Page 3,750«..1020..3,7493,7503,7513,752..3,7603,770..»

Supply Chain Embraces the Cloud to Drive Digital Transformation – EPS News

by

David Hogg, VP business development, Logistyx Technologies

Companies managing their supply chain operations face the challenges of growing complexities of the global economy, the continuous rise in e-commerce and increasing customer expectations. To help confront these challenges and keep pace with customers needs, companies increasingly understand the importance of digitally transforming their supply chain to increase flexibility, visibility and reduce costs. According to the 2019 MHI Annual Industry Report, 80 percent of survey respondents believe digital supply chains will be the predominant model within just five years.

So what exactly is digital transformation of the supply chain? When it comes to the supply chain in particular, companies have invested more heavily in website and marketing technologies, leaving supply chains under- invested and developed. This is an untenable state of existence given increasing sales and rising customer expectations, which stress brittle, over-extended supply chain networks, processes and systems. These challenges are even more apparent come peak season, or in the face of disrupting events like weather or the current COVID-19 outbreak, which cause companies to react by adding more inventory sources, more options for inbound and outbound fulfillment supply, and technologies capable of instant reaction/change to mitigate disruption as best possible.

For example, in the world of parcel shipping, as more online sellers offer perks like free shipping and next- or even same-day delivery, customers expectations keep climbing higher. When faced with disruptions, shippers have a need to add new carriers instantly in order to extend last-mile fulfillment from a nice to have to a potentially existential necessity.

Digital transformation of supply chains requires a wide range of tools for automation and AI, including such innovations as self-driving trucks, drones, 3D printing, inventory management systems, warehouse robotics and more. Note that, although recurrent seasonal peaks can be dealt with via AI, rare and unusual disrupting events like COVID-19 still require human intervention. AI requires datasets to provide past experience and deals better with recurrent challenges like season peak or weather events.

COVID-19 aside, as cloud computing and other advancements make new tools and technologies more accessible, even the smallest organizations can opt in to a digital transformation, which leaves larger organizations no choice if they want to stay competitive. To effectively adapt to the digital transformation of the supply chain and better understand opportunities to optimize processes to deliver more value, companies need to consider their ideal business outcomes to determine the best path forward.

Automation and the power of moving shipping to the cloud

For companies looking to enhance the way they execute supply chain outcomes, automating processes for sourcing and delivering goods through the cloud can offer a clearer view into the supply chain and give organizations improved access to data to drive better business decisions.

Moving to a cloud-based infrastructure helps shippers ensure all their information is updated automatically, happening behind the scenes in real time, while also providing flexibility to do things more quickly, including onboarding more carrier services. Increasing their carrier network enables shippers to decrease costs while often improving or expanding customer service. Shippers can make more nimble business decisions with access to a wider cloud-based carrier network and the capability to harness real-time shipping data and run analytics to help evaluate carrier performance, uncover savings opportunities and inform carrier contract negotiations.

Digital access to carriers and supply chain data can also help shippers become digitally mature, improve productivity, maintain or improve customer service, prevent losses and decrease transportation spend. Omnichannel retailers in particular can benefit from a digital supply chain. Digitally-mature shippers have technology running their inventory management, order management and shipping all in one integrated system, allowing them to easily capture data from different systems to optimize the customer experience and minimize the cost of increasingly complex supply chain processes. Cloud-based shipping software enables companies to leverage a single system to manage multiple carrier contracts, comply with label and documentation requirements for each, and see the long-term impact of various carrier service rates streamlining order fulfillment ops and setting each parcel up for cost-effective, accurate and on-time delivery before it leaves the warehouse.

Data security in the cloud

While it has its advantages, with digital transformation comes new and continually increasing security concerns, particularly with regard to privacy, access and data location. Parcel shipping ecosystems contain all sorts of personal information, including names, addresses and phone numbers. However, a dependable cloud-based shipping system can potentially provide more robust data security than a company could by itself particularly if theres a lack of deep IT resources, staff, controls or expertise in-house.

Data privacy and security guidelines, standards and laws vary across regions (such as GDPR, CCPA, PIPEDA, etc.), so its important that a cloud-based shipping solution is backed by a global strategy with rapid implementation and rollout of adjustments to ensure compliance with data security and privacy requirements, with the ability for companies to monitor and address security and privacy legislation both on the home front and across borders.

End-to-end visibility into last-mile delivery

Digital supply chains can help companies provide full visibility into customer deliveries and increase transparency by leveraging real-time performance data and connecting the end-to-end transportation cycle. Utilizing a cloud-based shipping solution allows organizations to easily integrate with all the relevant carriers and partners. From there, they can select the best, most efficient carrier service for last-mile delivery based on actual carrier performance to identify the optimal route with the lowest cost implications and/or fastest delivery times.

For some shippers, most of the job may seem complete when the parcel leaves the warehouse; for customers, this marks the beginning. The ability to keep customers updated on all shipments in real-time is essential. Cloud-based shipping solutions offer control tower visibility and dashboard reporting which facilitate proactive delivery event management and carrier performance monitoring to allow customer service to intervene if needed to keep deliveries on track, increasing transparency and customer satisfaction.

Charting the digital transformation journey

Theres no one-size-fits-all cloud-based shipping solution, and many shippers start with hybrid solutions once they realize the benefits to be gained by just partially embracing the cloud.Each company has a unique strategy, infrastructure and budget; finding the best solution usually comes down to clarifying an organizations particular business needs.Companies dont have to have all the answers or transform their digital supply chain all at once. Many shades of grey exist between completely on-premise and completely cloud-based solutions. Each delivery model has its advantages and disadvantages, and the ideal delivery model for each shippers digital transformation journey depends on a variety of factors.

A hybrid delivery model combines both SaaS and hosted solutions. From the users perspective, theres only one shipping system in place, but a peek behind the curtain will reveal both cloud-based and on-premise servers at work.

A hybrid shipping solution is ideal for organizations that want control over where their data is stored but realize the benefits of global accessibility. For example, they might store sensitive customer data on their private cloud and use a public cloud to manage the rest of their shipping operations.

Today, most organizations prefer a SaaS-based shipping solution over their hosted or hybrid counterparts.In fact, according to Gartner, global SaaS revenues could hit $113.1 billion by 2021, a 30% increase from 2019. Since SaaS TMS solutions are cloud based, theyre more time-efficient when it comes to sharing and managing shipping data on an ongoing basis, meaning that organizations receive a double benefit: time savings upfront and over the long-term. Compared with manual processes or traditional on-premise solutions, cloud-based solutions also make it easier to access, aggregate and analyze data.

Riding the wave of digital transformation in the supply chain is not optional. Growing customer expectations and rising competition in the marketplace make digitalization a mandatory progression for shippers looking to succeed. Each business has unique needs and supply chain priorities that will determine which digital solutions are the best fit. Ultimately, embracing the cloud makes supply chain innovation more sustainable, helping organizations improve their parcel shipping operations and generate a quick ROI.

David Hogg

David Hogg, VP Business Development, Logistyx Technologies is a highly experienced business executive who has lived and worked on three continents. His career has been focused on digital transformation for e-commerce and supply chain solutions with core industrial domains in retail, CPG, pharmaceuticals and wholesale/distribution. LinkedIn profile.

More here:
Supply Chain Embraces the Cloud to Drive Digital Transformation - EPS News

Read More..

Rescale Partners with Google Cloud and Azure to Offer Cloud HPC for COVID-19 Researchers – insideHPC

Today Rescale, in cooperation with Google Cloud and Microsoft Azure, announced a new program that immediately offers high performance computing resources at no cost to teams working to develop test kits and vaccines for COVID-19.

Those working on coronavirus vaccines and testing who would benefit from HPC in the cloud at no cost should apply at techagainstcovid.com. Researchers can rapidly run simulations in the cloud without setup time or IT teams using Rescales turnkey platform combined with cloud computing resources from Google Cloud Platform and Microsoft Azure.

For decades, bioscience and pharmaceutical companies have been using high performance computing to develop and validate new solutions and drugs. With this technology now available via the cloud at no cost, researchers from around the globe can speed up COVID-19 vaccine discovery by ramping up and collaborating from anywhere.

Rescales platform can provide access to high-performance computing resources that can help accelerate key processes and enable stronger collaboration, said Manvinder Singh, Director, Partnerships at Google Cloud. As a partner of Rescale, were grateful that they will make these resources, including Google Cloud computing capabilities, available to more researchers and organizations.

Greg Moore, Corporate Vice President, Microsoft Health added, Were inspired to team up with Rescale in the fight against time to help provide answers to address COVID-19. To enable researchers and organizations to develop new therapeutics and vaccines faster, were working together to accelerate the availability of Azure supercomputers in the cloud.

As a leading life sciences company, we believe it is our duty to step up and help to stop this deadly and devastating pandemic, said Erik Holmlin, PhD, CEO of Bionano Genomics. Bionanos genome imaging technology can identify variation in genome structure better than any sequencing-based method, which makes us uniquely positioned to help identify variants in the human genome that can protect against or predispose to the viral infection. We have set up studies to identify such variants around the globe, and having Bionanos bioinformatic tools already integrated onto Rescales high performance computing platform enables us to scale up these studies rapidly across multiple continents.

With the introduction of cloud HPC, Rescale, a Microsoft M12 portfolio company, makes massive workloads solvable in a scalable, customized time frame. By eliminating the need to maintain an on-premises supercomputer, cloud HPC allows startups and enterprises alike to develop new drugs and vaccines faster than ever.

Leading cloud companies need to pitch in, and we have the responsibility to help in any way we can, said Joris Poort, CEO of Rescale. Rescale is making every effort working closely with our cloud provider partners to eliminate bottlenecks and costs so researchers achieve breakthroughs faster.

We will work around the clock to make these findings available to the scientific and public health communities, said Holmlin, and hope that we can contribute to vaccine or drug development, better triage and treatment of patients, and overall management of the disease and epidemic.

Sign up for our insideHPC Newsletter

Continued here:
Rescale Partners with Google Cloud and Azure to Offer Cloud HPC for COVID-19 Researchers - insideHPC

Read More..

Healthcare Cloud Computing Market Cost Analysis, Strategy and Growth Factor Report 2020| International Business Machines Corporation (IBM), Carestream…

Global Healthcare Cloud Computing Market is valued approximately at USD 19.9 billion in 2018 and is anticipated to grow with a growth rate of more than 17.5% over the forecast period 2019-2026.

Healthcare Cloud Computing Market 2020 report share informative data figures as well as important insights regarding some of the market component which is considered to be future course architects for the market. This includes factors such as market size, market share, market segmentation, significant growth drivers, market competition, different aspects impacting economic cycles in the market, demand, expected business up-downs, changing customer sentiments, key companies operating in the Healthcare Cloud Computing Market, etc. In order to deliver a complete understanding of the global market, the report also shares some of the useful details regarding regional as well as significant domestic markets. The report presents a 360-degree overview and SWOT analysis of the competitive landscape of the industries.

Leading Players of Healthcare Cloud Computing Market Covered In The Report:International Business Machines Corporation (IBM)Carestream Health, Inc. (A Subsidiary of ONEX Corporation)Athenahealth, Inc.Carecloud CorporationSiemens Healthineers AGEclinicalworksKoninklijke Philips N.V.Allscripts Healthcare Solutions, Inc.NTT Data CorporationSectra AB Key Market Segmentation of Healthcare Cloud Computing:

By Product:

Healthcare Provider SolutionsHealthcare Payer Solutions

By Deployment Model:

Private CloudHybrid CloudPublic Cloud

By Component:

ServiceSoftware

By Pricing Model:

Pay-As-You-Go Pricing ModelSpot Pricing Model

By Service Model:

Software-as-a-ServiceInfrastructure-as-a-ServicePlatform-as-a-Service

Healthcare Cloud Computing Market Region Mainly Focusing:

Europe Healthcare Cloud Computing Market (Austria, France, Finland, Switzerland, Italy, Germany, Netherlands, Poland, Russia, Spain, Sweden, Turkey, UK), Asia-Pacific and Australia Healthcare Cloud Computing Market (China, South Korea, Thailand, India, Vietnam, Malaysia, Indonesia, and Japan), The Middle East and Africa Healthcare Cloud Computing Market (Saudi Arabia, South Africa, Egypt, Morocco, and Nigeria), Latin America/South America Healthcare Cloud Computing Market (Brazil and Argentina), North America Healthcare Cloud Computing Market (Canada, Mexico, and The USA)

Factors such as industry value chain, key consumption trends, recent patterns of customer behaviors, overall spending capacity analysis, market expansion rate, etc. The report also incorporates premium quality data figures associated with financial figures of the industry including market size (in USD), expected market size growth (in percentage), sales data, revenue figures and more. This might enable readers to reach quicker decisions with data and insights at hand.

Buy Full Report Now @ https://www.qurateresearch.com/report/buy/HnM/global-healthcare-cloud-computing-market/QBI-BRC-HnM-647684/

Key Highlights from Healthcare Cloud Computing Market Study:

Income and Sales Estimation Historical Revenue and deals volume is displayed and supports information is triangulated with best down and base up ways to deal with figure finish market measure and to estimate conjecture numbers for key areas shrouded in the Healthcare Cloud Computing report alongside arranged and very much perceived Types and end-utilize industry. Moreover, macroeconomic factor and administrative procedures are discovered explanation in Healthcare Cloud Computing industry advancement and perceptive examination.

Assembling Analysis The Healthcare Cloud Computing report is presently broke down concerning different types and applications. The Healthcare Cloud Computing market gives a section featuring the assembling procedure examination approved by means of essential data gathered through Industry specialists and Key authorities of profiled organizations.

Competition Analysis Healthcare Cloud Computing Leading players have been considered relying upon their organization profile, item portfolio, limit, item/benefit value, deals, and cost/benefit.

Demand and Supply and Effectiveness Healthcare Cloud Computing report moreover gives support, Production, Consumption and (Export and Import).

Major Points Covered in Table of Contents:

Healthcare Cloud Computing Market OverviewGlobal Healthcare Cloud Computing Market Competition by ManufacturersGlobal Healthcare Cloud Computing Production Market Share by RegionsGlobal Healthcare Cloud Computing Consumption by RegionsGlobal Healthcare Cloud Computing Production, Revenue, Price Trend by TypeGlobal Healthcare Cloud Computing Market Analysis by ApplicationsCompany Profiles and Key Figures in Healthcare Cloud Computing BusinessHealthcare Cloud Computing Manufacturing Cost AnalysisMarketing Channel, Distributors, and CustomersMarket DynamicsGlobal Healthcare Cloud Computing Market ForecastResearch Findings and ConclusionMethodology and Data Source

In a word, the Healthcare Cloud Computing Market report provides major statistics on the state of the Healthcare Cloud Computing industry with a valuable source of guidance and direction for companies and individuals interested in the market. At the end, Healthcare Cloud Computing Market Report delivers a conclusion which includes Research Findings, Market Size Evaluation, Global Market Share, Consumer Needs along with Customer Preference Change, Data Source. These factors will raise the growth of the business overall.

Contact Us:

Web:www.qurateresearch.comE-mail:sales@qurateresearch.comPh: US +13393375221

Thanks for reading this article; you can also get individual chapter wise section or region wise report version like North America, Europe or Asia.

Continue reading here:
Healthcare Cloud Computing Market Cost Analysis, Strategy and Growth Factor Report 2020| International Business Machines Corporation (IBM), Carestream...

Read More..

Cloud Computing in Government Market Increase In Analysis & Development Activities Is More Boosting Demands, 2020-2025 – News Times

The Cloud Computing in Government market report [5 Years Forecast 2020-2025] focuses on Major Leading Industry Players, providing info like market competitive situation, product scope, market overview, opportunities, driving force and market risks. Profile the top manufacturers of Cloud Computing in Government, with sales, revenue and global market share of Cloud Computing in Government are analyzed emphatically by landscape contrast and speak to info. Upstream raw materials and instrumentation and downstream demand analysis is additionally administrated. The Cloud Computing in Government market business development trends and selling channels square measure analyzed. From a global perspective, It also represents overall industry size by analyzing qualitative insights and historical data.

The study encompasses profiles of major companies operating in the global Cloud Computing in Government market. Key players profiled in the report includes : Adobe SystemsBlackboardCiscoEllucianDell EMCInstructureMicrosoftNetAppOracleSalesforceSAP and among others.

Get Free Sample PDF (including full TOC, Tables and Figures) of Cloud Computing in Government Market @https://www.researchmoz.us/enquiry.php?type=S&repid2350196

This Cloud Computing in Government market report provides a comprehensive analysis of:Industry overview, cost structure analysis, technical data and competitive analysis, topmost players analysis, development trend analysis, overall market overview, regional market analysis, consumers analysis and marketing type analysis.

Scope of Cloud Computing in Government Market:

The global Cloud Computing in Government market is valued at million US$ in 2019 and will reach million US$ by the end of 2025, growing at a CAGR of during 2020-2025. The objectives of this study are to define, segment, and project the size of the Cloud Computing in Government market based on company, product type, application and key regions.

This report studies the global market size of Cloud Computing in Government in key regions like North America, Europe, Asia Pacific, Central & South America and Middle East & Africa, focuses on the consumption of Cloud Computing in Government in these regions.

This research report categorizes the global Cloud Computing in Government market by players/brands, region, type and application. This report also studies the global market status, competition landscape, market share, growth rate, future trends, market drivers, opportunities and challenges, sales channels, distributors, customers, research findings & conclusion, appendix & data source and Porters Five Forces Analysis.

The end users/applications and product categories analysis:

On the basis on the end users/applications,this report focuses on the status and outlook for major applications/end users, sales volume, market share and growth rate foreach application.

On the basis of product,this report displays the sales volume, revenue (Million USD), product price, market share and growth rate ofeach type.

Do You Have Any Query Or Specific Requirement? Ask to Our Industry [emailprotected]https://www.researchmoz.us/enquiry.php?type=E&repid2350196

(*Fill the form and our sales representative will get back to you for assistance)

Cloud Computing in Government Market The Regional analysis covers:

Key Takeaways and Reasons To Buy Cloud Computing in Government Market Report:

And Many More.Contact Us:

ResearchMozMr. Nachiket Ghumare,Tel: +1-518-621-2074USA-Canada Toll Free: 866-997-4948Email: [emailprotected]Follow us on LinkedIn @ http://bit.ly/2RtaFUo

Follow me on : https://marketnews-24.blogspot.com/

Read the original post:
Cloud Computing in Government Market Increase In Analysis & Development Activities Is More Boosting Demands, 2020-2025 - News Times

Read More..

AMD and Intel have a formidable new foe but youll never guess who it is – TechRadar India

An unexpected rival has emerged that could give Intel and AMD a run for their money, at least in the very lucrative server and cloud computing market.

Amazons new Graviton2 CPU has been tested extensively by Andrei Frumusanu from our sister website AnandTech, and the results show this new kid on the block outstrips the incumbents when it comes to performance per dollar.

Graviton2 was tested against two other cloud computing resources offered by Amazon Web Services: the m5a (AMD EPYC 7571) and m5n (Intel Xeon Platinum 8259CL Cascade Lake). Andrei found it could offer savings of up to 54%, which he says represents "a massive shakeup for the AWS and EC2 ecosystem.

So, how did Amazon achieve these results? The chip comes from Annapurna Labs and packs 64 A76 ARM cores - similar to what you can find in a smartphone - with 33MB cache and a high clock speed. Amazon is Annapurna Labs' only customer (as its owner), which means the processor is extremely fine-tuned for AWS workloads.

According to Andrei, unless you're tied to the x86 platform, you'd be stupid not to switch over to Graviton2 instances once they become more widely available for everything from VPN (AWS VPN) to web hosting (AWS Light Sail).

For now, expect AMDs EPYC2 processors to put up a bit of a fight - at least until Graviton3 lands.

Originally posted here:
AMD and Intel have a formidable new foe but youll never guess who it is - TechRadar India

Read More..

Sabio further fleshes out its cloud contact centre offering with acquisition – Data Economy

The growing firm has glowed in a decent first half of the year, but it has warned that the second half could be tougher.

Global consulting andIT services firm Accenture has reported a solid overall secondquarter, helped by its expansion in cloud services and other verticaltechnologies.

The company is listedon the New York Stock Exchange and headquartered in Ireland. Itreported that revenues hit $11.1bn in the quarter, an increase of 7%over the same period last year. Diluted earnings per share were$1.91, a 10% increase from the second quarter last year.

Operating income was$1.49bn, which was a 7% jump on last time, and the operating marginincreased to 13.4%. New bookings for the quarter were $14.2bn, withconsulting bookings of $7.2bn and outsourcing bookings of $7bn.

Accentures totalcash balance as at 29 February 2020 was $5.4bn, compared with $6.1bnon 31 August 2019, six months previously.

The company hasacquired a number of businesses in vertical markets over the last 12months.

Earlier this month, thefirms Microsoft services subsdiary Avanade acquired Altius, aUK-based company specialising in cloud, data performance managementand artificial intelligence (AI) services. With additional offices inthe Netherlands and India, and a team of 300-plus cloud and dataspecialists, Altius brings to Avanade and Accenture industryexpertise in solutions for the retail, travel and transport,infrastructure and public sectors.

And last autumn,Avanade acquired Germanys Alnamic AG, a specialist in MicrosoftDynamics 365 and AX solutions for German industries. Alnamic focuseson technology systems for the manufacturing, IoT, wholesale anddistribution sectors.

Also last year, Accenture acquired Cirruseo, a leading Google Cloud solutions provider in France. That acquisition strengthened Accentures expertise in Google Cloud in the French market and more broadly across Europe too.

Julie Sweet,Accentures chief executive officer, who was appointed last autumn,said: The world is now facing a global health crisis andsignificant disruption in the global economy. We exited the firsthalf of our fiscal year in a clear position of strength deliveringexcellent results, gaining significant market share and continuing tosuccessfully execute our growth strategy.

As we move forward,we will focus on helping our clients navigate and succeed in thisuncertain period and continue to invest in our business and ourpeople for the long term.

See the article here:
Sabio further fleshes out its cloud contact centre offering with acquisition - Data Economy

Read More..

The real insider threat is the use of security software – TechRadar

An insider threat is defined as a security risk that derives from within an organisation; and with the global cost averaging $11.45 million, it is critical that organisations address this issue. Frequently, the risk is attributed to malicious or negligent employees, as well as others close to the organisation, such as contractors and business associates, and think that employee monitoring software will prevent threats. Yet, this understanding of insider threats misleadingly unloads the blame on people; in other words, exposing them as the scapegoat.

Javvad Malik is a Security Awareness Advocate at KnowBe4.

While there are people who do actively seek to harm an organisation, according to the Ponemon Institutes 2020 Cost of Insider Threats Report, they only account for 23% of insider threats. The majority of people can be easily trained to become an asset rather than a liability for the organisation.

Rather than blaming people then, why are we not shifting our attention to the root of the problem? That is to say, security software.

Whether embedded with vulnerabilities, corrupted by governments, or used as a channel to harvest data for a profit, the use of security software at present is riddled with problems.

One of the largest and most commonly used security software providers, is the Czech-based company, Avast antivirus, with more than 435 million active users across 59 countries employing their antivirus protection. However, until the end of January 2020, Avast was also furtively gathering data from their users and selling that data on to third-party customers through their subsidiary, Jumpstart. In that sense, they have been working as a double agent against the very people who had entrusted them with their internet security and, specifically, their privacy.

In many cases, the software itself is faulty. According to the Veracode SOSS Report Vol. 10 published last year, around 10 million flaws were found across 85,000 applications and 83% of those applications had at least one flaw in the initial scan. Out of those flaws, 20% were marked high or very high severity. It is precisely through exploiting such vulnerabilities that bad actors are able to infiltrate an organisation and access its data.

Complicating things further, the sheer scale and complexity of vulnerabilities makes it that much harder to verify if a system has or has not been patched. Indeed, the majority of data breaches (60%) occur because software vulnerabilities were left unpatched. The Equifax data breach of 2017 and the Marriott breach in 2018 are two exemplars of this occurring, collectively exposing over 640 million records.

In certain instances, the government gets involved, and not in a way that resolves infringements on privacy rights or apprehends the criminals behind attacks. Rather, they themselves are the offender. The attacks carried out by APT5, otherwise known as Manganese, on high-end enterprise VPN servers are a clear example of this.

Since August 2019, it was revealed that Chinese state-sponsored hackers performed internet scans in search of Fortinet and Pulse Secure VPN servers. They then attempted to exploit two vulnerabilities within these VPN servers to gain access to files without the need for authentication. In this way, allowing the hackers to acquire access to passwords and VPN session data from vulnerable devices. The Iranians are not too far behind either. A report by cybersecurity firm ClearSky revealed that Irans government-backed hacking units have made it a priority to exploit VPN bugs as soon as they become public.

Fortinet and Pulse Secure VPN servers are both widely used, with hundreds of thousands of customers. More specifically, Pulse Secure is popular amongst numerous Fortune 500 companies, including some of the largest technology firms and government agencies. Their use of a VPN server is, primarily, to protect their internal servers from unauthorized access. Yet, if they fail to do so, how can we then turn around and blame the employees when a breach occurs?

Finally, there is scareware. As is implied by the name, scareware is a form of phishing that gambles on your fear and perception of an impending threat. Through a pop-up ad, cybercriminals send warnings suggesting that your computer is infected with malware or that it is running slow. They then capitalize on your concern and panicked reaction to provide a solution.

However, the solution, a fake or a bogus update, enables the bad actor to access your data and install malware on your computer, perhaps even ransomware. In this type of scenario, it is easy to point the finger at the individual who clicks on the ad, but what about the security software providers who let it happen? Is it not the responsibility of security software programs to identify malicious ads and block them from popping up on the screen?

In the end, we are left to wonder what the real insider threat is. All this time, people have been described as the weakest link and held responsible for exposing organisations to insecurity. Yet, looking at the evidence, the problems seem to stem from security software and their providers. Considering that they are the ones who are supposed to protect us, both individuals and organisations, from a cyberattack, it is rather ironic that they are, in reality, the problem.

Read the original post:
The real insider threat is the use of security software - TechRadar

Read More..

EFF and COVID-19: Protecting Openness, Security, and Civil Liberties – EFF

EFF and its members work to ensure that technology supports freedom, justice, and innovation for all the people of the world. The COVID-19 pandemic has made obvious how important the Internet and digital tools are to our lives and how vital it is that we maintain an open and secure approach to them.

For those of us living under quarantine, shelter in place orders, or just staying home to voluntarily help protect our communities, we now rely on the Internet and digital tools more than ever to share information and advice, create art and memes, listen to our favorite musicians perform live, or just to feel less alone. We see how technology is helping us cope, hopefully temporarily, with the loss of in-person contact. Many others are using digital tools and services to organize mutual aid for their neighborhoods and communities in this time of crisis.

When fear threatens to undermine our rights and pervert justice, thats where EFFand youcome in.

Thanks to open access science, scientific and medical teams are able to instantly share their work and build on efforts to track the virus, study its effect on people, and develop vaccines. Others are developing ways to create and repair vital medical equipment using open tools, including reportedly 3D printing. We are coming together online and offline in new and creative ways, and ensuring that security, privacy, and openness are baked into the tools and services we use will only support our efforts.

In some ways, the explosion of open creativity online to keep us connected and sane during these scary times is one of the bright spots in the darkness. But in the United States, it also shows how this crisis disproportionately impacts those of us who are marginalized in society alreadythe unsheltered, those who cannot afford or access reliable broadband service to continue school or work, the consultants and retail workers who have little reserves, and all of those falling through our frayed social safety net. Innovation is needed here toolike ensuring that robust broadband access works for everyone, not just the wealthy, and is not dependent on temporary largess of some giant providers.

We also know that times of great public fear come with great risk. Public fear has driven some of the worst human rights atrocities, and given opportunities for those who would seize power from us and reduce or even erase our hard-won human rights and civil liberties. Already we see efforts to use this public health crisis as an excuse to place irrational blame on our Asian communities and direct even more pressure and discrimination against refugees and immigrants. We already see calls from companies seeking to cash in on this crisis for unchecked face surveillance, social media monitoring, and other efforts far beyond what medicine or epidemiology require.

When fear threatens to undermine our rights and pervert justice, thats where EFFand youcome in.

We know that this virus requires us to take steps that would be unthinkable in normal times. Staying inside, limiting public gatherings, and cooperating with medically needed attempts to track the virus are, when approached properly, reasonable and responsible things to do. But we must be as vigilant as we are thoughtful. We must be sure that measures taken in the name of responding to COVID-19 are, in the language of international human rights law, necessary and proportionate to the needs of society in fighting the virus. Above all, we must make sure that these measures end and that the data collected for these purposes is not re-purposed for either governmental or commercial ends.

As we head further into these difficult times, EFF is standing strong to make sure that we both take advantage of how technology can help us now and, equally importantly, that we emerge from this time with our freedom and democracy as strong, if not stronger, than when we went in. Because we at EFF have a committed membership as our primary support over half of our annual budget comes from individuals we are able to pivot our attention to these issues even as we continue our ongoing fights. Our lawyers are scrutinizing the proposed laws and regulations and corporate privacy moves, especially the growing and concerning raft of corporate/government surveillance efforts. Our technologists are digging into the digital tools we all rely on during this crisis to make sure that your privacy is protected. Were pushing to lower artificial barriers to information sharing, and working to make sure that access to knowledge is one of the things we keep as we emerge from these times. And more.

We have created an issue page dedicated to our COVID-19 focused work and will continue to highlight our efforts there, as well as publish needed practical information about how to fight COVID-19 phishing attempts and how to show your EFF support as we head into our 30th year of standing strong for your rights.

Right now, when real science is so often under attack, those of us who care about truth, health, and each other need to take seriously the things that science and medicine are telling us about how to keep this virus from spreading. And we also need to be vigilant so that we come out the other side of this crisis with a society we want to live in and hand down to our kids. We canand mustdo both.

EFF is proven, ready, and strong. With the support of our members, new and old, well be there with you every step of the way.

Visit link:
EFF and COVID-19: Protecting Openness, Security, and Civil Liberties - EFF

Read More..

Preparing for November’s election must be a national priority | TheHill – The Hill

The coronavirus pandemic is testing our nations resolve and already disrupting our way of life. But we cant afford to let it disrupt the November election.

Six states have already postponed their primaries. More will likely follow in the weeks and months ahead.

With a risk that the pandemic will continue through November, the hard work to plan for the election must begin now. The American people deserve a national bipartisan effort including leadership from the policy and technology communities to ensure the integrity and continuity of American democracy.

The good news is that this important work was underway long before the pandemic. Since 2016, national and state leaders have prioritized strengthening the security and integrity of U.S. elections with bipartisan engagement from the Obama and Trump administrations. Congress has invested more than $800 million in new funding for state and local election systems over the past two years.

Recent efforts to modernize state and local election systems have focused on addressing potential cybersecurity vulnerabilities. Managing this risk should remain a priority, particularly given the recent cybersecurity attack against the Department of Health and Human Services. We should plan for foreign adversaries to exploit potential opportunities to undermine and divide our country.

But we now face a new, graver threat in COVID-19. National, state and local officials will need to work together to adapt the American election system to address the challenges of a pandemic.

We all hope that society returns to normal sooner rather than later. But if social distancing to flatten the curve of potential infections is required through November, state and local election officials must consider new strategies to administer the election.

One promising strategy is to expand vote-by-mail, which is already common for absentee ballots and Americans living overseas. According to the National Association of Secretaries of State, 33 states and Washington, D.C. now allow vote-by-mail for non-absentee voters. Sens. Amy KlobucharAmy KlobucharWhy Klobuchar should be Biden's vice presidential pick Changing antitrust rules will cause confusion Who should be the Democratic vice presidential candidate? MORE (D-Minn.) and Ron WydenRonald (Ron) Lee WydenDemocrats fume over GOP coronavirus bill: 'Totally inadequate' Sticking points force stimulus package talks to spill into Sunday Democrats call for stimulus to boost Social Security benefits by 0 a month MORE (D-Ore.) recently introduced legislation to allow all Americans to vote by mail.

Expanding this option to all communities, combined with widespread early voting, offers a promising option for states seeking to support social distancing while encouraging voter turnout and participation.

But vote-by-mail does come with risks, particularly concerns about voter integrity and ballot harvesting. We must ensure that votes sent by mail are counted accurately. The policy and technology community should work together to quickly develop best practices and practical solutions to address these concerns to ensure voter confidence.

One aspect of vote-by-mailto consider would be to design ballots in a manner that provides voters with an electronic receipt (such as a QR code) that they can use to electronically verify their vote was counted. This process, combined with other checks-and-balances, such as the creation of a state election integrity ombudsman, could establish a system where voters can independently audit whether their vote was counted accurately.

Officials should explore other ways to use technology. For example, mobile applications could allow voters to gauge the voting location wait times and check in to their preferred paper ballot drop-off or in-person voting location. This activity would alert the poll registration system to the increased voting demand and likely resulting wait times. The same monitoring data can be shared with a variety of services supporting voting wait time web sites and mobile mapping applications like Waze, Google Maps, and Apple Maps. This could allow for the election day voters to maximize their options for voting while supporting social distancing.

Experts from the policy and technology community should work together to consider these and other options to support our state and local election officials.

We should all have confidence in the public servants responsible for administering our elections. In January, the nations Secretaries of State and state election directors met in Washington. While Congress debated impeachment across town, state officials were having nuanced discussions about all aspects of election administration. In our deeply partisan times, these state leaders are working together in a spirit of nonpartisanship that should make us all proud.

Much is uncertain about the weeks and months ahead. But history shows us that we can hold an election during even the most difficult times. The United States held elections in 1864 during the height of the Civil War and in 1944 when the Greatest Generation was fighting World War II.

It may be our responsibility to hold a presidential election during a pandemic. The time to prepare is now.

Dan Lips is Director of Cyber and National Security and Sean Roberts is a Senior Internet Security Engineer with the Lincoln Network.

Link:
Preparing for November's election must be a national priority | TheHill - The Hill

Read More..

COVID-19 decoy doc, Cloudflare tools used to spread Blackwater malware – SC Magazine

Researchers have uncovered a new malware campaign that uses the COVID-19 pandemic as a lure, and also abuses platform-as-a-service web infrastructure tools to apparently thwart attempts at blocking command-and-control communications.

Dubbed BlackWater, the backdoor malware specifically takes advantage of Cloudflare Workers an offering of Cloudflare, a popular provider of website operators with content delivery network,DDoS mitigation and internet security services. As Cloudflare explains on its own website, Cloudflare Workers offer a lightweight JavaScript execution environment that allows developers to augment existing applications or create entirely new ones without configuring or maintaining infrastructure.

These JavaScript programs enable serverless functions to run directly on Cloudflares edge, as close as possible to the end user, where they interact with connections from remote web clients, BleepingComputer explains in a report on BlackWater threat, citing research from the MalwareHunterTeam. Under normal conditions, Workers can be used to modify a websites HTTP requests and responses, make parallel requests and disable Cloudflare features. But malicious actors are now also using them to act as a C2 server, or at minimum a proxy that acts as a front end to a ReactJS Strapi App that itself performs like a back-end C2 server. BlackWater does this by using a command line to connect to the Cloudflare Worker over attacker-established domains.

SC Media contacted Cloudflare for comment and received the following response: Cloudflaretook immediate action to shut down the malicious domains as soon as we were made aware.

SentinelLabs researcher Vitali Kremez told BleepingComputer that the attackers likely chose this technique because it returns back the legit Cloudflare proxy IP, which acts as a reverse proxy passing the traffic to the C2. It makes blocking the IP traffic impossible given it is Cloudflare (unless the whole Cloudflare worker space is banned) infrastructure while hiding the actual C2.

The malware is delivered via an RAR file most likely distributed as an attachment via an email phishing campaign that appears to contain information about the novel coronavirus in the form of Word document. But the file is actually an executable that, upon activation, extracts a decoy Word doc that serves as a distraction while the backdoor is implemented.

The decoy doc observed by MalwareHunterTeam purports to be from the Wessex Learning Trust, a British general secondary education conglomerate, and appears to contain details and instructions for parents and students.

This is a good example of the power of using Platform-as-a-Service to build code. Unfortunately, it is a malicious example, said Chris Morales, head of security analytics atVectra, to SC Media. CloudFlarewas built to support code for remote access just like this. And yes, by running on a Platform as a Service, it makes it difficult to block without stopping access to the entire cloud platform as traffic is legitimate traffic from the site.

What this tells me is that the PaaS providers still have a ways to go in ensuring their platforms are not used for malicious means. They need to provide better auditing of the code run on their services and back end, Morales continued. Amusingly theCloudflarewebsite espouses the security benefits of using service workers on the edge and the security of JavaScript. What they did not account for is this code being used against people in a way it was designed for.

Joseph Carson, chief security scientist and advisory CISO atThycotic, told SC Media thats especially important during times of crisis to always be vigilant and suspicious of any attachments, even when they appear to be coming from legitimate sources.

The best way to reduce the risks of such threats is for companies to practice the principle of least privilege, he added.

See original here:
COVID-19 decoy doc, Cloudflare tools used to spread Blackwater malware - SC Magazine

Read More..