Page 790«..1020..789790791792..800810..»

Why Amazon Stock Was a Winner on Monday – The Motley Fool

What happened

Monday's trading session wasn't a particularly memorable one for Amazon (AMZN 0.94%) stockholders. Nevertheless, their company's share price inched up marginally on muted optimism for large-cap titles. Helping the stock defy gravity was its inclusion on a list of star stocks from a storied researcher.

That researcher was Mizuho, which on Monday introduced its Top Picks List. As the name implies, this is a lineup of the most promising equity investments, as chosen by the company's U.S. analysts.

Amazon made the 21-title list, which included seven stocks. Besides the online retailer, this sub-group consisted of both traditionally popular names (like Microsoft) and somewhat offbeat choices such as Trip.com.

Mizuho is clearly enthusiastic about Amazon's prospects, particularly regarding its dominant Amazon Web Services (AWS) business, which is well positioned to capitalize on the strong push into generative artificial intelligence (Gen AI).

"We believe AWS' strong ecosystem and marketplace approach for Gen AI are not fully appreciated by investors," the bank wrote. "We expect Gen AI to drive the next super cycle of cloud migration as the adoption could accelerate from 20% of workloads currently on cloud to 70% in five years versus prior estimate of ten years."

Amazon is known to most consumers and not a few investors as mostly a digital retail business. But AWS has been a key contributor to both revenue growth and the bottom line, so its future success is crucial to the company's efforts. Investors would be wise to keep a sharp eye on the unit's development.

John Mackey, former CEO of Whole Foods Market, an Amazon subsidiary, is a member of The Motley Fool's board of directors. Eric Volkman has no position in any of the stocks mentioned. The Motley Fool has positions in and recommends Amazon.com and Microsoft. The Motley Fool has a disclosure policy.

Read this article:

Why Amazon Stock Was a Winner on Monday - The Motley Fool

Read More..

3 ways AWS is helping to make the internet more secure – About Amazon

At the end of August, AWS security teams noticed a new type of HTTP request flood targeting customers. Request floods are a type of distributed denial of service (DDoS) attackdeliberately designed to make a website or application unavailable to users. These kinds of attacks have unfortunately become a common problem for cybersecurity teams to fend off. But this one was different, and of a size and scale not seen before.

DDoS attacks are evolving. People have found a way to talk to web servers much more aggressively and at much higher rates than in the past, said Tom Scholl, AWS vice president and distinguished engineer. A request flood is essentially someone asking for data. The server goes to get that data, but then the requester doesnt want it. Its a bit like calling someone repeatedly and hanging up as soon as they answer. If you have more than 100 million requests at once, this can consume large amounts of resources and prevent normal traffic from being processed. This particular attack, known as the HTTP/2 Rapid Reset Attack, was driving more than 155 million requests per second.

If a DDoS attack succeeds, it can cause havoc for businesses, drive up costs, and affect people just trying to go about their daily lives. It could, for example, stop you from making bank transfers, viewing information from your health care provider, or watching your favorite show. If gamings your thing, you might not be able to log on, or you could get disconnected halfway through playing.

Thanks to the efforts of AWS engineers, AWS customers were quickly protected from this new DDoS attack. Together with other tech companies, AWS also worked on developing further mitigations, to improve how such attacks are handled across the industry.

We come at a problem like this from several angles, said Scholl. We bring together all of our in-house expertise to rapidly work on fixes, while at the same time we identify other areas that might be vulnerable. In the case of a new kind of DDoS type, we also build a reproduction in our labs of whatever the bad actors are doing, to better understand how their attack works and to test the strength of our systems against it.

Scholl said that collaborating with industry peers to share knowledge on the most effective engineering approaches is also vital to preventing attacks.

Ultimately, were trying to make the internet a safer and more secure place, not only for our customers, but for every legitimate web user, wherever they are in the world, he said.

Here are three ways AWS is helping to prevent DDoS attacks and disrupt the infrastructure responsible for generating them.

Attackers often use botnets to power their DDoS attacks. A botnet is a network of computers that has been infected by malware or other destructive software designed to interfere with normal programming. The affected machines, which could total tens of thousands, are controlled by a server. The server can instruct them to carry out an attack at the same time, in an attempt to overwhelm a system. Through our MadPot threat intelligence tool, we can detect and identify botnets, and identify where the botnet is being controlled from. Well then engage with domain registrars and hosting providers to shut down that point of control. This stops the botnet itself from being able to participate in any attacks.

One common technique that DDoS actors use is IP spoofing, sending messages as part of an attack while disguising the source to make it hard to stop the activity. Historically, IP spoofing has been a challenge for security teams to deal with because its so hard to identify the true source. (Imagine if you simultaneously received a thousand calls on your phone from a thousand different numbers. You would need to trace back step-by-step to find each messages originating network.) Because AWS runs a large global network footprint, interconnecting with thousands of unique networks, we can directly engage with our peer networks to trace an attack back to the source and shut it down. We work with a variety of network operators to engage in trace-back exercises to shut down the infrastructure used for these kinds of attacks.

A proxy server is a computer that acts as a kind of gateway between a user and the internet. Popular examples include software packages, like Squid. DDoS actors take advantage of freely open proxy servers, which anyone can use, to hide their attacks. They will actively scan for open proxies to use them when they generate HTTP request floods, allowing them to hide their true origin when attacking a target. When a target observes an attack, they see it coming from the thousands of proxy servers that are live on the internet, rather than from the true source. With our MadPot threat intelligence tool, were able to trace back the true sources connecting to these proxies and engage with the upstream hosting provider to shut them down.

Here are three tips for how you can keep your business more secure online.

Security is a collaborative effort, according to Scholl. Thats where services such as Amazon CloudFront can help, whether your business is a startup or an established enterprise. CloudFronts global footprint, DDoS mitigation systems, and traffic management systems are designed to handle large influxes of traffic, good or bad. Scholl said a useful metaphor for thinking about how CloudFront works is to imagine an incredibly strong, reinforced front door. If someone threw a heavy rock at it, they might be able to scratch a tiny part, but the door itself would remain intact. When combined with AWS Shield services to specifically address DDoS, customers have a good set of tools at their fingertips to address DDoS-related threats.

Making sure you regularly patch and update the software your business relies on is crucial to ensure you have the latest security updates. These updates are designed against the latest known vulnerabilities. We recommend that customers who operate their own HTTP/2-capable web servers check with their web server vendor if they are affected by this recent attack and, if so, install the latest patches from their vendors to address this issue.

One of the best ways for you to protect yourself and your business online is through multi-factor authentication (MFA). This is a security best practice that requires a second authentication factor in addition to your username and password sign-in credentials. It offers an added layer of protection to help prevent unauthorized individuals from gaining access to your systems or data. AWS customers can learn more in this blog post about MFA.

For more information on how AWS keeps its customers secure, visit the AWS Cloud Security website. For a deeper dive on how we helped disrupt the DDoS attack in August, visit the AWS Security Blog.

Follow this link:
3 ways AWS is helping to make the internet more secure - About Amazon

Read More..

Internet Security Firewall Market By Sales, Production, Price and Forecast to 2029 | SAP, Hewlett Packard E… – SeeDance News

In its detailed study Global Internet Security Firewall Market, by MarketQuest.biz extensively evaluates the large companys entire current situation and central factors. It effectively generates the necessary information and computational methods to help in the making of the best work plan and determining the correct trajectory for optimal available bandwidth for retail investors, which is accomplished by selecting to stay on top of the significant drivers, recent developments, undiscovered prospects, accusations, and limitations, as well as challenges and fundamental regional centres for the Internet Security Firewall market.

The inquiry begins with examining the Internet Security Firewall markets terminology, classification, and market surveys. Nonetheless, it is well-versed in the various product characteristics, supply networks, manufacturing processes, and value propositions. The analysis is divided into regions, kinds, and applications to offer a comprehensive picture of the components of this worldwide sector Internet Security Firewall.

Get Exclusive Sample Pages of Internet Security Firewall Market https://www.marketquest.biz/sample-request/147590

It assesses the market in terms of divisions, nations, manufacturers/companies, and revenue share and sales by powerful countries in each of these regions (2023-). The report considers the worldwide Internet Security Firewall markets growth and restraint factors. Our analysts have used various techniques to collect dependable data for stating growth drivers in the worldwide Internet Security Firewall market.

The key companies featured in the global Internet Security Firewall market report are

The study identifies the following research applications:

The study includes the subsequent segmentation based on product types:

The following are the key regions and countries highlighted in the worldwide Internet Security Firewall market research:

To Learn More Details, Read the Report: https://www.marketquest.biz/report/147590/global-internet-security-firewall-market-2023-by-company-regions-type-and-application-forecast-to-2029

It will provide acceptable parameters for building a plan for capitalizing on commercial opportunities for their companies health and profitability. Furthermore, the worldwide Internet Security Firewall market research includes a critical assessment of the customer journey to assist organizational decision-makers in making an effective plan to convert more prospects into customers.

Major Points Covered In The Report:

Customization of the Report:

This report can be customized to meet the clients requirements. Please connect with our sales team (sales@marketquest.biz), who will ensure that you get a report that suits your needs. You can also get in touch with our executives on +1-201-465-4211 to share your research requirements.

Contact UsMark StoneHead of Business DevelopmentPhone: +1-201-465-4211Email: sales@marketquest.biz

Other Related Reports:

https://www.benzinga.com/pressreleases/23/09/34564883/industrial-grade-ammonium-pentaborate-market-size-share-analysis-growth-trends-forecasts-2023-2029

https://www.benzinga.com/pressreleases/23/09/34564880/barrier-fluid-market-forecast-2023-to-2029-business-development-and-opportunities

https://www.benzinga.com/pressreleases/23/09/34564885/self-lubricating-silicone-market-research-and-size-analysis-2023-2029

See more here:
Internet Security Firewall Market By Sales, Production, Price and Forecast to 2029 | SAP, Hewlett Packard E... - SeeDance News

Read More..

Internet Security Firewall Industry Is Expected To Experience … – The Meade County Messenger

A recently uploaded market research study on Internet Security Firewall Market 2023 from Marketintelx focuses on industry growth, market scope, development trends, as well as initial and future estimation of the market. The key highlights and features of the global Internet Security Firewall industry report represent the essential features and characteristics of the industry. The report analyzes the Research Methodology overview including Primary Research, Secondary Research, Company Share Analysis, Model including Demographic data, Macro-economic indicators, and Industry indicators: Expenditure, infrastructure, Research Limitations, and Revenue Based Modeling.

Request a Sample Report of Internet Security Firewall Market @ https://marketintelx.com/sample_request/6138

Introduction And Overview:

The market analysis consists of key development trends, industry trend analysis, future opportunities in the global Internet Security Firewall market, product growth factor analysis, and key market segments of the market. The report analyzes and offers ideas of exhaustive research on ancient and recent market size. The report provides a detailed analysis of competitors analysis and their key strategies, key company profiles, product scope, market overview, opportunities, breakdown of upstream raw material suppliers and downstream buyers. It also describes product types, applications, and regional analysis that is trending in the market.

The key companies profiled in the report are:

Sap, Hewlett Packard Enterprise, Cellusys, Openmind Networks, Tata Communications, Anam Technologies, Amd Telecom, Adaptive Mobile, Infobip, Evolved Intelligence, Mobileum, Omobio

Market Segmentation

By type

Cloud-BasedOn-Premise

By application

Small And Medium EnterpriseLarge Enterprise

The cost analysis of the Global Internet Security Firewall Market has been performed while keeping in view manufacturing expenses, labor cost, and raw materials and their market concentration rate, suppliers, and price trend. Other factors such as Supply chain, downstream buyers, and sourcing strategy have been assessed to provide a complete and in-depth view of the market. Buyers of the report will also be exposed to a study on market positioning with factors such as target client, brand strategy, and price strategy taken into consideration.

The report then includes an assessment of various drivers, technological innovations, upcoming technologies, opportunities, market risks, restraints, market barriers, challenges, trends, competitive landscape, and segments which gives an exact picture of the growth of the global Internet Security Firewall market. The report offers different facts and figures for a basic understanding of the business. The study then strategically profiles the key players and analyzes their development, mergers and acquisition, and the R&D investment created by the competitors.

Critical Features Of The Report:

The report provides regional-level analysis for regions covering:

The report helps global Internet Security Firewall market players build future business master plans and discover global competition. Different market forecasts related to market size, production, revenue, consumption, CAGR, gross margin, price, and other key factors are provided for 2023 to 2030 time-period. In addition, the report includes regional analysis and market dynamics. The development scope, feasibility study, market concentration, and maturity analysis are elaborated in this report.

Chapters Covered in Market Report Are as Follow:

Buy Exclusive Report @ https://marketintelx.com/checkout/?currency=USD&type=single_user_license&report_id=6138If you have any special requirements, please let us know and we will offer you the report at a customized price.

Contact us

Sarah Ivans | Business Development

Phone: +1 805 751 5035

Phone: +44 151 528 9267

Email: [emailprotected]

Website: http://www.marketintelx.com

Go here to see the original:
Internet Security Firewall Industry Is Expected To Experience ... - The Meade County Messenger

Read More..

Internet Security Market to grow by USD 23.34 billion from 2021 to 2026 | Growth Driven by Rapid adoption of BYOD policy- Technavio – Yahoo Finance

NEW YORK, Oct. 6, 2023 /PRNewswire/ -- The "Internet security marketby solution(products and services),geography (North America, APAC, Europe, South America, and the Middle East and Africa) - Forecast and Analysis 2022-2026" report has been added to the technavio offering.With ISO 9001:2015 certification, Technavio has proudly partnered with more than 100 Fortune 500 companies for over 16 years. The potential growth difference for the internet security market from 2021to 2026 is USD 23.34 billion, according to Technavio.The rapid adoption of the BYOD policy is a key factor driving market growth.In an evolving business environment, it is becoming essential for organizations to create mobile workforces so that they can compete. Implementation of BYOD results in the elimination of hardware device costs. Such policies are preferred by employees as they allow them to use a single device for both personal and professional work. In addition, a secure network management package that can be provided by corporate routers is needed because of the increased adoption of BYOD policies. The focus will be on 3G and 4G wireless routers for SMEs and individual customers who use high volumes of data.Hence, these factors are expected to drive market growth during the forecast period.Get deeper insights into the market size, current market scenario, future growth opportunities, major growth driving factors, the latest trends, and much more. Buy the full report here

Technavio has announced its latest market research report titled Global Internet Security Market 2022-2026

Market Challenge

The high cost of deployment is a significant challenge restricting market growth.The cost of a strong internet security system will be dependent on the price of licensing products, i.e., what level of customization is necessary in line with the end user's particularities and how long they maintain these products. Due to new cybersecurity hackers' easy access to traditional security features, like firewalls, enterprises should invest in more efficient and automated solutions that can flag anomalies before they become a problem. The cost of software licensing, system design and modifications, implementation, training, and maintenance for a single organization shall be part of the overall installation costs.Hence, these factors are expected to restrict market growth during the forecast period.

Story continues

Learn about additional key drivers, trends, and challenges available with Technavio. Read Free Sample PDF Report Now

The internet security market is segmented bySolution(Products and Services),and Geography (North America, APAC, Europe, South America, and Middle East and Africa).

The internet security market share growth by the productssegment will be significant during the forecast period. A higher level of sales of hardware security components is expected to have a positive impact on product segment revenue. Year over year, the rapid adoption of hardware components providing comprehensive security, e.g., firewall and intrusion detection and prevention mechanisms, as well as ITDPs to secure network infrastructures, are projected to lead to an increase in annual growth rates for hardware security components. Developed countries have used many smart medical technologies; Emerging countries such as India and China have also started using such technologies. Additionally, multiple cases of malware attacks have affected hospital networks. As a result, hospitals are increasingly using IoT security solutions to prevent malware attacks on devices such as pacemakers, insulin pumps, and defibrillators.Hence, these factors are expected to drive segment growth during the forecast period.

View FreeSample Report for insights into the contribution of all the segments and regional opportunities in the report.

Key Companies in the Internet Security Market:

AO Kaspersky Lab, Cisco Systems Inc., Dell Technologies Inc., Fortinet Inc., HCL Technologies Ltd., Hewlett Packard Enterprise Co., Infineon Technologies AG, Intel Corp., International Business Machines Corp., Microsoft Corp., NortonLifeLock Inc., NTT Corp., Palo Alto Networks Inc., Penta Security Systems Inc., SecureLink Inc., Sophos Ltd., Tata Consultancy Services Ltd., Thales Group, Trend Micro Inc., and Wipro Ltd.

Related Reports:

TheUnified Endpoint Management(UEM)marketis estimated to grow at aCAGR of 36.96%between 2022 and 2027. Themarket size is forecast to increase byUSD25,741.83 million.

Thenetwork security software marketis estimated to grow at aCAGR of 11.14%between 2022 and 2027. Themarket size is forecast to increase byUSD 17.51 billion.

ToC:

Executive Summary

Market Landscape

Market Sizing

Historic Market Sizes

Five Forces Analysis

Market Segmentation by Solution

Market Segmentation by Geography

Customer Landscape

Geographic Landscape

Drivers,Challenges, &Trends

Company Landscape

Company Analysis

Appendix

About Technavio

Technavio is a leading global technology research and advisory company. Their research and analysis focus on emerging market trends and provide actionable insights to help businesses identify market opportunities and develop effective strategies to optimize their market positions.With over 500 specialized analysts, Technavio's report library consists of more than 17,000 reports and counting, covering 800 technologies, spanning across 50 countries. Their client base consists of enterprises of all sizes, including more than 100 Fortune 500 companies. This growing client base relies on Technavio's comprehensive coverage, extensive research, and actionable market insights to identify opportunities in existing and potential markets and assess their competitive positions within changing market scenarios.

Contacts

Technavio ResearchJesse MaidaMedia & Marketing ExecutiveUS: +1 844 364 1100UK: +44 203 893 3200Email:media@technavio.comWebsite:www.technavio.com

Global Internet Security Market 2022-2026

Cision

View original content to download multimedia:https://www.prnewswire.com/news-releases/internet-security-market-to-grow-by-usd-23-34-billion-from-2021-to-2026--growth-driven-by-rapid-adoption-of-byod-policy--technavio-301949787.html

SOURCE Technavio

The rest is here:
Internet Security Market to grow by USD 23.34 billion from 2021 to 2026 | Growth Driven by Rapid adoption of BYOD policy- Technavio - Yahoo Finance

Read More..

ClearDATA to add SaaS option for its health data security and … – SiliconANGLE News

Healthcare data security and compliance company ClearDATA Inc. announced today that itshealthcare-native cloud security posture management CyberHealth Platform will soon be available as a software-as-a-service offering and that its expanding its services and support options for all customers.

The ClearDATA CyberHealth Platform is designed toensure security, compliance and privacy in the healthcare sector. The platform is equipped with hardened images aligned with Center for Internet Security benchmarks and possesses in-depth documentation of healthcare technical reference architectures.

Architectures are mapped to various regulatory frameworks such as the U.S. Health Insurance Portability and Accountability Act, the Health Information Trust Alliance and the European Unions General Data Protection Regulation, ensuring a robust security infrastructure to safeguard sensitive healthcare data.

The core of the CyberHealth Platform involves cloud security posture management, or CSPM, which ClearDATA argues is crucial for automating and enforcing continuous cloud security and healthcare compliance. The platform allows healthcare organizations to securely scale their operations within the public cloud domain.

The platform provides protection and scalable management of sensitive healthcare data, applications and devices, with support for Amazon Web Services Inc., Microsoft Azure and the Google Cloud Platform. The company says it has the ability to prevent, detect and remediate compliance drift and sensitive data security gaps, ensuring a secure and compliant cloud environment.

When data is in the cloud, hospitals can provide better services, pharmaceutical companies can manufacture better medicines, and physicians can provide better care good data can save lives and is one of the most valuable and most vulnerable assets in healthcare, said Chief Executive Rick Froehlich. ClearDATAs solutions ensure data is readily accessible and completely secure, so healthcare organizations can confidently and successfully modernize their healthcare delivery without sacrificing the security of their patients.

ClearDATA is a venture capital-backed company, having raised $102 million, according to Tracxn, including a round of $25 million in 2015. Investors in the company includeHeritage Group LLC, HLM Venture Partners LLC,Flare Capital Partners LLC, Norwest Venture Partners LP, Merck Global Health Innovation Fund LLC and Excel Venture Management LLC.

TheCUBEis an important partner to the industry. You guys really are a part of our events and we really appreciate you coming and I know people appreciate thecontent you create as well Andy Jassy

THANK YOU

See the original post:
ClearDATA to add SaaS option for its health data security and ... - SiliconANGLE News

Read More..

Digital Piracy Returns to Sea: Protecting Autonomous Ships from … – War On The Rocks

In June 2017, the shipping giant Maersk was hit with a major cyber attack. Malicious software locked files on employee computers, completely halting Maersks port operations. Even with a supposedly quick response from Maersk, the attack shut down 76 port terminals and ended up costing the company $300 million.

Commercial shipping has made major strides in recent decades toward digitalization. Supply-chain concerns, green technology, and costs across the industry have led to a new push for automation. This promises greater efficiency, but it also creates a massive new target for cyber attacks. Where the internet once borrowed the term piracy from the maritime domain, we are rapidly reaching the point where it will be possibly to digitally hijack a container ship on the high seas.

To address this risk, the International Maritime Organization should issue specific guidance and standards for securing large autonomous networks, including listing uniquely vulnerable systems. Many have questioned the enforcement capabilities of the International Maritime Organization. But its guidance works, both in building consensus and in driving specific changes within the global shipping industry. Working with port authorities, shipping companies, and national governments will require major adaptations to the existing cyber security space. The threat environment will continue to evolve. The shipping industry should adapt to new cyber security challenges to stay afloat.

Existing Vulnerabilities

Commercial ships are already equipped with many systems that can be exploited by cyber attacks. Traditionally, system vulnerabilities are broken up into those that effect information technology and operational technology. Information systems deal with data and business information, whereas operational systems deal with a vessels onboard hardware and software. The Maersk attack was identified primarily as an information system attack, affecting ships only through business side delays and changes. When traversing maritime spaces, ship operations rely on limited business data and information systems. Thus, the primary concern with onboard cyber security surrounds operational systems. However, as interconnectivity becomes increasingly common and necessary, this distinction is quickly becoming outdated.

With billions of dollars worth of goods crossing the ocean every day, a close watch on what occurs on each ship and the proceedings of crews is a necessary part of the industry. All large commercial ships contain vital operational systems including global positioning systems, which track the position of each ship, automatic identification systems, which communicate with ports for ship identification purposes, and electronic chart display and information systems, which provide advanced navigation. Combined with a handful of other navigation and communication systems (including dynamic vessel positioning, NAVigational TEleX, and radar), these electronic networked systems constitute the conventional operational cyber attack surface area.

The most effective attack vector on traditionally networked ships is physical onboard intrusion. Intrusions onto ships and advanced at-sea piracy remain threats to physically based systems. Even docking at port can precede physical intrusion, as onboard systems can be infected with the injection of malicious software through careless use of USB-based storage devices. If chart display systems are tampered with, ships can be pushed off course, resulting in major delays at best and deliberate ship collisions at worst. Penetration testing of major chart manufacturer systems revealed multiple vulnerabilities that can be exploited relatively easily.

In addition to physical intrusion on individual ships, relevant operational subsystems are networked to each other with internationally standardized protocols, namely National Marine Electronics Association (NMEA) communication standards. The standardization of shipborne control networks under unified protocols means that an individual or group that can access one ship can likely already access an untold number of ships. The current industry standard, NMEA 0183, controls a variety of subsystems, including propulsion, steering, and global positioning systems. The shift from physical cable communication and intraship remote networking creates significant vulnerabilities. NMEA 0183 can be easily accessed through a variety of means, including physical computer-based attacks and, more recently, remote attacks. Remote network intrusion or phishing attacks can occur on modern vessels, but operational systems are traditionally best accessed through physical intrusion. This is why current cyber security guidance starts with the crew. These guidance principles are still upheld, but increasing connectivity has started to make them less relevant.

Risks of Autonomous Shipping

In recent years, new developments in autonomous ships have emphasized cost savings and logistical efficiency. First, autonomous ships offer major financial benefits, as crews account for 30 percent of current maritime shipping costs. Second, human error accounts for up to 96 percent of maritime accidents. This, coupled with improvements in energy efficiency and environmental concerns, makes autonomous ships an inevitable development in shipping. The International Maritime Organization has defined the development path of maritime autonomous surface ships in four degrees: automated processes, remote-controlled ships with onboard crews, remote-controlled ships with no onboard crews, and fully autonomous ships. The United Nations has already called for updated legal frameworks and rulemaking to accommodate the development of new ships and systems. But despite international attention and massive potential benefits, a future of fully autonomous ships creates even more security threats.

While the International Maritime Organization has been at the forefront of developments in autonomous ships and has been important in standardizing and guiding autonomous ships, it has lagged in understanding the cyber security risks. The future of autonomous shipping relies on interconnected networks, not only within ships, but also between ship and port. The development of remote-controlled systems means operational systems will be connected to information systems. This means the International Maritime Organization will have their work cut out for them, as regulation and guidance enforcement will be in the hands of port regulators and port authorities. Cyber security is already a large component of port security, but direct access to shipping operational systems will inevitably increase risk.

On the boats themselves, human-in-the-loop systems necessitate that a remote pilot have access not only to ship propulsion systems but also to external data collection and analysis systems. As an interim to full autonomy, semi-autonomous control with or without onboard crews revolves around the increased digitization and networking of almost all shipborne systems. More specifically, semi-autonomous ships rely not just on decision-making processing centers, but also on a robust sensor package that integrates information and operational systems. This includes voyage information, real-time navigation information, and object detection. The integration between situational awareness tools, voyage logistics systems, and ship propulsion systems has been traditionally provided by human pilots and onboard crew. Without a human pilot, however, these previously disconnected systems are routed through a decision-making processing unit, marrying information and operational. Integrating multiple systems through a central processing center increases the area in which an attack can occur. This highlights the importance of break once, break everywhere resistance.

Automation will significantly increase remote hijacking risk. International organizations will have to be aware of the massive amounts of information coming in and out from each ship and the risks associated with different port authorities and different boats. With crewless ships, the development of systems to ensure the safety of cargo and shipping assets will be paramount for effective maritime security. Furthermore, special care should be taken for different ships. The amount of information shared between larger ships with more complex systems will likely be greater than between smaller ships with fewer systems.

Connections between ship and control center are increasingly provided by the Long Range communication technique. Within the Long Range umbrella, Long Range Wide Area Network protocol has become the strongest candidate for novel ship networking. The Long Range Wide Area Network is a unique tool that allows for remote command and control, allowing for a center to track and evaluate ship movements from thousands of miles away with real-time connectivity. Additionally, the navigational challenges that rougher waters, like the Arctic, present are ones that Long Range Wide Area Network communication protocol is uniquely equipped to tackle.

Unfortunately, Long Range Wide Area Network communication is vulnerable to hijacking. Internet device communication through the network can be intercepted, decrypted, and spoofed. These methods are already known to attackers, giving malicious actors access to ship systems anywhere in the world. Moreover, internet devices are designed to augment and enhance existing systems. NMEA 0183 is currently being phased out for the more modern NMEA 2000 protocol. NMEA 2000-compatible and internet-enabled devices are increasingly common. However, NMEA 2000 appears no more secure than other existing ship communication protocols and exhibits the same issues as NMEA 0183. This means that not only can remote hijacking of communication packages occur but, in many cases, attackers also will be able to access operational systems like propulsion, steering, and ballasting. In the event that a ship is hijacked with no physical crew onboard, remote systems patching is the only possible way to deter or resolve potential cyber attacks.

Another emerging technology that could potentially replace Long Range techniques is SpaceXs Starlink system. Columbia Shipmanagement has begun to try out Starlink systems on vessels already, testing robust connections between information and operational systems through the internet. Because of the novelty of Starlink, cyber attack development is at a much earlier stage than it is with Long Range communication. However, Starlink has its own vulnerabilities. Satellite networks mean that global access would be theoretically possible given the right attack vector. With relatively simple and cheap off-the-shelf devices, researchers have already accessed Starlink-enabled devices, which in a maritime context could give attackers access to ship systems.

Impacts of Autonomous Cyber Security Risk

Systems that are interconnected will need to be protected differently than conventionally separated and relatively isolated systems. The capacity to defend the shipping industry from cyber threats no longer revolves around the crew alone, but also involves international standards, central planning, network vendors, and network administrators.

Current attack vectors on self-driving cars are a glimpse of possible effects on autonomous ships. The most visible threat is direct hijacking of ship propulsion and steering through access to operational systems. These threats are most apparent in second- and third-degree autonomous ships, where propulsion systems can be controlled remotely. Hijackers taking control of a ship and causing a major shipping delay through deliberate collisions or simply throwing ships off course would cost stakeholders billions of dollars. The blocking of Suez Canal traffic in 2021 cost $9.6 billion per day. A capable actor with malicious intent could feasibly do significantly more damage to even more trafficked areas like the English Channel. On ships with active crews, hijacking could lead to not only billions of dollars in financial loss, but loss of life as well.

Increasing the degree of autonomy on shipping shifts the threat environment. With fourth-degree autonomous ship routes, direct remote control of propulsion subsystems becomes more difficult. However, studies indicate that the more vulnerable subsystems in autonomous ships will be in their navigation systems. Intercepting and tampering with global positioning system communication or chart systems would not only give attackers access to up-to-date and specific information on ship whereabouts (increasing potential physical security risks) but would also give attackers the ability to replace input navigation data. Relative isolation between navigational systems and propulsion is impossible for fully autonomous systems. With fully autonomous ships relying on navigation data to move, faulty inputs or blocked data could lead to collisions or altered courses, resulting in the same hefty financial losses as direct hijacking.

New Guidance for New Threats

Increased cyber security vulnerabilities via autonomous ships are not an unknown development. Security frameworks are actively being developed by independent researchers, and many different actors are trying to do their part. To their credit, the International Association for Classification Societies, the Digital Container Shipping Association, and the International Chamber of Shipping have published their own studies and guidelines for autonomous cyber security. As recently as 2022, NATO published its own study on cyber security, including explicit analyses of information and operational systems, although it did not establish guidelines for autonomous ship development.

However, a major gap in guidance exists coming from the International Maritime Organization. As an organization under the United Nations, this body has a crucial responsibility to fulfill. The International Maritime Organization does publish cyber security guidance, giving a broad overview of potential issues in shipping. The most recent version of the organizations guidance contains two references to automation, both in the introduction. Updated International Maritime Organization standards between 2021 and 2022 do not include updated guidance for the automated shipping environment despite accelerating developments in autonomous ships occurring each year.

Staying ahead of the curve requires that the International Maritime Organization predict and adapt quicker than it historically has. The International Maritime Organizations 107th Maritime Safety Committee session convened in June 2023 and promised to discuss, among other things, issuing new cyber security risk guidelines for autonomous ships. New guidance has not been published yet, nor has the existing the information/operational distinction been reconsidered. Instead, the Maritime Safety Committee cyber risk management guidance doubles down on it. To combat cyber vulnerabilities, the International Maritime Organization should break away from the notion that information and operational will remain separate and mutually exclusive.

Understanding the convergence of information and operational technology will allow individual shipping companies and the industry writ large to better harden themselves against cyber attack. International Maritime Organization cyber guidance remains a series of recommendations. However, they can draw attention to the need for network encryption and the isolation of operation-critical instruments, thereby pushing the industry to improve its practices. The best case scenario would be for the International Maritime Organization Legal Committee to establish legal guidance with binding effects. At the very least, International Maritime Organization guidance can encourage more frequent risk assessment and emphasize the risks specifically associated with autonomous ships. If its cyber security guidance does not reflect an expansion in cyber attack vectors, the future of security in autonomous shipping is in dire straits.

Alex Li is a masters of international affairs student at the School of Global Policy and Strategy at the University of California, San Diego. His work and research have focused on conflict and national security, particularlythe intersection between industrial economies and war.

Image: U.S. Navy photo by Chief Mass Communication Specialist Roland Franklin

Continued here:
Digital Piracy Returns to Sea: Protecting Autonomous Ships from ... - War On The Rocks

Read More..

Chinese Programmer Ordered To Pay 1 Million Yuan For Using VPN – Slashdot

Amy Hawkins reports via The Guardian: A programmer in northern China has been ordered to pay more than 1 million yuan to the authorities for using a virtual private network (VPN), in what is thought to be the most severe individual financial penalty ever issued for circumventing China's "great firewall." The programmer, surnamed Ma, was issued with a penalty notice by the public security bureau of Chengde, a city in Hebei province, on August 18. The notice said Ma had used "unauthorised channels" to connect to international networks to work for a Turkish company. The police confiscated the 1.058m yuan ($145,092) Ma had earned as a software developer between September 2019 and November 2022, describing it as "illegal income," as well as fining him 200 yuan ($27). Charlie Smith (a pseudonym), the co-founder of GreatFire.org, a website that tracks internet censorship in China, said: "Even if this decision is overturned in court, a message has been sent and damage has been done. Is doing business outside of China now subject to penalties?"

Here is the original post:
Chinese Programmer Ordered To Pay 1 Million Yuan For Using VPN - Slashdot

Read More..

Barren County Deed Transfer Tax Report for the Week of October 2 … – WCLU

The following property transfers were recorded at the Barren County Clerks Office from October 2, 2023 to October 6, 2023. Tax information is not reported when money is not exchanged. Such instances include foreclosures, master commissioner deeds, divorce settlements, and transfers made within a family.

October 2, 2023

Elijah Neal & Martha D Neal to Larry Stephens, 2 parcels- Hiseville Road, $80.00.

William M Moorehead & Mallory L Mingus to Brent Chi Swain & Angela Ruth Swain, Lot 16 (0.812 Acres) Eagle Point Drive, $507.50.

Mary J Griffin, Estate of Mary Griffin & Griffin, Mary Estate to Joshua W Pierce & Chelsea Leeann Pierce, Lot 29 & 41 ( P3/64) Springview Subdivision, $320.00.

Dirk Patrick Steenbergen & Bethany Paige Steenbergen to Steenbergen Rentals LLC, 2 properties- Cedar Street & Walker Court.

Claudette K Snyder to Shelley Ranch & Land Sales LLC, Lot 10 & 11 ( P1/ 130) Hurst Subdivision, $21.00.

Richard Milby & Sharon Milby to John Kurt Frey & Laura Megan Frey, Multiple Tracts- Hutcherson Estate Subdivision, $450.00.

F Scott Chapman to GT Properties of KY LLC & G T Properties LLC, 1.13 Acres- Sunset Avenue, $39.00.

Rondall Timothy Francis & Karen H Francis to India Eve Wirt & Michael Eric Mudd, Multiple Lots (0.555 Acres) Central Avenue, $235.00.

Triple Cross INC to Tristan Isaac Alexander & Kayla Rose Alexander, Lot 6A ( P18/ 814)- Barren County, $217.00.

Paula G Cassady to Paula Gail Cassady Trust, Multiple Tracts ( P21/ 204) Herbert Turner Road.

Greg Gary & Joe Ann Gary to Joe Ann Gary, Lot #14 ( P6/432) Hidden Cove Subdivision.

Triple Cross INC to James Weston Mullins, 0.53 Acres- Stovall Road, $220.00.

October 3, 2023

Robert W Logsdon & Imogene Graves to Francis E Bartleson Living Trust & Bartleson, Francis E Living Trust, Lot #5 ( P13/ 374) Barren County, $40.00.

Francis E Bartleson Living Trust & Bartleson, Francis E Living Trust to Robert W Logsdon & Imogene Graves, Lot 4-2 ( 0.664 Acres)- Barren County ( P13/884), $40.00.

Robert W Logsdon & Imogene Graves to RSMills INC & R S Mills, INC, 2 parcels- Barren County (P13/884) ,$90.00.

October 4, 2023

Elizabeth Sheesley to North Green Improvements LLC, 2 Tracts- North Green Street, $115.00.

Loretta Price Underwood & Loretta Price to Christopher Wayne Underwood, Cory N Underwood & Cory Nicholas Underwood, 16.436 Acres- Deans Trace.

Estate of Jerry Wayne Underwood, Underwood, Jerry Wayne Estate, Cory N Underwood & Christopher Wayne Underwood to Michelle M Wheeler & Lynn G Wheeler, 16.436 Acres, Deans Trace,$800.00.

Ernest E Cowles to DMR Roofing LLC & D M R Roofing LLC, 5.339 Acres- Park City- Glasgow Road, $70.00.

K & M Services LLC & K&M Services LLC to Ryan Crist & Chaney Weick, 0.66 Acres ( Lot 11)- Barren County ( P21/971)

October 5, 2023

William D Uptegraff, Dana Uptegraff, Woodford L Gardner, Jr Trustee & Gardner, Woodford L, Jr Trustee to William D Uptegraff, Gardner, Woodford L, Jr, Trustee & Woodford Gardner Jr Trustee, 2 parcels- Bluff Springs Road.

Christopher L Caldwell & Julie R Caldwell to Christopher L Caldwell, Lot 62- Northside Estates.

K & M Services LLC & K&M Services LLC to K & M Developments LLC & K&M Developments LLC, Lot 10 (0.60 acres)- Barren County (P21/1971).

K & M Services LLC & L&M Services LLC to K & M Developments LLC & K&M Developments LLC, Lots 12 & 13 (1.34 Acres) Barren County (P21/971)

K & M Services LLC & K&M Services LLC to K & M Developments LLC & K&M Developments LLC, Multiple Lots- Barren County (P21/971).

James Ray Emerson & Vickie M Emerson to Timothy Combs & Tiffany Combs 0.582 Acres- Buck Creek Road.

October 6, 2023

Sharp Carts Real Estate Holdings LLC to City of Glasgow, Kentucky, Lot 1- Highland Glen Subdivision.

Jennifer K Lotter to Joseph S Lotter & Betty J Lotter, Lot 23- Hidden Cove Road.

Randall S Coulter & Jackie Coulter to William Travis Hardin & Angela Marie Hardin, Lot 8- Lakeside Subdivision.

Sydney Bunnell & Sue Bunnell to Ricky Long & Kellie B Long, Tract 10- Eagles Landing.

Judy K Pierce to Spencer S Benedict & Carrie P Benedict, 13.86 acres- Matthews Mill Road.

See more here:
Barren County Deed Transfer Tax Report for the Week of October 2 ... - WCLU

Read More..

Capex revival : 5 stocks from capital good and engineering sector; with upside potential of up to 35 % – The Economic Times

Synopsis

By ETMarkets.com

10 mins read, Oct 8, 2023, 12:12 PM IST

Capital goods and engineering companies had faced tough times for many years. This statement would be more applicable to companies which were making turbines for the power sector. But for a company which was into supplying plants and machinery for speciality chemical companies, the last couple of years have been good. Same goes for any company which has been taking care of what railways required, be it coach to engine or even engine part maker

Membership Benefits

Access the exclusive Economic Times

Stories, Editorial & Expert opinion

Complete Access with ET Prime

Experience your Economic Times newspaper, the digital way.

Clean experience

with minimal ads

Easy & distraction-free reading with 90% less ads

Sharp Insight-rich,

In-depth stories across 20+ sectors

1500+ Exclusive stories & analysis across sectors to help you stay informed

Get One Year Times Prime Subscription worth 1199 for free

Get One Year Docubay Subscription worth 999 for free

Stream award-winning international documentaries from more than 100 countries.

Member only Newsletters

Never miss a story that matters

Members Love Us

The stalwarts of the industry trust ET Prime for insightful analysis & unbiased thought pieces

Gift a story

Your membership includes Story Gifting Credits. Now gift exclusive stories to your friends & peers.

Comment & Engage

with ET Prime community

Communicate & build a connection with great minds of the industry

A trusted team of

Journalists & Analysts

Unbiased perspective & detailed reporting by our team of journalists who have in-depth knowledge and years of experience

Read the original:

Capex revival : 5 stocks from capital good and engineering sector; with upside potential of up to 35 % - The Economic Times

Read More..