Page 4,030«..1020..4,0294,0304,0314,032..4,0404,050..»

Pulse Secure Partners with Nozomi Networks in IT-OT Convergence Play – Channel Futures

Pulse Secure and Nozomi team up to provide broader security for IT/OT.

Pulse Secure, the secure access provider, and Nozomi Networks, a provider of operational technology (OT) and IoT security, on Thursday said theyve teamed up to provide Pulses zero-trust protection in a native, unified IT/OT cybersecurity solution for businesses in manufacturing, health care and critical infrastructure sectors that are at the core of the industrial internet of things (IIoT).

The new joint solution protects OT, industrial control systems (ICS) and IIoT infrastructure, and leverages the Pulse Secure zero-trust model to enable organizations to bring IIoT devices out of OT isolation and into the IT realm to increase operational flexibility, reduce time for troubleshooting, and improve uptime and productivity.

Pulse Secures Prakash Mana

Attackers increasingly use connectivity and IoT device exposures to scan the network for other exploitable targets that provide access to sensitive data or credentials or enable operational disruption. Pulse Secures NAC solution provides the necessary visibility and policy-based access management to ensure appropriate IoT device onboarding, monitoring, segregation and risk mitigation, said Prakash Mana, vice president of product management at Pulse Secure. By integrating with Nozomi Networks, we can further extend native operational intelligence, access control and threat response capabilities of IIoT devices operating within OT and ICS environments.

Theres been convergence of IT and OT networks, referred to as IIoT 4.0. Cybersecurity strategies are necessary to address potential exploitation of security gaps between IT ad OT technologies.

An example of this convergence is a user on an IT network logging in remotely to a machine on a manufacturing floor network to monitor it or get data from devices on the floor.

In the past, those networks [on the factory floor] were isolated from the outside world with their own capabilities, which has its benefits, but also disadvantages in terms of scale or communications and data analytics, Scott Gordon, chief marketing officer at Pulse Secure, told Channel Futures. The reason why they merge is for better data communications, better data analysis and it allows things to be cloud-enabled in terms of control and diagnostics. So, there are a lot of advantages of why there are IT/OT integration trends going on.

Exposure to the internet, however, brings potential for risk and threats.

Gordon said many of Pulse Secures manufacturing customers, for example, want to take the discovery, classification, monitoring and threat response capability and apply it to devices in their OT network. Now they can.

Pulse Secure system integration and VAR partners are typically specialized, often selling into manufacturing environments. With the new native support for Nozomi, Gordon suggests its not a big leap for partners to expand their opportunity.

View original post here:
Pulse Secure Partners with Nozomi Networks in IT-OT Convergence Play - Channel Futures

Read More..

2 Dead in Protests Over Indias Religion-Based Citizenship Bill – The New York Times

NEW DELHI Tens of thousands of protesters rioted in three states across Indias northeast, some defying a government curfew and military deployment to demonstrate against the passage of the contentious Citizenship Amendment Bill, which will grant citizenship to thousands of migrants on religious grounds.

By Thursday night, the government had shut down the internet, deployed hundreds of troops, imposed a curfew in Assam state and banned groups of more than four people from assembling in neighboring Meghalaya state.

The police shot and killed two protesters in Assam whom they accused of defying the curfew, and arrested dozens of others there, The Associated Press reported.

Protesters are angry that the bill will grant citizenship to thousands of Hindu, Christian, Jain, Buddhist and Sikh migrants from some neighboring countries where New Delhi says they are religiously persecuted. Demonstrators say this will flood their hometowns with unwanted foreigners.

The bill will make it harder for Muslim migrants to attain Indian citizenship, although many Muslims are also discriminated against in neighboring countries. Critics fear the bill will be used to harass Indian Muslims by forcing them to pass a citizenship test and prove their familys lineage in the country, while giving a blanket pass to people of most other religions.

But government officials say the bill is a humanitarian effort to provide shelter to religiously persecuted minorities. The bill is expected to be signed into law in the coming days.

The protests first broke out on Wednesday, after the controversial bill was passed by the upper house of Indias Parliament, and quickly turned violent. Protesters set two train stations on fire, clashed with security forces, blocked national highways, burned vehicles and attacked the home of the highest-ranking government official in Guwahati, the capital of Assam.

The governments show of force only seemed to enrage protesters further, with larger numbers of demonstrators gathering on Thursday and clashing with security forces.

Protesters in the states of Assam, Meghalaya and Tripura say the bill will dilute their numbers by naturalizing Hindus from neighboring Bangladesh who fled to India decades ago, during their countrys civil war.

Although the three states are majority Hindu, their residents tend to be more concerned about safeguarding their unique ethnic makeup and linguistic heritage than about helping coreligionists from other countries.

Hiren Gohain, a retired professor in Guwahati, denounced what he called an arbitrary bill by the government that had little public support, but only sought to reinforce the Indian governments quest to unravel Indias secular underpinnings.

There had been no demand from any quarter in India for this Citizenship Amendment Bill, Mr. Gohain said in a telephone interview. Indias governing party, the Bharatiya Janata Party, or B.J.P., has brought the bill to polarize people among communal lines and extinguish the very national existence and culture of Assam, he added.

The government shutdown of the internet in Assam on Wednesday and Thursday secured Indias spot as the country with the most internet blackouts in the world. India, the worlds largest democracy, was responsible for 67 percent of the worlds internet shutdowns last year, with 134 incidents, according to Access Now, a digital information advocacy center.

So far this year, India has had 89 internet blackouts, some lasting months, as in Kashmir, where the internet was shut down for 133 days after the government stripped the majority Muslim territory of its autonomy in August.

Indias Ministry of Information and Broadcasting directed TV channels on Wednesday to refrain from broadcasting protests or any anti-national content, a move critics say is part of government efforts to stamp out opposition. The order came as the live TV station for the upper house of Parliament cut out when opposition lawmakers heckled the home minister, Amit Shah, who is behind the Citizenship Amendment Bill.

Earlier this year, Prime Minister Narendra Modis government tried to push a similar citizenship bill. But the legislation stalled after many politicians objected to the religious dimension of the bill and the possibility that a large number of Hindu Bengalis would be made citizens, giving them the right to acquire land.

Read more from the original source:
2 Dead in Protests Over Indias Religion-Based Citizenship Bill - The New York Times

Read More..

RIPE NCC and TRA hold roundtable in UAE on government role in Internet – Intelligent CIO ME

The RIPENetwork Coordination Centre (RIPE NCC), in co-operation with the TelecommunicationsRegulatory Authority (TRA) in the UAE, have held a roundtable discussion dedicatedto Arab ICT ministries and regulators on The Role of Arab Governments in InternetDevelopment.

Thediscussion put the spotlight on current opportunities and challenges in theMiddle East in managing Internet resources and highlighted new developments.

The roundtablewas attended by representatives from several Arab countries, including: UAE, KSA,Kuwait, Bahrain, Yemen and Egypt.

H.E. HamadObaid Al Mansoori, TRA Director General, said: We have important strategicissues to examine and discuss, we have a lot of headlines that representopportunities and challenges at the same time. These include the future of the Internetin light of the growing scope of users across the region and the implementationof IPv6 and the consequent necessities of co-ordination and mutual benefit fromexpertise and experience.

Salam Yamout, Board Member,RIPE NCC, added: The RIPE NCC is committed to working with stakeholders, includinggovernments in the region, to advance and develop the Internet, and to supportthem with the necessary technical expertise.

We commend the work of the TRA in UAEand its role in developing new initiatives to support the development ofInternet and economic growth in the region. These meetings are an idealplatform to address some of the pressing challenges facing information sharingand Internet security today.

Read more:
RIPE NCC and TRA hold roundtable in UAE on government role in Internet - Intelligent CIO ME

Read More..

Global and Regional IT Security Market 2019 by Manufacturers, Countries, Type and Application, Forecast to 2025 – Industry PressRelease

The and Regional IT Security Market report gives a purposeful depiction of the area by the practice for research, amalgamation, and review of data taken from various sources. The market analysts have displayed the different sidelines of the area with a point on recognizing the top players (Blue Coat, Cisco, IBM, Intel Security, Symantec , Alert Logic, Barracuda Networks, BT Global Services, CA Technologies, CenturyLink, CGI Group, CheckPoint Software Technologies, CipherCloud, Computer Sciences, CYREN, FishNet Security, Fortinet, HP, Microsoft, NTT Com Security, Panda Security, Proofpoint, Radware, Trend Micro, Trustwave, Zscaler) of the industry. The and Regional IT Security market report correspondingly joins a predefined business market from a SWOT investigation of the real players. Thus, the data summarized out is, no matter how you look at it is, reliable and the result of expansive research.

This report mulls over and Regional IT Security showcase on the classification, for instance, application, concords, innovations, income, improvement rate, import, and others (Man, Woman) in the estimated time from 20192025 on a global stage. In like manner, the overall and Regional IT Security market report reveals knowledge identified with the type of product, its applications, customers, prime players, and various components agreeing with the account. This first data demonstrates critical contenders and their definite picture of the general and Regional IT Security market. Other than this, the report further demonstrates expected market power, challenges, and prospects in the and Regional IT Security market.

Request for Sample Report @www.intenseresearch.com/market-analysis/global-and-regional-it-security-market-2018-by.html#request-sample

The report gives a broad explanation of the presence of the and Regional IT Security market in different regions and countries. With an extensive regional analysis of the and Regional IT Security market, the research analysts make an attempt to unveil hidden growth prospects available for players in different parts of the world. They accurately estimate market share, CAGR, production, consumption, price, revenue, and other crucial factors that indicate the growth of regional markets studied in the report. They also shed light on the presence of prominent players in regional markets, and how it is making a difference in the growth of the regional markets. The main objectives of the research report elaborate the overall market overview on and Regional IT Security market dynamics, historic volume and value, robust market methodology, current & future trends, Porters Five Forces Analysis, upstream and downstream industry chain, new technological development, cost structure, government policies & regulations, etc.

and Regional IT Security Market report segmentation on Major Product Type:Internet security, Endpoint security, Wireless security, Network security, Cloud security

The global version of this report with a geographical classification such as

North America (the United States, Canada, and Mexico)Europe (Germany, UK, France, Italy, Russia, Spain, and Benelux)Asia Pacific (China, Japan, India, Southeast Asia, and Australia)Latin America (Brazil, Argentina, and Colombia)The Middle East and Africa

Reason to buy and Regional IT Security Market Report : 1) Breakdown of the sales data at the country level, with sales, revenue and market share for key countries in the world, from 2014 to 2019.2) The and Regional IT Security competitive situation, sales, revenue and global market share of top manufacturers are analyzed emphatically by landscape contrast.3) Describe and Regional IT Security sales channel, distributors, customers, research findings and conclusion, appendix and data source.4) The details of the competitive landscape outlined in this report are likely to provide an analysis of the prominent industry vendors, their growth profiles, strategies, and tactics, etc., that would help investors in decision-making.5) To project the size of and Regional IT Security submarkets, with respect to key regions (along with their respective key countries).6) To strategically profile the key players and comprehensively analyze their growth strategies.7) Focuses on the key global and Regional IT Security players, to define, describe and analyze the value, market share, market competition landscape, SWOT analysis and development plans in the next few years.

This report contributes an overall summary of the global and Regional IT Security market, including business perspectives, market strategies, assembles data related to various business firms, its year of establishment, contact information, market outline, sales revenue, industry segments, the business most prestigious location, and regional presence. The report includes several plans and policies related to the and Regional IT Security industry, moreover, it describes the management process, product appearance, manufacturing cost, and market volume. In addition, the global and Regional IT Security market report implicates financial usage, the quantity of product, chain format, demand and supply ratio. This report justifies the various business trends followed by the marketing sectors as well as the distributors of the and Regional IT Security industry.

Inquiry for Buying a report @www.intenseresearch.com/market-analysis/global-and-regional-it-security-market-2018-by.html#inquiry-for-buying

The next part also sheds light on the gap between supply and consumption. Apart from the mentioned information, the growth rate of the and Regional IT Security market in 2023 is also explained. Finally, the possibility analysis of new project investment is done in the report, which contains a comprehensive SWOT analysis of the and Regional IT Security market.

Sorry! The Author has not filled his profile.

See original here:
Global and Regional IT Security Market 2019 by Manufacturers, Countries, Type and Application, Forecast to 2025 - Industry PressRelease

Read More..

How do Cypriots spend their time on the Internet? – In-Cyprus.com

Nearly nine out of 10 households in Cyprus had Internet access according to a survey carried out by Cystat and published on its website on Thursday.

This show that in 2019 nternet access in households increased and reached 89.6% compared to 86.2% in 2018.

According to the survey, 85.5% of persons aged 16-74 years old use the internet at least once a week. Among people aged 16-24 the figure was 100%. This percentage decreases with age, even though for individuals aged 6574 years old the use of internet increased to 44.3% in 2019 compared to 37.5% in 2018.

Persons with high educational level (97.3%) use the internet more frequently than persons with low educational level (55.7%).

What is the Internet used for?

The most popular Internet activities are: use of instant messaging (88.6%), telephone calls over the internet/video calls (via webcam) over the Internet (84.0%), participation in social networks (83.3%), search of information about goods and services (83.2%) and reading news/ newspapers/magazines (81.9%).

91.6% of persons that used the Internet in the first quarter of 2019, used their mobile or smart phone to access the Internet away from home or work, 26.1% used a laptop and 19.6% used a tablet.

e-GovernmentCompared to 2018, the percentage of persons who use the Internet for interaction with public authorities in 2019 increased from 41.7% to 50.3%. This is due to the increase of people using the Internet for obtaining information from public authorities websites (from 38.7% to 48.3%), downloading official forms (from 27.4% to 37.1%) and submitting completed forms (from 26.1% to33.9%).

e-CommerceThe percentage of individuals 16-74 years old making online orders during the first quarter of the year significantly increased to 36.2% in 2019 compared to 23.3% in 2018.

The most popular categories of goods/services ordered online were the following: clothes or sports goods (66.2%), travel arrangements such as transport tickets, car hire etc. (54.6%) and holiday accommodation (51.7%).

During the period April 2018-March 2019, 84.6% of persons aged 16-74 years old that bought or ordered goods and services for private use bought from sellers from EU countries, 44.2% bought from sellers from the rest of the world and 45.1% bought from sellers in Cyprus. 38.9% of these persons bought goods or services of value between 100-500 euro.

The survey was conducted during the period April August 2019 and covered 1,824 households with at least one member aged 16 74 (inclusive) and 3,860 individuals aged 16 74 (inclusive).

The aim was to collect data on the access of households to selected Information and Communication Technologies (ICT), the use of Internet, use of e-Government, e-Commerce, e-Skills, and Internet Security.

The survey covers all the government controlled areas of the Republic of Cyprus

Read this article:
How do Cypriots spend their time on the Internet? - In-Cyprus.com

Read More..

CipherCloud and Thales Collaborate to Support Zero Trust Data Access – Business Wire

SAN JOSE, Calif.--(BUSINESS WIRE)--CipherCloud, a leader in cloud security and governance, and Thales, a world leader in digital identity and security, today announced a technology collaboration that leverages the capabilities of Thaless SafeNet Trusted Access, a cloud-based identity, access management and authentication platform, with CipherClouds CASB+ solution. It effectively authenticates, protects against unauthorized access to data, delivers fined-grained access control, and minimizes the risk of compromised end user credentials. The combination creates a powerful cloud security and secure adaptive access solution that can be customized to support any platform, including email, SaaS, IaaS, and private cloud applications.

This collaboration creates a simple yet effective way to help customers secure data and access in the cloud without limiting end user productivity, administrator management, or system security, and is ideal for enterprises of any size.

Thales is a leader in the zero trust security framework that allows enterprises to manage access to cloud and premises apps on all devices while trusting none and which recognizes that todays network perimeter extends well beyond the office, said Pravin Kothari, CEO, CipherCloud. Our collaboration helps customers implement this zero trust security framework to the cloud with the benefit of CipherClouds Cloud Security Access Broker (CASB),that provides end-to-end protection against unauthorized access for any application in the cloud.

CASBs, policy-based access management and IAMs authentication are foundational elements of zero trust IAM frameworks, said Francois Lasnier, Vice President, Access Management solutions at Thales. The combination of SafeNet Trusted Access (Thaless access management service) and CipherCloud enables organizations to significantly improve their IAM security posture: by enforcing the appropriate assurance level at the access point and providing adaptive access controls to sanctioned SaaS applications, CISOs now have the ability to gain greater visibility and control over their cloud services.

We needed to effectively control personal health information (PHI) and personally identifiable information (PII) data across numerous devices and multiple cloud applications, said Adam Price, vice president of information security, Addiction Campuses. We chose CipherCloud after evaluating multiple CASB vendors and found that CipherClouds zero trust data access solution provided the best protection for our environment.

The Zero Trust data access solution seeks to allow authenticated users access to business-critical data and applications from anywhere with any device. This is accomplished by implementing procedures that authenticate every user, authorize every device, and increase end user productivity through a flexible security infrastructure that can adapt to rapid changes in business operations. As enterprises move into the cloud, close integrations with cloud security technology leaders makes implementing this model easier and more secure.

The CipherCloud Zero Trust CASB+ platform enables complete control of cloud applications to provide comprehensive visibility, data security, threat protection, and compliance for cloud-based assets. CASB+ protects any cloud application from unauthorized upload, download, access, and data sharing to meet corporate governance, compliance, information technology, and cybersecurity policy. The cloud-native CASB+ platform ensures that confidential and sensitive data is protected at all locations - in the cloud and on users' devices. CASB+ provides one centrally controlled unified platform for enterprises to safely use the largest and most diverse multi-cloud environments -- email, SaaS, PaaS, or IaaS, and custom cloud environments.

The CipherCloud CASB+ platform has the ability to scale to fit any enterprise so as users scale their use of the platform, elasticity will cope with the increased demand without impacting customer service, cost or manageability.

About CipherCloud

CipherCloud introduced the first CASB solution to the market in 2011 and continues to reshape the cloud security market. CipherClouds recognized data protection expertise forms the foundation for the industrys only zero-trust CASB solution, providing seamless zero-trust security across all clouds with unified policies, trusted data protection, and automatic compliance for the cloud-mobile era. CipherClouds CASB+ provides the deepest levels of data protection and real-time data access control to provide an immediate solution for challenging cloud security and compliance problems.

CipherCloud has been awarded Winner of the Cloud Security Product of the Year by SC Magazine, Overall Leader in the CASB market by KuppingerCole, Best IT Data Management Solution by ASTORS Homeland Security, and earned numerous awards from the 2019 Internet Security Product Guide. The worlds largest global enterprises and government institutions in over 25 countries protect and secure their cloud information with CipherCloud, which is backed by Andreessen Horowitz, Transamerica Ventures, Delta Partners and T-Venture, the venture capital arm of Deutsche Telekom. For more information, visit http://www.ciphercloud.com and follow us on Twitter @ciphercloud.

Read the original post:
CipherCloud and Thales Collaborate to Support Zero Trust Data Access - Business Wire

Read More..

Malware variety grows by 13.7 percent in 2019 due to web skimmers – Eagle Online

In 2019, the number of unique malicious objects detected by Kasperskys web antivirus solution rose by an eighth, compared to last year reaching 24,610,126. This growth was mainly influenced by a 187% rise in web skimmer files. Other threats, such as backdoors and banking Trojans detected in-lab, also grew, while the presence of miners dropped by more than a half. These trends have demonstrated a shift in the type of threats used by attackers on the web who search for more effective ways to target users, according to the Kaspersky Security Bulletin: Statistics of the Year report.

In 2018, unique malicious objects (including scripts, exploits and executable files) detected by Kasperskys web antivirus solution totaled 21,643,946, rising to 24,610,126 this year. The growth accounts for an increase in the number and variety of HTML pages and scripts with hidden data loading usually used by unscrupulous advertisers. Yet, most notably, the growth was also partially caused by online skimmers (sometimes referred to as sniffers) where scripts are embedded by attackers in online stores and used to steal users credit card data from websites.

The growth of online skimmers unique files (scripts and HTML) detected by Kaspersky web antivirus equaled 187%, reaching 510,000. At the same time the number of threats detected by web antivirus have risen five-fold (by 523%), totaling 2,660,000 in 2019. Web skimmers also entered the top 20 malicious objects detected online, taking 10th place in the overall ranking. The share of new Backdoors and banking Trojan files, among all types of threats detected in-lab, also grew by 134% and 61% to reach 7,644,402 and 739,551 respectively.

Nevertheless, the number of unique malicious URLs detected by Kaspersky web antivirus halved in comparison to 2018 (50.5%) from 554,159,621 to 273,782,113. This shift was largely caused by significant decrease of hidden web miners, even though several detections related to them (including Trojan.Script.Miner.gen, Trojan.BAT.Miner.gen, Trojan.JS.Miner.m), can still be seen in the top 20 web malware threats.

The presence of programs that secretly generate cryptocurrency on users computers (called local miners) has also been steadily declining over the year: the number of users computers affected by attempts to install miners dropped by 59%, from 5,638,828 to 2,259,038.

85% of web threats were detected as malicious URL this detection name is used to identify links from Kasperskys black list. It includes links to web pages containing redirects to exploits, sites with exploits and other malicious programs, botnet command and control centers, extortion websites, and others.

The volume of online attacks has been growing for years, but in 2019 we saw a clear shift from certain types of attacks that are becoming ineffective, to the ones focused on gaining clear profit from users. This is partly due to users becoming more aware of the threats and how to avoid them, and organisations steadily becoming more responsible. A good example is miners, which have lost their popularity due to lower profitability and cryptocurrencies fight against covert mining. This year we also witnessed growth in zero-day exploits, showing products remain vulnerable and are used by attackers for sophisticated attacks, and this trend is likely to continue in the future, says Vyacheslav Zakorzhevsky, Head of Anti-Malware Research at Kaspersky.

The number of new malicious files processed by Kasperskys in-lab detection technologies amounted to 342,102 which is 1.05% less than the previous year.

Read more about annual threat statistics onSecurelist.com.

In order to stay protected, Kaspersky recommends the following:

Pay close attention to and dont open any suspicious files or attachments received from unknown sources

Do not download and install applications from untrusted sources

Do not click on any links received from unknown sources and suspicious online advertisements

Create strong passwords and dont forget to change them regularly

Always install updates. Some of them may contain critical security issues fixes

Ignore messages asking to disable security systems for office software or antivirus software

Use a robust security solution appropriate to your system type and devices, such asKaspersky Internet SecurityorKaspersky Security

Post Views: 132

Read more here:
Malware variety grows by 13.7 percent in 2019 due to web skimmers - Eagle Online

Read More..

Former Bitcoin Skeptic Sees The Price Hitting $100,000 By 2021 Before Soaring Even HigherHeres Why – Forbes

Bitcoin and cryptocurrency has had a mixed yearfears over a regulatory crackdown have risen, though the bitcoin price has doubled over the last 12 months.

The bitcoin price, which started the year at around $3,500 per bitcoin, soared to well over $10,000 this summer before crashing back to trade around $7,000 amid fears Facebook's planned cryptocurrency project could cause central banks and regulators to take action against crypto.

Now, with bitcoin traders and investors looking hopefully towards 2020, one former crypto skeptic-turned bitcoin believer has predicted the bitcoin price could hit $100,000 per bitcoin over the next two years before climbing as high as $500,000 by 2030.

The bitcoin price has had a tumultuous few months, with bitcoin at times swinging by up to $1,000 in ... [+] just one 24-hour trading period.

"Between now and 2021, we're likely to see $100,000 bitcoin," Mark Yusko, the chief executive and chief investment officer at Morgan Creek Capital Management, told business news outlet Business Insider.

"By 2025, we're likely to see $250,000 bitcoin, and then some time out, 2030, we could see $400,000 or $500,000 bitcoin as it reaches gold equivalence."

Yusko, who admitted he was previously skeptical of bitcoin and the underlying blockchain technology that it's built on, pointed to the infancy of the technology as the reason behind his "hyperbullish" prediction.

"It really is about the growth mindset and focusing on the venture capital upside or the asymmetric upside of the asset at this point."

The growth of the bitcoin network, which has expanded rapidly since bitcoin was created a little over 10 years ago, will help combat wealth inequality, according to Yusko, who oversees some $1.5 billion worth of assets at his U.S.-based hedge fund.

"The government and the elites want to have all the wealth, so they manufacture inflation and the wealth flows to top. And that's why we have the greatest wealth inequality in the history of mankind. Bitcoin helps solve that because now we can opt-out as an owner of assets from that fiat system."

Yusko's comments come after analysts at Germany's troubled Deutsche Bank warned the "fragile" fiat currency system will be put under strain in years ahead.

The bitcoin price had a strong start to the year, rising as high as $13,000 per bitcoin before ... [+] falling back.

"The forces that have held the current fiat system together now look fragile and they could unravel in the 2020s," Deutsche Bank strategist Jim Reid wrote last week in a report looking at 24 alternative ideas for the next 10 years.

"If so, that will start to lead to a backlash against fiat money and demand for alternative currencies, such as gold or crypto could soar. The demand for alternative currencies will therefore likely be significantly higher by the time 2030 rolls around."

Read the original post:
Former Bitcoin Skeptic Sees The Price Hitting $100,000 By 2021 Before Soaring Even HigherHeres Why - Forbes

Read More..

What The Charts Say About Bitcoin – Forbes

DedMityay - stock.adobe.com

Ah, Bitcoin. The stuff of dreams. The new frontier in currency and commerce. The gateway to a world dominated by blockchain technology, with newly-minted zillionaires lining of streets of urban and rural sites across the globe. Or, the speculative arm of a legitimate evolution of financial transactions.

Now, before you get all defensive about how amazing Bitcoin is, and tell me how out of touch I am (after all, at age 55, I am way too old to understand this stuff, right?), hear me out. I do see the role of blockchain technology in the global economy going forward.

However, I think of Bitcoin, the most famous of crypto-currencies, like Band-Aids are to adhesive bandages (hint: same thing, but one is a brand name, the other is just what the product is). Bitcoin is the proverbial poster-child for this new way to hold money. That is all fine with me. My point, though: just dont pretend it is a substitute for traditional hard currencies. Not yet, anyway.

My evidence for that statement: the price of Bitcoin is not at all stable. Its price is more volatile than most stocks. You wouldnt take the money you need to pay this months mortgage or buy food for your familys dinners this week, and put it in an S&P 500 Index Fund, would you? Actually, I am afraid of the answer from too many investors. But I digress. The point is that Bitcoin still appears to be a trading tool (toy?), rather than a store of value, which is the textbook definition of a stable asset.

For that reason, I refuse to look at Bitcoin as a currency when following its price movement. However, as a vehicle to trade to make profit on over periods of time, I see it the way I see stocks and ETFs: as something to chart, and to evaluate its reward/risk trade-off at any point in time.

And, while I have not yet invested Bitcoin for my clients or myself, I am willing to consider it if it meets my usual investment criteria. One of those is that it can be charted.

^NYB_technical_chart

Remember that time when Bitcoin ran up to seemingly impossible heights, then dipped below 8,000, then crashed to under 4,000? Above, you see the price of Bitcoin over the past couple of years. It shows that last dizzying episode from 2018. And to me, it appears to be setting up for a repeat performance.

Now, technical analysis (charting) is more precise when there is deeper data and history behind the price activity. With Bitcoins limited history as a popular asset, and the fact that it is not a business like a stock, we have less to work with than we would with a stock or commodity. However, if you look at the right side of the chart, you see an orange line. That line is falling, and it is close to falling below the red line. This is occurring while Bitcoin is quietly in the midst of repeating its early 2018 price pattern.

That last round of Bitcoin price drama had a similar pattern, as you can see in May of 2018. At that point, the orange line (which is the 50-day moving average of Bitcoins price) crossed below the 200-day moving average (the red line), just as it is poised to do now. That death cross as chart geeks often call it, is happening now at about the same Bitcoin price level (8,200) as it did then.

I dont know, but I wouldnt simply blow it off as a coincidence. After all, the downside risk of ignoring the chart pattern in Bitcoin was about $5,000. Bitcoin fell from that 8,200 level to about 3,250 at its December, 2018 low, before quadrupling in value 7 months later.

And that brings me back to my main point: Bitcoin is not an investment at this stage of its development as a marketable security. Neither are small marijuana companies, and penny stocks. They are trading tools for virtual rooms of speculators. It is somewhere between a casino and the latest version of the greater fool theory, where you can profit from owning it as long as someone is willing to buy it from you. I would insert an analogy to tulip bulbs here, but suffice it to say, just look that up yourself.

Last point: one of my personal investment tenets, and what I say to clients who tell me they are investing in Bitcoin or some other trading toy, is this: its OK to take big shots, as long as you do it with small amounts of money. Just dont confuse speculation with investing.

Comments provided are informational only, not individual investment advice or recommendations. Sungarden provides Advisory Services through Dynamic Wealth Advisors

Original post:
What The Charts Say About Bitcoin - Forbes

Read More..

Bitcoin Beats Netflix And Microsoft – Forbes

Bitcoin and cryptocurrency has long been known to appeal more to younger generations than older ones (though there are some notable exceptions).

Meanwhile, the bitcoin price has been boosted in recent years by adoption from the traditional financial services industry and this is expected to increase as Millennials (aged between 25 and 39) and Gen Z (those born between 1996-2010) become financially mature.

Now, a report has found Grayscale Investments Bitcoin Trust, a publicly tradable bitcoin and cryptocurrency investment vehicle, is among the top five equity holdings for Millennials, next to technology giants Amazon, Apple, Tesla and Facebookand ahead of investor darlings Netflix and Microsoft.

Bitcoin looks set to end the year as one of the best-performing assets, up around double where it ... [+] began 2019.

The Grayscale Investments Bitcoin Trust, which recorded inflows of $255 million for the third quarter, up three-fold on the previous quarter, is also more popular than stocks of Warren Buffetts conglomerate Berkshire Hathaway, movie studio Walt Disney, and China's biggest online retailer Alibaba, according tothe report from U.S.-based bank and stock brokerage Charles Schwab.

The Grayscale Bitcoin Trust was found to be held by 1.84% of Millennials surveyed by Charles Schwab, with Netflix at 1.58% and Microsoft at 1.53%.

Elsewhere, online retailer Amazon and iPhone-maker Apple were found to be popular across the generational divide, with the two U.S. tech giants holding the top two spots for Millennials, Gen X, and Baby Boomers.

Google's parent company Alphabet was notably absent from the list of company stocks held by Millennials.

The report chimes with research out earlier this year that found there's a growing interest in bitcoin and cryptocurrency investments amongst Millennials and younger generations as they deal with the long-term effects of the global financial crisis and a lack of trust in the traditional financial services sector.

Technology companies dominate the most popular investments for all generations, though only ... [+] Millenials show much interest in bitcoin.

Earlier this year, Grayscale Investments launched a campaign called #DropGold, aiming to make "investment portfolios to reflect that bitcoin has become digital gold for todays forward-thinking investors."

"There is a generational shift in how individuals are approaching investing. We strongly believe that investments in gold will be reallocated to bitcoin as Baby Boomers begin transferring their wealth to a younger generation of investors, one that wasnt raised on the gold standard," said Barry Silbert, founder and chief executive of Digital Currency Group and its subsidiary Grayscale Investments, said at the time.

View original post here:
Bitcoin Beats Netflix And Microsoft - Forbes

Read More..