Page 3,397«..1020..3,3963,3973,3983,399..3,4103,420..»

Helping companies prioritize their cybersecurity investments – MIT News

One reason that cyberattacks have continued to grow in recent years is that we never actually learn all that much about how they happen. Companies fear that reporting attacks will tarnish their public image, and even those who do report them dont share many details because they worry that their competitors will gain insight into their security practices.

Its really a nice gift that weve given to cyber-criminals, says Taylor Reynolds, technology policy director at MIT's Internet Policy Research Initiative (IPRI). In an ideal world, these attacks wouldnt happen over and over again, because companies would be able to use data from attacks to develop quantitative measurements of the security risk so that we could prevent such incidents in the future.

In an economy where most industries are tightening their belts, many organizations dont know which types of attacks lead to the largest financial losses, and therefore how to best deploy scarce security resources.

But a new platform from MITs Computer Science and Artificial Intelligence Laboratory (CSAIL) aims to change that, quantifying companies security risk without requiring them to disclose sensitive data about their systems to the research team, much less their competitors.

Developed by Reynolds alongside economistAndrew Lo and cryptographer Vinod Vaikuntanathan, the platform helps companies do multiple things:

The team received internal data from seven large companies that averaged 50,000 employees and annual revenues of $24 billion. By securely aggregating 50 different security incidents that took place at the companies, the researchers were able to analyze which specific steps were not taken that could have prevented them. (Their analysis used a well-established set of nearly 200 security actions referred to as the Center for Internet Security Sub-Controls.)

We were able to paint a really thorough picture in terms of which security failures were costing companies the most money, says Reynolds, who co-authored a related paper with professors Lo andVaikuntanathan, MIT graduate student Leo de Castro, Principal Research Scientist Daniel J. Weitzner, PhD student Fransisca Susan, and graduate student Nicolas Zhang. If youre a chief information security officer at one of these organizations, it can be an overwhelming task to try to defend absolutely everything. They need to know where they should direct their attention.

The team calls their platform SCRAM, for Secure Cyber Risk Aggregation and Measurement. Among other findings, they determined that the three following security vulnerabilities had the largest total losses, each in excess of $1 million:

Failures in preventing malware attacks

Malware attacks, like the one last month that reportedly forced the wearables company Garmin to pay a $10 million ransom, are still a tried-and-true method of gaining control of valuable consumer data. Reynolds says that companies continue to struggle to prevent such attacks, relying on regularly backing up their data and reminding their employees not to click on suspicious emails.

Communication over unauthorized ports

Curiously, the team found that every firm in their study said they had, in fact, implemented the security measure of blocking access to unauthorized ports the digital equivalent of companies locking all their doors. Even still, attacks that involved gaining access to these ports accounted for a large number of high-cost losses.

Losses can arise even when there are defenses that are well-developed and understood, says Weitzner, who also serves as director of MIT IPRI. Its important to recognize that improving common existing defenses should not be neglected in favor of expanding into new areas of defense.

Failures in log management for security incidents

Every day companies amass detailed logs denoting activity within their systems. Senior security officers often turn to these logs after an attack to audit the incident and see what happened. Reynolds says that there are many ways that companies could be using machine learning and artificial intelligence more efficiently to help understand whats happening including, crucially, during or even before a security attack.

Two other key areas that warrant further analysis include taking inventory of hardware so that only authorized devices are given access, as well as boundary defenses like firewalls and proxies that aim to control the flow of traffic through network borders.

The team developed their data aggregation platform in conjunction with MIT cryptography experts, using an existing method called multi-party computation (MPC) that allows them to perform calculations on data without themselves being able to read or unlock it. After computing its anonymized findings, the SCRAM system then asks each contributing company to help it unlock only the answer using their own secret cryptographic key.

The power of this platform is that it allows firms to contribute locked data that would otherwise be too sensitive or risky to share with a third party, says Reynolds.

As a next step, the researchers plan to expand the pool of participating companies, with representation from a range of different sectors that include electricity, finance, and biotech. Reynolds says that if the team can gather data from upwards of 70 or 80 companies, theyll be able to do something unprecedented: put an actual dollar figure on the risk of particular defenses failing.

The project was a cross-campus effort involving affiliates at IPRI, CSAILs Theory of Computation group, and the MIT Sloan School of Management. It was funded by the Hewlett Foundation and CSAILs Financial Technology industry initiative (FinTech@CSAIL).

Here is the original post:
Helping companies prioritize their cybersecurity investments - MIT News

Read More..

Kansans are getting letters saying they applied for unemployment. The problem? Some never did. – Pittsburg Morning Sun

When Joe Pilsi first got a letter from the Kansas Department of Labor, he figured it was routine.

"I was thinking it was going to be workplace stuff they do every so often, making sure you have your equal opportunity stuff up by the time clock what they always do," Pilsi said. "Thats what I was expecting it to be, which would be instant trash."

But instead, the letter was to confirm Pilsis unemployment benefits claim, something which has happened to scores of Kansans statewide as more residents find themselves out of work due to the COVID-19 pandemic.

The problem is Pilsi, who is the sole full-time employee at the chiropractic firm he runs in Marysville, didnt apply for any such benefits.

A day later, he got another letter addressed to him as an employer about what appeared to be a fraudulent benefits claim.

After repeated calls to KDOL in an effort to ascertain the status of the fake claims, Pilsi said he threw the letter in the trash bin.

"To get into them to ask about it would be virtually impossible and I dont have the time to do it," he said.

Pilsi mentioned it to his wife, who works at the local newspaper, the Marysville Advocate. It turns out the publication had received similarly fraudulent messages, something confirmed by the papers editor, Sarah Kessinger.

Like Pilsi, she flagged the claims for KDOL but has not heard back.

It isnt just in Marysville, however similar stories persist across the state and nation. An Olathe woman said she received more than 70 similar letters, a local television station reported.

In Topeka, family physician Richard Illif reported a similar series of correspondences as Pilsi, with one letter "asking whether I had fired myself or merely let myself go."

Pilsi said the letter was concerning because he had been a victim of identity theft in the past. The fraudulent claim left him to wonder if someone had stolen his personal information again.

"It becomes a royal pain in the butt," Pilsi said.

Most every state has reported similar instances of fraud or attempted fraud, according to Pam Dixon, executive director of the internet security group World Privacy Forum.

Other areas, such as Washington state, have reported an even more sinister type of fraud where third parties will attempt to convince unemployment applicants that they must pay for someone else to file a claim on their behalf.

Such fraud is not common, Dixon said, because it is "high risk and not very profitable."

But with a record surge of unemployment claims in April, a number that has remained high throughout the pandemic, unscrupulous individuals finally had the cover they need to attempt to scam the system.

"Youre able to hide in the numbers," Dixon said. "It is a very effective way of getting lost."

Acting Labor Secretary Ryan Wright echoed this sentiment, saying that fraud has been extremely limited among those seeking regular unemployment benefits but rampant in the Pandemic Unemployment Assistance program providing an extra $600-per-week to applicants.

Wright said that this is because states scrambled to build out the PUA on the fly during the pandemic, while applications simultaneously flooded in.

"This isnt a normal program, this is actually an entirely new unemployment system," Wright said. "Not since 1935 have states had to implement this. In addition to paying out claims, states are having to build out the infrastructure to support hat unemployment program, so that is why were seeing that spike nationally of fraud."

The endeavor was made easier by the July 2017 data breach at credit giant Equifax, something which exposed the names, Social Security numbers and other private information of thousands.

Those who have previously been victims of identity theft are even more likely to have their information used in the unemployment fraud scheme, Dixon said.

And the attempted fraud is continuing, even as the spike in residents applying for benefits starts to decline.

"It is concerning," Dixon said.

The letters have gotten the attention of state lawmakers, who pressed Wright on the matter during a State Finance Council meeting Thursday.

"There is massive concern from businesses in my community," said Senate President Susan Wagle, R-Wichita. "The mailings are highly unusual and there is information that is confidential in there that is going out."

It is especially of concern, legislators said, as the state appears set to embark on a whole new assistance program: the Lost Wages Assistance Program, created by President Donald Trump last month.

The state has indicated it will seek federal approval to participate in that effort, with eligible applicants getting an extra $300-per-week in benefits when it goes live later this fall.

The concern is some of these funds will wind up in the pockets of fraudsters.

"I do think a portion of that [money] is going to get scammed by those organized crime folks," said Senate Majority Leader Jim Denning, R-Overland Park.

Wright and KDOL officials maintain that they are being proactive in reaching out to businesses and that mitigation efforts have been put in place.

The letters do not mean that any of KDOLs data has been compromised, he told lawmakers.

"I can tell you with a high degree of confidence that no state database has been breached," Wright said.

The state is doing better at implementing measures to deter fraudsters, Dixon said.

She pointed to a complex CAPTCHA and other security measures that have been added to the benefits application since she last examined it earlier this summer.

Of equal importance were prominently featured instructions as to what to do in the case you receive what appears to be a fraudulent benefits application. That does not exist in every state, she noted.

In addition to reporting the fraud to KDOL, the agency recommends notifying one of the major credit agencies, as well as banks, credit card companies and the Internal Revenue Service.

As the problem becomes more widespread, many residents are starting to wise up. But Dixon said that for every business owner or worker like Pilsi, who routinely checks their mail and is attentive, there are more who have no idea their information could be compromised.

"A lot of folks are just trying to keep their feet under them and this is a very hard thing to tackle in the middle of a pandemic and in the middle of going back to school," Dixon said. "It is not like people need another thing to handle. Some people are really at the breaking point right now. The thing that really has bothered all of us is it is just such an unkind, ugly fraud. It really directly hurts people."

See the rest here:
Kansans are getting letters saying they applied for unemployment. The problem? Some never did. - Pittsburg Morning Sun

Read More..

Embedded Security For Internet Of Things Market 2025 Opportunities, Applications, Drivers, Limitations, Companies, Countries, & Forecast – Express…

The global Embedded Security For Internet Of Things market report is a comprehensive research that focuses on the overall consumption structure, development trends, sales models and sales of top countries in the global Embedded Security For Internet Of Things market. The Embedded Security For Internet Of Things market report provides a complete study of this industry vertical, emphasizing on the crucial growth drivers, opportunities, and limitations projected to shape the market dynamics in the forthcoming years.

According to industry experts, the market is expected to expand considerably, recording a CAGR of XX% over the study period of 2020-2025.

Fluctuations in the demand and supply channels due to the strict lockdown measures enforced to address the COVID-19 pandemic has left several organizations in disarray. Speaking of the uncertainty of revenue in the near term, industries are expected to face challenges even once the economy arises from the pandemic. Given this, the document offers a comprehensive assessment of the numerous industry segments to help you understand the revenue prospects of the market amid COVID-19.

Request Sample Copy of this Report @ https://www.express-journal.com/request-sample/188563

Key inclusions of the Embedded Security For Internet Of Things market report:

Embedded Security For Internet Of Things Market segments covered in the report:

Regional analysis: North America, Europe, Asia-Pacific, South America and Middle East and Africa

Product spectrum: Software and Controller Chip

Projected market share of each segment with respect to the sales and revenue.

Applications arena: Retail, Aerospace and Defence, Healthcare, Gaming, Automotive and Others

Competitive terrain:

Key questions answered in the report:

What is the growth potential of the Embedded Security For Internet Of Things market?

Which product segment will grab a lions share?

Which regional market will emerge as a frontrunner in coming years?

Which application segment will grow at a robust rate?

What are the key challenges that the global Embedded Security For Internet Of Things market may face in future?

Which are the leading companies in the global Embedded Security For Internet Of Things market?

Which are the key trends positively impacting the market growth?

Which are the growth strategies considered by the players to sustain hold in the global Embedded Security For Internet Of Things market?

Request Customization on This Report @ https://www.express-journal.com/request-for-customization/188563

Follow this link:
Embedded Security For Internet Of Things Market 2025 Opportunities, Applications, Drivers, Limitations, Companies, Countries, & Forecast - Express...

Read More..

‘No longer safe in their classroom:’ NHCS remote-learning session hacked, sexualized profanity used – Port City Daily

A parent claimed that at least two virtual-learning sessions have been hacked by abusive users. (Port City Daily photo / File)

WILMINGTON This week, a New Hanover County parent claimed at least two incidents of hacking where cyberbullies may have gained access to remote-learning sessions, harassing students and using abusive, sexualized profanity towards them.

Asked about these concerns, the New Hanover County School district did not address the specific incident but did state it was continuously monitoring and enhancing internet security to protect students, families, and staff. NHCS said that incidents rising to the level of threats, malicious intent, pornography, illegal, and or criminal activities would be investigated by school principals, and criminal violations would be reported to law enforcement.

In a different response, sent to parents, NHCS stated it had been made aware of students engaging in conduct using social media that may be considered cyber-bullying. NHCS encourages parents and students to review NHCS bullying, harassment, and discrimination policies.

However, the concerns expressed by the parent indicate it may not have been a student or, at least, not the student assigned to the remote-learning account that was doing the cyberbullying.

The two incidents both apparently involved unknown users gaining access to Zoom meetings in order to make inappropriate comments and harass students.

On Thursday, a parents message (which appears, in part, below), about the incidents, circulated on social media. The parent was highly complimentary of the district, citing very positive experiences at two elementary schools. The recent incidents, however, left the parent concerned.

The parent wrote that she no longer felt her children were safe in their virtual classroom after it was apparently hacked. The parents concerns seem to indicate that a male user was communicating with other students using an ID assigned to a female student.

My daughter, while attending her science Zoom class, was hacked and although it was her Google Classroom ID it was a male who was making inappropriate comments via the audio function of Zoom as well as the written chat section, she wrote.

The parent said the family was notified of the hacking by a teacher. Then the family had a difficult conversation with child, trying to answer questions about what hacking is, how much access a hacker could have to someones private life could they, for example, watch a student through a laptop camera outside of class time? and, perhaps most difficult to answer, why would someone do this?

The parents noted that for some of her worries we had answers but for some we didnt.

The parent also included evidence of another incident in the screenshot pictured below. Note, the parent redacted the student names, while Port City Daily has redacted the profanity.

NHCS issued the following statement in response to inquiries from Port City Daily:

NHCS is continuously monitoring and enhancing internet security to protect students, families, and staff against cyberbullying, internet hacking, and other online security threats. The school district prohibits student access to social media platforms through the district network and instructs teachers to use waiting rooms and additional identification measures to ensure only appropriate students are present in online classrooms.If the online actions reach the level of threats, malicious intent, pornography, illegal, and or criminal activities, an investigation of the Zoom/Google meet meeting is initiated by the school principal.Violations are being aggressively investigated and will be reported to law enforcement.

Guidance for participating in online classrooms, including password protection, link sharing, screensharing, supervision, what to do if inappropriate behavior occurs, and more, is available on the district website atwww.nhcs.net. Cyberbullying policies, reporting procedures, and support resources are being shared through the NHCS website, social media, and Connect 5 calls/emails to families. Student Support Services and school counselors are available to provide social emotional support and guidance.

NHCS also sent the following statement to parents:

This week, NHCS was made aware of students engaging in conduct using social media that may be considered cyber-bullying. NHCS strives to foster an environment that is welcoming to all students and prohibits all forms of bullying (including cyberbullying), harassment, and discrimination by its students.

NHCS has shared all of the reports, complaints, and evidence of cyberbullying with law enforcement in order to address the matter under North Carolina criminal law. NHCS will continue to share any additional information with law enforcement.

In addition to North Carolina criminal law, NHCS prohibits bullying (including cyberbullying), harassment, and discrimination by its students in NHCS policies. Bullying (including cyberbullying), harassment, and discrimination may include conduct such as: spreading secrets or rumors; sending threatening messages; sending sexual material of others without permission; making derogatory comments about others; etc.

NHCS encourages parents and students to review NHCS bullying, harassment, and discrimination policies. NHCS policies that prohibit bullying (including cyberbullying), harassment, and discrimination include:

More:
'No longer safe in their classroom:' NHCS remote-learning session hacked, sexualized profanity used - Port City Daily

Read More..

Why should you use a VPN on your iPhone and Mac? – Cult of Mac

This VPN post is presented by Surfshark.

Humans use the internet for almost everything. Thats hardly a revolutionary statement, but its crucial to keep in mind. From theater tickets to bank accounts, if we can have it all on one handheld device, why not do it? Its convenient and easy.

But with that convenience comes risks. Typically, humans adapt to new technology but so do criminals, shady corporations and marketing agencies looking to profit off as many internet users as possible.

Thats why virtual private networks (VPNs) have become popular. While the internet security product was initially created for corporations to protect their assets, demand eventually grew for everyday internet users. The market is ever-growing, and theres a VPN for everyone, whether you want a free or a premium product. One of the top-rated and affordable options is Surfshark a humanized VPN for anyone and everyone.

A VPN is like a virtual, high-speed pipeline that connects your device to a server in a distant place, making your online browsing private and encrypting your data in the process. While free VPN options exist, experts recommend premium VPNs for their stouter security and a broader range of features.

For a price as low as $1.99 per month (for a limited time), Surfshark encrypts all the internet traffic sent to and from your device, hides your IP address to make sure nobody can see what you do online, and blocks ads, trackers, malware and phishing attempts. Users also get great benefits, like access to 15-plus different Netflix libraries.

Apple products lead the market in terms of privacy and security features. Its something that the brand puts in the forefront. But to protect yourself online, you need additional help because any device connected to the internet can be at risk. Thats where a VPN comes in.

A VPN encrypts all your data and sends it to a VPN server. The data is then decrypted and sent to the destination (e.g., a website like YouTube). The process happens in milliseconds, but all the information sent to and from the VPN server remains undecipherable to onlookers.

VPN encryption makes you far less vulnerable to hackers looking for unprotected devices, especially those surfing online via public Wi-Fi. A VPN also can help you evade phishing and malware, which could result in stolen credentials or personal information, and ultimately identity theft.

In addition to such threats as identity theft, a VPN helps you avoid various forms of tracking, from advertisers to your internet service provider (ISP). When your data is encrypted, and youre assigned a different IP address, it becomes much harder to track you down.

It also helps you dodge price-discrimination practices, because theyre mostly based on your location and website cookies. Price discrimination is most prevalent in the travel industry. Prices rise and fall based on the country youre from or how many times youve clicked on a particular deal.

Geo-blocking affects every country in one way or another. But with a VPN, country borders are not a limit. Once you connect to a VPN, your IP address is different, which means a website youre trying to reach sees you in a different location than you actually are.

If a streaming service wont give you the goods where you are, connect to a VPN server where they are. All you have to do is open the app and click Connect on any server location you need. Access everything, from your favorite sports broadcast to another countrys Netflix library. Surfshark opens 15-plus different Netflix libraries.

Without geo-blocking, there are also smaller-scale website blocks. For example, there are network restrictions that you come across at work, school or a library. These institutions often block social media sites or other websites that they deem distracting.

What do you get when you join Surfshark?

Price: Free trial and premium options with prices as low as $1.99 per month (for a limited time). Surfshark also offers a 30-day money-back guarantee so you can try it out for free.

Download from: Surfshark

Read more:
Why should you use a VPN on your iPhone and Mac? - Cult of Mac

Read More..

How government is delivering better election security – GCN.com

How government is delivering better election security

While hostile nation-states, domestic misinformation campaigns and concerns about mail-in voting make it harder to ensure the security and integrity of the 2020 election, plenty of progress has been made on the cybersecurity front since 2016, experts say.

"While there are no guarantees in cybersecurity, I can assure you that the security defenses we have in place for 2020 are vastly improved over those in place a short four years ago," said John Gilligan, president and CEO of the non-profit Center for Internet Security (CIS) during an Aug. 28 House Homeland Security Committee hearing.

Much of that work has been done around improving vulnerabilities that were not only known but often exploited by Russian hackers in 2016, such as probing (and in some cases compromising) voter registration databases, phishing vendors who develop election management or voting software and running covert information operations on social media platforms that went largely undiscovered until after Election Day.

According to updated statistics from the Cybersecurity and Infrastructure Security Agency, tools and technologies have been put in place to respond to those weaknesses and monitor for cybersecurity threats.

In partnership with CIS, the agency has helped to deploy 276 Albert sensors across all 50 states, the District of Columbia and at least 222 local election networks. The sensors act as intrusion detection systems, monitoring network traffic on voter registration systems and other election software for signs of malicious probing or attacks by hackers.

CISA has conducted 131 remote penetration tests and 59 onsite risk and vulnerability assessments for local election infrastructure, and approximately 263 election officials around the country are receiving weekly vulnerability scan reports. The agency has also helped train thousands of election officials through online security courses, delivered "last mile" election information to more than 5,500 localities and provided trend analysis about risk and vulnerabilities and the latest threats to election infrastructure to the election community.

In addition to tools like Albert sensors, Gilligan pointed to endpoint detection and response programs that have been implemented by some election jurisdictions as well as domain blocking and reporting tools that prevent elections offices and computers from connecting to known malicious websites as examples of protections in place today that were virtually non-existent before 2016.

One thing election officials weren't counting on this year was a pandemic that threatens to deter millions of registered voters from safely casting their ballots in person. While many states have adjusted by moving to dramatically expand absentee (or mail) voting, they must contend with a surge of new voters who are unfamiliar with the proper procedure and disinformation from politicians and unscrupulous actors seeking to cast doubt on the reliability of mail-in ballots.

Amber McReynolds, CEO of the non-profit National Vote at Home Institute, echoed claims from other experts that voting-by-mail is no less safe or secure than other forms of voting. To the extent that there are unique risk considerations, such as those highlighted by a July vulnerabilityassessmentdone by CISA, they can be mitigated in part or in whole through voter education and awareness campaigns, as well as technologies like ballot tracking systems or analog procedures like risk-limiting audits for paper-based ballots that provide election officials with a trove of data to track and verify individual votes.

"No election system is perfect, and this is why it's critical to continually review and improve systems by enhancing security access transparency, particularly in this unprecedented time," McReynolds said.

A longer version of this article was first posted to FCW, a sibling site to GCN.

About the Author

Derek B. Johnson is a senior staff writer at FCW, covering governmentwide IT policy, cybersecurity and a range of other federal technology issues.

Prior to joining FCW, Johnson was a freelance technology journalist. His work has appeared in The Washington Post, GoodCall News, Foreign Policy Journal, Washington Technology, Elevation DC, Connection Newspapers and The Maryland Gazette.

See the original post:
How government is delivering better election security - GCN.com

Read More..

How Romania is Solving Technology and Poverty Disparities – Borgen Project

SEATTLE, Washington In recent years, the technology industry in Romania has boomed. Technology giants like Google, IBM, Microsoft, Vodafone and others have set up shop in the countrys growing urban areas to take advantage of one of Romanias best resourcesits people. According to a 2017 study by information services company KeysFin, more than 106,000 information technology (IT) workers were employed in urban cities like Bucharest and Cluj, with about 7,000 new graduates added each year. Yet, the advances in technology have not been proportionate across Romania. Here is how Romania is looking to solve its technology and poverty disparities in 2020.

Romania has a strong background in computers and technology from its communist regime and has a STEM (science, technology, engineering and math) focused education system. Aside from English, Romanian is the next most used language in the Microsoft Suite,and Romania ranks third behind Russia and China in the International Mathematical Olympiad. Foreign companies are attracted to these skilled and intelligent workers, a majority of whom speak English and are willing to work for less than many other European countries due to the low living costs in Romania.

In addition to foreign companies flocking to Romania for high-quality IT services, foreign investment has aided a growing number of technology start-ups in Romanian cities. Humans is a technology start-up developing AI software to recreate people digitally. TypingDNA is another start-up that strengthens security by identifying a person with their keyboard typing tendencies. There are hundreds of new companies like these forming and growing that fuel the IT industry in Romania and its economy. In 2017, the economy was growing at 7.1%, compared to the EU average of 2.5%.

From its rising IT industry, it may seem as if Romania is being rebuilt as a nation in the cloud, years ahead of competitors. However, almost 40% of Romanias population has never used the internet, according to the 2016 World Development Report by the World Bank. The majority of impoverished Romanians living in rural areas either work in agricultural fields or have no steady source of income. The country has been evolving in two separate directions.

Those living in the major cities are being propelled into higher standards of living with high-speed internet and access to the global economy. At the same time, many impoverished Romanians living in rural communities are being left behind. There are a social discord and a wealth disparity between those living in urban and rural areas. As of 2017, the wealthiest Romanians, which make 20% of Romanias population, earned roughly seven times more than the bottom 20%, making Romania the highest income inequality ratio country in the EU.

With the rise of technology, Romanias urban and rural areas almost appear to be separate countries, with differing standards of living and income expectations. However, many Romanian and foreign agencies are intervening to bridge the disparities between the two areas. Initiatives are focusing on education and healthcare, but there are also initiatives striving to help the digitally attached Romanians by getting them online and connected. For instance, the 2020 National Strategy for Romanian Digital Agenda aims to get all Romanians connected to the internet by the end of 2020. The initiative also strives to get at least 80% of households to a 30 Mbps internet broadband and 45% to 100 Mbps broadband.

The initiatives goal is to make the internet more accessible to Romanians and to educate new internet users. About 80% of Romanians do not have a basic grasp on digital technology, and the digital agenda looks to reduce this number. Moreover, many Romanians do not trust internet security. Out of all EU countries, Romania ranks as the lowest in having internet users use online shopping and banking. About 17% of Romanians go shopping online, and less than 8% of them use online banking. The 2020 digital agenda looks to get more people engaged and trusting in similar online services through eGovernment. As a part of the eGovernment goal, the National Agency for Fiscal Administration has set out to make taxes payable through the internet. Additionally, the Romanian government is also establishing other services like digital profiles for citizens instead of paper documentation. Moreover, ePrescription is another digital service that strives to connect medical providers and pharmacists, aiming to integrate healthcare institutions across the country

Romania, along with the World Bank, is actively looking for ways to increase internet connectivity and internet access to citizens living in rural areas. Despite Romanias growing IT industry, there are technology and poverty disparities that the country needs to improve to have united progress toward higher standards of living and technological advancements. Though the booming technology industry has exacerbated many of the regional differences in Romania, the government and the 2020 digital agenda are using the internet to reunite Romanians.

-Brett MuniPhoto: Flickr

View post:
How Romania is Solving Technology and Poverty Disparities - Borgen Project

Read More..

Internet of Things (IoT) Security Market Report: Regional Data Analysis By Production, Revenue, Price And Gross Margin – Kewaskum Statesman News…

Los Angeles, United State:Internet of Things (IoT) SecurityMarketare real time virtual objects that mimic and characterise the physical object in its entirety. With the classifiedInternet of Things (IoT) Security marketresearch based on various growing regions this report provide leading players portfolio along with sales, growth, market share and so on. It can also have the capability to predict failures and future behaviours.

The global Internet of Things (IoT) Security market based on end-user, application, and region. In terms of end-user, the Internet of Things (IoT) SecurityMarket is classified into aerospace & defense, automotive & transportation, home & commercial, electronics & electricals/machine manufacturing, energy & utilities, healthcare, and retail & consumer goods. Based on application, the Internet of Things (IoT) Security market is categorized into dynamic optimization, predictive maintenance, machine & equipment health monitoring, and product design & development. Region wise into North America, Europe, Asia Pacific, Middle East & Africa, and Latin America.

Major PlayersOperating in this market include AT&T, Inc., Gemalto NV, Infineon Technologies, International Business Machines Corporation (IBM), Cisco Systems, Inc., Check Point Security Software Technologies Ltd., Verizon Enterprise Solutions, Symantec Corporation., PTC Inc., and Digicert.

The concept of Internet of Things (IoT) Security is increasing the digital profile of a physical product or procedure that speaks about the practical and behavioral characteristics used to improve performance. Innovation allows us to expand the real and virtual worlds with a continuous digital depiction of physical products that can reach each stage of the product improvement life cycle, from the age of thinking to commercialization.

The study objectives of this report are:

To evaluate the status of worldwide Internet of Things (IoT) Security, future forecasts, opportunities for development, key markets, and important players.

To present the growth of Internet of Things (IoT) Security in the U.S., Europe, and China.

To profile key players strategically and analyze their development plan and strategies comprehensively.

Defining, describing and forecasting the market by type of item, market and main areas.

Influence of the Internet of Things (IoT) Security market report:

Comprehensive assessment of all opportunities and risk in the Internet of Things (IoT) Security market.

Internet of Things (IoT) Security market recent innovations and major events.

Detailed study of business strategies for growth of the Internet of Things (IoT) Security market-leading players.

Conclusive study about the growth plot of market for forthcoming years.

In-depth understanding of market-particular drivers, constraints and major micro markets.

Favourable impression inside vital technological and market latest trends striking the market.

Apply promocodeCMIFIRST1000save1000USDand alsogetonepremium report sample CopyFREE

Buy-Now this Research Report @https://www.coherentmarketinsights.com/insight/buy-now/1117

The research provides answers to the following key questions

What is estimated growth rate and market size of the Internet of Things (IoT) Security industry for the forecast period 2018 2026?

What are major driving factors impacting the Internet of Things (IoT) Security Market worldwide?

How have prominent market leaders been able to maintain a competitive edge over their competitors?

Which market trends from the yester years and the future are likely to keep the prospect of the Internet of Things (IoT) Security Market high for the forecast period 2018 2026?

Which factors will pose challenges and restrict the growth of the market across different regions?

Which opportunities are the major vendors operating in the Internet of Things (IoT) Security Market banking on for the years to come?

About Coherent Market Insights:

Coherent Market Insights is a prominent market research and consulting firm offering action-ready syndicated research reports, custom market analysis, consulting services, and competitive analysis through various recommendations related to emerging market trends, technologies, and potential absolute dollar opportunity.

Contact Us:

Mr. ShahCoherent Market Insights1001 4th Ave,#3200Seattle, WA 98154Tel: +1-206-701-6702Email:sales@coherentmarketinsights.com

Read more:
Internet of Things (IoT) Security Market Report: Regional Data Analysis By Production, Revenue, Price And Gross Margin - Kewaskum Statesman News...

Read More..

What is the quantum internet? Everything you need to know about the weird future of quantum networks – ZDNet

It might all sound like a sci-fi concept, but building quantum networks is a key ambition for many countries around the world. Recently the US Department of Defense (DoE) published the first blueprint of its kind, laying out a step-by-step strategy to make the quantum internet dream come true, at least in a very preliminary form, over the next few years.

The US joined the EU and China in showing a keen interest in the concept of quantum communications. But what is the quantum internet exactly, how does it work, and what are the wonders that it can accomplish?

WHAT IS THE QUANTUM INTERNET?

The quantum internet is a network that will let quantum devices exchange some information within an environment that harnesses the weird laws of quantum mechanics. In theory, this would lend the quantum internet unprecedented capabilities that are impossible to carry out with today's web applications.

SEE: Managing AI and ML in the enterprise 2020: Tech leaders increase project development and implementation (TechRepublic Premium)

In the quantum world, data can be encoded in the state of qubits, which can be created in quantum devices like a quantum computer or a quantum processor. And the quantum internet, in simple terms, will involve sending qubits across a network of multiple quantum devices that are physically separated. Crucially, all of this would happen thanks to the whacky properties that are unique to quantum states.

That might sound similar to the standard internet. But sending qubits around through a quantum channel, rather than a classical one, effectively means leveraging the behavior of particles when taken at their smallest scale so-called "quantum states", which have caused delight and dismay among scientists for decades.

And the laws of quantum physics, which underpin the way information will be transmitted in the quantum internet, are nothing short of unfamiliar. In fact, they are strange, counter-intuitive, and at times even seemingly supernatural.

And so to understand how the quantum ecosystem of the internet 2.0 works, you might want to forget everything you know about classical computing. Because not much of the quantum internet will remind you of your favorite web browser.

WHAT TYPE OF INFORMATION CAN WE EXCHANGE WITH QUANTUM?

In short, not much that most users are accustomed to. At least for the next few decades, therefore, you shouldn't expect to one day be able to jump onto quantum Zoom meetings.

Central to quantum communication is the fact that qubits, which harness the fundamental laws of quantum mechanics, behave very differently to classical bits.

As it encodes data, a classical bit can effectively only be one of two states. Just like a light switch has to be either on or off, and just like a cat has to be either dead or alive, so does a bit have to be either 0 or 1.

Not so much with qubits. Instead, qubits are superposed: they can be 0 and 1 simultaneously, in a special quantum state that doesn't exist in the classical world. It's a little bit as if you could be both on the left-hand side and the right-hand side of your sofa, in the same moment.

The paradox is that the mere act of measuring a qubit means that it is assigned a state. A measured qubit automatically falls from its dual state, and is relegated to 0 or 1, just like a classical bit.

The whole phenomenon is called superposition, and lies at the core of quantum mechanics.

Unsurprisingly, qubits cannot be used to send the kind of data we are familiar with, like emails and WhatsApp messages. But the strange behavior of qubits is opening up huge opportunities in other, more niche applications.

QUANTUM (SAFER) COMMUNICATIONS

One of the most exciting avenues that researchers, armed with qubits, are exploring, is security.

When it comes to classical communications, most data is secured by distributing a shared key to the sender and receiver, and then using this common key to encrypt the message. The receiver can then use their key to decode the data at their end.

The security of most classical communication today is based on an algorithm for creating keys that is difficult for hackers to break, but not impossible. That's why researchers are looking at making this communication process "quantum". The concept is at the core of an emerging field of cybersecurity called quantum key distribution (QKD).

QKD works by having one of the two parties encrypt a piece of classical data by encoding the cryptography key onto qubits. The sender then transmits those qubits to the other person, who measures the qubits in order to obtain the key values.

SEE: The UK is building its first commercial quantum computer

Measuring causes the state of the qubit to collapse; but it is the value that is read out during the measurement process that is important. The qubit, in a way, is only there to transport the key value.

More importantly, QKD means that it is easy to find out whether a third party has eavesdropped on the qubits during the transmission, since the intruder would have caused the key to collapse simply by looking at it.

If a hacker looked at the qubits at any point while they were being sent, this would automatically change the state of the qubits. A spy would inevitably leave behind a sign of eavesdropping which is why cryptographers maintain that QKD is "provably" secure.

SO, WHY A QUANTUM INTERNET?

QKD technology is in its very early stages. The "usual" way to create QKD at the moment consists of sending qubits in a one-directional way to the receiver, through optic-fibre cables; but those significantly limit the effectiveness of the protocol.

Qubits can easily get lost or scattered in a fibre-optic cable, which means that quantum signals are very much error-prone, and struggle to travel long distances. Current experiments, in fact, are limited to a range of hundreds of kilometers.

There is another solution, and it is the one that underpins the quantum internet: to leverage another property of quantum, called entanglement, to communicate between two devices.

When two qubits interact and become entangled, they share particular properties that depend on each other. While the qubits are in an entangled state, any change to one particle in the pair will result in changes to the other, even if they are physically separated.The state of the first qubit, therefore, can be "read" by looking at the behavior of its entangled counterpart. That's right: even Albert Einstein called the whole thing "spooky action at a distance".

And in the context of quantum communication, entanglement could in effect, teleport some information from one qubit to its entangled other half, without the need for a physical channel bridging the two during the transmission.

HOW DOES ENTANGLEMENT WORK?

The very concept of teleportation entails, by definition, the lack of a physical network bridging between communicating devices. But it remains that entanglement needs to be created in the first place, and then maintained.

To carry out QKD using entanglement, it is necessary to build the appropriate infrastructure to first create pairs of entangled qubits, and then distribute them between a sender and a receiver. This creates the "teleportation" channel over which cryptography keys can be exchanged.

Specifically, once the entangled qubits have been generated, you have to send one half of the pair to the receiver of the key. An entangled qubit can travel through networks of optical fibre, for example; but those are unable to maintain entanglement after about 60 miles.

Qubits can also be kept entangled over large distances via satellite, but covering the planet with outer-space quantum devices is expensive.

There are still huge engineering challenges, therefore, to building large-scale "teleportation networks" that could effectively link up qubits across the world. Once the entanglement network is in place, the magic can start: linked qubits won't need to run through any form of physical infrastructure anymore to deliver their message.

During transmission, therefore, the quantum key would virtually be invisible to third parties, impossible to intercept, and reliably "teleported" from one endpoint to the next. The idea will resonate well with industries that deal with sensitive data, such as banking, health services or aircraft communications. And it is likely that governments sitting on top secret information will also be early adopters of the technology.

WHAT ELSE COULD WE DO WITH THE QUANTUM INTERNET?

'Why bother with entanglement?' you may ask. After all, researchers could simply find ways to improve the "usual" form of QKD. Quantum repeaters, for example, could go a long way in increasing communication distance in fibre-optic cables, without having to go so far as to entangle qubits.

That is without accounting for the immense potential that entanglement could have for other applications. QKD is the most frequently discussed example of what the quantum internet could achieve, because it is the most accessible application of the technology. But security is far from being the only field that is causing excitement among researchers.

The entanglement network used for QKD could also be used, for example, to provide a reliable way to build up quantum clusters made of entangled qubits located in different quantum devices.

Researchers won't need a particularly powerful piece of quantum hardware to connect to the quantum internet in fact, even a single-qubit processor could do the job. But by linking together quantum devices that, as they stand, have limited capabilities, scientists expect that they could create a quantum supercomputer to surpass them all.

SEE: Guide to Becoming a Digital Transformation Champion (TechRepublic Premium)

By connecting many smaller quantum devices together, therefore, the quantum internet could start solving the problems that are currently impossible to achieve in a single quantum computer. This includes expediting the exchange of vast amounts of data, and carrying out large-scale sensing experiments in astronomy, materials discovery and life sciences.

For this reason, scientists are convinced that we could reap the benefits of the quantum internet before tech giants such as Google and IBM even achieve quantum supremacy the moment when a single quantum computer will solve a problem that is intractable for a classical computer.

Google and IBM's most advanced quantum computers currently sit around 50 qubits, which, on its own, is much less than is needed to carry out the phenomenal calculations needed to solve the problems that quantum research hopes to address.

On the other hand, linking such devices together via quantum entanglement could result in clusters worth several thousands of qubits. For many scientists, creating such computing strength is in fact the ultimate goal of the quantum internet project.

WHAT COULDN'T WE DO WITH THE QUANTUM INTERNET?

For the foreseeable future, the quantum internet could not be used to exchange data in the way that we currently do on our laptops.

Imagining a generalized, mainstream quantum internet would require anticipating a few decades (or more) of technological advancements. As much as scientists dream of the future of the quantum internet, therefore, it is impossible to draw parallels between the project as it currently stands, and the way we browse the web every day.

A lot of quantum communication research today is dedicated to finding out how to best encode, compress and transmit information thanks to quantum states. Quantum states, of course, are known for their extraordinary densities, and scientists are confident that one node could teleport a great deal of data.

But the type of information that scientists are looking at sending over the quantum internet has little to do with opening up an inbox and scrolling through emails. And in fact, replacing the classical internet is not what the technology has set out to do.

Rather, researchers are hoping that the quantum internet will sit next to the classical internet, and would be used for more specialized applications. The quantum internet will perform tasks that can be done faster on a quantum computer than on classical computers, or which are too difficult to perform even on the best supercomputers that exist today.

SO, WHAT ARE WE WAITING FOR?

Scientists already know how to create entanglement between qubits, and they have even been successfully leveraging entanglement for QKD.

China, a long-time investor in quantum networks, has broken records on satellite-induced entanglement. Chinese scientists recently established entanglement and achieved QKD over a record-breaking 745 miles.

The next stage, however, is scaling up the infrastructure. All experiments so far have only connected two end-points. Now that point-to-point communication has been achieved, scientists are working on creating a network in which multiple senders and multiple receivers could exchange over the quantum internet on a global scale.

The idea, essentially, is to find the best ways to churn out lots of entangled qubits on demand, over long distances, and between many different points at the same time. This is much easier said than done: for example, maintaining the entanglement between a device in China and one in the US would probably require an intermediate node, on top of new routing protocols.

And countries are opting for different technologies when it comes to establishing entanglement in the first place. While China is picking satellite technology, optical fibre is the method favored by the US DoE, which is now trying to create a network of quantum repeaters that can augment the distance that separates entangled qubits.

In the US, particles have remained entangled through optical fibre over a 52-mile "quantum loop" in the suburbs of Chicago, without the need for quantum repeaters. The network will soon be connected to one of the DoE's laboratories to establish an 80-mile quantum testbed.

In the EU, the Quantum Internet Alliance was formed in 2018 to develop a strategy for a quantum internet, and demonstrated entanglement over 31 miles last year.

For quantum researchers, the goal is to scale the networks up to a national level first, and one day even internationally. The vast majority of scientists agree that this is unlikely to happen before a couple of decades. The quantum internet is without doubt a very long-term project, with many technical obstacles still standing in the way. But the unexpected outcomes that the technology will inevitably bring about on the way will make for an invaluable scientific journey, complete with a plethora of outlandish quantum applications that, for now, cannot even be predicted.

View post:
What is the quantum internet? Everything you need to know about the weird future of quantum networks - ZDNet

Read More..

How automation testing stays crucial to the future of Internet of Things (IoT) – Latest Digital Transformation Trends | Cloud News – Wire19

From home appliances and cars to medical equipment, the Internet of Things (IoT) has allowed more and varying types of devices to connect remotely over networks. Quite naturally, the increasing demand for IoT devices is expected to significantly increase the scope of IoT testing as well.

As users become accustomed to connected devices, they will increasingly expect flawless functioning without any downtime. Problems in network connectivity or battery life have the potential to tank the most enterprising IoT startups. Businesses that ensure timely innovation and thorough IoT testing are likely to stay ahead of the competition and emerge as winners.

A diverse set of products entering the IoT market has brought many new challenges for IoT testing. Quality Assurance teams must follow a comprehensive test management strategy to deliver on quality standards and seamless operation.

As IoT grows rapidly, automated testing has emerged as more of a need rather than an alternative. QA teams will need time and expertise to handle dynamic aspects of subtle and varying IoT environments. Instead of looking at standard system functionality, software testers need to validate device security and operation in both usual and unusual situations.

However, test automation can add significant value and reduce time and effort in your IoT testing.

There are specialized IoT testing service providers and enterprises that deliver end-to-end QA solutions. Heres a look at two portfolios of automation testing in IoT.

While best practices will vary for different kinds of IoT testing, general principles can be drawn from common scenarios.

Choosing the right equipment that supports IoT device testing for various application use cases is no easy task. You need to evaluate hardware QA needs for each stage right from R&D to installation, maintenance and support.

Having access to the right test equipment affects test speed and coverage. One example is wireless (Wi-Fi) testing. Routing systems installed for wireless networks are verified and aligned for proper RF, reliability, and signaling performance. Service providers can plan, optimize, and benchmark entire networks using appropriate Wi-Fi test equipment.

Its entirely possible that the IoT test equipment you need are not high-end or immensely expensive; talk to your team to understand the exact need and then shortlist test equipment.

Another option is to rent or lease test equipment, so that your business does not miss out on the latest tech in the market. IoT test equipment for device manufacturers are available for simulation and design, battery life testing, signal and power integrity testing, connectivity testing, network readiness and performance assessment, security and more.

IoT applications and devices promise tremendous advancements and benefits to both end-users and entire industries. However, handling the multi-layered complexities of IoT and staying ahead in connectivity, compatibility, interoperability, and security will be no mean task.

Businesses need to be alert and prepared as IoT devices will continue being exposed to different types of security risks. IoT testing will, therefore, assume increasing significance in the days ahead the uninterrupted transmission of real-time data depends on QA that helps reduce time to market, mitigate risk, and meet ROI goals.

Read Next: IoT security comparison: Alibaba Cloud, AWS, Azure, Google Cloud, IBM Cloud

Read this article:
How automation testing stays crucial to the future of Internet of Things (IoT) - Latest Digital Transformation Trends | Cloud News - Wire19

Read More..