Page 695«..1020..694695696697..700710..»

Preventing the risks of cloud exploitation at the edge – TechRadar

Since the global pandemic, enterprises have had to accelerate their move to the cloud. The Infrastructure-as-a-Service (IaaS) cloud computing model empowers remote work, accelerates digital transformation, provides scalability, enhances resilience, and can reduce costs. However, if businesses want to successfully achieve this migration, they need to be aware of the security ramifications involved and ensure they have the strategies in place to safeguard their data and applications.

With the introduction of any new technology, its crucial that all the relevant security policies, tools, processes, and training are made clear to the organization. A sensitive approach needs to be taken for cloud infrastructure due to the risks posed to customer-facing critical applications. The Shared Responsibility Model is a security and compliance framework that sets out the shared infrastructure and systems that a cloud provider is responsible for maintaining. It also explains how a customer is responsible for operating systems, data, and applications utilizing the cloud. Companies migrating to the cloud must understand and follow these rules, otherwise data, applications, and cloud workloads may be exposed to security vulnerabilities.

Cloud exploitation involves targeting vulnerabilities in cloud infrastructure, applications, or services to gain unauthorized access, disrupt operations, steal data, or carry out other malicious activities. A cloud exploitation playbook could include attack vectors like distributed denial-of-service (DDoS) attacks, web application attacks, and bots with the number one attack target being web applications. According to the 2023 Verizon Data Breach Investigations Report (DBIR), the majority of cyber attacks are led by organized criminals looking to disrupt business and steal data to sell. The number one reason (95%) for cyber attacks is financial gain, with 24% of all cyber attacks involving ransomware.

Social Links Navigation

Senior Manager for Solutions Engineering EMEA at Edgio.

Threat detection and mitigation speed are important for three key reasons. First, adversaries are adept at learning from open source intelligence to develop new tactics, techniques, and procedures (TTPs) making rapid security response imperative. Second, cyber criminals are well-organized and act fast. Verizons 2023 DBIR noted, more than 32% of all Log4j scanning activity over the course of the year happened within 30 days of its release (with the biggest spike of activity occurring within 17 days). And, finally, the importance of speed is clearly illustrated by the fact that companies that contain a security breach in less than 30 days can save $1M or more.

To reduce the risk of cloud exploitation, it is crucial that businesses implement strong security measures, such as robust access controls, encryption, regular security assessments, and monitoring of cloud environments. Implementing Web Application and API Protection (WAAP) at the edge is critical to identifying and mitigating a variety of threats such as DDoS attacks, API abuse, and malicious bots. Modern-day WAAPs utilize machine learning and behavioral and signature fingerprinting for early threat detection. Further, companies using AI and automation see breaches that are 74 days shorter and save $3 million more than those without.

A WAAP rapid threat detection and mitigation solution is an invaluable tool for DevSecOps teams to implement an optimized Observe-Orient-Decide-Act (OODA) loop to improve meantime to Detect (MTTD) and meantime to Respond (MTTR) as new threats arise.

The latest innovation is a Dual WAAP capability that enables DevSecOp teams to test new rules in audit mode against production traffic to verify their effectiveness while lowering the risk of blocking legitimate site traffic. This increased confidence, plus the ability to integrate with existing CI/CD workflows, allows teams to push effective virtual patches out faster, closing the door on attackers more quickly than ever before. Additionally, with Dual WAAP, there is no WAAP downtime while updating rulesets, with new rules deployed across the global network sometimes in under 60 seconds.

There are many advantages that cloud Infrastructure-as-a-Service brings to organizations, including agility and resilience. However, cloud exploitation continues to increase and the Shared Responsibility Model emphasizes the importance of maintaining enterprise security as partners. While it is the responsibility of cloud service providers to secure the cloud infrastructure, companies cant let their guard down against the threat of attacks on operating systems, applications, endpoints, and data.

An indispensable tool for DevSecOps teams looking to enhance their "Observe-Orient-Decide-Act" (OODA) loop is a WAAP solution. It can rapidly detect and mitigate threats by reducing both the mean time to detect (MTTD) and the mean time to respond (MTTR). As organizations build up their defense in the fight against cyber threats, WAAP solutions are a strong and effective tool.

We've featured the best business VPN.

Here is the original post:
Preventing the risks of cloud exploitation at the edge - TechRadar

Read More..

Cloud-based command and control creating multi-vehicle connected … – Robot Report

Listen to this article

CGConnect, a credit-card sized plug-and-play cellular micro-modem

By Cloud Ground Control

As enterprise users scale up their drone and robotic fleet operations, many are relying on different types of uncrewed vehicles for diverse tasks. These may include vertical take-off and landing (VTOL) vehicles, quadcopters, surface vehicles, fixed-wing drones and ground rovers, all of which may be used for completing long-range missions or up-close inspections. There is also an expectation for access to real-time vehicle data.

Despite the many possibilities for robotic fleet operations, managing multi-drone, multi-vehicle missions can be complicated and thats holding many industries back. Cloud Ground Control (CGC), powered by Advanced Navigation has developed a solution to change that. CGConnect is a cellular micro-modem using 4G and 5G networks to link unlimited robotic vehicles to the CGC drone fleet management platform enabling live streaming command and control from a web browser.

Michal Weiss, Head of Product Cloud Ground Control, sums up the technology. CGConnect simplifies fleet management by turning a myriad of vehicles and drones into a connected autonomous fleet, making it easier for users to manage and control them simultaneously with access to real-time vehicle data. By doing so, were facilitating the connectivity between the end user through to the browser and the vehicles themselves, providing full situational awareness,

What distinguishes CGC is its hardware-agnostic approach. The platform eliminates the constraints imposed by manufacturer-specific software, offering an open environment for enterprises to explore new possibilities in managing diverse autonomous vehicles within their fleet.

Easy Access From Any Location

No matter the type of data users are collecting or which platforms they are deploying, all the data is stored in one central location and is easily accessible to authorized users, Weiss said. Users dont have to install anything on their device to use the platform.

Having access to data from both aerial and ground-based uncrewed vehicles can be critical for disaster relief.

For example, drones can be deployed to quickly assess the extent of damage in disaster-affected areas. They can capture high-resolution imagery or conduct aerial surveys to identify collapsed structures, road blockages, or hazardous conditions. While ground rovers can work to conduct ground-level assessments, providing detailed information on structural integrity, accessibility, or potential dangers.

Weiss demonstrated the technology during a keynote at ICRA, a robotics conference in London, United Kingdom as her team based in Perth, Australia ran a mission with multiple drones and robotic vehicles. The mission routes and camera feeds streamed in real-time on Weiss web browser in London.

Weiss illustrated how simple it was to remotely request command and control of the robotic vehicles based in Perth, as audience members drove the rovers in from London. Another connected drone joined her on stage, allowing the audience to see the near real-time latency for themselves.

That just shows how advanced this technology is, Weiss said, and how many use cases it can open up.

Michal Weiss demonstrates Cloud Ground Control to audience at ICRA conference

Revolutionary Cloud Technology

Through CGConnect, remote users have instant access to CGCs rich features, such as real-time telemetry, cloud storage, video and payload data all available simultaneously through a web browser. The device, which weighs 55 grams and is approximately the size of a credit card can easily be integrated into any drone or robotic vehicle, regardless of its brand or manufacturer. The technology further expands the vehicles functionality and applications while also shortening development time. This flexible, customizable solution simplifies fleet management and unlocks access to new markets.

CGC runs AI algorithms in the cloud, relaying real-time camera feed data to the end user to support versatile missions, such as object detection, tracking and thermal imaging. This capability enables prompt awareness and response to potential risks as the system reviews the video and triggers alerts.

The ability to easily integrate the algorithm outputs with the live video feed enhances situational awareness and mitigates risks in a timely manner. For example, Surf Life Saving Queensland uses the technology for shark detection along its beaches. Pilots are able to focus on flying and let the AI model do the inspecting. Once a shark is sighted the system will alert command centers immediately.

Of course, what the open platform offers is broader than just AI, Weiss said.

Designed as an open ecosystem, customers can tailor it to their precise requirements. By providing open APIs for both the front end and back end, we invite developers to build applications on top of our platform, enabling seamless integration and customization,

Users also can create an interface from the companys APIs or enhance whats already there. This flexibility allows customers to adapt the platform to their specific use cases.

Endless Applications

The CGC platform can be used across various industries deploying robotic fleets, including security, construction, asset inspection, agriculture, environmental and emergency response. It enables any type of use case across air, land and sea that involves a robotic or autonomous vehicle.

Since launch, the platform has experienced a significant uptake in users, with customers deploying vehicles and performing their own specific applications, Weiss said. This includes Surf Life Saving Queensland, which uses the CGC platform during beach patrols to view real-time, first-person footage through a web browser, enhancing situational awareness for better decision making during search and rescue operations.

On land, drones carrying thermal sensors can look for signs of life, or inspect areas for hazards all before a risk assessment is even complete. The applications for CGConnect are endless not only improving communication and coordination across operations, but also removing users and first responders from life threatening situations.

Think about a scenario where you have a flood and you send in a swarm of drones to identify people in distress and then immediately autonomous boats are sent to their rescue, Weiss said. Rescuers are getting notifications as to where these people are and immediately they have access to help. That is the level of support the system can provide.

Keeping data secure

Of course, its critical to ensure the data collected across these fleets remains secure.

Were aware the information were dealing with is incredibly sensitive, so were treating it with the highest priority, Weiss said This means not only is the information end-to-end encrypted, but also every feature we develop adheres to military-grade security standards

Users can set the roles and permissions to ensure only authorized team members have access to certain data, Weiss added.

A True Partner

Advanced Navigation serves as an industry partner, expanding use cases to make new applications possible.

The utilization of a cloud-based mission planner, contributes to cost reduction in the development and management of extensive autonomous fleets. By capitalizing on the platforms existing infrastructure and capabilities, businesses can streamline fleet development workflows and effectively decrease overall expenses.

Furthermore, CGC serves as an open development platform that empowers businesses to leverage open-source libraries and exercise flexibility in selecting their preferred technologies. With this platform and the new CGConnect cellular micro-modem, multiple uncrewed vehicles can work collaboratively across air, land and sea, allowing users to realize the full potential robotic technology offers.

About Cloud Ground Control

Cloud Ground Control (CGC) is a revolutionary cloud-based drone fleet management platform that expedites multi-user, multi-vehicle and multi-domain operations.

It allows pilots and mission planners to remotely command and control a swarm of uncrewed vehicles across air, land and sea through a web-browser, stream real-time video feed and telemetry, and easily access and manage captured data.

By providing full situational awareness in unfolding events, CGC plays a vital role in search and rescue, emergency response and disaster relief operations. Continuing to expand human capabilities in diverse missions, CGC is heralding a new era of drones and robotics endeavors.

For more information visit http://www.CloudGroundControl.com

Sponsored content by Cloud Ground Control

Read more from the original source:
Cloud-based command and control creating multi-vehicle connected ... - Robot Report

Read More..

Mayor Bowser Announces Distribution Dates for Dash Cam Program … – Executive Office of the Mayor

(Washington, DC) Today, Mayor Muriel Bowser, the Mayors Office of Nightlife and Culture (MONC), the Department of For Hire Vehicles (DFHV), and DoorDash announced distribution dates for the program that will provide dash cams to District rideshare and mobile delivery drivers at no cost. This program, announced earlier this year, is funded in part by a $500,000 investment from DoorDash. Dash cams will be distributed on Tuesday, November 7 and Tuesday, November 14 from 9 amthrough 5 pmat RFK Parking Lot 3, located at 2400 East Capitol Street NE, with no appointment necessary.

We encourage eligible rideshare and delivery drivers to take advantage of this free dash cam distribution program, said Mayor Bowser. Cameras help deter crime and video evidence is often critical for closing cases. These dash cams are one more tool we have for keeping people safe and holding criminals accountable.

Eligible District residents who work as rideshare and mobile delivery drivers will receive dash cams they can install in their cars to record audio and video of their trips, deter crime, and assist law enforcement in solving crimes committed on and near for-hire vehicle drivers. Dash cams will be equipped with microSD cards to store video directly, and drivers will have the ability to independently connect their cameras to cloud storage services for later use.

Were constantly working to make dashing even safer, and hope that everyone participating in this program will have even greater peace of mind when out on the road, said DoorDashs Head of U.S. Public Policy John Horton. We are incredibly grateful for our continued partnership with the Bowser administration and their leadership on this important issue. We hope that our work together will collectively help ensure a safer future for the District.

To receive a dash cam at no cost, rideshare and mobile delivery drivers will be required to provide proof of District residency, their drivers license number, vehicle information, and proof of their work with a rideshare or food delivery company. Approved drivers will receive a confirmation email containing a unique QR code, which they will present when collecting their dash camera.

Residents interested in registering to receive a dash camera can apply by visiting: tinyurl.com/DashCamDistro.

This dash cam distribution program follows the Districts partnership with Hyundai this summer to provide Hyundai owners with critical software updates and the expansion of the Metropolitan Police Departments (MPD) wheel lock distribution program. Through the Hyundai Mobile Clinic, which took place across five days in July, 1,145 vehicles were upgraded with anti-theft software.

Social Media:

Mayor Bowser Twitter:@MayorBowserMayor Bowser Instagram:@Mayor_BowserMayor Bowser Facebook:facebook.com/MayorMurielBowserMayor Bowser YouTube:https://www.bit.ly/eomvideos

Read the original:
Mayor Bowser Announces Distribution Dates for Dash Cam Program ... - Executive Office of the Mayor

Read More..

Data Compliance in the Cloud: What You Need to Know – TechiExpert.com

With the rise in cloud offerings and data-driven solutions, enterprises are accumulating massive amounts of data. The accumulation is causing regulatory and public awareness to adopt and promote secure data usage against illegal or unethical benefits. Countries and governments are mandating the implications of compliance regulations to ensure enterprises are transparent about the data collection and usage standards.

The presence of sensitive data elevates the criticality of compliance implications when data storage, transformation, and transmission are involved via the cloud. Affordable cloud storage and compute resources at the disposal of button clicks make data compliance critical, as anyone can capture the data and use it for destructive or criminal purposes. Cloud providers continually strive to design and develop solutions that adhere to data compliance and regulations. Understanding key aspects of protecting the data is essential. The developer is responsible for reviewing and implementing data compliance standards.

The availability of information and news is the cause of the digital responsibility movement. Global and regional regulatory policies have been derived and evolved, specifying the kinds of data that must be protected, acceptable procedures by the law, and the consequences for businesses that fail to adhere to the rules.

The top standards that are generally a part of cloud data security solutions encompass the global, health, and financial regulations Global Data Protection Regulation (GDPR), the Health Insurance Portability and Accountability Act (HIPAA), and the Payment Card Industry Data Security Standard (PCI DSS).

The Privacy Act, ISO 27001, and many other industry-specific compliance standards exist that firms should consider to ensure compliance standards are adhered to for sensitive data.

Considering and applying standard compliance practices in cloud environments boosts the security posture and builds overall service integrity, showcasing the companys commitment to data privacy and ethical business practices.

Cloud compliance policies open up possibilities for enhanced data management and risk mitigation. Above all, cloud data compliance is displayed as a badge of trust in the market for customer trust and loyalty.

Well-documented guidelines and cloud solution best practices exist as a data compliance framework and help organizations adhere to regulatory requirements. These solutions are general and efficient at the same time.

Encryption, masking, and anonymization abstract the underlying data from unintended exposures by making it unreadable and safeguarding the data integrity of confidential information in transit and at rest.

IAM policies, data classification, and tagging help classify and label data based on sensitivity and importance, with the advent of applying robust access control to administer the usage and access restrictions.

Logging and alerting are vital for recording data access patterns and version history while reporting unintended behaviors as they occur in real-time for instant mitigation and remediation to minimize the exposure of the attack surface.

Data residency, location rules, retention, and deletion regulations are essential. The strategies enable sound and fail-proof data compliance management. This strategy protects confidential data while fostering accountability, openness, and adherence to data compliance rules.

Data compliance and regulations are not to be mistaken for general requirements. The standards are part of the enterprise data handling and sharing strategy. Failing to apply and comply with global and regional data compliance standards can put enterprises at risk of reputation and monetary loss.

Inadequate addressing of compliance requirements can lead to data breaches, data exposure, and breaches. Additionally, regulatory and legal consequences are imposed if enterprises are seen practicing unethical or illegal activities with personal and sensitive data while avoiding data compliance standards.

The standards and usage of the data in the cloud ecosystem have raised numerous red flags recently concerning the safety and security of data. Countries and users place their trust in enterprises and believe they will use their data (personal) for ethical purposes, and betterment of overall service, and nothing more.

Global policies and regulatory acts exist to guide and instruct enterprises to apply cloud data compliance solutions. These solutions range from general to most sophisticated ones, and third-party tools exist to provide consolidated features as a single offering. Organizations at any cost must prioritize data compliance to protect sensitive information.

See original here:
Data Compliance in the Cloud: What You Need to Know - TechiExpert.com

Read More..

Experts believe there is a need for unified data storage – The Financial Express

NetApp (NASDAQ: NTAP), a global, cloud-led, data-centric software company, released the 2023 Data Complexity Report, a global report that explores companies growing needs for unified data storage. The report found that 98% of organisations are in the middle of their cloud journey, with three out of four reporting workloads stored on-premises, highlighting the need for a unified approach to hybrid multi-cloud architectures and continued innovation in both on-premises all-flash storage and public cloud storage to enable AI adoption at scale.

Security threats, sustainability goals, and adoption of deep technologies like AI make IT more complex than ever. Holistic solutions that address these challenges and enable new technologies to thrive across hybrid IT environments, is the need of the hour, Puneet Gupta, managing director,vice president, NetApp India and SAARC, explained.

According to the report, migration to the cloud hasnt been a linear journey for many businesses. Of all tech executives with plans to migrate workloads to the cloud, three out of four still have most of their workloads stored on-premises.

However, AI adoption is the biggest driver for cloud migration, and the cloud is a major enabler for AI adoption. Seventy-four percent of respondents said theyre using public cloud services for AI and analytics. Tech executives globally (39%) say their top need for Flash innovation is to optimise AI performance, cost and efficiency, as per insights from the report.

Follow us onTwitter,Facebook,LinkedIn

Read the original post:
Experts believe there is a need for unified data storage - The Financial Express

Read More..

Oxide on-prem cloud computer reinvents the server rack Blocks … – Blocks and Files

Startup Oxide has delivered a rack-level system providing cloud-style computing on premises as its first commercial product.

Oxide was founded in September 2019 by datacenter heavyweights CTO Bryan Cantrill, CPO Jessie Frazzelle, and CEO Steve Tuck. It has had three funding rounds to date: A $20 million seed round in 2019; a $30 millionA-round in September 2022; and a $44 million continuation A-round this month that coincides with its first product launch. All the rounds were led by Eclipse Ventures.

Cantrill was CTO at Joyent and distinguished engineer at Sun Microsystems/ Oracle before that. Frazelle, who left in July 2022 to co-found KittyCAD, was a software engineer at Docker, Mesosphere, Google, Microsoft, and GitHub. Tuck was president and COO at software and services company Joyent, also SVP worldwide sales, and held sales roles at Dell before that.

Oxides purpose is to build what it calls a commercial cloud computer, a cloud-scale and cloud-style rack-level, on-premises computing system.

The Oxide cloud computer combines compute, storage, and networking elements as sleds in a plug-and-play rack. It includes the open source software needed to build, run, and operate a cloud-like infrastructure.

This software includes a Propolis hypervisor, a Nexus control plane, Crucible distributed block storage system, IAM (Identity and access management), and OPTE (Oxide Packet Transformation Engine) self-service network fabric. The software is anchored to a hardware root of trust.

The distributed block storage is based on OpenZFS and has configurable capacity and IOPS per volume. Volume size can be scaled upon demand. It has redundancy for high availability. It can integrate with external storage across a network link. Crucible provides instantaneous, point-in-time virtual snapshots for recovery and off-rail backup.

Oxide says OpenZFS checksums and scrubs all data for early failure detection. Virtual disks constantly validate the integrity of user data, correcting failures as they are discovered. There is automated rebalancing of data to preserve redundancy in the event of drive or sled removal.

Pools of resources are available either through APIs, a CLI, or a web-based UI.

Each sled contains an AMD processor, DRAM, and NVMe SSD storage. Each sled is slid into place and needs no wiring, were told. There can be 16, 24, or 32 sleds in a delivered rack. A compute sledhas an AMD Milan EPYC 64-core CPU, 16 x DDR4 DIMM slots providing 512GiB or 1TiB of memory, and up to 10 x U.2 NVMe 3.2TB (2.91 TiB) SSDs. That provides a maximum of 32 x 32 TB 1,024 TB of raw storage capacity. There is 100 GbE link to the racks network switch.

There are two network switches. Each has an Intel Tofino 2 processor with 6.4 Tbps throughput and 232 x 40/100/200 GBASE QSFP-28 uplink ports and 32 x 100 GBASE-KR4 backplane ports.

The rack switch has parts for three networks: An up to 12 Tbps programmable Ethernet ASIC, a secondary GigE switch ASIC, and an FPGA driving a proprietary low-level protocol for board control of other systems in the rack. It is connected via a PCIe link to a compute node for management.

The rear of the rack has a DC busbar and a cabled backplane with blindmated networking. This means self-aligning connectors slide or snap into position as a sled is installed in the rack. There are no power or network cables to plug or unplug.

A blog by Cantrill says:

In his view, the rental-only model for the cloud is not sustainable. A cloud computer has to be rack-scale and one must break out of the shackles of the 1U or 2U server, and really think about the rack as the unit of design.

That helps explain the blindmating. This is a domain in which we have leapfrogged the hyperscalers, who (for their own legacy reasons) dont do it this way, he says.

Oxide claims its rack is up to 35 percent more energy efficient than traditional server racks.

The Oxide rack ships with everything installed and can be set up in around four hours. Customers can use Kubernetes or cloud software tools like Terraform to deploy and configure workloads.

Customers are said to include a US federal agency, the Idaho National Laboratory, and a financial services business. Several Fortune 1,000 companies are said to be interested.

In effect Oxide wants to replace Dell, HPE, and Supermicro on-premises racks with its own hyperconverged infrastructure rack with built-in public cloud facilities. The Oxide rack uses less power and is far easier to own, operate, and run from a hardware and a software sense than traditional server and HCI racks, Oxide says.

Download a specification sheet here.

Originally posted here:
Oxide on-prem cloud computer reinvents the server rack Blocks ... - Blocks and Files

Read More..

TP-Link’s teeny-tiny security camera offers a lot for very little – The Verge

Tapo, one of TP-Links two smart home brands, is continuing to expand its footprint in the home security camera space with the announcement of the $39.99 Tapo C120. This pint-size smart home camera fits in the palm of your hand and can be used indoors or out, thanks to IP66 weatherproofing rating. Its due to be released on November 13th.

Small smart security cameras arent new Wyze and Blink both have offerings of a similar size for under $100 but TP-Links new camera crams a lot of features into a small package for under $40. A wired camera, it has 2K video, local storage with an onboard microSD card, free AI-powered person detection, and an easy-to-use magnetic mount.

The Tapo C120 costs $39.99 and includes 2K video, local storage, and free smart alerts for people, pets, and vehicles. Image: TP-Link

Blinks outdoor cameras cost start at $99 for 1080p video, local storage requires additional hardware, and you have to pay for person detection; they are battery-powered. Wyze has battery and wired outdoor options with onboard storage (up to 512 GB), but anything with 2K is over $55, and unless you pay for a subscription, Wyzes recording options are limited.

All of this makes the new Tapo camera an intriguing option for anyone looking for a versatile budget security camera that doesnt rely on the cloud (although there is an option for cloud storage.)

Other features of the C120 include adjustable dual spotlights that can be triggered for different events and a starlight sensor for color night vision. Full duplex two-way audio lets you talk to and hear anything going on in your home, and an alarm system allows you to record your own audio.

The Tapo C120 can be used indoors as a pet cam, or baby monitor as well as outdoors. A magnetic mount and adjustable stand make it easy to install. Image: TP-Link

An invisible IR night vision mode and baby crying and pet alerts make the C120 a good option for use indoors as a pet cam or baby monitor. Free AI-powered smart alerts for people and vehicles also translate to a useful outdoor camera for monitoring a front door or driveway.

As with Tapos other recent launch, the Tapo Wire-Free MagCam, this camera has an adjustable magnetic mount. This is something I find really handy for security cameras, as it makes mounting them and moving them if you want to monitor somewhere else much easier. A 9.8-foot power cord is also a useful addition, although the plug isnt weatherproof.

The camera works with the Tapo smart home app and is compatible with Alexa and Google Home to live-stream footage to smart display. The Tapo C120 will be available starting November 13 at Amazon for $39.99.

Update: Friday, November 3rd, 5:30PM: TP-Link reached out after publication to say the launch has been delayed, and the camera wont be available to buy until November 13th. weve updated the article to reflect this.

More here:
TP-Link's teeny-tiny security camera offers a lot for very little - The Verge

Read More..

Latest Update: Cloud Workload Protection Platform Market Size … – GlobeNewswire

Pune, India, Nov. 01, 2023 (GLOBE NEWSWIRE) -- The global cloud workload protection platform market size was valued at USD 2.77 billion in 2022 and is expected to reach USD 12.10 billion by 2030 with a CAGR of 20.5% during the forecast period. Fortune Business Insights, in its report titled, Cloud Workload Protection Platform Market Forecast, 2023-2030.

Request a Sample PDF:

https://www.fortunebusinessinsights.com/enquiry/request-sample-pdf/cloud-workload-protection-market-106491

Key Industry Development:

Key Takeaways

Discover the Leading Players Featured in the Report:

Companies leading the Cloud Workload Protection Platform Market are Trend Micro Incorporated. (Japan), Palo Alto Networks (U.S.), VMware, Inc. (U.S.), SentinelOne (U.S.), Microsoft (U.S.), Musarubra US LLC (Trellix) (U.S.), Lacework (U.S.), Orca Security (U.S.), Sysdig (U.S.), Check Point Software Technologies Ltd. (Israel), Cisco Systems, Inc. (U.S.)

Report Scope & Segmentation

Browse Complete Report Details:

https://www.fortunebusinessinsights.com/cloud-workload-protection-market-106491

Drivers and Restraints

Integration and Need for Cloud Compliance to Drive Market Trajectory

Integration and the need for cloud compliance are anticipated to drive the global cloud workload protection platform market growth. Cloud storage offers various benefits such as agility, speed, and flexibility and provides security measures to protect data. Key market players have been integrating these solutions to develop strong cloud security compliance solutions.

However, the integration of CWPP faces challenges due to an increased number of misconfigurations resulting from user errors, which is expected to hinder market development in cloud workload protection platforms.

SEGMENTATION

By Component

By Deployment

By Enterprise Type

By End-User

By Region

Regional Insights

With the Presence of Various Cloud Service Providers, North America is Expected to Lead the Market Share

North America is projected to lead the cloud workload protection platform market share, with the market valued at USD 1.25 billion in 2022. The U.S. is one of the prominent countries in the region due to the presence of various cloud service providers. Canada is also expected to show appreciable growth due to the adoption of the cloud in workloads and business models.

Europe is expected to hold a prominent market share in the cloud workload protection platform industry during the study period due to the adoption of the cloud and the integration of cloud security practices for complex cloud environments.

Quick Buy - Cloud Workload Protection Platform Market Research Report

https://www.fortunebusinessinsights.com/checkout-page/106491

Competitive Landscape

Leading Players in the Market Expanding Offerings to Attract Diverse Customer Base

The global cloud workload protection platform market includes key players such as Trend Micro Incorporated, Palo Alto Networks, VMware, Inc., Microsoft, Musarubra US LLC, Lacework, Orca Security, and others. The key players are focused on expanding their presence by launching specific solutions and new products to attract a vast customer base.

FAQs

Cloud Workload Protection Platform Market?

Cloud Workload Protection Platform Market size was USD 2.77 billion in 2022.

How fast is the Cloud Workload Protection Platform Market growing?

The Cloud Workload Protection Platform Market will exhibit a CAGR of 20.5% during the forecast period, 2023-2030.

Related Reports:

Data-Centric Security Market Size, Share, Trends 2030

Digital Transformation Market Size, Share, Trends and Growth

Cloud Security Market Size, Share, Growth, Analysis

About Us:

Fortune Business Insights offers expert corporate analysis and accurate data, helping organizations of all sizes make timely decisions. We tailor innovative solutions for our clients, assisting them to address challenges distinct to their businesses. Our goal is to empower our clients with holistic market intelligence, giving a granular overview of the market they are operating in.

Contact Us:

Fortune Business Insights Pvt. Ltd.

US: +1 424 253 0390

UK: +44 2071 939123

APAC: +91 744 740 1245

Email: sales@fortunebusinessinsights.com

The rest is here:
Latest Update: Cloud Workload Protection Platform Market Size ... - GlobeNewswire

Read More..

Cloud migration 101: how to plan, execute and optimise your cloud … – iTWire

Cloud computing is the new normal for many enterprises. Yet, there are companies still to embrace the cloud, and there are companies who have lifted and shifted but aren't seeing the benefits of power or cost they expected. Here's my take on cloud migration.

Cloud computing is no longer a buzzword, but a reality for many businesses.According to a recent survey by Flexera, 99% of enterprises use at least one public or private cloud service, and 92% have a multicloud strategy. The benefits of cloud computing are clear: scalability, agility, cost-efficiency, innovation, and more.

But how do you migrate to the cloud and optimise your cloud strategy? What are the best practices and pitfalls to avoid? How do you choose the right cloud model, provider, platform, and tool for your needs? How do you manage your cloud costs, performance, security, and compliance?

Here are practical tips and tricks to help you plan, execute, and optimise your cloud migration and strategy.

Before you start moving your workloads to the cloud, you need to have a clear vision and plan for your cloud migration. Here are some steps to follow:

Once you have your plan ready, you can start executing your cloud migration. Here are some steps to follow:

Migrating to the cloud is not a one-time event, but an ongoing journey. You need to continuously monitor, manage, and improve your cloud strategy to ensure that you are getting the most out of your cloud investment. Here are some steps to follow:

Cloud computing is a powerful and transformative technology that can help you achieve your business goals and objectives. However, migrating to the cloud and optimising your cloud strategy can be challenging and complex. You need to have a clear plan, execute it carefully, and optimise it continuously. By following the steps and tips outlined here, you can make your cloud migration and strategy a success.

Image credit: "Day 287: Cloud Computing" by quinn.anya is licensed under CC BY-SA 2.0 .

Did you realise that Gartner also recommends that security teams prioritise NDR solutions to enhance their detection and response?

Picking the right NDR for your team and process can sometimes be the biggest challenge.

If you want to try out a Network Detection and Response tool, why not start with the best?

Vectra Network Detection and Response is the industry's most advanced AI-driven attack defence for identifying and stopping malicious tactics in your network without noise or the need for decryption.

Download the 2022 Gartner Market Guide for Network Detection and Response (NDR) for recommendations on how Network Detection and Response solutions can expand deeper into existing on-premises networks, and new cloud environments.

DOWNLOAD NOW!

Marketing budgets are now focused on Webinars combined with Lead Generation.

If you wish to promote a Webinar we recommend at least a 3 to 4 week campaign prior to your event.

The iTWire campaign will include extensive adverts on our News Site itwire.com and prominent Newsletter promotion https://itwire.com/itwire-update.html and Promotional News & Editorial. Plus a video interview of the key speaker on iTWire TV https://www.youtube.com/c/iTWireTV/videos which will be used in Promotional Posts on the iTWire Home Page.

Now we are coming out of Lockdown iTWire will be focussed to assisting with your webinars and campaigns and assistance via part payments and extended terms, a Webinar Business Booster Pack and other supportive programs. We can also create your adverts and written content plus coordinate your video interview.

We look forward to discussing your campaign goals with you. Please click the button below.

MORE INFO HERE!

Go here to read the rest:
Cloud migration 101: how to plan, execute and optimise your cloud ... - iTWire

Read More..

Scams are hard to picture that’s part of the problem – The Spinoff

A new photo series created by the governments cybersecurity agency wants to make people more wary of scamming. It got Shanti Mathias thinking about how limited we are in illustrating and imagining the systems that produce scams.

When the crime happens, theres no broken glass, no loud noises, no neighbourhoods cordoned off. Theres just flatness: a voice on the telephone, black letters on a screen, tapping keys, replying, trusting until it is suddenly clear that what you thought you were doing wasnt happening at all.

Its hard to write about scams, even though they happen all the time; even though thousands of people are targeted each month. New Zealand loses about $20m a year to scams, and thats just what gets reported. Its difficult to imagine the magnitude of the small losses, or the money that is able to be recovered, or the thousands of missed calls and dubious Facebook messages and other near misses that dissolve, back into the ether of ones and zeroes.

Difficult to imagine: yes. Difficult to image, too, and thats part of the problem. Ive written several stories about scams this year, and finding imagery that fits the tone of the stories is challenging. There are endless stock images of people, often older people, looking angry or confused at their laptop, surrounded by credit cards. Then there are the scammers themselves: lit up by rows of binary blue digits, always wearing hoodies, faces shadowed.

These images dont convey the banal malevolence of scams. Theyre not a threat because we are confused about technology, while scammers are experts in manipulating the internet. Scams are a threat because we have to engage with technology. Our society requires us to trust banks and authenticating text messages, trust RealMe, trust the websites we give our address and phone number and credit card details to when we shop. Pictures of people perplexed by the internet fail to illuminate the everywhere-ness of technology, part of all we do.

Cert NZ, the governments cyber security agency, clearly struggles with finding imagery that can help people care about scams, too. A few days ago, I trotted along to an event they were hosting at central Auckland creative venue The Tuesday Club. Scams like an art exhibit: big photos on the wall and little labels. A library of scams: romance and impersonation scams, social media traps and investment scams, job scams and unauthorised access scams. The photos were taken of real scam victims, through webcams on phones and computers. The images were then treated to look pixelated and blurred, uncomfortable. Its called EXPOSED.

The photos are a reminder of all the ways our devices see us: present as we do press ups in time with the woman on YouTube, call our friends, pick our nose, wonder when the work day will be over. And scams come from that place of inattention and ubiquity. My phone is my key to my bank account, my family group chat, my archive of good days with good friends and yet simultaneously, it is the same place where I am in danger from 15 texts telling me I need to pay for a toll road, from message requests accompanied by ersatz pictures of beautiful women.

Everyone is a target, every demographic if you have an email address, a cellphone, social media. One moment of distraction is enough, says Sam Leggett, Cert NZs senior threat analyst. The imagery is highlighting this idea that [being scammed] can happen at any time its a powerful way to understand how exposed your information might be.

Cert NZ has lots of advice for avoiding scams, but this threat happens in the privacy of our own devices what stock images would make it more visible? One that comes to mind is tables of lists of passwords, the backend of a phishing campaign people dont realise that websites all around the world have data breaches including information like email and passwords, Leggett says. Ah, theres the rub often, theres nothing you can do about being targeted by scams, because the information is gone already.

Another image idea, this one conceptual: Someone is knocking at your house, and theyre wearing a mask, so they look exactly like someone you know. The person in the mask asks for the keys to your house maybe theyre your landlord, you let them in to fix something. And then a hacker is inside, now they have your logins, they can access your stuff.

Thats figuratively exactly what happened to William Chen. He used to be an art director, managing photo shoots for magazines so he knows that while the image of himself used in Cert NZs exhibition, distracted and eating breakfast, isnt exactly flattering, thats not the point. Ive put others through it, so its my turn, he says. If a photo of him makes it less likely that other people will fall for a scam, hes willing to be public with it.

A few years ago, Chen was visiting family in Malaysia when he got a message from a Filipino friend, saying that he had been mugged in Manila and lost his passport and needed money urgently. It was an impersonation scam. All the tell-tale signs were there, Chen says ruefully. The scammer wouldnt answer detailed questions, for example, and wanted money paid through Western Union. Over a period of only a few hours, Chen received message after message with harrowing descriptions of his friends misery, and the urgency of help; he eventually went to the local Western Union to send money as instructed, then told his sister about the situation. She immediately told him hed been scammed.

I wasnt sharp enough, he says now. He feels guilty about it and still paranoid that messages he receives on social media might not be legitimate. Its good that [Cert NZ] is raising awareness, but I dont think the government can do much about scams it all boils down to personal responsibility.

Maybe Chen is right, but its not that big institutions are doing nothing about scams. Take the man in the news recently for losing $400,000 to an investment scam. He was repeatedly called by his bank, to warn him that it was a scam. The outgoing government announced a new anti-scam team a few weeks before the election; since the issue isnt highly politicised (or on the ambitious 100 day hit list), the new government hopefully will continue to support this initiative. Banks, especially, will keep putting safety measures in place; an obvious one is payee verification on transfers, so its clear when youre not paying who you think you are.

Pictures of scamming can show victims as human beings: distracted and vulnerable, their information ripe for the picking. The Cert NZ photo series goes some way towards making these images more compassionate, more diverse, less victim-blaming. Theres a deeply complex, psychological element to being scammed the urge to believe that something is true, that someone is trustworthy but in the imagery of scams and the focus on victims, we fail to imagine who is on the other side of the phone.

Taking photos of victims is obvious, if important. Its so much harder to picture the people carrying out the scams, and the systems that enable them. For instance, how do you photograph the thousands of forms with your address or birthday or phone number that you fill out every time you make a useful account on the internet? How do you visualise the profits of a company that didnt hire an extra data engineer and thereby releases your information and thousands of others to potential hackers and scammers via a data breach?

Theres a subgenre of YouTube videos devoted to unmasking scammers through elaborate pranks. This is a reminder that scamming is an enormous global industry, employing thousands of workers in places where the law doesnt want to look very hard for crimes that happen on the internet.

In some parts of the world, there are many more underemployed educated young people than there are well-paying jobs, which can make carrying out scams a viable, if not appealing, option. Thats a product of global inequality, but its difficult to draw a picture of. There arent compelling photos of the dreary office parks in the corners of global cities Abuja, Kolkata, Bandung, Hyderabad, So Paulo, Budapest, Karachi and the workers inside them, carrying out the dull labour of digital deceit.

I dont say this to suggest that the work of scamming is good work, that it is somehow part of global wealth redistribution. Theres no transparency to these payments; the money is unlikely to go to those who need it most, and the losses hurt people with the least financial stability. But trying to imagine what scamming people might look like from every angle is essential if we dont want these to keep happening. While artificial intelligence improves, theres every likelihood that the scams will just get more convincing.

Maybe some form of scamming will always exist, but much of the damage is preventable. The solutions involve individual wariness, as the CERT photos show. But responding to scamming also requires the government to treat it with the urgency it requires, social media companies to cooperate and private institutions to improve their processes. Maybe if all of that happens, scamming will be less profitable, and it wont be a job for people in countries whose governments are incentivised to look the other way. Maybe. Its hard to picture.

See more here:
Scams are hard to picture that's part of the problem - The Spinoff

Read More..