Page 3,716«..1020..3,7153,7163,7173,718..3,7303,740..»

Special Report on Cloud ERP in the Aftermath of COVID-19 to Be Hosted by ERP Advisors Group – EconomyWatch.com

The conference call and webinar will focus on finding an appropriate enterprise software path going forward in the aftermath of the COVID-19 coronavirus.DENVER-April 6, 2020- (Newswire.com)

ERP Advisors Group is hosting a Special Report on Cloud ERP in the Aftermath of COVID-19 conference call on Thursday, April 7, with registration available at erpadvisorsgroup.com/events.

The call will focus on sifting through the realities of COVID-19 and its aftermath, with an in-depth look at finding the appropriate enterprise software path going forward.

Explaining the urgency of this special report, the Founder and Managing Principal of ERP Advisors Group, Shawn Windle, stated that Quite a few businesses and organizations have been reaching out to us for software guidance in these uncertain times. They have asked us what to do, and we aim with this call to provide practical and helpful advice. We believe that if you can get the right infrastructure in place now, you will be set for whatever the future holds.

Windle noted that while pessimism surrounding the impact of COVID-19 on business forecasts tends to garner the most attention, it is important to stay focused on the opportunities wherever possible.

We as an organization have racked our minds about how we can help reduce the fear that everyone is living with today, said Windle. We are hosting this special report to examine what ERP strategies could be effective for businesses and organizations that dont know what to do. Given the vital role enterprise software has played in business continuity with COVID-19, our clients have grown increasingly aware of how important ERP has been to the viability of their businesses.

To register for the call, please visit erpadvisorsgroup.com/event/special-report-on-cloud-erp-in-the-aftermath-of-covid-19

See the original post here:
Special Report on Cloud ERP in the Aftermath of COVID-19 to Be Hosted by ERP Advisors Group - EconomyWatch.com

Read More..

On the tech horizon: Here’s a look at what’s coming across NC in May – WRAL Tech Wire

Plenty of technology and life science events and deadlines are on tap for May.

If youre interested in events coming up in the immediate future, check out our two-part list of:

Also, check out our list of 145 meetups in the Triangle.

These columns accompany our interactive calendar, along with a comprehensive resource package for startups in the Triangle.

Keeping up with WRAL TechWires continued initiative to track events happening across North Carolina, heres a look at whats to come in May:

This free monthly interactive webinar provides participants with an overview of NC TECHs activities, resources and member offerings.

ProductCampRTP is back with another unconference style program. This seasons event will focus on the role of data in solving problems.

This weekly meetup brings together developers, IT professionals and tech enthusiasts who are interested in the Google Cloud Platform.

The Council for Entrepreneurial Development is bringing its flagship Venture Connect Summit onlinetech and life science companies can join to network and connect with other entrepreneurs and investors virtually. More TechWire coverage here.

The City of Winston-Salems Office of Business Inclusion and Advancement is hosting its sixth Business Plan Competition, in which winners can receive grants and micro-loans for starting up their business.

Presented by Flywheel Coworking and hosted by Benekiva CEO Bobbie Shrivastav, this event will feature live technology demos from Triad-area startups.

In this virtual session, IT leaders at NC TECH member companies will discuss relevant topics and best practices in their field.

Join the Code for Chapel Hill meetup to network with like-minded individuals and work on civic hacking projects. Meetings are held every two weeks on Tuesdays.

Every Wednesday morning, entrepreneurs in the Lake Norman area join to present their companies to mentors, advisers and other startups. Join to meet new people and collaborate with fellow entrepreneurs.

This online meeting will convene CISOs, VPs and director-level security leaders from NC TECH member companies.

Held every month, 1 Million Cups Charlotte features a presentation from a local startup followed by a Q&A from the community. Free coffee is included.

1 Million Cups, presented by Kauffman, is a weekly informal pitch event for the startup community. Join for free coffee and entrepreneurial support as local startups deliver their presentations.

This weekly event brings together entrepreneurs in the Wilmington and Cape Fear community to gather for coffee, casual startup pitches and conversation.

Ashevilles startup community meets weekly to hear presentations and support one another in continuing to grow.

Every Wednesday, Packard Place is hosting a virtual gathering with Charlottes tech community. Join for networking and conversations over drinks.

The Charlotte chapter of the Ellevate network is hosting a casual social for both members and non-members in Matthews.

Held on a weekly basis, this Venture Caf event series provides all sorts of programming for Piedmont Triad entrepreneurs and innovators. Every Thursday evening, the community gathers for networking, panel talks, workshops, presentations, product demos, interviews, and more.

In this nine-month program, participants will develop the skills and knowledge needed to be a community leader.

This free bi-monthly event offers a space for local tech professionals to build connections and find potential job opportunities.

This weekly meetup brings together developers, IT professionals and tech enthusiasts who are interested in the Google Cloud Platform.

Code for Durham brings together technologists, designers, developers, data scientists, map makers and activists to collaborate on civic technology projects. Meetings are held every two weeks on Tuesdays. Pizza will be provided.

Every Wednesday morning, entrepreneurs in the Lake Norman area join to present their companies to mentors, advisers and other startups. Join to meet new people and collaborate with fellow entrepreneurs.

1 Million Cups, presented by Kauffman, is a weekly informal pitch event for the startup community. Join for free coffee and entrepreneurial support as local startups deliver their presentations.

This weekly event brings together entrepreneurs in the Wilmington and Cape Fear community to gather for coffee, casual startup pitches and conversation.

Ashevilles startup community meets weekly to hear presentations and support one another in continuing to grow.

Every Wednesday, Packard Place is hosting a virtual gathering with Charlottes tech community. Join for networking and conversations over drinks.

In this lunch and learn, CrossComm Senior Software Engineer Ben Berry will share the advantages and drawbacks of USB, Classic Bluetooth, BLE, NFC, UWB, WiFi and 5G.

Held on a weekly basis, this Venture Caf event series provides all sorts of programming for Piedmont Triad entrepreneurs and innovators. Every Thursday evening, the community gathers for networking, panel talks, workshops, presentations, product demos, interviews, and more.

The Charlotte chapter of the Ellevate network is hosting a casual social for both members and non-members.

The Charlotte chapter of the Ellevate network is hosting a casual social for both members and non-members in Cornelius.

In this free workshop, participants will learn how to adopt and apply the entrepreneurial mindset in their lives.

This weekly meetup brings together developers, IT professionals and tech enthusiasts who are interested in the Google Cloud Platform.

Join the Code for Chapel Hill meetup to network with like-minded individuals and work on civic hacking projects. Meetings are held every two weeks on Tuesdays.

Every Wednesday morning, entrepreneurs in the Lake Norman area join to present their companies to mentors, advisers and other startups. Join to meet new people and collaborate with fellow entrepreneurs.

NC TECHs Job Fair series connects local tech talent to the companies and organizations looking to hire in the community.

1 Million Cups, presented by Kauffman, is a weekly informal pitch event for the startup community. Join for free coffee and entrepreneurial support as local startups deliver their presentations.

This weekly event brings together entrepreneurs in the Wilmington and Cape Fear community to gather for coffee, casual startup pitches and conversation.

Ashevilles startup community meets weekly to hear presentations and support one another in continuing to grow.

On the third Wednesday of every month, the Queen Citys entrepreneurial community joins together for an evening of networking and connections over drinks.

NC TECHs Government Vendor Network is a forum for member companies who are interested in doing business with state government. This months event will feature a talk from Tracy Doaks, the new secretary of the NC Department of IT and State CIO.

Held on a weekly basis, this Venture Caf event series provides all sorts of programming for Piedmont Triad entrepreneurs and innovators. Every Thursday evening, the community gathers for networking, panel talks, workshops, presentations, product demos, interviews, and more.

This free bi-monthly event offers a space for local tech professionals to build connections and find potential job opportunities.

This weekly meetup brings together developers, IT professionals and tech enthusiasts who are interested in the Google Cloud Platform.

Code for Durham brings together technologists, designers, developers, data scientists, map makers and activists to collaborate on civic technology projects. Meetings are held every two weeks on Tuesdays. Pizza will be provided.

Bring your ideas and opinions to the next Midtown Techies meetup. Events are held on the last Tuesday of every month.

Every Wednesday morning, entrepreneurs in the Lake Norman area join to present their companies to mentors, advisers and other startups. Join to meet new people and collaborate with fellow entrepreneurs.

1 Million Cups, presented by Kauffman, is a weekly informal pitch event for the startup community. Join for free coffee and entrepreneurial support as local startups deliver their presentations.

This weekly event brings together entrepreneurs in the Wilmington and Cape Fear community to gather for coffee, casual startup pitches and conversation.

Ashevilles startup community meets weekly to hear presentations and support one another in continuing to grow.

Join an open tour of the Skookum office to get an introduction to the tech and ideas powering the community. The Skookum team will be available for any questions or comments participants may have. Lunch will be provided.

Held on a weekly basis, this Venture Caf event series provides all sorts of programming for Piedmont Triad entrepreneurs and innovators. Every Thursday evening, the community gathers for networking, panel talks, workshops, presentations, product demos, interviews, and more.

This weekly meetup brings together developers, IT professionals and tech enthusiasts who are interested in the Google Cloud Platform.

New Ventures is currently accepting applicants for its latest accelerator cohort. Companies accepted into the three-month program receive a residency at Flywheel Coworking, acceptance into Winston Starts Explore Program, mentorship, and access to top investors in the Triad and beyond. The accelerator culminates in a competition where an average of $50,000 in funding is awarded per startup. (NOTE: Due to the COVID-19 crisis, New Ventures has rescheduled the accelerator. The application deadline is now extended to May 31, and the accelerator will begin in August.)

Original post:
On the tech horizon: Here's a look at what's coming across NC in May - WRAL Tech Wire

Read More..

A cost-effective approach to SQL server high availability in the cloud – ITProPortal

Configuring SQL Server for high availability (HA) can be a costly prospect. In a traditional on-premises approach, one creates a failover cluster instance (FCI) with two (or more) servers. Only one of those servers is typically performing production tasks at any moment; the others are largely standing ready to be called into service should the primary server fail. When your SQL Server requirements demand a large system with multiple high-powered CPU cores and hundreds of gigabytes of memory, your FCI can have a lot of expensive hardware doing nothing but standing by.

The cloud affords you different options when it comes to configuring for HA. In Azure, AWS, and Google Cloud Platform (GCP) you can create a SQL Server FCI on virtual machines (VMs) rather than on physical machines. More interestingly, you may find that you can create an FCI in the cloud whose backup VMs are not equal in size and performance to the primary VM running your production SQL Server instance. You might configure your secondary VMs as much smaller systems.

Why? Because you may be able to cut your operating costs considerably. The VM you need for your primary production environment may be very expensive, but if you provision your backup VMs as smaller servers think of them as emergency spare tires as opposed to full-sized spares you can pay far less for the systems that are doing nothing but waiting to be called into emergency service.

But heres where the cloud and the elasticity of VMs provide a distinct advantage over an FCI built on-premises: If an event occurs that causes your FCI to fail over to one of the smaller secondary VMs, you can re-provision that smaller VM so that it reconstitutes as a new VM that is as large and as powerful as the original primary. The secondary that would have been far too small to support your production load becomes a VM that can then deliver the full support that your SQL Server application demands. The fee for that secondary VM will increase commensurately, but you have avoided paying that higher fee until this moment. In an on-premises FCI you would have been paying for the larger system for months, possibly years while it sat waiting to be brought online.

Later, whenever the previous primary VM comes back online, you have a choice: you can either move your production SQL Server load back to that VM and return the secondary VM to its emergency spare tire size or shrink the original primary to that spare-tire size and continue to use it as the new secondary failover server in the FCI. If the latter, youd continue to use the expanded secondary VM as your primary production system. Note that if youre taking advantage of the AWS EC2 Reserved Instances option, you will continue to be charged the higher rate once youve expanded the VM, even if you subsequently shrink it down to its previously undersized dimensions.

Are there trade-offs to configuring an FCI with undersized secondary VMs? There are, and they are important to weigh in the balance.

Youre configuring for HA for a reason, and its important to have a clear understanding of your expectations. We can talk about HA in terms of a cloud SLA that guarantees access to at least one of the VMs in your FCI 99.99 per cent of the time, but when weighing the use of undersized backup servers in a SQL Server FCI there are two other metrics you need to take into consideration.

The first is your recovery time objective (RTO), which represents the amount of time it will take to get your application back up and running in the event of a failure. By definition, an HA solution must be able to detect a failure of the primary VM and then perform an automatic recovery which, at a high level, means failing over to the secondary VM, rolling back the database to the last committed transaction, and making the secondary instance of SQL Server the primary instance so that users can begin working with the database again. The amount of elapsed time that you would consider acceptable between the event that causes failure of the primary and the resumption of user interaction with SQL Server on the secondary VM is your recovery time objective.

Knowing your RTO is important because one of the trade-offs in using an undersized secondary that you intend to convert into a larger VM when necessary is that reprovisioning takes time. Its only a matter of minutes, but if those extra minutes might result in the loss of millions of dollars worth of transactions then using undersized VMs as your secondaries may not be worthwhile. However, if taking an extra two minutes to reprovision the secondary as a larger VM results in a minimal loss of revenue or customer satisfaction, then the amount of money you save by not paying for a larger standby VM may warrant consideration of an undersized approach.

The second metric to weigh in the balance is your recovery point objective (RPO), which represents the amount of data you can stand to lose in a failure scenario. When youre configuring for HA, its safe to assume that you dont want to lose any data, but that means that you need to ensure that your backup VMs have access to the data that your primary SQL Server instance is working with. Since no provider currently offers a shared cloud storage solution with a 99.99 per cent availability SLA, youll need a way to reliably replicate your SQL Server data among the separate physical locations where your secondary VMs reside.

If you configure for HA using a SQL Server Always On Availability Group (AG) approach (rather than as an FCI), SQL Server will replicate your user-defined databases to your secondary servers. However, Always On Availability Groups require SQL Server Enterprise Edition, which is going to increase your costs (and the whole point of under sizing your secondaries is to decrease your costs). Youll also find that key SQL Server databases (for agents, jobs, passwords, etc.) are not replicated to the secondary VMs under AG.

If youre using SQL Server Standard Edition or if your RPO demands that you replicate all SQL Server databases to the secondary VMs, then youll want to construct an FCI using a SANless Clustering tool such as SIOS DataKeeper, which provides complete database replication between your primary and secondary VMs. That way, when the secondary VM is called into service, all the data that the primary had been working with is available to the secondary.

Second, while services within AG or Windows failover cluster manager can automate failover to the secondary VM, it is not possible to automate the resizing of the secondary server. Youll have to do that manually. You should start by configuring an alert that notifies you when a failover occurs. At that point you will need to make a decisiondo I upsize the target or fail back to the original server? Some failures might be transient, in which case moving the workload back to the original server will be your best option for the quickest recovery. However, its not always obvious why the original server failed, so you may find SQL Server failing over again soon after you fail back. In other cases, such as where there is a service interruption in the availability zone where your primary VM resides, the best option will be to go ahead and resize the undersized VM since you wont know how long the outage will last.

Two final points to consider when weighing the cost-effectiveness of configuring SQL Server for HA in the cloud using undersized secondaries are these:

First, you must be careful when picking the size of the undersized target. Cloud instances throttle disk IOPS based upon instance size. You should check the disk IOPS on the secondary VM to ensure it will not become a bottleneck for your SQL Server load at failover. Fortunately, on the target VM you will typically be seeing write IOPS, not read IOPS.

Dave Bermingham, Senior Technical Evangelist, SIOS Technology

Read more:
A cost-effective approach to SQL server high availability in the cloud - ITProPortal

Read More..

Zoom’s Flawed Encryption Linked to China – The Intercept

Meetings on Zoom, the increasingly popular video conferencing service, are encrypted using an algorithm with serious, well-known weaknesses, and sometimes using keys issued by servers in China, even when meeting participants are all in North America, according to researchers at the University of Toronto.

The researchers also found that Zoom protects video and audio content using a home-grown encryption scheme, that there is a vulnerability in Zooms waiting room feature, and that Zoom appears to have at least 700 employees in China spread across three subsidiaries. They conclude, in a report for the universitys Citizen Lab widely followed in information security circles that Zooms service is not suited for secrets and that it may be legally obligated to disclose encryption keys to Chinese authorities and responsive to pressure from them.

Zoom could not be reached for comment.

Earlier this week, The Intercept reported that Zoom was misleading users in its claim to support end-to-end encryption, in which no one but participants can decrypt a conversation. Zooms Chief Product Officer Oded Gal later wrote a blog post in which he apologized on behalf of the company for the confusion we have caused by incorrectly suggesting that Zoom meetings were capable of using end-to-end encryption. The post went on to detail what encryption the company does use.

Diagram of how Zoom meetings work.

Zoom

Based on a reading of that blog post and Citizen Labs research, here is how Zoom meetings appear to work:

When you start a Zoom meeting, the Zoom software running your device fetches a key with which to encrypt audio and video. This key comes from Zooms cloud infrastructure, which contains servers around the world. Specifically, it comes from a type of server known as a key management system, which generates encryption keys and distributes them to meeting participants. Each user gets the same, shared key as they join the meeting. It is transmitted to the Zoom software on their devices from the key management system using yet another encryption system, TLS, the same technology used in the https protocol that protects websites.

Depending on how the meeting is set up, some servers in Zooms cloud called connectors may also get a copy of this key. For example, if someone calls in on the phone, theyre actually calling a Zoom Telephony Connector server, which gets sent a copy of the key.

Some of the key management systems 5 out of 73, in a Citizen Lab scan seem to be located in China, with therest in the United States. Interestingly, the Chinese servers are at least sometimes used for Zoom chats that have no nexus in China. The two Citizen Lab researchers who authored the report, Bill Marczak and John Scott-Railton, live in the United States and Canada. During a test call between the two, the shared meeting encryption key was sent to one of the participants over TLS from a Zoom server apparently located in Beijing, according to the report.

The report points out that Zoom may be legally obligated to share encryption keys with Chinese authorities if the keys are generated on a key management server hosted in China. If the Chinese authorities or any other hypothetical attacker with access to a key wants to spy on a Zoom meeting, they also need to either monitor the internet access of a participant in the meeting, or monitor the network inside the Zoom cloud. Once they collect the encrypted meeting traffic, they can use the key to decrypt it and recover the video and audio.

Citizen Lab flagged as worrisome not only the system used to distribute Zoom encryption keys but also the keys themselves and the way they are used to encrypt data.

Zooms keys conform to the widely used Advanced Encryption Standard, or AES. A security white paper from the company claims that Zoom meetings are protected using 256-bit AES keys, but the Citizen Lab researchers confirmed the keys in use are actually only 128-bit. Such keys are still considered secure today, but over the last decade many companies have been moving to 256-bit keys instead.

Furthermore, Zoom encrypts and decrypts withAES usingan algorithm calledElectronic Codebook, or ECB, mode, which is well-understood to be a bad idea, because this mode of encryption preserves patterns in the input, according to the Citizen Lab researchers. In fact, ECB is considered the worst of AESs available modes.

Heres why: It should be impossible to tell the difference between properly encrypted data and completely random data, such as static on a radio, but ECB mode fails to do this. If theres a pattern in the unencrypted data, the same pattern shows up in the encrypted data. This Wikipedia page has a useful illustration to visualize this:

Patterns appearing in data encrypted with AES in ECB mode.

Wikipedia

Once it has been poorly encrypted in this manner, video and audio data is distributed to all participants in a meeting through a Zoom Multimedia Router server. For most users, this server runs in Zooms cloud, but customers can choose to host this part on-premises. In this case, Zoom will generate, and thus have access to, the AES key that encrypts the meeting but shouldnt have access to the meeting content itself, so long as none of the aforementioned connector servers (for phone calls and so forth) are participating in the meeting. (In its blog post, Zoom said self-hosting customers will eventually be able to manage their own encryption keys.)

Meeting hosts can settheir meetings to have virtual waiting rooms, making it so that users do not directly enter the meeting when they log on with Zoom but instead must wait to be invited in by a participant. The Citizen Lab researchers discovered a security vulnerability with this feature while conducting their encryption analysis. They said in their report that they have disclosed the vulnerability to Zoom but that we are not currently providing public information about the issue to prevent it from being abused. In the meantime, the researchers advised Zoom users who desire confidentiality to avoid using waiting rooms and instead set passwords on meetings.

The newly uncovered flaws in Zooms encryption may be troubling for many of the companys customers. Since the coronavirus outbreak started, Zooms customer base has surged from 10 million users to 200 million, including over 90,000 schools across 20 countries, according to a blog post by Zoom CEO Eric Yuan. The U.S. government recently spent $1.3 million on Zoom contracts as part of its response to the pandemic, according to a review of government contracts by Forbes, and the U.K. government has been using Zoom for remote Cabinet meetings, according to a tweet from Prime Minister Boris Johnson.

Among those who should be concerned about Zooms security issues, according to Citizen Lab, are governments worried about espionage and businesses concerned about cybercrime and industrial espionage.

Despite a recent flood of security and privacy failures, Yuan, Zooms CEO, appears to be listening to feedback and making a real effort to improve the service. These new, mostly consumer use cases have helped us uncover unforeseen issues with our platform. Dedicated journalists and security researchers have also helped to identify pre-existing ones, Yuan wrote in his blog post. We appreciate the scrutiny and questions we have been getting about how the service works, about our infrastructure and capacity, and about our privacy and security policies.

In addition to promptly fixing several security issues that were reported, the company removed an attendee attention tracker feature, a privacy nightmare which let meeting hosts track whether participants had the Zoom window or some other apps window in focus during a meeting. It has also invested in new training materials to teach users about the security features like setting passwords on meetings to avoid Zoom-bombing, the phenomenon where people disrupt unprotected Zoom meetings.

Because Zooms service is not end-to-end encrypted, and the company has access to all encryption keys and to all video and audio content traversing its cloud, its possible that governments around the world could be compelling the company to hand over copies of this data. If Zoom does help governments spy on its users, the company claims that it hasnt built tools specifically to help law enforcement: Zoom has never built a mechanism to decrypt live meetings for lawful intercept purposes, Gal, Zooms chief product officer, wrote in the technical blog post, nor do we have means to insert our employees or others into meetings without being reflected in the participant list.

Unlike some other tech companies, Zoom has never released any information about how many government requests for data it gets, and how many of those requests it complies with. But after the human rights group Access Nows open letter urging Zoom to publish a transparency report, Yuan also promised to do just that. Within the next three months, the company will prepare a transparency report that details information related to requests for data, records, or content. Access Now has commended Zoom on committing to publish a transparency report.

Read the rest here:
Zoom's Flawed Encryption Linked to China - The Intercept

Read More..

The false promise of todays approaches to cloud security – ITProPortal

Its still amazing to me that each one of us is a few clicks away from starting a cluster of servers ready to process data at any scale.

Not so long ago, we needed to buy hardware, CPUs, memory, networks, and storage. It took considerable effort to set up our data centres and connect the devices to our networks.

Now, even classical big organisations who already have huge server farms are taking advantage of the simplicity and scalability of cloud technologies.

But what about security in cloud-native environments? Infrastructure? Application?

No one starts to build a business by ordering machines. We define what we want to do, develop a system, and deploy it. We dont really care about the brand printed on the server blade. Our systems have to be running; they need to be reliable, usable, and prompt and secure.

Every IaaS vendor be it AWS, Google, Microsoft, or someone else offers infrastructure security. By using their infrastructure, business delegates considerable amount of the security responsibilities to cloud vendors. At this point in time, business assumes that the work done by AWS, Google and Microsoft is more secure than they could do on their own.

Lets look at the layered model of modern computing.

Cloud infrastructure services (IaaS) provide the virtual machine -- memory, storage, processors, and networking. Higher-level services provide the operating system, orchestration, and object stores.

Security features of the infrastructure can only prevent attacks from the layers below them. For example, if you choose Amazon Elastic Block Storage (EBS) encryption, your data on the actual data storage will be encrypted at the virtualisation level between the OS level and the hardware. If the attacker breaks into Amazons data centre and steals the disk, takes it home, and attaches it to his computer, he will see encrypted data.

If the attacker breaches the same virtual machine remotely, he can open the files on the same EBS volume and read the data transparently just as the legit application does because the virtualisation layer has no way of telling who is trying to read the information.

The same applies to other infrastructure-level security features like firewalls. If I have services A and B, where B is a client for A, I can define firewall rules that restrict access to the machine running A so only the B machine can access it. Therefore, attackers breaking into machine B have easy access to A.

In general, if the attacks origin is above the layer of protection, the protection isnt effective. Given that attacks are mostly coming from the direction of the application layer, the infrastructure level protection is giving only partial security.

While the infrastructure can limit application-level activities to prevent unwanted behaviour, the result will be very tight and very expensive to maintain. This means that the perimeter is either too wide to provide enough security or too narrow to maintain security in the cloud-native world.

If applications could secure themselves, it would be a big step toward complete cloud-native security. Of course, instead of treating applications as the things needing protection, the industry has invented many infrastructure security features to get around the problem.

Furthermore, self-protecting applications are hard to configure and maintain; their security levels are all over the place. Actually, in this type of environment, true application security is very hard to accomplish because their versions may vary, and they come from a variety of vendors, as well.

This security protocol, the de facto industry standard of protecting TCP connections (sorry, SSH), was invented in the 90s. While its design is exemplary, whats important for our discussion is that TLS connections were designed to be created between a browser application and web server software. It is not an infrastructure feature; it isnt even a feature of the network drivers. It is a pure application-level feature, which means ideally only the application can access the data sent over the network.

As time passed, server-side TLS products evolved, like RSAs TLS server termination hardware. TLS termination has become a common practice, meaning the TLS connection arrives at a reverse proxy software or hardware, whose only goal is to strip the connection from protection and forward it to the right web server unprotected.

On one hand, it is not as secure, but its hard to maintain TLS certificates and private keys across the whole server park. When it became clear that internal service-to-service communications must be protected as well, different cloud vendors had different answers the same infrastructure security problem we discussed. Cloud independent solutions like Istio and other side-car solutions have put an extra container next to the protected application, performing the TLS termination as it was done with web servers, but it isnt effective.

TLS has been used so sub-optimally because it is hard to use to configure and maintain applications. TLS requires constant reconfiguration (certificate renewals) and key protection (private keys whose theft compromise the entire TLS system). All applications are configured a little bit differently, which makes maintenance difficult; some applications, of course, do not support TLS at all.

Of course, this simple example of TLS highlights operational problems with putting broad security features into the application. Also, business and application development are focused on functionality; security is secondary, if at all...

Business-driven thinking pushes security within the infrastructure; it should be there out of the box. In many cases it is -- but security in infrastructure is limited. The infrastructure-focused approach to application security isnt working either.

The answer security has to be at the application level but not part of the application.

Ben Hirschberg, VP of R&D and Co-founder, Cyber Armor

Read the original post:
The false promise of todays approaches to cloud security - ITProPortal

Read More..

Extended VPN deal: 73% off and free cloud storage with IPVanish VPN – TechRadar India

It was a VPN offer that was supposed to end the second that the calendar turned from March to April, but we're delighted that IPVanish has extended its fabulous VPN deal for another 30 days.

If you sign up to IPVanish before the end of April, you'll get a whole year of VPN protection and secure cloud storage from SugarSync for just $39.

When it comes to VPN goodness, we rank IPVanish extremely highly - the provider has 24/7 customer support, zero traffic logs, unlimited bandwidth and an excellent Windows kill switch. It really is one of the very best around.

And then throw in that freebie and discount, and you're laughing. The SugarSync addition gets you a full 250GB of secure data storage. This means that all your photos, videos and personal documents (whatever you choose to store) will remain safeguarded from outsiders. That means that for the next 12 months your VPN and storage needs are completely covered for the equivalent of just $3.25 a month.

Still unsure if this is the deal for you? Scroll down to see this deal in full, or why not also check out our best VPN deals guide for all of the very best offers on cyber privacy.

As well as unblocking Netflix, (hello streaming!) and being one of the best value for money VPNs, it also has a 7-day money-back guarantee and servers in over 75 countries.

Plus, it boasts incredible download speeds so you don't need to worry about the VPN slowing down your device and it's got plenty of powerful, configurable apps.So whether privacy, streaming or cost is your reason for getting a VPN, IPVanish ticks all the boxes.

Still undecided? Check out our IPVanish review.

Everything - the #1 best VPN

Torrenting and P2P traffic

See more here:
Extended VPN deal: 73% off and free cloud storage with IPVanish VPN - TechRadar India

Read More..

Does the US CLOUD Act hang darkly over your data privacy? – The Register

Webcast Heres something that you may not know, something the cloud companies are not keen to shout about too loudly.

The recently enacted Clarifying Lawful Overseas Use of Data (CLOUD) Act in the US allows federal law enforcement to access electronic communications data stored on the servers of all the major American cloud companies in the pursuit of information relevant to a criminal investigation.

That applies even if those servers are anywhere in the world, not just in the States. Whats more, if the FBI decides to nose through your data, they dont even need to tell you.

You may think none of this matters because you are shielded by Europe's General Data Protection Regulation (GDPR). In force since May 2018, the GDPR aims to unify the EUs regulatory environment, and also gives control to individuals over their personal data. It means any cloud provider that complies with US law and allows the FBI to nose around in your data risks breaching the GDPR. And in that case, will your cloud provider side with you or with the US government?

If this is news to you and setting off alarm bells, you can find out where you stand by tuning in to this webcast, brought to you by web hosting company Ionos, starting at 1100 BST on 15 April.

In conversation with The Regs Tim Phillips, Sab Knight, head of sales UK at Ionos, and Robert Healey, founder of Relentless Data Privacy, will help you discover:

Find out more and sign up for the webcast right here.

Sponsored: Practical tips for Office 365 tenant-to-tenant migration

More here:
Does the US CLOUD Act hang darkly over your data privacy? - The Register

Read More..

Google Cloud Engine outage caused by ‘large backlog of queued mutations’ – The Register

A 14-hour Google cloud platform outage that we missed in the shadow of last week's G Suite outage was caused by a failure to scale, an internal investigation has shown.

The outage, which occurred on 26 March, brought down Google's cloud services in multiple regions, including Dataflow, Big Query, DialogFlow, Kubernetes Engine, Cloud Firestore, App Engine, and Cloud Console. The systems were affected for a total of 14 hours.

The outage was caused by a lack of memory in the company's cache servers, according to an internal investigation by the company published today. "The trigger of the incident was a bulk update of group memberships that expanded to an unexpectedly high number of modified permissions, which generated a large backlog of queued mutations to be applied in real-time," the investigation said.

"The processing of the backlog was degraded by a latent issue with the cache servers, which led to them running out of memory; this in turn resulted in requests to IAM timing out. The problem was temporarily exacerbated in various regions by emergency rollouts performed to mitigate the high memory usage."

Google resolved the issue by installing more memory into the cache servers and restarting them. But by this point, a heap of stale data had built up, which led to further issues which system engineers had to battle with for several more hours. The systems were back up and operating at 05:55AM UTC the following morning.

In response to the issues, Google said that it is "ensuring that the cache servers can handle bulk updates of the kind which triggered this incident" and that "efforts are underway to optimize the memory usage and protections on the cache servers, and allow emergency configuration changes without requiring restarts."

"To allow us to mitigate data staleness issues more quickly in future, we will also be sharding out the database batch processing to allow for parallelization and more frequent runs. We understand how important regional reliability is for our users and apologize for this incident."

Sponsored: Practical tips for Office 365 tenant-to-tenant migration

See the original post:
Google Cloud Engine outage caused by 'large backlog of queued mutations' - The Register

Read More..

Zoom privacy and security issues: Here’s everything that’s wrong (so far) – Tom’s Guide

UPDATED April 3 with additional issues.

UPDATED with details of blog post by Zoom's founder and CEO spelling out fixes Zoom has made and pledge to lock down development for 90 days to find and fix security and privacy flaws, and with blog post by Zoom's chief product officer regarding Zoom's use of end-to-end encryption.

Are you using Zoom yet? It seems that everyone in America who's been forced to work, or do schoolwork, from home during the coronavirus lockdown is using the video-conferencing platform for meetings, classes and even social gatherings.

There are good reasons Zoom has taken off and other platforms haven't. Zoom is easy to set up, easy to use and lets up to 100 people join a meeting for free. It just works.

But there's a downside. Zoom's ease of use makes it easy for troublemakers to "bomb" open Zoom meetings, and for hackers to inject malware into a machine running Zoom. There's also been a lot of scrutiny about Zoom's privacy policy, which until recently seemed to give Zoom the right to do whatever it saw fit with any user's personal data.

Given the soaring usage of the Zoom platform during the coronavirus lockdown, and the near-doubling of its stock price since the beginning of February, Zoom has come under intense scrutiny from security professionals and privacy advocates. And boy, have they found stuff.

We've already mentioned that anyone can "bomb" a public Zoom meeting if they know the meeting number, and then use the file-share photo to post shocking images, or make annoying sounds in the audio. The FBI even warned about it a few days ago.

The host of the Zoom meeting can mute or even kick out troublemakers, but they can come right back with new user IDs. The best way to avoid Zoom bombing is to not share Zoom meeting numbers with anyone but the intended participants. You can also require participants to use a password to log into the meeting.

STATUS: There are easy ways to avoid Zoom bombing, which we go through here.

Zoom meetings have side chats in which participants can sent text-based messages and post web links.

But according to Twitter user @_g0dmode and Anglo-American cybersecurity training firm Hacker House, Zoom makes no distinction between regular web addresses and a different kind of remote networking link called a Universal Naming Convention (UNC) path.That leaves Zoom chats vulnerable to attack.

If a malicious Zoom bomber slipped a UNC path to a remote server that he controlled into a Zoom meeting chat, an unwitting participant could click on it.

The participant's Windows computer would then try to reach out to the hacker's remote server specified in the path and automatically try to log into it using the user's Windows username and password.

The hacker could capture the password "hash" and decrypt it, giving him access to the Zoom user's Windows account.

UPDATE: Yuan's blog post says Zoom has now fixed this problem.

STATUS: Fixed, apparently.

Mohamed A. Baset of security firm Seekurity said on Twitter that the same flaw also lets a hacker insert a UNC path to a remote executable file into a Zoom meeting chatroom.

If a Zoom user running Windows clicks on it, a video posted by Baset showed, the user's computer will try to load and run the software. The victim will be prompted to authorize the software to run, which will stop some hacking attempts but not all.

STATUS: If the UNC filepath issue is fixed, then this should be as well.

Until last week, Zoom sent iOS user profiles to Facebook as part of the "log in with Facebook" feature in the iPhone and iPad Zoom apps. After Vice News exposed the practice, Zoom said it hadn't been aware of the profile-sharing and updated the iOS apps to fix this.

STATUS: Fixed.

Zoom claims that its meetings use "end-to-end encryption" if every participant calls in from a computer or a Zoom mobile app instead of over the phone.But under pressure from The Intercept, a Zoom representative admitted that Zoom's definitions of "end-to-end" and of "endpoint" is a bit different from everyone else's.

"When we use the phrase 'End to End'," a Zoom spokeperson told The Intercept, "it is in reference to the connection being encrypted from Zoom end point to Zoom end point."

Sound good, but the spokesperson clarified that he counted a Zoom server as an endpoint. Every other company considers a user device -- a desktop, laptop, smartphone or tablet -- as an endpoint, but not a server.

In other words, the data is encrypted when it travels from a Zoom client application on a computer or mobile device (an endpoint, in networking lingo) to a Zoom server, or vice versa.It's decrypted at the server, and Zoom can see and hear it.

Every other company uses "end-to-end" to mean fully encrypted from one endpoint to another. When you send an Apple Message from your iPhone to another iPhone user, Apple's servers help the message get from one place to another, but they can't read the content.

Not so with Zoom. It can see whatever is going on in its meetings, and it pretty much has to in order to make sure everything works properly. Just don't believe the implication that it can't.

UPDATE: In a blog post April 1, Zoom Chief Product Officer Oded Gal wrote that "we want to start by apologizing for the confusion we have caused by incorrectly suggesting that Zoom meetings were capable of using end-to-end encryption. "

"We recognize that there is a discrepancy between the commonly accepted definition of end-to-end encryption and how we were using it," he wrote.

Gal assured users that all data sent and received by Zoom client applications (but not regular phone lines, business conferencing systems or, presumably, browser interfaces) is indeed encrypted and that Zoom servers or staffers "do not decrypt it at any point before it reaches the receiving clients."

However, Gal added, "Zoom currently maintains the key management system for these systems in the cloud" but has "implemented robust and validated internal controls to prevent unauthorized access to any content that users share during meetings."

The implication is that Zoom doesn't decrypt user transmissions -- but because it holds the encryption keys, it could if it had to.

For those worried about government snooping, Gal wrote that "Zoom has never built a mechanism to decrypt live meetings for lawful intercept purposes, nor do we have means to insert our employees or others into meetings without being reflected in the participant list."

And he added that companies and other enterprises would soon be able to handle their own encryption process.

"A solution will be available later this year to allow organizations to leverage Zooms cloud infrastructure but host the key management system within their environment."

STATUS: This is an issue of misleading advertising rather than an actual bug. We hope Zoom stops using the term incorrectly.

We learned last summer that Zoom used hacker-like methods to bypass normal macOS security precautions. We thought that problem had been fixed along with the security flaw it created.

But a series of tweets March 30 from security researcher Felix Seele, who noticed that Zoom installed itself on his Mac without the usual user authorization, reveals that there's still an issue.

"They (ab)use preinstallation scripts, manually unpack the app using a bundled 7zip and install it to /Applications if the current user is in the admin group (no root needed)," Seele wrote.

"The application is installed without the user giving his final consent and a highly misleading prompt is used to gain root privileges. The same tricks that are being used by macOS malware."(Seele elaborated in a more user-friendly blog post here.)

Zoom founder and CEO Eric S. Yuan tweeted a friendly response.

"To join a meeting from a Mac is not easy, that is why this method is used by Zoom and others," Yuan wrote. "Your point is well taken and we will continue to improve."

UPDATE: In a new tweet April 2, Seele said Zoom had released a new version of the Zoom client for macOS that "completely removes the questionable 'preinstall'-technique and the faked password prompt."

"I must say that I am impressed. That was a swift and comprehensive reaction. Good work, @zoom_us!" Seele added.

STATUS: Fixed.

Plenty of "others" could indeed use Zoom's dodgy installation methods, renowned Mac hacker Patrick Wardle said in a blog post March 30.

Wardle demonstrated how a local attacker -- such as a malicious human or already-installed malware -- could use Zoom's magical powers of unauthorized installation to "escalate privileges" and gain total control over the machine without knowing the administrator password.

Wardle also showed that a malicious script installed into the Zoom Mac client could give any piece of malware Zoom's webcam and microphone privileges, which do not prompt the user for authorization and could turn any Mac with Zoom installed into a potential spying device.

"This affords malware the ability to record all Zoom meetings, or simply spawn Zoom in the background to access the mic and webcam at arbitrary times," Wardle wrote.

UPDATE: Yuan's blog post says Zoom has fixed these flaws.

STATUS: Fixed.

Zoom automatically puts everyone sharing the same email domain into a "company" folder where they can see each other's information.

Exceptions are made for people using large webmail clients such as Gmail, Yahoo, Hotmail or Outlook.com, but not apparently for smaller webmail providers that Zoom might not know about.

Several Dutch Zoom users who use ISP-provided email addresses suddenly found that they were in the same "company" with dozens of strangers -- and could see their email addresses, user names and user photos.

STATUS: Unknown.

Several privacy experts, some working for Consumer Reports, pored over Zoom's privacy policy and found that it apparently gave Zoom the right to use Zoom users' personal data and to share it with third-party marketers.

Following a Consumer Reports blog post, Zoom quickly rewrote its privacy policy, stripping out the most disturbing passages and asserting that "we do not sell your personal data."

STATUS: Unknown. We don't know the details of Zoom's business dealings with third-party advertisers.

Does all this mean that Zoom is unsafe to use? No.

You just need to be aware that the Zoom software creates a huge "attack surface," as security professionals like to say, and that hackers are going to try to come at it every way they can. They're already registering lots of Zoom-related phony domains and developing Zoom-themed malware.

The upside is that if lots of flaws in Zoom are found now and fixed soon, then Zoom will be the better -- and safer -- for it.

"Zoom will soon be the most secure conferencing tool out there," wrote tech journalist Kim Zetter on Twitter April 1. "But too bad they didn't save themselves some grief and engage in some security assessments of their own to avoid this trial by fire."

In a blog post April 1, Zoom CEO and founder Eric S. Yuan acknowledged Zoom's growing pains and pledged that all regular development of the Zoom platform would be put on hold while the company worked to fix security and privacy issues.

"We recognize that we have fallen short of the community's -- and our own -- privacy and security expectations," Yuan wrote, explaining that Zoom was originally developed for large businesses that had in-house IT staffers who could set up and run the software.

"We now have a much broader set of users who are utilizing our product in a myriad of unexpected ways, presenting us with challenges we did not anticipate when the platform was conceived," he said. "These new, mostly consumer use cases have helped us uncover unforeseen issues with our platform. Dedicated journalists and security researchers have also helped to identify pre-existing ones."

To deal with these issues, Yuan wrote, Zoom would be "enacting a feature freeze, effectively immediately, and shifting all our engineering resources to focus on our biggest trust, safety, and privacy issues."

Among other things, Zoom would also be "conducting a comprehensive review with third-party experts and representative users to understand and ensure the security of all of our new consumer use cases."

Privacy researcher Patrick Jackson noticed that Zoom meeting recordings saved to the host's computer generally get a certain type of file name. So he searched unprotected cloud servers to see if anyone had uploaded Zoom recordings and found more than 15,000 unprotected examples, according to The Washington Post. Jackson also found some recorded Zoom meetings on YouTube and Vimeo.

This isn't really Zoom's fault. It's up to the host to decide whether to record a meeting, and Zoom gives paying customers the option to store recordings on Zoom's own servers.

If you host a Zoom meeting and decide to record it, then make sure you change the default file name after you're done.

STATUS: Not really Zoom's problem, to be honest.

You can find open Zoom meetings by rapidly cycling through possible Zoom meeting IDs, a security researcher told independent security blogger Brian Krebs.

The researcher got past Zoom's meeting-scan blocker by running queries through Tor, which randomized his IP address. It's a variation on "war driving" by randomly dialing telephone numbers to find open modems in the dial-up days.

The researcher told Krebs that he could find about 100 open Zoom meetings every hour with the tool, and that "having a password enabled on the [Zoom] meeting is the only thing that defeats it."

STATUS: Unknown.

Two Twitter users pointed out that if you're in a Zoom meeting and use a private window in the meeting's chat app to communicate privately with another person in the meeting, that conversation will be visible in the end-of-meeting transcript the host receives.

STATUS: Unknown.

Today's best Webcams deals

Creative Labs 73VF070000000...

Microsoft 6CH-00001 LifeCam...

New Logitech HD Pro Webcam...

Logitech C920 Webcam - 30 fps...

Read the rest here:
Zoom privacy and security issues: Here's everything that's wrong (so far) - Tom's Guide

Read More..

Oracle teases prospect of playing nicely with open-source Java in update to WebLogic application server – The Register

Oracle has chosen this week of all weeks to foist on the world an update of its application server WebLogic, festooned with new features addressing Java EE 8, Kubernetes and JSON.

But the most eye-catching prospect is compatibility with the Eclipse Foundation's fully open-source Java development environment, Jakarta EE 8.

Back in Sepember when the Java EE specs were made public, Mark Little, Red Hat's JBoss CTO, said: "Existing Java EE 8 applications and developers can be confident they can move their applications seamlessly to the Eclipse Foundation effort." And Tom Snyder, veep of Oracle Software Development, promised application server support would follow. "This represents the culmination of a great deal of work by the entire Jakarta EE community, including Oracle. Oracle is working on delivery of a Java EE 8 and Jakarta EE 8 compatible WebLogic Server implementation, and we are looking forward to working with the community to evolve Jakarta EE for the future."

With the release of WebLogic Server 14.1.1, that support for open-source Java has come. Almost.

In a blog announcing the availability of the update to the Oracle application server, Will Lyons, Oracle senior director of product development, teased: "We are currently testing Oracle WebLogic Server for Jakarta EE 8 compatibility as well, and should have results soon."

Elsewhere, the new API Servlet 4.0 includes HTTP/2 support, which Lyons said provided "improved application performance with compatibility for existing Web applications", while API JAX-RS 2.1 "advances REST services support by offering a reactive client programming model".

In terms of environments, there's support and tooling for running Oracle WebLogic Server in containers and Kubernetes, and certification on Oracle Cloud.

For data pipelines, the release supports JSON-P 1.1 and JSON-B 1.0 standards to bring new capabilities for processing JSON documents. "These improvements expand support for building modern applications using the standards-based, proven Java EE platform," Oracle said.

"We integrate with a wide variety of platforms and Oracle software that deliver high performance and availability for your applications, with low cost of ownership," Lyons claimed.

Whether the cost equation adds up is a matter for Oracle's interesting strategy on licensing software. However, developers might welcome the opportunity to build applications in fully open-source Java and deploy them in Oracle's sparkly new application server.

Sponsored: Webcast: Build the next generation of your business in the public cloud

Originally posted here:
Oracle teases prospect of playing nicely with open-source Java in update to WebLogic application server - The Register

Read More..