Page 712«..1020..711712713714..720730..»

A Legendary Billionaire Just Flipped On Bitcoin Amid $300 Billion Ethereum, XRP And Crypto Price Boom – Forbes

BitcoinBTC has been on a winning streak lately, rocketing almost 25% over the last month as traders bet on a looming $48.3 trillion price earthquake.

Subscribe now to Forbes' CryptoAsset & Blockchain Advisor and successfully navigate the bitcoin and crypto market rollercoaster ahead of next year's historical bitcoin halving!

The bitcoin price boom, pushing bitcoin to its highest level since the summer of 2022 and helping ethereum, XRPXRP and the wider crypto market add around $300 billion of value since mid-September, comes amid growing fears of "global wartime inflation."

Now, legendary billionaire investor Stanley Druckenmiller has admitted he should have bought bitcoin, calling it a strong "brand" similar to gold.

Bitcoin's historical halving that's expected to cause crypto price chaos is just around the corner! Sign up now for the free CryptoCodexA daily newsletter for traders, investors and the crypto-curious that will keep you ahead of the market

"I don't own any bitcoin to be frank but I should," Druckenmiller, a former hedge fund manager who founded family office Duquesne Capital, told fellow hedge fund manager Paul Tudor Jones last week at a New York investor conference.

"I'm 70 years old, I own gold," Druckenmiller said. "I was surprised bitcoin got going but ... it's clear the young people look at it as a store of value because it's a lot easier to do stuff with and 17 years, to me, it's a brand. [But] I like gold because it's 5,000 year-old brand," Druckenmiller said, referring to bitcoin only being created in 2008.

Bitcoin and gold have emerged as twin bolt-holes for investors this year, with the bitcoin price doubling since January.

Earlier this month, Jefferies' analysts warned the Fed will be forced to restart its money printerpotentially collapsing the U.S. dollar and fueling a bitcoin price boom to rival gold.

Sign up now for CryptoCodexA free, daily newsletter for the crypto-curious

Jones, who set the world of crypto alight in May 2020 when he named bitcoin the "fastest horse" to beat inflation he saw coming down the track, told CNBC in an interview earlier this month that the Israel-Hamas conflict in the Middle East and "probably [the U.S.'s] weakest fiscal position since World War II," means he's doubling down on bitcoin and gold.

Druckenmiller, who has previously said he owns bitcoin but is now thought to have sold, also criticized Treasury secretary Janet Yellen for failing to refinance U.S. debt when rates were at rock bottom lows during the Covid pandemic.

I am a journalist with significant experience covering technology, finance, economics, and business around the world. As the founding editor of Verdict.co.uk I reported on how technology is changing business, political trends, and the latest culture and lifestyle. I have covered the rise of bitcoin and cryptocurrency since 2012 and have charted its emergence as a niche technology into the greatest threat to the established financial system the world has ever seen and the most important new technology since the internet itself. I have worked and written for CityAM, the Financial Times, and the New Statesman, amongst others. Follow me on Twitter @billybambrough or email me on billyATbillybambrough.com.Disclosure: I occasionally hold some small amount of bitcoin and other cryptocurrencies.

Read more from the original source:

A Legendary Billionaire Just Flipped On Bitcoin Amid $300 Billion Ethereum, XRP And Crypto Price Boom - Forbes

Read More..

Southern District of Texas | Mexican national sentenced for … – Department of Justice

BROWNSVILLE, Texas A 34-year-old resident of Ciudad Victoria, Tamaulipas, Mexico, has been sentenced for possessing child pornography found on his cell phone as he tried to enter the country, announced U.S. Attorney Alamdar S. Hamdani.

Juan Jesus Banda-Olivo pleaded guilty Jan. 25.

U.S. District Judge Rolando Olvera has now ordered Banda-Olivo

to serve 97 months in federal prison. Garza was further ordered to pay $3,000 in restitution to a known victim and will serve eight years on supervised release following completion of his prison term. During that time, he will have to comply with numerous requirements designed to restrict his access to children and the internet. He will also be ordered to register as a sex offender.

On Aug. 15, 2022, Banda-Olivo attempted to make entry into the United States through the Veterans Port of Entry. Authorities believed he was in the country illegally and sent him to secondary inspection.

There, law enforcement conducted a consensual search of Banda-Olivos cell phone and discovered multiple photographs and videos of child pornography. The investigation revealed Banda-Olivo possessed 1,223 unique images and videos of child pornography on his cell phone and his cloud storage account. Some of the images included images of the sexual abuse of toddlers and prepubescent minors. The images found on the seized cell phone were submitted to the National Center for Missing and Exploited Children for victim identification.

Banda-Olivo has been and will remain in custody pending transfer to a U.S. Bureau of Prisons facility to be determined in the near future.

Homeland Security Investigations conducted the investigation.

Assistant U.S. Attorney Ana C. Cano prosecuted the case, which was brought as part of Project Safe Childhood (PSC), a nationwide initiative the Department of Justice (DOJ) launched in May 2006 to combat the growing epidemic of child sexual exploitation and abuse. U.S. Attorneys' Offices and the Criminal Division's Child Exploitation and Obscenity Section leads PSC, which marshals federal, state and local resources to locate, apprehend and prosecute individuals who sexually exploit children and identifies and rescues victims. For more information about PSC, please visit DOJs PSC page. For more information about internet safety education, please visit the resources link on that page.

See the original post here:
Southern District of Texas | Mexican national sentenced for ... - Department of Justice

Read More..

OKX Wallets DEX Aggregator Integrates with Scroll Layer-2 Ethereum Network – CoinTrust

OKX Wallets DEX aggregator has recently completed its integration with Scroll, a Layer-2 Ethereum network dedicated to offering scalable solutions for projects operating on the Ethereum virtual machine. Scroll leverages zero-knowledge technology to expedite development, lower operational costs, and, importantly, maintain a robust focus on security and reliability.

Scroll has been meticulously crafted by and for Ethereum developers, with a primary focus on delivering a swift, dependable, and scalable Layer-2 blockchain solution. This innovative network extends the capabilities of Ethereum, enabling applications to scale without encountering unforeseen challenges. Thanks to its bytecode-level compatibility, existing Ethereum applications can seamlessly migrate to Scroll without requiring significant modifications, all while incurring substantially reduced costs.

The integration of Scroll into OKX Wallets DEX Aggregator marks a significant milestone for Scroll users. It translates to improved access to optimal trading prices, cost-effective transaction fees, swift transaction processing, and a bolstered liquidity pool. Notably, the current DEXes operating on the Scroll chain and integrated with OKX Wallets DEX Aggregator include prominent names such as Kyber Network, Dodo, Izumi Finance, SyncSwap, SpaceFi, and more.

On October 19, 2023, OKX made a noteworthy announcement regarding its wallets compatibility with the Scroll mainnet. This integration means that users of OKX Wallet can seamlessly manage and transfer their cryptocurrency assets using the Scroll network, both through the OKX mobile application and the web browser extension.

OKX Wallets DEX Aggregator stands out as a multi-chain, cross-chain decentralized exchange aggregator, boasting connections with over 300 other DEXes and approximately 15 bridges. The platform supports a vast array of cryptocurrencies, exceeding 200,000 coins, and operates on more than 20 different blockchains. This comprehensive approach ensures that users have access to a wide range of assets and trading options, making it a powerful tool for cryptocurrency enthusiasts.

The integration of Scroll, a Layer-2 Ethereum network, with OKX Wallets DEX Aggregator signifies a substantial step forward in enhancing the capabilities and accessibility of decentralized exchange services. Scrolls commitment to scalability and cost-efficiency, coupled with OKX Wallets extensive network of DEX partners and supported blockchains, promises a robust and user-friendly experience for cryptocurrency traders and enthusiasts. As the blockchain industry continues to evolve, collaborations such as this one underscore the ongoing efforts to offer innovative solutions to the growing demands of the crypto community.

More here:

OKX Wallets DEX Aggregator Integrates with Scroll Layer-2 Ethereum Network - CoinTrust

Read More..

How to choose the best cloud security posture management tools – CSO Online

After companies move to the cloud, many are under the impression that their cloud hosting providers are solely responsible for security, a misconception that can lead to data breaches and other security issues.

While the responsibility for securing cloud infrastructure falls to cloud services providers, it's up to customers to configure the cloud and secure their applications and sensitive corporate data.

Thats where cloud security posture management (CSPM) tools can help. These tools continuously and automatically check for misconfigurations that can result in data leaks and data breaches. CSPM tools manage cloud security risks on an ongoing basis and ensure compliance in the cloud so enterprises can continuously make any necessary changes.

"CSPM solutions use best practices and compliance (PCI, SOC2, etc.) templates to identify drifts and insecure configurations in cloud infrastructure (AWS, Azure, Google Cloud Platform) in the compute, storage, and network areas," says Andras Cser, vice president and principal analyst at Forrester Research. "CSPM tools can alert and optionally remediate the insecure configurations.

CSPM tools look at workloads to see whats happening and they provide context, so organizations know which of the vulnerabilities or issues is most important, says Charlie Winckless, senior director analyst at Gartner. These tools enable companies to prioritize which risks are real, which risks are important, and which risks they may be able to delay fixing a little bit, he says.

Organizations evaluating various CSPM tools should ensure that they cover all the cloud platforms theyre using, says Winckless.

"You want to be able to normalize the configuration risks across the major cloud platforms," he says. "Most organizations that are purchasing these tools will probably be multicloud. Theyll be using at least two clouds, maybe more, since the cloud providers themselves do offer some of this functionality built into their platforms."

Philip Bues, cloud security research manager at IDC, says the new reality for most organizations is a hybrid multicloud environment, "so you want something thats going to be able to give you really deep visibility throughout all the environments and workloads that you have. And that's what the CSPM solution should be able to provide you."

Other features organizations should look for in CSPM tools include:

Comprehensive threat detection: Because threats in multicloud environments are complex, these tools must gather threat intelligence from a number of sources to give companies clear views of their risks.

Integrated data security: Keeping data safe in the cloud requires a multipronged defense that gives companies deep visibility into the state of their data. This includes enabling organizations to monitor how each storage bucket is configured across all their storage services to ensure their data isnt inadvertently exposed to unauthorized applications or users.

Automated alert remediation: Organizations must ensure that the CSPM tools they select can automate routine security monitoring, audits, and remediations across their cloud environments. This allows security teams to prioritize and remediate the risks that can potentially cause the most damage.

CSPM tools offer a number of benefits that help companies boost security, minimize their risk exposure in cloud environments, and reduce costs. These benefits include:

There are some pitfalls that companies need to be aware of when it comes to CSPM tools, including:

Not understanding the requirements of CSPM tools: This is one of the biggest mistakes that organizations can make when theyre shifting workloads to the cloud because things that werent connected before are now interconnected, says Bues. The best way to implement CSPM tools is to ensure teams receive the proper training and proper awareness for how this solution is supposed to work within the environment. "You dont want to have the security team with little or no cloud experience or developers with limited security experience trying to manage this new CSPM solution," he says. "You should have the developers and the security team working together because everyone has different needs."

Not opting for a multicloud CSPM tool: Another mistake companies make is selecting tools that offer a one-size-fits-all approach offered by public cloud vendors that dont offer a unified view across all their cloud environments. Organizations should opt for CSPM tools that provide multicloud monitoring and protection.

Thinking theyre too small/not mature enough: A company that assumes its too small or not mature enough to consider security will always put the business at risk as it typically only thinks about security after an issue or breach occurs. However, companies of all sizes should ensure they protect their assets across teams by implementing CSPM tools.

There are numerous CSPM tools on the market, so to help you begin your research, we've highlighted the following products based on discussions with analysts and independent research.

Aqua Security Real-Time CSPM: Connects organizations cloud accounts so they can identify all their cloud resources running in Amazon Web Services (AWS), Alibaba Cloud, Google Cloud Platform (GCP), Microsoft Intune, and Oracle Cloud. Provides a comprehensive view of organizations' real-time cloud security risks, identifying the most critical problems so they can focus on fixing high-priority issues. Uses agentless workload scanning to scan workloads and assess companies basic risk postures. Detects cloud risks and catches threats that evade agentless detection, including fileless malware, memory-based attacks, and unknown exploit attempts, such as zero days. Provides context-based insights and recommends remediation actions. Prioritizes the most important security issues. Connects issues detected in the cloud back to development.

Check Point CloudGuard for Cloud Security Posture Management: Automates security, compliance, and governance across multicloud environments and services. Detects misconfigurations, visualizes and assesses companies security postures, and enforces compliance frameworks and security best practices. Companies can manage the security and compliance of their public cloud environments across Azure, AWS, GCP, Alibaba Cloud, and Kubernetes. CloudGuards network and asset visualization enables companies to detect any compromised workloads, vulnerabilities, misconfigurations, or open ports in real-time. Offers threat intelligence support as a free add-on to CSPM customers. This feature offers insights into account activity through threat research and machine learning.

CrowdStrike Falcon Cloud Security: Provides threat detection, prevention, and remediation and enforces compliance and security posture and compliance across AWS, Azure, and GCP. Provides CSPM features for hybrid and multicloud environments. Enables companies to continuously monitor the compliance posture of all their cloud resources from a single console and dashboard for numerous regulations, including the Payment Card Industry Data Security Standard (PCI-DSS), National Institute of Standards and Technology (NIST), SOC2, and more. Lets companies compare cloud application configurations to organizational and industry benchmarks so they can detect violations and remediate them in real time to ensure their applications are always available.

Palo Alto Networks Prisma Cloud: Safeguards resources across multicloud and hybrid environments. Its features work on AWS, Azure, Alibaba Cloud, Oracle Cloud, and GCP public cloud environments. Provides users with total visibility into their cloud environments, automated responses, and continuous threat detection. Analyzes, normalizes disparate data sources to offer enterprises clarity into risk management. Provides historical and real-time visibility across assets and configurations. Offers companies step-by-step remediation instructions for compliance violations and misconfigurations. Collects audit event logs allowing security administrations to see configuration changes and identify when they occurred.

Tenable Cloud Security: Provides a complete inventory of assets across Azure, GCP, and AWS. Automatically detects and maps organizations cloud environments, including workloads, infrastructures, data, and identities. Enables companies to view infrastructure thats configured incorrectly, as well as associated risks, vulnerabilities, excessive permissions, and network configurations that can expose corporate resources. Allows organizations to automatically remediate misconfigurations, risky privileges, and policy violations. Companies can audit multicloud environments against industry standards, including AWS Well-Architected framework, NIST, PCI-DSS, SOC2, and Center for Internet Security benchmarks for Kubernetes and more. Companies can create their own custom checks.

Here is the original post:
How to choose the best cloud security posture management tools - CSO Online

Read More..

Ethereum, THORChain and NEAR Protocol Price Forecast: Mixed Trends in Todays Market Watch – FX Empire

The RSI indicator is neutral at 51, indicating an evenly balanced market sentiment. Ethereums current trading price is slightly above the 50 EMA, set at $1,776, hinting at a short-term bullish trend. However, the observed symmetrical triangle pattern reflects a state of indecision among investors, with a breakout awaited to determine a clear direction.

In summary, Ethereums trend appears bearish below the $1,800 threshold. In the short term, the market could witness a test of the resistance at $1,850, contingent upon a decisive breakout from the prevailing chart pattern.

Thorchains current trading price stands at $3.03, reflecting a 3.69% ascent within the last 24 hours. The asset ranks commendably in market cap, with a notable supply data backing its valuation. The 4-hour chart timeframe reveals an intriguing picture: immediate resistance is encountered at $3.06, with subsequent barriers at $3.27 and $3.54. Conversely, support levels are firmly entrenched at $2.38, $2.13, and $1.80.

The RSI indicator, soaring at 83, signals an overbought scenario, traditionally a precursor to a potential pullback. However, the assets current position above the 50 EMA, valued at $2.51, leans towards a short-term bullish trend. An upward channel pattern has been discerned, further corroborated by the three white soldiers pattern, both suggestive of a buying trend.

In conclusion, Thorchain exhibits a bullish trend above the pivotal $2.85 mark. In the short term, market participants may anticipate the asset to challenge the immediate resistance at $3.06, with potential to explore higher thresholds in the upcoming days.

NEAR Protocol shows a notable uptrend, surging 10.51% in the last 24 hours to $1.409, reflecting a bullish sentiment in its market positioning. The 4-hour chart reveals a pivot point at $1.2500, with immediate resistance looming at $1.4190. Subsequent resistances are seen at $1.5510 and $1.6610, while supports are found at $1.1580, $1.0600, and $0.9650.

The RSI, significantly elevated at 85, signals overbought conditions, cautioning investors of potential reversals. Moreover, NEAR trades above the 50 EMA at $1.1440, reinforcing the bullish bias. A confirmed downward wedge breakout suggests continued buying interest.

Conclusively, NEAR exhibits a bullish trend above $1.2500. In the short term, a test of the resistance at $1.4190 is anticipated, contingent on sustained momentum.

For a look at all of todays economic events, check out our economic calendar.

Read this article:

Ethereum, THORChain and NEAR Protocol Price Forecast: Mixed Trends in Todays Market Watch - FX Empire

Read More..

26 Gloucestershire tech companies leading the UK’s cyber sector – SoGlos

With National European Cyber Security Month shining a spotlight on some of the UK's leading tech companies in the cyber sector, SoGlos showcases 26 of the Gloucestershire businesseshelping to make the county the UK's cyber capital.

From homegrown tech start-ups to multinational organisations drawn to the county by its strong reputation, we reveal some of the best in the industry...

SGGBA winner for Cyber Business of the Yearand Gloucester tech giant Salus Cyberis a certified provider of world-class cybersecurity services. It helps clients identify and manage their cyber risks proactively and effectively and is the cyber security partner of choice for industry-leading organisations throughout the UK and Europe. Based at Eagle Tower in Cheltenham.

This Cheltenham-headquartered firm based in Eagle Tower describes itself as countering global money laundering, terrorism, and criminal networks. Founded by former members of GCHQ,Ripjardevelops software that combines automation, data visualisation and the ever-expanding features of AI to tackle complex threats to our digital society.

An official Gloucestershire B Corp, Optimising IT provides a range of services from cyber security improvement to complete outsourced IT department services, for organisations that need help managing their IT or require consultancy about changes such as mergers or acquisitions. Based at Twigworth Court Business Centre in Gloucester.

North Green Security is a UK-based cyber security training and consultancy company, with offices in Eagle Tower in Cheltenham. Its aim is to assist in providing a more secure future by ensuring more people at all levels of learning can contribute to an ever-growing and evolving industry, with companies benefitting from strategic assessments conducted by its knowledgeable consultants.

Based in Quedgeley and working with a range of organisations from SMEs to government bodies, Infrastaris a specialist computer networking andinfrastructure company. Its expertise lies in assisting organisations insecuring the IT hardware and solutions they require to operate at optimumefficiency,' from assessing current network environments to the full-scalenetwork design and implementation.

SGGBA Team of the Year 2023 winners,Bamboo Technology, worksto improve other businesses through its extensive IT and telecommunicationsexpertise and it designs and delivers digitally assured solutions for thehybrid workforce. Its headquarters are at Gloucestershire Colleges Cheltenhamcampus.

Based out of Gloucestershire's Hub8, Berta Pappenheimfounded CyberFish in 2018 to build organisational resilience in a way that issustainable, focusing on the psychology of a team so it becomes self-improvingand never goes out of date a few updates later. CyberFish works withmission-critical departments in governments, law enforcement and globalorganisations.

Amiosec specialises in the design and development of securesolutions for government and commercial organisations. The Tewkesbury-based business providesa range of next generation advanced mobile and remote access solutions thatprovide secure mobile communications across public networks. Its products aresimple to configure, easy to use.

Tewkesbury-based business Synalogik describes itself as a team ofopen-source intelligence, data processing and automation experts from across the intelligence, law enforcement and investigation industries. Its vision is to revolutionise the automation of targeted data collection and analysis, allowing organisations to make 'smarter decisions.' The team also won a prestigious Queen's Award for Innovation in 2022.

With thousands of courses spanning health and safety to data protection,Nimble Elearningscloud-based elearning platform is well-used by individuals and businesses alike. Its intuitive tools have also helped clients create thousandsmore courses too. In short, the Stonehouse firm is enabling a revolution UK-wide in thedelivery of effective, affordable, dynamic online training.

Founded byGloucestershire-based Chris Dunning-Walton, this boutique cyber andtechnology recruitment consultancy prides itself on its ability to inspire talented people to find careers that inspire them. Working exclusively within the IT sector, with specialism areas in cyber security, software development and engineering, the award-winning Infosec is based in the Eagle Tower in Cheltenham, with offices in Bristol, too. Dunning-Walton is also a key member of Gloucestershire-basedcyber networking and support group CyNam.

Founded in 2016, Savient is a bespoke software consultancy firm based in Hub8 in the Brewery Quarter in Cheltenham that uses software technology solutions and services to help customers solve business problems and unlock the value in their data. It says its mission is to find and deliver solutionsusing software technology, so your business can work faster and moreefficiently, while meeting emerging opportunities', adding 'we work closely with youapplying our creative, intuitive and adaptive thinking to deliver technologythat works the way your business thinks.

If you want a simple to understand, but sophisticatedsolution to your businesss cyber security concerns, Cheltenham-basedReformIT iscapturing a growing market of firms from all sectors looking to put their IT inthe hands of a business which can manage all its software, hardware, updates,cyber attacks and even training all under one roof.

P3M Works delivers cyber security and digital transformation projects across both private and public sector clients. Its collaboration ofpermanent, technical delivery staff and cyber SMEsare based at Cheltenham's home of private sector cyber, Hub8, in the Brewery Quarter.

Blacksmiths Group is a team of human, digital and physical security specialists who will develop your businesss capability to tackle security challenges and defend against complex threats. The Cheltenham firm provides consultancy and develops technologies to solve problems. Its teams are highly experienced technical and security experts with skills acquired in UK government and the tech industry.

North Tower Consulting is a software solutions consultancy based in Cheltenham, providing professional expertise in cyber security, cloud computing and much more. Set up in 2019 by its founding business partner, the business has gone from strength to strength, with major government contract wins and now a team of more than 50 people onboard.

Another Cheltenham-based company, Gemba Advantage, which was co-founded by Shelley Wood, is a tech development firm that builds high-impact software for businesses.Itspartners include the UK government and the National Crime Agency.Its teamcan build and maintain high quality software to help your business make the mostof its technological investments.

Founded in 2020 byRobert Diamond, Craig Morgan and Craig Stocks who bring years of experienceworking within the cyber security, defence and IT sectors, Cheltenham-based, HamiltonianDynamics provides 'high performance, big impact mission critical software', anddoes so for multiple government departments, as well as being a design anddevelopment consultancy agency.

This Cheltenham-basedfirm was started by a husband-and-wife team in 2016 and has operated primarily in the defence sector for the past few years. Fat Potato worked across multiple major projects deliveringsoftware solutions in challenging and demanding environments and has provenexpertise in a wide array of technical specialisms. It works with businesses totransform their applications and enhance performance.

Established in 2013,Cyber Security Associates (CSA) provides cyber consultancy and cyber managedservices which help to detect, protect and educate against the ever-changing threat of cyber attacks. It has built a team from government (ex-military) andcommercially experienced specialists all holding current and relevant cybercertifications. Today, its core services are based around a 24/7 securityoperations centre in Gloucester.

This Cirencester firm is dedicated to assisting organisations to adopt cloud services andtechnologies securely, whilst understanding the continued challenges of acomplex hybrid environment. Somerford Associates will work as your trusted partner and as part of yourteam to deliver success. Its aim is to meet customers needs with afocus on service quality and delivery for on-premises, hybrid or full cloudenvironments.

CoreTech is a niche cyber security company whose people aremotivated by the desire to deliver exceptional capabilities coupled with a realsense of mission. Its Cheltenham-based team is highly experienced, deeply technical,and blend vulnerability research, research engineering and software developmentskills.

Cirencester-based Core to Cloud is an SGGBA 2022 award winner and its founder, James Cunningham,was named in The Times LDC Top 50 Most Ambitious Business Leaders list in the same year. Describing itself as your 'cyber security sidekick', its services include cyber security gap analysis, MDR, crisis simulating and dark web monitoring.

Started and run by engineers from the UK intelligence anddefence communities, and headquartered in Cheltenham's Eagle Tower, Red Maple Technologies is a technicalconsultancy and product company. Founded to help organisations of all sizesprotect themselves from cybersecurity threats, it solves technical and security problems with technical solutions.

Another resident of Gloucestershires home of private sector cyber, Hub8 but in its Gloucestershire College campus workspace Indeloy specialises in helpingcustomers find the right IT solution for their needs. It can source a widevariety of products and provide services such as hardware disposal, softwareerasure, licence management and more.

Headquartered in New York but with a UK base in the Brewery Quarter's cyber hot spot, Hub8, Cylera is pioneering IoT (Internet of Things) security and intelligence to protect what matters most people, safety, privacy and business continuity. Specialising in support for the healthcare sector, it delivers acyber security platform that discovers devices, analyses network traffic andrisk, detects vulnerabilities, continuously identifies threats or maliciousdevices and helps reduce attacks.

Link:
26 Gloucestershire tech companies leading the UK's cyber sector - SoGlos

Read More..

Internet access in Gaza is collapsing as ISPs fall offline – TechCrunch

Image Credits: Ahmad Hasaballah/Getty Images / Getty Images

As the conflict between Israel and Hamas reaches its third week, internet connectivity in Gaza is getting worse.

On Thursday morning, internet monitoring firm NetBlocks wrote on X, formerly Twitter, that the Palestinian internet service provider NetStream has collapsed days after the operator notified subscribers that service would end due to a severe shortage of fuel supplies.

Hours later, NetBlocks wrote that its network data showed a collapse in connectivity in the Gaza strip, including Paltel, which bills itself as the leading telecommunication company in Gaza.

Todays incident is the largest single disruption to internet connectivity we have observed in Gaza since the beginning of the conflict. It will be experienced by many as a total or near-total internet blackout, Isik Mater, director of research at NetBlocks, told TechCrunch.

According to Doug Madory, an expert who for years has worked at various companies that monitor networks across the world, internet connectivity in Gaza is dramatically worsening.

The evidence of the crippled internet in Gaza is not hard to find. By every metric of internet connectivity, things are in bad shape, Madory, who is now the director of internet analysis at Kentik, told TechCrunch.

Madory said that he monitored internet connectivity in Gaza during the 2014 war. At the time, despite some outages, the ISPs were able to keep their connections to the outside world up using backup power, etc., even if many people were unable to access service due to power outages and infrastructure failures.

NetStream did not immediately respond to a request for comment sent to its email, Facebook and WhatsApp accounts. NetStreams website appeared offline as of Friday.

Earlier on Friday, Mater told TechCrunch that Paltel and Mada Al-Arab another major regional internet provider as well as their downstreams and subsidiaries, still have a degree of connectivity although its not clear how much of this is reaching end users.

Internet security firm Cloudflare also showed issues with NetStream as of the time of writing. Cloudflare head of data insight David Belson pointed to several other ISPs that the company is monitoring, including SpeedClick, AjyalFI, DCC, Fusion, NewStarMAX, JETNET, Digital Communications Palestine and TechHub-HiNet, which are all either largely or completely offline since the first few days of the conflict.

On October 7, Hamas terrorists launched a surprise attack against Israelis in their homes, at a music festival and on the streets, killing more than 1,400 people. Since then, the Israeli military has responded with a series of airstrikes that have killed more than 7,000 people, according to the Hamas-run Gaza health ministry, though U.S. officials have called into question the accuracy of these numbers. As part of its response to the terrorist attack, Israel cut off electricity in Gaza, reportedly reducing the regions power supply by 90%.

IODA, which is a system that monitors the Internet infrastructure connectivity in near-real time, with the goal of identifying macroscopic Internet outages, is monitoring several internet providers in Palestine, including NetStream, and shows widespread outages or at least significant degradation.

The organization wrote on X that connectivity in Gaza further dropped on Friday, due to a complete outage of NetStream.

Amanda Meng, a research scientist at Georgia Tech, told TechCrunch that they are seeing a continued decline of connectivity in Gaza. Meng described the first decline beginning on October 7 with connectivity dropping to 20%, followed by a second decline early on October 21, dropping to about 15% and below.

IODA was originally developed by the Center for Applied Internet Data Analysis (CAIDA) at the University of California San Diego, and is now maintained by the Georgia Institute of Technology.

On Friday afternoon, Palestine Red Crescent Society, a humanitarian NGO in Palestine, wrote on X that it had completely lost contact with the operations room in Gaza Strip and all our teams operating there due to the Israeli authorities cutting off all landline, cellular and internet communications.

We are deeply concerned about the ability of our teams to continue providing their emergency medical services, especially since this disruption affects the central emergency number 101 and hinders the arrival of ambulance vehicles to the wounded and injured, the PRCS wrote.

Digital rights organization AccessNow has warned that internet outages in Palestine can have serious repercussions on the ground.

With thousands of people already killed, and currently in a near-complete blackout, access to information has become scarce, directly impacting the capacity to document atrocities perpetrated on the ground, the organization wrote in a press release updated last week. People find it nearly impossible to learn the whereabouts of their families and loved ones, and if theyre dead or alive.

This story has been updated to add information and comments provided by Cloudflare and NetBlocks, and with more from Isik Mater and the Palestinian Red Crescent.

Excerpt from:
Internet access in Gaza is collapsing as ISPs fall offline - TechCrunch

Read More..

France and Germany increasingly drift apart on digital sovereignty of … – EURACTIV

The recent announcement of a new, independent cloud for Europe by Amazon Web Services (AWS) has underlined the growing divergence between the positions of Paris and Berlin regarding digital sovereignty in the cloud sector.

The move by AWS last week came as part of an overall trend whereby American hyperscalers a term used to describe cloud service providers with massive operations seek to address the concerns of EU countries looking to keep their data within Europes borders.

Past examples include leading market players like Microsoft, which announced its Microsoft Cloud for Sovereignty offer in July 2022, and Oracle, which launched its EU Sovereign Cloud offer last June.

What worries me the most is that the German Federal Office for Information Security (BSI) has endorsed the AWS European Sovereign Cloud, French centrist MP Philippe Latombe told Euractiv, explaining he fears that the Germans start exerting pressure against Frances highest cloud security certification, called SecNumCloud.

AWS was in fact the first cloud service provider to receive the BSIs C5 testate,a German cloud security certification, based on the same international standard as SecNumCloud.

BSIs Director General Claudia Plattner said in a statement that she was very pleased to constructively accompany the local development of an AWS cloud, which will also contribute to European sovereignty in terms of security.

According to Arnaud David, Director of European Affairs at AWS, the company has put in place technical building blocks, including safeguards, controls and security features that allow customers to enforce access restrictions so that nobody, including from AWS, can access customer data.

He further explained that AWS cannot access customer data unless the access is given by its customers and that AWS provides its customers with encryption tools. Moreover, only EU-resident AWS employees located in the EU will control operations of the AWS European sovereign cloud.

A comprehensive bill aiming to secure and regulate the internet in France aims to strictly respect the new digital European regulations and, when it comes to cloud regulation, will go even further.

For MP Latombe, AWS cloud cannot be sovereign because it is subject to the US FISA and Cloud Act, legislations mandating US companies, US citizens or foreign subsidiaries on US soil to cooperate with the US security agencies.

According to AWSs David, if AWS is requested to send data to US administrations under the FISA, Amazon will challenge every request it deems inappropriate, especially if it is contrary to local law, like the EUs General Data Protection Regulation (GDPR) in the EU.

Of course, every company affirms it would not disclose sensitive information, at least until they are caught in the crossfire of conflicting jurisdictions.

We are a global company subject to laws in every country where we operate, including US law, David said, adding that this was also the case for EU companies with subsidiaries in the US.

Latombe disagrees, arguing that European cloud providers with operations in the United States are subject to US laws only through their US-based subsidiaries, which is not the case with AWS, a US-based company that must comply with US agencies globally.

Jean-Sbastien Mariez, founding partner of the French tech law firm Momentum Avocats, noted that since the Cloud Act, the location of data is irrelevant in the applicability of US laws.

Moreover, while Amazon advertises that only EU-resident AWS employees located in the EU will access data, a 2022 memo by the Dutch National Cyber Security Center states that this does not necessarily mean protection from FISA and Cloud Act laws.

Traditionally, Paris could count on Berlins support to push digital sovereignty principles that favour their national champions over foreign providers. In contrast, smaller member states prefer to buy the best available technology regardless of its provenance.

But a Franco-German divergence on the concept of the sovereign cloud has been long in the making. Different understandings of what digital sovereignty meant for cloud infrastructure are what made the Gaia-X European digital sovereignty project lose its political momentum.

Tensions came to a head with the European Cloud Services scheme (EUCS), a cybersecurity certification scheme where France, via its Commissioner Thierry Breton, tried to replicate the sovereignty requirements of SecNumCloud at the EU level.

This attempt faced significant resistance from more liberal countries, led by the Netherlands. With the liberal Free Democratic Party occupying critical ministries in the current coalition government in Berlin, France not only did not receive support from Germany but was at times more or less openly criticised.

In this context, Latombe fears that Germans are taking a pro-US and anti-French position and, therefore, would be exchanging their industrial dependency on Russian gas for a dependency on American digital companies.

That is why he considers that giving the C5 certification to the AWS European Sovereign cloud was a nook in [the French certification] SecNumCloud since the French ANSSI and German BSI authorities have a mutual recognition agreement for security certificates, albeit only for the first security level at the moment.

A BSI spokesperson told Euractiv there was no specific connection between the AWS announcement and the currently discussed EUCS. Meanwhile, the German Digital Ministry said to Euractiv that it was committed to ensuring that the [German] economy can access secure and powerful cloud structures to the extent required.

The French ANSSI and the Digital Ministry declined Euractivs requests for comment.Latombe advertised on Monday (30 October) that he sent a written question to French Digital Minister Jean-Nol Barrot on the matter.

[Edited by Luca Bertuzzi/Nathalie Weatherald]

Read the original here:
France and Germany increasingly drift apart on digital sovereignty of ... - EURACTIV

Read More..

US Fed interest rate preview: Two scenarios for Bitcoin and Ethereum prices – FXStreet

Bitcoin price rallied throughout October 2023, marking another profitable month for BTC holders. The upcoming US Federal Reserve interest rate decision has the potential to make or break Bitcoins price rally.

Altcoins like Ethereum will probablyfollow Bitcoins coattails. A vast majority of market participants expect the interest rate to remain unchanged and a small percentage anticipate a rate cut by the US central bank.

Also read: Federal Reserve Preview: Powell set to lift US Dollar by leaving door open to more hikes

According to the CME Fed Watch Tool, there is a 98% probability that the US Ccentral bank will leave interest rates unchanged on November 1. In September 2023, Bitcoin price noted no stark movements as the Fed left interest rates unchanged. A similar outcome is expected, in response to the Federal Reserves November 1 decision.

CME Fed Watch tool and expectation of interest rate hike

Bitcoin price could witness short-term volatility, with BTC hovering close to the $34,400 level. BTC is likely to momentarily retraceits weekly gains of 4.33%, a recovery in the assets price could follow soon after.

Bitcoins rally is largely driven by the anticipation of a spot BTC ETF approval by the US financial regulator Securities and Exchange Commission (SEC). The SECs decision could therefore influence BTC price directly, as opposed to unchanged interest rates.

Market participants believe that there is a 1.8% probability of an interest rate cut. In the event of a rate cut, risk assets like Bitcoin and altcoins are expected to rally. Typically, a rate cut makes it cheaper to borrow funds and engage in leveraging risk assets like Bitcoin for gains. An increase in demand and inflow of funds to the asset likely drive prices higher.

It is important to note that the interest rate cut is highly unlikely. Investors are focused on Fed Chair Jerome Powells speech to identify whether more interest rate hikes are on the horizon.

Yohay Elam, lead analyst at FXStreet analyzed the Feds interest rate decision and the possibility of future rate hikes in his post here. Elam notes that the Federal Reserve's overnight rate stands at a range of 5.25%-5.50%, above both measures of inflation. The US Central bank has slowed the pace of its rate hikes and settled for one interest rate increase in the past three meetings.

While market participants expect another no change decision from the US Fed, the Central bank left room for another hike in 2023. Elam says,

The bank's dot plot showed a target of 5.6% by year-end, leaving the door open to another move. With no new forecasts at this juncture, Fed Chair Jerome Powell will likely insist on another move, leaving his options open. One reason to do that is the buoyant jobs market.

Bitcoin and Ethereum, the two largest cryptocurrencies by market capitalization are hovering around crucial levels, ahead of the banks decision on Wednesday. Bitcoin price sustained above $34,400 while Ethereum is trading above its $1,800 psychological level.

Read the original post:

US Fed interest rate preview: Two scenarios for Bitcoin and Ethereum prices - FXStreet

Read More..

Stratis’ STRAX token outpaces Bitcoin, Ethereum, and Binance Coin … – Investing.com

Investing.com|EditorRachael Rajan

Published Oct 31, 2023 01:25PM ET

Stratis' native token, STRAX, has been demonstrating a significant performance in the cryptocurrency market, with a growth trajectory that surpasses Bitcoin, Ethereum, and Binance Coin. Data from CoinMarketCap highlights the impressive gains of STRAX, with a 24-hour increase over 24% and a seven-day surge of 75%. The trading volume also experienced a substantial boost, spiking nearly 150% to more than $139 million.

On an annual basis, STRAX's growth trajectory has soared by 102.26%, and its performance over the past 30 days indicates an increase of over 122.60%. This robust performance stands in stark contrast to other major cryptocurrencies. Bitcoin's annual growth is around 60%, while Ethereum's is only 13.63%. In the meantime, Binance Coin has seen a decline of more than 26% to $226.88 from $326 last year.

STRAX's price has made a significant leap from $0.4728 to $1.08, reflecting its sustained bullish trend throughout the year. The success of STRAX is largely attributed to the Stratis' Blockchain as a Service (BaaS) platform. This platform facilitates the development and deployment of blockchain applications, contributing to the strong performance of STRAX in the crypto market.

This article was generated with the support of AI and reviewed by an editor. For more information see our T&C.

Read market moving news with a personalized feed of stocks you care about.

Get The App

Written By: Investing.com

More:

Stratis' STRAX token outpaces Bitcoin, Ethereum, and Binance Coin ... - Investing.com

Read More..