis

Market Segmentation by Solution

Customer Landscape

Geographic Landscape

Vendor Landscape

Vendor Analysis

Appendix

About Us

Technavio is a leading global technology research and advisory company. Their research and analysis focuses on emerging market trends and provides actionable insights to help businesses identify market opportunities and develop effective strategies to optimize their market positions. With over 500 specialized analysts, Technavios report library consists of more than 17,000 reports and counting, covering 800 technologies, spanning across 50 countries. Their client base consists of enterprises of all sizes, including more than 100 Fortune 500 companies. This growing client base relies on Technavios comprehensive coverage, extensive research, and actionable market insights to identify opportunities in existing and potential markets and assess their competitive positions within changing market scenarios.

Read more:
Internet Security Market with COVID-19 Recovery Analysis 2020 | Rapid Adoption of BYOD Policy to Boost Market Growth | Technavio - Business Wire

Read More..

Tenable and the CIS Enter Partnership to Bolster Cyber Hygiene – AiThority

New partnership helps resource-constrained organizations improve their foundational cybersecurity practices, understand their exposure and improve basic cyber hygiene

Tenable, Inc., the Cyber Exposure company, announced a strategic partnership with the Center for Internet Security, Inc. (CIS) that will bolster cyber hygiene for both public and private sector organizations, making foundational cybersecurity more affordable, accessible and actionable.

The two primary challenges organizations face in achieving basic cyber hygiene are lean budgets and limited staff with security expertise. This partnership is an important step in making foundational cybersecurity more attainable for both small and medium-sized organizations. To this end, CIS has developed a new prioritization scheme called the CIS Controls Assessment Specification for CIS Controls, its internationally recognized cybersecurity best practices. The CIS Controls are organized into Implementation Groups (IGs) which provide a prioritized path for organizations to improve their cybersecurity posture. IG1 represents basic cyber hygiene and the essential protections that should be put into place by all organizations.

Recommended AI News: Snowflake Launches Snowflake Partner Network To Expand Partner Offering And Commitment To The Ecosystem

Through its new Tenable.sc dashboard and report, Tenable is the first and only vendor to automate both the implementation and auditing of an organizations adherence to IG1, maximizing limited budgets and resource-constrained teams. This helps organizations transform the Controls into actionable cybersecurity recommendations and integrate basic cyber hygiene across their operations.

Recommended AI News: Siemens Adds Modern Cloud PLM To Xcelerator Portfolio With New SaaS Offering

The vast majority of cyberattacks arent the result of super sophisticated techniques. Instead, bad actors are going after low hanging fruit lax cybersecurity measures, said Renaud Deraison, chief technology officer and co-founder, Tenable. Our partnership with CIS is helping organizations mature their cybersecurity programs and improve cyber hygiene with their existing resources, budget and staff.

The CIS Controls Assessment Specification is immediately beneficial in that it removes the need for Sub-Control interpretation that is often found in the industry, said Curtis Dukes, CIS executive vice president and general manager, security best practices. Our partnership with Tenable provides a method for their customers to measure the Controls conformance in a uniform, comparable way.

Recommended AI News: KidneyIntelX Receives New York State Approval To Commence Commercial Testing

Read this article:
Tenable and the CIS Enter Partnership to Bolster Cyber Hygiene - AiThority

Read More..

How to Build Smart Banks that Connect Customers with Modern DX – AiThority

Smart banks are all set to arrive. The concept of money and goods transactions has changed significantly in the last few years. The ongoing pandemic has accelerated the need to empower financial institutions to build smart banking infrastructure around the world. Today, smart banking solutions are hogging the limelight among all emerging AI and Machine Learning based applications. Together with mobile-based marketing technologies, Internet of Things (IoT), RPA, and 5G technologies, AI ML is enabling todays banking institutions to build more user-friendly and automated branches and online facilities, providing high-tech experiences to customers.

Read More: This AI Pioneer Developed An Autonomous Real-Time Cloud Connection For HVAC

We are still reeling with the serious challenge of restraining the COVID-19 pandemic at public places, and banks are one of the hardest-hit centers that are increasingly finding it hard to manage new and existing customers. Only a handful of banks have actually managed to leverage existing technologies for mobile and self-service banking facilities to get back to normal Pre-COVID-19 engagements. Traditional banks have either lost their business drive due to fall in customer traffic, or are staring at bankruptcy due to lack of internet banking and mobile payments facilities services that are now the backbone of the modern banking sector.

Most businesses are tempted to conclude that their operations are staring at closure or slowdown due to the pandemic. This is not the case, especially if you track the growth of new technologies that ease the mode of doing business remotely, including for banks and insurance agencies. The speed and ease at which data science companies are working with Cloud, IT, SaaS, AIOps and Analytics companies to develop and bring to market new technologies such as artificial intelligence (AI) and 5G- expose the real opportunities for banks.

We will define smart banks by virtue of their origin and the tenacity to adopt new technologies and become intelligent, reliant, self-serving and above all, symbols of perennial improvement in back-office operations. All these are built on the foundation of Digital Experiences delivered with the highest contextual intelligence and ease of adoption across all layers of the society.

We must understand the reason behind developing Smart bank branches. Its not just the customers who are opting for digital banking facilities, but also bank employees and countless branch-level supervisors who now prefer to work in contactless environment with their colleagues and customers. While in some cases, physical branches remain a high-value engagement field, especially in instances related to opening new bank accounts, KYC updates, wealth management, currency exchange and wealth management, a majority of other front office bank operations can be completely automated to mobile and virtual branches.

According to me, smart banks would also become one of the most secured sources of data collection and contextualization in the near future.

Compared to a pre-COVID-19 physically accessible traditional bank, the new Smart banks embrace various digital experience management channels that involve multiple intelligent, self-service, and remote video devices to provide promotion and training services. All these converge at banking ops, thereby improving the customer experience while reducing labor costs for banks. Smart banks are lightweight on resources and leave low to zero carbon footprint by virtue of a downsized office space and energy consumption such as papers, stationery, printer, electricity and ACs.

The automation of modern bank branches has ushered in a new way of thinking among business leaders where they keenly embrace any product or solution based on these capabilities:

Smart bank branches, in particular, would invest heavily in automating their operations using 5G wireless mobility and internet security protocols. With the integration of fintech and martech capabilities, smart banks would witness a new line of philosophy in handling customers using DX channels.

The smart bank DX channel could involve two or more technologies listed below:

Lets discuss this one by one.

Lets take the DX offline now thats smart banking initiative. Isnt it?

5G wireless connections, in particular, could be used to provide stable and massive data services, achieving widespread banking services coverage.

During the COVID-19, many banks have intelligently reconstructed their entire offline experience management with service personnel able to identify and categorize customers using applications such as mobile trackers, barcode scanners, and video chats. Customers, once they reach the smart bank branch or an ATM use their self-service dashboard to use contactless equipment and handle services on their own.

Meanwhile, service personnel are still available to offer guidance to customers at any time they need. As well as shortening customer waiting times, online e-bank services also deliver a brand-new experience.

With changing social distancing norms, we might see many new applications of new technologies such as AI, 5G, and cloud that can holistically enrich a banks existing network design, provide a full-journey network experience for customers, and optimize network management modes.

AR VR screens could bear virus-free results for both customers walking into the branch, and for the service personnel. Both parties can interact using a smart device such as an AR VR gadget or mobile app that captures customers queries and displays the answers with alternative solutions on a large interactive screen. These could be integrated to IVR or Conversational AI tools so that bank officials can track offline financial management assessment or account checking services through AR VR medium.

At some point in time or the other, every customer visits a branch. Smart bank branch facilities laced with geo-mapping technology could track customers who visit different branches and then assist them with simple solutions to ease their traveling to branches frequently. Customers dont need to go to a specific branch to handle complex business services; service personnel can contact experts at headquarters, who are ready to answer customer questions in real-time.

When these customers go to other cities and visit bank branches, their data could be synchronized nationwide. Different branches can then continuously optimize the customer route design based on historical service analysis, delivering unique services to each customer.

The power of AI and simulation is finally enabling banks to simplify COVID-19 operations. Robo bankers cooperate with personnel and customers in improving the overall customer experience. Robots fitted with sensors and cameras can track the temperature and allow / restrict access to customers based on facial recognition or contactless biometric procedure. These intelligent cameras can accurately identify bank customers on arrival, followed by real-time big data analytics of the precision marketing platform to implement personalized service recommendations and precision marketing via CRM, Customer Experience Management, Voice AI, and Contact Centers.

The use of computer vision, NLP, and Optical Character Recognition speed up bank service handling and build a very comprehensive smart marketing scenario.

In the age of 5G, IoT has proven to be a huge enabler. 5G Intelligent network points can vastly improved network experience, especially in bigger branches where there is a huge amount of both data and IT devices.

Faster internet speed and connected devices can ease overall pressure on the IT operations and management. New 5G and O-RAN based products are available in the market that integrates a branchs IT devices such as servers, storage devices, and switches. These can be used to provide functions such as remote plug-and-play, remote attendance, and edge-cloud synergy, meeting integrated IT device management requirements. Companies like Huawei are working with a multi-national banks to test IoT asset management system, with the intention of helping the bank build smart branches in the near future.

Banks are one of the leading customers of security and video surveillance solutions and devices in the world. For banks, security protection is critical, and therefore, for every branch, smart security protection is indispensable.

New AI cameras and open chip sensor technologies have enabled video cloud analysis platforms to detect and prevent any untoward incident from happening. These video analysis and Surveillance techniques use deep learning models to identify any abnormal behavior or activity such as mask identification and detection of loitering, trailing, theft, accidents and fires. These can also be connected to data visualization and reporting platforms to present events and accidents in the form of heatmaps. Internal UAVs and drones are also fitted with these surveillance devices to ensure employees are quarantined against criminal activities by tracking attendance and access control.

Contactless surveillance and undetected tracking cameras also keep customers happy without trivializing their privacy concerns.

Companies like Huawei have long been committed to working with partners to build more user-friendly and automated branches for banks, providing high-tech experiences for customers. Branches no longer merely provide traditional financial services. New application scenarios and devices from AR shopping, simulated car finance, and intelligent customer service robots, to remote interactive entertainment, space capsule-style mobile financial services and coffee banks are emerging.

Read more:
How to Build Smart Banks that Connect Customers with Modern DX - AiThority

Read More..

#NCSAM: Is Connected Ever Going to be Protected? – Infosecurity Magazine

October 2020 marks the 17th year that National Cybersecurity Awareness Month (NCSAM) has been held, and this years theme follows a trend of the Internet of Things (IoT).

Claiming that the month continues to raise awareness about the importance of cybersecurity globally, this years theme is aimed to encourage individuals and organizations to own their role in protecting their part of cyberspace, stressing personal accountability and the importance of taking proactive steps to enhance cybersecurity.

The first week is following a theme of If You Connect It, Protect It aimed at reinforcing the importance of keeping connected devices secure from outside influence as we see the IoT become a more regular part of how we live and work.

Consider that the total number of IoT connections will reach 83 billion by 2024, and just this week, there were fresh reports of flaws in adult connected devices, are we really getting any better?Andrea Carcano is the co-founder of Nozomi Networks, and claimed in the face of a global pandemic, IoT connections are empowering a level of remote work like none before.

From our own experience, weve seen industrial operators go from a single digit percentage of their workforce working remotely, to 52% and higher, he said. This deluge of internet-connected devices opens the door to a whole slew of new vulnerabilities and creates a much large attack surface.

He claimed NCSAM is a good time to remember that it doesnt have to take a catastrophe to spur change. Also, Greg Foss, senior security strategist at VMware Carbon Black,said the exploitation and resale of direct access into corporate networks is exploding, as attackers leverage modular and increasingly more capable malware to maximize profits. That is why initiatives like Cybersecurity Awareness Month need to be embraced, to help organizations think about the techniques they need to put in place to combat such attacks.

For every organization with an advanced security posture and awareness of the vulnerability of connected devices, there will be many more at the infancy of their security journey and therefore lacking this visibility, he said. Add to this the fact that recent events have led to millions of people working from home and inadvertently increasing the risk of a cyber-attack targeting their companys IT network and systems and you will see that there is real cause for concern.

After all, if IoT devices are connected to a network, its a potential new way into that network for an attacker to leverage. Work devices are connected over the internet to the same wireless system that also connects to their homes smart devices, which are particularly vulnerable to cyber attacks, he said, claiming our smart homes are a cyber-attack in the waiting.

Weve seen the likes of smart thermostats, fridges, coffeemakers, and doorbells become part of the standard home these days, and to find multiple connected devices is common beyond the standard mobile devices and smart televisions.

As Foss said, each of these contains a miniature, multi-purpose computera circuit board that operates the device. This tiny computer has the same power and capabilities as a full desktop workstation from a dozen years ago, but is much easier to hack, as it was not designed with strong, configurable security in mind, he said. Therefore, we fall back on to the theme of connect it and protect it.

Foss recommended ensuring only corporate-approved devices are able to connect in to the enterprise and access corporate resources, while visibility over all ingress and egress points is key, correlating the host, user, and network activities to provide context to events and ensure auditability across a variety of disparate assets.

That is all very well for corporate-owned devices, and for those working in the cybersecurity industry, but what about the average employee and user? Tony Pepper, CEO of Egress, said it comes down to risk appetite for individual users, and when it comes to taking security risks, some people have a this wont happen to me mentality, while others are more cognizant of the risk but a feeling of I just need to get my job done prevails.

Education and awareness, while necessary, will only get you so far with both categories of employees, he said. Organizations therefore need to make sure they have appropriate controls in place and, where theres high risk to sensitive data, are providing a safety net for users that remove any grey areas from security decision-making, so its not always down to them to make the right choice.

Ultimately, this month is about raising awareness of the issues, and that is half of the battle. Adam Strange is the global marketing director atBoldon James, commented that the first week of NCSAM is looking at empowering users, and said that employees play a vital role in ensuring the organization maintains a strong data privacy posture.

Awareness both among businesses themselves and employees that connected devices are not always secure is relatively low and therefore businesses need to tackle this head on, he claimed, recommending businesses take the upper hand to invest in user training and education programs, and ensuring that a culture of security awareness is present and embedded into both their actions and the ethos of the business.

The remaining weeks of NCSAM follow the trend of IoT security, including securing devices at home and work; securing internet-connected devices in healthcare; and the future of connected devices. This all stems back to the central point that if it is to be connected, it needs to be protected.

If the average user is influenced more towards functionality and features over security and privacy, then this month is going the right way to ensuring a change of mentality over connected devices. We have a few more weeks to see if the message continues to be broadcast, and resonate widely.

Continued here:
#NCSAM: Is Connected Ever Going to be Protected? - Infosecurity Magazine

Read More..

The 3 lesser known cryptocurrency that are worth looking into – InfotechLead.com

Everybody knows about Bitcoin these days as it is the de facto cryptocurrency. It is used in an almost mainstream way to pay for a variety of goods and services. There are even ATMs where you can withdraw Bitcoins.It is far from being the only cryptocurrency out there, however. There are lots of other coins that all have some value and have some investors very excited, indeed. In fact, if you are looking to do things other than just buy and sell crypto, it is worth noting that other coins have a variety of uses.

In this article, I will give you some information on other coins so you can get an idea of whether you think they are worth buying for your specific needs.

# Dogecoin

What started out as a gag coin to poke fun at the hype of the cryptocurrency craze has become an actual currency. It is the darling of the counterculture styles that are interested in cryptocoins. But, dont be fooled, it does have some value and can be considered a good investment choice.

The strength of the coin lies in the fact that it sticks to the original ideal of what Bitcoin was supposed to represent back in its early days. Dogecoin has a massive community feel to it where the people act almost democratically and with a common sense of togetherness. It doesnt have a centralized authority and has something of a friendly vibe surrounding it.

You can check out the DOGE to BTC ticker and see that it is quite a stable coin and may make a good investment for some looking for a stable return and a good market cap.

# Ripple

One of the biggest problems with Bitcoin is its network latency. Since the hashes need to be encrypted one at a time and the process can take time, there is a slowdown when many transactions are happening at once. And the cost to mine them is quite high so fees are on the higher side with regards to other coins.

Ripple has done away with mining since every coin on its blockchain has been mined at the very beginning making it much faster and leaner than bitcoin.

It is also popular with investors because it has proved itself popular with traditional banking institutions. Since cross border transactions are very easy and fast with Ripple, they love to use it over their very own systems. Ripple has a very tangible value which traditional investors like.

# Bitcoin Cash

Bitcoin Cash owes its very existence to the slowness and lack of scalability with bitcoin. It was created after a hard fork was made on the blockchain which has larger blocks. The blocks on the Bitcoin Cash chain are 8mb rather than the traditional 1mb so they have much more computing power which speeds up the transactions.

Once again, since it is a coin that solves a problem, it has usefulness beyond just a vehicle for speculation so investors are very enthusiastic about it.

*This article has been contributed on behalf of Paxful. However, the information provided herein is not and is not intended to be, investment, financial, or other advice.

More:
The 3 lesser known cryptocurrency that are worth looking into - InfotechLead.com

Read More..

IRS Advises that Virtual Currency Received in Exchange for Microtasking is Subject to Ordinary Income Tax and Self-Employment Tax – JD Supra

As discussed in previous blog entries , the IRS has been engaged in an ongoing campaign intended to address noncompliance related to the use of crypto currencies, including a virtual currency compliance campaign spearheaded by the Large Business and International Division. At the heart of this issue is IRS position that cryptocurrency is property and not currency. It is in this light that IRS recent memorandum on cryptocurrency issues should be viewed.

In Chief Counsel Advice #202035011, IRS outlined the governments position on the taxability of convertible virtual currency received in exchange for microtasking through crowdsourcing or other similar platforms. As explained by IRS, in a typical crowdsourcing platform, vendors develop a platform upon which firms can advertise their tasks and workers can respond to those requests and perform the tasks. Certain crowdsourcing platforms can further subdivide tasks into smaller tasks and distribute those tasks to various crowdwork platforms. These subdivided tasks, also known as microtasks, are often simple, menial tasks that still require some form of human interaction beyond the current ability of artificial intelligence. Examples of microtasking include processing data, image review, downloading apps and providing reviews, completing online surveys or quizzes, and registering accounts with various services. When a worker performs one or some of these microtasks, he or she may receive a reward in the form of convertible virtual currency.

The IRS has previously defined convertible virtual currency as any virtual currency that has an equivalent value in real currency or is a substitute for real currency (e.g., Bitcoin). Any transaction involving an exchange of convertible virtual currency for property or services is treated as a sale or exchange of property for Federal income tax purposes. Thus, IRS has previously stated that an exchange of one cryptocurrency for another (e.g. Bitcoin for Ethereum) is considered a taxable transaction, as is an exchange of cryptocurrency for fiat currency or goods or services (Notice 2014-21). More specifically related to the issue considered in this pronouncement, IRS has indicated that a person paying cryptocurrency to an independent contractor for the performance of services is required to report such payment to the IRS and to the payee on Form 1099-MISC. [Id.]Accordingly, in its recent memorandum, IRS reasoned that while convertible virtual currency received in exchange for the performance of microtasks can be as little as $1 (or less), it is nevertheless considered compensation for services that must be reported on the workers income tax return as ordinary income and may be subject to self-employment tax. The fact that a de minimis amount of convertible virtual currency may be awarded in exchange for the microtask does not appear to preclude reporting requirements.

On the one hand, this memorandum may be seen as merely a logical extension of principles that IRS has previously espoused to a specific situation. In the larger sense, however, it may be viewed as a continuing reminder that widespread adoption of cryptocurrency as a new medium of exchange for ordinary business transactions still faces significant tax hurdles in the United States. In all likelihood, the sought-after tax efficiencies would require Congressional action.

See the original post here:
IRS Advises that Virtual Currency Received in Exchange for Microtasking is Subject to Ordinary Income Tax and Self-Employment Tax - JD Supra

Read More..

Inside the Marshall Islands New Cryptocurrency: The SOV – Decrypt

In brief

If the Republic of the Marshall Islands state-sponsored cryptocurrency, the Sovereign or SOV, takes off, SFB Technologies, the software company building the coin, would become incredibly wealthy.

The SOV is a fully-fledged cryptocurrency. The Pacific Island nation, home to about 60,000, is considering issuing it to end its decades-long reliance on the US dollar.

SFB Technologies would receive 7.5% of the coins supply, which it could use after five years of its launchwhich could be at any point after the 18-month-long presale begins, if the government implements the idea.

We are not in the business of pumping and dumping, Dr. Peter Dittus, the cofounder of SFB Technologies, and a member of the advisory committee of the SOV Foundation, the non-profit that governs the network, told Decrypt. But we wouldnt keep on holding it, because we dont have intrinsic interest in holding currencies of sovereign countries.

The SOV Foundation, the non-profit overseeing the development of the project, will hold its presale for SOV in the next couple of months, just in case the Marshall Islands government, which is still deliberating whether to issue the coin, goes ahead with the project.

Dr. Dittus, who is also a former Secretary-General of the Bank for International Settlements (BIS), explained why it might be in favor of the coin.

First, many of its inhabitants live or study in the US. And they are spending lots of money, both ways, to children who are studying [abroad] and to the people who are working, Dr. Dittus told Decrypt.

It's very difficult and very costly for normal people using Western Union or MoneyGram, he said. Western Union charges $5 to send small amounts of money from the Marshall Islands to the USA. The SOV, built on Algorand, aims to reduce those transaction fees, which rack up for smaller amounts.

Second, without a central bank, the Marshall Islands are still dependent on the economy of the USA, the superpower to whom the island nation is attached. A cryptocurrency affords it greater autonomy.

The Feds profligate money printing is hard to reconcile with the functioning financial system of any market-based system, said Dr. Dittus.

But the SOV will, like clockwork, increase its monetary supply by 4% each year, meaning it would be a non-inflationary currency; an alternative to the existing fiat currencies. Still, in case of an unexpected hiccup, the nation still has the US dollar to fall back on, he said.

The Marshall Islands final judgment may be influenced by the International Monetary Fund (IMF), which has objected to the coin since 2018 on the grounds that it may cause economic, reputational, and governance risks. In May, it said that those concerns still stood.

Dr. Dittus said that these concerns did not amount to an objection, The IMF, with whom we have had extensive discussions, together with the Marshall Islands government have to be very careful.

The advice, he said, was to be careful, make sure you fully understand it before you go ahead [and] that youre on top of it, that you can handle it; make sure that you dont fall victim to half baked measures and half baked institutions.

The presale for the SOV will begin in the next few months, and last for 18 months. By the end of the presale, the Marshall Islands must have made its final decision on the cointhough itll probably make it earlier, said Dr. Dittus.

For Dr. Dittus, the Marshall Islands is an experiment. When he gets the SOV up and running in the Marshall Islands, or if the government opts to scrap it, Dr. Dittus said that hell take the underlying technology to one of several small, developing nationshe declined to say which oneswho have expressed interest in the coin.

Original post:
Inside the Marshall Islands New Cryptocurrency: The SOV - Decrypt

Read More..

Bank of Korea plans cryptocurrency (CBDC) testing in 2021 – The Paypers

South Koreas central bank has revealed that the third and final phase of its pilot programme for a CBDC will commence in 2021.

The Bank of Korea (BOK) announced plans of doing a test run on the issuance and circulation of the planned central bank digital currency in 2021, according to The Korea Times, cited by tokenpost.com. However, the BOK clarified that the test should not be interpreted as a confirmation that it will launch its own cryptocurrency. The pilot programme for the planned CBDC was announced by the Bank of Korea in April 2020 and is expected to last until December 2021.

Phase 1 of the programme, which involved designing and checking the technology that will be used in the project, was already completed in July 2020. The second phase is focused on the analysis of processes as well as coordinating with outside consultants. Meanwhile, the third and final phase of the pilot will focus on the distribution of the cryptocurrency as well as its circulation process.

Read the rest here:
Bank of Korea plans cryptocurrency (CBDC) testing in 2021 - The Paypers

Read More..