Category Archives: Cloud Servers
Ford and ADT team up to prevent theft from vehicles – TechCrunch
Automaker Ford and ADT, a company that provides home and business security and alarm monitoring services, have launched a joint venture called Canopy that aims to address vulnerabilities in current vehicle security offerings.
Canopy will initially offer an aftermarket accessory that can be mounted onto a vehicle to monitor its surroundings and alert drivers of issues like theft or vandalism.
While built-in vehicle alarm systems help deter some thefts, theyre by no means foolproof. In 2020, the FBI estimated that $7.4 billion was lost to motor vehicle theft, which includes both the theft of vehicles themselves and their contents. Canopys product, which has been operating in pilots over the past 10 months with trucking companies in the U.S. and cargo vans in the U.K., aims to combine Fords vehicle camera systems expertise with ADTs monitoring service to help commercial and retail customers avoid vehicle theft.
Canopy is ADTs first foray into automotive security, and is a product of FordX, the automakers new venture incubator that collaborates with other companies to quickly build, acquire and pilot new transportation technologies. In 2018, FordX worked on Jelly, a dockless e-scooter sharing company, which was the basis for Fords acquisition of Spin. Canopy appears to be the next step in Fords strategy to expand its portfolio of scalable mobility solutions outside of its traditional business lines.
Canopys self-sticking accessory works with any vehicle make or model and is expected to be sold online and at various brick-and-mortar stores by early 2023. It relies on a stack of sensors, including camera, radar and acoustic sensors, to collect data about the vehicles surroundings. An operating system independent from the cars own then processes the data, and shares back to cloud servers via LTE or Wi-Fi. Any possible thefts will be reported to the vehicle owner via a mobile app or to one of ADTs 5,000 monitoring agents, according to Leah Page, VP of mobile security and strategic projects at ADT.
When you think about the element ADT brings to the product, its really about helping to bring in AI solutions, Page told TechCrunch. So thats knowing the difference between a bird going by and somebody breaching the cargo bed of your truck to steal something. Once that event happens it does come into ADT and then our monitoring agents know how to react. That can be anything from just alerting the owner or an emergency contact all the way through to alerting the police, depending on the situation.
Down the line, Canopy intends to release another monitoring system that integrates into any cars hardware and relies on that vehicles cameras and sensors to perform the same safety features. Ford will be Canopys first integration, but the aim is to make all of Canopys tech available to any automaker.
In order to make this offer really meaningful to customers, we had to do it in a way that was multi-make and would enable us to address the security concerns for the vehicles that are already out on the road today, Christian Moran, director of FordX and interim CEO of Canopy, told TechCrunch. Were looking at one solution that can run across a myriad of trucks and vans, which are our target vehicles to start in.
Canopy initially set out with a focus on commercial customers, thinking of both large fleets carrying priceless cargo and small business owners who have thousands of dollars worth of tools and equipment in the beds of their trucks and are often the victims of theft. Thats still going to be the first target for rollout beginning early next year. Throughout the pilots, however, use cases for the average consumer started to come up, as well.
We got tremendous feedback from people who put bikes or kayaks in the back of their truck or van while going out on the trail, and those items are very expensive so they want them to be protected, said Moran. In addition, although this was not one of our original features, we heard from a number of pilot participants that one of their favorite features was actually livestreaming around their vehicle when it was dark out at night. So imagine walking into a dark, empty parking lot and you can use the app to see around your vehicle.
Over the course of the pilots, Canopy ended up turning over evidence to vehicle owners of two different theft attempts, said Moran, adding that customers could use Canopys footage to work with police and insurance companies.
Together, Ford and ADT have invested a total of $105 million in the joint venture, with Ford chipping in $63 million and ADT $42 million. The money will be used to hire across the product, engineering and go-to-market teams in the U.K. and the U.S., as well as setting up the supply chain and logistics for the aftermarket product so it can scale over the next few years.
See original here:
Ford and ADT team up to prevent theft from vehicles - TechCrunch
Patent Awarded to Nanoprecise Sci Corp for its Automated Predictive Maintenance Solution – PR Newswire India
BANGALORE, India, Jan. 19, 2022 /PRNewswire/ -- Nanopreciseis proud to announce that the U.S. Patent and Trademark Office has fully issued a Patent for our AI-based Predictive Maintenance System, under U.S. Patent No. 11,188,065, titled, "System and Method for Fault Diagnosis and Prognosis for Rotating Equipment" on 30th November 2021. The Patent recognizes our continued development efforts towards bringing a process patent that involves ultra-low-power wireless sensors and cloud-based software that detects even small changes in the machine performance and predicts the remaining useful life of any industrial asset.
RotationLF,analyses complex machine health data automatically using a combination of AI and physics-based models to minimize learning cycles and provide fast return on investment. The incorporation of the CEEMDAN algorithm in to the RotationLF process greatly expands the capabilities of the software by analyzing large amounts of output parameters of the equipment, to identify anomalies and pinpoint faults that has the potential to cause downtime. The AI-based platform takes as little as 5 days to learn and creates a range-bounded baseline for each machine's performance. It identifies faults in real-time to predict failures and also reduces false alarms by up to 90%, compared to competitors.
The MachineDoctor sensor is installed on the rotating equipment and senses different parameters which are then analyzed locally for anomalies before being discarded or sent to the cloud for more intensive review. The cloud server processes the signal through the RotationLFsoftware which uses the most sophisticated CEEMDAN algorithm along with Wavelet Neural Network (WNN) to detect faults and predict the Remaining Useful Life (RUL) of the rotating equipment.
The patent is a significant achievement for Nanoprecise as it represents the high standard of recognition that Predictive Maintenance system being employed by Nanoprecise is unique. Nanoprecise strives to simplify the monitoring of industrial assets involved in the various complex manufacturing processes, with our patented signal processing algorithm, to help manufacturers maximise their uptime.
"We have helped countless asset-intensive organizations to reduce machine downtime and enhance performance & reliability of their assets," says Mr. Sunil Vedula, CEO of Nanoprecise Sci Corp. "It is an incredible achievement for us to be granted a patent that officially recognizes our innovation and initiative towards helping manufacturers achieve their maintenance goals."
"To have this unique technique recognised is an amazing accomplishment for us and provides us the opportunity to protect a ground-breaking innovation that has the potential to offer unparalleled benefits to our customers. This is a result of the continued commitment to innovation by our technical team and our relentless pursuit to help drive the industry 4.0 journey for our customers," says Graham Kawulka, Vice President Business Development, Nanoprecise Sci Corp.
Predictive Maintenance Solution from Nanoprecise
The solution facilitates last mile automation by allowing to be integratedwith leading horizontal and vertical technology stacks, via open APIs. It can also be deployed on cloud or on-premise servers. All of these factors allow for a simple plug & play, hassle-free deployment, without worrying about any extra IT infrastructure. Moreover, the automated AI-based analytics platform can be integrated to desktop computers or mobile devices to provide an end-to-end solution that offers peace of mind to all stakeholders.
Nanoprecise provides accurate prognostic and diagnostic solutions that predict the remaining useful life of any asset at any point during its lifetime, thereby empowering users with the right data across several industries.
Visit http://www.nanoprecise.io to know more
Media Contact:
Tanmay Mhatre[emailprotected]
Photo: https://mma.prnewswire.com/media/1729455/Globally_Patented_Technology.jpg
SOURCE Nanoprecise Sci Corp
View original post here:
Patent Awarded to Nanoprecise Sci Corp for its Automated Predictive Maintenance Solution - PR Newswire India
Recent Analysis on Cloud Hosting Service Market 2022-2028 Top Trends, Business Opportunity, and Growth Strategy LSMedia – LSMedia
The latest updated report of Cloud Hosting Service Market by In4Research provides key information by Top Players, Geography, End users, Applications, Competitor analysis, Sales, Revenue, Price, Gross Margin, Market Share, Import-Export, Trends and Forecast 2022-2028. The Market analysts authoring this report have provided in-depth information on leading growth drivers, restraints, challenges, trends, and opportunities to offer a complete analysis of the Global Cloud Hosting Service Market. The decision-makers or Industry professionals in Cloud Hosting Service business can use this report to plan effective growth strategies and prepare for future challenges beforehand.
Competitive Analysis of Cloud Hosting Service Market:
The Cloud Hosting Service market has been segmented by commodity type, end-users, technology, industry verticals, and regions. The in-depth research will allow readers to better understand well-established and emerging players in shaping their business strategies to achieve long-term and short-term goals. The report outlines a wide range of areas and locations where key participants could identify opportunities for the future.
Get the Sample Copy (Including FULL TOC, Graphs and Tables) of Cloud Hosting Service market report at: https://www.in4research.com/sample-request/65819
The Major Players Covered in Cloud Hosting Service Market Report are:
Cloud Hosting Service Market Segmentation:
The global market for Cloud Hosting Service is set to find a segmentation in the report that would be based on type and application. These segments have a better acceptance of various factors that can be taken into consideration to understand how the market can chart the future path.
Cloud Hosting Service Market Breakdown based on Product Type
Cloud Hosting Service Market Breakdown based on Application
Global Cloud Hosting Service Market Report is a professional and in-depth research report on the worlds major regional market conditions of the Cloud Hosting Service industry, focusing on the main regions and the main countries (United States, Europe, Japan, and China).
For more Customization, Connect with us at https://www.in4research.com/customization/65819
Cloud Hosting Service Market Research Methodology:
The study is all-inclusive of research that takes account of recent trends, growth factors, developments, competitive landscape, and opportunities in the global Cloud Hosting Service Industry. With the help of methodologies such as Porters Five Forces analysis and PESTLE, market researchers and analysts have conducted a large study of the global Cloud Hosting Service Market.
The analysis would provide data on the closest approximations to the market leaders/new entrants of the overall industry volume numbers and the sub-segments. This research will help stakeholders understand the business landscape, gain more information, and plan successful go-to-market strategies to better position their companies.
Cloud Hosting Service Market landscape and the market scenario include:
The Cloud Hosting Service industry development trends and marketing channels are analyzed. Finally, the feasibility of new investment projects is assessed, and overall research conclusions offered.
Ask Your Queries to our Analyst regarding Cloud Hosting Service Report at https://www.in4research.com/speak-to-analyst/65819
Actionable and high-quality Premium Insights by In4Research:
To Buy Full Report, Connect with us at: https://www.in4research.com/buy-now/65819
For More Details Contact Us:
Contact Name: Rohan
Email: [emailprotected]
Phone: +1 (407) 768-2028
Browse More Articles
Automotive Electric Vacuum Pump Market Size 2021 Growth Share, Industry Dynamics, Top Trends and Regional Analysis
New Update on Automobile Electronics Market 2021 Analysis by Competitive landscape, Industry Insights and Forecast to 2027
COVID19 Impact on Automated Testing Software Market 2021 Industry Insight and Growth Strategy by Business Players
COVID19 Impact on Asset Tags Market 2021 Industry Insight and Growth Strategy by Business Players
Google Project Iris AR Headset in the Works, May Feature In-House Processor: Report – Gadgets 360
Google is reportedly working on an augmented reality (AR) headset that could be launched in 2024. The headset, a part of the company's Project Iris', is said to feature an in-house processor from Google. Tech giants Meta and Apple are also developing their own wearable AR technology. Unlike Apple's upcoming mixed reality headset that is expected to feature two processing chips for on-device rendering, Google's offering will reportedly offload some graphics rendering to the company's cloud servers.
According to a report by The Verge, citing people connected to the project, Google is working on an AR headset that is powered by a custom processor developed by the company and could eventually run on a custom operating system developed by the company. The company is yet to reveal any details of its under-development AR headset, including whether it will be launched under the Pixel branding.
The AR headset from Google is said to feature outward-facing cameras, and users will be looking at a screen with a ski goggles design, according to the report, unlike the company's older Google Glass design that was modelled on spectacles. Meanwhile, the early prototypes do not need to be connected to a power source, according to the report which states that 300 Google employees are currently working on the project, but hundreds more will reportedly be hired.
Google is not the only major tech company working on AR wearable technology Apple is reportedly working on its own mixed reality headset that could arrive in 2023, while Facebook is also tipped to launch its headset later this year as part of Project Cambria'. However, Google's AR headset is tipped to launch after both competitors and could arrive in 2024, according to the report.
Meanwhile, a recent report suggests that Apple's upcoming mixed-reality headset may be delayed to 2023. The company's AR/ VR headset, which is codenamed N301, has been in development since 2015. It was previously expected to launch in 2021, with availability this year. However, according to Bloomberg, Apple could push the launch to the end of 2022 the headset could be available by 2023, and Apple is considering a price point higher than $2,000 (roughly Rs. 1,49,000) according to the report.
Go here to see the original:
Google Project Iris AR Headset in the Works, May Feature In-House Processor: Report - Gadgets 360
Cellular connectivity: the final piece of the IoT puzzle – ITProPortal
Cloud is helping almost every business rewrite its story. From smarter collaboration and faster innovation, to lowered operating costs and optimized business processes, cloud is knocking down the siloes. Digital transformation delivers the tools that assist with quicker, more accurate decision-making. Yet the path to business value isnt the same for everyone.
Some are focusing on Infrastructure-as-a-Service, others Platform- or Software-as-a-Service. There are varying degrees of familiarity. Whether its a crucial foundation upon which entire organizations are built, or a newly integrated stepping stone to streamlining, safeguarding and boosting business plans, cloud has arrived.
Migrate, optimize and innovate is the mantra, with the Internet of Things adding another layer of digital communication to endpoints that would otherwise be redundant. With cloud and IoT solutions, the fabric of commerce becomes smarter, more responsive, and ready for a hybrid future.
Yet cloud and IoT are only part of the picture. Theres a weak link. The individual endpoints - often sensors - collect the data and push it to the cloud, where data processing, insight mining and smart decision making takes place. Then commands are issued back to the endpoints, key actions are performed and analyzed based on inputs.
With all this already happening in the cloud, it makes sense to bridge the gap with cellular connectivity. And this was the idea that established EMnify in 2014, marking the birth of one of the first connectivity providers with a cellular platform in the public cloud. Seven years on, and cloud-native cellular IoT connectivity has matured, its fast and efficient, and it is accelerating the impact of the IoT.
Despite careful planning and release, many IoT deployments have failed to achieve desired outcomes. Businesses have been unable to harness the full potential of cloud, with bottlenecks and latency issues stifling the flow of information and reducing the quality of decision making.
Thats because connectivity was still being provided through traditional operator cellular contracts and connections. Even though applications, software and systems were hosted in the cloud, cellular connectivity was the bridge. And it was creaking.
Today, the vast majority of IoT platforms are hosted in the cloud, with most data transfers and storage also undertaken there. Technology has evolved to offer an end-to-end cloud-native network architecture, allowing enterprises to fully utilize the agility, scalability, resilience, elasticity and economies of cloud.
When businesses move beyond traditional cellular contracts, they can overcome the limitations of outmoded connectivity models. Gone is the inflexibility. Gone are the bottlenecks. Theres no more needless expense and the obstacles fall away, accelerating IoT time-to-market and time-to-revenue. With a cloud-native ecosystem, workflows are transformed into plug-and-play environments, with no requirement for restrictive contracts or troublesome hardware-based APIs.
Of the many immediate benefits that a business can enjoy when they choose cloud-native connectivity, the key advantages are self-service, better integration, low latency connectivity, a cellular network without borders, and substantial cost savings.
With cloud-native cellular connectivity, everythings self-service. You can start right away, and there are no administrative burdens to slow down progress. There are no contracts to sign, no tickets to open and no contractual commitments. Instead, its all taken care of with automated workflows.
In terms of integration, things couldnt be simpler. Cloud-native connectivity makes it easy to establish connections between devices, applications and systems. This results in improved operational efficiencies and heightened security. Plus, the connectivity solution can easily be integrated into your own and any third-party applications and cloud services in your stack.
Latency isnt an issue, either. Youll enjoy reliable, low-latency connectivity to a cloud-native, highly reliable core network that reaches around the globe. Instead of routing data to the cellular operators home country, the best option is selected, based upon each individual situation. Data is routed directly to the closest cloud region, which not only reduces latency, but also reduces device energy consumption, extending battery life and improving service availability.
With a global cellular network, its easy to scale up across national and network borders without the need to source from different vendors. Thats the beauty of cloud-native cellular IoT connectivity. Even on a per-country basis, multiple networks can be accessed through one global IoT operator, allowing management of all connectivity aspects in just one single platform.
If the improvements in performance are not enough, its cost-effective too. Efficiencies of cloud translate into potential cost savings, with microservices, network function virtualization and software-defined networking features all playing a part in managing costs. With access to these tools, networks become more responsive and cost-effective to manage, provision, deprovision and troubleshoot through software solutions. Not only is responsiveness increased, but processing power is only when required, which reduces demands on hardware, and saves disk space, energy and cost.
Traditional operator contracts and connections just dont work well within IoT operations. Where they create bottlenecks, end-to-end cloud-native connectivity overcomes barriers and creates opportunities. With cloud-native connectivity, theres no more intensive IT administration, or maintenance of on-premise servers, networks and virtualization platforms, which requires specific training and technical skills.
Operational inefficiencies can also be reduced significantly when transitioning from a private, physical server hosted within an organization or data center, towards a comprehensive cloud platform. Connectivity choice is one of the most far-reaching decisions in the IoT journey of any business. Its vital that you have the right underpinnings in place, alleviating overheads, expenses and administration pressure, allowing the business to focus on its core competencies, creating outstanding IoT solutions, while a cloud provider takes care of cellular connectivity.
Frank Stoecker, CEO & co-founder, EMnify
See original here:
Cellular connectivity: the final piece of the IoT puzzle - ITProPortal
Cyber Security in 2022: What Should You Know? – GISuser.com
Every year, cyber threats keep on increasing and becoming harder to prevent. This statement can be supported by the number of data breaches reported in 2021. According to Identity Theft Resource Center (ITRC), there were 1,291 data breaches reported from January to September 30, 2021.
In 2021, most hackers took advantage of the new vulnerabilities created by remote and hybrid working infrastructure. This saw many companies experience data breach incidents, with DDOS and ransomware attacks being the common data breaches reported.
As we enter 2022, it seems like cybercriminals are not slowing down when it comes to breaching business networks. This has forced cybersecurity leaders to start strategizing on protecting their businesses this year.
The U.S Department of Labor predicts that there will be over 3.1 million new cybersecurity jobs created by 2025. Still, experts believe that we will face a deficit of at least 1 million qualified professionals to help in performing different types of vulnerability assessments. This is a major cause for concern as organizations will need to find ways to prevent this shortfall to ensure that they can function efficiently when it comes to network security practices. Its time we begin to teach the next generation of students how to protect themselves online and take responsibility for protecting personal data, especially in light of recent events such as the Facebook-Cambridge Analytica scandal, which involved 87 million users.
With that said, businesses need to evaluate their security strategies and make the necessary adjustments carefully. As businesses formulate new strategies to safeguard their IT infrastructure from ever-evolving cyber threats, here are cyber security trends to expect in 2022.
Artificial intelligence (AI) is revolutionizing the cybersecurity space. It is no longer a distant issue that will affect enterprises in 2022 and beyond; it has already begun affecting businesses today. The continuous miniaturization of technology such as IoT, mobile devices, wearable tech, etc., has created an environment where more devices are connected to one another via the internet than ever before. This has increased the surface area for possible cyber-attacks.
AI cybersecurity solutions are becoming more prominent as they can execute more security tasks faster, unlike humans who can be affected by something known as human error. They can scan billions of records in seconds, giving organizations excellent visibility into their networks.
The next wave of cybersecurity technology will use machine learning algorithms designed to support and augment human activities rather than replace them. This technology allows one to organize data in a way that makes it easy for humans to interpret and analyze it.
Humans can benefit from the technologies because their algorithms can digest massive amounts of raw data, look out for trends or anomalies, make decisions based on what is discovered, and share new insights with other security systems without human oversight. With all these benefits, machine learning cybersecurity solutions will empower organizations to combat cyber threats effectively.
As we enter 2022, there is an increased demand for advanced cybersecurity. One area of this demand is developing tools that can respond autonomously to cyber-attacks without human oversight. The market for unsupervised machine learning technologies will experience a kind of boom as organizations embrace it as a way to lower their risk exposure and improve their flexibility, efficiency, and speed when it comes to responding to security incidents.
Quantum computing has been around for some time now, but many people are still unaware of its potential benefits. According to MIT Technology Review, quantum technology may allow attackers to decrypt nearly any code with little effort. Considering the amount of data stored by governments and companies online today, quantum computers could enable hackers to have an unprecedented ability to decipher virtually every encryption key protecting sensitive information in mere hours.
This is a major cause for concern as governments and companies will need to speed up their transition from cryptology methods used today to those that make use of quantum technology before its too late. Quantum cybersecurity is the only way forward if we want to protect our online data effectively.
As edge computing takes center stage due to its ability to process data quickly without compromising its integrity, advanced cybersecurity technologies will emerge to protect data from being hacked or tampered with in transit. Secure edge computing enables organizations to keep their data in a close to the action environment and analyze it in real-time without compromising application performance. As a result, it becomes easier for companies to ensure the authenticity of data between sources and targets across multiple domains, including mobile devices, IoT sensors, cloud servers, and even other remote data centers.
Blockchain 2.0 technologies are the next wave of secure decentralized applications that will allow users to tap into blockchains capabilities without prior knowledge of coding languages. This new generation focuses on functionality rather than anonymity, enabling developers to build apps for specific use cases like elections, supply chains, property records, banking services, and more.
View original post here:
Cyber Security in 2022: What Should You Know? - GISuser.com
The opportunities and challenges of data center industry in 2022 – Analytics India Magazine
Data centers play a critical role in driving the modern economy. However, the exponential rise in data centers in lock step with the massive shift to cloud computing has taken a toll on the environment.
Taking cognisance, the technology community is mulling ways to offset the trail of carbon footprints data centers leave in its wake. Here, we discuss the challenges data centers pose in 2022:
According to Statista, the energy requirement for traditional data centers has declined from around 97.6 terawatt hours in 2015 to 50 terawatt hours in 2019. On the other hand, hyperscale data centers energy demand doubled during the same period.
Data centes are energy guzzlers. In light of their higher power consumption, many companies are building their data center programs on the back of green technologies. According to The 2021 State of the Data Center Report by AFCOM, 65% of companies are turning to renewable energy sources. 20% of these companies have an active renewable energy strategy and many are within the three-year range of deployment.
The data center industry was badly hit by the supply chain disruption brought on by the pandemic. Labour shortage and the undersupply of equipment have caused delay in the development of new facilities and impacted refresh cycles of data centers. Companies are purchasing equipment well in advance and also using mergers and acquisitions to overcome the challenge. 2021 was rife with supply chain deals.
Panasonic acquired Blue Yonder for USD 7.1 billion in April, 2021 for the autonomous enhancement of the whole supply chain. In September 2021, Project44 acquired Convey to upgrade their last-mile connectivity.
Experts believe 2022 will also see a lot of M&A activity to ensure the supply of critical components for data centers.
The data center industry is gearing up for broader adoption of liquid cooling tech in 2022. The demand from powerful new hardware for AI workloads, pressure to eliminate water use in cooling servers, and also the progress of liquid cooling tech are prompting an overhaul of the current systems.
Microsoft has already started using immersion-cooled servers in production on its campus in Quincy, Washington. The company had been testing cooling technology used in bitcoin mining facilities. Here, servers are dunked in tanks of cooling fluid to manage rising heat.
We are the first cloud provider that is running two-phase immersion cooling in a production environment, said Husam Alissa, principal hardware engineer, Microsofts data center team.
In November, Digital Realty also started offering liquid-cooled servers in Digital Loyang 1 (SIN11) facility, Singapore and slashed the power consumption to up to 29 per cent compared with the conventional air-cooled servers.
Advancements like Metaverse calls for dense compute, varying latencies, and massive storage requirements. Some applications might also require proximity to dense population centers. The infrastructure needed to support concepts like the Metaverse translate to the demand for more physical locations offering ultra-low latency.
AI models are becoming big and complex. Web3 and blockchain rely heavily on traditional cloud and data centers.
The Joint Parliamentary Committee (JPC) has recently adopted the report on the Personal Data Protection Bill 2019, and is expected to be tabled in the Parliament soon. It can change the way data center companies operating in India.
A mandate on data localization will be a massive boost for local service providers. The Bill is also expected to generate thousands of new jobs for IT specialists and data engineers.
According to a Savills India report, 5G, IoT, AI and Cloud is expected to generate a demand of 15 to 18 million square feet for data centers. Companies in India are realising the potential of edge data centers. Tier-II cities like Ahmedabad, Coimbatore, Bhubaneshwar, Jaipur, Kochi, Nagpur, Vizag, Lucknow is expected to see massive investments in this space.
Read the original:
The opportunities and challenges of data center industry in 2022 - Analytics India Magazine
The rising threat of cyber criminals targeting cloud infrastructure in 2022 – Help Net Security
In the world of cybersecurity, combating threats is like playing endless, hyper-advanced, multidimensional Whack-A-Mole: new threats are always emerging, often from unexpected sources, and trying to keep up can feel impossible.
The threats are constantly shifting, subject to trends in cryptocurrency use, geopolitics, the pandemic, and many other things; for this reason, a clear sense of the landscape is essential. Below, youll find a quick guide to some of the most pressing threats of the coming year.
For threat actors, there is a simple calculus at play namely, what method of attack is a) easiest and b) most likely to yield the biggest return? And the answer, at this moment, is Linux-based cloud infrastructure, which makes up 80%+ of the total cloud infrastructure. With cloud adoption increasing because of the pandemic, this has the potential to be a massive problem.
In just the last few months, ransomware gangs like BlackMatter, HelloKitty, and REvil have been observed targeting Linux via ESXi servers with ELF encryptors. And we have recently seen the PYSA ransomware gang adding Linux support. Meanwhile, experts are identifying new and increasing complex Linux malware families, which adds to the already-mounting list of concerns. Working pre-emptively against these threats is more essential than ever.
Over the last year, weve started to see nation-state hackers target vulnerability researchers, attempting to acquire their zero-days. These attacks were, thankfully, unsuccessful, but that is little cause for celebration. These attacks will undoubtedly continue into 2022 and potential targets parties must remain vigilant. Information, tools, and threat intel belonging to private sector security companies is of ever-increasing interest to cybercriminals. Accordingly, increased value will be placed on offensive research products, which will in turn become a bigger target for attackers.
Information is a crucial target, but the fact remains that many cloud attacks are purely financially motivated. As we enter 2022, we can expect a continuation of the two primary methods of monetization on the part of cybercriminals: cryptomining and initial access brokerage (IAB).
Each method comes with its own advantages and disadvantages. With cryptojacking and cryptomining, profit can be realised in real time if an attacker can remain undetected in the cloud environment. On the IAB side, it may take longer for an attacker to achieve their desired profit. At the same time, IAB is a more risk-averse approach: it doesnt matter how long their customer persists in the cloud environment. As long as cryptomining remains lucrative, crypto attacks will persist, as will the initial access brokers who can enable these activities.
The last year has seen a drastic uptick in hackers targeting individual employees. Often, these hackers will attempt to recruit these employees for insider efforts. Given the record number of resignations in the technology sector in 2021, which indicates high levels of employee dissatisfaction, internal defection is now more than ever a serious, increasing risk.
Supply chain attacks are not as frequent as the ones outlined above, but they have the potential to cause more harm (look no further than the 2020 SolarWinds hack for proof). The one-to-many opportunity that a successful supply chain compromise affords makes it an attractive option, one more than worthy of attackers time and resources. For this reason, we believe 2022 will see more software supply chain attacks perpetrated by both criminal and nation-state actors.
No one can predict with perfect accuracy what disasters might loom on the horizon, but by studying the recent past we can prepare ourselves to defend against whats most likely coming. 2022, in that sense, will be like any other year: cybercriminals will attempt to break through, while their would-be victims, deploying advanced technology and the best threat-analysis available, will attempt to stop them. Heres to hoping the good guys win.
Read the original post:
The rising threat of cyber criminals targeting cloud infrastructure in 2022 - Help Net Security
Strata Identity Hosts Complimentary Webinar Featuring ESG Analyst on Identity and Policy Management for Multi-Cloud in 2022 – Business Wire
BOULDER, Colo.--(BUSINESS WIRE)--Strata Identity, the Identity Orchestration for multi-cloud company, announced today it will host a webinar featuring Jack Poller, Analyst for Enterprise Strategy Group (ESG) on identity and policy management challenges in a multi-cloud world.
WHO: Analyst Jack Poller covers Identity and Data Security for ESG. Drawing on more than 25 years of industry experience, Jack's expertise spans a broad range of systems, storage, networking, and cloud-based products and markets. Prior to joining ESG, Jack held marketing positions at storage and networking startups. He is also a software and hardware engineer, and has developed multiprocessor workstations and servers, 3D graphics, storage and networking systems.
WHAT: The reality of 2022 is that organizations live in a multi-cloud world. Todays hybrid mix of on-premises, SaaS, and public cloud infrastructures creates new unprecedented challenges for effectively managing identities and policies. In this webinar, Jack Poller will present new research findings from ESG on the leading multi-cloud identity management issues facing organizations. You will learn:
The top five unexpected ways sensitive data is exposed through identity The hidden risk that a lack of passwordless MFA access for key services poses How to enforce consistent security across data center and public cloud environments Why providing secure access to distributed environments for a remote workforce is critical
WHEN: Jan. 20, 2022 at 1:30pm EST
WHERE: This conference is accessible online with confirmed registration.
HOW: To register, visit this link. To schedule a conversation with Strata Identity, contact Marc Gendron at marc@mgpr.net or +1 617.877.7480.
About Strata
Strata is pioneering the concept of Identity Orchestration for distributed, multi-cloud identity. The Maverics Identity Orchestration Platform enables enterprises to seamlessly unify on-premises and cloud-based authentication and access systems for consistent identity management in multi-cloud environments. Stratas distributed approach to identity enables organizations to break decades-old vendor lock-in, preventing a broader transition of enterprise workloads to the public cloud. The companys founders co-authored the SAML open standard for identity interoperability, created the first cloud identity services, delivered the first open-source identity products, and are now building the first distributed identity platform. For more information, visit us on the Web and follow us on LinkedIn and Twitter.
ISG to Conduct Study on Private and Hybrid Cloud Providers – StreetInsider.com
Get inside Wall Street with StreetInsider Premium. Claim your 1-week free trial here.
ISG Provider Lens report will examine the top providers of managed hosting, hyperconverged systems and other services
STAMFORD, Conn.--(BUSINESS WIRE)--Information Services Group (ISG) (Nasdaq: III), a leading global technology research and advisory firm, has launched a research study examining providers of private and hybrid cloud services targeted to enterprise clients.
The study results will be published in a comprehensive ISG Provider Lens report, called Next-Gen Private/Hybrid Cloud Data Center Solutions & Services, scheduled to be released in June. The report will cover a range of private and hybrid cloud services hosted in data centers.
Enterprise buyers will be able to use information from the report to evaluate their current vendor relationships, potential new engagements and available offerings, while ISG advisors use the information to recommend providers to the firms buy-side clients.
The new report will look at ways private and hybrid cloud providers are helping enterprise clients achieve their business goals, said Jan Erik Aase, partner and global leader, ISG Provider Lens Research. Private and hybrid cloud providers are an important piece of many enterprises IT infrastructure, he said. These providers free up enterprises resources to focus on the core business, while offering secure and reliable cloud services.
ISG has distributed surveys to more than 400 private and hybrid cloud providers. Working in collaboration with ISGs global advisors, the research team will produce five quadrants representing the services the typical enterprise client is buying in the private and hybrid cloud space, based on ISGs experience working with its clients. The five quadrants that will be covered are:
The report will cover the hyperconverged systems and hybrid cloud management platform markets on a global basis and the managed services, managed hosting and colocation services markets in the U.S., the U.S. Public Sector, Brazil, Germany, the Nordics, Switzerland, the U.K., Australia, the Benelux countries, France, and Malaysia/Singapore. ISG analysts Shashank Rajmane, Pedro L. Bicudo Maschio, Ulrich Meister, Wolfgang Heinhaus, Ian Puddy, Rohan Thomas, Angus Macaskill, Bruce Guptill and Richard Marshall will serve as authors of the report.
An archetype report will also be published as part of this study. This report, unique to ISG, is the study of typical buyer types of private and hybrid cloud services as observed by ISG advisors.
A list of identified providers and vendors and further details on the study are available in this digital brochure. A separate brochure for the U.S. Public Sector is also available. Companies not listed as private and hybrid cloud providers can contact ISG and ask to be included in the study.
About ISG Provider Lens Research
The ISG Provider Lens Quadrant research series is the only service provider evaluation of its kind to combine empirical, data-driven research and market analysis with the real-world experience and observations of ISG's global advisory team. Enterprises will find a wealth of detailed data and market analysis to help guide their selection of appropriate sourcing partners, while ISG advisors use the reports to validate their own market knowledge and make recommendations to ISG's enterprise clients. The research currently covers providers offering their services globally, across Europe, as well as in the U.S., Canada, Brazil, the U.K., France, Benelux, Germany, Switzerland, the Nordics, Australia and Singapore/Malaysia, with additional markets to be added in the future. For more information about ISG Provider Lens research, please visit thiswebpage.
A companion research series, the ISG Provider Lens Archetype reports, offer a first-of-its-kind evaluation of providers from the perspective of specific buyer types.
About ISG
ISG (Information Services Group) (Nasdaq: III) is a leading global technology research and advisory firm. A trusted business partner to more than 700 clients, including more than 75 of the worlds top 100 enterprises, ISG is committed to helping corporations, public sector organizations, and service and technology providers achieve operational excellence and faster growth. The firm specializes in digital transformation services, including automation, cloud and data analytics; sourcing advisory; managed governance and risk services; network carrier services; strategy and operations design; change management; market intelligence and technology research and analysis. Founded in 2006, and based in Stamford, Conn., ISG employs more than 1,300 digital-ready professionals operating in more than 20 countriesa global team known for its innovative thinking, market influence, deep industry and technology expertise, and world-class research and analytical capabilities based on the industrys most comprehensive marketplace data. For more information, visit http://www.isg-one.com.
View source version on businesswire.com: https://www.businesswire.com/news/home/20220114005084/en/
Press:
Will Thoretz, ISG+1 203 517 3119will.thoretz@isg-one.com
Erik Arvidson, Matter Communications for ISG+1 617 755 2985isg@matternow.com
Source: Information Services Group, Inc.
Visit link:
ISG to Conduct Study on Private and Hybrid Cloud Providers - StreetInsider.com