Page 3,910«..1020..3,9093,9103,9113,912..3,9203,930..»

You Look Like a Thing and I Love You: How Artificial Intelligence Works and Why It’s Making the World a Weirder Place – Chemistry World

Janelle ShaneWildfire2019 | 272pp | 20ISBN9781472268990

Buy this book on Amazon.co.uk

How many giraffes can you see? Too many to count. This seems unlikely unless you are an artificial intelligence algorithm trained on a dataset in which giraffes were somewhat overrepresented.

As Janelle Shane explains in her book on how artificial intelligence works and why its making the world a weirder place, accidental over-inclusion of giraffes in image collections used to train AIs is exceedingly likely. The presence of a giraffe is so rare and exciting that you are almost certain to take a photo.

An optical physicist, Shane documents such eccentricities of AI on her blog and Twitter feed, which she has now expanded into this delightful book. The title comes from an experiment she ran to see if an AI could generate human-acceptable pick-up lines. The results were, as you can see, mixed.

This is the crux of Shanes highly compelling argument about AI: its danger doesnt come from exceeding intelligence human-like AI remains firmly within the realm of science fiction but from the very weird things that narrowly focused algorithms do. Like the self-driving car algorithm that identified a sideways-on lorry as a road sign, causing a fatal accident. As artificial intelligence becomes ever more deeply embedded in our modern digital lives, it behoves us all to understand it better and know its limitations and failings.

I really loved this book, and, if you like your serious science accompanied by very cute cartoon illustrations, you will too. Shanes explanations are not only laugh-out-loud hilarious but also so accessible. Reading the book moved me to go do my own experiments in AI weirdness, like playing with predictive text on my smartphone and chatting with virtual chat bots about giraffes. I feel much better informed as a result.

This book features in our book club podcast, which you can listen tohere.

Read the original:
You Look Like a Thing and I Love You: How Artificial Intelligence Works and Why It's Making the World a Weirder Place - Chemistry World

Read More..

Preventing hospital readmissions with the help of artificial intelligence – University of Virginia The Cavalier Daily

The University Health Systems data science team recently advanced to the next stage of a nationwide competition to apply artificial intelligence to hospital readmissions, a persistent and costly issue. Sponsored by the Centers for Medicare and Medicaid Services, the inaugural Artificial Intelligence Health Outcomes Challenge initially received hundreds of applications. CMS chose only 25 submissions, the Universitys among them, to execute their proposed strategies.

A few years ago, in order to significantly reduce unplanned readmissions to the hospital, the University initiated efforts to develop a cutting-edge yet easily accessible solution to this widespread problem. Bommae Kim, senior data scientist for the University Health System, began pursuing remedies for the epidemic of readmissions in 2018.

Usually, after a patient was discharged, they couldnt manage their disease for some reason, so were trying to figure out what that reason is and help, Kim said.

The University Health Systems data science team found that three percent of patients at the University constitute 30 percent of readmissions within the first 30 days following release from the hospital, while the majority of the remaining 70 percent return within a year. After identifying the need to decrease such adverse events, data scientists in the Universitys Health System, such as Jason Adams, turned to artificial intelligence to target key factors that contribute to a patient returning unnecessarily to the hospital.

The purpose is to take this amount of information and in an automated way to tell that a person is at risk and what is the course of action that can best help that patient, Adams said.

Kim acts as project leader alongside a team of data scientists and information technology personnel. Overseen by Jon Michel, director of data science for the University Health System, the researchers produce models that help predict the likelihood of readmission and subsequently provide actionable advice for physicians.

Only a year or so later in 2019, CMS announced a competition to tackle the same challenge. CMS directed participants to employ the computing power of artificial intelligence to construct a model that accurately and efficiently flags patients at risk of returning to the hospital for non-routine treatments. More than 300 applicants submitted proposals during the launch stage of the challenge.

The University was one of only 25 groups selected to advance to the next stage, vying with organizations such as IBM, Deloitte and the Mayo Clinic for the $1 million grand prize and utilization by the CMS Innovation Center to determine payment and service delivery strategies.

Were doing this for our U.Va. patients, but it would be nice to win the competition because then we can deploy our approach at the national level, Kim said. We believe in our approach.

For this phase of the competition, CMS distributed Medicare claims data to the remaining teams. Claims from all across the country provide the opportunity to fine-tune the Universitys model with data outside of the University Health System. According to Application Systems Analyst Programmer Angela Saunders, the supplemental details will prove beneficial for the Universitys models.

Saunders did point out challenges with the millions of rows of data, which require extensive resources to simply store in an environment suitable for manipulation. Furthermore, inconsistencies lingered in the dataset from year to year, requiring the feature engineering team to sift and sort through the tables, standardizing entries and column headers, which detail the traits associated with each claimant.

Its not just a little data, Saunders said. We have exhausted a lot of resources just to get the data to consistency. Each year, things change just a little bit and so just getting it into a consistent format is a lot of the battle.

Based on the teams assessments, much of the feature engineering portion of the project at least the preliminary round of it has been completed. The next step involves transporting data to Rivanna, the Universitys high performance computing system, and fitting predictive models to the data. Data scientist Rupesh Silwal, who helps design and evaluate multiple iterations of the modeling architecture, noted the importance of not only systemizing the entries, but also of ensuring sensitive medical data remains anonymous.

The feature engineering team has cleaned the data, made sure everything makes sense from year to year and that all of the sensitive information is scrubbed so we can move the data to this other computing infrastructure, Silwal said. Part of our effort has been focused on getting the data in there and using it to set up a modeling environment to see if we can make predictions.

Specifics regarding modeling techniques and factors employed in creating the Universitys unique solution could not be revealed at this time, due to the proprietary nature of the ongoing competition. In broad terms, factors such as past utilization of certain hospital services like the Emergency Department or chronic conditions contribute to the initial formulation of the model, as they are indicators of high potential for readmission, data scientist Adis Ljubovic said.

Those are fairly well-known and were using that as the baseline, but we also have the secret sauce ones that are preventable, Ljubovic said.

Other variables intended to capture financial, transportation and lifestyle information for patients also augment the standard determinants of readmission, while electronic medical records from the University provide documentation of trends in the Universitys own health system.

Another distinctive aspect of the Universitys proposal is its commitment to a solution that clinicians accept. Senior data scientist John Ainsworth and Ljubovic, along with other members of the Universitys project, assert that the healthcare industry generally adopts a conservative mindset with regards to artificial intelligence modeling in hospitals. However, the University Health Systems data scientists have consulted with doctors at the University hospital about introducing tools physicians trust and can easily adopt.

Data science techniques bring with them the potential for accuracy, for bringing in and ingesting larger datasets, Ainsworth said. The richness of the data gets recorded and putting up the information in front of clinicians that can help them take meaningful action is what were going for. If we can ... give them some sense of where preventative strategies might lie, that can support them in their goal of caring for patients.

Several members of the team agreed a complex issue like hospital readmission calls for a collective approach. In the University Health Systems data science department, that can be a rare occurrence, several data scientists remarked, as their separate assignments often occupy most of their time. Senior Business Intelligence Developer Manikesh Iruku expressed appreciation for the chance to learn more about data science techniques, and others shared similar experiences when it came to exploring different subfields of data science.

Saunders and data scientist Valentina Baljak emphasized the confidence this collaboration has given the group to tackle new tasks.

Frequently for us, we have our own projects and its a one-person project, Baljak said. Occasionally you collaborate with someone, but I dont really think we had a project that involved all of us at the same time. That has been a great experience.

Currently, competitors are finalizing their project packages to submit to CMS in February. CMS plans to winnow the field down to the seven best proposals by April. Regardless of the outcome, the Universitys team plans to put their results and newly developed models into practice within the Universitys Health System.

In particular for healthcare, in some ways the best is yet to come in the data science world, Ainsworth said. The future is bright for data science in healthcare.

Read more:
Preventing hospital readmissions with the help of artificial intelligence - University of Virginia The Cavalier Daily

Read More..

As Cyber Fraud Increases, Its Artificial Intelligence to The Rescue – ETF Trends

As technology continues to advance, it gives cybercriminals more tools to defraud consumers and in turn, companies are fighting back with artificial intelligence (AI). This gives disruptive-focused ETFs more prominence as AI sets out to fight the good fight.

In response, many financial sector companies are adopting AI to combat both staff and customer fraud, wrote Jeff Palmer in IT Pro Portal. Banks already use AI to detect and prevent payment fraud and employ image-recognition systems for security. What is less widely known is that some companies are also now successfully using AI to comb call records for GDPR breaches or even monitor live calls to flag mis-selling and rogue trading in real-time.

Among the variety of applications of AI in the financial sector is speech recognition, which offers numerous possibilities, including voice-based account servicing, robo-advice, autonomous analysis of audio archives and live sentiment analysis of customer calls as well as the real-time transcription of any audio feed to allow instant decisions to be made, Palmer added. Giants such as Deloitte are now using AI to help enforce compliance and mine their audio data for additional business insights. For instance, automated speech recognition (ASR) technology in audio monitoring can set live triggers on chosen keywords, which can include major financial announcements and other announcements that can have an impact on share prices. This monitoring capability can also detect potential issues, signs of insider trading and patterns of misconduct such as rogue trading.

As AI continues to become a major component of the intelligence community, security-focused ETFs can benefit further, such as theFirst Trust NASDAQ Cybersecurity ETF (NYSEArca: CIBR)and theETFMG Prime Cyber Security ETF (NYSEArca: HACK).

First up, CIBR seeks investment results that correspond generally to the price and yield f an equity index known as the Nasdaq CTA Cybersecurity IndexSM. The index is comprised of securities of companies classified as cybersecurity companies by the CTA.

Next, HACK seeks investment results that correspond generally to the price and yield performance of the Prime Cyber Defense Index. The index tracks the performance of the exchange-listed equity securities of companies across the globe that (i) engage in providing cybersecurity applications or services as a vital component of its overall business or (ii) provide hardware or software for cybersecurity activities as a vital component of its overall business.

For a broad play in disruptive tech, investors can look at theGlobal X Robotics & Artificial Intelligence Thematic ETF (NasdaqGM: BOTZ). BOTZ seeks to invest in companies that potentially stand to benefit from increased adoption and utilization of robotics and artificial intelligence (AI), including those involved with industrial robotics and automation, non-industrial robots, and autonomous vehicles.

For more market trends, visit ETF Trends.

Continue reading here:
As Cyber Fraud Increases, Its Artificial Intelligence to The Rescue - ETF Trends

Read More..

Lead singer of Moist has created an artificial intelligence named Ophelia – CTV News

WINNIPEG -- The lead singer of the Canadian rock group Moist and four-time Juno winner David Usher was a in Winnipeg Thursday, but not for his music.

The rocker is also a tech entrepreneur in the area of artificial intelligence and he was showing off his new artificial being.

"I was born six months ago. I'm a child really," said Ophelia, an artificial intelligence created by Usher.

Ophelia isn't much different from other artificial intelligence systems like Siri or Alexa, but her purpose is.

Usher said while other AI is used to collect data, Ophelia is used to have a conversation. Every time she talks with someone, she learns more about how to communicate.

"We're really concerned about the conversation cloud that really is much more about human emotions and human contact. Those kind of things, life and death and love and feeling and birth," said Usher, who is the founder of Reimagine AI.

Usher said this sort of tech can be used for thing such as greeting guests at hotels, acting as a host at museums or helping people in hospitals.

In collaboration with Sheldon Memory Lab at McGill University, Usher is helping develop a companion bot for Alzheimer patients.

"Our AIs can come on and recognize them by name and initiate engagement to do some of those things that they've forgotten that they like to do."

Kathy Knight, CEO of Tech Manitoba, said the use of AI is growing in Manitoba and with it, so is automation.

That's a one of the topics of conversation going on at a tech conference at the RBC Convention Centre Thursday and Friday, which is entitled, Disrupted.

"To actually get people to think about the human side of tech and think about how all of this change is affecting the people we live with and work with everyday, and how do we bring them along," said Knight.

While Usher said there are concerns about what people will do with AI in the future, he chooses to look at the good instead.

"You don't have to build the smartest AI, you just have to build something that can help," said Usher.

Visit link:
Lead singer of Moist has created an artificial intelligence named Ophelia - CTV News

Read More..

If a novel was good, would you care if it was created by artificial intelligence? – The Guardian

Roland Barthes was speaking metaphorically when he suggested in 1967 that the birth of the reader must be ransomed by the death of the author. But as artificial intelligence takes its first steps in fiction writing, it seems technology may one day start to make Barthes metaphor all too real.

AI is still some way off writing a coherent novel, as surreal experiments with Harry Potter show, but the future isnt so far away in Hollywood. According to Nadira Azermai, whose company ScriptBook is developing a screenwriting AI: Within five years well have scripts written by AI that you would think are better than human writing.

Self-promotion aside, if there is the possibility of a decent screenplay from ScriptBooks AI within five years, then a novel composed by machines cant be far behind. But its hard to shake the impression that, even if such novels eventually turn out to be better than human writing, something would be lost.

Perhaps the feeling comes from an idea that would be anathema to Barthes: the idea of literature as communication.

If a book is a heart that only beats in the chest of another, as Rebecca Solnit suggests, then it seems two parties are required: someone to write and someone to read. So when AI writes fiction there seems to be a missing piece, a void at the heart of the text where meaning should reside.

Barthes would have none of this, of course, insisting that it is language which speaks, not the author. In terms which strikingly anticipate the workings of software currently at the cutting edge of artificial writing, such as OpenAIs GPT-2, he argues that a text is not a line of words releasing a single meaning (the message of the Author-God), but instead a tissue of citations, resulting from the thousand sources of culture. The writer can only imitate a gesture forever anterior, never original, Barthes continues. If he wants to express himself the internal thing he claims to translate is itself only a readymade dictionary whose words can be explained (defined) only by other words, and so on ad infinitum.

And he must be on to something. Imagine yourself, some years in the future, pulling a novel by an unknown author off the shelves and finding that it is really good. Would you be any less moved by the story if you were then told it had been produced using groundbreaking AI? If all you had were the words in front of you on the page, how would you even know? Those who scoff at the idea that AI could ever pass this literary Turing test havent been paying attention for the past 50 years. Computers can now drive cars, recognise faces, translate between languages, fill in as your personal assistant, even beat the world champion at Go achievements that are often dismissed as just computation even though an expert of the 1970s would have classed any one of them as a signature ability of human intelligence.

Should publishers decide the future of literature is written in code, there may still be some hope for authors. A shift to AI-generated novels could only ever be a short-term strategy. As Barthes intuited and OpenAIs latest algorithm demonstrates, its certainly possible to assemble writing from other writing. But even if this patchwork prose becomes better than human writing, it would be only drawing on a finite well of inspiration. Train your AI on the sum total of human literature thus far and all youll get is a mass of references: a gesture forever anterior, never original. No one who witnessed the phenomenon that was the Fifty Shades of Grey series could doubt that imitation can be lucrative for a while. But when even an imitator as skilful or as lucky as EL James finds her sales on a downward curve its clear that no matter how feisty your stallion at first appears, flogging it will only get you so far.

Barthes belief in the primacy of the word, his dogged insistence that life can only imitate the book, leaves his recipe for literature missing a vital ingredient: the individual experience that any human writer facing the blank page cannot avoid. Without the raw input of the complicated business that is life, even the most talented AI can only rearrange the books it ingested in its training enough for a few good years in publishing, perhaps, but hardly a sustainable model for literary culture.

Maybe Im thinking too small. Maybe any publisher looking forward to the death of the author would only need to expand the training programme for their writing machines. Perhaps they could hook their AIs up to the daily news, wire them into Spotify, encourage them to make new friends on Twitter and feed it all back into the work. The resulting algorithms would be very different to human beings, of course. But perhaps they would be enough like thinking, feeling beings that their fiction would be communicating something rather marvellous after all.

Richard Lea writes for Guardian books

The rest is here:
If a novel was good, would you care if it was created by artificial intelligence? - The Guardian

Read More..

Joint Research on Applying Artificial Intelligence to Industrial Cybersecurity – Novus Light Technologies Today

Radiflow, a provider of cybersecurity solutions for industrial automation networks, and the Fraunhofer Institute of Optronics, System Technologies and Image Exploitation (Fraunhofer IOSB), a prominent research institute for applied science in Germany, today announced the launch of a joint research project for applying advanced machine learning and artificial intelligence to cybersecurity for industrial automation networks.

For this research project, Radiflow and Fraunhofer IOSB will collaborate on developing machine learning methods and artificial intelligence techniques for allowing the autonomous detection of non-compliant and anomalous behaviors on industrial automation networks. This applied research will involve evaluating graph-based and semantic approaches for event correlation and context awareness in order to develop these new machine learning and artificial intelligence capabilities.

The outcome of this research will be the development of a prototype for an Autonomous Industrial Cybersecurity Assistance System (AICAS) that expands on existing approaches for detecting deviations and anomalies to a baseline of network behaviors on OT networks. This prototype will be designed to self learn the underlying behaviors an of industrial automation networks and the functions of the connected assets in order to dynamically detect new and unknown cyberthreats.

The question of how AI can enhance industrial cybersecurity to better respond to changing OT environments and new attack techniques is timely and essential, said Dr.-Ing. Christian Haas, Group Manager at Fraunhofer IOSB. Radiflow and its extensive experience working with industrial enterprises and critical infrastructure operators make the company the ideal research partner for applying AI to the industrial cybersecurity domain.

The funding for this research project, which is scheduled to last two years, was granted by the Innovation Authority in Israel and the Federal Ministry of Education and Research in Germany.

At the conclusion of this research project, Radiflow intends to incorporate the new capabilities of this AICAS prototype into itsiSID industrial threat detection system.

Determining if abnormal behavior has been caused by normal operational activities or by cyber-attackers is critical for understanding and securing an OT network, explained Yehonatan Kfir, CTO of Radiflow. AI holds the potential to improve the situational awareness of OT networks by efficiently distinguishing between abnormal behavior that was caused by normal operations and abnormal behavior that is connected to a cyberattack.

Original post:
Joint Research on Applying Artificial Intelligence to Industrial Cybersecurity - Novus Light Technologies Today

Read More..

Heres how Compass uses artificial intelligence to support its agents – Inman

The vast majority of what we do will disappear into the regular tools agents use every day, Compass CTO Joseph Sirosh said on stage at Inman Connect New York.

Amid all the market place disruption, news-making acquisitions and lawsuits Joseph Sirosh, the chief technology officer at the well-funded brokerage Compass, believes the companys goal and mission are pretty straightforward.

Joseph Sirosh | Photo credit: Compass

Compass, to me, is an idea, Sirosh said at Inman Connect in New York on Thursday. Agents grow their business and we invest as much as possible in agents growing their business with technology.

Compass has grown its technology team massively in the past year, nearly tripling it since Sirosh took the role. The company has pulled in talent from some of the worlds top technology companies like Amazon, Microsoft, Facebook and Google.

Among the key areas Compass has focused is artificial intelligence (AI), Sirosh, the former CTO of AI at Microsoft and the CTO of consumer at Amazon, told Clelia Peters, the president of Warburg Realty and Inmans editor-at-large, atInman Connectat the Marriott Marquis in New York City.

AI in real estate, according to Sirosh, is going to empower both the consumer and the agent. Compass, right now, is incorporating predictive AI into its search tools.

With even a few letters being typed, you pick the right search query, Sirosh said.

Eventually, the search will be smarter, thanks to AI. Consumers will be able to search by picture, like throwing a photo of a craftsman-style home into a reverse image search to bring up photos of other craftsman homes on the market, whereas right now, most home searches are limited to geographical locations, and numbers of beds or bathrooms.

Compass is also powering its customer relationship management tool (CRM) with artificial intelligence, by helping agents stay on top of their sphere.

Staying in touch with your sphere of influence is hard work, you have thousands of contacts, Sirosh said. Lots of agents tell me they have lost hundreds of thousands of dollars because they didnt follow up. Consistency of follow up is one of the most challenging things.

Eventually, artificial intelligence will power the platform experience in real estate, Sirosh explained, where the entire ecosystem of what the agent and consumer needs will be connected in one place. The platform begins with listings, where the agents can acquire a listing, make it searchable, price it and market it. Then on the other side, the agent can organize listings for consumers, schedule tours and the consumer can even make an offer.

It sounds all obvious but the reality is, this is done in a fragmented way, Sirosh said.

Sirosh compared it to the experience of listening to music. It used to be recorded in an analog way from a guitar, then pressed into a record and youd go to the record store and buy a physical record by word of mouth or someone elses recommendation. Now, AI pushes recommendations right to an app on your phone and your music listening and discovery journey is guided by AI.

Getting agents to adopt technology is always a challenge, of course, but Sirosh explained that the best technology is the technology you dont even know is there.

The vast majority of what we do will disappear into the regular tools agents use every day, Sirosh said. [Those tools] will become more simple and effective.

Email Patrick Kearns

Read more here:
Heres how Compass uses artificial intelligence to support its agents - Inman

Read More..

Government to strengthen security of internet-connected products – GOV.UK

A new law will protect millions of users of internet-connected household items from the threat of cyber hacks, Digital Minister Matt Warman announced today.

The plans, drawn up by the Department for Digital, Culture, Media and Sport (DCMS), will make sure all consumer smart devices sold in the UK adhere to the three rigorous security requirements for the Internet of Things (IoT).

These are:

All consumer internet-connected device passwords must be unique and not resettable to any universal factory setting

Manufacturers of consumer IoT devices must provide a public point of contact so anyone can report a vulnerability and it will be acted on in a timely manner

Manufacturers of consumer IoT devices must explicitly state the minimum length of time for which the device will receive security updates at the point of sale, either in store or online

The sale of connected devices is on the rise. Research suggests there will be 75 billion internet connected devices, such as televisions, cameras, home assistants and their associated services, in homes around the world by the end of 2025.

Digital Minister Matt Warman said:

We want to make the UK the safest place to be online with pro-innovation regulation that breeds confidence in modern technology.

Our new law will hold firms manufacturing and selling internet-connected devices to account and stop hackers threatening peoples privacy and safety.

It will mean robust security standards are built in from the design stage and not bolted on as an afterthought.

The measures were developed in conjunction with the business industry and the National Cyber Security Centre and set a new standard for best practice requirements for companies that manufacture and sell consumer smart devices or products.

Following on from the consultation, Governments ambition is to further develop legislation that effectively protects consumers, is implementable by industry and supports the long term growth of the IoT. Government aims to deliver this legislation as soon as possible.

Nicola Hudson, Policy and Communications Director at the NCSC, said:

Smart technology is increasingly central to the way we live our lives, so the development of this legislation to ensure that we are better protected is hugely welcomed.

It will give shoppers increased peace of mind that the technology they are bringing into their homes is safe, and that issues such as pre-set passwords and sudden discontinuation of security updates are a thing of the past.

This follows the governments voluntary Secure by Design Code of Practice for consumer IoT security launched in 2018. The Code advocates for stronger cyber security measures to be built into smart products at the design stage, and has already been backed by Centrica Hive, HP Inc Geo and more recently Panasonic.

The Government is working with international partners to ensure that the guidelines drive a consistent, global approach to IoT security. This includes a partnership with standards bodies. In February 2019 ETSI, a global standards organisation published the first globally-applicable industry standard on consumer IoT security, which is based on the UK Governments Code of Practice.

Matthew Evans, director of markets, techUK said:

Consumer IoT devices can deliver real benefits to individuals and society but techUKs research shows that concerns over poor security practices act as a significant barrier to their take-up. techUK is therefore supportive of the Governments commitment to legislate for cyber security to be built into consumer IoT products from the design stage.

techUK has been working on these three principles for the past four years. We support the work to ensure that they are consistent and are influencing international standards.

We look forward to working closely with Government and industry to ensure the implementation of the legislation provides protection for consumers whilst continuing to promote innovation within the IoT sector.

John Moor, Managing Director, IoT Security Foundation said:

Over the past five years, there has been a great deal of concern expressed toward vulnerable consumers and inadequate cybersecurity protection. Understanding the complex nature of IoT security and determining the minimum requirements has been a challenge, yet, after a thorough and robust consultation, those baseline requirements have now been universally agreed.

The IoT Security Foundation welcomes the results of the consultation as it not only provides clarity for industry, it is great news for consumers and bad news for hackers.

Read more:
Government to strengthen security of internet-connected products - GOV.UK

Read More..

DigiCert Leads Initiative to Enhance EV SSL Certificates – Security Boulevard

In collaboration with several other certificate authorities, DigiCert has proposed 4 enhancements to the EV SSL validation processes

On the Internet, nobody knows youre a dog.

Cartoonist Peter Steiner penned those words in a cartoon strip all the way back in 1993. The cartoon was funny and made a lot of people laugh, but it was highlighting a serious issue that was just developing back thenhow easy it was to trick people via the anonymity of the internet. Unfortunately, Peter nailed it! Today, that problem is even bigger than anyone even Peter could have imagined1 in 25 branded emails is actually a phishing email.

So, why is online identity so important? How will DigiCertsproposal help consumers?

Lets hash it out.

The internet is flooded with unknown actors, and a lot oftimes theyre up to nefarious activitiesphishing, bullying, catfishing, scamming,preying on children, swatting, and more. Thats why most internet users tend tobe suspicious of interactions with people, websites, and companies they dontknowtypically, we want to know the real-world identity of the individuals andcompanies we interact with online.

What would you think if you went to your local shoppingcenter and saw a shop with no business name, like this?

Youd be intrigued but you probably wouldnt trust that company. Youd certainly have some questions! Customers dont trust anonymity they want to know who theyre doing business with.

The same thing is true online customers want to know who theyre buying from. At your local mall, its pretty easy to tell who youre buying from theres a physical store with signage and staff right in front of you. Online, though, identity can be slippery. As Steiner pointed out, you can be a dog, a scammer, or a predator and nobody will know until its too late.

In an environment saturated with anonymous trouble-makers, EV SSL is a great tool consumers can use to confidently see who runs a website, helping them decide whether to trust the website owner or not. Thats why we strongly support making EV SSL as strong and usable as possible people want/need what it can provide. And thats why were excited to see DigiCert leading the charge to update and enhance EV SSL.

DigiCert is proposing four specific ways to update and enhance the CA/B Forum standards for EV SSL certificates. These enhancements will make EV SSL stronger and satisfy some weaknesses pointed out by security researchers. Lets go through each of them, and see how theyll help improve online identity for all:

A CAA record is a DNS entry that lets website managers restrict which CAs may issue certificates for their domain. Its a great tool for fighting shadow IT certificates ensuring that an organizations certificates are centrally managed and authorized.

But currently CAA records can only specify certificateauthorities. DigiCert is proposing expanding CAA records so domain admins can controlor restrict the validation level of certificates that can be issued for theirdomain. For example, a website admin could restrict their domain to only issue EVSSL certificates from a certain CA.

Why This Is Beneficial:

Lets look at a hypothetical scenario. Lets say example.com hires a freelance web designer to update their blog with a fresh, new design for 2020. That designer isnt authorized to issue SSL certificates for the domain. But lets say the website designer installs a WordPress file editor plugin, so they can complete domain control validation and get an SSL certificate issued. Example.com now has an SSL certificate issued by an unauthorized party they dont control the certificate or the private key, which is a significant security issue. What happens when the certificate expires?

If example.com had implemented a CAA record that restrictedthe domain to EV certificates from DigiCert CA only, the web designer wouldnthave been able to get that certificate issued because any attempt to get acertificate type not identified in the CAA record would fail.

If youve got a feeling of dj vu right now, it might be because we mentioned this idea back in October 2019. TL;DR:

LEIs are Legal Entity Identifiers, they were created in the aftermath of the financial crisis that occurred a decade ago. They are numerical codes recognized by 150 different countries. The entire system is overseen by a Swiss non-profit called GLEIF. An LEI can help prevent collisions and confusion. Now, I can already hear the objections percolating, that, like confusing organizational names, people wont know what to do with an LEI number. But there are several workarounds for that. For one, the browser could just use the LEI code and generate the associated information. Granted that might require an additional call, which may be anathema to browsers but its an option. You could also make it easy to click on the LEI number and follow it to a database with the information. This would require the user to take an action, but some might find it useful. But more than anything, it could send up a red flag when an eCommerce website or some other organization that transacts in valuable data DOESNT have an LEI.

Why This Is Beneficial:

Adding LEIs to EV SSL certificates offers two key benefits:

If you look up a company in the LEI database, youll get areport with a lot of details about the organization. Starting with basic info:

And even including information about subsidiaries and parentcompanies:

In the end, this info is ripe for being used as another datapoint to solve any corporate identity assurance use case. Like EV SSL, theinfrastructure is already in place, why not use it (or at least consider it) forresolving such an apparent problem?

Under the current EV guidelines, each certificate authority decides what data sources they will use for validation of organization details in EV SSL certificates. (Keeping in mind that theyre validating organizations across hundreds of countries, there can be a lot of variation in the quality of data sources being used from country to county.) DigiCert is proposing that the CA/B forum specify a standardized list of acceptable data sources to use in the EV validation process.

Why This Is Beneficial:

Using standardized data sources will offer several benefits:

Since EV SSL certificates are all about showing customersthe verified identity of the organizations theyre interacting with, trademarksare a logical add-on. As DigiCerts Dean Coclin explains:

Trademarks are well known, understood, unique and can be validated. Consumers recognize them and so if a browser wanted to include the trademark in their UI, they could do so with confidence that it had been properly validated. If they dont, thats fine, but it would be in the cert for any relying party to examine.

Why This Is Beneficial:

Trademarks are another way for consumers to be sure theyre interacting with the company they think they are. For example, Windex is a trademark owned by the SC Johnson company. But many consumers probably dont know the Windex brand is actually owned by SC Johnson. The current EV guidelines state that it can only say SC Johnson. However, if their EV SSL certificate displayed the Windex trademark, that might help a consumer be more confident that theyre on the official and intended website.

Manage Digital Certificates like a Boss

14 Certificate Management Best Practices to keep your organization running, secure and fully-compliant.

Ultimately, for EV SSL certificates to reach their fullpotential in helping users, the browsers need to research, identify andintroduce a more effective interface for displaying identity information tousers. (Incidentally, the browsers identity interface wouldnt have to belimited to data from EVit could contain data from other verified sources toprovide consumers all the data they need to make an informed decision.)

Since Chrome and Firefox removed the old green address bardue to concerns that it wasnt effective, the onus is on the browsers todevelop a new UI that helps users understand who is running the websitestheyre interacting with. In my opinion, removing EV without replacing it witha viable alternative did the world a huge disservice. EV may not have helped 100%of internet users, but it certainly helped more than 0%. It wasnt perfect, butit was all the internet had. Its like saying, since automobile accidents stillhappen at intersections, get rid of all traffic lights until we think ofsomething better. For some reason, logic just seemed to go out the window onthis one.

It doesnt seem like too big of an ask for the browsercommunity to seriously come together and help create a universal display thatwill help consumers with the identity of websites that they interact with. Ithink if browsers put their users interests first, the answer will come veryeasily.

I took 15 minutes with my team and came up with a half-bakedidea that seems to make quick sense. One of the big things that the EVnaysayers harped on was that the green address bar needed education tounderstand what it actually meant. They believed that it should require notraining or education and that it should just be immediately understood. Well,in minute three of our discussion, we realized that all of the social media channelsover the past decade have already educated the world on this exact problem. Thesocial media eco-system recognized issues with identity and addressed ithead-on years ago by introducing the verified account status symbol. A verifiedaccount status is reserved for high-profile accounts of companies, brands orindividuals that are especially vulnerable to impersonation.

For obvious reasons, fake accounts that are used toimpersonate a popular user on a social media platform could easily causeirreparable brand damage to both the real account holder and the platformsbusiness model. Thats specifically why the verified account status and symbolexist. Well, since the social media channels have already done the educatingand have fully conditioned users at scale to look for verified account symbolswhen consuming content, why not adopt that developed behavior to work inbrowser environments? It can quickly be used to address online identity on awider scale than just social media. Seems like the logical next step. Does it somehowgo against browser business models?

Below is what we came up with over a cup of coffee. For DVSSL, since the lock doesnt mean what it used to, simply hide it. Then letsintroduce two, or maybe just one, verified website symbol. Id bet that if youdid a study, users would immediately understand what this means. Withouteducation. With conviction.

Mousing over the verified icon could display a tooltipshowing more specifics on what the icon means.

If you click on it, something like this could display. Itsvery similar to what used to be displayed, but with a few tweaks.

Just to reiterate, this idea would be after the EV guidelines have been enhanced. Im sure there are more things worth consideration, but this took us 15 minutes in an informal meeting setting. I wonder what a group of browser security experts and security researchers could come up with if they tried to solve online identity head on for the sake of Internet users. At the least, its worthy of a real discussion where all parties come together to really solve a larger issue for the greater good of society. Not just go through the motions.

On the Internet, nobody knows youre a legit website.DigiCert is trying to do something about it. Browsers, youre up.

*** This is a Security Bloggers Network syndicated blog from Hashed Out by The SSL Store authored by Bill Grueninger. Read the original post at: https://www.thesslstore.com/blog/digicert-leads-initiative-to-enhance-ev-ssl-certificates/

Here is the original post:
DigiCert Leads Initiative to Enhance EV SSL Certificates - Security Boulevard

Read More..

Five signs that your business is ready to start migrating storage to the cloud – IOL

International/31 January 2020, 7:30pm/Mike Rogers

DURBAN - South African enterprises have lagged their international counterparts in migrating data centre infrastructure to the public cloud often because of concerns about latency, bandwidth and data sovereignty.

But that picture is changing rapidly following Microsoft launching its enterprise-class South African Azure data centres this year, with Amazon expected to follow with a local AWS data centre in 2020.

For many organisations, moving some near-real time storage and archiving requirements to the cloud is an attractive place to start the journey. Its simpler than migrating computing to the cloud and the payback time can be relatively fast. Here are a few signs that your company could benefit from moving some or all of its storage requirements to a cloud model.

1. The internal IT team is struggling to meet cost and availability goals

Many internal IT departments have become engulfed in fighting operational fires, with the result that their performance might be inconsistent across different applications or business units. Under pressure and under resourced, some of them are finding it difficult to meet total-cost-of-ownership goals and targeted availability service levels with the mix of new and legacy infrastructure under their management.

Moving some storage workloads to the cloud can help to restore predictability to costs and performance in the storage environment and improve service to the business. It can also enable the IT department to refocus its energies on innovation and adding value to the business, rather than on day to day storage administration.

2. You are struggling to keep pace with information security and compliance demands.

Companies once worried about the regulatory implications of storing their data in the cloud. That concern has given way to the understanding that cloud providers can offer a level of information security few enterprises can match on their own. If your company is struggling to keep up with the speed of change in cyber-security and data privacy regulations, shifting storage to the cloud can relieve some of the pressure.

Public cloud providers have made substantial investments in protecting against cyber-threats and other risks to business continuity. Plus, they offer cloud-based tools and services that are already compliant with regulatory needs. They also have highly resilient data centre infrastructure and can offer you a range of services for data backup and replication, so that you can be certain your data is well protected.

3. Your hardware is about to reach end of life

Were seeing a lot of South African companies sweat their data centre assets because they are reluctant to embark on large capex projects in a difficult economic climate. The result is that many companies have ageing storage arrays that are out of warranty, some of which could fail at any moment.

If this describes your business, it might be attractive to start moving some storage workloads to the cloud. An orderly migration to the cloud can help you to minimise the business interruptions that are commonplace in data centre upgrades and take advantage of pay-as-you-go pricing. It also enables you to redeploy capital towards other strategic priorities.

Best of all, the need to refresh hardware every four to five years will disappear. The service provider will take responsibility for ensuring that the infrastructure supporting your storage is continually upgraded when required so that it meets your evolving needs.

4. You are facing exponential, unpredictable growth in data volumes

Most organisations are facing an explosion in structured and unstructured data, which creates demand for more storage. But predicting exactly how much storage capacity you will need in six months or 12 months time can be complex. Getting it wrong could mean over-specing and overspending on hardware, or needing to rapidly add more capacity at short notice.

With cloud storage, a company pays only for the amount of storage it requires. If the amount of data you manage increases faster than expected, the cloud provider can accommodate your needs as they change and grow. If your storage needs shrink, you can also downsize your spending. This flexibility is a key benefit of the cloud.

5. You are looking for low hanging fruit in operational cost savings

Most organisations today are looking for ways to drive down operating costs, and storage can often offer some quick wins. Because they run such massive data centres, cloud providers achieve significant economies of scale in their environments and can procure hardware at a lower cost than most enterprises.

They also share labour, utility and infrastructure costs across multiple clients, translating into a low cost per gigabyte of storage. Because its their core business, they will have bought and developed the best software tools to optimise administration of their data centres. These cost efficiencies are passed on to the end-user organisation.

Mike Rogers, MD, Tarsus Technology Solutions

BUSINESS REPORT ONLINE

Read the rest here:
Five signs that your business is ready to start migrating storage to the cloud - IOL

Read More..