Page 3,733«..1020..3,7323,7333,7343,735..3,7403,750..»

One senator wants vendors to ensure their internet connectivity devices are secure – fifthdomain.com

Sen. Mark Warner is urging several network device vendors to ensure their products remain secure as millions of Americans work from home to slow the spread of the new coronavirus.

In his letters to Google, Netgear, CommScope, Asus, Belkin and Eero, the Virginia Democrat specifically expressed concern about wireless access points, routers, modems, mesh network systems and related connectivity devices.

During this time, the security of consumer devices and networks will be of heightened importance, Warner wrote in his letters. It is also imperative that consumer Internet infrastructure not be used as attack vectors to consumer systems and workplace networks accessed from home. In light of these circumstances, I request your attention and diligence to help protect the consumer devices you sell.

Warner also called on vendors to issue timely security updates for their products to reduce vulnerabilities. He also urged the companies to consider sending notifications to users about available updates and to provide information on how to securely use the devices.

This is a timely occasion to remind customers about best practices and cybersecurity hygiene, Warner wrote. If any of your manufactured devices are no longer capable of receiving critical cybersecurity updates, consumers should receive and have access to clear guidance from your company advising them when their product is no longer protected from cybersecurity threats by its manufacturer.

Read the original:
One senator wants vendors to ensure their internet connectivity devices are secure - fifthdomain.com

Read More..

How a VPN works – The Upcoming

How a VPN works

In todays world of technological advancement, more than four billion individuals surf the internet daily. What most of these people do not realise is that they are viewing hundreds of pages without proper protection. Due to this, every website they visit has a digital trait of their personal data left behind. And while you may not think of this as harmful, numerous hackers can use your personal information or sell it on the black market. This is why, to keep the data of billions of individuals safe, many companies have advised the use of a virtual private network (VPN).

While VPN technology has existed in computers for years, individuals have recently discovered its potential to keep their data safe. This has happened due to multiple factors, for example, ISPs selling users personal information, hackers and governments stalking online activities for their purposes. So, it is not surprising that many individuals would want their data to be kept private.

Until now, many countries have developed their versions of internet security. Canada has also taken great interest in cyber-privacy by developing multiple VPN Canada technologies to keep the data of its citizens safe from potential harm. Before we look at the different types of recommended VPNs, let us first discuss what it is and how it works.

What is a virtual private network?

A virtual private network, or VPN, is a technology that gives its users the freedom to access multiple websites on the internet without their data or location being recorded. It offers numerous servers for different countries that can also help to hide any online action.

How does it work?

The way a VPN works is very simple. When users connect their device (computer, mobile or tablet) with a VPN, the technology changes their IP address to a different one that exists in another country. Your device is then enabled to safely roam different websites as if you are on a new location or server. This can help to access blocked websites or secure your personal data if you are using public Wi-Fi.

How many types of VPN are there?

There are multiple types of VPNs available to assist different devices or purposes. These types include VPN extensions

Some VPNs allow users to have browser accessibility in which they can easily install an extension on their browsers and use it to safely surf different websites. There are a plethora of VPN add-ons you can install on your Firefox or Google Chrome browsers. Various browsers like Opera already come with its own built-in VPN that you can turn on whenever you would like to protect your data or access a blocked website, such as Netflix or Hulu.

The editorial unit

Read the rest here:
How a VPN works - The Upcoming

Read More..

Cryptocurrency Wallets: Everything You Ever Wanted To Know – hackernoon.com

@akshita

Tech savvy writer who loves technology, coffee, and writing!

Keeping the cryptocurrency wallets secure is very important for all those people who are going to use various crypto wallets for the first time and are unaware of security risks related to crypto wallet usage.

Many naive crypto wallet users trust the promise of blockchain technology in creating a secure system for users where someone can't hack into your cryptocurrency and steal it. Blockchain is indeed a model of internet security since it is underpinned by a distributed ledger that creates a chain of immutable records.

But, you must know that the security promise offered by revolutionary blockchain tech doesn't automatically apply to your crypto wallets. There is a surprising risk associated with crypto wallets usage and this is not because of blockchain. In most cases, the security risk related to your crypto wallet arises because of your wallet or exchange provider. Wallet providers often track the information you provide to them while signing up.

As competition is continually growing among crypto wallet solution providers, companies seek more information about their customers so they can provide more personalized product offerings. Similar to digital wallets in real-world, tracking software is used by many companies in their crypto wallet solutions today to seek information about crypto wallet users - their search history, email or web activity information so they can identify what customers actually want and can deliver the exact results.

Hence, it is very important for beginners in the crypto space to take full responsibility for safeguarding their funds stored in the crypto wallet.

To help you achieve this, the article would highlight the key security issues and risks related to crypto wallets usage, how to choose a crypto wallet safely and key measures to safeguard your crypto wallet funds.

But, before moving on to the actionable insights related to how to make you cryptocurrency wallet secure, lets first try and understand what is a cryptocurrency wallet and how it differs from a digital wallet or eWallet:

What Is a Cryptocurrency Wallet?

In other words, a crypto wallet allows a particular user to send/receive or exchange bitcoin and other popular cryptocurrencies with others easily. If you want to send/receive bitcoin or any other altcoin, you simply need a crypto wallet.

How Does It Work?

Now, that you have got the basics covered, lets understand how crypto wallets work:

Unlike the real-world physical wallet, your cryptocurrency is not stored in the digital wallet in a physical form. Instead, it is digitally stored on the blockchain - a revolutionary,

ground-breaking technology that contains an immutable, circular record of every single transaction incurred on the network, including the total account balances held by each wallet address. The software inside the crypto wallet is directly linked with blockchain and allows you to submit transactions on the blockchain ledger. The wallet is responsible for the generation of public and private keys for you, without which you wont be able to access or transfer funds.

So, whenever you send bitcoin or any other cryptocurrency, you essentially transfer the ownership of your wallet coins to the other wallet address where the coins are being sent. To access and unlock the funds, the recipient wallet owner must have the private key linked to its wallet address and it must also match the public key/address where you have sent the coins. Remember, no actual exchange of real coins is done here and the transaction will only be recorded on the blockchain along with an update in the crypto wallet balance of you and the receiver.

What Are the Different Types of Cryptocurrency Wallets?

Further, these two wallets can be divided into the following categories:

Online/Web Wallets (Hot Wallet)

These wallets are cloud-compatible and are accessible from any internet-connected device from any part of the world. These wallets offer you extreme convenience as you can store your private keys online - which would be secured by a third-party on your behalf. Although, your private keys are at the highest risk of getting stolen online from online due to hacking attacks and theft.

Desktop Wallets (Hot Wallet)

They are generally installed on your computer system or laptop, just like any other software. Although, desktop wallets are at high risk of getting affected by malware or computer virus. You should install strong antivirus and have a firewall to protect your wallet private keys. Popular examples include Jaxx, Electrum, etc.

Mobile Wallets (Hot Wallet)

These wallets run via an app on your mobile and offer extreme convenience as they can be used for instant transfer of payments to anyone, anywhere using virtual currencies stored in your account. Some mobile wallets also have web or desktop versions. Popular wallet examples include Coinomi, Mycelium, etc.

Hardware Wallet (Cold Wallet)

Hardware wallets store users private keys on a hardware device like a USB. As users private keys are stored in some physical device, they offer the highest level of security and are least vulnerable to online attacks. Many crypto users consider them the safest option to store their digital money. Hardware wallets can be connected to a PC and also compatible with several web interfaces. To send currency from a hardware wallet; you just need to plug your device to an internet-connected PC or device, enter a pin and send currency. Popular examples include Trezor, Ledger Nano S, etc.

Paper Wallet (Cold Wallet)

How a Crypto Wallet Is Different from a Traditional Digital Wallet/eWallet?

Despite millions of people across the world using cryptocurrency wallets, there is still a misunderstanding when it comes to understanding how they differ from traditional digital wallets:

Lets understand each in detail:

A Cryptocurrency wallet is essentially a software program that enables users to send, receive or store a myriad of cryptocurrencies or digital currency. It also enables users to monitor their crypto balances. These wallets also store the private and public keys of a user and interact with various blockchain so that users can send or receive cryptocurrencies.

On the other hand, a digital wallet or e-wallet is a software-based program or system that securely stores users payment-related information in a secure environment and eliminates the need to enter account information manually for users, every time they make online payments.

E-wallet allows you to store payment details like credit card, debit card information, bank account information, etc. for making faster payments. E-wallets can also work as the main interface for using cryptocurrencies for users if they come with built-in features to interact with various blockchains.

Note: Digital wallets also act as the main interface for using cryptocurrencies like Bitcoin for users if they come with built-in support for crypto storage or exchange.

Heres the difference:

Unlike digital wallets and traditional pocket wallets, a cryptocurrency wallet does not store any currency. All that exists in a crypto wallet is a record of users crypto transactions that are stored on the blockchain network - which might be visible or invisible to other users, depending upon the blockchain type - public or private.

Crypto wallets store the public and private keys of users engaged in the crypto exchange. Such a facility is simply available from a typical digital wallet.

Unlike a typical digital wallet, a crypto wallet has an interface that allows it to interact with various blockchain for sending or receiving crypto on behalf of users.

Digital wallets can be linked to a banks mobile app or any payments platform like Paypal or Alipay, which is simply unavailable in case of crypto wallets.

Examples of Cryptocurrency Wallet Scams in the Crypto Industry

Now that you are fully aware of the working of Crypto wallets and how they differ from traditional digital wallets, let's look at some of the scams in the crypto industry to give you an idea about the security risks associated with the crypto wallet usage:

Case #1

Case #2

Case #3

Risks related to Cryptocurrency Wallet Usage

Spoofing

In the case of spoofing, the malware present inside the user system tries to change the senders wallet address in an attempt to distract another person to send cryptocurrencies to a wrong wallet address. The crypto wallets with less secure security protocols may often become victims to such hack incidents. Hence, always check the level of security protection a crypto wallet offers to you.

Loss of Funds

As discussed, you need both private and public keys to access your crypto wallet and funds stored inside it. Hence, it is important that you store both keys securely. Keeping private keys in an encrypted form is equally important to minimize the possibility of someone accessing your wallet funds without your permission.

High Transaction Fees

While using crypto wallets, the users also pay to pay transaction charges, which might go up to 50% of the sent amount. Ignoring these things might lead to a big financial loss for you.

Centralized Structure

You must know that the public address of your crypto wallet is visible on the blockchain network (excluding private ones) that can readily be seen by everyone; hence, your wallets are at risk of attacks from hackers.

Reversing Payments

While using crypto wallets for virtual current transfer, always remember to enter the correct public address of their receiver, as transactions once performed on the blockchain cannot be reversed due to its nature. You might lose your money as it will be transferred to a wrong wallet address.

Actionable Insights for How to Secure Your Cryptocurrency Wallet

If you love using crypto wallets, here are some of the important safety measures that you should keep in mind to secure your cryptocurrency wallet and funds stored inside:

Keep your Private Keys Secure

Once someone gets access to private keys or passwords of your crypto wallet, your funds are simply gone. So, always remember to store your private keys safely and make sure no one has access to your private keys or wallet password.

In order to keep your private keys safe, follow these safety tips:

Choose a Crypto Wallet Wisely

Always choose a wallet that stores your private keys in an encrypted form online. Crypto wallet solution providers like Corin are offering private key encryption that prevents insider hacking for your crypto wallet. For users concerned about cyber threats, cold wallets are the best solution. You can use cold storage wallets like Trezor or Ledger so that cybercriminals stay away from your funds stored inside a crypto wallet.

Make your Youre using a Secure Internet Connection

Majority of the public networks or wi-fi networks are vulnerable and have security flaws also, which cybercriminals can easily take advantage of for hacking your crypto wallet funds. If you're using a hot wallet to connect to your crypto wallet - avoid connecting to a public network. It is recommended that you use your private or home networks. Also, make sure your private wi-fi uses strong encryption like WPA-2 protocol.

Avoid Phishing - Email and Web

In the crypto world, it is common for hackers to perform phishing attacks through email and Google ads, To avoid becoming part of such phishing scams. Always check the emails that you receive from your crypto wallet solutions providers have their domain spelt correctly and try to avoid logging into their website by clicking on the Google Ads. Remember, once your private key is exposed to a phishing site, your crypto funds are gone.

Cross-check the Wallet Address

Make sure when you connect to an exchange or hot wallet, you're logging into the right address- the one provided by your wallet solution provider. Also, log in to websites only that are using a valid HTTPS certificate. Most legit sites have HTTPS secure. For extra safety, try browser plugins like HTTPS Everywhere

Keep an Eye on Auto-updates

It's always recommended to turn off auto-updates while using web apps related to the crypto wallet. The bugs arising in new software updates can cause massive losses for you as a crypto wallet account holder. Wait for 2 or 3 days to track any potential issues in the new release of the crypto wallet app or software. Once the app is tested by other users, you can install it without any risk.

Use Strong Passwords

Enable Two-Factor Authentication (2FA)

You should always enable the two-factor authentication functionality if provided by your crypto wallet solution provider. Better you choose crypto wallet solutions that offer this functionality by default. Remember, two-factor authentication is done in different ways by different wallet providers. For example, A Google authenticator app uses a 6 digit code that changes regularly and is unique for every user. Also, whenever possible, use wallet solutions with software or hardware 2FA rather than SMS.

Separate Your Crypto Funds

Spread your total cryptocurrency wealth across multiple wallets - no matter hot or cold to minimize the loss in case of a hack.

Backup your Crypto Wallet Regularly

It is always a good idea to backup your crypto wallet in case you lose the device that is used to access your crypto wallet. Also, make sure the backup is sold in a safe location. Backing up your crypto wallet helps you in the easy restore of your wallet with all-important account details intact.

Now, the Major Question - Are Cryptocurrency Wallets Really Safe for Beginners?

Well, the answer is both a yes and no! If you perform a transaction on the blockchain, it simply cant be reversed and If the hackers somehow get access to your crypto wallet private keys, it would not be possible for you to do anything in such a case. For this reason, you as a beginner in the crypto sphere might get worried.

But, not be disappointed completely. As blockchain is a new and evolving technology, compared to other techs, researchers and developers are working hard to figure out every possible solution for security loopholes in virtual money transfer on blockchain networks. A lot of firms are coming up with new and advanced options, i.e., private cryptocurrencies, AI-based wallets, etc. to safeguard users crypto wallet funds.

Summing Up !

I hope you enjoyed reading my blog about the security aspect of crypto wallets. If you have read it completely, you should have developed a really good understanding of how crypto wallets work in the blockchain sphere.

You might have also obtained knowledge about different kinds of wallets and which one is best for you if you are planning to trade or invest in cryptocurrencies for the very first time, depending upon the security protection offered by each.

Also, if you follow the security measures given in this blog properly, hackers will have a hard time sneaking into your crypto wallet accounts. Remember crypto offers great power into the hands of the general masses and unbanked, but with great power comes greater responsibility. So, try to master the art of safeguarding your crypto wallet before it's late.

If you enjoy reading this post, do let me know your thoughts in the comment section below. You can also suggest your viewpoints or ideas for making the crypto wallet security checklist better, given in this article.

Subscribe to get your daily round-up of top tech stories!

The rest is here:
Cryptocurrency Wallets: Everything You Ever Wanted To Know - hackernoon.com

Read More..

Sentrybay and Raqmiyat on delivering secure work from home solutions – Tahawul Tech

Marcus Whittington, Co-founder & COO, Sentrybay and Abhijit Mahadik, Director Cybersecurity solutions, Raqmiyat, discuss the risks of enabling remote access from unmanaged devices and how Sentrybays solutions can help enterprises stay secure.

Are you responsible for IT Security in your organisation and worried about how to provide secure remote access for work from home?

Securing Home Working during the COVID-19 outbreak VPNs from Home just not enough.

As things stand today on COVID-19 there are widespread extended requirements for your staff to work from home over the next little while. Not to mention, the phrase Work from home brings-in fears not just on data security but also the risk of data pilferage from out-of-control end-user owned remote desktops/PC/Laptops that would be used as endpoints.

Remote access from unmanaged devices introduces elevated risks for a variety of reasons. Often these devices have a lower security posture, possibly out-of-date anti-virus or internet security software; they have a higher risk of compromise because they might be running counterfeit or unlicensed solutions, or they are operating from an untrusted network. The enterprise has little or no control over what software is running or has previously been executed on the device, and limited mechanisms for checking and addressing these deficiencies.

Ordinarily unmanaged devices accessing a corporate network will deliver a higher risk of stolen sensitive data (including corporate login credentials) from attacks involving keylogging, which, along with spyware is ranked the highest global malware, by the NTT Security Threat Intelligence Report. Other attacks to be wary of include screen capture / screen grabbing, man-in-the-browser, saved account detail harvesting, screen mirroring, man-in-the-middle, DLL injection, and RDP double-hop. In the midst of the coronavirus crisis, millions of more people will be accessing corporate networks in less than secure ways, increasing the risk exponentially.

Very common mode of connectivity from these remote devices to corporate networks today is VPN whether to their office desktops or direct to application servers or for that matter even RDP. Is Working from Home VPN Safe?

A VPN does not protect the user from malware that records the keystrokes entered or takes pictures/videos of the users endpoint in order to steal data. They scrape up passwords, credit card and banking information, personal details, and more, to use in identity theft and other malicious deeds. Every piece of data entered into any applications used by the home-based employee/contractor/supplier e.g. word/excel/outlook/Office apps, corporate apps, browser, webmail, SaaS applications etc. can be uplifted on the endpoint itself by malware then sent out to the command and control server of the cybercriminal. In summary, all this data is stolen by cybercriminals before it enters the VPN tunnel. It will not prevent you from getting malware in the first place or prevent malware from being able to send your data out.

The malware can also record the login details used to access the corporate network which may be able to be used to enter the network, albeit this requires a more sophisticated attack. Users are also vulnerable to phishing attacks that may seem to emanate from the company or other bona-fide looking companies, in order to steal data. This data can be combined with the data harvested by keystroke logging malware to be sold and then used for more sophisticated attacks targeting the end user or the company.

Ideally, given that many companies are asking employees to work remotely with virtually no time for preparation, they should look for products that can be deployed quickly (i.e. within 24 hours) and which do not involve specially configured software or hardware a simple download and install from pre-configured software is the preferred option. This means selecting proven anti-keylogging software that can protect every keystroke into any application and prevent screen-scraping malware from stealing credentials and sensitive corporate data. It is also important that there is access to a portal that allows simple configuration by administrators.

Additional sensible security measures on unmanaged machines include login credential checking and advanced mechanisms to identify malware C2 communication. Just as people are wearing facemasks for personal virus protection these days, the protections mentioned here are the device facemasks appropriate in the risky circumstances that coronavirus is presenting.

Raqmiyat, is an authorised reseller of Sentrybay, to provide secure work from home solutions to the entire GCC region. As the coronavirus outbreak continues to spread across the world, organisations are closing offices and mandating remote work arrangements. During this challenging times, organisations are struggling to provide secure ways to provide a secure work from home solutions. By partnering with Sentrybay, we are offering unique and secured work from home solutions to help our customers respond to this challenge without sacrificing their security posture. said Abhijit Mahadik, Director Cybersecurity solutions at Raqmiyat.

Our unique solutions solve the misery of end-point cleaning, protection and control. If you have environments supporting BYOD or unmanaged end-points (far off locations, third-party like contractors, vendors etc.) connecting to corporate network to access corporate resources challenge is to get them cleaned-up and update-to-date to latest AV signatures.

How is SentryBay different? Unlike others who worry about cleaning & protecting the end-points/PCs, SentryBay worry about data security and leave the PC aside as it is not in your control and uses patented technology of anti keyloggers and anti-screen captures to achieve this.

Armoured Browser from SentryBay provides a browser on Mac & Windows a very unique & secured browser that provides anti-key logging & anti-screen capture and anti-screen scrap features thus enabling a secured browsing environment for sensitive work to be done irrespective of key-logging and screen-capture malware on the PCs.

One good thing with this solution is that it creates separate user & desktop sessions and leave no-trace upon closing. With the enhancements to the solution, it could be installed as a pseudo-remote access solution to lock down use of, say, Office365/SaaS apps/browsing etc. It can also be deployed for Citrix, Vmware or any other remote access solution deployed.

We have seen a huge surge in demand worldwide, and lot of interests in the UAE for this very niche & unique solution from Sentrybay. Some of our largest banking clients have added licenses in the past week specifically to enable more employees to be quickly equipped to work from home due to the Coronavirus threat, said Marcus Whittington, Co-founder & COO Sentrybay.

Continued here:
Sentrybay and Raqmiyat on delivering secure work from home solutions - Tahawul Tech

Read More..

Global Internet Security Market Overview By Threats, Major Opportunities, Drivers, Risk Analysis and Trends – Sound On Sound Fest

MarketResearch.biz has newly proclaimed that its massive market research report range includes a report examining the Global Internet Security Market and the industry allied with it.

In this report, 2019 has been considered as the base year and 2020 to 2029 as the forecast period to estimate the market size for Internet Security .

Major Players in Internet Security market are:

Kaspersky Lab, Symantec Corporation, Qualys Inc, Webroot Inc., International Business Machine (IBM) Corp., Microsoft Corp., Hewlett Packard Company, Cyber Ark Software Ltd., Cisco Systems Inc and Trend Micro Inc.. The report moreover includes an in-detailed summary of the competitive landscape and organizational structure of the Global Internet Security Market. This will offer users a rational knowledge of the state of drivers, threats, major opportunities, and the prime standards affecting the market.

The report provides substantial knowledge relating to the market share that every one in every of these firms presently garner across this business, in tandem with the market share that they are expected to amass by the highest of the forecast period. Also, the report elaborates on details regarding the products manufactured by every of these companies, that may facilitate new entrants and outstanding stakeholders work on their competition and strategy portfolios. To not mention, their decision-making method is vulnerable to get easier on account of the actual fact that the Internet Security market report additionally enumerates a gist of the products value trends and so the profit margins of each firm among the industry.

For Better Understanding, Download Free Sample Copy Of Internet Security Market Report At:https://marketresearch.biz/report/internet-security-market/request-sample

[***Are You A Start-Up, On The Way To Make It Vast? Grab an Exclusive Sample Copy Here***]

This will enable the readers to focus on Internet Security market product specifications, current competitive manufacturers in Internet Security market and also the market revenue with gain. Worldwide Industry Analyze Internet Security Market by competitive manufacturers, regions and applications of Internet Security market, forecast up to 2029. This report analyses the scope of Internet Security market. This will be achieved by Internet Security previous historical information, analysing qualitative insights info, demonstrable projections regarding global Internet Security market size.

The following section offers a comprehensive outline of the Internet Security Market, with an in-depth emphasis on some of the key regional markets. The report summaries data on each of the key players in the market conversing to their current gross margins, company profile, sales income, sale price sales volume, product specifications along with pictures, and the up-to-date contact information.

This report studies the global market size of Internet Security, especially focuses on the key regions like United States, European Union, China, and other regions (Japan, Korea, India and Southeast Asia).

Internet Security Market Segmentations:

By product type and service:

Hardware serviceSoftware serviceBy technology:

Authentication technologyAccess control technologyContent filteringCryptography

Customize Report AndInquiry For The Internet Security Market Report:https://marketresearch.biz/report/internet-security-market/#inquiry

***Thanks for reading this article. You can also get report versions by section or region by individual chapter, such as North America, Europe, and Asia.

The content of the study subjects, includes a total of 15 chapters:

Chapter 1, to describe Internet Security product scope, market overview, market opportunities, market driving force and market risks.

Chapter 2, to profile the top manufacturers of Internet Security , with price, sales, revenue and global market share of Internet Security.

Chapter 3, the Internet Security competitive situation, sales, revenue and global market share of top manufacturers are analyzed emphatically by landscape contrast.

Chapter 4, the Internet Security breakdown data are shown at the regional level, to show the sales, revenue and growth by regions, from 2014 to 2019.

Chapter 5, 6, 7, 8 and 9, to break the sales data at the country level, with sales, revenue and market share for key countries in the world, from 2014 to 2019.

Chapter 10 and 11, to segment the sales by type and application, with sales market share and growth rate by type, application, from 2014 to 2019.

Chapter 12, Internet Security market forecast, by regions, type and application, with sales and revenue, from 2020 to 2029.

Chapter 13, 14 and 15, to describe Internet Security sales channel, distributors, customers, research findings and conclusion, appendix and data source.

Get Complete Table of Contents @https://marketresearch.biz/report/internet-security-market/#toc

Our Offerings:

MarketResearch.biz offers coverage, analysis, information, statistics, and reports on global as well as regional markets, industries, and sectors and domains, including technology and media, pharmaceuticals, chemicals and materials, food and beverages, packaging, and consumer goods among various others. We offer a 360-degree view of markets and provide accurate forecasts, and also cover competitive landscapes, with detailed market segmentation, key trends, and strategic recommendations to enable our clients to stay ahead of the competition.

Contact Us At

Mr. Benni Johnson

MarketResearch.Biz (Powered By Prudour Pvt. Ltd.)

420 Lexington Avenue, Suite 300

New York City, NY 10170,

United States

Tel: +1 347 826 1876

Website:https://marketresearch.biz

Email ID:inquiry@marketresearch.biz

Originally posted here:
Global Internet Security Market Overview By Threats, Major Opportunities, Drivers, Risk Analysis and Trends - Sound On Sound Fest

Read More..

Dot-com price rises on their way over the next four years: ICANN approves Verisign contract, walks off with $20m – The Register

Analysis The price of dot-coms will steadily increase over the next four years following DNS overseer ICANN's controversial renewal of Verisign's contract to run the top-level domain.

The wholesale price of a dot-com is $7.85. That will almost certainly increase by seven per cent starting in 2021 and each year thereafter until the contract ends in 2024, ending up at $10.29, providing dot-com operator Verisign with hundreds of millions of dollars in pure profit. Verisign, which has operated the dot-com registry for the past two decades, saw its share price jump seven per cent on the news.

ICANN felt it had little real choice but to approve the new contract, which involves the management of millions of dot-com domains, after it was negotiated directly between the US government and Verisign, and passed onto ICANN complete with a public announcement in 2018. Although the US government no longer has direct oversight of ICANN, it retains a significant influence over the domain name system and the dot-com contract is one of those areas.

But how non-profit ICANN has dealt with the contract raises yet more questions over its stewardship of the DNS world. Not only did the organization use its unique position to extract $20m from Verisign in return for renewing the contract, it also effectively ignored its own public comment process and laid bare its determined ignorance of the multi-billion-dollar market that it oversees.

Over 9,000 public comments were sent to ICANN regarding the contract renewal: a huge response for an organization that rarely receives more than 50 for a comment period. The organization admits in its summary of those comments that 95 per cent were explicitly opposed to the price rises.

But, rather than address those concerns in a constructive and objective manner, the staff-produced summary instead picks sides. It goes out of its way to diminish the arguments made against the changes as being self-interested, and actively argues that the volume of comments is not a cause for concern but a nefarious effort to influence the process.

One of the reasons for the high volume of comments is that several organizations involved in the speculation sector of domain name industry mobilized their members and customers to submit comments to ICANN, argues the staff report [PDF].

It goes on: The Internet Commerce Association (ICA), a group that represents domain investors, was particularly active in expressing its dissatisfaction with the proposed increase to the maximum wholesale price for .COM registry services, and mobilized its members to submit comments to ICANN org including creating and promoting a tool to generate templated comment submissions forms available on its website, as well as using blogs and opinion pieces in various industry sites.

In the version [PDF] of the public comment summary made available to ICANN board to assist in making the decision, these views are watered down.

But in their place, somewhat bizarrely, the staff lists the top-selling dot-coms of all time voice.com for $30m; sex.com for $13m as an indicator of the financial value of dot-coms domains, even though they represent an extreme end of the market, equivalent to equating the global real estate market to the sale of a mansion in the Hollywood hills.

There are over 145 million dot-com domains and while there is a healthy secondary market, it represents only a tiny percentage of the domains that exist. The vast majority of dot-com holders are held by individuals or companies who do not wish to sell them but have built their online presence on them, and will now have to pay significantly more following this contract renewal.

ICANN ignores this and instead delves, very briefly, into the world of domain name reselling: According to Namebio.com the average price of a .COM domain name traded on the secondary market and reported to Namebio.com was US$2,415, while the median price was US$1,643.

Verisign has a monopoly over the dot-com registry and makes 93 per cent of its $1.23bn annual revenue from dot-coms sales. Industry experts say that thanks to the way that internet registries work at scale, the costs to Verisign of running the registry are going down year after year. The business already makes at least a 50 per cent profit margin on dot-coms and any price increases will be almost all pure profit.

Verisign has frequently used the enormous financial heft that the dot-com contract gives it to control and distort the rest of the domain name market, not least when it secretly bought the rights to the .web registry, thereby killing off a possible competitor to dot-com. ICANN received the $135m auction price.

While acknowledging the central question of economics as to whether to approve dot-com price rises, and inserting its own commentary on the dot-com secondary market, ICANN then attempts to claim that economics should have no impact on its decision.

From the report: While some commenters requested market analysis or economic study prior to ICANN taking action on the proposed amendment, ICANN org is not a competition authority or price regulator and ICANN has neither the remit nor expertise to serve as one.

It goes on: ICANNs mission is to ensure the security and stability of the Internets unique identifier systems. Accordingly, ICANN must defer to relevant competition authorities and/or regulators, and let them determine if any conduct or behavior raises anticompetition concerns and, if so, to address such concerns, whether it be through price regulation or otherwise. As such, ICANN org has long-deferred to the DOC and the United States Department of Justice (DOJ) for the regulation of wholesale pricing for .COM registry services.

Despite ICANN attempting to argue it has no need to carry out economic analyses of the market it sets the rules for, it is happy to directly benefit from its decision. It appended a $20m stipulation to the contract signing, requiring Verisign pay ICANN $4m a year for the next five years in order to educate the wider ICANN community about security threats.

No such agreement exists with any other registry that ICANN oversees, and there is no explanation given for why this additional money is needed now, nor why such efforts are not covered by the existing ICANN budget, nor why the $20m needs to be attached to the signing of the new dot-com contract. It is transparently a pay-off negotiated by a market regulator from a company it regulates in return for its signature on a new contract.

Incredibly, the refusal to carry out any kind of economic analysis and an insistence that it is not a price regulator (despite the fact that the new contract continues to put ICANN in the position of deciding prices) comes as the organization faces another major decision entirely built around economics.

ICANN is due to decide in April whether to approve the sale of the .org registry to an unknown private equity firm for $1.13bn. That proposed sale was a direct result of ICANN approving a request by the current operator the Internet Society to lift price caps on all .org domains.

Despite overwhelming opposition to lifting those price caps, ICANN again ignored its public comment period and made the argument that it was not a price regulator in approving the changes. Its staff report on the thousands of comments was just as skewed and inaccurate as the one for the dot-com contract renewal. The day after the report was published, former ICANN CEO Fadi Chehade registered the company Ethos Capital which then went on the offer a billion dollars for .org a few months later.

In short, ICANN appears to be failing to do its job as DNS overseer, insisting that it can ignore economics while at the same time being thrown from crisis to crisis by those exact same forces. Not having the expertise is one thing; pretending that because you dont have it, you dont need it is quite another.

If the ICANN board wishes to be taken seriously, it must insist that the organization add a new economics department, and staff it with new and competent bods.

Sponsored: Webcast: Why you need managed detection and response

Continued here:
Dot-com price rises on their way over the next four years: ICANN approves Verisign contract, walks off with $20m - The Register

Read More..

These are the companies offering free software during the coronavirus crisis – IT PRO

The escalating COVID-19 outbreak has already changed the way we work and live in significant ways, with countries under lockdown, supply chains disrupted and businesses in the midst of an economic crisis. A plethora of tech companies havestepped up, however, to help in ways that only they can, whether its by supporting other businesses or the emergency services as they struggle to contain the crisis.

Be it security software to protect medical teams from cyber security threats, or providing access to workplace apps to ease employees working from home, tech companies are rising to the challenge. Weve rounded up some of the best offers that organisations and workers can take up today as the coronavirus crisis continues to escalate.

Non-profit organisation CompTIA is a trade association that trains, upskills and issues professional certifications for IT workers

Advertisement - Article continues below

CompTIA is providing free 30-day licenses for the CertMaster Learn eLearning course for the CompTIA IT Fundamentals (ITF+) certification. This is a pre-career certification that helps students and those keen to switch careers understand whether or not they have the capacity to take on a career in technology.

The CertMaster Learn programme is a tool that can be tweaked to suit each individuals preferred method of learning, and includes a host of features tailored to suit different ways of learning. These span learning with flashcards, videos to outline key concepts and processes, as well as performance-based questioning, and analytics.

The Russian-based cyber security company Kaspersky develops enterprise security products and antivirus systems for organisations

Advertisement - Article continues below

Medical organisations based around the world are eligible for six months of free product licenses for a swathe of B2B products that covers an array of security facets - from the cloud to Office 365 protection.

Advertisement - Article continues below

For six months, the firms Endpoint Security Cloud Plus, Security for Microsoft Office 365, Endpoint Security for Business Advanced, and Hybrid Cloud Security platforms will be free for healthcare organisations. To obtain a license, representatives of medical organisations can contact local resellers or a local Kaspersky office directly.

Founded ten years ago, ThousandEyes in a network monitoring company that develops software that analyses performance of local and wide area networks

A Global Internet Outages Map has been launched to provide a real-time visualisation for the state of the global internet health, based on ThousandEyes insights.

With more and more of the workforce working remotely, fears are rising that pressures on the internet - from streaming services to workplace apps - may become too great. Anyone can use the service to gain a broad understanding of internet usage patterns, as demand for services climbs, by indicating when outages may be occurring, where, and which services are affected.

The web security ImmuniWeb develops AI and machine learning-based tech for app security testing and attack surface management

Advertisement - Article continues below

Businesses can apply for $500,000 worth of ImmuniWeb products to help migrate their employees to digital spaces. Eligible firms can use ImmuniWeb Discovery, ImmuniWeb On-Demand and ImmuniWeb Mobile Suite products to perform a host of tasks from assessing their attack perimeter to conducting audits of their web and mobile apps.

The offers been extended to international companies or government entities in Europe, Canada or the US, and solvent businesses that have existed for the last two years in these regions. Companies must have made 30% of less of their revenues from online sales in 2019, and must expect 70% or more of their revenues to shift online in the second quarter of 2020 due to coronavirus.

Advertisement - Article continues below

Firms must email ImmuniWeb, describing their digital transformation demands, a list of their web or mobile apps, cloud or software as a service (SaaS) systems, and contact details. Governmental agencies fighting COVID-19, as well as suppliers of medical equipment and essential goods, can apply for fast-tracking.

Banyan produces a flagship remote access platform for businesses in thrall to hybrid and multi-cloud environments

Advertisement - Article continues below

To help businesses through the global crisis, Banyan is offering companies free full access to its Zero Trust Security Platform. This product offers customers secure remote access for users and applications through a singular platform, which is also scalable.

The remote access system is designed to suit a multitude of environments, from on-premise to multi-cloud deployments. Newly-registered companies will be offered free usage of the Zero Trust system for a limited time to help them improve workforce productivity and reduce frustrations tied with virtual private networks (VPNs).

The multinational cyber security firm Trend Micro develops enterprise software for a wide range of systems including servers, containers and end points

Trend Micro has offered six months of free access to its internet security product Maximum Security for employees forced to work from home using their personal computers. This is in addition to a one-month trial for Maximum Security for mobile devices.

Advertisement - Article continues below

The Work From Home Assistance Programme gives workers access to the comprehensive security and antivirus software, which includes features ranging from ransomware protection to anti-phishing tools. Businesses can sign up with Trend Micro website directly to receive product download URLs that can then be shared among employees.

The developers Q&A site Stack Overflow gives programmers and coding enthusiasts a forum to learn and share their expertise

The basic tier of Stack Overflow for Teams, a collaborative learning environment for development teams within businesses, is being made free for an unlimited number of users through to 30 June 2020.

Advertisement - Article continues below

The tool helps people collaborate and share knowledge across their organisations, and empowers them to ask and answer questions directly relevant to the systems theyre building and maintaining. Organisations can apply to use the service through the Stack Overflow website.

The Leeds-based analytics company Panintelligence gives businesses insights, analytics and software to help with reporting

Advertisement - Article continues below

Small businesses in Yorkshire, England can apply for a full version of Panintelligences flagship analytics suite for 90 days, which includes ten user licenses.

Eligible companies can use these intelligence, reporting and analytical tools to maintain a broad view of business performance, keep in the loop with key metrics like cash flow, as well as maintain communication between staff members. Businesses can leave their details with the Panintelligence website for a member of its software team to get back in touch with further details.

The workplace mental health and personal development platform Umind gives employees digital tools to manage their mental wellbeing

All 1.5 million NHS workers have been granted free access to Unminds workplace mental health platform to manage their concerns and wellbeing during the COVID-19 crisis.

The platform will give any staff member with an NHS email address access to the suite of digital tools, which comprise learning and development programmes, relaxation tools, mental health assessments and insights, among other tools. Staff can register for free with the Unmind website, and no expiry date for access to these tools have been set.

The tech giant most known for its Windows operating systems also runs the Azure public cloud platform and develops enterprise and workplace software

Advertisement - Article continues below

NHS staff can make use of Microsoft Teams to communicate with one another through audio and video calls, as well as chats, during the coronavirus outbreak to share advice and updates on patients.

The unified collaboration and communication platform, which boasts a staggering 44 million users, hosts a range of business centric tools, and boasts a solid range of app integrations. NHS Digital is rolling Teams out to all NHSmail users, with organisations not using the NHSmail system also eligible for free access if they apply directly to Microsoft. Theyll also have access to NHS Digitals NHSmail support platform for help with rolling out the platform.

RingVPN offers an unlimited encryption service for secure and anonymous web browsing for a range of devices

Advertisement - Article continues below

RingVPN has made the first 90 days usage of its flagship service free of charge, and suggests it may extend this offer if the business disruption continues beyond.

Advertisement - Article continues below

The company had been planning to launch its VPN service in May, but has brought forward the software following an explosion of questions and queries. RingVPN uses AES 265-bit encryption to protect connections across a range of devices and operating systems. Organisations can register to receive the initial three-month cost-free subscription through the RingVPN website.

The Singaporean firm Acronis develops on-premises and cloud software for backup, disaster recovery and secure file sync and share, and data access

The cyber protection firm Acronis has made its Cyber Files Cloud product free to all service providers until 31 July 2020, so they can help clients transition to remote working.

The enterprise-grade file sync and share platform can be deployed by service providers to their client organisations to reinforce the transfer of files and data as workers migrate to working from home. Partners who are keen to take up the offer should approach their account manager with Acronis.

The Voice over Internet Protocol (VoIP) company 3CX develops unified communications (UC) software for organisations of all sizes

Advertisement - Article continues below

All businesses and public sector bodies can take advantage of the standard edition of 3CXs flagship VoIP software free of charge for a staggering three years. Unlimited employees can be registered with the service, too.

The UC platform allows users to make and receive calls with a smartphone and web app, as well as communicate with colleagues. Firms looking to keep a clear line of communication with customers can also do so with a live chat plugin embedded into their websites. Organisations interested in registering for the free service can do so through a dedicated 3CX web page.

Selenity develops a range of cloud-based back-office software for organisations, spanning HR and finance to procurement and legal

Advertisement - Article continues below

Selenity is offering free access to a segment of its ER Tracker software, an HR case management system, to help businesses track staff absences due to COVID-19 infections.

The platform is designed to help HR professionals improve case compliance and turn HR policies into effective actions. The system features a variety of tools from document capture, to real-time monitoring and workflow management.

Advertisement - Article continues below

Large businesses with more than 500 employees can use ER Tracker CV-19 for a six-month trial period on a first-come, first-serve basis. The CV-19 addon is also being offered to its existing customers free of charge.

Lifesize is a video collaboration software developer that builds communication and productivity tools

Organisations impacted by the pandemic are eligible for an unlimited number of free licenses to use Lifesizes cloud-based video collaboration platform for six months.

The platform allows unlimited hosts, meetings and call duration for video conferencing so businesses can more easily transition their workers into remote working. Its compatible with iOS and Android as well as Windows and Mac devices, alongside in-browser functionality. Organisations of all sizes and all sectors are welcome to take up the offer, and can do so by singing up on the Lifesize website.

Qualys provides cloud security, IT and compliance services to businesses with real-time threat analysis

Advertisement - Article continues below

Remote workers can keep their devices secure with a 60-day free trial of Qualys Remote Endpoint Protection service. The offer includes free instant security assessments, visibility and remote computer patching for corporate and personal PCs.

The Remote Endpoint Protection software identifies and inventories all remote endpoints with real-time visibility, ensures these devices are secure, and patches remotely with no impact to VPN bandwidth, among other features. Businesses of all sizes can apply for the 60-day trial by registering with the Qualys website.

The password and information security manager Dashlane builds a platform that doubles as a password repository and digital wallet

Dashlane is waiving the charge for the first three months of Dashlane Premium subscriptions for new individuals, as well as corporate accounts through Dashlane Business.

The service aims to boost personal and corporate security by storing passwords and other sensitive material including payment information in an online and desktop-based repository. Companies of any size or sector can use a Dashlane Business account for 90 days free of charge for an unlimited number of employees by registering with the website. Dashlane will also send discount codes for individuals who have already signed up to use the free version.

Top 5 challenges of migrating applications to the cloud

Explore how VMware Cloud on AWS helps to address common cloud migration challenges

3 reasons why now is the time to rethink your network

Changing requirements call for new solutions

All-flash buyers guide

Tips for evaluating Solid-State Arrays

Enabling enterprise machine and deep learning with intelligent storage

The power of AI can only be realised through efficient and performant delivery of data

Read more here:
These are the companies offering free software during the coronavirus crisis - IT PRO

Read More..

Many moods of mind-yoga – Bangalore Mirror

By Alistair Shearer

The three different types of widely practised meditation, each known for its own characteristic physical and mental parameters

Despite its ubiquity, the word meditation is notoriously imprecise. Meaning different things to different people, the term is used to cover almost anything in addition to a formal sitting practice: walking the dog, pottering in the garden or enjoying a quiet days fishing can all qualify. Benign and restorative such activities may well be, but that is just the point, they are still activities, whereas real meditation, deep mind-yoga is the gradual lessening of all activity and a commensurate entry into silence.

From around the end of the first millennium, Hindu Tantric and Mahayana Buddhist schools (especially the Tibetan Vajrayana), advocate the use of mantras and visualisation. A more emotive approach emerges in medieval times, with the culture of surrender to divine love through the means of theistic worship (puja), devotional chanting and singing (bhajan, kirtan) or dedicated service (seva) to a deity, such as Krishna, Rama or the Divine Mother in one of her many forms. Within all these systems there are further distinguishing factors, such as the different uses of sound, whether the eyes are open or closed (and the way this changes the meditative experience), and the distinction between a method employing awareness of the breath, or other physiological functions, as opposed to a purely mental focus that is detached from bodily grounding.

Nevertheless, whatever the practice, meditators themselves have always known that it has definite subjective effects, which is presumably why they bother to continue. Scientists, on the other hand, the high priests of our secular age, are slower in the uptake, generally beginning to take interest in a phenomenon only when it becomes noticeable as an economic and cultural factor in society. This tipping point has now been reached with yoga and meditation, whose success over many decades indicates that they are no mere passing fad, but reflect deeper needs, ways of thinking and changes in society at large. Realising that an examination of yoga can tell them something about how people live under the taxing conditions of modernity, researchers have been exploring the territory over the past forty years or more, and continue to do so with enthusiasm.

Featuring prominently among the data accumulated so far are the physical changes accompanying meditation, or what we can call the bodily imprint of mind-yoga. The general state of the meditating body can be measured by its breathing rate and volume, and its level of rest as shown by these, the metabolic rate and galvanic skin response, as well as various chemical and hormonal changes in the system. More excitingly, concomitant changes in brain-activity are monitored by examining the electroencephalogram (EEG) readings of the brainwaves, which show the electrical activity of millions of neurons as they rise and fall at different frequencies, depending on our state of consciousness and what we are doing. Two American researchers, Fred J Travis and Jonathan Shear, have recently proposed a useful model which identifies three basic types of meditation, each with its own characteristic physical and mental parameters.

Focused Attention

This first type of meditation involves focusing the attention on some object or perception, by concentrating on a single point and disallowing the mind from wandering off it. The object of such a focus could be virtually anything: a candle flame, a geometric yantra diagram, or a regular bodily rhythm is all methods typically employed in such a system. The aim is to train the attention to hold steady in one place and thereby to frustrate its natural habit of jumping from one thing to another. The shorthand term monkey-mind is used in many teachings, likening our chronic mental restlessness to the movements of a monkey that leaps from branch to branch, chattering incessantly. Such instability, so the argument goes, can only be overcome by forcibly centering the attention so that it remains undistracted on the present point of focus. EEG imaging techniques have identified the various areas of the brain associated with mental meandering, as well as those associated with registering distraction, re-orienting awareness and holding a sustained focus.

These show that in this Focused Attention meditation, the EEG movement is rapid, rising and falling twenty to thirty times a second to produce what is called beta wave EEG. It can be even faster, in the range of thirty to fifty times per second which is known as gamma wave EEG. Studies cited in Scientific American suggested that, as one might predict, practising this type of meditation improves the minds ability to focus. However, high frequency EEG is not a restful, calm or expanded state but a relatively active, even tensed, one, consistent with concentrating in a focused, and exclusive, manner.

Open Monitoring

Another general category of meditation is Open Monitoring. This employs a volitional control of the mind, in order to change how it reacts to stressful information. The practitioner of this type of technique observes their thoughts, experiences and emotional reactions as they appear and disappear, and tries to maintain a non-judgmental attitude towards them. Continuously cultivating a neutral response to whatever sensations arise and pass away in the mind, and remaining free of reactivity to them, develops the strategic habit of separating the experiencer, the I, from his mental impressions. This separation works to correct, redirect or even inhibit his spontaneous reactions. With sufficient practice, this habit persists outside of meditation as well. So, for example, if patients suffering from depression school themselves to monitor the memories, and observe the feelings, they find problematic, they will become better able to manage sadness, anxiety and so on, in everyday life. When and if such feelings do arise, they will carry less force and be less dominant.

Neuro-imaging studies confirm that Open Monitoring reduces activity in those areas of the brain involved in anxiety and the technique has been shown to help people deal with symptoms of depression and anxiety. One dramatic example is that of war veterans suffering post-traumatic stress disorder. Open Monitoring also decreases disturbed sleep patterns. This type of meditation is characterised by a slower EEG wave pattern, called theta, which oscillates only five to eight times a second. Theta EEG occurs naturally when someone is preoccupied for example, while reading a book and is no longer aware of outside stimuli, such as surrounding noise or other sensory input from the environment. This lack of attention to ambient information is due to changes in the functioning of the thalamus, that part of the brain responsible for processing incoming sensory data. While Open Monitoring can be seen to correspond to what Patanjali calls pratyahara the withdrawal of the sensory focus in an inward direction as the attention settles down it still requires continuous focus and thus some degree of mental effort is involved. This effort is less than that required in the Focused Attention method, and may not be experienced as onerous, but it still works to engage the awareness in a focus which is limiting and exclusive. Because of this, the mind is still con- fined to a relatively surface level of thinking and perceiving.

Self-transcending

The third type of meditation corresponds to the process that Patanjali advocates in his classic text, which is to say, a progressive interiority that culminates in the settled state of the mind known as samadhi (coming together or coherence). What is crucial about this process, and what distinguishes it from its two predecessors, is the fact that it is non-volitional and proceeds automatically. In other words, the awareness easily and effortlessly settles inwards of its own accord.

The subjective experience is one of thought becoming increasingly quieter and less defined; rather as if the volume of the radio were gradually being turned down until it becomes silent. This progressive renunciation of experience is felt as a growing peacefulness and quiet enjoyment. The surrender of experience culminates in a state free of sensory perceptions, thoughts or emotions, whatever their content or character. Mind-yoga teachings call this pure consciousness the word pure meaning free of all admixture describing it as a state of undisturbed being, free of all mental input. With the cessation of its activity, the limited sense of self as volitional agent is gradually transcended. During self-transcending, a middle frequency EEG wave pattern typically occurs, at seven to nine cycles per second.

This is called alpha-1 and is characteristic of reduced mental activity and increased relaxation. We can imagine these coherent alpha waves as functioning something like the conductor of an orchestra, working to bring all the different instruments into a harmonious whole. This orderly activity in frontal alpha waves was first discovered in practitioners self-transcending meditation over forty years ago. More recently, a meta-analysis published in the American Psychological Associations Psychological Bulletin in 2006 cited seven studies showing that in self-transcending meditation alpha EEG coherence increases between the left and right sides of the frontal brain and continues spreading until the whole brain becomes synchronised and coherent. Such synchrony appears to enliven a coherent state of consciousness that has beneficial effects for both mind and body. When the mind settles, the level of biochemical and physiological stress decreases significantly. This reverses our ancient biological inheritance, the fight-or-flight response, that is marked by an increase in heartbeat, respiration rate and the production of powerful stress hormones, such as adrenalin and cortisol, as well as stress-related compounds such as lactic acid.

This stress-reflex is still hard-wired in the human animal because our early ancestors were stationed squarely in the middle of the food chain, eating smaller creatures but in constant danger of being eaten themselves. Our high-alert setting continued until relatively recently in evolutionary terms, and such ancient and intrinsic biological mechanisms cannot just be wished away by conscious intention. However, when mental activity settles down naturally, without any coercion and of its own free will, the direct opposite to the fight-or-flight response seems to occur in the body. Self-transcending techniques bring about a stay-and-play physiological response, marked by a reduction in stress chemicals and a generally benign blood chemistry.

It seems the repeated restfulness of this state allows for not only the spontaneous dissolution of accumulated physical fatigue and tension but, over time, the neutralising of those deep-rooted psychological and emotional impressions that Hans Selye identified as the persisting effects of distress. One clue as to how this self-healing or to use a yogic phrase purification happens may lie in its analogy with dream- less sleep.

Self-transcending techniques mimic sleep, but practitioners do not lose consciousness and they also register different types of physiological changes from those brought on by sleeping. Studies published between 2012 and 2015 show that in sleep, the brain switches on an internal detox-system that uses the cerebrospinal fluid moving between the brain and spinal cord to wash out cellular waste from the central nervous system. This so-called glymphatic system uses the cells batteries the mitochondria to flush out up to three pounds of waste proteins a year, in much the same way as the lymph system in other organs removes waste to the kidney and liver. If this cleansing and revitalising process is, in fact, activated by the restful nature of dreamless sleep, it may well be replicated and augmented by the deep rest of regular meditation.

Subjectively, the relief of being free from the burden of any sort of thinking, whether directed or not, is immense. From a yogic point of view, this process is a gentle withdrawal of awareness from the habitual outward pull of the senses (pratyahara), followed by the gradual settling of the waves of thought and feeling (chitta-vrittis) as their content is purified and released. Eventually there comes a falling back into what Patanjali calls our true nature (sva-rupa). In this way, self-transcending meditation allows the practitioner eventually to become consciously familiar with the core of their being, an area that lies beyond all mental activity, which yoga teachings identify as purusha, the Person, that is to say, our irreducible essence.

An extract from The Story of Yoga, with permission from Penguin Viking

Read more:
Many moods of mind-yoga - Bangalore Mirror

Read More..

Life may change for us all: How we respond to the coronavirus crisis will be defining, historians say – USA TODAY

When historiansmarkthe start of this nation's coronavirus nightmare, theywill cite Jan. 21, 2020, the date a Washington state man in his 30s who had visited Wuhan, China, was confirmed as the United States'first COVID-19 case.

Since then, this global crisis has mushroomed into a national defining moment with as yet untallied cultural and economic repercussions. No one questions whether we will be talking about this for generations.If there is debate, it is over the proper historical comparison.

Is this likethe 2008 financial crisis, 9/11, World War II? Or perhaps, as someeconomists predict and news that 3.3 million people applied for unemployment last week suggests,will this be remembered as a periodof deep loss and poverty, something likethe grim 1930swhen unemployment hit 25%?

This will be very economically disruptive,and an analogy to the Great Depression is the closest to what we may face, says Stanford University economics professor Matthew Jackson. These huge events can have profound changes on the views and beliefs people have.

That we are in for difficult months and perhaps years ahead seems commonly accepted, as virus deaths mount, hospitals are overwhelmedand a decimated service-based economy spursa $2.2 trillion wartime-scale bailout package in Washington, D.C.

But if there is cause for optimism in these bleak times, historians, economists and writers say, it is born out of the fact that we as a nation can choose to seize this moment to create an even greater society better poised to protect its citizens from future crises.

In this Nov. 24, 1933 file photo, unemployed men wait outside the State Labor Bureau in New York. The epic hardship of the 1930s is the best-known depression in American history, and some economists are concerned the repercussions of the COVID-19 crisis could send the U.S. reeling back to those difficult times.(Photo: AP)

There are precedents for bold responses to watershed American events.

The Depression gave rise to the Social Security Act, which promised citizens financial safety in their later years. World War II drew women into the workforce and minorities into the military, leading to the equal and civil rights movements. And the 2008 financial meltdown gave rise to banking regulations and renewed scrutiny of illicit financial tools.

The possible positive national reactions to the COVID-19 pamdemic which as of this writinghas infected more than 120,000 Americans and killed more than 2,000, out of a global tally of 680,000 sickened and more than 30,000 dead are myriad.

They could include a renewed appreciation of governments role in grappling with unprecedented crises, a remaking of manufacturing pipelines so they rely less on foreign suppliers,and a rekindled appreciation for friends and neighbors, experts say.

As tough as things look now, I do see us possibly demonstrating a sense that were all in this together, says Joseph Margulies,a law professor at Cornell University in New York and author of What Changed When Everything Changed: 9/11 and the Making of National Identity.

Margulies notes that in contrast to WWII, when Japanese-Americans were rounded up and interned, and the Red Scare, when those suspected ofCommunist leanings wereblacklisted, this debacle has governors from New York to California saying the same thing,'stay home,' and they mean everyone, not one group.

At the moment, most cultural observers note that the sharp political divide that existed before the virus arrived still persists.

Thats evident in everything from the squabbles that erupted as Congress debated the size and scope of the bailout, to the tension between President Donald Trumps desire to see the nation reopen for business next month and a range of health officials countering that the worst is yet to come if life is allowed to resume prematurely.

A mask-wearing man in the Philippines walks by an iconic poster from WWII America that depicts Rosie the Riveter, a fictional factory worker meant to inspired Americans of both sexes to pitch in to the war effort during the 1940s. Our coronavirus crisis could inspire the same kind of unified national effort at recovering from the epidemic, historians say.(Photo: Aaron Favila, AP)

But some semblance of a unified national direction will be crucial to rebounding from this historic moment, given the as yet unknown shifts inthe way we shop, work, travel and learn, says Matthew Continetti, resident fellow at the American Enterprise Institute, a conservative think tank.

Clearly, the cost of the virus in lives and resources will pale in comparison to the way life may change for us all, he says.Just like terrorism before it, this pandemic may present real challenges to civil liberties that well have to grapple with.

Continetti points out that at the core of the American ethos is freedom, which also can translate into a rejection of government-issued rules meant to ensure public safety. That could create problems if, say, the government were to echo moves by some Asian nations and track virus carriers via their cellphones and closed-circuit TV cameras.

I dont think most Americans are ready to embrace that, he says.

The coronavirus has robbed us all: Let yourself mourn the loss, experts say.

As this emergency eventually turns into a state of persistent vigilance, what could be on the horizon for us is in fact is a difficult push and pull. On the one side, a desire to return to our pre-virus lives at all costs; on the other, an acknowledgement thatnothing will evertruly be the same.

Continetti says that what is coming next will represent a true paradigm shift, one in which a society long driven by the pursuit of happiness at all costs may have to rearrange its social and moral priorities.

Its a noble and frightening future were facing, he says. But it may also give us a newfound sense of national solidarity.

Volunteer Art Ponce is handed a box of sterile swabs and gloves from a donor at a Sacramento County collection site in Sacramento, California this week. The state was among the first to declare local and state-wide self-quarantining for residents in an effort to stem the tide of COVID-19 cases.(Photo: Rich Pedroncelli, AP)

A few things should happen rather quickly as a result of this seminal moment in our history, one that undeniably has parallels to the Spanish flu pandemic of 1918, says Rice University historian Douglas Brinkley.

Among them are a renewed appreciation for science, a rekindled admiration for doctors, and a funding bonanza for government health institutions such as the Centers for Disease Control and Prevention, a once mighty and now underfunded institution that by most accounts has been caught flat-footed by this pandemic.

In U.S. history, whatever rises to a level of national concern gets funding, and health should rise sky-high, says Brinkley, noting that, in contrast, the impact of 9/11 was felt mostly in the Northeast and Hurricane Katrina in the Deep South. Coronavirus is touching everyone, so what officials wont want to be prepared for the next outbreak?

Brinkley, who is working on a book about the environmental movement of the 1960s and 70s, is hopeful that another reaction to this historical turning point will be a more urgent focus on curbing climate change.

Many scientists believe that new viruses are bound to spread as global temperature rises lead to the migration of animals. There are suspicions that the new coronavirusmay have jumped species from pangolins, an exotic scale-covered mammal that is illegally hunted in parts of Asia.

You cant wipe out rainforests in Brazil and not expect to have a health care payback, Brinkley says.

When will coronavirus end?What wartime and human kindness can tell us about what happens next

Another sober realization bound to hit Americans across the economic spectrum is how globally interconnected the economies of all nations have become.

That phone youre holding or the car youre driving may be designed or built in the U.S., but countless such products invariably have many parts made in countries whose manufacturing plants are now at risk as employees get sick as governments order shutdowns.

The virus will end, well have a vaccine in 12 to 18 months, but what will the world economy look like after 12 to 18 months of stagnation, let alone if the virus comes back? says Jerald Combs, professor emeritus of history at San Francisco State University and author of The History of American Foreign Policy from 1895.

Combs says that as the virus cripples supplier countries such as India and China, U.S. manufacturing ultimately will have to find new ways to make products or face economic hardships. Such adjustments could be required of American companies for years, given it remains unknown whether today's viral threat is an aberration ora preview of whats to come.

World War II had a huge impact on American society in so many ways, but they had one advantage over what were dealing with, Combs says. They knew at some point the war would end. We, on the other hand, are still not sure.

A tourist passes the statue of former British Prime Minister Winston Churchill in Parliament Square in London, where Prime Minister Boris Johnson recently announced he has tested positive for COVID-19.(Photo: Matt Dunham, AP)

To get a sense of just how much this Defining Moment has us concerned, consider that author Erik Larson has received what he calls a surprising amount of messages from readers who have found a sense of solace in the pages of his new book, The Splendid and the Vile, which chronicles how Winston Churchill led British resistance to the relentless Nazi onslaught of 1940.

People must simply be getting lost in a time when you had this catastrophic threat to a nation and a charismatic leader pulling them through it, Larson says. Theres this heroic clarity to that time, Churchill defying Hitler and rallying the public, saying 'Were all in this together.' I guess maybe people would like that now.

After years of research that brought him close to heart and mind of the legendary British prime minister, Larson is convinced Churchills message today for any nation facing the defining challenge that is the coronavirus threat would be inspirationally simple.

Says Larson: Hed have been quick to say that this is not the apocalypse, all our institutions will survive, our world will endure, and we will go forth when this is over.

Follow USA TODAY national correspondent Marco della Cava: @marcodellacava

Read or Share this story: https://www.usatoday.com/story/news/nation/2020/03/29/coronavirus-crisis-response-reshape-american-history/5079760002/

Read the rest here:
Life may change for us all: How we respond to the coronavirus crisis will be defining, historians say - USA TODAY

Read More..

America’s Revolutionary Mind: A Moral History of the American Revolution and the Declaration That Defined It by C. Bradley Thompson – The Objective…

New York: Encounter Books, 2019584 pp. $32.99 (hardcover)

The history of the world cannot furnish an instance of fortitude and heroic magnanimity parallel to that displayed by the members, whose signatures affixed the Declaration of American Independence. James Thacher, soldier in the Continental Army (335)

Each year, more than a million people travel from all over the globe to the National Archives Museum in Washington, D.C., home of the Declaration of Independence. People of all nationalitiesnot only Americansare fascinated by this faded, smudged, parchment because, however ironically, it represents a doorway to modernity. Prior to the American Revolution, most people throughout most of human history had suffered under one form of monarchy or another. The founding fathers, however, broke with that past, laying a foundation for freedom and flourishing.

Understanding the principles of the Declaration is essential to sustaining what scientist Jacob Bronowski called the ascent of man, and for preventing the world from sliding back into tyranny and oppression. For well over a century, though, those principles have been distorted and attacked by many of those entrusted to relay the story of the Revolution: namely, academic historians. Thats all the more reason, then, for lovers of liberty and human progress to cheer the publication of C. Bradley Thompsons Americas Revolutionary Mind. The first in a two-part series on the countrys fundamental ideas, this book is not a narrative of events but a systematic re-creation of the philosophy that led colonists to, in the words of Thomas Paine, begin the world over again.

Thompsons new moral history, as he calls it, follows the evidence left in the periods numerous pamphlets, speeches, sermons, letters, and resolutions to reconstruct the moral reasoning upon which Americans pledged their lives, their fortunes, and their sacred honor in defense of individual rights. He introduces modern readers to a pantheon of brilliant revolutionary thinkers: not only well-knowns such as Thomas Jefferson, John Adams, Benjamin Franklin, and Alexander Hamilton, but scores of anonymous pamphleteers and other largely forgotten luminaries, such as Dan Foster, Elihu Palmer, and Jonathan Mayhew. Weaving together their words, Thompson shows us just how great the consensus was among colonists on the fundamental tenets of the American mind.

This consistency came in large part from a common root: the Enlightenment thought of Francis Bacon, Isaac Newton, and, most significantly, John Locke. Nature, to be commanded, must be obeyed, said Bacon, and Newton went about demonstrating the incredible power of observation-based science. Newtons friend Locke, a physician-turned-philosopher, applied this scientific approach to man himself, concluding that an understanding of mans essential nature reveals certain universal moral and political truths. And Thompsons extended archaeological excavation of Americas revolutionary mind reveals that it is virtually synonymous with John Lockes mind (9, 32).

This is an all-too-rare conclusion among historians. As Thomas Pangle so well explains in The Spirit of Modern Republicanism, the post-sixties era birthed a sort of conservative reframing of the revolution and American foundingone that downplayed Lockes significance and amplified that of the prebourgeois, communitarian, classical republican thinkers of Greece and Rome. And although Pangle (and Jerome Huyler, in his Locke in America) exposed the problems with this classical republican tradition and showed the depth of Lockes influence, their works were addressed to an academic audience already steeped in the historiographical debate. In Americas Revolutionary Mind, Thompsona Clemson professor who teaches political science to undergraduates using a Great Books approachlargely abstains from that debate, focusing solely on clearly presenting the Lockean/American system.1

His presentation does draw sharp distinctions between classical republicswhich often unleashed the rights violations endemic of majoritarian democracyand the innovative liberal republics devised by Americas founders. In contrast to the ancient Greek and Roman republics, writes Thompson, the new American republics shrank the public sphere and expanded the private sphere. In other words, American-style republicanism was unique because of the emphasis it put on limiting the political power of those who ruleincluding the rule of the majorityso that individuals could rule themselves more efficaciously (278).

Another historically inaccurate narrative that Thompson deflates is the one popularized most recently by the New York Times 1619 Project that Americans declared independence for the purpose of protecting slavery. The intellectual case for slavery did not arise in America until the late 1830s, when the institution came under direct attack from northern abolitionists, he writes (143). Most Americans were aware that slavery contradicted their most fundamental principles. [I]t would be useless for us to denounce the servitude to which the Parliament of Great Britain wishes to reduce us, said Benjamin Rush, while we continue to keep our fellow creatures in slavery just because their color is different from ours (137). In the judgment of many slaveholders, however, they were stuck on the horns of a dilemma: We have the wolf by the ears, and we can neither hold him, nor safely let him go, wrote Jefferson. Justice is in one scale, and self-preservation in the other (134).

Although the founders did not achieve their ideals in full, as Lincoln would later say, they nonetheless set up a standard maxim for free society and declared the right, so that the enforcement of it might follow as fast as circumstances should permit (360). Thompson writes, Without question, the most important step in abolishing slavery was taken on July 4, 1776, when the American people declared to the world as a self-evident truth, all men are created equal (145). The logic of [the Revolutions] core moral principles highlighted a blot on the character of the country and galvanized an unprecedentedly energetic abolitionist movement (151). Overall, by 1810, more than 100,000 slaves had been emancipated in the United States, either through court decisions, legislation, or acts of individual manumission. It was the largest emancipation of slaves in world history (147).

In a startling epilogue, Has America Lost Its American Mind?, Thompson reveals that much of the widespread antipathy toward the founding vision actually stems from the proslavery movement that began in the 1830s. Committed slavers understood that their practices could not be reconciled with the universal moral principles of the Declaration.

They needed a theory that justified the notion that whats true for you is not true for me, and they found it in the historical relativism (historicism) of the philosopher Georg Wilhelm Friedrich Hegel, which advanced the idea that truth (especially moral and political truth) is historically relative to ones own cultural horizon. They embraced Hegels fantasy that the world is like a single organism and that history necessarily unfolds through stages toward higher levels of civilization. Slaverys defenders arguedquoting Hegel in the House of Representativesthat theirs was not the backward and barbarous way of life, but the culmination of progress, a mode of becoming participant in a higher morality (364). Men, being mere parts of a more important whole, are subordinate to the good of the whole, wrote proslavery advocate George Fitzhugh, and free society must be replaced by domestic slavery, which he called the oldest, the best and the most common form of Socialism and the beau ideal of Communism (37273).

Thankfully, the Union defeated the Confederacy to which these ideas gave rise, but, as Thompson deftly outlines, its political goals and historicist method took deep root, and academics revived attacks not only against the Declarations self-evident truths, but against the very idea of truth itself (374).

Despite its account of the spread of this philosophic disease through much of the American mind, Thompsons achievement is proof that this mind is not entirely lostand his book is an invaluable resource for understanding its nature and principles. Pick up a copy, and keep your eyes peeled for Thompsons next bookon Americas constitutional mind.

P.S. Join C. Bradley Thompson and Timothy Sandefur for a discussion of Americas Revolutionary Ideas: Their History and Future at TOS-Con 2020: Philosophy for Freedom and Flourishing.

Read this article:
America's Revolutionary Mind: A Moral History of the American Revolution and the Declaration That Defined It by C. Bradley Thompson - The Objective...

Read More..