Category Archives: Internet Security

Facebook didnt have to be this way – BusinessLine

Why and when did you think of writing this book?

I can give you the exact date. August 27, 2015. That was when I saw on my newsfeed a post by Mark Zuckerberg. A billion people had been on Facebook the day before. I had been looking at Facebook for almost a decade before that, and knew what it was trying to do. But the idea that a billion people, such a big percentage of the world, was on that one network on the same day is a lot different from, say, watching the World Cup. And I realised Zuckerberg was doing something no one had done before. And I figured I had to write this book and tell that story; how that happened; who they were; and what it meant.

But did your hypothesis change by the time you finished the book?

Yeah, dramatically. I had done a book about Google earlier. It worked very well. So, I thought Id do it the same way Id get Facebook to give me access to the employees and they would not be able to control what Id write or even read it before when I was finished. It took me a while to convince Facebook, but I finally did. And I started almost a year to the day after that first post. I started in 2016 and went to Nigeria with Mark Zuckerberg. A couple months later, the election happened in the US, and everything changed for Facebook. All of a sudden, the criticisms that had been festering exploded and Facebook entered a period where it was under extreme criticism and had to own up to mistakes that it made. So, it really did change the book a lot and changed the way I had to report the book, a lot.

What is the most significant change that happened over the course of writing the book?

The biggest change was the narrative switch from this success story basically, to one where you had to examine how they got to that success and what decisions they made to this amazing growth a dangerous thing. How did that happen? It was playwright Anton Chekov who said that if in the first act, you have hung a gun on the wall, then in the following one it should be fired. When I was reporting the book, these guns were going off, so I had to go back to Act One and see where the guns were planted. So that was how the book was done.

But access to the company can also come with riders...

There was no problem at all. There was no compromise. I just had this benefit of access and obviously, Im able to tell when Im being spun when theyre not telling me the whole truth. I was under no obligation to Facebook. It was information I wanted. There would have been compromises if I was gullible and had taken everything they said at face value. But Id like to think that I know how to judge the information I get.

To some, Facebook is the best thing to have happened to technology in a long time. And to some others, it is the worst. What are your learnings?

I certainly wouldnt call Facebook the best thing that happened to technology. Look at the arc of history. I started writing about technology just as the personal computer revolution was happening. There were great companies built on that. And then I looked at the Internet, and great companies were built on that. And now theres the social revolution and Facebook, which was built on that, is for all its problems a great company.

But the difference is the later you get, the faster companies have the opportunity to grow and the more pervasive they become, because in technology one thing doesnt happen and the next thing comes. At each turn of the wheel, things get bigger and more powerful, affect people more, and take more peoples lives and change peoples lives more, because theyre built on the previous advance. So, the personal computer industry gets computers in the hand; the Internet connects all the computers; and the social revolution connects all the people each, happening on top of the other, becomes more powerful.

So, each company winds up having a bigger influence on all of us. Each generation gets a bigger set of weapons or tools. So in a way, the story of Facebook isnt just the story of Facebook, its the story of where technology is.

There are reasons to believe the sort of social experiment Facebook has introduced has taken us in some wrong directions, which even Facebook hasnt imagined it would...

I like the idea that you call it an experiment. Because obviously, they didnt intend to say this was an experiment. They said this was a business. This is our vision. But it really was an experiment. And in experiments you dont know whats going to happen. So, you have a responsibility. When youre doing something so profoundly different and important and do not treat it like an experiment, youre in trouble. Because its the real thing and you should try to anticipate the negative consequences that can come of what you do. Thats what Facebook did not do. Thats what Mark Zuckerberg, in particular, didnt want to consider or would brush off saying he would deal with it later.

In the book, I describe instance after instance where Zuckerberg wasnt interested in anticipating and dealing in advance with the potential consequences. So, in the past three years, they have had to apologise for not doing that. They say they are going to try to do that now. But because they didnt run it with the understanding that Facebook is real and not an experiment, weve had to suffer for their mistakes.

How much of an overlap is there between Zuckerberg the person and Facebook, his product? If Mark is a product, does it look like FB?

You cant pull them apart. Its like weaving a thread into a fabric. If you pull the Mark Zuckerberg thread from Facebook, I dont think you have anything. Facebook is Mark Zuckerbergs image. In the book I talk about how he roped in a few people, in 2011-2012, who tried to figure out what the values were and the person in charge of it was a young woman named Molly Graham. She was the daughter of Donald E Graham, who was at the time, CEO of The Washington Post. She said Mark was the value. In order to understand the values of Facebook, I had to understand the values of Zuckerberg. And those are the same values. You go to Facebook headquarters, and you see all these posters that say move fast and break things, what would you do if youre not afraid?, etc. These are all projections of Marks thinking. So, in the Venn Diagram of Mark Zuckerberg and Facebook, its a pretty complete overlap.

Critics say Zuckerberg is very slow in trusting people. A lot of people in his generation, allegedly, seem to be cool about sharing. Does this psychology reflect in the overall character of Facebook?

Thats an interesting idea. It is true that Zuckerberg is slow to trust people. And to this day, for all important jobs, he relies on people hes known for a long time. Take the coronavirus; the person at Facebook in charge of health is the one who literally had pizza with Zuckerberg on February 4, 2004, when Facebook was launched. So that shows. The irony is that while he is slow to trust others, he had this vision for the world where everyone should trust each other to share their information. And then you should trust Facebook with that information. So, I think what happened was he took a look at his generation and felt, yes, theyre ready to share, but when it came to him personally trusting, not so much.

Given its ubiquity and grand influence, we can say that our society is being curated by Facebooks algorithms today. Do they realise the influence and are they concerned about it?

Facebook at certain points became interested not exactly concerned in this. Thats when they did the famous mood study, which I write about in the book. They tried to find out whether people would be in a better mood if their friends posted positive things on Facebook or vice versa. They did an experiment on that, and drew a lot of criticism for tampering with peoples moods. But thats exactly what it does. It has the unexpected intent of driving us to outrage. The way the algorithms work is that we engage more with sensational things. Its been well documented that fake news or make-believe stories get far more engagement than real stories from real publications. Thats just a consequence Facebook originally embraced that things can go viral on Facebook and they thought that was good, but they didnt realise until recently they had to deal with it. This could be corrosive to society.

There is criticism that you have ignored data mining practices of Facebook.

I could have gotten to a lot of places the book is over 500 pages but I still could not be right about everything. I dont give a detailed analysis of how Facebook does that (data mining). This book is a story, and I did talk about that. But its not a guide to how Facebook does data. Im not going to be putting charts about where all the information comes from. Even Zuckerberg doesnt know where the information comes from. But I talked about how he went to Congress, and they had questions about exactly that. He didnt know the answer.

After the Cambridge Analytica scandal and all the controversy around political advertising on Facebook, whats the future of FB going to look like? What are the solutions to its maladies?

I dont have the solutions. I dont think Zuckerberg does either. What I learned while writing the book is that Facebook didnt have to be this way. Facebook, as we know it, is shaped by a number of decisions, and many of them were taken recklessly or certainly without regard to how this would have unintended consequences. Its so difficult to find a solution, because they painted themselves into a corner by creating such a product. Its like saying the Internet was built without thinking too much of security, and now its really difficult to get good Internet security. People inside Facebook were warning about this as it happened. And Zuckerberg went ahead and made a decision, figuring you could fix things later on.

So, what should be a consumers approach to Facebook today?

Title: Facebook: The Inside StoryAuthor: Hardcover: 592 pagesPublisher: Blue Rider Press (25 February 2020)Price:

Just in the past few weeks, because of coronavirus, our world has changed so much and in a strange way, Facebook has become more useful. Its better equipped to handle misinformation about coronavirus and more responsible in being proactive in spreading good information about the virus. So, this is a tool that we could use not to scream at each other, or get worked up by made up stories, but for being in touch with each other. Ever since I wrote the book, the storys changed much. So, it is impossible to predict whats in store for Facebook. Its impossible to say there will be a Facebook in five years.

Read the rest here:
Facebook didnt have to be this way - BusinessLine

How Are Digital Natives Shaping the Future of Data Privacy? – Infosecurity Magazine

When it comes to the implementation of cybersecurity, most individuals usually focus on the bigger picture, which often causes them to foresee details that prove to be crucial in exercising security. One of the most commonly overlooked aspects of cybersecurity is data privacy, along with the highly personal implications that it has.

With the much-awaited California Consumer Privacy Act (CCPA) having come into effect from 1st January 2020, this is already at the receiving end of severe scrutiny from some of the most notable members of Californias tech scene. So it is high time that we reevaluate the relationship that digital natives have with data privacy.

Furthermore, in an attempt to ensure that the cybersecurity practices hold up in the long run, it is equally essential that we also pay heed to the way that the tumultuous relationship that digital natives have had with data privacy influences the present, and consequently, the future of cybersecurity in general.

The simpler (read: oversimplified) definition of what a digital native would be a person who grew up in the era of omnipresent technology, the most notable aspect of which is single-handedly the internet and the advent of the internet of things (IoT). A far more sophisticated, and more accommodating definition of the phrase, however, takes into account the intricate nature of the differences between digital natives and the generations that came before them.

Once the variations that have entered the lives of digital natives - primarily as a direct consequence of growing up in a world riding the high wave of digitization and advancements in technology - have been fully realized, only then can cybersecurity specialists hope to steer digital natives towards a more secure future.

The Rocky Relationship that We Have Had With Data Privacy in the Past

The term digital natives' was coined in 2001 by Marc Prensky, where he argued that the younger generation spoke a digital language, and called for a fundamental change in the way that they were being taught in schools as well.

However, digital natives, along with the generations that came before them, have been making grave privacy mistakes for a long, long time. The monumentality of the mistakes made in the past is also made evident by the fact that their impact can be felt, even today.

With that being said, most of the mistakes made in the past can be pinned down to the sheer lack of knowledge that people had about the internet and emerging technology: all of which they considered to be something foreign back then.

Some of the most notable errors made in the past regarding a users data privacy, which frequently lead to sensitive credentials being stolen, started with the U.S government using identifiers in their new social security program. The trouble with these identifiers started when multiple states across the country began putting social security numbers on state-issued drivers licenses, which left identity thieves with the golden opportunity to wreak as much havoc as they wanted. Fortunately, however, the practice of was eradicated in 2005.

However, the practice of using the Social Security Number was still being used as an identifier for each recipient of the Medicare program, which started in the 1960s. Unlike the use of identifiers in driving licenses, the practice of using easily exploitable identifiers didnt end until 2017.

Moreover, another perilous error that was pretty widespread in the past, before most of the digital natives were even born, was the practice of jotting down sensitive and confidential information, such as driving license numbers, addresses, and phone numbers on checks. The reason behind this blunder was simple: in the 1990s, the use of credit cards wasnt as widespread as it is today, and no one had the patience to wait in queues.

How are Digital Natives Impacting the Future of Data Privacy?

Although the state of cybersecurity being implemented in organizations today is far from perfect, organizations and enterprises, have started to take the imminent threat posed by the different types of cybercrimes in the past, which has also significantly impacted the attitudes that individuals have had about maintaining data privacy in general.

Unlike older generations, who treated the concept of technology as something foreign and unnatural to their way of living, digital natives have chosen to embrace technology as a permanent constituent of their way of life. Moreover, digital natives are so well acquainted with the advent of technology, the acknowledgment and acceptance of cybercrimes come naturally, along with more active involvement in solving problems, so that better data privacy can be exercised.

With acute knowledge about the consequences of data sharing and the impact that a stolen credential can have, digital natives have brought forth a revolutionary change within the cybersecurity spectrum by focusing their attention on the formulation of a robust cybersecurity culture that sees an equal distribution of assets and labor to each aspect of a security infrastructure.

Amidst the backdrop of an ever-evolving and increasingly sophisticated threat landscape, it wont be the greatest stretch to say that the future stability of cybersecurity rests on the shoulders of digital natives!

Read the original:
How Are Digital Natives Shaping the Future of Data Privacy? - Infosecurity Magazine

Zero Trust Internet is the Answer – Infosecurity Magazine

To download this white paper youll need an Infosecurity Magazine account. Log in or sign up below.

Get up-to-the-minute news and opinions, plus access to a wide assortment of Information Security resources that will keep you current and informed.

Company Name

Country Select countryAfghanistan Aland Islands Albania Algeria American Samoa Andorra Angola Anguilla Antarctica Antigua and Barbuda Argentina Armenia Aruba Australia Austria Azerbaijan Bahamas Bahrain Bangladesh Barbados Belarus Belgium Belize Benin Bermuda Bhutan Bolivia Bosnia and Herzegovina Botswana Bouvet Island Brazil British Indian Ocean Territory Brunei Darussalam Bulgaria Burkina Faso Burundi C`ote d'Ivoire Cambodia Cameroon Canada Cape Verde Cayman Islands Central African Republic Chad Chile China Christmas Island Cocos (Keeling Islands)Colombia Comoros Congo Congo, the Democratic Republic of the Cook Islands Costa Rica Croatia Cuba Cyprus Czech Republic Denmark Djibouti Dominica Dominican Republic Ecuador Egypt El Salvador Equatorial Guinea Eritrea Estonia Ethiopia Falkland Islands (Malvinas)Faroe Islands Fiji Finland France French Guiana French Polynesia French Southern Territories Gabon Gambia Georgia Germany Ghana Gibraltar Greece Greenland Grenada Guadeloupe Guam Guatemala Guernsey Guinea Guinea-Bissau Guyana Haiti Heard Island and McDonald Islands Holy See (Vatican City State )Honduras Hong Kong Hungary Iceland India Indonesia Iran Iraq Ireland Isle of Man Israel Italy Jamaica Japan Jersey Jordan Kazakhstan Kenya Kiribati Korea, Democratic People's Republic of Korea, Republic of Kuwait Kyrgyzstan Lao People's Democratic Republic Latvia Lebanon Lesotho Liberia Libyan Arab Jamahiriya Liechtenstein Lithuania Luxembourg Macao Macedonia, the former Yugoslav Republic Madagascar Malawi Malaysia Maldives Mali Malta Marshall Islands Martinique Mauritania Mauritius Mayotte Mexico Micronesia, Federated States of Moldova, Republic of Monaco Mongolia Montenegro Montserrat Morocco Mozambique Myanmar Namibia Nauru Nepal Netherlands Netherlands Antilles New Caledonia New Zealand Nicaragua Niger Nigeria Niue Norfolk Island Northern Mariana Islands Norway Oman Pakistan Palau Palestinian Territory, Occupied Panama Papua New Guinea Paraguay Peru Philippines Pitcairn Poland Portugal Puerto Rico Qatar R`eunion Romania Russian Federation Rwanda Saint Helena Saint Kitts and Nevis Saint Lucia Saint Pierre and Miquelon Saint Vincent and the Grenadines Samoa San Marino Sao Tome and Principe Saudi Arabia Senegal Serbia Seychelles Sierra Leone Singapore Slovakia Slovenia Solomon Islands Somalia South Africa South Georgia and the South Sandwich Isl Spain Sri Lanka Sudan Suriname Svalbard and Jan Mayen Swaziland Sweden Switzerland Syrian Arab Republic Taiwan, Province of China Tajikistan Tanzania, United Republic of Thailand Timor-Leste Togo Tokelau Tonga Trinidad and Tobago Tunisia Turkey Turkmenistan Turks and Caicos Islands Tuvalu Uganda Ukraine United Arab Emirates United Kingdom United States United States Minor Outlying Islands Uruguay Uzbekistan Vanuatu Venezuela Viet Nam Virgin Islands, British Virgin Islands, U.S. Wallis and Futuna Western Sahara Yemen Zambia Zimbabwe

Infosecurity Magazine collects personal information when you register for our magazine and sponsored content. We will use this information to deliver the product or service for which you are registering.

We will also share your information with the declared sponsor of any webinar, whitepaper or virtual event for which you register and this sponsor is clearly indicated on each event page. You can opt out at any time in your user account.

For more information explaining how we use your information please see our privacy policy.

By registering you agree with our terms and conditions and privacy policy.

Follow this link:
Zero Trust Internet is the Answer - Infosecurity Magazine

German government prepares for internet censorship and deployment of the armed forces – World Socialist Web Site

By Ulrich Rippert 23 March 2020

The COVID-19 pandemic is highlighting the class character of politics. The health care system has been cut to pieces, hospitals privatised and trimmed for profit, laboratory capacities and nationwide treatment options massively restricted.

Despite warnings from China, no preparations have been made to protect the population. The government cares only about the interests of big business and is making unlimited financial resources available to corporations and banks. Although the danger of the virus was known, and public life has been drastically restricted, many workers are being forced to continue their work without adequate protection.

Resistance is growing against this criminal irresponsibility by the government and employers. Various opposition groups are forming on the internet to refute government propaganda and describe and fight against the dramatic conditions in hospitals, rescue stations, care facilities and factories, but also the devastating effects of government measures on workers in precarious employment.

Politicians have responded to this opposition with calls for censorship and dictatorial measures.

At the beginning of the week, Lower Saxonys state Interior Minister Boris Pistorius (Social Democratic Party, SPD) called for sanctions against the distribution of so-called fake news in connection with the Coronavirus pandemic. He demanded that the government urgently intervene, saying, It must be prohibited to publicly spread false allegations about the supply situation of the population, medical care or cause, ways of infection, diagnosis and therapy of COVID-19.

According to Pistorius, the government must examine whether bans could already be based on the infection protection law. If not, the penal code or the law on administrative offences should be amended as quickly as possible.

The greatest misinformation currently being spread comes from the government itself. It claims that the German health care system is well prepared for the spread of the pandemic, and no one need worry. For weeks, the government played down the dangers.

Now that reality has refuted its propaganda, any criticism of it is to be criminalised and suppressed. If Pistorius has his way, the government will rigorously enforce its monopoly on information and opinion. This is a call for censorship and dictatorship.

Pistorius has long been known as a right-wing social democrat in the tradition of Gustav Noske, who during the November Revolution in 1918 allied with the German army and far-right Freikorps to suppress working-class opposition to the bourgeois order.

For seven years as Lower Saxonys interior minister, he has been advocating a strict right-wing course against refugees and for stepping up the repressive powers of the state. In summer 2017, he presented an SPD position paper on domestic policy, the central point of which was strengthening the federal police force financially and with more personnel. One year later, more than 10,000 people demonstrated in Hanover against the new police law of Lower Saxony, which Pistorius had drafted, because it massively expands the powers of the security authorities while at the same time restricting elementary civil rights.

With his call for censorship and police-state measures, Pistorius speaks for a party that has always responded to crisis situations and resistance from the population by calling for the strong state and dictatorial measures. Pistorius comes from the same political stable as former German Chancellor Gerhard Schrder, who brutally smashed up the welfare systems with the Hartz laws. For the past three years he has also been living in a relationship with Schrders fourth wife, Doris Schrder-Kpf, from whom the former chancellor separated in 2015.

There is no doubt that the fight against the pandemic requires the restriction of social contacts and individual freedom of movement. However, it must not be allowed that the conditions for a dictatorship are created under the slogan necessity knows no law! The coronavirus pandemic, its ominous health, social and economic consequences and the drastic measures required to combat it raise the question of who exercises power and controls the statethe financial oligarchy or the working class?

The ruling class everywhere is trying to use measures against the Corona crisis to strengthen its power. According to information from DPA and Der Spiegel, the president of the Bundestag (federal parliament), Wolfgang Schuble (Christian Democratic Union, CDU), for example, has proposed to the leaders of the parliamentary groups that they expand the Emergency Laws by amending the constitution.

The Emergency Laws, which were passed in May 1968 in the midst of the largest workers strikes and student protests of the post-World War II period, give the state quasi-dictatorial powers in crisis situations (natural disaster, uprising, war). Among other things, they allow for the Bundestag and the Bundesrat (the upper chamber of parliament) to be replaced by an emergency parliament, the Joint Committee. This committee consists of only 48 selected members but has the full powers of both chambers of parliament and would thus largely override the existing parliamentary system. Schuble has now brought up the idea of including a similar regulation in the constitution for the case of an epidemic.

The deployment of the Bundeswehr (armed forces), which Defence Minister Annegret Kramp-Karrenbauer announced at a press conference on Thursday, must also be seen in this context. For the time being, the focus is on logistical tasks. The Bundeswehr has five hospitals of its own, 3,000 doctors, mobile military hospitals as well as logistics and transport capacities that can be used in the fight against the virus.

But Kramp-Karrenbauer has more in mind. In addition to the deployment of up to 50,000 soldiers, there is also talk of mobilizing 75,000 reservists. At the press conference, the defence minister emphasized that the troops will only be properly deployed when the civilian authorities and organizations have reached the end of their capabilities. She claimed that in the area of security and order, assistance from the military would only be available under strict conditions, but in a daily order to the troops she wrote, We will help with health care and, if necessary, with ensuring infrastructure and supplies as well as maintaining security and order.

Chief of Staff Alfons Mais wrote to soldiers saying the Bundeswehr now had the task of maintaining operational readiness for any required support. We are at the beginning of a road whose direction and length we cannot yet estimated, he declared.

In Bavaria, the conservative state government declared a disaster situation last Monday. This enables them to take far-reaching measures against the spread of the coronavirus and to call on citizens to help in the form of services, material and work. However, the disaster situation also means a far-reaching encroachment on democratic rights, which can be used to suppress social and political opposition. The working class must be on its guard.

Google is blocking the World Socialist Web Site from search results.

To fight this blacklisting:

Continue reading here:
German government prepares for internet censorship and deployment of the armed forces - World Socialist Web Site

Internet of Things (IoT) Security Technology Market Is Expected To Thrive At Impressive Cagr By 2027 Key Players:…

Astonishing Growth Of Internet of Things (IoT) Security Technology Market 2020 | Latest Trends, Demand, Growth, Opportunities & Outlook Till 2027

The Analysis report titled Internet of Things (IoT) Security Technology Market highly demonstrates the current Internet of Things (IoT) Security Technology market analysis scenario, impending future opportunities, revenue growth, pricing and profitability of the industry.

The report provides a basic overview of the industry including definitions and classifications. The Internet of Things (IoT) Security Technology analysis is provided for the international markets including development trends, competitive landscape analysis, and key regions development status.

The report discusses the various types of solutions for Internet of Things (IoT) Security Technology Market. While the regions considered in the scope of the report include North America, Europe, and various others. The study also emphasizes on how rising Internet of Things (IoT) Security Technology threats is changing the market scenario.

Some of the key players operating in this market include: Cisco,IBM,Infineon,Intel,Gemalto,Allot,Symantec Corporation,HP Enterprise Company,AT&T Inc,Trend micro

Get sample copy of Internet of Things (IoT) Security Technology Market report @ https://www.reportsandmarkets.com/sample-request/global-internet-of-things-iot-security-technology-market-size-status-and-forecast-2020-2026?utm_source=nysc&utm_medium=6

The detailed report provides the major key regions and the crucial elements of the market.

Global Internet of Things (IoT) Security Technology Market, By Region are: North America, China, Europe, Asia-Pacific, Japan, India, Rest of the Worlds

Internet of Things (IoT) Security Technology Market Research Report 2020 carries in-depth case studies on the various countries which are involved in the Internet of Things (IoT) Security Technology market. The report is segmented according to usage wherever applicable and the report offers all this information for all major countries and associations. It offers an analysis of the technical barriers, other issues, and cost-effectiveness affecting the market. Important contents analyzed and discussed in the report include market size, operation situation, and current & future development trends of the market, market segments, business development, and consumption tendencies. Moreover, the report includes the list of major companies/competitors and their competition data that helps the user to determine their current position in the market and take corrective measures to maintain or increase their share holds.

The study is a source of reliable data on:

Market segments and sub-segments

Market trends and dynamics

Supply and demand

Market size

Current trends/opportunities/challenges

Competitive landscape

Technological breakthroughs

Value chain and stakeholder analysis

Highlights of the report:

A complete backdrop analysis, which includes an assessment of the parent market

Important changes in market dynamics

Market segmentation up to the second or third level

Historical, current, and projected size of the market from the standpoint of both value and volume

Reporting and evaluation of recent industry developments

Market shares and strategies of key players

Emerging niche segments and regional markets

An objective assessment of the trajectory of the market

Recommendations to companies for strengthening their foothold in the market

Trending factors influencing the market shares of the Americas, APAC, Europe, and MEA.

All the research report is made by using two techniques that are Primary and secondary research. There are various dynamic features of the business, like client need and feedback from the customers. Before (company name) curate any report, it has studied in-depth from all dynamic aspects such as industrial structure, application, classification, and definition.

The report focuses on some very essential points and gives a piece of full information about Revenue, production, price, and market share.

Internet of Things (IoT) Security Technology report will enlist all sections and research for each and every point without showing any indeterminate of the company.

Reasons for Buying this Report

This report provides pin-point analysis for changing competitive dynamics

It provides a forward looking perspective on different factors driving or restraining market growth

It provides a six-year forecast assessed on the basis of how the market is predicted to grow

It helps in understanding the key product segments and their future

It provides pin point analysis of changing competition dynamics and keeps you ahead of competitors

It helps in making informed business decisions by having complete insights of market and by making in-depth analysis of market segments

TABLE OF CONTENT:

Internet of Things (IoT) Security Technology Global Market Research Report 2020

1 Market Overview

2 Manufacturers Profiles

3 Global Internet of Things (IoT) Security Technology Sales, Revenue, Market Share and Competition by Manufacturer

4 Global Internet of Things (IoT) Security Technology Market Analysis by Regions

5 North America Internet of Things (IoT) Security Technology by Country

6 Europe Internet of Things (IoT) Security Technology by Country

7 Asia-Pacific Internet of Things (IoT) Security Technology by Country

8 South America Internet of Things (IoT) Security Technology by Country

9 Middle East and Africa Internet of Things (IoT) Security Technology by Countries

10 Global Internet of Things (IoT) Security Technology Market Segment by Type

11 Global Internet of Things (IoT) Security Technology Market Segment by Application

12 Fourth Internet of Things (IoT) Security Technology Market Forecast (2020-2024)

13 Sales Channel, Distributors, Traders and Dealers

14 Research Findings and Conclusion

15 Appendix

Ask for Upto 10% Discount @ https://www.reportsandmarkets.com/reports/global-internet-of-things-iot-security-technology-market-size-status-and-forecast-2020-2026?utm_source=nysc&utm_medium=6

About Us:

Reports And Markets is part of the Algoro Research Consultants Pvt. Ltd. and offers premium progressive statistical surveying, market research reports, analysis & forecast data for industries and governments around the globe. Are you mastering your market? Do you know what the market potential is for your product, who the market players are and what the growth forecast is? We offer standard global, regional or country specific market research studies for almost every market you can imagine.

Contact Us:

Sanjay Jain

Manager Partner Relations & International Marketing

http://www.reportsandmarkets.Com

Ph: +1-352-353-0818 (Us)

Read the rest here:
Internet of Things (IoT) Security Technology Market Is Expected To Thrive At Impressive Cagr By 2027 Key Players:...

New rules proposed to boost security of home routers – The Straits Times

Consumers here will get some help in picking secure Internet home routers, if new rules proposed yesterday are accepted.

The Infocomm Media Development Authority (IMDA) is looking to introduce a series of requirements to "provide a safer and more secure Internet experience for users, and to strengthen the resilience of Singapore's telecommunications networks".

The surge in intelligent devices in homes, such as Web cameras and baby monitors, makes it important to secure home routers, the authority said.

Under the proposed rules, home routers that meet stringent requirements, including stronger password administration, will receive a compliance label.

"Residential gateways, commonly known as home routers, are often the first entry point as they form the key bridge between the Internet and residents' home networks," said an IMDA spokesman.

These routers are often used by hackers keen on spying or stealing information.

The proposed rules are such that new routers sold to consumers will not be allowed to have default passwords, which means no two routers will have the same access codes.

Consumers will instead have to set up their own passwords and there will be a minimum level of password strength required.

The default settings of these routers will have to be better managed and controlled as well. For instance, the firewall will have to be turned on by default.

Manufacturers will also have to make sure that their routers automatically update to the latest and most secure firmware.

The IMDA is now seeking views from the industry and the public on the requirements.

The authority said that together with the cyber security labelling scheme that will be rolled out by the Cyber Security Agency of Singapore (CSA), its effort to introduce more stringent rules for home routers will better protect Internet-of-Things devices here.

Residents will not be required to change their home routers. Instead, they can look out for the IMDA label when they get new routers.

If the proposed rules are accepted, all new routers sold here must comply with the IMDA's specifications by early next year... To give manufacturers time to adjust, the rules will kick in six months after the finalised standards come into effect.

If the proposed rules are accepted, all new routers sold here must comply with the IMDA's specifications by early next year.

The IMDA said that in order to give manufacturers time to adjust, the rules will kick in six months after the finalised standards come into effect. Previously approved home routers can continue to be sold until one year after the finalised standards come into effect.

The authority noted that some manufacturers have already incorporated the proposed requirements in newer models of their home routers. It expects that mainstream models will continue to remain affordable as new equipment complying with the IMDA's rules are launched.

Yesterday, the IMDA also announced a new IoT guide to help business users and vendors safely deploy IoT systems and devices.

The guide was developed by the IMDA and CSA after a public consultation in January last year and is available on the IMDA's website.

Read the rest here:
New rules proposed to boost security of home routers - The Straits Times

Norton Secure VPN – The cocoon of cybersecurity – Blasting News United States

The VPN market is one of the growing segments of the IT industry. New service providers are jostling for space among the more prominent players in an increasingly crowded sector. The market is today seeing many start-ups, and they are holding their own among the major brands. These greenhorns offer security in new areas of privacy. However, significant players like Norton Secure VPN are still leading the roost with simple products that are affordable and provide underlying protection for the everyday user.

Here we explain various protocols and security mechanisms used in VPN.

When a common internet infrastructure secure network creates a safe set up much like a cocoon insulating the data of the user from phishing or malware attacks, it is known as a Virtual Private network. The system uses a different security mechanism like encryption to allow only authorized users to access the data. Norton Secure VPN protects your data by creating a virtual tunnel and hides your IP address, making it almost impossible to track your location between websites.

Today most VPN services offer split tunneling for better security. The user can decide which apps will use the VPN Split tunneling setup. Multihop VPN routes the users connection through several servers for additional protection. However, this feature is not available in the packs of most VPN providers, and the user has to shell out a few more bucks to get them included. However, Norton Secure VPN is being offered at very economical rates, and this also includes enhanced security features like split tunneling for better security.

Before deciding on a VPN product make sure your data is not being shared.

Norton Secure VPN does not share its users data with any third parties including ad networks or other monetization solutions, so you can trust them with keeping your data 100% secure.

Today internet security has gained more urgency. Parents are finding it more and more challenging to insulate their kids from cyberbullying.

It is an ideal time to go for an online health check-up and reinforce any chinks in online security.

Identity theft instances are also increasing, and fraudsters regularly dupe nave netizens. Credit Card passwords, Social Security Card details can be obtained illegally. Services such as LifeLock from Norton Secure VPN will ensure that fraudsters cannot hack your private login details.

Be aware of online safety. Educate users, especially kids, about the threats regularly.

Use your internet time wisely and productively. Focus more on-screen time quality.

Cybercriminals are shrewd operators and update their modus operandi to bypass security measures. Remain up to date with the latest versions of the security apparatus. Regularly update the patches sent by the Norton Secure VPN to remove security vulnerabilities.

Passwords are the first line of defense against any cyber-attacks. Enhance password security by creating stronger passwords and keep changing them to make it more difficult for fraudsters to steal your private details. Use different passwords for different apps and enhance your security by using a password management program like the Norton Password Manager.

Don't miss our page on Facebook!

ALL RIGHTS RESERVED

See the original post here:
Norton Secure VPN - The cocoon of cybersecurity - Blasting News United States

Cybersecurity 2020: The Trends SMBs will Need to Prepare For – CISO MAG

The rapid evolution of cybersecurity remained a major issue for small businesses in 2019, being named the top concern for all businesses, regardless of their size. Along with an increase in the number of cybercrimes, the cost of recovering from an attack means keeping ahead of the curve is vital for SMBs going forward.

By Amie Thurlow

This is challenging enough for businesses operating on a small budget, but fast-paced changes in technology mean that security resources are increasingly being stretched in several directions. Rather than protecting a single, traditional office, security must now cover a whole range of devices used for IoT and mobile working.

Proactivity is now essential to an effective security strategy. By looking ahead to the trends of the next 12 months, SMBs can begin to identify the new challenges around cybersecurity that they will need to prepare for.

Increased spending

A trend that is set to continue from 2019 is increased cybersecurity spending. The International Data Corporation (IDC) expects spending on security solutions was estimated to reach $103 billion in 2019, a 9.4% increase on the previous year, with that trajectory continuing into 2020 and beyond. These figures are not exclusive to small business, but it does demonstrate how seriously cybersecurity is now being taken.

It may well not be possible for SMBs to increase their budget on that scale each year. However, the trend for regularly raising spending suggests that it would be prudent to conduct an audit of existing hardware, software and services, to make sure that current solutions are providing the best protection available on your budget. Increases in spending can then be focused on minimizing risk, by improving the security awareness of your workforce with training.

The continued growth of IoT

While the Internet of Things (IoT) has rapidly become a huge consideration, the reality is that this is just the start. Currently, the pace with which these new devices are being implemented continues to surpass the rate at which security solutions are being created to manage them.

While some IoT devices have benefits for the workplace, others might be causing more issues than they are solving. Take the time to carefully consider the introduction of new devices to your network, to make sure that the benefits they offer are worth the increase in security weak points that their inclusion creates.

5G wireless Internet

Over the next few years, the rollout of 5G wireless internet will bring faster internet speeds to peoples pockets. But as this is a new technology, dont be surprised to hear of a range of attacks as security weaknesses are exposed and then patched during the early years of its rollout.

It might not be a direct issue for your network in 2020, but with the mobile workforce set to continue its rapid growth in the coming years, staff could well start using early 5G networks on their personal devices to complete their work, putting sensitive documents at risk.

Awareness is the key to minimize this threat. If regular security training sessions are held, they are the ideal platform for highlighting the dangers and reminding staff to apply security patches as soon as they become available.

Automation and AI

An area of technological innovation that is set for dramatic growth in the coming years is automation and AI. A report titled Global Artificial Intelligence in Cybersecurity Market, 2019-2026 has projected that the market for AI in cybersecurity could reach US$38.2 billion by 2026, an almost US$30 billion increase on the 8.8 billion estimated in 2019.

Alongside entirely new threats, increased implementation of automation and artificial intelligence could begin to see traditional forms of attack such as phishing take on a new guise, becoming harder to detect. But it isnt all bad news. Automation also plays an important role in protecting against attacks, by improving threat detection and identifying vulnerabilities.

Any new technologies can be expensive to set up and can require additional training, but as the implementation of AI grows, costs will continue to fall, making AI solutions viable for SMBs who are looking to implement a modern security setup.

Conclusion

There can be no doubt that cybersecurity is going to continue becoming a greater consideration for companies of all sizes in the coming years. As rapidly as technology advances, so too do the resources that hackers have at their disposal. While SMBs may not have the financial muscle to immediately invest in the latest tools, they can still take large steps towards remaining secure by being proactive.

Keeping antivirus, VPNs, firewalls and endpoint security software up to date will protect against the latest vulnerabilities. But no matter which new threats emerge, the best way to reduce the risk of an attack remains looking after the simple things.

Research conducted by Apricorn in 2019 discovered that 63 percent of UK organizations considered human error the main cause of data breaches within their organization. This means that providing regular training, BYOD policies for mobile workers, and a holistic attitude to security best practices, remains one of the best ways to stay protected in the new year.

Views expressed in this article are personal. The facts, opinions, and language in the article do not reflect the views of CISO MAG and CISO MAG does not assume any responsibility or liability for the same.

See the article here:
Cybersecurity 2020: The Trends SMBs will Need to Prepare For - CISO MAG

Leaders should act now to counter national security threat to US elections | TheHill – The Hill

Foreign interference in upcoming U.S. elections is secondary right now to the ongoing coronavirus crisis in the country, but ultimately American leaders must address the problem. It is also is tempting to view foreign interference in the upcoming American elections as mischievous political meddling. Yet, these covert operations are much more than that. They are urgent national security matters that attack the U.S. national election process in ways that undermine the very foundation of American democracy.

The critical question today is: What will the current U.S. leaders and the national political parties do about it?

In 2016, the primary culprit was the Putin regime in Moscow who favored Donald Trump for president. Recent congressional testimony indicates that Russian interference continues into the 2020 presidential campaign, and Moscow apparently added Bernie Sanders to its list of supported candidates. However, the administration just softened its position on interference in a carefully choreographed assessment after President TrumpDonald John TrumpThe Hill's Morning Report Coronavirus tests a partisan Washington The Memo: Virus crisis upends political world Bill to protect children online ensnared in encryption fight MORE publicly attacked the briefer who presented the earlier judgment.

More recently, CNN exposed Russian internet operations in Africa spreading divisive hate messages among targeted audiences in the U.S.

Foreign attacks on American elections are not just political issues. They are an urgent bipartisan national security threat. Today, Putins favorite may be Trump. Tomorrow, it could be foreign interests with a preference for Democratic candidates.

The Republican Party seems unlikely to aggressively counter Russian or other foreign influence since the president calls the entire covert Russian election interference operation a hoax and removes or intimidates any government official who hints otherwise.

The Mueller Report and the associated U.S. national intelligence assessments established that Russia directly interfered in the 2016 U.S. presidential election. Yet, the Trump administrations response has been half-hearted and ineffective. None of the sanctions placed on the Putin regime so far are enough to offset the advantages to Russia of the growing isolation of the U.S. from our traditional democratic allies, the weakening of NATO, Russian strategic advances in Syria and elsewhere and the political polarization in the U.S.

Further, Attorney General William BarrWilliam Pelham BarrBill to protect children online ensnared in encryption fight Trump suggests he may veto surveillance bill The Hill's Morning Report - Trump takes unexpected step to stem coronavirus MORE has undermined the Mueller Report and continues to challenge the legitimate U.S. counterintelligence operations and assessments that exposed the 2016 Russian interference in U.S. elections.

Skepticism of current threats to U.S. security is hardly the attitude of those committed to the defense of American elections against foreign attacks.

National security is a major responsibility of the Attorney General. Congress should be grilling Barr and his associates on why they are not conducting aggressive investigations to expose and respond to covert foreign influence operations rather than downplaying the threat to this nations democracy.

Given the current attitude of the Trump administration, the Democratic Party has the chance to become the voice of transparency, truth and national defense on foreign interference. The questions are whether they will seize the opportunity and whether they will be serious about it.

Here are some ideas for the major political parties to consider if they are to seriously tackle foreign interference in American democracy:

In the meantime, individual voters can take measures to limit the effects of covert foreign disinformation. They can recognize that political activists in all parties will interpret facts to the advantage of their candidates. The core issue is whether or not the parties are transparent in the sources of their information and the facts of their underlying assessments. In addition, voters can demand that candidates absolutely reject foreign financial and other support and commit to defending American elections and transparency.

Voters can also recognize the dangers of the internet. Each must determine for him- or herself whether information and conspiracy theories on the web are from established American sources or whether they are from foreign organizations and individuals with no record as a legitimate source of information.

For now, the public can strive to understand how foreign interference works and be cautious. At the national level, candidates for president and for Congress should make commitments to strong measures to ensure U.S. election security in the future and to put forth clear deterrence actions that will prevent foreign powers from undermining American democracy in the future.

James W. Pardew is a former U.S. ambassador to Bulgaria and career Army intelligence officer.He has served as deputy assistant secretary-general of NATO and is the author of "Peacemakers: American Leadership and the End of Genocide in the Balkans."

Read more here:
Leaders should act now to counter national security threat to US elections | TheHill - The Hill

Namecheap, EFF and the Dangerous Internet Wild West – CircleID

This past week I had two items pop up on my alerts. The first was about Facebook suing domain registrar Namecheap for allowing domains that impersonate the social media company and can be used for scams. The second was a plea by the Electronic Frontier Foundation to join in its crusade to stop the sale of the .ORG domain. It took me a moment to realize these are linked.

Namecheap is known for its refusal, short of a court order, to crack down on bad actors who register domains used to spread malware, steal personal information, send spam and conduct cyberattacks. According to cyber monitoring firm SpamHaus, 25 percent of so-called botnet domain names were registered through Namecheap making it the third straight year it held the title as the company with the most abused domains.

The Facebook lawsuit shows why. In its lawsuit, Facebook cited 45 Namecheap domains, such as 'instagrambusinesshelp.com', that appear to be associated with the social media company but, Facebook says, can be used by bad actors to "trick people into believing they are legitimate and are often used for phishing, fraud and scams."

It's not the first time Namecheap has been called out for not making Internet safety a priority. Online pet adoption scams are on the rise. Criminals create websites that offer to ship dogs after a would-be owner pays fees, but it's a scam and the dog never is delivered. In an article entitled, "Namecheap, you are hurting the Internet!," the group Petscams.com, which manages a database of fraudulent websites that pose as pet adoption centers, points out that Namecheap has nearly four times as many scam websites as any other registrar.

This track record is why I would never use Namecheap for domains. After all, life is about the company you keep. Which gets us to EFF and .ORG. The group wants to stop the sale of .ORG to a private company. But like Namecheap, EFF's track record on Internet safety is dubious. This is the organization that is trying to overturn a federal law aimed to stop sex traffickers from using websites such as Backpage to advertise and conduct business.

But EFF and Namecheap have a lot more in common than I realized. In the last decade, Namecheap has contributed $390,000 to EFF to fight against restrictions that could prevent bad actors from using the Internet to engage in sex trafficking, conduct scams, and spread malware that can lead to identity theft, financial loss and ransomware. It's hard not to connect the dots. Namecheap pays EFF to work to block Internet safety legislation and initiatives; Namecheap makes money by being the go-to domain company for bad actors who create domain names that can be used for scams and malware and other potential illicit activity.

As someone who owned and operated domain names, I'm stunned that this business model is acceptable in 2020. This is the Internet equivalent of a medical testing lab building a business model around the spread of the coronavirus. Namecheap stands out as a domain company that refuses to cooperate when companies such as Facebook come to them with evidence that its domain customers are engaging in shady behavior.

And EFF has 390,000 reasons to help them.

But at what cost? According to Internet security company Emsisoft, the 2019 impact of ransomware went way beyond the estimated $7.5 billion price tag. Because of ransomware, emergency patients had to be redirected to other hospitals; medical records were inaccessible or permanently lost; surgical procedures were canceled; tests were postponed; and, 911 services were interrupted. This is the real impact of not stopping online criminals and other bad actors.

Keeping the Internet free and safe are not mutually exclusive. Just as shouting "fire" in a crowded theater isn't protected speech, criminals who use the Internet to scam people, coerce them into ransomware payments, engage in sex trafficking, and spread malware shouldn't be protected. You would think that Namecheap and EFF would understand the difference. And if they do understand the difference and still fight efforts to keep the Internet safe, that's disturbing.

See the rest here:
Namecheap, EFF and the Dangerous Internet Wild West - CircleID