Page 3,696«..1020..3,6953,6963,6973,698..3,7103,720..»

Love in the Age of Sex Robots | Hidden Brain – NPR

Kate Devlin, who studies human-computer interactions, says we're on the cusp of a sexual revolution driven by robotics and artificial intelligence. Angela Hsieh/NPR hide caption

Kate Devlin, who studies human-computer interactions, says we're on the cusp of a sexual revolution driven by robotics and artificial intelligence.

In the summer of 2017, Kate Devlin flew from London to southern California. She rented a Ford Mustang convertible and drove to an industrial park in San Marcos, a city south of Los Angeles. Her destination: Abyss Creations, a company that makes life-size sex dolls. In her new book, Turned On: Science, Sex and Robots, Kate describes the moment she first gazed up close at a life-size silicone woman.

"The detail is incredible," she writes. "My hand skims the ankle. The toes are perfect: little wrinkles on the joints, tiny ridges on the toenails. The sole is crisscrossed with the fine skin lines of a human foot. It's beautiful."

Part of Kate's interest in these dolls comes from their newest incarnations. Sex doll manufacturers are now prototyping models that come equipped with robotics and artificial intelligence. This is right in line with Kate's expertise. She studies human-computer interactions and artificial intelligence at King's College London. Kate says one of the more advanced models she viewed, a robot named Harmony, is programmed to offer both friendship and sex.

"She could do anything from telling you a joke, singing a song for you or propositioning you."

While some critics worry that sex dolls, especially ones with AI, cross a dangerous line, Kate believes much of the criticism comes from a fear of a technological landscape that feels unfamiliar and uncomfortable.

"I think that we have expectations that people have to meet a particular checklist of things in their life ... that you should meet someone and then you should marry them and then have children with them, and these are all very kind of macho normative stances that societies impose. And you know what, if people want to shake that up, I think it's good."

This week on Hidden Brain, we reflect on the narrowing gap between humans and machines. What are the possibilities for deep, intimate relationships with artificial lovers? And does it help if those lovers are beautifully designed to look like human beings, and have the faint glow of empathy and intelligence?

Excerpt from:
Love in the Age of Sex Robots | Hidden Brain - NPR

Read More..

LucidHealth and Riverain Technologies Are Committed to the Delivery of Advanced Radiology Through Artificial Intelligence – BioSpace

MIAMISBURG, Ohio--(BUSINESS WIRE)-- LucidHealth, a physician-owned and led radiology company, announced today that it is using FDA-approved ClearRead CT by Riverain Technologies, an artificial intelligence (AI) imaging software solution for the early detection of lung disease. LucidHealth is one of the first radiology companies in the Midwest to incorporate AI through its partnership with Riverain Technologies.

This press release features multimedia. View the full release here: https://www.businesswire.com/news/home/20200414005825/en/

LucidHealth is committed to advancing the quality of community radiology patient care by combining leading radiologist expertise with cutting edge Artificial Intelligence. Riverains ClearRead in combination with LucidHealths RadAssist workflow is just such an example, said Peter Lafferty, M.D., Chief of Physician Integration at LucidHealth.

We are proud to be working with LucidHealth as an AI vendor, said Steve Worrell, CEO at Riverain Technologies. Our ClearRead CT suite allows LucidHealth radiologists to provide quicker, more accurate readings, to work even more efficiently and generate higher-quality reports for better patient outcomes.

Riverain Technologies designs advanced AI imaging software used by leading international healthcare organizations. Riverain ClearRead solutions significantly improve a clinicians ability to accurately and efficiently detect disease in thoracic CT and Xray images and more successfully address the challenges of early detection of lung disease. Powered by machine learning and advanced modeling, the patented, FDA-cleared ClearRead software tools are deployed in the clinic or the Cloud and are powered by the most advanced AI methods available to the medical imaging market.

About LucidHealth:

LucidHealth is a physician-owned and led radiology management company. We partner with radiology groups to provide the technology and resources to increase the strategic value of their practices nationwide. Our belief is that all patients should have access to the highest quality of subspecialized imaging care, regardless of facility size or location. Our mission is to empower independent radiology groups to deliver world-class, subspecialized care to all patients within the communities they serve. For more information, please visit http://www.lucidhealth.com.

About Riverain Technologies:

Dedicated to the early detection of lung disease, Riverain believes the opportunities for machine learning and software solutions in healthcare are at an unprecedented level. Never before has the opportunity to do more with less been so great. We believe that these software tools incorporate an increasing degree of intelligence that will facilitate decision making which leads to greater efficiency and effectiveness in patient outcomes. Riverain Technologies is excited to be part of the advances in machine learning and scalability of technology that will bring efficiency and accuracy to physicians and, ultimately, improved patient care. For more information, please visit https://www.riveraintech.com/

View source version on businesswire.com: https://www.businesswire.com/news/home/20200414005825/en/

More here:
LucidHealth and Riverain Technologies Are Committed to the Delivery of Advanced Radiology Through Artificial Intelligence - BioSpace

Read More..

Genetics and Artificial Intelligence Drive Qatar University’s Covid-19 Research – Al-Fanar Media

Yassine believes that this allowed researchers to build their capabilities in this field and prepared them to quickly begin work on the SARS-CoV-2 virus.

The accumulated experiences, from working with other similar viruses, like influenza and Middle East respiratory syndrome coronavirus, meant we were ready for virus outbreak scenarios, he said.

We already had laboratories that can accommodate such research. We had techniques in place for genomic sequencing. We have also developed the capabilities of students working in the laboratory to analyze the samples.

The center also launched a study to identify genetic factors that increase the risk of the Covid-19 infection or of more serious complications from the infection among certain population.

I am trying to look at the picture from the host side rather than the virus side, Maria Smatti, a Ph.D. student and research assistant at the center, said. We have the genomic data and the disease severity. We will try to correlate this information to see the common genes between people who have severe Covid-19 disease compared to those who have milder disease.

This allows researchers to identify which population could have more severe symptoms due to genetic susceptibility. Clinicians and public health officials could then take special precautions to protect those who are particularly vulnerable to the disease.

Smatti said that previous studies had already found genes related to immune responses to viruses similar to the new coronavirus, but her work is broader as she is not only focusing on these known genes. Rather, she will check all mutations that correlate with the severity of Covid-19 infections.

The research is a collaboration between the center and Qatar genome program, in addition to being a collaboration with researchers and clinicians from Genomics England, which seeks to sequence 100,000 human genomes, and Imperial College London.

We have access to more than 15,000 genomes of the Qatari population and to the data of 100,000 genomes from U.K. populations, Smatti said. We started looking into the data from Qatar Genome [which has the genomes of Qataris] and expect to finish this phase of the research by the year end.

Yassine says that there is an established vision to develop scientific research in Qatar, but the Covid-19 disease has pushed the project forward.

As we are faced with a real outbreak now, this is an opportunity to gain firsthand experience and build our capacity to combat any new virus or emerging disease that appears in the future, he said.

Read the original:
Genetics and Artificial Intelligence Drive Qatar University's Covid-19 Research - Al-Fanar Media

Read More..

The security conundrum of 5G network slicing – Urgent Communications

One benefit of moving to a standalone 5G network is that it makes it possible for wireless operators to implement network slicing, which means they can run multiple dedicated networks that all share a common, physical infrastructure. Each network slice can have its own characteristics and identity but that also means it will have its own risks.

For example, one slice might be intended for an artificial reality (AR) use case and therefore be provisioned for high throughput and low latency. Another network slice might be intended for an Internet of Things (IoT) use case and be provisioned for extreme reliability and a lower speed. Using network slicing, operators will be able to partition their networks for these different use cases and run them independently.

This network slicing vision is appealing because it will let operators develop different business cases for each slice. But it is also a challenge because wireless operators will need to make sure that each network slice is protected from interference from the other slices and immune to distributed denial of service (DDoS) attacks and other security breaches. The security challenge is to provide different dynamic security policies for different slices, said Sree Koratala, vice president of product management for network security at security company Palo Alto Networks. For example, enterprise-grade security is needed for enterprises served by 5G network slices.

No standardHow operators handle the security of their network slices is up to them. The 3GPP, an industry standards group, has defined specifications for how operators build their 5G networks, but it hasnt developed any protocol for how security should be handled for network slicing.

However, the GSMA, an industry trade group, has created a security document that provides recommendations to operators on how to detect and prevent attacks using GPRS tunneling protocol (GTP-U).

To read the complete article, visit Light Reading.

Visit link:
The security conundrum of 5G network slicing - Urgent Communications

Read More..

Why you can’t trust your vote to the internet – CyberScoop

Written by Brett Winterford Apr 13, 2020 | CYBERSCOOP

A common adage in information security is that most startups dont hire their first full-time security engineer until theyve got around 300 employees.

If an app only stores public data and has no need to authenticate users, that might not present much of a problem. But when an app needs to be trusted to protect the confidentiality of a persons political preference, its something else entirely.

Its why Tusk Philanthropies an organization devoted to bringing mobile voting to the masses is playing matchmaker between a half-dozen mobile voting startups and the security experts that can help bring them up to snuff.

The team at Trail of Bits a boutique software security firm based in New York was commissioned by Tusk in late 2019 to conduct a thorough white box security test of mobile voting app Voatz, an app used in five states. The testers would have full access to all the source code and documentation they required to discover security gaps and recommend fixes.

The code looked sound, as it was clearly written by highly competent engineers. But after waiting over a week for technical documentation they requested from the startup, the Trail of Bits team had nothing to work off beyond a single page that amounted to a security policy.

After several meetings it became clear why we werent getting the documents we wanted, says Trail of Bits CEO Dan Guido. The person preparing them was the CEO.

The companys two co-founders were responsible for maintaining its substantive code base while straddling the complexities of running the Voatz business.

In total, Trail of Bits published 79 vulnerabilities in the app, a third of them high-severity. While some of the more avoidable misconfigurations found in the code became a source of mockery, the folly of any one bug was missing the point, according to Evan Sultanik, the lead tester on the project.

Im less concerned about finding hard-coded encryption keys copied from Stack Overflow in the code base, he told Risky Business. Im more worried that those keys were still in the code base since the last time it was used in 2018. There was a lot of evidence that this company is moving very, very fast and trying to keep up with the new requirements of each new election the app is used in. They are developing features on the fly.

With elections in the United States run and governed separately by each state, the functional requirements for any given voting system vary dramatically. None of the pilots are large enough to generate any meaningful revenue.

All the commercial electronic voting vendors will face the same time and resource constraints, Guido said. Software security and cryptography expertise is rare and expensive. I wish I had more of them.

He credits Tusk Philanthropy for co-funding security reviews for election system startups, some of whom couldnt afford them until they get significant scale. Tusk is doing so with the hope of eventually convincing the world that mobile apps will prove a safe, secure and convenient solution to voting systems that disenfranchise large swaths of the population.

Security testing might be more affordable if there was a global or national standard to test every election app against. But today, none exists. Election security expert Harri Hursti said that there is no criteria that governs the accreditation of voting devices used at polling stations.

They are not tested, Hursti said. In many states, the vendors certify themselves against whatever standard they choose and the evaluators are commissioned by the vendors.

Hursti has spent the better part of 20 years shining a light on the lax security in the voting systems. He co-founded the DEF CON Voting Village in which hackers are encouraged to try and break voting machines picked up off eBay and in government surplus auctions. Hes also been featured in two HBO documentaries Hacking Democracy and Kill Chain.

Hursti credits California and Ohio for setting a tougher testing criteria, but adds that testing spends a disproportionate amount of effort on safeguarding against a voter being electrocuted at the polling place compared to securing the data they submit.

Even with the bar as low as you could set it, there is no meaningful security testing, he said. It doesnt exist.

The federal government does maintain voluntary guidelines for voting machines in the polling place. But these have traditionally covered just about every aspect of the device apart from its security characteristics. A second version released in draft in late February introduced basic requirements around access control, data protection and detection and monitoring.

The revised standard emphatically states, for the first time, that no device or component of an election system should use external network connections. But it excludes any device that allows voters to mark a ballot outside a polling place, leaving very little guidance for election officials that wish to run remote elections.

Hursti believes that a set of federal standards written by security professionals at a body like the National Institute of Standards and Technologies and other election officials should be made mandatory. But he isnt holding his breath.

There is a strong feeling that any federalization of elections is unacceptable even in areas where it makes sense, he said. CISA is offering a lot of free services and tools to the states to help them secure the elections. There are a number of states that refuse to take free help, because their attitude is that this has to remain a state issue.

One of the key selling points for the Voatz app was that it would use the properties of decentralized blockchain to record a voters preference in some immutable yet auditable way.

This was what captured the attention of Mike Specter, a Ph.D. student at Massachusetts Institute of Technology who, unbeknownst to Trail of Bits, had started reverse engineering the Voatz app with one of his peers, with nothing guiding them but their own curiosity.

As academics wed previously explored all the theories of how you might use the blockchain to solve problems at the ballot box, he said. And our conclusion before we had ever studied any implementations in great details was that even at a theoretical level, a blockchain doesnt solve the core technical issues related to voting that would make elections more secure, and could in fact introduce further vulnerabilities.

No matter where their research led, Specter would always return to a basic problem: Couldnt someone just hack your phone and get the key? So why does any of this other stuff matter? The underlying problem is that consumer-grade devices are not that secure and dont stand up to the sort of adversaries that have the capability of buying zero-days and going after devices en masse. There has been insane amounts of losses from digital currency that is inaccessible due to people losing their keys or having their keys stolen.That logically led us down the path of asking ourselves what Voatz was doing, seeing as they make claims to use the blockchain to great effect.

Specter and fellow Ph.D. student James Koppel conducted a two-week black box study of the Voatz app. Without access to the Voatz source code, server or documentation, the two students had to painstakingly reverse-engineer the app to understand how it functioned.

As far as we could tell at the time, no one had ever publicly released a security review of Voatz, Specter said. Any publicly available audits didnt seem like audits in the computer security sense, and more so audits in the user testing sense. The fact the app works as intended is not the same as testing for what an adversary can do with this thing. There was also no whitepaper to explain what their architecture was. They talked of it including a mixnet, hardware-based key storage and lots of other security attributes that put together, you could hallucinate a number of these schemes, but we could find no evidence of it. We started pushing on it and it kept getting a little more weird.

Tellingly, the duo tapped into some of the same misconfigurations and missing features that the Trail of Bits study would later document. In the case of two young Ph.D. students, Voatz was confident it could refute their findings. If they hadnt seen the full picture, its founders reasoned, how could they know whether it was secure?

Specter has huge respect for election officials and the very difficult challenges they face. But he urges them not to be swayed by the big buzzwords like blockchain and AI. They will get far better results if vendors are simply forced to be transparent. They should be held to stronger testing regimes and for their source code to be open for analysis. He remains hopeful that a more rigorous set of security requirements enforced by one or more larger states will become a de facto standard for others to follow.

Jennifer Morell, expert adviser to the Cybersecurity and Infrastructure Security Agency agrees that online voting solutions are not ready for use in the November general election, but also hopes the academic and technology communities will keep pushing the boundaries to find workable solutions for remote voting.

I understand all the security issues around internet voting, but we should always be exploring and pushing for better ways to do this, she told Risky Business. Were not ready for November, but well before the next election we need to sit down with clarity and think about how to solve this together.

The most promising technology that might be applicable to remote marking of ballots would be homomorphic encryption, a form of cryptography in which computation on ciphertext produces the same result as computation on plaintext.

If homomorphic encryption was performant, Hursti says, it could preserve the privacy and secrecy attributes required for elections without compromising on auditability.

Today, homomorphic encryption is used in academic papers more so than in practice. To complicate matters, laws in some states insist that the common person has to be able to understand how votes are counted and how the election is ordered with no special training and tools.

We are lacking fundamentals, Hursti says. We cant lock the 10 smartest people in the world in a room and expect to solve the problem. This is a problem well need to think about for the next 40 years. The good news is [that] if you solve problems like this for elections, you would likely greatly improve the security of a lot of other applications.

There are lots of areas where more security research is more urgently needed, he said. How do we improve the security and usability of online voter registration? How do we improve election night reporting systems?

Guido agrees that some big leaps need to be made before allowing untrusted consumer systems to be used for remote marking of ballots.

There needs to be funding available for fundamental research, he said. The Election Assistance Commission with its two newly appointed security staff is not currently equipped to provide the step-change required. Guido speculates that considering the important nation-building work undertaken by the Department of Defense and Department of State in the aftermath of foreign conflicts, some of these larger bodies may have the right incentives and resources to contribute.

Election security is a hard problem, thats why Im attracted to it, Guido said. But its not an intractable problem. It feels to me like there are too many entrenched interests that want to prevent new entrants in voting technology. We need to bowl over that opposition if were to get this right. As a security community, we need to come at this problem as engineers and do more than just point out flaws. We need fundamental research to be funded and made available as a public resource.

Brett Winterford is an editor with Risky Business. This post was reported by and originally appeared on Risky.Biz, and was produced with support from the William and Flora Hewlett Foundation. You can read part one here.

Read more:
Why you can't trust your vote to the internet - CyberScoop

Read More..

How to Make Sure that Antivirus is on your Endpoints – Security Boulevard

Its now more critical than ever for small- to medium- sized businesses to have strong antivirus (AV) software on all of their endpoints. According to Symantecs 2019 Internet Security Threat Report, only 14% of small businesses say they have a highly effective ability to mitigate cyber attack even though 43% of all those attacks target small businesses.

It was an easier problem to solve in the past, when IT admins were responsible for Microsoft Windows systems in a predominantly Windows environment that was largely on-prem. The basic rule of thumb then was:

But much has changed. The cloud has moved apps, infrastructure, and files off-prem. Mac and Linux machines now populate the workplace meaning its no longer one-antivirus-fits-all. SCCM isnt the comprehensive solution that it used to be either.

And with current predictions saying that cybercrime will cost the world $6 trillion annually by 2021, businesses now cant afford to not have strict policies that mandate antivirus be on all endpoints.

Endpoints will always need to be secured, regardless of whether or not their data is stored in the cloud. A compromised endpoint can easily lead to compromised applications and infrastructure even cloud infrastructure full of critical data. And while Mac and Linux may be targeted less frequently by malware, theyre not immune.

The fact is that end users still download and save information on their own systems, and the device itself grants them access to everything else proprietary data, resources, and other secured information. AV protects against the possibility of the endpoint being taken over by a nefarious outsider, as well as malware, (Read more...)

Here is the original post:
How to Make Sure that Antivirus is on your Endpoints - Security Boulevard

Read More..

IoT security, neglected infrastructure, and a crisis of trust deemed major threats for 2022 – TechRepublic

The Information Security Forum predicts the coming threats with a very good track record so far. Get your company ready for these threats.

Armed with a "state of the industry" survey, most companies try to identify gaps to play catch up. In cybersecurity, that is too late. Companies need to stay a step ahead of malicious actors.

Some companies, like Shell Oil, are known for creating a variety of possible scenarios for the future and preparing for all of them. But with security, that is a nearly infinite task. The ideal choice would be to find someone who can predict future threats and to prepare for them in the present.

SEE: Brute force and dictionary attacks: A cheat sheet (free PDF) (TechRepublic)

That's not as far-fetched as it seems.

The Information Security Forum's (ISF) Threat Horizon Report, released annually, has actually predicted these risks:

Threat Horizon 2019 (published in 2017) suggested that the blockchain would be under attack, subverted to commit fraud and money laundering

Threat Horizon 2020 warned that the new biometric and facial recognition systems were more error-prone, and easier to trick, than anyone realized

The 2021 Threat Horizon pointed out malicious drones as a risk for target attacks

All three of these events came to pass. Most core blockchain code is open-source, and criminal contributors to the blockchain did add back-door theft code into dependencies many blockchain systems were relying on. Facial recognition systems have been underwhelming, while airports have been shut down by drone interference.

The 2022 report, which will be released on Thursday, breaks down the next threat into three categories.

Invasive technology disrupts the everyday. The Internet of Things (IoT) brought an incredible number of internet-connected devices inside the home, the enterprise, and public spaces, many of them with microphones and video cameras. While we have already seen "Hey Siri" on television trigger the devices at home, the ISF sees attacks on these devices impacting the physical world directly, with serious impacts on privacy, security, and personal safety.

Neglected infrastructure cripples operations. "Where" the software is running is becoming increasingly cloudy and exposed to the internet. These systems are also more complex and interleaved, with growing dependencies. That means a single failure from any source: Man-man, natural, accidental, or malicious-could lead to a service outage. Meanwhile, customers increasingly expect a 24/7 enterprise. Opportunistic actors can take advantage of this increased attack surface to steal data or cripple operations.

A crisis of trust undermines digital business. The ISF sees the first two issues creating large and public failures. Think about banks or insurance companies that "lose" or "leak" money or customer information. That can lead to a lack of trust in the new, evolving cloud compute infrastructure, in brand reputation, or even in the reputation of the executives running the company. Even a company that succeeds in maintaining its integrity, that trusts the right infrastructure and hires the right employees could suffer as the crisis of trust impairs its ability to do digital business.

SEE: The 10 most important cyberattacks of the decade (free PDF) (TechRepublic)

ISF goes into much more detail about particular types of malicious actors, from robo-helpers (which they define as network-connected autonomous agents) crawling for data to "deep fakes" which is truthful digital content, manipulated by artificial intelligence to seem believable, the worst possible kind of "fake news."

Steve Durbin, managing director of the ISF, explained how to leverage work this way: "The value lies in discussing upcoming scenarios, planning for those scenarios and, most importantly, engaging cross-organization teams in discussing the response playbook. COVID-19 has shone an additional light on the need for scenario planning for business continuity, and many organizations are already reviewing their risk postures and assessing future responses not just to the pandemic but also to other emerging threats. The Threat Horizon and its associated scenarios have a key role to play in this discussion."

Strengthen your organization's IT security defenses by keeping abreast of the latest cybersecurity news, solutions, and best practices. Delivered Tuesdays and Thursdays

Image: Sompong Lekhawattana, Getty Images/iStockphoto

Here is the original post:
IoT security, neglected infrastructure, and a crisis of trust deemed major threats for 2022 - TechRepublic

Read More..

Aspects of cybersecurity not to overlook when working from home – Big Think

Due to the novel coronavirus situation, billions of people are currently working remotely, many for the first time in their lives. It could be out of personal fears of infection, in obedience of local social distancing regulations, or in accordance with company-wide policies, but the end result is an unexpected shift from the norm of working in the office to working from home (WFH).

Managing a workforce that has been suddenly transformed into a remote one is challenging on many levels, not least because of the need to maintain cybersecurity standards. Prior to the COVID-19 outbreak, many enterprises had yet to contemplate a mass work-from-home scenario, and they therefore lack the policies, devices, or processes to support it securely.

What's more, in recent weeks, companies have been scrambling to preserve their security profiles in the face of an uptick in malicious actors seizing the opportunity to hack corporate systems. That's the bad news. The good news is that you're not powerless. There are practical steps you can take to safeguard confidentiality and cybersecurity with a WFH workforce.

Here are a few of the basics.

Photo by Dan Nelson on Unsplash

A VPN (Virtual Private Network) is the first and most obvious way to secure your organization when employees are logging in from home. When people work from home, they use public internet or weakly-secured WiFi connections to access confidential data in your central database. They also share sensitive files, offering a golden opportunity for hackers to intercept data mid-stream.

A VPN uses strong encryption to create a "tunnel" for any interactions between your employees, and between your employees and your secure corporate network.

Atlas VPN, one of the biggest VPN providers, reports that VPN use has surged in areas with high numbers of coronavirus cases, such as Italy and Spain.

Ignorance can be your biggest danger. If you're used to dealing with a secure internal network, you won't always know where your vulnerabilities and weaknesses lie when it comes to remote access.

This kind of blindness can lead quickly to data breaches that you might not even be aware of until months after the event.

To resolve this issue, use tools like Cymulate's breach and attack simulation platform, which runs simulated attacks across remote connections to assess your cybersecurity risk levels. This can help you determine the extent to which your settings, defenses, policies, and processes are effective, and where you need to make changes in order to maintain a secure organization.

Photo by Mimi Thian on Unsplash

Employees are vital to your success, but they can also cause your downfall. According to security experts at Kaspersky, 52 percent of businesses acknowledge that human error is their biggest security weakness. What's more, some 46 percent of cybersecurity incidents in 2019 were at least partially caused by careless employees.

Employees can cause data breaches in multiple ways, like failing to use a secure connection to download confidential data, forgetting to lock their screens when working in a public place, or falling for phishing emails that install malware on their devices. In addition, your employees might be the first to know about a security breach but choose to hide it out of fear of repercussions, making a bad situation worse.

It's vital to invest time and energy in employee training to ensure that everybody knows how to reduce the risk of successful hacking attacks and is not afraid to report security incidents as soon as they occur. Frequent reminders, online refresher courses, and pop-up prompts help employees take security seriously.

Access controls are a vital layer of security around your network. Losing track of who can access which platforms, data and tools means losing control of your security, and that can be disastrous.

Even in "normal" times, 70 percent of enterprises overlook issues surrounding privileged user accounts, which form unseen entrances to your organization. As the WFH situation drags on, it's even more likely that access controls will lag, opening up holes in your perimeter.

In response, use role-based access control (RBAC) to allow access to specific users based on their responsibilities and authority levels in the organization. By monitoring and strategically restricting access controls, you can further reduce the risk that human error might undermine your careful cybersecurity arrangements.

Because most companies were not yet set up for remote work when the COVID-19 crisis hit, the lion's share of devices used to connect from new home offices are not owned or configured by employers.

And with employees more likely to use their own computers when working from home, endpoint attacks become even more serious. SentinelOne, an endpoint security platform, reported a 433 percent rise in endpoint attacks from late February to mid-March.

Although it can seem difficult to secure endpoints when employees are working remotely, it is possible. SentryBay's endpoint application encryption solution takes a different approach, securing apps in their own "wrappers," as opposed to working on a device security level.

Finally, weak passwords are a known gift for hackers. The problem only grows when employees work from home, as the contextual shift makes it easier for them to ignore reminders from your security team. They are also more likely to share or save credentials for faster remote access when it takes time to get a response from a newly remote security team.

If you don't already use a password manager to force employees to generate strong passwords and avoid sharing or saving credentials, now is the time to begin. CyberArk Enterprise Password Vault requires users to update passwords regularly, enforces multi-factor authentication (MFA) to reduce the chances of hackers entering your network through stolen passwords, and provides auditing and control features so you can track when someone uses or misuses an account.

Consumer password managers like LastPass and 1Password likewise offer business tiers with similar features.

With enterprises unprepared for mass remote working, industries worldwide could face a security nightmare. However, applying best security practices and using advanced tools to test for vulnerabilities, supervise access controls and password management, secure connections, and apply endpoint encryption can go a long way.

Make sure your employees know your security policies will help harden your attack surface, improve your cybersecurity posture, and prevent COVID-19 from causing a cybersecurity plague.

From Your Site Articles

Related Articles Around the Web

Go here to see the original:
Aspects of cybersecurity not to overlook when working from home - Big Think

Read More..

The Rise of the Secure Internet Gateway – Communal News

Ed is working from a plane, Emily just uploaded that strategy deck to Box, and youre not exactly sure where Phil is, but you know hes working based on the number of emails youve received from him. Today, this is how the world works. Before, everything was contained within your network perimeter.

All of your critical infrastructure, servers, applications, data, and people (Ah, remember the days of desktop computers?). Branch offices used to backhaul all traffic to corporate, so you could easily extend the scope of your network perimeter. Naturally, your approach to security was different, because the way people worked was different.

Security used to be more about building a taller wall around your perimeter and checking off boxes for compliance and HR acceptable use policies, instead of defending the business against data breaches and advanced attacks. Most security products were built as closed systems that couldnt integrate together or share intelligence.

The IT landscape has evolved. Critical infrastructure, applications, and data are moving to the cloud, leveraging either public or private cloud infrastructure. Salesforce.com, Box, G Suite, Office 365, and other software-as-a-service (SaaS) apps, whether sanctioned by IT or not, are commonplace in companies of all sizes and industries even the most highly regulated ones. Not only does this raise questions about how to protect where sensitive data is going and how its being used, but it also changes how employees get their work done.

Your users, especially when working outside of the office, no longer need to always connect to the corporate network to get work done. They often connect directly to SaaS apps. And, lets face it, employees also dont turn on the VPN if theyre using their work laptop for personal use which means theyre left with very little security protection.

Plus, many organizations are now using direct internet connections at branch offices, which means employees and guest users dont get the protection of your traditional security stack. Not only are more offices connecting directly to the internet its estimated that 70% of branch offices already have some direct internet access but attackers recognize these weak points in their targets and have started exploiting them more.

To solve these new challenges, security controls must also shift to the cloud. This paper describes how security must evolve to protect users anywhere they access the internet, why traditional secure web gateway (SWG) solutions cannot address these gaps, and why a new kind of internet gateway represents an entirely new way of thinking about securing your users.

Looking back: Secure Web Gateways were originally built to control, not secure users and data.

SWGs are often used as one way to protect users against threats online. But, is that what they were really built to do? Think back a couple of decades to a time when bandwidth was expensive and there was a concern about employee productivity online. To offset these challenges, web proxy technology was born.

Web gateways were designed to control web traffic as a way to manage bandwidth consumption, and they controlled access to inappropriate sites to help you manage productivity. Sure, it required a lot of maintenance and exceptions to work around some problematic web apps and sites, but it seemed worth it back then.

Later, companies became increasingly concerned about users going to malicious sites and their sensitive data leaking on the web. In response to these liability and breach risks, SWG vendors strengthened content filtering and added data loss prevention capabilities to better analyze all web traffic and better control its movement. Since they are typically built on a proxy architecture, SWGs are able to analyze web content and determine if a site presents a security risk.

To read full download the whitepaper:

Follow this link:
The Rise of the Secure Internet Gateway - Communal News

Read More..

The University and its students must be more considerate of essential USC staff – Daily Trojan Online

In efforts to continue the work of protests for fairer treatment for USC staff, students must maintain their appreciation and support for essential staff. (Daily Trojan file photo)

Campus turned into a ghost town within a matter of weeks, but USC employees have remained active since student activities grounded to a halt. While the University has taken great precautions to keep faculty and staff at home amid increasing coronavirus concerns, it takes a village to run USCs 226-acre University Park Campus, and each job carries its own set of challenges.

From Trader Joes staff to USC Housing employees to IT security workers, many employees that work at the University are making sacrifices to keep the University body housed, fed and connected to services like healthcare and internet access.

Many Trader Joes employees fear they will contract the virus despite social distancing measures implemented by the chain. The store currently restricts hours during restocking periods and only serves senior customers and customers with disabilities who may need special assistance during the first hour of operation, but cashiers greet a steady stream of shoppers throughout their shift likely coming into contact with carriers of the virus.

Some USC Housing staff carry spray bottles with disinfectant for the same reason, and residence halls now require students still living on campus to use face recognition technology upon entering instead of scanning their fingerprint. Despite these precautions, many essential workers who cannot work from home fear that increased sanitation may not be enough to keep the virus at bay.

Medical professionals like those at Keck Medicine of USC work around the clock to provide healthcare to the Los Angeles community, and IT workers work long hours to prevent Zoom-bombings and maintain internet security, according to employees. With little idea as to how long these circumstances will last, the University and administrators serve important roles in adapting institution operations to online formats seamlessly and communicating policy changes effectively.

As of April 8, all non-essential USC staff unable to complete work from home became entitled to paid administrative leave through May 13 but that period will end, leaving spring semester employees uncertain about their summer employment. This policy is an improvement however upon the actions of L.A. County, which issued eligible employees two weeks of paid administrative leave and up to 12 weeks reduced emergency paid sick leave under the Emergency Paid Sick Leave Act. Both frameworks excel in comparison to Trader Joes token employee bonuses and extended sick time reviewed on a case-by-case basis through April 15.

Non-essential workers who cannot perform their roles online will soon find themselves in a dire predicament: stay home and keep their families safe and face financial hardship or use sick time off in hopes that they will be able to return to recover their losses.

Meanwhile, non-essential student workers unable to work from home are able to log their hours and receive normal pay beyond the two-week pay period. This is helpful for students who receive financial aid through work-study, but it makes little sense that the barista at a shuttered coffee kiosk should struggle to receive income while students who normally do their homework behind department reception desks still get full pay.

In an ideal world, both groups of employees would receive compensation during this period of upheaval. If that outcome is not possible, USC may need to reconsider who is receiving compensation and move forward with more utilitarian measures. Additionally, students must take time to acknowledge essential workers on campus and overtaxed employees off campus. They ought to remain informed by reading their emails regularly, and they should stay positive by taking care of themselves as well as thanking those around them.

The community has entered a period that requires patience, both on behalf of professionals and their clients. Campus is not dead, and its staff continue to face new challenges that should not go unnoticed.

Excerpt from:
The University and its students must be more considerate of essential USC staff - Daily Trojan Online

Read More..