Page 3,417«..1020..3,4163,4173,4183,419..3,4303,440..»

The ability to hear, be heard and be understood is vital The importance of audio communication devices in security – IFSEC Global

IFSEC Global sits down with Lars Paulsson and Erik Hoffmann from audio communications expert Zenitel, to discuss why networked audio devices are becoming an integral part of the security and safety ecosystem.

No longer do security systems simply comprise a lone CCTV camera generating distorted feedback to a security guard. Instead, integrated solutions work together to ensure access control systems and surveillance cameras provide a much more well-rounded and responsive information management platform, communicating between each other and offering genuine insight into risks and potential breaches.

And increasingly it seems, network audio solutions are becoming a key part of this process. As a communication device, it can provide the final piece of the jigsaw to ensure security and safety measures are met, with devices now more interoperable with access control and surveillance platforms than ever before.

This, explains Zenitel, is why businesses need to be considering the use of audio devices to operate within their own systems. As technology continues to evolve, the company believes that audio is set to play a key role in the future of biometric systems and everyday life, with audio analytics playing a major part.

Its certainly a belief met by those in the likes of Silicon Valley, too. Worldwide shipments of smart audio devices reached nearly 100 million units in Q1 2020, while Amazons Alexa and Apples Siri are now as much household names as Dyson and Sky TV.

Why then, is an integrated audio solution so beneficial to an overall security system? Put simply, communication, answers Lars Paulsson, Executive Vice President at Zenitel. For any security team, this is vital. Any security and safety system ultimately needs three key parts: access control, video surveillance and the ability to communicate.

We now have integrations with all the major platforms in the security industry our solutions are interoperable and therefore easy to combine with VMS platforms from major vendors such as Genetec and Milestone, as well as access control systems from AMAG, LenelS2 and many others. Were committed to the open standards route, so customers are able to provide the most well-rounded system to provide the highest levels of security and safety.

And the quality in our audio systems is now excellent, so end-users no longer need to be concerned with muffled tones or poor-quality sound, which could result in miscommunication.

Cyber security remains a concern for many when adding new devices to networks. Hackers are always on the lookout for devices on internal networks that may be vulnerable to attack, often utilising backdoors in physical security devices to gain access to the entire system. Working with major customers in sectors such as healthcare and transport, Zenitel is quick to highlight its work in this sphere.

Weve been driving cyber security initiatives in our products for several years, explains Erik Hoffmann, Head of Product Management. It is crucial that installers and end-users can be confident that when integrating our audio devices onto a network, it will be robust and well protected both in the physical and cyber environments. Were a member of the for Internet Security and were one of the first to implement CIS controls into audio devices.

While its taken a little longer than its surveillance counterpart, audio devices have experienced a revolution in connectivity and integration with other systems since the move to an IP-based solution, as Zenitels Head of Product Management, Erik Hoffmann, explains.

We launched the first major IP/SIP-based products around 2006. Since then more and more devices have been able to integrate into a single system. As well as being quicker and more advanced than analogue systems, the move has enabled greater integration with partner technologies, such as video management services and access control systems.

Going forwards, were now moving on to utilising edge architecture. Edge devices are far more powerful and advanced than weve previously seen, in a cost-efficient way. This wont take away from the importance of the cloud or the local server, but instead edge solutions will leverage the strengths of computing in the cloud and at the edge bringing unprecedented levels of security, scalability and resilience.

Like many industries, COVID-19 has had an impact on the sector though Lars and Erik believe this could actually result in a greater uptake of networked audio systems. As a touchless method of communication to relay information to occupants, it provides an easy method for interaction.

Lars expands on this point: We certainly believe there will be a growing uptake of biometric and touchless devices, of which audio can form a key part of such a solution. I believe this will be because of two key developments. There is the need to interact and communicate with individuals moving in and out of spaces, and with this comes the need to provide frictionless access without physical intervention. Audio provides a solution to both challenges.

Its not just COVID, either, that is set to affect the growth in the audio market. While analytics have been a relatively standardised part of video surveillance devices for some time now, it would appear audio is now receiving investment in this field.

It took some time for users to really understand and utilise analytics in video, because the concept was relatively new to many. However, with customers now more aware of this type of technology, audio analytics is proving beneficial almost straight away. Were now working with technology partners who can provide possibilities such as voice identification, mood identification (where tone and volume of speech is assessed) and gunshot identification, explains Erik.

Speaking to Lars and Erik, it appears that networked audio devices are set to play an increasingly important role in the entire security and safety ecosystem. As Lars summarises: The ability to hear, be heard and be understood is crucial to the role of all security professionals, in all environments.

Find out more about Zenitels network audio solutions.

Read more here:
The ability to hear, be heard and be understood is vital The importance of audio communication devices in security - IFSEC Global

Read More..

Wrap your ears around Episode 451 of the Two Blokes Talking Tech podcast – Tech Guide

Join the Two Blokes Talking Tech Tech Guide editor Stephen Fenech and EFTMs Trevor Long for Episode 451 of the entertaining and informative podcast which discusses the weeks biggest tech stories and products.

On this weeks show, Hisense unveils Dual Cell TV, Fitbit releases new range of devices, Google offer Duo for Android TVs, Norton internet security adds Dark Web monitoring, LG introduce Tone Free earbuds with a UV case that can kill germs and we get the first look at Call of Duty Black Ops Cold War.

You can listen to the show right here on the Tech Guide site using the audio player below.

Click on the Two Blokes Talking Tech link at the top of the page and youll be able to find earlier episodes of Two Blokes Talking Tech to listen to.

It is also possible to subscribe to the popular weekly tech podcast onApple Podcasts.

Stephen is the Tech Guide editor and one of Australia's most respected tech journalists. He is a regular on radio and TV talking about the latest tech news, products and trends.

Read more here:
Wrap your ears around Episode 451 of the Two Blokes Talking Tech podcast - Tech Guide

Read More..

Taking stock of the Chinese factor in American elections – Arab News

There is no doubt that Beijing will attempt to take advantage of developments in US politics until and after the presidential election in November.There are complex opportunities for China to conduct a wide range of activities against Washington and its allies. The US, meanwhile, will be putting up defensive walls, coordinating with allies and aiding them as a countermeasure to Chinas typical interfering strategies.US counterintelligence officials have found that foreign states are using covert and overt influence measures to sway the vote. They said that China does not want Donald Trump to be re-elected, while Russia wants to damage the chances of Democratic challenger Joe Biden. More generally, foreign powers are trying to sway voter preferences, change US policies, increase discord in the country and undermine the American peoples confidence in our democratic process.The counterintelligence report stated that China prefers that President Trump whom Beijing sees as unpredictable does not win re-election, and has been expanding its influence efforts. However it added that it would be difficult for our adversaries to interfere with or manipulate voting results at scale.The relationship between the US and China, the worlds largest economies, is confrontational in nature. It was already strained before the coronavirus outbreak as a result of Asian security issues, in particular Chinas expansion of its maritime interests and threats to neighbors.Two years ago, Trump began escalating a trade dispute with Beijing that has now deteriorated into retaliatory tariffs and become a trillion-dollar trade war. Meanwhile, the pandemic has caused an economic slowdown in the US that has the Trump campaign worried about his chances of re-election.China knows that applying additional pressure on trade in the run-up to the election could hurt Trumps chances, so it is no surprise that this is exactly what it is doing. Beijing is reported to have a history of interfering in US elections. Intelligence agencies concluded that Chinese hackers meddled in the 2016 presidential election and the 2018 midterms. Internet security experts said there are signs that hackers linked to China are engaged in attacks on US political targets ahead of this years poll.While some other countries, including Russia and Iran, might also be identified as having an interest in undermining the election by creating strategic distractions and tactical challenges, carrying out cyberattacks and disinformation campaigns and, perhaps, engineering confrontations in international maritime waters, Beijing is challenging US to a greater extent than usual because of the pandemic.China is emerging from the first wave of infections while much of the West continues to suffer. Beijing is using this to apply pressure through mechanisms such as aid programs, and in its negotiating tactics. The ultimate aim is to influence the US election so that the unpredictable Trump is defeated.China denies US claims that it hacks American businesses, politicians or government agencies. The US presidential election is an internal affair (and) we have no interest in interfering in it, said Foreign Ministry spokesman Geng Shuang. This is, of course, a common response by Washingtons rivals during US election cycles.

Trump might sense an opportunity to boost his chances by turning up the heat on China or its interests just to goad Beijing. If so, Chinas response will be critical.

Dr. Theodore Karasik

Chinese leaders have long emphasized the importance of influencing foreign public opinion as part of their strategic doctrine. In 2006, President Hu Jintao said China must strengthen the construction of foreign-related media and networks that promote the country. He called for the Chinese to innovate in foreign propaganda methods and strengthen external propaganda in a language that is easily understood and accepted by the public in other countries. He also underlined the need for China to do a good job with work in the Western mainstream media to increase trust and dispel doubts about the nations rise. Such words, coupled with advanced information-warfare tools, help to augment well-planned campaigns that take advantage of online resources.Chinas aggressive posture toward the US during the upcoming election might require some uncomfortable decisions. Trump might sense an opportunity to boost his chances by turning up the heat on China or its interests just to goad Beijing. If so, Chinas response will be critical.

Disclaimer: Views expressed by writers in this section are their own and do not necessarily reflect Arab News' point-of-view

See more here:
Taking stock of the Chinese factor in American elections - Arab News

Read More..

How to choose and set up a business VPN – TechRadar

Safety and security remain essential goals while online, especially when employees are conducting business activities. After all, so many businesses suffer security breaches, and these types of attacks on businesses are on the rise.

A VPN, or virtual private network is a way to route communications through a network of private servers via an encrypted tunnel, rather than just by using the public internet.

And having a business VPN established is an essential step for employees to be able to enhance their internet activities. They allow more secure communication, anonymity, and the ability to bypass geo-restrictions to be able to conduct business with ease in other countries.

When talking about business VPNs, they can generally be divided into two types. The first is client-to-site, where an individual user via their PC (or other device) connects to the VPN provider, which secures the business network from the public environment. The second is site-to-site, which is for remote access VPN connections between entirely different networks.

There is also a key difference between a personal VPN and a corporate VPN. With a personal VPN, a consumer gets their individual connection to access the internet with their device. While they gain privacy, and anonymity, this does not offer the additional benefits that a business would need from their VPN connection.

Rather, with a business VPN (also known as a corporate VPN), the goal is to be able to have employees be able to connect, securely and privately to the corporate network, whether when working from home, or at a satellite location. These employees also need the privacy that an encrypted connection provides, but in addition, benefit from access to the shared resources on a corporate server, typically work files.

Previously, most companies set up their business VPN by running their own corporate server. This has the downsides of needing a server up and running 24/7, with the need for dedicated IT support, and the requirement of administering this network. This is referred to as an On-premises Deployment.

The more modern solution is to outsource all of this to a cloud VPN provider. This makes things much simpler, as there is no need to run a server locally at the business, as it gets run by the provider.

Not every VPN provider offers the option for a business VPN, but some larger ones do. Perimeter 81 and NordVPN Teams are two prime examples of those that do.

The offering from Perimeter 81 is excellent - particularly if you and your team tend to work frequently with multiple devices. Its zero-trust network and customizable secure systems means that security is second-to-none, while the feature list goes on and on. Plus it gives you the flexibility to choose the ideal plan for you from a number of options.

With NordVPN, its business-centric features include using existing business credentials, so there is no need to create new password credentials. It also includes priority support, that works at the speed of your business, with the promise to assist within three hours. It has a centralized control panel which allows management of every user account from a single location. Finally, it allows for secure remote access of company resources, and can protect all platforms, from phones, to computers and laptops.

Perhaps most importantly, using a business VPN from a cloud provider makes it quite simple, as they do the heavy lifting on their end.

Compare the best overall VPNs for business and consumers:

Here is the original post:
How to choose and set up a business VPN - TechRadar

Read More..

Internet Grows to 370.1 Million Domain Name Registrations at the End of the Second Quarter of 2020 – Social News XYZ

Home General Internet Grows to 370.1 Million Domain Name Registrations at the End of the Second Quarter of 2020

Business Wire IndiaVeriSign, Inc. (NASDAQ: VRSN), a global provider of domain name registry services and internet infrastructure, today announced that the second quarter of 2020 closed with 370.1 million domain name registrations across all top-level domains (TLDs), an increase of 3.3 million domain name registrations, or 0.9 percent, compared to the first quarter of 2020.1,2 Domain name registrations have grown by 15.3 million, or 4.3 percent, year over year.1,2

The .com and .net TLDs had a combined total of 162.1 million domain name registrations in the domain name base3 at the end of the second quarter of 2020, an increase of 1.4 million domain name registrations, or 0.9 percent, compared to the first quarter of 2020. The .com and .net TLDs had a combined increase of 6.0 million domain name registrations, or 3.8 percent, year over year. As of June 30, 2020, the .com domain name base totaled 148.7 million domain name registrations, and the .net domain name base totaled 13.4 million domain name registrations.

New .com and .net domain name registrations totaled 11.1 million at the end of the second quarter of 2020, compared to 10.3 million domain name registrations at the end of the second quarter of 2019.

Verisign publishes the Domain Name Industry Brief to provide internet users throughout the world with statistical and analytical research and data on the domain name industry. The second quarter 2020 Domain Name Industry Brief can be obtained at Verisign.com/DNIB.

About Verisign

Verisign, a global provider of domain name registry services and internet infrastructure, enables internet navigation for many of the worlds most recognized domain names. Verisign enables the security, stability, and resiliency of key internet infrastructure and services, including providing root zone maintainer services, operating two of the 13 global internet root servers, and providing registration services and authoritative resolution for the .com and .net top-level domains, which support the majority of global e-commerce. To learn more about what it means to be Powered by Verisign, please visit Verisign.com.

VRSNF

2020 VeriSign, Inc. All rights reserved. VERISIGN, the VERISIGN logo, and other trademarks, service marks, and designs are registered or unregistered trademarks of VeriSign, Inc. and its subsidiaries in the United States and in foreign countries. All other trademarks are property of their respective owners.

1 The figure(s) includes domain names in the .tk country-code TLD (ccTLD). .tk is a free ccTLD that provides free domain names to individuals and businesses. Revenue is generated by monetizing expired domain names. Domain names no longer in use by the registrant or expired are taken back by the registry and the residual traffic is sold to advertising networks. As such, there are no deleted .tk domain names. https://www.businesswire.com/news/home/20131216006048/en/Freenom-Closes-3M-Series-Funding#.UxeUGNJDv9s.

2The generic top-level domain (gTLD) and ccTLD data cited in the brief: (i) includes ccTLD Internationalized Domain Names (IDNs), (ii) is an estimate as of the time the brief was developed and (iii) is subject to change as more complete data is received. Some numbers in the brief may reflect standard rounding.

3 The domain name base is the active zone plus the number of domain names that are registered but not configured for use in the respective TLD zone file plus the number of domain names that are in a client or server hold status. The .com and .net domain name registration figures are as reported in Verisigns most recent SEC filings.

View source version on businesswire.com:https://www.businesswire.com/news/home/20200827005704/en/

Like Loading...

Related

Read the original:
Internet Grows to 370.1 Million Domain Name Registrations at the End of the Second Quarter of 2020 - Social News XYZ

Read More..

Internet of Things Security Market Analysis by Size, Share, Growth, Latest Innovation, Trends and Forecast 2019 2025 – Scientect

The global Internet of Things Security Market Report offers valuable data on this report with the aid of fragmenting the market into different segments. Various vital elements are covered in the global Internet of Things Security Market research report, including regional industry perspectives, geographic developments, country-level assessment, competitive environment, market share analysis of companies, and top company proreports.

This report presents the worldwide Internet of Things Security market size (value, production and consumption), splits the breakdown (data status 2019 and forecast to 2025), by manufacturers, region, type and application.This study also analyzes the Internet of Things Security market status, market share, growth rate, future trends, market drivers, opportunities and challenges, risks and entry barriers, sales channels, distributors and Porters Five Forces Analysis.The report presents the market competitive landscape and a corresponding detailed analysis of the major vendor/key players in the Internet of Things Security market.

For more insights into the Market, request a sample of this report (Including Full TOC, List of Tables & Figures, Chart) @ https://www.researchmoz.com/enquiry.php?type=S&repid=2736433&source=atm

The report provides a valuable source of insightful data for business strategists and competitive analysis of Internet of Things Security market. It provides the Internet of Things Security industry overview with growth analysis and futuristic cost, revenue and many other aspects. The research analysts provide an elaborate description of the value chain and its distributor analysis. This extensive Internet of Things Security study provides comprehensive data which enhances the understanding, scope and application of this report.

segment by Type, the product can be split intoManaged ServicesProfessional ServicesConsulting ServicesSupport MaintenanceIntegration ServicesMarket segment by Application, split intoSmart RetailConnected VehiclesSmart Government and DefenseConnected HealthcareConsumer WearablesConnected LogisticsSmart Energy and UtilitiesSmart Manufacturing

Market segment by Regions/Countries, this report coversNorth AmericaEuropeChinaJapanSoutheast AsiaIndiaCentral & South America

For Information On The Research Approach Used In The Report, Ask to Our Industry [emailprotected] https://www.researchmoz.com/enquiry.php?type=E&repid=2736433&source=atm

Regional Analysis for Internet of Things Security Market:

For comprehensive understanding of market dynamics, the global Internet of Things Security market is analyzed across key geographies namely: United States, China, Europe, Japan, and Rest of the World (South-east Asia, India, and others). Each of these regions is analyzed on basis of market findings across major countries in these regions for a macro-level understanding.

Influence of the Internet of Things Security market report:

-Comprehensive assessment of all opportunities and risk in the Internet of Things Security market.

Internet of Things Security market recent innovations and major events.

-Detailed study of business strategies for growth of the Internet of Things Security market-leading players.

-Conclusive study about the growth plot of Internet of Things Security market for forthcoming years.

-In-depth understanding of Internet of Things Security market-particular drivers, constraints and major micro markets.

-Favorable impression inside vital technological and market latest trends striking the Internet of Things Security market.

You can Buy This Report from Here @ https://www.researchmoz.com/checkout?rep_id=2736433&licType=S&source=atm

The report has 150 tables and figures browse the report description and TOC:

Table of Contents

1 Study Coverage

1.1 Internet of Things Security Product

1.2 Key Market Segments in This Study

1.3 Key Manufacturers Covered

1.4 Market by Type

1.4.1 Global Internet of Things Security Market Size Growth Rate by Type

1.5 Market by Application

1.5.1 Global Internet of Things Security Market Size Growth Rate by Application

2 Executive Summary

2.1 Global Internet of Things Security Market Size

2.1.1 Global Internet of Things Security Revenue 2014-2025

2.1.2 Global Internet of Things Security Production 2014-2025

2.2 Internet of Things Security Growth Rate (CAGR) 2019-2025

2.3 Analysis of Competitive Landscape

2.3.1 Manufacturers Market Concentration Ratio

2.3.2 Key Internet of Things Security Manufacturers

2.3.2.1 Internet of Things Security Manufacturing Base Distribution, Headquarters

2.3.2.2 Manufacturers Internet of Things Security Product Offered

2.3.2.3 Date of Manufacturers in Internet of Things Security Market

2.4 Key Trends for Internet of Things Security Markets & Products

3 Market Size by Manufacturers

3.1 Internet of Things Security Production by Manufacturers

3.1.1 Internet of Things Security Production by Manufacturers

3.1.2 Internet of Things Security Production Market Share by Manufacturers

3.2 Internet of Things Security Revenue by Manufacturers

3.2.1 Internet of Things Security Revenue by Manufacturers (2019-2025)

3.2.2 Internet of Things Security Revenue Share by Manufacturers (2019-2025)

3.3 Internet of Things Security Price by Manufacturers

3.4 Mergers & Acquisitions, Expansion Plans

More Information.

For More Information Kindly Contact:

ResearchMoz

Mr. Rohit Bhisey,

90 State Street,

Albany NY,

United States 12207

Tel: +1-518-621-2074

USA-Canada Toll Free: 866-997-4948

Email: [emailprotected]

Link:
Internet of Things Security Market Analysis by Size, Share, Growth, Latest Innovation, Trends and Forecast 2019 2025 - Scientect

Read More..

The TikTok Ban Should Worry Every Company – Harvard Business Review

Executive Summary

While the proposed U.S. ban of the social media app TikTok may seem novel, its actually just the most recent high-profile incident in a string of cases of countries banning products or services over alleged cybersecurity concerns. The authors have studied more than 75 such events involving more than 31 countries going back almost 20 years. They suggest that the current trend should worry any business with an international scope, and suggest thatbusiness executives need to not only follow the best practices to improve the cybersecurity of their digital product and services, they must also prepare for political risks. Managers, as well as consumers, may encounter extreme disruptions to international trade.

Earlier this summer, the U.S. government announced it was considering banning Chinese social media apps, including the popular app TikTok. In August, President Trump signed two executive orders to block transactions with ByteDance, TikToks parent company, and Tencent, which owns the popular messaging service and commercial platform WeChat, andanother executive orderrequiring ByteDanceto sell or spin off its U.S. TikTok business within 90 days, as well as to destroy all its copies of TikTok data attached to U.S. users. As companies including Microsoft, Walmart, and Oracle have expressed interest in buying the app,TikTok is suing the U.S. government, accusing the Trump administration of depriving it of due process.

The proposed ban, according to the Trump administration, is intended to safeguard the privacy of U.S. citizens and shield data about them and government officials from the Chinese government. Trumps August 6 executive order claims TikTok could allow China to track the locations of Federal employees and contractors, build dossiers of personal information for blackmail, and conduct corporate espionage. But, is TikTok really a threat? And if it is, what are the possible consequences of these actions by the U.S.?

As researchers who have studied similar bans on technologies, we believe that this chain of events could have sweeping impacts on the business community, which will likely not be confined to the tech sector.

If data collection by a company with overseas connections comprises a threat, there are threats all around. The data that TikTok collects pales in comparison to, say, what most American tech companies (as well as banks, credit agencies, and hotels) collect, both visibly and less so. Many institutions that collect sensitive data have already been hacked it is estimated that there is a cyber attack every 39 seconds and much of that information is for sale on the Dark Web. If the Chinese government wanted the kind of information TikTok could collect, it could be obtained in many other ways.

What will likely prove a more pressing threat to U.S. customers is much more low-tech: Setting a precedent of banning everyday technologies could quickly spiral out of control and seriously disrupt almost all international trade.

While the case against TikTok may seem novel, its actually just the most recent high-profile incident in a string of cases of countries banning products or services over alleged cybersecurity concerns. In our research, we have studied more than 75 such events involving more than 31 countries going back almost 20 years, though most occurred in the past five years. For example, in 2017, Germany bannedMy Friend Carly a doll from the U.S. that you could talk to you because the conversation was processed by servers in the U.S. In 2016, Russia blocked access to LinkedIn, stating that LinkedIn refused to store personal data of Russian users in Russia. In 2017 U.S. blocked the Russian security company Kaspersky over its alleged ties to the Russian government.

These cases build on a trend of high-profile bans, such as when China blocked Facebook, Twitter, and Google (2009), and when BlackBerry was banned or threatened with a ban in India, Pakistan, Saudi Arabia, and United Arab Emirates (2010).

Because any product that contains a computer or service that uses a computer nowadays just about everything can introduce cybersecurity risks, the frequency and impact of these events is increasing. (My electronic toothbrush has a computer in it and is connected to the Internet.) Examining the millions of lines of software or firmware in these products and services is not currently feasible, therefore decisions are made based on the perceived risks, which can be impacted by factors such as trust and capability to manage cybersecurity risks. There have been restrictions imposed on products and services as diverse as: medical devices, videoconference services, software products, security software, social media, security cameras, banking IT systems, drones, smartphones, smart toys, online content services, satellite communications, AI software, and financial services such as international fund transfers and payment systems.

According to the Organization for Economic Cooperation and Developments Digital Trade Service Restrictiveness Index, 13 of the 46 majority economies have increased their digital trade restrictions between 2014 and 2019, while only four countries reduced their restrictions.

In general, there are four strategies for managing risks: accept, avoid, mitigate, and transfer. There aremany practical options that countries and companies can adopt to manage cybersecurity risks from cross-border digital products/services. Unfortunately, banning products is becoming increasingly common and doesnt appear to be a particularly sustainable strategy.

The proposed ban reinforces a growing belief that America is no longer the leading guarantor of global business, but rather a potential threat to it a notion that is profoundly reshaping the world economy and threatening American businesses. TikTok and WeChat both have massive user bases (800 million and close to 1.2 billion, respectively). Removing WeChat from the Apple Store could cause Apples iPhone sales to fall by around 30% according to one prominent analyst. In an August call with White House officials, more than a dozen major U.S. multinational companies raised concerns that banning WeChat could undermine their competitiveness in the Chinese market.

The second-order cost of sabotaging the international business environment with these policies could be much higher:86% of companies in the U.S.-China Business Council have reported experiencing negative impacts on their business with China. The biggest impact was lost sales because customers shift their suppliers or sourcing due to uncertainty of continued supply. Companies worried about a U.S. ban may just initiate aDe-Americanization plan to remove or replace U.S. components in their products and supply chains. For example, in February 2019, WorldFirst, a U.K-based international money transfer service that many big Amazon sellers relied on, closed its U.S. business as a precursor to its acquisition by Chinese-based Ant Financial. This was considered the only way to avoid U.S. regulators blocking the deal over national security concerns. On the other hand, the Chinese company Hikvision found alternatives to most of its U.S. components so that being added to the U.S. trade blacklist had a limited impact on its business.

Business executives need to realize that in addition to following the best practices to reduce the perceived cybersecurity risks from their digital product/services, preparing for political risks is also necessary. TikTok implemented several practices to mitigate the risks, including: storing U.S. user data in the U.S. and backing it up on Singaporean servers, blocking access to its data from its mother company ByteDance, hiring an American CEO and operations team, beefing up its lobbying team, withdrawing from Hong Kong based on the concerns over Chinas new national security law, launching a transparency center for moderation and data practices in Los Angeles, banning political and advocacy advertising from its platform, and setting up a global headquarters outside of China. TikTok and its employees are preparing to battle the ban in separate lawsuits.

Though these practices have not yet helped TikTok to void the ban, they will probably be major arguments in its lawsuit against the U.S. Furthermore, these practices may be important directions that all companies might need to follow for doing international business in the new normal to address concerns over cybersecurity risks.

In reality, banning is more likely to increase not reduce risk, because it builds up distrustamong countries and companies. Other countries may retaliate by banning U.S. companies and the situation could rapidly spiral.

In recent years, governments have tried to increase their ability to access the data contained on these devices and services. For example, WhatsApp advertises that it secures your conversations with end-to-end encryption, which means your messages and status updates stay between you and the people you choose. But, several times, most recently in October 2019, the U.S., UK and Australia have applied pressure on Facebook to create backdoors that would allow access to encrypted message content. So far, Facebook and WhatsApp have refused. If such backdoors are allowed and become commonplace, then every Internet-connected device will essentially be a spy device and likely be banned by every other country.

The abuse of national security threat is snowballing and leading to an escalating trade war that could disrupt world trade. We saw a similar situation caused by the Smoot-Hawley Tariffs in the 1930s. The goal was to protect U.S. farmers and other industries that were suffering during the Great Depression by raising tariffs and discouraging import of products from other countries. But, not surprisingly, almost all of the U.S. trade partners retaliated and raised their tariffs. That resulted in U.S. imports decreasing 66%and exports decreasing 61% making the Great Depression much greater. In general, there are rarely winners in trade wars, and probably not in cyber trade wars.

Acknowledgement: This research was supported, in part, by funds from the members of the Cybersecurity at MIT Sloan (CAMS) consortium and the MIT Internet Research Policy Initiative. Both authors contributed equally.

More:
The TikTok Ban Should Worry Every Company - Harvard Business Review

Read More..

TLS and VPN Flaws Offer Most Pen Tester Access – Infosecurity Magazine

Vulnerabilities in transport layer security and exposure to a 10-year-old botnet are the most common findings from penetration testing engagements.

According to data from investigations between June 2019 to June 2020 from 206 engagements by Rapid7, internal network configurationandpatch managementcontinue to provide easy soft targets to penetration testers,who can often use off-the-shelf commodity attacks to escalate privileges and move laterally about the network without being detected. It also found that issues with EternalBlue and Conficker are still not being excised from internal networks.

According to Tod Beardsley, research director at Rapid7, over the 12 months work, it also found password management and secondary controls such as two-factor authentication are severely lacking on the enterprise level, leading to easy compromises involving both password spraying and decrypting hashed passwords acquired during simulated breaches.

Also as there is more dependence on VPNs and internet-based applications, rather than traditional internal network controls, penetration testers were finding significant flaws in those VPN terminators and custom web apps.

While none of this is particularly shocking to even the most Pollyanna security researcher (we are a cynical bunch), this is solid data that can help enterprises around the world understand what to expect from their next penetration test and be used as a checklist of what to investigate and remediate before then, he said.

The report also found two vulnerabilities as pretty standard go-tos for any internally scoped network assessment. These were MS08-067, which was weaponized in the Conficker exploit back in 2008, and MS17-10, which was the central vulnerability to the EternalBlue exploit kit of 2017.

These two issues are among the famous vulnerabilities of the past decade, so you would think that IT and IT security teams would have long ago excised these vulnerabilities from their internal networks, Beardsley said.

Mark Kedgley, CTO at New Net Technologies, told Infosecurity he felt the cause of EternalBlue and Conficker still being so prominent because of the numbers of Windows-based systems that cannot easily be upgraded or even patched, such as EPoS and ATM systems.

Even within the UK NHS, one of the highest profile victims of WannaCry, there are reports of still widespread use of Windows 7 due to budget and the practical challenges of large-scale IT, Kedgley said. Its clear then upgrading and patching systems is a big challenge and while this remains the case, exploitable, known vulnerabilities will still be present and a threat. Other security controls, such as change control and breach detection, can play a role in compensating for environments where patching is an issue.

Also, the top vulnerabilities encountered by external penetration testers were: weak transport layer security(10.48%), weak password policy(7.08%), missing strict-transport-security (STS) response headers(6.23%), user enumeration(5.67%).

Kedgley said: Public websites are naturally prone to attack. Therefore, this has been a critical security risk ever since older TLS implementations were found to be weak and prone to compromise. The PCI DSS outlawed SSL and early TLS versions five years ago as it was known then this was a major problem for virtually every website.

TLS 1.3 will plug the holes known in earlier versions, but the same issues apply in that just having a patch or update available doesnt make us secure its only when it is fully implemented and tested that the attack surface is fixed.

Go here to see the original:
TLS and VPN Flaws Offer Most Pen Tester Access - Infosecurity Magazine

Read More..

Getting to the heart of machine learning and complex humans – The Irish Times

You recently made a big discovery that an academic library containing millions of images used to train artificial intelligence systems had privacy and ethics issues, and that it included racist, misogynistic and other offensive content.

Yes, I worked on this with Vinay Prabhu a chief scientist at UnifyID, a privacy start-up in Silicon Valley on the 80-million images dataset curated by Massachusetts Institute of Technology. We spent about months looking through this dataset, and we found thousands of images labelled with insults and derogatory terms.

Using this kind of content to build and train artificial intelligence systems, including face recognition systems, would embed harmful stereotypes and prejudices and could have grave consequences for individuals in the real world.

What happened when you published the findings?

The media picked up on it, so it got a lot of publicity. MIT withdrew the database and urged people to delete their copies of the data. That was humbling and a nice result.

How does this finding fit in to your PhD research?

I study embodied cognitive science, which is at the heart of how people interact and go about their daily lives and what it means to be a person. The background assumption is that people are ambiguous, they come to be who they are through interactions with other people.

It is a different perspective to traditional cognitive science, which is all about the brain and rationality. My research looks at how artificial intelligence and machine learning has limits in how it can understand and predict the complex messiness of human behaviour and social outcomes.

Can you give me an example?

If you take the Shazam app, it works very well to recognise a piece of music that you play to it. It searches for the pattern of the music in a database, and this narrow search suits the machine approach. But predicting a social outcome from human characteristics is very different.

As humans we have infinite potentials, we can react to situations in different ways, and a machine that uses numerable parameters cannot predict whether someone is a good hire or at risk of committing a crime in the future. Humans and our interactions represent more than just a few parameters. My research looks at existing machine learning systems and the ethics of this dilemma.

How did you get into this work?

I started in physics back home in Ethiopia, but when I came to Ireland there was so much paperwork and so many exams to translate my Ethiopian qualification that I decided to start from scratch.

So I studied psychology and philosophy and I did a masters [masters course had lots of elements neuroscience, philosophy, anthropology, and computer science, where we built computational models of various cognitive faculties and it is where I really found my place.

How has Covid-19 affected your research?

At the start of the pandemic, I thought this might be a chance to write up a lot of my project, but I found it hard to work at home and to unhook my mind from what was going on around the world.

I also missed the social side, going for coffee and talking with my colleagues about work and everything else. So I am glad to be back in the lab now and seeing my lab mates even at a distance.

See the rest here:
Getting to the heart of machine learning and complex humans - The Irish Times

Read More..

AI and Machine Learning Network Fetch.ai Partners Open-Source Blockchain Protocol Waves to Conduct R&D on DLT – Crowdfund Insider

The decentralized finance (DeFi) space is growing rapidly. Oracle protocols like Chainlink, BAND and Gravity have experienced a significant increase in adoption in a cryptocurrency market thats still highly speculative and plagued by market manipulative and wash trading.

Fetch.ai, an open-access machine learning network established by former DeepMind investors and software engineers, has teamed up with Waves, an established, open-source blockchain protocol that provides developer tools for Web 3.0 applications.

As mentioned in an update shared with Crowdfund Insider:

[Fetch.ai and Waves will] conduct joint R&D for the purpose of bringing increased multi-chain capabilities to Fetch.ais system of autonomous economic agents (AEA). [They will also] push further into bringing DeFi cross-chain by connecting with Waves blockchain agnostic and interoperable decentralized cross-chain and oracle network, Gravity.

As explained in the announcement, the integration with Gravity will enable Fetch.ais Autonomous Economic Agents to gain access to data sources or feeds for several different market pairs, commodities, indices, and futures.

Fetch.ai and Waves aim to achieve closer integration with Gravity in order to provide seamless interoperability to Fetch.ai, making its blockchain-based AI and machine learning (ML) solutions accessible across various distributed ledger technology (DLT) networks.

As stated in the update, the integration will help with opening up new ways for all Gravity-connected communities to use Fetch.ais ML functionality within the comfort of their respective ecosystems.

As noted in another update shared with CI, a PwC report predicts that AI and related ML technologies may contribute more than $15 trillion to the world economy from 2017 through 2030. Gartner reveals that during 2019, 37% of organizations had adopted some type of AI into their business operations.

In other DeFi news, Chainlink competitor Band Protocol is securing oracle integration with Nervos, which is a leading Chinese blockchain project.

As confirmed in a release:

Nervos is a Chinese public blockchain thats tooling up for a big DeFi push. The project is building DeFi platforms with China Merchants Bank International and Huobi, and also became one of the first public blockchains to integrate with Chinas BSN. Amid the DeFi surge, Nervos is integrating Bands oracles to give developers access to real-world data like crypto price feeds.

Link:
AI and Machine Learning Network Fetch.ai Partners Open-Source Blockchain Protocol Waves to Conduct R&D on DLT - Crowdfund Insider

Read More..