Page 3,527«..1020..3,5263,5273,5283,529..3,5403,550..»

Expanding Resources with Rapid HPC Orchestration in the Cloud – HPCwire

The industry has reached an interesting point for high performance computing in the cloud. You could almost measure this solely by the growing presence of cloud providers at the two major HPC conferences over the past few years. All the major cloud vendors had large, prime real estate on the exposition floor, and many other service providers were spread through kiosks and booths. HPC in the cloud is now one of the hottest topics at these shows, and there is plenty of interest with companies and research institutions eager to figure out how to expand their resource capabilities in fiscally responsible ways.

HPC in the cloud is not new. Its been building and gaining momentum since the early days that cloud computing emerged, but the past few years have seen dramatic changes and improvements in infrastructure that puts HPC in reach of a much broader audience. You find more specialized instances that provide bigger processing power and memory bandwidth for computationally intensive applications. Theres also more focus on providing higher performing fabric for scaling out workloads in the cloud. Emergence of more HPC-friendly system orchestration and software services also have made leaps and bounds to help assemble cluster instances in the cloud. Its been great progress and really interesting to be part of helping this growth.

That said, migrating HPC applications to the cloud can still be an easier said than done activity even with the advancements in cloud infrastructure. Theres still a learning curve involved to figure out the interface and mechanisms to spin up an instance for a particular cloud provider. If you want or need to have multiple cloud providers, then you have multiple paths to learn. There are many service providers and companies that help address the learning curve and simplify landing workloads in the cloud, but even they face the same issue. At some point in the workflow there is a need to have a common interface to launch a workload with a back-end interface to the cloud provider of choice.

Recently, Intel and Google started collaborating on creating some tooling that would provide a common interface. That resulted in Intel launching an open source project calledRapid HPC Orchestration in the Cloudor RHOC. Why spin up this effort? As alluded to above, we look at RHOC as an enabler to help users tap into HPC in the cloud. Its the enzyme that provides an accelerated path for users to realize the collective value of Intel and our cloud partners. Talking a little bit about how RHOC works will help explain the value.

Not trying to reinvent the wheel, RHOC utilizes two common utilities from Hashicorp as the underlying mechanisms to provide multi-cloud support for spinning up instances. Using Terraforms infrastructure as code approach and Packers mechanisms to create cloud images, RHOC uses templates to define connections to specific instances within a cloud vendor and uses templates that define the image to spin up in that vendor.

Users launch jobs direct from the command line and specify which templates to use as well as provide their user account credentials for the cloud provider. RHOC then handles setting up a cluster in the cloud provider. RHOC builds the compute image or reuses a prebuilt image, spins up the desired instances in the cloud, configures them as an HPC cluster, and launches the job. It defaults to running a job as an ephemeral cluster and will take care of grabbing your output data and spinning down the instances when a job has completed. It does provide an option to keep the cluster running, though, when its needed to keep the instances active. Just remember to shut it down later!

This means that through RHOC, Intel and our cloud partners can collaborate on providing templates that define optimized instances for HPC and optimized compute node images for a given cloud provider. For example, Intel collaborates with many of the individual cloud providers to optimize and tune fabric drivers utilized by the Intel MPI library. RHOC gives us the mechanism to provide this collaboration in the template for that given provider. Through RHOC, these optimizations become part of the images that users get when launching their jobs on a supported cloud. This is collective goodness that helps streamline access to expanded HPC resources.

Ilias Kastardis, HPC Solution Lead at Google, who contributes to the collaborative efforts, commented, Google Cloud is looking forward to providing RHOC to our HPC customers, as it will give them a simplified way to set up and manage performance optimized HPC clusters. We believe it will be a valuable toolkit for our customers in running their HPC workloads.

Google is the first provider included in RHOC, but more are coming. We are also expanding our partnerships to help enrich the feature set of the tool and continue to push out new optimizations within templates.

For a look at RHOC, you can check out this quick demonstration at theIntel HPC +AI Pavilion, and if you are figuring out how to simplify your experience of running HPC in the cloud, watch this space!

Read more here:
Expanding Resources with Rapid HPC Orchestration in the Cloud - HPCwire

Read More..

Key Things to Consider While Choosing a Public Cloud – CXOToday.com

By: Neelesh Kripalani

The Coronavirus pandemic has compelled organizations to shift to a remote working model overnight. As a result, organizations are frantically moving towards cloud computing and software products.

As per a new IDC report, 64% of organizations in India are expected to increase their demand for cloud computing, while 56% are expected to demand for cloud software to support the new normal. To adjust to the new normal, organizations need SaaS-based collaborative apps to ensure on and off-site presence at all the times and zero-disruption to business. Since businesses have realized the limitations of physical infrastructure, pay-per-use public cloud model is witnessing an accelerated demand.

However, it is important for organizations to consider the below mentioned factors while choosing a public cloud.

The acceleration towards public cloud has got a huge fillip due to COVID-19. The scenario today leaves little doubt on the need to move to the public cloud wherever possible. Organizations that would take the step now while keeping the above considerations in mind and hiring a cloud consulting and implementation partner to charter their roadmap would emerge from this scenario with a much desired competitive edge.

(The author is senior VP & Head- Center of Excellence Clover Infotech and the views expressed in this article are his own)

The rest is here:
Key Things to Consider While Choosing a Public Cloud - CXOToday.com

Read More..

Global Cloud Computing in Automotive Market 2020-2025: Value, Components, Technology, Installation Base and Leading Players Comparison – Owned

Global Cloud Computing in Automotive market report presents an overview on the basis of key parameters such as market size, revenue, sales analysis and key drivers. The size of Cloud Computing in Automotive market is anticipated to grow at large scale over the forecast period. The main purpose of the study report is to give users an extensive viewpoint of the Cloud Computing in Automotive market. So that users can apply strategic processes to benchmark themselves against rest of the world. Key drivers as well as challenges of the market are discussed in the report. Also reports provides an in depth analysis of the Cloud Computing in Automotive market with current and future trends.

Cloud Computing in Automotive Market 2020-2025 research report is an in-depth analysis of the latest trends, market size, status, upcoming technologies, industry drivers, challenges opportunity with key company profiles and strategies of players.

Get sample copy of Cloud Computing in Automotive Market[emailprotected]https://www.adroitmarketresearch.com/contacts/request-sample/981

The report also includes a description of the main factors that can significantly stimulate or hinder the growth of the Cloud Computing in Automotive market. It also discusses the future impact of regulatory and policy enforcement on the growth of the market. The report also estimates the estimated CAGR of the Cloud Computing in Automotive market based on the initial history of the market, existing trends and future development trends. The report also includes the geographical fork of the Cloud Computing in Automotive market.

Top Leading Key Players are:

Amazon Web Services, Microsoft Azure, and Google Cloud Platform

Read complete report with TOC at:https://www.adroitmarketresearch.com/industry-reports/cloud-computing-in-automotive-market

In addition, the report categorizes Cloud Computing in Automotive market according to type, application, related technology, end user, etc. to provide the data explored. It also includes comprehensive data related to specific financial and business terms, projected market growth, market strategy, etc. This market report offers some presentations and illustrations about the market that comprises pie charts, graphs, and charts which presents the percentage of the various strategies implemented by the service providers in the Global Cloud Computing in Automotive Market.

The Cloud Computing in Automotive market study report covers all the geographical regions where competitive landscape exists by the players such as North America, Europe, Latin America, Asia-Pacific and Middle East Africa. Thus report helps to identify the key growth countries and regions. Furthermore, global Cloud Computing in Automotive report covers the competitive panorama of existing and new players in the industry. Also report offers strategies initiatives of the players for the development of products. Moreover report cover in depth analysis of the market on the basis of segments. And for all the segments, actual market sizes and forecast have been provided over the forecast period. In addition, report presents quantitative as well as qualitative narration of global Cloud Computing in Automotive market.

Key Highlights Questions of Cloud Computing in Automotive Market:What will be the size of the global Cloud Computing in Automotive market in 2025?Which product is expected to show the highest market growth?Which application is projected to gain a lions share of the global Cloud Computing in Automotive market?Which region is foretold to create the most number of opportunities in the global Cloud Computing in Automotive market?Will there be any changes in market competition during the forecast period?Which are the top players currently operating in the global Cloud Computing in Automotive market?

Do You Have Any Query Or Specific Requirement? Ask to Our Industry Expert @https://www.adroitmarketresearch.com/contacts/enquiry-before-buying/981

About Us :

Adroit Market Research is an India-based business analytics and consulting company. Our target audience is a wide range of corporations, manufacturing companies, product/technology development institutions and industry associations that require understanding of a markets size, key trends, participants and future outlook of an industry. We intend to become our clients knowledge partner and provide them with valuable market insights to help create opportunities that increase their revenues. We follow a code Explore, Learn and Transform. At our core, we are curious people who love to identify and understand industry patterns, create an insightful study around our findings and churn out money-making roadmaps.

Contact Us :

Ryan JohnsonAccount Manager Global3131 McKinney Ave Ste 600, Dallas,TX 75204, U.S.APhone No.: USA: +1 972-362 -8199 / +91 9665341414

More:
Global Cloud Computing in Automotive Market 2020-2025: Value, Components, Technology, Installation Base and Leading Players Comparison - Owned

Read More..

Ampere Altra Family of Cloud Native Processors expands to 128 cores with Altra Max – PRNewswire

SANTA CLARA, Calif., June 23, 2020 /PRNewswire/ --

News Highlights

Ampere today announced further roadmap details of its Ampere Altra server processor family. In March the company announced Ampere Altra, the world's first cloud native processor, featuring 80 cores. Today, Ampere unveiled preliminary details of the expansion of the cloud-native processor family by adding Ampere Altra Max, which has 128 cores, providing customers with another cloud-optimized processor to maximize overall performance and cores-per-rack density.

Ampere Altra Max is ideal for applications that take advantage of scale-out and elastic cloud architectures. Compatible with the 80-core Ampere Altra and also supporting 2-socket platforms, Ampere Altra Max offers the industry's highest socket-level performance and I/O scalability. It will be sampling in the fourth quarter and additional details will be provided later this year.

"In March we introduced the industry's first cloud native processor, our 80-core Ampere Altra. Today, we are announcing the expansion of the Ampere Altra family with the first 128 core server processor, sampling in Q4 2020. We know customers need different products for specific workloads and decided to create a family of different products to meet their needs.We are very excited to share our rapid progress, driven by our continued commitment to deliver leadership performance and power efficiency,"said Renee James, Ampere Founder and CEO.

In keeping with the commitment to deliver an annual cadence of new products, Ampere has also recently completed the tape-out of a 5nm test chip for internal validation.

The Ampere Altra family provides the flexibility to address a spectrum of workloads and Ampere is working with ecosystem partners to enable accelerators to meet specific customer requirements.

Several customers have begun to offer platforms featuring Ampere Altra.

Ecosystem Support

"Cloudflare is deeply interested in the Ampere Altra processor and its innovative architecture. We have started evaluating Ampere Altra and are excited with the preliminary performance benchmarks we are seeing. We will share these performance metrics of Ampere Altra later in the year. Cloudflare is also excited to be engaged with Ampere on the Ampere Altra Max processor with 128 cores and can't wait to test it. "Nitin Rao, Head of Global Infrastructure, Cloudflare.

"We are excited to announce GenyMotion has been ported to Ampere platforms. Customers who are using our cloud-based Android virtual devices demand scalability and the performance boost of running Arm native applications on an Arm-based server. It is exciting to see a high performant Arm server processor, Ampere Altra, available now. Ampere Altra enables unparalleled scalability and density to run our Android virtual devices on the cloud."Tim Danford, Chief Executive Officer, Genymobile.

"NVIDIA has moved quickly to bring its CUDA-X collection of libraries, tools, and technologies to deliver GPU acceleration to the thriving Arm ecosystem. We are happy to collaborate with Ampere and partners building reference designs that demonstrate the best combinations of GPU and CPU performance optimized for accelerated computing." Duncan Poole, Director of Platform Alliances, NVIDIA.

"We are excited to extend our partnership with Ampere by providing early access to their new Ampere Altra processors. Our shared passion for pushing the boundaries of performance for cloud-native applications is complemented by an equally deep commitment to engaging with the software ecosystem early and often. With this early access program our users, and the community at large, can experience what'snext with silicon, today."Zac Smith, Managing Director of Bare Metal Packet, an Equinix Company.

"We are excited to offer Ampere products to our customers in the coming months. Adding the Ampere Altra processor and associated servers to our portfolio will enable Phoenics to provide our customers with key solutions for cloud, storage, edge and other server applications."Peter Rooks, President , Phoenics Electronics, an Avnet Company.

"At Scaleway we strive to provide diversity of architectures tailored to meet the variety of cloud workloads our customers run. We were among the first to offer Arm and Arm64 based virtual instances and bare-metal systems in the cloud. The new Ampere Altraprocessor brings us a new world of performance on Arm64 architecture, and enables new cross usage in the cloud for all sizes of workloads. We are pleased to work closely with Ampere and are delighted to say that we're evaluating Ampere Altrafor the new breeze of our Arm64 cloud instances in late 2020."Scaleway.

Resources

Follow us on TwitterFacebookLinkedIn.

Altra Product Brief

About AmpereAmpere is designing the future of hyperscale cloud and edge computing with the world's first cloud native processor. Built for the cloud with a modern 64-bit Arm server-based architecture, Ampere gives customers the freedom to accelerate the delivery of all cloud computing applications. With industry-leading cloud performance, power efficiency and scalability, Ampere processors are tailored for the continued growth of cloud and edge computing.

For more information, visitwww.amperecomputing.com

Ampere, eMAG, Altra and the A and Ampere logos are registered trademarks or trademarks of Ampere Computing.

Press Contact:[emailprotected]1-650-422-3156

SOURCE Ampere

http://www.amperecomputing.com

More here:
Ampere Altra Family of Cloud Native Processors expands to 128 cores with Altra Max - PRNewswire

Read More..

Microsoft’s new Asia boss outlines business priorities in the age of coronavirus – CNBC

Ahmed Mazhari, President, Microsoft Asia

Source: Microsoft

In an environment where firms big and small have suffered tremendous disruption due to the coronavirus pandemic, Microsoft wants to enable its clients to stay in business and build long-term resilience, the company's Asia president told CNBC.

One of the hardest challenges at the moment is the fragile balance between lives and livelihoods as governments are forced to decide between restarting their economies, or keeping them in lockdown to contain the virus, Ahmed Mazhari said.

Mazhari recently completed his first 100 days at the helm of Microsoft's Asia business, after replacing Ralph Haupter in February.

"The times are challenging for humankind, but the last 100 days have been lots of learning, lots of anxious moments with our customers, with our partners, with governments," he said in a recent exclusiveinterview with CNBC.

"Our business priority is to ensure that we help people, in the long term, become more resilient in their businesses and institutions," Mazhari added. "In the short term, enabling them to keep business running."

Microsoft said during itslast earnings releasein late April that the initial impact of Covid-19on the business was mixed. Cloud computing-based products such as Teams and Azure saw increased usage as more organizations shifted to remote work. But "there wasa slowdown in transactional licensing, particularly in small and medium businesses, and a reduction in advertising spend in LinkedIn," the company said.

Mazhari explained there were two aspects whereMicrosoft saw an acceleration in its cloud business.

"The one isjust consumption as a consequence of the fact that there's more ... telecommuting happening, (a) lot more people on the internet, lot more people accessing corporate networks," he said.

The other aspect was that institutions and corporations realized they were not ready for remote work when the pandemic forced countries to step up restrictions and require nonessential employees to work from home. "Cloud plays a huge role in enabling virtualization of your workforce, virtualization of your technology and consequently your workforce," Mazhari added.

Cloud computing in recent years has grown into a larger part of Microsoft's business model and its Azure platform remains one of the dominant players in the market.

Microsoft said that for fiscal year 2021, which begins in July, its Asia business is focused on working with governments and communities to use digital technology and data analytics to respond to the coronavirus crisis and accelerate the recovery process.

The company added it plansto help its customers achieve business continuity in areas like telemedicine, online learning, and day-to-day operations as people continue to work remotely in what some have said is a fundamental social shift that has emerged from the pandemic.

Cybersecurity and data privacy remain another area of focus for Microsoft, according to the tech giant. In March senior technology executives surveyed by CNBC said that cybersecurity risks increased as a majority of their employees worked from home.

When asked about his outlook, and if there was any restructuring or potential job cuts on the horizon, Mazhari said the Asia business "continues to progress and wemake progress in helping."

"At this stage, our primary focus is to ensure we can help our customers, our partners and governments come out stronger and help reimagine a future that is driven by inclusive growth and better health," he said.

The virus was first reported in China in late December and has since spread around the world, infecting more than 9.1 million people and killing over 470,000.

Follow this link:
Microsoft's new Asia boss outlines business priorities in the age of coronavirus - CNBC

Read More..

How Edge Computing and 5G Work Together – TechAcute

What is edge computing about exactly and how does it work together with 5G and related technology stacks? Were all currently living in the cloud computing era. Online services that we all use Amazon Web Services (AWS), Google Cloud Platform, Microsoft Azure, and many others heavily rely on this technology. However, with the rollout of 5G and the increase in our purposes and usage of IoT devices, the strain on cloud networks couldnt be greater. Weve seen cloud services fail due to unexpected load in COVID-19 times, and surges could happen again.

Unfortunately, this increased strain on networks inevitably results in inconveniences that were all too familiar with. Due to high amounts of traffic, the time it takes for data to be processed increases, and were often left to deal with high network latency. To combat this, some cloud-based networking relies on edge computing to get the job done. Its not a solution for all services but its a mandatory aspect to consider when trying to build a reliable network.

Edge computingis a type of cloud computing that allows for data to be processed at the edge or outer part of the network, as opposed to at the central network. How this process is made possible is due to data from IoT devices being processed by computers or servers located closer to the data source. This method of cloud computing allows for IoT devices and web applications to function faster, as it ultimately reduces the strain on bandwidth and network congestion to improve service quality and resilience.

Edge computing can be seen as an intermediate layer between devices and cloud, where services are handled by distributed edge nodes

While edge computing has been around for a few years, the implementation of 5G has made it more relevant than ever. 5G will inevitably increase the amount of data being transferred across networks, and it is crucial that connection utilizing this technology is fast, secure, and reliable. In other words, the future of successful 5G relies on the capabilities of edge computing. You can also leverage some aspects of this setup without 5G as well, but you might be surprised what additional use cases are enabled by combining the tech stacks.

Also interesting: Cloud Computing, ITSM, and You

Ericssons Head of Marketing and Communications for Networks, Cecilia Atterwall, says that 5G will unleash new ways of solving problems. She also adds that its a combination of devices, content, 5G access networks, edge computing and high-performance distributed 5G core capabilities that make these innovations possible.

Its not an understatement to say that everyone relies on edge computing in one way or another, if not already, then at least in the near future and going forward. However, its definitely grown to be an absolute necessity for many key industries and even autonomous vehicles. For example, edge computing is utilized for industrial manufacturing purposes, within smart cities, AI, and even self-driving cars.

The reason behind its use and importance boils down to its ability to assist IoT devices in low-bandwidth environments, ensuring that data is processed as quickly as possible. Reducing network latency is especially crucial when it comes to the computing processes behind the successful operation of self-driving cars. For example, Tesla cars are equipped with computers that process the data obtained by the vehicles sensors allowing for this technology to function on a split-second basis.

Karlsruhe, Germany, Vodafone cell site with 5G upgrade (3.500 MHz, band n78)

Edge computing has also opened up a plethora of opportunities for Communication Service Providers (CSPs) to build on their business services. For example, Ericsson offers hybrid deployments (PDF), and they provide many edge computing services. Ericsson agrees that it is a requirement for successful CSPs to be providers of the following:

CSPs are continually seeking to aid in the development of the edge ecosystem, and in doing so, they focus on delivering edge solutions that will help advance the future of smart manufacturing, virtual reality, artificial intelligence, not to mention online gaming experiences.

Related story with Sheng-Ann Yu: Distributed Cloud Is the Evolution of Cloud Technology

All in all, 5G technology promises to deliver great connection, low latency, and large bandwidths. In order to accomplish this, edge computing not only works to reduce network traffic, but it also encourages local data processing and storage. Together, both technologies are capable of delivering new solutions and innovation, with a secure and reliable connection.

Photo credit: The feature image has been done by Dynamic Wang. The edge computing diagram has been prepared by NoMore201. The Vodafone 5G antenna photo was taken by Toms Freres.Sources: Andrew Froehlich (Network Computing) / Blair Felter (vXchnge) / Ericssons 5G for Business Report / Ericssons Edge Computing & Deployment Strategies / Ericssons Recipe for 5G Success / IoT Australias White Paper of Edge Computing Consortium / Ericsson whitepaper A new era of PaaS

See the original post:
How Edge Computing and 5G Work Together - TechAcute

Read More..

Only 31% of Americans concerned with data security, despite 400% rise in cyberattacks – TechRepublic

Bad actors have flooded the enterprise with coronavirus-related attacks, but professionals working from home have other worries, Unisys Security found.

Image: nantonov, Getty Images/iStockphoto

Less than one-third (31%) of Americans said they are concerned about their data security while working from home during the COVID-19 pandemic, a Unisys Security report found. Overall concerns around internet security, including computer viruses and hacking, have dropped since 2019, ranking the lowest among the four primary areas of security in the survey.

These findings are particularly concerning given the rise in cyberattacks during the pandemic: The FBI found that online crimes reported to the Bureau's Internet Crime Complaint Center (IC3) have increased by 400% because of the crisis. The Federal Trade Commision (FTC) also found more than 52,000 cases of reported fraud related to COVID-19 since January 2020.

SEE: Security Awareness and Training policy (TechRepublic Premium)

The Unisys Security Index, released on Tuesday, calculates a score out of 300 that measures consumer attitudes over eight areas of security in four categories. The eight areas include national security, disaster/epidemic, bankcard fraud, financial obligations, virus/hacking, online transactions, identity theft, and personal safety.

The four broader categories consist of national security, financial security, internet security, and personal security. The index score remained at the historical high it found last year of 175, but with the global pandemic, the makeup of this score looks a bit different.

With the report being conducted at the start of the coronavirus pandemic, concerns around health, safety, and economic stability naturally rose.

Concerns about disasters and epidemics have jumped to the top three areas of concern, at 62%. Personal safety saw the largest increase, with 58% reportedly seriously concerned. Worries surrounding the other six security areas have fallen, including those related to internet security.

While reliance on the internet has increased dramatically during COVID-19, the majority of Americans (70%) said they are not concerned about the risk of being scammed. Americans were 24% less likely to report a concern about a data breach during the pandemic compared to the global average, the report found.

Only 45% of respondents said they are concerned about the risk of being scammed during the health crisis, which is particularly worrisome given that 98% of cyberattacks are deployed by social engineering methods like phishing, which can be particularly difficult to detect.

"It's not surprising to see people's level of concern for their personal safety jump in light of the global health crisis. However, the fact that it is not only matched by, but exceeded by, a drop in concerns around hacking, scamming or online fraud reflects a false sense of consumer security," said Unisys chief information security officer Mat Newfield, in a press release.

"Hackers target healthcare and essential services organizations looking to steal intellectual property and intelligence, such as details on national health policies and COVID-19 research," Newfield said. "And hackers are relying on tricks like 'password spraying,' which involves an attacker repeatedly using common passwords on many accounts to gain access, putting our most critical infrastructures at risk potentially from the click of a single working-from-home employee."

Looking at concerns across the globe, the report found that since 2019 the majority of regions including the Philippines, Chile, Australia, the UK, New Zealand, and Germany have seen rising worries regarding personal security, such as identity theft and personal safety.

The areas that have had growing national security concerns include Mexico, Chile, Brazil, the UK, and Australia, the report found.

Across the board, nearly all surveyed regions including Mexico, the US, Australia, the UK, Belgium, New Zealand, Germany, and the Netherlands had decreasing levels of concern around internet security.

"This underscores the need for businesses to ensure they are placing a clear and concerted emphasis on proper training for their employees working from home and adopting a Zero Trust security architecture that leverages best practices like encryption and microsegmentation," Newfield said.

The report recommended taking three key steps to bolstering security in your organization.

The report urged organizations to make it easier for their remote workers to connect securely. It recommended supplying work from home (WFH) employees with updated VPN connections and more zero trust technology, including always-on encrypted direct access, identity verification tools, and a software-defined perimeter to limit damage from prospective malware attacks.

With all of the chaos of moving teams remote, many organizations can forget to consider the toll this is personally taking on workers. The report recommended staying connected with employees by establishing regular check-ins, virtual lunches, or other tactics that priotizie their well-being when working from home.

Working from home opens up employee laptops and hardware to a slew of new risks, particularly unauthorized access from outside individuals.

The report recommended companies equip employees with more security controls such as multifactor authentication or biometric logins to make accessing the devices more protected.

For more, check out Sharp drop in overall security spending forecast from Gartner due to COVID-19 on TechRepublic.

Strengthen your organization's IT security defenses by keeping abreast of the latest cybersecurity news, solutions, and best practices. Delivered Tuesdays and Thursdays

Read the rest here:
Only 31% of Americans concerned with data security, despite 400% rise in cyberattacks - TechRepublic

Read More..

WatchGuard Technologies Report Finds Two-Thirds of Malware is Encrypted, Invisible Without HTTPS Inspection – GlobeNewswire

Seattle, June 24, 2020 (GLOBE NEWSWIRE) -- WatchGuard Technologies, a global leader in network security and intelligence, secure Wi-Fi, multi-factor authentication and advanced endpoint protection, today announced the release of its Internet Security Report for Q1 2020. For the first time ever, this report includes data on the percentage of malware in the wild delivered via encrypted HTTPS connections. WatchGuards threat intelligence shows that 67% of all malware in Q1 was delivered via HTTPS, so organizations without security solutions capable of inspecting encrypted traffic will miss two-thirds of incoming threats. Additionally, 72% of encrypted malware was classified as zero day (meaning no antivirus signature exists for it, and it will evade signature-based protections). These findings show that HTTPS inspection and advanced behavior-based threat detection and response solutions are now requirements for every security-conscious organization. The report also includes a special section detailing the impact of COVID-19 on the threat landscape.

Some organizations are reluctant to set up HTTPS inspection due to the extra work involved, but our threat data clearly shows that a majority of malware is delivered through encrypted connections and that letting traffic go uninspected is simply no longer an option, said Corey Nachreiner, chief technology officer at WatchGuard. As malware continues to become more advanced and evasive, the only reliable approach to defense is implementing a set of layered security services, including advanced threat detection methods and HTTPS inspection.

WatchGuards Internet Security Report prepares midmarket businesses, the service providers that support them, and the end users that work for them with data on the trends, research and best practices they need to defend against modern security threats. Here are the key findings from the Q1 2020 report:

Third-party testing has found that WatchGuard products consistently maintain high throughput when inspecting HTTPS traffic. Many competitive products show a significant degradation in performance in this scenario. For example, an independent test performed by Miercom found that the Firebox M370 outperformed competitive products while inspecting HTTPS traffic with full security services enabled.

The findings in WatchGuardsInternet Security Reportsare drawn from anonymized Firebox Feed data from active WatchGuard appliances whose owners have opted in to share data to support the Threat Labs research efforts. Today, over 44,000 appliances worldwide contribute threat intelligence data to the report. In Q1 2020, they blocked over 32,148,519 malware variants in total (730 samples per device) and more than 1,660,000 network attacks (38 attacks per device).

The complete report includes key defensive best practices that organizations of all sizes can use to protect themselves in todays threat landscape and a detailed analysis of how the COVID-19 pandemic and associated shift to working from home affected the cyber security landscape.

About WatchGuard Technologies, Inc.

WatchGuard Technologies, Inc. is a global leader in network security, secure Wi-Fi, multi-factor authentication, advanced endpoint protection, and network intelligence. The companys award-winning products and services are trusted around the world by nearly 10,000 security resellers and service providers to protect more than 80,000 customers. WatchGuards mission is to make enterprise-grade security accessible to companies of all types and sizes through simplicity, making WatchGuard an ideal solution for midmarket businesses and distributed enterprises. The company is headquartered in Seattle, Washington, with offices throughout North America, Europe, Asia Pacific, and Latin America. To learn more, visit WatchGuard.com.

For additional information, promotions and updates, follow WatchGuard on Twitter@WatchGuardonFacebook or on theLinkedIn Companypage. Also, visit our InfoSec blog, Secplicity, for real-time information about the latest threats and how to cope with them atwww.secplicity.org.Subscribe to The 443 Security Simplified podcastatSecplicity.org, or wherever you find your favorite podcasts.

WatchGuard is a registered trademark of WatchGuard Technologies, Inc. All other marks are property of their respective owners.

Read the original here:
WatchGuard Technologies Report Finds Two-Thirds of Malware is Encrypted, Invisible Without HTTPS Inspection - GlobeNewswire

Read More..

OTF’s Work Is Vital for a Free and Open Internet – EFF

Keeping the internet open, free, and secure requires eternal vigilance and the constant cooperation of freedom defenders all over the web and the world. Over the past eight years, the Open Technology Fund (OTF) has fostered a global community and provided supportboth monetary and in-kindto more than four hundred projects that seek to combat censorship and repressive surveillance, enabling more than two billion people in over 60 countries to more safely access the open Internet and advocate for democracy.

OTF has earned trust over the years through its open source ethos, transparency, and a commitment to independence from its funder, the US Agency for Global Media (USAGM), which receives its funding through Congressional appropriations.

In the past week, USAGM has removed OTFs leadership and independent expert board, prompting a number of organizations and individuals to call into question OTFs ability to continue its work and maintain trust among the various communities it serves. USAGMs new leadership has been lobbied to redirect funding for OTFs open source projects to a new set of closed-source tools, leaving many well-established tools in the lurch.

Why OTF Matters

EFF has maintained a strong relationship with OTF since its inception. Several of our staff members serve or have served on its Advisory Council, and OTFs annual summits have provided crucial links between EFF and the international democracy tech community. OTFs support has been vital to the development of EFFs software projects and policy initiatives. Guidance and funding from OTF have been foundational to Certbot, helping the operators of tens of millions of websites use EFFs tool to generate and install Lets Encrypt certificates. The OTF-sponsored fellowship for Wafa Ben-Hassine produced impactful research and policy analysis about how Arab governments repress online speech.

OTFs funding is focused on tools to help individuals living under repressive governments. For example, OTF-funded circumvention technologies including Lantern and Wireguard are used by tens of millions of people around the world, including millions of daily users in China. OTF also incubated and assisted in the initial development of the Signal Protocol, the encryption back-end used by both Signal and WhatsApp. By sponsoring Lets Encrypts implementation of multi-perspective validation, OTF helped protect the 227 million sites using Lets Encrypt from BGP attacks, a favorite technique of nation-states that hijack websites for censorship and propaganda purposes.

While these tools are designed for users living under repressive governments, they are used by individuals and groups all over the world, and benefit movements as diverse as Hong Kongs Democracy movement, the movement for Black lives, and LGBTQ+ rights defenders.

OTF requires public, verifiable security audits for all of its open-source software grantees. These audits greatly reduce risk for the vulnerable people who use OTF-funded technology. Perhaps more importantly, they are a necessary step in creating trust between US-funded software and foreign activists in repressive regimes. Without that trust, it is difficult to ask people to risk their lives on OTFs work.

Help Us #SaveInternetFreedom

It is not just OTF that is under threat, but the entire ecosystem of open source, secure technologiesand the global community that builds those tools. We urge you to join EFF and more than 400 other organizations in signing the open letter, which asks members of Congress to:

EFF is proud to join the voices of hundreds of organizations and individuals across the globe calling on UGASM and OTFs board to recommit to the value of open source technology, robust security audits, and support for global Internet freedom. These core valueswhich have been a mainstay of OTF's philanthropyare vital to uplifting the voices of billions of technology users facing repression all over the world.

See more here:
OTF's Work Is Vital for a Free and Open Internet - EFF

Read More..

How To Turn Off Firewall In Windows And Mac – Ubergizmo

As we grow increasingly connected to the internet, security is becoming more important than ever. Firewalls on our computers have existed for a long time, but sometimes, it can actually be more problematic than useful, which is why turning it off can actually be a good thing. But before we decide to turn it off, what exactly is a firewall and what does it do?

A firewall can be thought off as a wall of bricks surrounding our home. This wall helps to keep unwanted visitors out while protecting the residents of the home. In tech terms, it helps to protect your computer from unwanted intrusions from the likes of hackers or malware which might be trying to compromise your system and gain access to your personal information.

It will scan incoming internet data for things that are known to cause problems, and thus prevents it from infecting your computer system and causing havoc.

So right off the bat, firewalls sound a lot like antivirus software designed to protect your computer from threats, but there are differences. Having a firewall does not negate the need for antivirus software, even though it does protect your computer to a certain degree.

In the case of antivirus, you can think of it like a metal detector of sorts. Imagine a bad person was at the airport and they were looking to fly somewhere, so they use a fake passport and somehow get past immigration (firewall). Now that theyre inside the airport, they will need to go through a metal detector (antivirus) that will pick up any illegal objects like knives or guns they might be trying to smuggle on board.

Antivirus also works great for computers or devices that arent connected to the internet, where if you try to load a program from a disk or a USB drive that has malware, it will pick up on that.

With that being said, it sounds like having a firewall is a great thing, doesnt it? But that doesnt mean that it doesnt run into issues every now and then.

This is because computers pretty much just do what theyre told to do, theyre generally not smart enough to think on their own.

This means that as long as an action, connection, or program has been deemed as bad (or even risky), it will block it, even though it might not necessarily be the case.

For example, system administrators might need to do some work like applying software updates or installing new applications, and sometimes a firewall might prevent them from doing that.

As an end-user, you might also run into similar issues where programs or applications may run incorrectly or not at all due to their connection being blocked, and this is why you might want to turn off the firewall.

IMPORTANT: Most app developers will have a guide for users that bump into a Firewall issue. We recommend trying that first, as disabling the Firewall greatly increases your security risk. But if youre set on disabling the Firewall, please continue reading

Filed in Computers. Read more about Macos, Microsoft, Security, Windows and Windows 10.

The rest is here:
How To Turn Off Firewall In Windows And Mac - Ubergizmo

Read More..