Page 3,569«..1020..3,5683,5693,5703,571..3,5803,590..»

Chess | Viswanathan Anand returns home – The Hindu

Five-time world chess champion Viswanathan Anand returned to the city on Saturday evening after spending a week in quarantine at a hotel in Bengaluru.

Anand, who was in Germany for more than 100 days, can relax now that he is back home, but cant venture out of his room the health authorities guidelines prescribe another seven days of home quarantine.

Yes. Anand is fine. We are happy and relieved that he is here, Aruna Anand, the chess genius wife, told The Hindu.

Now this is the last part of the quarantine at home, we need to follow all the instructions by the health authorities. We are doing it in the strictest possible manner for everybodys safety.

Aruna said Anand had locked himself in his room.

In fact, when the car came, we stood at the gate of the building and he waved at us. We watched him go inside his room and shut himself.

We have aged people (Anands father and my mother at home) and my nine-year-old son Akhil. It is important that he stays separate so that nobodys health is compromised, she said.

You have reached your limit for free articles this month.

Find mobile-friendly version of articles from the day's newspaper in one easy-to-read list.

Enjoy reading as many articles as you wish without any limitations.

A select list of articles that match your interests and tastes.

Move smoothly between articles as our pages load instantly.

A one-stop-shop for seeing the latest updates, and managing your preferences.

We brief you on the latest and most important developments, three times a day.

Not convinced? Know why you should pay for news.

*Our Digital Subscription plans do not currently include the e-paper ,crossword, iPhone, iPad mobile applications and print. Our plans enhance your reading experience.

View post:
Chess | Viswanathan Anand returns home - The Hindu

Read More..

Viince wins the ESL Mobile Open Auto Chess playoffs for season five – Dot Esports

Image via ESL

The playoffs for Auto Chess at the ESL Mobile Open season five wrapped up yesterday with Vincent Viince Truong coming out on top. Twenty-four players played 12 matches across three days to decide the top eight who will be moving on to the finals.

Related: Wildcard Gaming win ESL Mobile Open PUBG Mobile playoffs

Here are the leaderboards of the playoffs:

There was a three-way tie between Zath Zath Zen, Betyow, and Dawgbun for the eighth and last available position to the finals. Ultimately, Zath came out on top due to better average placements in the playoffs.

Theres a lot of really good players that made it, second-placed Chokegod said on being asked about the top eight players in a post-match interview. I am really glad that Joseph and Betyow didnt make it. They are obviously really good people who I would have loved to meet in the finals. They are also extremely good players but I dont think the lobby is a lot weaker without them.

The 24 qualified players for the playoffs were divided into three groups of eight players each. All players played 12 matches in their own group to earn points. In the end, the points from all groups were tallied to decide the top eight players.

Here are the group-wise results of the playoffs:

The ESL Mobile Open season five features PUBG Mobile, Asphalt 9: Legends, Auto Chess, and Clash of Clans. Top teams and players will make their way through the qualifiers and the playoffs to compete in the finals. The season five finals will likely be an offline event if the coronavirus pandemic allows that to happen. Details about the finals still havent been revealed.

View post:
Viince wins the ESL Mobile Open Auto Chess playoffs for season five - Dot Esports

Read More..

Maharashtra Chess Association hosts grand five-day Blitz Grand Prix – The Bridge

While the country is battling with coronavirus and almost every other sport has taken a hit, online chess thrives despite the hurdles as LetsUp brings a unique five-day Blitz Grand Prix tournament that commenced on June 3 and hosted by the Maharashtra Chess Association.

The Blitz tournaments will take place every Wednesday with a total prize fund of INR 155000each having the total prize fund of INR 25000 and top five GP finishers will get a total of INR 30000. Each of the tournament which will be hosted every Wednesday from June 3 to July 1 will be sponsored by Nasik District and Novel, Ahmednagar District and Narendra Firodia Unicorp, Pune District and Amanora, Jalgaon District and Jain Irrigation and h2e, and lastly, the Sangali District and Chitale Bandhu.

Entry is free for GMs, IMs, WGMs and WIMs. Entry fee for others is 250 for each tournament and 1,000 for registering all five events of the GP. The event is open to players all over the world. Registration for each event will close on the previous day of event i.e. Tuesday at 8 p.m. IST.

A player would get GP Points for finishing in the top 10 of every event. At the end of five events, all the points will be added. However, only the score of the best four events will be considered for the Grand Prix Prize money. For eg. If a player finishes first, second, third, fourth, and fifth in the five events, then his/her score of only the first four events will be counted.

GM Vaibhav Suri

The five-day event will see popular names from India and abroad taking part, which includes Grandmasters R Praggnanandhaa, D Gukesh, P Iniyan, Andres Carlos Obregon, Bilel Bellahcene, among others.

Grand Prix points will be earned after participation in every tournament. The individual with the maximum points will be awarded the prize money. In case of a tie, the prize money will be shared. The entry fee can be paid at mcgrandprix.chessbase.in.

On June 3, GM Vugar Rasulov of Azerbaijan won LetsUp MCA GP Blitz 1. Vugar scored an unbeaten 8.5/10 to win the tournament. Four players Vaibhav Suri, Jose Eduardo Martinez Alcantara of Peru, Gukesh and Praggnanandhaa finished a half-point behind the champion at 8.0/10 and were placed second, third, fourth and fifth respectively.

On June 3, GM Vugar Rasulov of Azerbaijan won LetsUp MCA GP Blitz 1

The Azerbaijani GM currently leads the GP standings and he will receive 6500 for winning Blitz 1. Vaibhav will get 4000 and Martinez won 2500 cash respectively.

Total 132 players including 28 GMs, 26 IMs and 10 WIMs from India, Algeria, Argentina, Chile, Egypt, Indonesia, Peru, Russia, Serbia, USA, Uzbekistan took part in this 10 Round event.

Read more:
Maharashtra Chess Association hosts grand five-day Blitz Grand Prix - The Bridge

Read More..

Clear guidelines for remote work will boost security and control access – TechRepublic

Set guidelines for how to participate in a teleconference as well as rules for internet use and social media posts on company networks.

IT departments need policies to cover every element of remote work as many companies make working from home a standard option for employees. Providing clear and specific advice for individuals as well as IT team members will boost security and erase questions about what is allowed and what is banned.

This group of policies covers telecommuting, teleconferencing, remote access, and internet and email usage on corporate networks. Each one takes a comprehensive approach to the topic and allows for customization at the same time.

If your company implemented telecommuting or remote access policies several years ago, now is the time to update those guidelines and make sure they reflect the current state of work and technology. Check out these four remote work policies to see which one is the best fit for your organization.

Telecommuting is becoming the rule instead of the exception for employees at many companies. This policy sets expectations and guidelines for people working from home or a coffee shop. You'll find guidelines for eligibility, equipment, office supplies, and remote workspaces..

This guide will help team members host and participate in video conferences. This etiquette guide covers the technical details of video conferencing as well as expectations of participants. This policy may provide the extra reminder to a certain co-worker who needs to mute the line if he is not talking.

Providing secure remote access to corporate networks can lower equipment costs, reduce office overhead, and boost employee productivity. Employees working from home or other remote locations need to understand their role in keeping company data secure. To ensure that increasing remote access doesn't also increase security risks, companies need a remote access policy. This policy also will guide IT staff on when to grant access as well as how to limit it.

In addition to controlling remote access, IT departments must manage internet and email use among employees. This policy addresses information handling, digital hygiene, and safe browsing. You'll also find guidelines about governing access to social media sites including Facebook, LinkedIn, Twitter, and Instagram.

Link:
Clear guidelines for remote work will boost security and control access - TechRepublic

Read More..

Mozilla Funds Meething to Help Fix the Internet – GlobeNewswire

SAN FRANCISCO, June 04, 2020 (GLOBE NEWSWIRE) -- ERA, the technology development firm driving the next evolution of the internet, today announced its latest project, Meething, is now sponsored by Mozilla, the not-for-profit behind the lightning fast Firefox browser. As part of this sponsorship, Meething will compete in Mozillas Fix the Internet Incubator to better connect people to the internet, putting the interests of people back at the center of online life. Meething, a video teleconferencing and collaboration platform built to provide individuals and businesses a secure alternative to current closed-source platforms was created in partnership with QXIP and its founder, Lorenzo Mangani.

Meething uses peer-to-peer encrypted video calls powered by the open source cybersecurity protocol, GUN. Meething was born only 8 weeks ago as a result of the backlash against some of the most popular video conferencing solutions on the market today. Traditional conferencing and collaboration solutions include a middle-man that sits between the parties who are communicating. Meething removes this in-between and directly connects all parties with no middle-man server in between.

Being recognized by the industry leader in open and secure communications is a testament to our team that is creating Meething, said Mark Nadal, founder and CEO of ERA. The vision that we all have is centered around an open web that is free, transparent, and honest. COVID-19 has increased the reliance on the internet to do business and stay connected with our loved ones. Meething is the product that changes how markets will operate, giving users a glimpse into the convenience of a decentralized web without data manipulation, surveillance, or server interference.

ERA and QXIP share the same vision for a secure, fast, and open internet equally free for all. Trust, security and customer experience are the core pillars of Meething as more and more communication is had over the internet. Businesses can now have a secure alternative to Zoom that is directly integrated into their website while removing the confusing, clumsy downloads of external platforms and third-party branded experiences. Organizations can now confidently provide a communications platform that is centered around the customer.

Data is now viewed as one of the top commodities across all businesses and the ability to securely share and collaborate on it is top of mind for all business decision makers. And more importantly, the creators of this data are the ones driving change across the internet. Users today demand more from tools and platforms that they use and want to be able to communicate in a way that promotes a level playing field for all.

Partnering with Mark and the team at ERA has allowed us to rapidly bring to market a decentralized video meeting platform that is truly built with the end users in mind, based on our 10+ years of experience doing quality assurance and monitoring for large enterprises and telecoms, said Lorenzo Mangani, CEO at QXIP. The recognition of this project by Mozilla, who is the industry standard in providing a safer, healthier and faster internet allows us to put an alternative in the market that is focused on the people who use it.

I am excited to be working closely with Mark and the entire development team who is bringing Meething to market, said Mark Mayo, former Chief Product Officer at Mozilla who is serving as Meethings mentor during the Fix the internet Spring Lab. Whether its hanging out with your friends, collaborating with your coworkers, or teaching virtual classes, video conferencing on the web has long promised to enable a whole new world of online collaboration. Frankly, it hasnt delivered. Its been way too hard to build cool products with video and Meething aims to be the zero-barrier-to-entry platform that realizes this future. Soon, video conferencing wont suck!

About ERAERA is an innovation lab harnessing the power of the decentralized web. ERA enables the architects of the future by seeding cutting-edge technologies in infrastructure, applications and security. Rooted in community, ERA fosters an open-source mindset enabling a truly free internet. ERA is building towards a society that will be better for the next generation and which is underpinned by a new economic model.

Some of the innovative technologies born inside ERA include GUN, its open-source graph database engine supporting 30 million Monthly Active Users and Meething, its brand new peer-to-peer video conferencing platform, supported by Mozilla.

ERA is funded by some of the most forward-thinking leaders across the internet including the legendary Tim Draper and Marc Benioff.

Contact

Highwire Public Relationsera@highwirepr.com

Visit link:
Mozilla Funds Meething to Help Fix the Internet - GlobeNewswire

Read More..

The Internet of Bodies is here. This is how it will change our lives – World Economic Forum

In the special wards of Shanghais Public Health Clinical Center, nurses use smart thermometers to check the temperatures of COVID-19 patients. Each persons temperature is recorded with a sensor, reducing the risk of infection through contact, and the data is sent to an observation dashboard. An abnormal result triggers an alert to medical staff, who can then intervene promptly. The gathered data also allows medics to analyse trends over time.

The smart thermometers are designed by VivaLNK, a Silicon-Valley based startup, and are a powerful example of the many digital products and services that are revolutionizing healthcare. After the Internet of Things, which transformed the way we live, travel and work by connecting everyday objects to the Internet, its now time for the Internet of Bodies. This means collecting our physical data via devices that can be implanted, swallowed or simply worn, generating huge amounts of health-related information.

Some of these solutions, such as fitness trackers, are an extension of the Internet of Things. But because the Internet of Bodies centres on the human body and health, it also raises its own specific set of opportunities and challenges, from privacy issues to legal and ethical questions.

Image: McKinsey & Company

As futuristic as the Internet of Bodies may seem, many people are already connected to it through wearable devices. The smartwatch segment alone has grown into a $13 billion market by 2018, and is projected to increase another 32% to $18 billion by 2021. Smart toothbrushes and even hairbrushes can also let people track patterns in their personal care and behaviour.

For health professionals, the Internet of Bodies opens the gate to a new era of effective monitoring and treatment.

In 2017, the U.S. Federal Drug Administration approved the first use of digital pills in the United States. Digital pills contain tiny, ingestible sensors, as well as medicine. Once swallowed, the sensor is activated in the patients stomach and transmits data to their smartphone or other devices.

In 2018, Kaiser Permanente, a healthcare provider in California, started a virtual rehab program for patients recovering from heart attacks. The patients shared their data with their care providers through a smartwatch, allowing for better monitoring and a closer, more continuous relationship between patient and doctor. Thanks to this innovation, the completion rate of the rehab program rose from less than 50% to 87%, accompanied by a fall in the readmission rate and programme cost.

The deluge of data collected through such technologies is advancing our understanding of how human behaviour, lifestyle and environmental conditions affect our health. It has also expanded the notion of healthcare beyond the hospital or surgery and into everyday life. This could prove crucial in fighting the coronavirus pandemic. Keeping track of symptoms could help us stop the spread of infection, and quickly detect new cases. Researchers are investigating whether data gathered from smartwatches and similar devices can be used as viral infection alerts by tracking the users heart rate and breathing.

At the same time, this complex and evolving technology raises new regulatory challenges.

What counts as health information?

In most countries, strict regulations exist around personal health information such as medical records and blood or tissue samples. However, these conventional regulations often fail to cover the new kind of health data generated through the Internet of Bodies, and the entities gathering and processing this data.

In the United States, the 1996 Health Insurance Portability and Accountability Act (HIPPA), which is the major law for health data regulation, applies only to medical providers, health insurers, and their business associations. Its definition of personal health information covers only the data held by these entities. This definition is turning out to be inadequate for the era of the Internet of Bodies. Tech companies are now also offering health-related products and services, and gathering data. Margaret Riley, a professor of health law at the University of Virginia, pointed out to me in an interview that HIPPA does not cover the masses of data from consumer wearables, for example.

Another problem is that the current regulations only look at whether the data is sensitive in itself, not whether it can be used to generate sensitive information. For example, the result of a blood test in a hospital will generally be classified as sensitive data, because it reveals private information about your personal health. But today, all sorts of seemingly non-sensitive data can also be used to draw inferences about your health, through data analytics. Glenn Cohen, a professor at Harvard Law school, told me in an interview that even data that is not about health at all, such as grocery shopping lists, can be used for such inferences. As a result, conventional regulations may fail to cover data that is sensitive and private, simply because it did not look sensitive before it was processed.

The World Economic Forum was the first to draw the worlds attention to the Fourth Industrial Revolution, the current period of unprecedented change driven by rapid technological advances. Policies, norms and regulations have not been able to keep up with the pace of innovation, creating a growing need to fill this gap.

The Forum established the Centre for the Fourth Industrial Revolution Network in 2017 to ensure that new and emerging technologies will helpnot harmhumanity in the future. Headquartered in San Francisco, the network launched centres in China, India and Japan in 2018 and is rapidly establishing locally-run Affiliate Centres in many countries around the world.

The global network is working closely with partners from government, business, academia and civil society to co-design and pilot agile frameworks for governing new and emerging technologies, including artificial intelligence (AI), autonomous vehicles, blockchain, data policy, digital trade, drones, internet of things (IoT), precision medicine and environmental innovations.

Learn more about the groundbreaking work that the Centre for the Fourth Industrial Revolution Network is doing to prepare us for the future.

Want to help us shape the Fourth Industrial Revolution? Contact us to find out how you can become a member or partner.

Identifying and protecting sensitive data matters, because it can directly affect how we are treated by institutions and other people. With big data analytics, countless day-to-day actions and decisions can ultimately feed into our health profile, which may be created and maintained not just by traditional healthcare providers, but also by tech companies or other entities. Without appropriate laws and regulations, it could also be sold. At the same time, data from the Internet of Bodies can be used to make predictions and inferences that could affect a persons or groups access to resources such as healthcare, insurance and employment.

James Dempsey, director of the Berkeley Center for Law and Technology, told me in an interview that this could lead to unfair treatment. He warned of potential discrimination and bias when such data is used for decisions in insurance and employment. The affected people may not even be aware of this.

One solution would be to update the regulations. Sandra Wachter and Brent Mittelstadt, two scholars at the Oxford Internet Institute, suggest that data protection law should focus more on how and why data is processed, and not just on its raw state. They argue for a so-called right to reasonable inferences, meaning the right to have your data used only for reasonable, socially acceptable inferences. This would involve setting standards on whether and when inferring certain information from a persons data, including the state of their present or future health, is socially acceptable or overly invasive.

Apart from the concerns over privacy and sensitivity, there are also a number of practical problems in dealing with the sheer volume of data generated by the Internet of Bodies. The lack of standards around security and data processing makes it difficult to combine data from diverse sources, and use it to advance research. Different countries and institutions are trying to jointly overcome this problem. The Institute of Electrical and Electronics Engineers (IEEE) and its Standards Association have been working with the US Food & Drug Administration (FDA), National Institutes of Health, as well as universities and businesses among other stakeholders since 2016, to address the security and interoperability issue of connected health.

As the Internet of Bodies spreads into every aspect of our existence, we are facing a range of new challenges. But we also have an unprecedented chance to improve our health and well-being, and save countless lives. During the COVID-19 crisis, using this opportunity and finding solutions to the challenges is a more urgent task than ever. This relies on government agencies and legislative bodies working with the private sector and civil society to create a robust governance framework, and to include inferences in the realm of data protection. Devising technological and regulatory standards for interoperability and security would also be crucial to unleashing the power of the newly available data. The key is to collaborate across borders and sectors to fully realize the enormous benefits of this rapidly advancing technology.

License and Republishing

World Economic Forum articles may be republished in accordance with our Terms of Use.

Written by

Xiao Liu , Fellow at the Centre for the Fourth Industrial Revolution, World Economic Forum,

The views expressed in this article are those of the author alone and not the World Economic Forum.

The rest is here:
The Internet of Bodies is here. This is how it will change our lives - World Economic Forum

Read More..

Crowdstrike CEO explains how the future of remote work and security will look – CNBC

Employees are slowly returning back to the office as the U.S. emerges from the coronavirus lockdown, but Crowdstrike CEOGeorge Kurtz saidWednesday that it won't be the end of the remote work economy.

The cybersecurity company is gearing up to not only secure network systems on-premise but from anywhere work can be performed, he told CNBC's Jim Cramer.

"I think it will be a hybrid environment," he said of the post-Covid-19 work trend in a "Mad Money" interview. "You're going to have some folks go back to work, you're going to have split shifts."

Millions of workers where possible transitioned to off-premise network access after the Covid-19 outbreak forced much of the U.S. under stay-at-home mandates to slow the disease's spread. Countless businesses, particularly retail shops, bowling alleys, nail shops and more, had to close up shop during the state-sanctioned lockdowns.

As the U.S. economy opens back up, internet-based service providers and their clients are mapping out the future of their workplaces after having to adapt to a work-from-home strategy virtually overnight. Some employees have learned to embrace the new work environment, while others are craving to get back to the office.

Companies like Twitter and Facebook have already announced their plans to adjust to the new work wave. Twitter last month announced that it would let employees work from home "forever," should they choose, while Facebook forecasts that 50% of its workforce may work remotely within the next five to 10 years.

Cloud security companies like Crowdstrike, with its Falcon platform, step in to detect and fend off hackers looking to breach networks.

"I don't call it work from home. I call it work from anywhere, and that's a movement," Kurtz said. "Really, that's a subset of digital transformation and digital transformation is not a one-time hit. It's a very sustainable trend."

Crowdstrike on Tuesday reported that revenue grew 85% in the quarter ended April 30 compared to the year prior. The company posted $178.1 million on the top line, which topped Wall Street estimates of $165.4 million. Subscription customers surged 105% during the three-month period, adding 830 net new subscribers, according to a press release.

The company also reached non-GAAP operating profitability.

Thge stock shot up 6% to $98.10 by Wednesday's close.

Disclosure: Cramer's charitable trust owns shares of Facebook.

Questions for Cramer?Call Cramer: 1-800-743-CNBC

Want to take a deep dive into Cramer's world? Hit him up!Mad Money Twitter - Jim Cramer Twitter - Facebook - Instagram

Questions, comments, suggestions for the "Mad Money" website? madcap@cnbc.com

Continue reading here:
Crowdstrike CEO explains how the future of remote work and security will look - CNBC

Read More..

Mocana Recognized as Industry Leader in Cybersecurity and the Industrial Internet of Things – GlobeNewswire

SUNNYVALE, Calif., June 03, 2020 (GLOBE NEWSWIRE) -- Mocana Corporation,a leading provider of integrated device security solutions for IoT and control systems, has been recognized as one of the Top 10 companies to follow by Cybercrime Magazine. In another industry ranking, the company was cited by influencer research service Onalytica as a Top 50 global brand influencer for the Industrial Internet of Things (IIoT).

As hackers grow more daring and sophisticated, robust security measures are a must for any business, Cybercrime Magazine reported. The companies that provide the tools and services to fight these threats are likewise continually improving. To know how to defend your business and clients best, you need to be aware of cybersecurity industry leaders.

Mocana was lauded for its alternative approach to standard security strategies based on threat detection. Instead, the company was showcased for offering a proactive, preventative solution for a variety industrial, military, business, government, and consumer sectors.

The wider global application of IIoT in the process industries and critical infrastructure has significantly heightened our awareness of risk, said Dave Smith, president of Mocana. The threat now comes from many sources, including cybercriminals, nation-states and insiders. Reactive cybersecurity strategies are simply not enough to thwart the increasing sophistication of attack methods. Protection has to be built in to systems and devices to create an impenetrable hardened core.

In another key industry recognition, Mocana was listed among the Top 50 IIoT brands by Onalytica, a company that provides market intelligence on global influencers and brands. Onalytica analyzed 2.2 million posts on social media to identify companies that demonstrate leadership on transformative solutions for an interconnected industrial and consumer world.

Mocanas solution enables enterprises to securely scale the management of IoT and IIoT devices from inception to end-of-life, enabling self-protecting devices and systems that can be remotely managed and automatically and securely updated to address new risks.

The companys products include TrustPoint, TrustCenter and TrustCore. TrustPoint is an on-device security software solution that simplifies and lowers the cost of protecting devices and managing the security lifecycle. It works in concert with TrustCenter, the first security orchestration platform focused entirely on IoT/IIoT devices. The TrustCore development platform provides an innovative solution to empower application developers with a simple set of APIs to leverage data privacy and protection controls for safety, security and compliance without extensive re-engineering. Combined, these products ensure that devices are trusted and tamper-proof with credentials and software updates that are provisioned and managed to minimize vulnerabilities and promote scalability.

Mocanas comprehensive platform-based solution protects the entire supply chain from embedded chips to the applications that drive them. Mocana is the market leader with more than 200 customers and 100 million IoT/IIoT devices protected.

About Mocana Corporation

Mocana provides cyber protection for IoT, operational technology (OT) and mission-critical systems. The companys proven on-device cybersecurity software and life cycle management platform enable manufacturers and industrial companies to build self-defending systems that are tamper-resistant. Mocanas tightly integrated solutions help companies minimize the risk of a cyber breach, comply with industry standards, and protect intellectual property by ensuring that devices and processes are trusted end-to-end, from device manufacturing to deployment. Unlike IT network security approaches, Mocana enables devices to protect themselves and prevent malware from being installed. Founded in 2002, Mocana protects more than 100 million devices and is trusted by the worlds largest aerospace, industrial, energy, healthcare, and telecommunications companies.Learn more at mocana.com.

TrustPoint, TrustCenter and TrustCore are registered trademarks of Mocana Corporation.

Media Contact: Joel DonDigital Marketing and Communicationsjoeldon@mocana.com

Read the original post:
Mocana Recognized as Industry Leader in Cybersecurity and the Industrial Internet of Things - GlobeNewswire

Read More..

SC Awards Europe 2020 – CISO/CSO of the Year – SC Magazine UK

WINNER - CISO/CSO of the Year: Becky Pinkard

The footballing metaphor for cybersecurity is that of goalkeepers, but a more apt analogy for CISOs is a player-manager and team captain - leading by example. And this year the captains armband for CISO of the year goes to Becky Pinkard - CISO at Aldermore Bank PLC, co-founder of the We Empower Diversity in Start-ups (WEDS) group, mentor at CyLon cyber security accelerator, a renowned practitioner and commentator on information security, working in the sector since 1996. Pinkard is an influencer in the Cyber Security community and a role model for women in technology. A security transformation expert, Pinkard has built and managed global information security teams, designed risk and compliance strategies, led security audits and assessments, and developed security awareness training in small and large environments. Pinkard arrived in the UK in 2008 as Global Head of Attack at Barclays. Now she is back in the financial sector at Aldermore deploying her deep technical knowledge, highly developed communication skills and business acumen to manage change securely in this highly regulated industry.She is an active advocate for promoting diversity and inclusion in business and co-founded WEDS to use, the fresh opportunity start-ups present, to change industry culture for the better, to achieve more diverse and inclusive environments.As a CyLon mentor since 2017, Pinkard provides cyber security, operations and client success guidance to entrepreneurs. She also co-hosts a monthly podcast, Cyber Warrior Princess, focused on current cyber security related commentary.As a SANS Certified Instructor for over a decade, Pinkard served as a GIAC Certified Intrusion Analyst advisory board member and on the Strategic Advisory Council for the Center of Internet Security. She co-authored "Nmap in the Enterprise" and "Intrusion Prevention and Active Response, Deploying Network and Host IPS". Pinkard has shared her expertise at numerous industry events, in publications and in live interviews globally, including: The Wall Street Journal, Forbes, BBC News, Channel 4 News, and SC publications and events.I do security because I love it, says Pinkard.

More here:
SC Awards Europe 2020 - CISO/CSO of the Year - SC Magazine UK

Read More..

Spike in cryptojacking attempts on devices here, says cyber-security firm – The Straits Times

Hackers are taking over computers to mine for cryptocurrency, with cyber-security firm Kaspersky saying Singapore has had a spike in cryptojacking attempts in the first three months of this year.

The firm said it blocked more than 11,700 cryptojacking attempts on devices here between January and March - an increase of more than three times from the same period last year, when there were about 2,900 attempts.

Cryptojacking is the unauthorised use of someone else's device to mine for cryptocurrency by solving complex mathematical problems.

In a recently published report, Russia-based Kaspersky said the spike in Singapore is the highest percentage increase in South-east Asia.

Hijackers target Singapore because its information technology infrastructure offers a healthy supply of bandwidth for cyber criminals to take advantage of.

"Cyber criminals use various means to install miner programs on many people's computers, and take all of the profit from cryptocurrency mining without incurring any of the equipment or electricity costs," said Mr Yeo Siang Tiong, general manager for South-east Asia at Kaspersky.

The hackers rely on social engineering tactics, such as fake links in e-mails or on websites, to dupe victims into installing malicious code onto their devices and wider networks, which turns them into mining tools.

"Miner" computers and devices perform a job similar to a central bank, recording transactions in a ledger publicly accessible to anyone while checking the validity of these exchanges.

For their work, those behind the mining computers are awarded cryptocurrency, which can make the enterprise profitable if the miners can put in the time and energy.

Cyber criminals increasingly prefer cryptojacking to other forms of attacks as it is often more profitable and presents a lower risk of being caught.

The uptick in cryptojacking cases could be due to more people working from home amid the Covid-19 pandemic, said Mr K.K. Lim, head of cyber security, privacy and data protection at law firm Eversheds Harry Elias.

Some of the computers used at home might not have been issued by companies and their security features may not have been kept up to date.

Number of cryptojacking attempts on devices here that were blocked by cyber-security firm Kaspersky between January and March.

Number of such attempts blocked by the company in the same period last year.

Also, these computers could be shared with other household members, who could have unwittingly downloaded risky programs or visited risky sites, said Mr Lim.

Mr Yeo said many workers might not have the full support of IT security teams working remotely, leading to a lower standard of cyber hygiene during this period.

Experts say there are some signs to look out for if one suspects a device has been hijacked for cryptojacking.

"The tell-tale signs for crypto mining can include the slowing down of computer speed, higher consumption of electricity and higher usage of Internet bandwidth," said Mr Bryan Tan, a lawyer from Pinsent Masons MPillay specialising in technology law and data protection.

Mr Yeo Siang Tiong, general manager for South-east Asia at cyber-security firm Kaspersky, said the strain on a device's battery from mining could cause it to physically be deformed too, due to having its processing cores work overtime to obtain cryptocurrency.

He pointed to a recent study by Kaspersky which found that phones that were used to mine for cryptocurrency through malware for two days straight became physically deformed due to the phone batteries expanding.

"Batteries will run down much faster than before, and devices may run quite hot. If the device uses a data plan, users will see data usage skyrocket," he added.

Mr K.K. Lim, head of cyber security, privacy and data protection at law firm Eversheds Harry Elias, said having in place proper Internet browser security features, which can scan for malicious software, will go a long way towards shielding users from falling victim to cryptojacking. But he added that nothing beats practising good cyber hygiene habits such as avoiding unknown links in e-mail and having updated security features.

Here is the original post:
Spike in cryptojacking attempts on devices here, says cyber-security firm - The Straits Times

Read More..