Page 3,495«..1020..3,4943,4953,4963,497..3,5003,510..»

IT spending on Internet connectivity, security to rise in India: Report – Business Insider India

New Delhi, July 6 (IANS) While overall IT budget is likely to reduce by four per cent on average amid Covid-19 pandemic, Indian enterprises will increase spending on Internet connectivity, security solutions and networking products, a new report said on Monday.

The IT budget has shifted towards more immediate priorities, to build resilience for the new normal, said the study.

"The big bang transformations of the pre-COVID era have been streamlined, in favour of more strategic enterprise IT priorities," said Anil Chopra, Vice President, Research, CyberMedia Research (CMR).

Advertisement

While enterprises were already high on their digital transformation journeys, the current crisis has accelerated the shift for others, said the study, adding that three in every four organizations will focus on digitization in the neo normal.

Organisations are strategically experimenting with emerging technologies, but not planning to invest heavily unless they see tangible benefits in the near-term.

Advertisement

In the neo normal, brand trust will rule over all other metrics when it comes to vendor selection, said the CMR "Digital Transformation in the Neo Normal" report.

The findings are based on primary interactions with 149 CIOs from across a range of industries, including IT, financial services, retail, public sector, manufacturing and automotive, and media and communications.

Advertisement

--IANS

gb/na

Continued here:
IT spending on Internet connectivity, security to rise in India: Report - Business Insider India

Read More..

What is network security in the cloud computing era? – TechRadar

Cloud computing has most certainly been an important driver for the next generation of the internet. This key technology has facilitated both online cloud storage and even more recently online services, enabling Software as a Service (SaaS) applications available by subscription.

While cloud computing has been a great enabler for these services, it also has presented new challenges in keeping a network secure. Long gone are the days when a companys IT department could set up computers, and then control the entire flow of traffic - both inbound and outbound alike - via its arranged network with strategically placed firewalls, hubs and antivirus software protecting the clients.

Rather, with cloud computing, there are virtual resources provided over the internet, including data, applications and infrastructure. This then has the potential for sensitive data to be exposed as it gets transmitted from the client to the cloud server and back.

A common vulnerability for cloud computing is known as session hijacking. In this type of attack, the hacker exploits a valid computer session, to then get access to the resources of the cloud server provider.

Here, the cookie that the client is using for authentication for the valid session gets stolen and hijacked. In one variation of the attack, the hacker intercepts the traffic between the client and the server with a Sniffing program, that can grab the cookie (and whatever other data) in what is dubbed a Man-in-the-middle attack'.

Several strategies have been developed to ensure security between clients and the cloud server. They need to be tailored to the specific type of cloud security platform that is vulnerable.

The base for cloud architecture is known as Infrastructure as a Service (IaaS). To protect IaaS, there needs to be network segmentation, and monitoring of the network should include Intrusion Detection Systems (IDS), and Intrusion Prevention Systems (IPS). There should also be virtual web application firewalls that get located in front of the website for malware protection. Virtual routers, and virtual network-based firewalls along the edge of the cloud network provide perimeter protection.

The next cloud solution is Platform as a Service or PaaS. In this architecture the service provider provides the platform to the client which allows them to build applications, while the host company, ie: the cloud provider, builds and services the infrastructure. Security for this type of cloud service can be provided via IP restrictions, and logging. In addition, there should be API Gateways deployed, and a Cloud Access Security Broker (CASB) which controls the policies.

With a SaaS, both the software, and the data are hosted in the cloud, with the service available to each user via a browser. The security for such a configuration is often provided via the Cloud Service Provider (CSP), which is typically negotiated into the service contract. Additionally, a SaaS will incorporate the same suite of security measures as in a PaaS.

A final security measure to implement is a cloudVPN, also known as a VPN as a Service, or aptly designated as a VPNaaS. This cloudVPN is designed to give users the ability to access the cloud servers applications through a browser securely by encrypting the communications.

Read more:

Compare the 4 best overall VPNs for business and consumers spec-by-spec:

Everything - the #1 best VPN

Balance of options and ease of use

Here is the original post:
What is network security in the cloud computing era? - TechRadar

Read More..

Revealed: How home router manufacturers dropped the ball on security – TechHive

Security vulnerabilities in your home router have been the story for years, with the responsibility being placed at the feet of users to keep their router firmware updated. But a damning report by Fraunhofer says that router manufacturers themselves have taken years to issue patches, with potentially dozens of critical vulnerabilities lurking within older routers.

The June report by Fraunhofer-Institut fur Kommunikation (FKIE) extracted firmware images from routers made by Asus, AVM, D-Link, Linksys, Netgear, TP-Link, and Zyxel127 in all. The report (as noted by ZDNet) compared the firmware images to known vulnerabilities and exploit mitigation techniques, so that even if a vulnerability was exposed, the design of the router could mitigate it.

No matter how you slice it, Fraunhofers study pointed out basic lapses in security across several aspects. At the most basic level, 46 routers didnt receive any updatesat all in the last year. Many used outdated Linux kernels with their own, known vulnerabilities. Fifty routers used hard-coded credentials, where a known username and password was encoded into the router as a default credential that asked the user to change itbut would still be there, accessible, if they did not.

FKIE could not find a single router without flaws. Nor could the institute name a single router vendor that avoided the security issues.

AVM does [a] better job than the other vendors regarding most aspects, the report concluded. Asus and Netgear do a better job in some aspects than D-Link, Linksys, TP-Link, and Zyxel. We contactedBelkin (Linksys) and D-Link, two vendors named in the report, for comment, but didnt hear back by press time.

In conclusion the update policy of router vendors is far behind the standards as we know it from desktop or server operating systems, FKIE said elsewhere in the report. However, routers are exposed to the internet 24 hours a day leading to an even higher risk of malware infection.

Fraunhofer broke down how router vendors have fallen short into several categories.

Days since the last firmware release:Although 81 routers were updated in the last 365 days before the FKIE gathered its results (March 27, 2019 to Match 27, 2020) the average number of days to the prior update, across all devices, was 378. FKIE said 27 of the devices had not been updated within two years, with the absolute worst stretching to 1,969 daysmore then five years.

Asus, AVM, and Netgear issued updates for all of their devices within a year and a half, at least. By comparison, most antivirus programs issue updates at least daily.

Age of the OS: Most routers run Linux, an open-source software model that offers researchers the ability to examine the basic Linux kernel code and apply patches. When the kernel itself is outdated, however, fundamental known vulnerabilities in the OS are ripe for exploitation. FKIE used the open-source Firmware Analysis and Comparison Tool (FACT) to extract the router firmware, finding that a third of the routers ran on top of the 2.6.36 Linux kernel, an older version. Thelast security update for kernel version 2.6.36 was provided nine years ago, the study found.

Critical vulnerabilities in the tested routers abounded. Theaverage number of critical vulnerabilities found for each router was 53, with even the best routers subject to 21 critical vulnerabilities (there were a whopping 348 high-rated vulnerabilities, too).

Exploit mitigation: Routers can be built to protect their kernel using a variety of exploit mitigation techniques, including the non-executable bit (NX) to mark a region of memory as non-executable. This was a common way of protecting the router, but FKIE found that the usage of exploit mitigation techniques was rare.

Private keys: We want to make it absolutely clear that there is no good reason to publish a private key, because a published private key does not provide any security at all! FKIE wrote. Publishing the private cryptographic key in the firmware allows an attacker to impersonate the device itself and do man in the middle attacks, an exploit that tries to fool the users PC and the server into believing that the attacker is the trusted router.

FKIE found that at least five private keys are published per firmware image. The Netgear R6800 provides a total number of 13 private keys in a single device. AVM was the only vendor FKIE found that did not publish private keys.

Hard-coded login credentials: You may already be familiar with hard-coded credentials: a router that uses admin and password as its default credentials. While that makes it easy to recover a lost password, it also makes it extremely easy for an attacker to take over your router. Furthermore, if the user cannot change a password, you might get a feeling that the password is related to a backdoor, FKIE wrote, implying that hard-coding credentials could have been added to allow monitoring of your device.

The good news is that more than 60% of the router firmware images do not have hard-coded login credentials, FKIE wrote. The bad news is that 50 routers do provide hard-coded credentials. Sixteen routers have well known or easy crackable credentials.

FKIEs report doesnt suggest choosing an open-source firmware replacement for your router, although that option is certainly available. Unfortunately, some of the firmware options are no longer maintained, or only work on a subset of (older) routers. Its disappointing that the easiest route for criminals to penetrate your home network appears to benot your PC, or your operating systembut the router youre using to connect to the rest of the world.

This story, "Revealed: How home router manufacturers dropped the ball on security" was originally published by PCWorld.

More:
Revealed: How home router manufacturers dropped the ball on security - TechHive

Read More..

Malaysia Internet of Things (IoT) Security Market Growth By Manufacturers, Type And Application, Forecast To 2026 – 3rd Watch News

New Jersey, United States,- Market Research Intellect sheds light on the market scope, potential, and performance perspective of the Global Malaysia Internet of Things (IoT) Security Market by carrying out an extensive market analysis. Pivotal market aspects like market trends, the shift in customer preferences, fluctuating consumption, cost volatility, the product range available in the market, growth rate, drivers and constraints, financial standing, and challenges existing in the market are comprehensively evaluated to deduce their impact on the growth of the market in the coming years. The report also gives an industry-wide competitive analysis, highlighting the different market segments, individual market share of leading players, and the contemporary market scenario and the most vital elements to study while assessing the global Malaysia Internet of Things (IoT) Security market.

The research study includes the latest updates about the COVID-19 impact on the Malaysia Internet of Things (IoT) Security sector. The outbreak has broadly influenced the global economic landscape. The report contains a complete breakdown of the current situation in the ever-evolving business sector and estimates the aftereffects of the outbreak on the overall economy.

Leading Malaysia Internet of Things (IoT) Security manufacturers/companies operating at both regional and global levels:

To get Incredible Discounts on this Premium Report, Click Here @ https://www.marketresearchintellect.com/ask-for-discount/?rid=391476&utm_source=3WN&utm_medium=888

The Malaysia Internet of Things (IoT) Security market report provides successfully marked contemplated policy changes, favorable circumstances, industry news, developments, and trends. This information can help readers fortify their market position. It packs various parts of information gathered from secondary sources, including press releases, web, magazines, and journals as numbers, tables, pie-charts, and graphs. The information is verified and validated through primary interviews and questionnaires. The data on growth and trends focuses on new technologies, market capacities, raw materials, CAPEX cycle, and the dynamic structure of the Malaysia Internet of Things (IoT) Security market.

This study analyzes the growth of Malaysia Internet of Things (IoT) Security based on the present, past and futuristic data and will render complete information about the Malaysia Internet of Things (IoT) Security industry to the market-leading industry players that will guide the direction of the Malaysia Internet of Things (IoT) Security market through the forecast period. All of these players are analyzed in detail so as to get details concerning their recent announcements and partnerships, product/services, and investment strategies, among others.

Sales Forecast:

The report contains historical revenue and volume that backing information about the market capacity, and it helps to evaluate conjecture numbers for key areas in the Malaysia Internet of Things (IoT) Security market. Additionally, it includes a share of each segment of the Malaysia Internet of Things (IoT) Security market, giving methodical information about types and applications of the market.

Reasons for Buying Malaysia Internet of Things (IoT) Security Market Report

This report gives a forward-looking prospect of various factors driving or restraining market growth.

It renders an in-depth analysis for changing competitive dynamics.

It presents a detailed analysis of changing competition dynamics and puts you ahead of competitors.

It gives a six-year forecast evaluated on the basis of how the market is predicted to grow.

It assists in making informed business decisions by performing a pin-point analysis of market segments and by having complete insights of the Malaysia Internet of Things (IoT) Security market.

This report helps the readers understand key product segments and their future.

Have Any Query? Ask Our Expert @ https://www.marketresearchintellect.com/need-customization/?rid=391476&utm_source=3WN&utm_medium=888

In the end, the Malaysia Internet of Things (IoT) Security market is analyzed for revenue, sales, price, and gross margin. These points are examined for companies, types, applications, and regions.

To summarize, the global Malaysia Internet of Things (IoT) Security market report studies the contemporary market to forecast the growth prospects, challenges, opportunities, risks, threats, and the trends observed in the market that can either propel or curtail the growth rate of the industry. The market factors impacting the global sector also include provincial trade policies, international trade disputes, entry barriers, and other regulatory restrictions.

About Us:

Market Research Intellect provides syndicated and customized research reports to clients from various industries and organizations with the aim of delivering functional expertise. We provide reports for all industries including Energy, Technology, Manufacturing and Construction, Chemicals and Materials, Food and Beverage, and more. These reports deliver an in-depth study of the market with industry analysis, the market value for regions and countries, and trends that are pertinent to the industry.

Contact Us:

Mr. Steven Fernandes

Market Research Intellect

New Jersey ( USA )

Tel: +1-650-781-4080

Our Trending Reports

Surgical Imaging Systems Market Size, Growth Analysis, Opportunities, Business Outlook and Forecast to 2026

Surgical Needle Holders Market Size, Growth Analysis, Opportunities, Business Outlook and Forecast to 2026

Surgical/Operating Microscopes Market Size, Growth Analysis, Opportunities, Business Outlook and Forecast to 2026

Suspension Air Bags Market Size, Growth Analysis, Opportunities, Business Outlook and Forecast to 2026

Swager Market Size, Growth Analysis, Opportunities, Business Outlook and Forecast to 2026

Go here to see the original:
Malaysia Internet of Things (IoT) Security Market Growth By Manufacturers, Type And Application, Forecast To 2026 - 3rd Watch News

Read More..

Akamai Is an Overlooked Web Infrastructure Play. Its a Buy, Analyst Says. – Barron’s

Text size

Akamai Technologies stock is trading higher Thursday after Cowen analyst Colby Synesael raised his rating on the content-delivery network company to Outperform from Market Perform, while upping his target price to $150 from $107.

Synesael is basically making the observation (which I made in an April Tech Trader column) that Akamai shares (ticker: AKAM) have not participated in the huge rally in internet infrastructure plays amid the Covid-19 pandemic. The analyst says there is now a meaningful disconnect between Akamai and other security and CDN stocks, despite its larger scale, higher profitability and still solid growth. He sees Akamai as an attractive way to play long-term trends like cloud security and edge computing.

Synesael points out that the stock looks cheap relative to both security plays like Palo Alto Networks (PANW) and Fortinet (FTNT) and to other content-delivery networks, such as Cloudflare (NET), Fastly (FSLY), and Limelight Networks (LLNW). He argues that Covid-19 has served as a catalyst to Akamais security and CDN businesses.

Newsletter Sign-up

A weekly guide to our best stories on technology, disruption, and the people and stocks in the middle of it all.

We believe Covid-19 has resulted in increased demand for both its enterprise and internet security product offerings given the increase in the number of attacks across organizations and the internet, Synesael writes. We believe Akamais security business is an underappreciated component of its long-term growth opportunity and that as it becomes a larger portion of total revenue more investors are likely to start valuing it on its [sum of the parts] which we believe will result in a significant re-rating of the stock.

The analyst notes that there have been investor concerns about the company losing market share to peers like Fastly, but asserts that the growth of competitors is more a function of an expanding opportunity for CDN providers rather than share stealing from Akamai.

Akamai shares were up 7%, at $113.78, in recent trading, while the S&P 500 was up 0.9%. The stock is up about 32% year to date, which is impressive growthexcept when compared with Cloudflare, which has more than doubled, and Fastly, which has more than quadrupled.

Write to Eric J. Savitz at eric.savitz@barrons.com

Original post:
Akamai Is an Overlooked Web Infrastructure Play. Its a Buy, Analyst Says. - Barron's

Read More..

According to Latest Report on Internet of Things (IoT) Security Market to Grow with an Impressive CAGR – 3rd Watch News

Internet of Things (IoT) Security Market is analyzed with industry experts in mind to maximize return on investment by providing clear information needed for informed business decisions. This research will help both established and new entrants to identify and analyze market needs, market size and competition. It explains the supply and demand situation, the competitive scenario, and the challenges for market growth, market opportunities and the threats faced by key players.

Sample Copy of This Report: https://www.quincemarketinsights.com/request-sample-39861?utm_source=3WN/komal

A 360 degree outline of the competitive scenario of the Global Internet of Things (IoT) Security Market is presented by Quince Market Insights. It has a massive data allied to the recent product and technological developments in the markets.

It has a wide-ranging analysis of the impact of these advancements on the markets future growth, wide-ranging analysis of these extensions on the markets future growth. The research report studies the market in a detailed manner by explaining the key facets of the market that are foreseeable to have a countable stimulus on its developing extrapolations over the forecast period.

Companies Covered:Cisco Systems, Infineon Technologies, Intel Corporation, Siemens AG, Wurldtech Security, Alcatel-Lucent S.A., Axeda Machine Cloud, Checkpoint Technologies, IBM Corporation, Huawei Technologies Co. Ltd, AT&T Inc., and NETCOM On-Line Communication Services, Inc.

Table of Contents:

Get ToC for the overview of the premium report @ https://www.quincemarketinsights.com/request-toc-39861?utm_source=3WN/komal

Market Segmentation: By Component (Solutions and Services), By Type (Network Security, Endpoint Security, Application Security, Cloud Security, and Others), By Solution (Identity Access Management, Data Encryption & Tokenization, Intrusion Detection & Prevention System, Device Authentication & Management, Secure Software & Firmware Update, Distributed Denial of Service Protection, and Security Analytics), By Service (Professional Services and Managed Services)

A detailed outline of the Global Internet of Things (IoT) Security Market includes a comprehensive analysis of different verticals of businesses. North America, Europe, Asia Pacific, Middle East & Africa, and South America have been considered for the studies on the basis of several terminologies.

This is anticipated to drive the Global Internet of Things (IoT) Security Market over the forecast period. This research report covers the market landscape and its progress prospects in the near future. After studying key companies, the report focuses on the new entrants contributing to the growth of the market. Most companies in the Global Internet of Things (IoT) Security Market are currently adopting new technological trends in the market.

Finally, the researchers throw light on different ways to discover the strengths, weaknesses, opportunities, and threats affecting the growth of the Global Internet of Things (IoT) Security Market. The feasibility of the new report is also measured in this research report.

Reasons for buying this report:

Make an Enquiry for purchasing this Report @ https://www.quincemarketinsights.com/enquiry-before-buying-39861?utm_source=3WN/komal

ABOUT US:

QMI has the most comprehensive collection of market research products and services available on the web. We deliver reports from virtually all major publications and refresh our list regularly to provide you with immediate online access to the worlds most extensive and up-to-date archive of professional insights into global markets, companies, goods, and patterns.

Contact:

Quince Market Insights

Ajay D. (Knowledge Partner)

Office No- A109

Pune, Maharashtra 411028

Phone: APAC +91 706 672 4848 / US +1 208 405 2835 / UK +44 121 364 6144

Email: [emailprotected]

Web: https://www.quincemarketinsights.com

View post:
According to Latest Report on Internet of Things (IoT) Security Market to Grow with an Impressive CAGR - 3rd Watch News

Read More..

How Have I Been Pwned became the keeper of the internets biggest data breaches – TechCrunch

When Troy Hunt launched Have I Been Pwned in late 2013, he wanted it to answer a simple question: Have you fallen victim to a data breach?

Seven years later, the data-breach notification service processes thousands of requests each day from users who check to see if their data was compromised or pwned, with a hard p by the hundreds of data breaches in its database, including some of the largest breaches in history. As it has grown, now sitting just below the 10 billion breached-records mark, the answer to Hunts original question is more clear.

Empirically, its very likely, Hunt told me from his home on Australias Gold Coast. For those of us that have been on the internet for a while its almost a certainty.

What started out as Hunts pet project to learn the basics of Microsofts cloud, Have I Been Pwned quickly exploded in popularity, driven in part by its simplicity to use, but largely by individuals curiosity.

As the service grew, Have I Been Pwned took on a more proactive security role by allowing browsers and password managers to bake in a backchannel to Have I Been Pwned to warn against using previously breached passwords in its database. It was a move that also served as a critical revenue stream to keep down the sites running costs.

But Have I Been Pwneds success should be attributed almost entirely to Hunt, both as its founder and its only employee, a one-man band running an unconventional startup, which, despite its size and limited resources, turns a profit.

As the workload needed to support Have I Been Pwned ballooned, Hunt said the strain of running the service without outside help began to take its toll. There was an escape plan: Hunt put the site up for sale. But, after a tumultuous year, he is back where he started.

Ahead of its next big 10-billion milestone mark, Have I Been Pwned shows no signs of slowing down.

Even long before Have I Been Pwned, Hunt was no stranger to data breaches.

By 2011, he had cultivated a reputation for collecting and dissecting small for the time data breaches and blogging about his findings. His detailed and methodical analyses showed time and again that internet users were using the same passwords from one site to another. So when one site was breached, hackers already had the same password to a users other online accounts.

Then came the Adobe breach, the mother of all breaches, as Hunt described it at the time: More than 150 million user accounts had been stolen and were floating around the web.

Hunt obtained a copy of the data and, with a handful of other breaches he had already collected, loaded them into a database searchable by a persons email address, which Hunt saw as the most common denominator across all the sets of breached data.

And Have I Been Pwned was born.

It didnt take long for its database to swell. Breached data from Sony, Snapchat and Yahoo soon followed, racking up millions more records in its database. Have I Been Pwned soon became the go-to site to check if you had been breached. Morning news shows would blast out its web address, resulting in a huge spike in users enough at times to briefly knock the site offline. Hunt has since added some of the biggest breaches in the internets history: Myspace, Zynga, Adult Friend Finder and several huge spam lists.

As Have I Been Pwned grew in size and recognition, Hunt remained its sole proprietor, responsible for everything from organizing and loading the data into the database to deciding how the site should operate, including its ethics.

Hunt takes a what do I think makes sense approach to handling other peoples breached personal data. With nothing to compare Have I Been Pwned to, Hunt had to write the rules for how he handles and processes so much breach data, much of it highly sensitive. He does not claim to have all the answers, but relies on transparency to explain his rationale, detailing his decisions in lengthy blog posts.

His decision to only let users search for their email address makes logical sense, driven by the sites only mission, at the time, to tell a user if they had been breached. But it was also a decision centered around user privacy that helped to future-proof the service against some of the most sensitive and damaging data he would go on to receive.

In 2015, Hunt obtained the Ashley Madison breach. Millions of people had accounts on the site, which encourages users to have an affair. The breach made headlines, first for the breach, and again when several users died by suicide in its wake.

The hack of Ashley Madison was one of the most sensitive entered into Have I Been Pwned, and ultimately changed how Hunt approached data breaches that involved peoples sexual preferences and other personal data. (AP Photo/Lee Jin-man, File)

Hunt diverged from his usual approach, acutely aware of its sensitivities. The breach was undeniably different. He recounted a story of one person who told him how their local church posted a list of the names of everyone in the town who was in the data breach.

Its clearly casting a moral judgment, he said, referring to the breach. I dont want Have I Been Pwned to enable that.

Unlike earlier, less-sensitive breaches, Hunt decided that he would not allow anyone to search for the data. Instead, he purpose-built a new feature allowing users who had verified their email addresses to see if they were in more sensitive breaches.

The purposes for people being in that data breach were so much more nuanced than what anyone ever thought, Hunt said. One user told him he was in there after a painful break-up and had since remarried but was labeled later as an adulterer. Another said she created an account to catch her husband, suspected of cheating, in the act.

There is a point at which being publicly searchable poses an unreasonable risk to people, and I make a judgment call on that, he explained.

The Ashely Madison breach reinforced his view on keeping as little data as possible. Hunt frequently fields emails from data breach victims asking for their data, but he declines every time.

It really would not have served my purpose to load all of the personal data into Have I Been Pwned and let people look up their phone numbers, their sexualities, or whatever was exposed in various data breaches, said Hunt.

If Have I Been Pwned gets pwned, its just email addresses, he said. I dont want that to happen, but its a very different situation if, say, there were passwords.

But those remaining passwords havent gone to waste. Hunt also lets users search more than half a billion standalone passwords, allowing users to search to see if any of their passwords have also landed in Have I Been Pwned.

Anyone even tech companies can access that trove of Pwned Passwords, he calls it. Browser makers and password managers, like Mozilla and 1Password, have baked-in access to Pwned Passwords to help prevent users from using a previously breached and vulnerable password. Western governments, including the U.K. and Australia, also rely on Have I Been Pwned to monitor for breached government credentials, which Hunt also offers for free.

Its enormously validating, he said. Governments, for the most part, are trying to do things to keep countries and individuals safe working under extreme duress and they dont get paid much, he said.

There have been similar services that have popped up. Theyve been for-profit and theyve been indicted.Troy Hunt

Hunt recognizes that Have I Been Pwned, as much as openness and transparency is core to its operation, lives in an online purgatory under which any other circumstances especially in a commercial enterprise he would be drowning in regulatory hurdles and red tape. And while the companies whose data Hunt loads into his database would probably prefer otherwise, Hunt told me he has never received a legal threat for running the service.

Id like to think that Have I Been Pwned is at the far-legitimate side of things, he said.

Others who have tried to replicate the success of Have I Been Pwned havent been as lucky.

There have been similar services that have popped up, said Hunt. Theyve been for-profit and theyve been indicted, he said.

LeakedSource was, for a time, one of the largest sellers of breach data on the web. I know, because my reporting broke some of their biggest gets: music streaming service Last.fm, adult dating site AdultFriendFinder and Russian internet giant Rambler.ru to name a few. But what caught the attention of federal authorities was that LeakedSource, whose operator later pleaded guilty to charges related to trafficking identity theft information, indiscriminately sold access to anyone elses breach data.

There is a very legitimate case to be made for a service to give people access to their data at a price.

Hunt said he would sleep perfectly fine charging users a fee to access their data. I just wouldnt want to be accountable for it if it goes wrong, he said.

Five years into Have I Been Pwned, Hunt could feel the burnout coming.

I could see a point where I would be if I didnt change something, he told me. It really felt like for the sustainability of the project, something had to change.

He said he went from spending a fraction of his time on the project to well over half. Aside from juggling the day-to-day collecting, organizing, deduplicating and uploading vast troves of breached data Hunt was responsible for the entirety of the sites back-office upkeep its billing and taxes on top of his own.

The plan to sell Have I Been Pwned was code-named Project Svalbard, named after the Norwegian seed vault that Hunt likened Have I Been Pwned to, a massive stockpile of something valuable for the betterment of humanity, he wrote announcing the sale in June 2019. It would be no easy task.

Hunt said the sale was to secure the future of the service. It was also a decision that would have to secure his own. Theyre not buying Have I Been Pwned, theyre buying me, said Hunt. Without me, theres just no deal. In his blog post, Hunt spoke of his wish to build out the service and reach a larger audience. But, he told me, it was not about the money.

As its sole custodian, Hunt said that as long as someone kept paying the bills, Have I Been Pwned would live on. But there was no survivorship model to it, he admitted. Im just one person doing this.

By selling Have I Been Pwned, the goal was a more sustainable model that took the pressure off him, and, he joked, the site wouldnt collapse if he got eaten by a shark, an occupational hazard for living in Australia.

But chief above all, the buyer had to be the perfect fit.

Hunt met with dozens of potential buyers, and many in Silicon Valley. He knew what the buyer would look like, but he didnt yet have a name. Hunt wanted to ensure that whomever bought Have I Been Pwned upheld its reputation.

Imagine a company that had no respect for personal data and was just going to abuse the crap out of it, he said. What does that do for me? Some potential buyers were driven by profits. Hunt said any profits were ancillary. Buyers were only interested in a deal that would tie Hunt to their brand for years, buying the exclusivity to his own recognition and future work thats where the value in Have I Been Pwned is.

Hunt was looking for a buyer with whom he knew Have I Been Pwned would be safe if he were no longer involved. It was always about a multiyear plan to try and transfer the confidence and trust people have in me to some other organizations, he said.

Hunt testifies to the House Energy Subcommittee on Capitol Hill in Washington, Thursday, Nov. 30, 2017. (AP Photo/Carolyn Kaster)

The vetting process and due diligence was insane, said Hunt. Things just drew out and drew out, he said. The process went on for months. Hunt spoke candidly about the stress of the year. I separated from my wife early last year around about the same time as the [sale process], he said. They later divorced. You can imagine going through this at the same time as the separation, he said. It was enormously stressful.

Then, almost a year later, Hunt announced the sale was off. Barred from discussing specifics thanks to non-disclosure agreements, Hunt wrote in a blog post that the buyer, whom he was set on signing with, made an unexpected change to their business model that made the deal infeasible.

It came as a surprise to everyone when it didnt go through, he told me. It was the end of the road.

Looking back, Hunt maintains it was the right thing to walk away. But the process left him back at square one without a buyer and personally down hundreds of thousands in legal fees.

After a bruising year for his future and his personal life, Hunt took time to recoup, clambering for a normal schedule after an exhausting year. Then the coronavirus hit. Australia fared lightly in the pandemic by international standards, lifting its lockdown after a brief quarantine.

Hunt said he will keep running Have I Been Pwned. It wasnt the outcome he wanted or expected, but Hunt said he has no immediate plans for another sale. For now its business as usual, he said.

In June alone, Hunt loaded over 102 million records into Have I Been Pwneds database. Relatively speaking, it was a quiet month.

Weve lost control of our data as individuals, he said. But not even Hunt is immune. At close to 10 billion records, Hunt has been pwned more than 20 times, he said.

Earlier this year Hunt loaded a massive trove of email addresses from a marketing database, dubbed Lead Hunter. He fed some 68 million records into Have I Been Pwned. Hunt said someone had scraped a ton of publicly available web domain record data and repurposed it as a massive spam database. But someone left that spam database on a public server, without a password, for anyone to find. Someone did, and passed the data to Hunt. Like any other breach, he took the data, loaded it in Have I Been Pwned and sent out email notifications to the millions who have subscribed.

Job done, he said. And then I got an email from Have I Been Pwned saying Id been pwned.

He laughed. It still surprises me the places that I turn up.

Related stories:

Originally posted here:
How Have I Been Pwned became the keeper of the internets biggest data breaches - TechCrunch

Read More..

Enterprise Firewall Market Overview and Regional Outlook with Research Study 2019 2026 – 3rd Watch News

TheEnterprise Firewall Market: Global Industry Analysis, Size, Share, Growth, Trends, and Forecast, 2015 2021report covers all of the aspects required to gain a complete understanding of the pre-market conditions, current conditions as well as a well-measured forecast.This report also researches and evaluates the impact of Covid-19 outbreak on theEnterprise Firewall Market, involving potential opportunity and challenges, drivers and risks. We present the impact assessment of Covid-19 effects onEnterprise Firewall Marketand market growth forecast based on different scenario (optimistic, pessimistic, very optimistic, most likely etc.).

Zion Market Researchindicates that the globalEnterprise Firewall Marketis expected to surge at a steady rate in the coming years, as economies flourish. The research report provides a comprehensive review of the global market. Analysts have identified the key drivers and restraints in the overall market. They have studied the historical milestones achieved by the globalEnterprise Firewall Marketand emerging trends. A comparison of the two has enabled the analysts to draw a potential trajectory of the globalEnterprise Firewall Marketfor the forecast period.

This Research Help Grow Your Business [Download Sample PDF of Research Report]

For making the research report exhaustive, the analysts have included Porters five forces analysis and SWOT analysis. Both these assess the path the market is likely to take by factoring strengths, weaknesses, opportunities, and threats. The Porters five forces analysis elucidates the intensity of the competitive rivalry and the bargaining power of suppliers and buyers. Furthermore, the research report also presents an in-depth explanation of the emerging trends in the global Enterprise Firewall Market and the disruptive technologies that could be key areas for investment.

The Leading Market Players Covered in this Report are:

Cisco Systems, Juniper Networks, Palo Alto Networks, IBM Internet Security Systems, McAfee, FortinetInc., WatchGuard Technologies, Huawei Technologies and ImpervaInc.

GlobalEnterprise Firewall MarketMarket: SegmentationThe chapters of segmentation allow the readers to understand the aspects of the market such as its products, available technologies, and applications of the same. These chapters are written in a manner to describe their development over the years and the course they are likely to take in the coming years. The research report also provides insightful information about the emerging trends that are likely to define progress of these segments in the coming years.

Get Sample PDF [emailprotected]@https://www.zionmarketresearch.com/sample/enterprise-firewall-market

Competition analysis

As the markets have been advancing the competition has increased by manifold and this has completely changed the way the competition is perceived and dealt with and in our report, we have discussed the complete analysis of the competition and how the big players in the Enterprise Firewall Market have been adapting to new techniques and what are the problems that they are facing.

Our report which includes the detailed description of mergers and acquisitions will help you to get a complete idea of the market competition and also give you extensive knowledge on how to excel ahead and grow in the market.

Inquire More about Report:https://www.zionmarketresearch.com/inquiry/enterprise-firewall-market

Regions Covered in the GlobalEnterprise Firewall Market:

Here is the COVID-19 Impact Analysis :https://www.zionmarketresearch.com/custom/196?covid19=true

Strategic Points Covered in TOC:

Chapter 1:Introduction, market driving force product scope, market risk, market overview, and market opportunities of the globalEnterprise Firewall Market

Chapter 2:Evaluating the leading manufacturers of the globalEnterprise Firewall Market which consists of its revenue, sales, and price of the products

Chapter 3:Displaying the competitive nature among key manufacturers, with market share, revenue, and sales

Chapter 4:Presenting globalEnterprise Firewall Market by regions, market share and with revenue and sales for the projected period

Chapter 5, 6, 7, 8 and 9: To evaluate the market by segments, by countries and by manufacturers with revenue share and sales by key countries in these various regions

Browse Full Report:https://www.zionmarketresearch.com/report/enterprise-firewall-market

Important Features that are under offering & key highlights of the report: Detailed overview of Enterprise Firewall Market Changing market dynamics of the industry In-depth market segmentation by Type, Application etc Historical, current and projected market size in terms of volume and value Recent industry trends and developments Competitive landscape of Enterprise Firewall Market Strategies of key players and product offerings Potential and niche segments/regions exhibiting promising growth A neutral perspective towards Enterprise Firewall Market performance

The classification of the globalEnterprise Firewall Marketis done based on the product type, segments, and end-users. The report provides an analysis of each segment together with the prediction of their development in the upcoming period. Additionally, the latest research report studies various segments of the globalEnterprise Firewall Marketin the anticipated period.

Thanks for reading this article; you can also get individual chapter wise section or region wise report version like North America, Europe or Asia.

Note In order to provide more accurate market forecast, all our reports will be updated before delivery by considering the impact of COVID-19.

(*If you have any special requirements, please let us know and we will offer you the report as you want.)

See the original post:
Enterprise Firewall Market Overview and Regional Outlook with Research Study 2019 2026 - 3rd Watch News

Read More..

Global Internet of Things (IoT) Security Market Trends, Opportunities, Key Players, Growth, Analysis, Outlook & Forecasts To 2026 – Daily Research…

This report focuses on the global Internet of Things (IoT) Security status, future forecast, growth opportunity, key market and key players. The study objectives are to present the Internet of Things (IoT) Security development in North America, Europe, China, Japan, Southeast Asia, India and Central & South America.

The key players covered in this study

DOWNLOAD FREE SAMPLE REPORT:https://courant.biz/report/global-internet-of-things-iot-security-market/41855/

Market segment by Type, the product can be split into

Market segment by Application, split into

Market segment by Regions/Countries, this report covers

The study objectives of this report are:

To analyze global Internet of Things (IoT) Security status, future forecast, growth opportunity, key market and key players.

To present the Internet of Things (IoT) Security development in North America, Europe, China, Japan, Southeast Asia, India and Central & South America.

To strategically profile the key players and comprehensively analyze their development plan and strategies.

To define, describe and forecast the market by type, market and key regions.

In this study, the years considered to estimate the market size of Internet of Things (IoT) Security are as follows:

For the data information by region, company, type and application, 2019 is considered as the base year. Whenever data information was unavailable for the base year, the prior year has been considered.

If you have any special requirements, please let us know and we will offer you the report as you want.

1 Report Overview

1.1 Study Scope

1.2 Key Market Segments

1.3 Players Covered: Ranking by Internet of Things (IoT) Security Revenue

1.4 Market Analysis by Type

1.4.1 Global Internet of Things (IoT) Security Market Size Growth Rate by Type: 2020 VS 2026

1.4.2 Network Security

1.4.3 Endpoint Security

1.4.4 Application Security

1.4.5 Cloud Security

1.4.6 Others

1.5 Market by Application

1.5.1 Global Internet of Things (IoT) Security Market Share by Application: 2020 VS 2026

1.5.2 Building and Home Automation

1.5.3 Supply Chain Management

1.5.4 Patient Information Management

1.5.5 Energy and Utilities Management

1.5.6 Customer Information Security

1.5.7 Other

1.6 Study Objectives

1.7 Years Considered

2 Global Growth Trends by Regions

2.1 Internet of Things (IoT) Security Market Perspective (2015-2026)

2.2 Internet of Things (IoT) Security Growth Trends by Regions

2.2.1 Internet of Things (IoT) Security Market Size by Regions: 2015 VS 2020 VS 2026

2.2.2 Internet of Things (IoT) Security Historic Market Share by Regions (2015-2020)

2.2.3 Internet of Things (IoT) Security Forecasted Market Size by Regions (2021-2026)

2.3 Industry Trends and Growth Strategy

2.3.1 Market Top Trends

2.3.2 Market Drivers

2.3.3 Market Challenges

2.3.4 Porters Five Forces Analysis

2.3.5 Internet of Things (IoT) Security Market Growth Strategy

2.3.6 Primary Interviews with Key Internet of Things (IoT) Security Players (Opinion Leaders)

3 Competition Landscape by Key Players

3.1 Global Top Internet of Things (IoT) Security Players by Market Size

3.1.1 Global Top Internet of Things (IoT) Security Players by Revenue (2015-2020)

3.1.2 Global Internet of Things (IoT) Security Revenue Market Share by Players (2015-2020)

3.1.3 Global Internet of Things (IoT) Security Market Share by Company Type (Tier 1, Tier 2 and Tier 3)

3.2 Global Internet of Things (IoT) Security Market Concentration Ratio

3.2.1 Global Internet of Things (IoT) Security Market Concentration Ratio (CR5 and HHI)

3.2.2 Global Top 10 and Top 5 Companies by Internet of Things (IoT) Security Revenue in 2019

3.3 Internet of Things (IoT) Security Key Players Head office and Area Served

3.4 Key Players Internet of Things (IoT) Security Product Solution and Service

3.5 Date of Enter into Internet of Things (IoT) Security Market

3.6 Mergers & Acquisitions, Expansion Plans

ACCESS FULL REPORT:https://courant.biz/report/global-internet-of-things-iot-security-market/41855/

About us :

Courant Market Researchis a source of well categorised database of research reports which offers you market research reports in the form of statistical surveying, evaluated database and forecasting with expertise researchers.

See original here:
Global Internet of Things (IoT) Security Market Trends, Opportunities, Key Players, Growth, Analysis, Outlook & Forecasts To 2026 - Daily Research...

Read More..

WISeKey develops WIShelter Covid-19 secured smartphone app, using digital IDs and blockchain protocols, to certify users that are not infected with…

WISeKey develops WIShelter Covid-19 secured smartphone app, using digital IDs and blockchain protocols, to certify users that are not infected with COVID-19

A Webinar organized by WISeKey on how to Help Governments, Health and Travel Organizations Deploy a WIShelter Covid-19 Trusted Digital Health Passport on the Blockchain will be held on July 23 at 3:00 PM CET (please visit - https://www.wisekey.com/wisekey-webinar/)

Geneva July 6, 2020 - WISeKey International Holding Ltd (WISeKey, SIX: WIHN / Nasdaq: WKEY), a leading cybersecurity and IoT company, that its WIShelter app now includes the ability for users to upload and digitally certify the results of their COVID-19 test facilitating international travel as users can certify that they are not infected with the COVID-19.

These functionalities will allow local governments to enable healthy/immured persons to safely return to their jobs thus reduce the economic impact of the epidemic while protecting the high-risk population by controlling the spread of this infectious disease.

For almost two decades, WISeKey has contributed to the design and implementation of global standards for the internets long-missing identity layer: decentralized, point-to-point exchange of information about people, organizations, or things enabled by blockchain and certified by cryptographic Root of Trust. WISeKeys technology, products and services can be used by individuals and organizations.

The app now includes a WISeID Health Card with important medical details like blood type, allergies, and other medical conditions, and can be enriched with digital health certificates, as its the case of the result of an official COVID-19 test.

This simple method to display the Health Card could allow law enforcement and other public services to apply controls during the de-escalation phase of the pandemic.

All health details are encrypted and linked to the users identity, represented by a Digital Certificate. Encrypting this data is important to protect users confidential information and ensuring that the user is staying up-to-date with its health credentials, and is in compliance with all privacy requirements, like the EuropeanGeneral Data Protection Regulation(Directive 95/46/EC), known as GDPR, the primary law regulating how companies protect EU citizens personal data. WISeKey is a fully Qualified Trust Service Provider (TSP) under eIDAS, the updated EU regulations dealing with trusted eID and electronic transactions and Webtrust.ORG.

Blockchain-based solutions aim to override the need for a central authority by distributing information previously held in a centralized repository across a network of participating nodes. While Blockchain is not owned by one individual or organization, anyone with an internet connection (and access, in the case of private Blockchains) can make use of it, help maintain and verify it. When a transaction is made on a Blockchain, it is added to a group of transactions, known as blocks. Each block of transactions is added to the database in a chronological, immutable chain. Each block is stamped with a unique cryptographic code, which ensures that records are not counterfeited or changed. The Blockchain approach lacks legal validity in most jurisdictions, which only recognize the digital signatures as equally valid that manuscript signatures when generated using traditional PKI technology.

Using their digital identity secured by WISeKey, users will be able to geo-localize other certified users and stablish secure communications. If needed, the app allows users to prove to local authorities that they are respecting the stay at home recommendations. To ensure the data privacy, each users Personal Identifiable Information is kept encrypted and never disclosed without their consent.

The WIShelter app is based on WISeID, WISeKeys Digital Identity platform and combines in a unified solution a suite of web services and mobile applications:

The new features of the WIShelter app include a full health digital certificate that is imported into the App by connecting it to the medical record of the patient issued by a bona fide qualified health certification program on which Doctors and Medical Facilities can join.

The WISeID Health Card includes important medical details like blood type, allergies, and other medical conditions, and can be enriched with digital health certificates, as its the case of the result of an official COVID-19 test.

This simple method to display the Health Card could allow law enforcement and other public services to apply controls during the de-escalation phase of the pandemic.

All health details are encrypted and linked to the users identity, represented by a Digital Certificate. Encrypting this data is important to protect users confidential information and ensuring that the user is staying up-to-date with its health credentials, and is in compliance with all privacy requirements, like the EuropeanGeneral Data Protection Regulation(Directive 95/46/EC), known as GDPR, the primary law regulating how companies protect EU citizens personal data.

WISeKey is currently working with several governments and health organizations to add functionalities to the WIShelter app such as the ability for users to upload and digitally certify the results of their COVID-19 test. These functionalities will allow local governments to enable healthy/immured persons to safely return to their jobs thus reduce the economic impact of the epidemic while protecting the high-risk population by controlling the spread of this infectious disease.

Please Click Here to view, WISeKey CEO, Carlos Moreira, Discuss the Fight Against Covid-19 on TD Ameritrade Network.

For almost two decades, WISeKey has contributed to the design and implementation of global standards for the internets long-missing identity layer: decentralized, point-to-point exchange of information about people, organizations, or things enabled by blockchain and certified by cryptographic Root of Trust. WISeKeys technology, products and services can be used by individuals and organizations.

To that effect, WISeKey has launched an enhanced version of WISeID, adding easy to use strong authentication and email security capabilities that can remediate threats like phishing, ransomware or identity theft. Strong Authentication is a mechanism able to enhance security by complementing the traditional username/password access to online services with additional security factors, like biometry, hardware tokens and one-time-passwords. Additionally, secure eMail techniques allow confidential messages to be exchanged encrypted, and to affix a digital signature to the outgoing email, ensuring the recipient that the message comes from a genuine person and that has not been manipulated in the way.

About WISeKey

WISeKey (NASDAQ: WKEY; SIX Swiss Exchange: WIHN) is a leading global cybersecurity company currently deploying large scale digital identity ecosystems for people and objects using Blockchain, AI and IoT respecting the Human as the Fulcrum of the Internet. WISeKey microprocessors secure the pervasive computing shaping todays Internet of Everything. WISeKey IoT has an install base of over 1.5 billion microchips in virtually all IoT sectors (connected cars, smart cities, drones, agricultural sensors, anti-counterfeiting, smart lighting, servers, computers, mobile phones, crypto tokens etc.). WISeKey is uniquely positioned to be at the edge of IoT as our semiconductors produce a huge amount of Big Data that, when analyzed with Artificial Intelligence (AI), can help industrial applications to predict the failure of their equipment before it happens.

Our technology is Trusted by the OISTE/WISeKeys Swiss based cryptographic Root of Trust (RoT) provides secure authentication and identification, in both physical and virtual environments, for the Internet of Things, Blockchain and Artificial Intelligence. The WISeKey RoT serves as a common trust anchor to ensure the integrity of online transactions among objects and between objects and people. For more information, visitwww.wisekey.com.

Press and investor contacts:

Disclaimer:This communication expressly or implicitly contains certain forward-looking statements concerning WISeKey International Holding Ltd and its business. Such statements involve certain known and unknown risks, uncertainties and other factors, which could cause the actual results, financial condition, performance or achievements of WISeKey International Holding Ltd to be materially different from any future results, performance or achievements expressed or implied by such forward-looking statements. WISeKey International Holding Ltd is providing this communication as of this date and does not undertake to update any forward-looking statements contained herein as a result of new information, future events or otherwise.

This press release does not constitute an offer to sell, or a solicitation of an offer to buy, any securities, and it does not constitute an offering prospectus within the meaning of article 652a or article 1156 of the Swiss Code of Obligations or a listing prospectus within the meaning of the listing rules of the SIX Swiss Exchange. Investors must rely on their own evaluation of WISeKey and its securities, including the merits and risks involved. Nothing contained herein is, or shall be relied on as, a promise or representation as to the future performance of WISeKey.

Read more:
WISeKey develops WIShelter Covid-19 secured smartphone app, using digital IDs and blockchain protocols, to certify users that are not infected with...

Read More..