Category Archives: Internet Security
Cloud is key to 2023 strategy for 95% of businesses in APJ, but vast … – PR Newswire
JAKARTA, Indonesia, April 12, 2023 /PRNewswire/ -- Akamai Technologies, Inc.(NASDAQ: AKAM), the cloud company that powers and protects life online, today revealed that 95% of channel partners agree that cloud computing is a key priority for their customers' 2023 strategy. However, not all businesses plan to or are able to invest heavily in the space. Willingness to spend varies greatly, with 27% planning to spend below 20% of their IT budget on cloud and 33% planning to spend above 40% of their budget.
Results are based on a survey of 386 respondents across Australia and New Zealand (ANZ), Japan, China, India, Singapore, and South Korea. The survey was conducted to glean insights into partners' perspectives on IT budget priorities, and their customers' 2023 cloud strategy.
"In our conversations with partners, we see that organizations are walking the fine line between investing in cloud as well as being frugal in light of the macroeconomic headwinds. We believe the solution lies in working with a developer-friendly cloud and compute ecosystem that can offer them both flexibility and cost-effectiveness, while avoiding bill shock," explained Tatsuya Suzuki, Regional VP, APJ Carrier and Channel, Akamai.
"Even as the industry landscape continues to evolve and increase in complexity, Akamai seeks to accelerate the ambitions of our partners as they help their customers harness the potential of the cloud. We will offer expanded product roadmaps in the new year, across the areas of cloud, security, and delivery to achieve the overarching goal of making life better for billions of people, billions of times a day," concluded Suzuki.
Understanding cloud priorities across the region
Upon analysis of country-specific data, Akamai's findings revealed significant differences in the willingness to spend on cloud despite an overarching agreement on the importance of cloud technology.
Specifically, Vietnam (31%), Indonesia (27%), and India (23%) had the highest percentages in terms of respondents who said the proportion of IT budget spent on cloud would be 60% and up.
Conversely, Thailand (50%), Japan (49%) and Taiwan (40%) had the highest percentages for respondents who indicated that the proportion of IT budget spent on cloud would be below 20%.
Market Data Points
"While most organizations acknowledge the importance of cloud, many are apprehensive about investing their IT budgets in this technology, given concerns of costs and how this will affect other overarching IT priorities. These sentiments are clear from the latest insights we have gathered from our partners, and this is why Akamai is investing heavily in scaling our cloud computing capabilities," explained Suzuki.
"We believe that organizations need more options for their cloud needs, particularly those that are easy to use and developer friendly with transparent, attractive pricing, and we are able to provision for these needs with Akamai Connected Cloud," he continued.
In February, Akamai announced Akamai Connected Cloud, a massively distributed edge and cloud platform for computing, security, and content delivery. As part of the announcement, Akamai plans to launch four new enterprise-scale core cloud computing sites across APJ in Chennai, Osaka, Jakarta, and Auckland by the end of 2023. Additionally, Akamai has identified more than 50 cities globally in which it plans to begin rolling out distributed sites this year, bringing basic cloud computing capabilities into difficult-to-reach locations currently underserved by traditional cloud providers.
Partners speak out on priorities for 2023
Most partners, including Wangsu, a China-based company that provides content delivery network and Internet data center services, are seeking a user-friendly public cloud solution, coupled with a transparent pricing structure.
"With Akamai Connected Cloud, we really benefited from lower prices as a result of being able to reduce the cost of high outbound traffic. Equally important is that we have been able to save time while achieving our key objectives given the flexibility of the network pool and low traffic costs," shared Mingwei Zhang, Alliance Department Director, Wangsu, China.
Meanwhile, security continues to be an overarching priority for partners, with the rise of data breaches in the past months.
"In the coming months, we are likely to see an increase in the number and sophistication of cyber-attacks and larger scale data breaches, causing more disruption. There is also a risk of complacency from breach fatigue. Many organizations will focus on improving the security of their supply chain as part of ensuring positive business outcomes," explained Mark Trumble, APAC Head of Portfolio - Cyber Security, Fujitsu Australia, and New Zealand.
To account for these challenges, partners are increasingly looking to provide a range of products and services for customers that embed different layers of security and in-depth defense.
"Akamai is supporting our customers and partners with our security solutions, including Edge DNS, a global, highly scalable domain name system (DNS) service offering security, resilience from Distributed denial of service attack (DDoS) events, and high DNS responsiveness. As a result, we are able to observe trillions of DNS requests daily and have clear visibility on the latest developments in the threat landscape," explained Dean Houari, Director of Security Technology and Strategy, APJ, Akamai.
"We remain committed to protecting our customers and partners and staying ahead of attackers by blocking requests leading to domains serving malware and phishing sites that could steal data," concluded Houari.
Logo - https://mma.prnewswire.com/media/384815/3979745/Akamai_v1_Logo.jpg
SOURCE Akamai Technologies, Inc.
View original post here:
Cloud is key to 2023 strategy for 95% of businesses in APJ, but vast ... - PR Newswire
Inviting the internet into our cars and security systems. – The CyberWire
Car thieves are using CAN injection attacks to steal cars, Nexx may not patch critical vulnerabilities in its smart security devices, and Tesla employees apparently admit to sharing pictures (sometimes explicit) collected from Tesla cars owned by private citizens.
Ian Tabor, an automotive security expert of EDAG group decided to do a forensic analysis to find out how his car was stolen, reports SecurityWeek. He discovered that his headlight had been destroyed and the wires had been pulled out. The Register writes that Tabor investigated and found that various systems had seemingly failed or suffered faults,... the faults were generated as the thieves broke into a front headlamp and tore out the wiring, and used those exposed connections to electrically access the CAN bus. He concluded that the thieves probably used a hacking device that uses the cars controller area network (CAN) bus to inject false codes to start the car and open the door. SecurityWeek reports that Such hacking devices can be acquired on dark web sites for up to 5,000 ($5,500), and they are often advertised as emergency start devices that can be used by vehicle owners who have lost their keys or automotive locksmiths. These devices seem to be specific to car makes, which limits the thief (or locksmith) who uses them to one brand of cars. For this method car thieves still have to make physical contact with the car, and so experts recommend taking proper physical security measures. This leads to another story.
When purchasing a smart security system, buyers assume that the security of the system itself can be assumed as a given. There is always, however, an inherent risk associated with connecting security devices to the larger Internet. Sam Sebetan, an independent cyber security analyst working with CISA (the US Cybersecurity and Infrastructure Security Agency), posted on this issue. I discovered a series of critical vulnerabilities in Nexxs smart device product line, which encompasses Smart Garage Door Openers, Alarms, and Plugs, he writes. These vulnerabilities enabled remote attackers to open and close garage doors, take control of alarms, and switch smart plugs on and off for any customer. This is the last thing users would expect when installing a security device. Sebetans blog explains the vulnerability, noting that Nexxs servers fail to verify if the bearer token in the Authorization header corresponds to the alarm trying to connect... He further explains that the mac address for each device is the same as the devices serial number, which means that an attacker can register an already registered device and effectively take control of it. Nexx has not so far patched the vulnerability. Sebetan recommends that Nexx users deactivate their devices and write the company requesting a fix.
Several former Tesla employees admitted that they used to share pictures and videos from cameras installed in Tesla electric vehicles from 2019-2022 as reported by Reuters on 6 April. This media ranged from videos of naked Tesla owners walking to their cars to an image of users garages. (Why one would approach ones car naked isnt explained.) Among the higher profile images captured include shots of a James Bond submersible car allegedly captured inside Elon Musks garage. These cameras are installed to enable driver safety and automated driving.
Its no secret, formally at least, that Teslas collect and report images. Tesla states in its Customer Privacy Notice, We want to be very clear that in order for Fleet Learning camera recordings to be shared with Tesla, your consent for Data Sharing is required and can be controlled through the vehicles touchscreen at any time by navigating to Software> Data Sharing. Even if you choose to opt-in, the camera recordings are limited to 30 seconds and remain anonymous, ensuring its not linked to you or your vehicle.
Reuters reports that the computer program they (Tesla employees) used at work could show the location of recordings, which would seem to provide less anonymity than customers might expect. Knowing how a company uses your data is important, and experts recommend that, as onerous as slogging through the documents may be, users read terms of service and privacy notices.
Read the original:
Inviting the internet into our cars and security systems. - The CyberWire
Growing Nation-State Alliances Increase U.S. Cyber Risks – Government Technology
Cyber threats continue to escalate in new ways, especially with new nation-state alliances that are in opposition to NATO countries cyber defenses.
Consider this article from the past week in the Wall Street Journal: Russia Supplies Iran With Cyber Weapons as Military Cooperation Grows. Heres an excerpt:
Russia is helping Iran gain advanced digital-surveillance capabilities as Tehran seeks deeper cooperation on cyberwarfare, people familiar with the matter said, adding another layer to a burgeoning military alliance that the U.S. sees as a threat.
Russia and Iran both have sophisticated cyber capabilities and have long collaborated with each other, signing a cyber-cooperation agreement two years ago that analysts said focused mostly on cyber-defense networks. Moscow has long resisted sharing digital-offensive capabilities with Iran in the past, for fear they will end up being sold later on the dark web, the people said.
Last September, I described how NATO countries were being hit with unprecedented cyber attacks. But this trend has been growing for much longer, and cyber attacks are now accelerating rapidly due to a more coordinated effort from NATOs enemies.
Since 2014, closer ties between China and Russia have attracted speculation about whether the relationship will continue to deepen into an alliance. The 2015 Sino-Russian cybersecurity deal seemed to mark further Sino-Russian cooperation another arenacyberspace. The pact has two key features: mutual assurance on non-aggression in cyberspace and language advocating cyber-sovereignty.
If this pact is merely treated as a non-aggression pact, then Sino-Russian cybersecurity cooperation has a similar pattern to their overall relationship, which appears to be intimate but is actually problematic. However, looking past the non-aggression elements of the pact illuminates the key element of the agreementChina and Russias pronounced support for the concept of cyber-sovereignty. The support for cyber-sovereignty echoes the centerpiece of Sino-Russian cooperation in the general termsa challenge to US dominance in the international system.
Fast-forward to 2020 for this piece in War on the Rocks: Peering into the Future of Sino-Russian Cyber Security Cooperation. Heres a passage from that:
Beijing and Moscow have long wanted to control their domestic internets. Now they are working together to remake global cyberspace in their own image. The two launch widespread cyber operations that threaten U.S. interests, and they want to reshape the internet to reduce U.S. influence. Chinese hackers have mounted a long campaign to steal intellectual property, as well as military and political secrets, and are a growing threat to U.S. critical infrastructure. Russian hackers pose the threat of cyber espionage, influence operations, and attacks on the infrastructure of the United States and its allies. Moreover, China and Russia have over the past five years worked together to tighten controls on their domestic internet and promoted the idea of cyber sovereignty to diminish U.S. sway over the global governance of cyberspace.
Over the next decade, China and Russia are likely to continue close technical and diplomatic cooperation. Beijing now appears more willing to adopt information operations techniques historically associated with Russian actors to shape the narrative on the responsibility for and response to the COVID-19 pandemic, but the two sides are unlikely to coordinate on offensive cyber operations. To counter these efforts, policymakers should revitalize U.S. cyber diplomacy, providing an alternative framing to cyber sovereignty and building a coalition of like-minded partners to define and enforce norms of behavior in cyberspace.
Moving to 2021, we get a report from the international journal Contemporary Chinese Political Economy and Strategic Relations entitled, Cybersecurity Cooperation between Russia and China: Prospects and Problems. It covers strategic and tactical steps by China and Russia to strengthen their technology and cybersecurity cooperation at many levels.
Early this year, Cyber News offered a report entitled, Cybercrime from Russia and China: what can we expect next?:
In a recently published study of both nations, whimsically titled The Bear and the Dragon, global cybersecurity analyst Cybersixgill highlights an increased tendency for independent threat actors that is to say, ones not working for partisan groups such as Killnet or Dragonbridge to share expertise.
While these two ecosystems have historically remained separate, recently, the Russian and Chinese cybercriminal worlds seem to have collided, said Cybersixgill. Late last year, a limited-access Russian-speaking cybercriminal forum resurfaced on the underground after a turbulent shutdown in October this time, with a notable Chinese presence.
It cited apparent efforts by the forums administrators to enlist Chinese threat actors to their underground community, making sweeping changes to the forums interface to make it more accessible to both Mandarin- and English-speaking users.
Chinese recruits to the dark web platform were encouraged to participate in conversations, share tips, and collaborate with Russian counterparts on future attacks.
Finally, bringing us into late March 2023, the Atlantic Council published a report with the headline Xi and Putin just wrapped up talks in Moscow: What does it mean for the war in Ukraine and Chinas global standing?
They wrote: Its a friendship testing the limits. Chinese leader Xi Jinping left Russia on Wednesday after three days of talks with Russian President Vladimir Putin, in which Putin endorsed Chinas 'peace plan' for Ukraine and the two leaders stressed the need to 'respect legitimate security concerns of all countries' to end the war a talking point Russia has used to blame NATO and legitimize its war of aggression. What did this visit do for Putins international standing? What role might China play in the war? How should Washington view this partnership? Below, our experts cut through the pageantry and diplomat-speak.
TechSpot just published an article that explains how Russia and China want to become world leaders in tech, security, andAI. Thy describe how Russian President Vladimir Putin and China leader Xi Jinping agreed on several items in their recent summit, and the agreement: The presidents agreed to form new models of cooperation in industries such as artificial intelligence, Internet of Things, 5G, digital economy, and low-carbon economy. Technological sovereignty is the key to sustainability. We propose further improving strategic partnerships in specific industries. By combining our wealth of research capacity and industrial capabilities, Russia and China can become world leaders in information technology, cyber security, and artificial intelligence.
This YouTube video shows how even India is concerned about recent cybersecurity collaboration agreements between Russia and China:
The recent federal government discussions regarding a ban on TikTok and other Chinese or Russian companies from doing business in the U.S. is another example of the tensions that are rising at the moment.
Bottom line, the simultaneous challenges that include the war in Ukraine, cooperation between NATO enemies in cyberspace and hostile nation-state collaboration with cyber criminals is leading to an increased risk profile for cyber defenders in the U.S. and within NATO over the next decade. The global cyber temperature is rising, and the stakes have never been higher.
State and local governments need to visit the CISA Shields Up website to learn more about the latest cyber threats impacting their sectors and what they can do about them.
Original post:
Growing Nation-State Alliances Increase U.S. Cyber Risks - Government Technology
RPS students asked not to report to school on Monday – ABC 6 News KAAL TV
(ABC 6 News) After announcing that they are investigating a cybersecurity threat, Rochester Public Schools is asking students not to report to school on Monday.
On Thursday, April 6, the RPS technology staff detected unusual activity on their school districts technology network. RPS says they are working with third-party cybersecurity professionals to conduct a detailed examination of RPS systems and data.
In the meantime, students and staff will not be able to access their RPS Google accounts. RPS said phones at school district buildings are also being impacted.
Now RPS is saying that it would be difficult to provide students with instruction without internet access and their core systems. So they are asking students to stay home on Monday.
The district will use the day to plan on how to operate schools with no or reduced access to technology.
Sports and other extracurricular activities will go on as planned and School Aged Child Care (SACC) will also continue.
The district plans to have students back in the classroom on Tuesday.
You can read more about the cyber security threat here.
Heres a link to the school districts Youtube channel with Superintendent Kent Pekels response.
Click here
Go here to see the original:
RPS students asked not to report to school on Monday - ABC 6 News KAAL TV
Leonardo and Siemens collaborate on a new integrated offer … – Leonardo
Objective: leadership in the digital industrial transformation market with advanced cybersecurity solutions for IT/OT (Information Technology/Operational Technology) infrastructures in the energy, oil & gas, and industrial sectors
The objective of the MoU (Memorandum of Understanding) signed by Leonardo and Siemens Digital Industries is an integrated offer of advanced cybersecurity solutions for IT/OT technologies (Information Technology/Operational Technology), which is dedicated to digital, secure, connected and integrated industrial infrastructures.
The agreement was created within a partnership between the two companies with the aim of bringing together specific development skills of services and solutions, which are aimed at protecting the IT/OT infrastructure (infrastructures with dedicated hardware and sofware devices) of industrial sites. The main area of intervention will concern the resilience against accidents and cyber attacks to automation and connectivity systems that monitor and supervise assets, equipment and processes of critical infrastructures.
With the growing use of digitization, energy and industrial plants are increasingly interconnected and distributed: a revolution that offers opportunities in terms of competitiveness and sustainability. However, this requires particular attention to issues surrounding cyber security. An IT attack on the "cyber-physical" systems of critical infrastructures can in fact have serious repercussions on the availability of essential services for citizens and their own safety. The collaboration between Leonardo and Siemens will allow for complete protection: from threat intelligence; the detection of cyber threats to OT infrastructures; to their protection, both with attack monitoring and management services based on the experience of Leonardo's Global Security Operation Center, with the integration of Siemens technological systems of products for the prevention and response to incidents concerning individual connected devices (endpoint protection).
"Thanks to this agreement, Leonardo and Siemens can create new synergies based on complementary technologies and skills, with the aim of jointly developing solutions capable of responding more effectively to the growing cybernetic challenges in the industrial and energy sector", said Alessandro Profumo, Leonardo's Chief Executive Officer. "In this regard, Leonardo's evolutionary path traced to the Be Tomorrow 2030 strategic plan continues, the aims of which are to make our company the cornerstone of a technological ecosystem capable of protecting the safety of citizens and promoting, together with institutions and partners, the country's long-term competitiveness".
We are very satisfied with this partnership which focuses on cybersecurity, an essential factor for the development of a secure and reliable digital economy. With innovative technology that combines the real and digital world in order to guarantee security, protecting comapnies know-how and their productivity, we help them to be more competitive. Together with Leonardo, we combine their undoubted ability to integrate systems with our technology, creating a unique synergy and proposal to the market. Our goal, therefore, is to create further value for the Italian industry and help our country in its digital transformation, said Giuliano Busetto, Head of Siemens Digital Industries.
The agreement provides an integrated commercial proposition both with joint solutions and with proprietary products and services of the two companies, to meet the needs of the oil & gas, energy, and industry markets. The agreement also regulates cyber security training, with a catalogue of courses dedicated to the OT sector, which will be able to take advantage of the platforms and infrastructures of Leonardo's Cyber & Security Academy.
The technological solutions created will also be able to become part of Xcelerator, Siemens' open digital platform, which includes a complete portfolio of hardware, software and digital services enabled for the Internet of Things (IoT).
Leonardo, a global high-technology company, is among the top world players in Aerospace, Defence and Security and Italys main industrial company. Organized into five business divisions, Leonardo has a significant industrial presence in Italy, the United Kingdom, Poland and the USA, where it also operates through subsidiaries that include Leonardo DRS (defense electronics), and joint ventures and partnerships: ATR, MBDA, Telespazio, Thales Alenia Space and Avio. Leonardo competes in the most important international markets by leveraging its areas of technological and product leadership (Helicopters, Aircraft, Aerostructures, Electronics, Cyber & Security Solutions and Space). Listed on the Milan Stock Exchange (LDO), in 2021 Leonardo recorded consolidated revenues of 14.1 billion and invested 1.8 billion in Research and Development. The company has been part of the Dow Jones Sustainability Indices (DJSI) since 2010 and has been confirmed among the global sustainability leaders in 2022. Leonardo is also included in the MIB ESG index.
Siemens Digital Industries (DI) is an innovation leader in automation and digitalization. Closely collaborating with partners and customers, DI drives the digital transformation in the process and discrete industries. With its Digital Enterprise portfolio, DI provides companies of all sizes with an end-to-end set of products, solutions and services to integrate and digitalize the entire value chain. Optimized for the specific needs of each industry, DIs unique portfolio supports customers to achieve greater productivity and flexibility. DI is constantly adding innovations to its portfolio to integrate cutting-edge future technologies. Siemens Digital Industries has its global headquarters in Nuremberg, Germany, and has around 76,000 employees internationally.Siemens AG (Berlin and Munich) is a technology company focused on industry, infrastructure, transport, and healthcare. From more resource-efficient factories, resilient supply chains, and smarter buildings and grids, to cleaner and more comfortable transportation as well as advanced healthcare, the company creates technology with purpose adding real value for customers. By combining the real and the digital worlds, Siemens empowers its customers to transform their industries and markets, helping them to transform the everyday for billions of people. Siemens also owns a majority stake in the publicly listed company Siemens Healthineers, a globally leading medical technology provider shaping the future of healthcare. In addition, Siemens holds a minority stake in Siemens Energy, a global leader in the transmission and generation of electrical power.In fiscal 2022, which ended on September 30, 2022, the Siemens Group generated revenue of 72.0 billion and net income of 4.4 billion. As of September 30, 2022, the company had around 311,000 employees worldwide. Further information is available on the Internet at http://www.siemens.com. In Italy Siemens has its headquarters in Milan. It has global competence centers on electric mobility and smart grid, industrial software, smart building as well as Digital Enterprise Experience Center (DEX). Committed to Education, the company carries out annual training initiatives aimed at students in High Technical Institutes and STEM undergraduates, boasts collaborations with universities, ITS Angelo Rizzoli and ITS Lombardia for New Mechanical and Mechatronic Technologies. It is a founding member of the Milan Polytechnic Foundation. For more information, visit http://www.siemens.it
See the article here:
Leonardo and Siemens collaborate on a new integrated offer ... - Leonardo
Man Who Possessed Child Pornography Sentenced to Over Five … – Department of Justice
A man who possessed over 3,500 photographs and 25 videos of child pornography was sentenced today to more than 5 years in federal prison.
Jeff Gruber, age 60, from Sumner, Iowa, received the prison term after an October 13, 2022 guilty plea to possession of child pornography.
At the guilty plea, Gruber admitted he possessed child pornography on his computer between November 2016 and March 2017.
Gruber was sentenced in Cedar Rapids by United States District Court Judge C.J. Williams. Gruber was sentenced to 63 months imprisonment. He was also ordered to make restitution. He must also serve a 5-year term of supervised release after the prison term. There is no parole in the federal system.
This case was brought as part of Project Safe Childhood, a nationwide initiative launched in May 2006 by the Department of Justice to combat the growing epidemic of child sexual exploitation and abuse. Led by the United States Attorneys Offices and the Criminal Division's Child Exploitation and Obscenity Section, Project Safe Childhood marshals federal, state, and local resources to locate, apprehend, and prosecute individuals who sexually exploit children, and to identify and rescue victims. For more information about Project Safe Childhood, please visit http://www.usdoj.gov/psc. For more information about internet safety education, please visit http://www.usdoj.gov/psc and click on the tab resources.
Gruber is being held in the United States Marshals custody until he can be transported to a federal prison.
The case was prosecuted by Assistant United States Attorney Liz Dupuich and investigated by Homeland Security Investigations, the Iowa Division of Criminal Investigation and the Sumner Police Department..
Court file information at https://ecf.iand.uscourts.gov/cgi-bin/login.pl.
The case file number is 22-cr-2054.
Follow us on Twitter @USAO_NDIA.
See the article here:
Man Who Possessed Child Pornography Sentenced to Over Five ... - Department of Justice
CEM in 2022: Another Big Learning Curve – BlackBerry Blog
2022 was an unforgettable year of events that impacted people and organizations around the world. It included the tail-end of COVID-19 upheavals, a rise in cyber incidents, increasingly extreme weather, the war in Ukraine, and much more. It seemed like organizations faced a new crisis every week that challenged their people, supply chains, and IT systems to be even more resilient than they already are.
So, what did we learn about managing it all?
To find a few answers, I spoke with BlackBerry AtHoc Vice President of Product and Services Ramon Pinero. With a career in critical event management (CEM) spanning more than 20 years, I knew he'd be able to provide a unique take on the major CEM-related trends of 2022.
The following are Ramons comments from our conversation.
The increase in cyber incidents during the pandemic had a negative impact on already-stretched IT teams, so it wasnt surprising that by 2022 there was an increase in investment in cybersecurity. This coincided with the expansion of the jurisdiction for business continuity professionals. Those same individuals responsible for keeping people safe during the pandemic had to incorporate cyber incidents into their plans, something not traditionally in their wheelhouse. However, given the brand reputation damages that can result from a cyberattack, including the impact on revenue and the effects on people and morale, it's understandable that business continuity departments are now incorporating cyber into their playbooks.
This also factors into something that began before 2022: The expansion of ITs jurisdiction puts it on a collision course and an eventual convergence with security. When we think of security within an organization, we often think of physical models: badge access, fire suppression, workplace violence or theft, and cameras and monitoring for suspicious activity. Cybersecurity coming under the umbrella of security overall has manifested in an internal struggle with budgets. Who owns it? Security and facilities?
Where we once kept Physical Security Operation Centers (PSOC) and Cyber Security Operation Centers (CSOC) separate, we saw these moving closer together in 2022. Where they fully merged, we created the Global Security Operation Center (GSOC). The GSOC has the ultimate responsibility for employee safety: facilities, security, and now cybersecurity, too. Secure communications solutions need to be comprehensive in scope, and security-focused organizations learned in 2022 just how valuable CEM solutions that address that full spectrum really are.
Extreme weather events are more frequent, and the impacts are increasing. In September 2022, Hurricane Ian pounded Florida. We had parts of the Gulf Coast's weather systems affecting the Eastern Seaboard and witnessed heat and wildfires on the West Coast. If you can't get to work because of weather conditions, or you're unable to work from home because the weather interrupted the internet connection, that's a significant productivity hit.
I think those organizations most impacted in 2022 were simply not as prepared as the ones who've already experienced those types of situations. Whats exacerbating the impact of these outages is that so much of our work relies on our connectivity, and that's almost the first thing to go. In the past, we would drive to work, sit at a desk, and use paper. We werent so reliant on being connected digitally across the globe. Critical event management and public safety alert systems need to work even when internet connectivity is down; for many solutions, thats a challenge.
Last year there was an improvement in mass notification awareness to keep people safe, driven by the war in Ukraine and regulatory enactments occurring in the European Union (EU). Here in the United States in California, I grew up getting my Saturday morning cartoons interrupted by Emergency Broadcast System tests. While many member states in the EU dont really have nationwide emergency mass notification systems, there's a growing call for them now. Were seeing newer technologies that can achieve that, like cell broadcasts and location-based SMS, to get the word out.
I think we became safer in 2022 despite everything going on because weve seen more organizations making deeper investments in CEM.
Unfortunately, people are still falling through the gaps. There are many places in rural communities that still need broadband access and better and more resilient cellular access available in emergency conditions. This is why BlackBerry invests in technologies that integrate with legacy forms of mass notifications, like sirens. For instance, I live in Northern California and there's a tsunami warning system installed every few miles along the coast.
More granularly, employers do have a duty to keep their employees safe during the workday. I know there are teams that accept 'good enough.' They ask: Why do I need a critical event management system when I can just blast an email or text message to my staff? This approach is risky for both the business and its people because there is no structure, no consistency, and no accountability. Theres not even a guarantee a message has been received, understood, or acted upon. Doing only the minimum without a fully-fledged system and defined plans isnt a viable safety strategy.
Id like to thank Ramon for his insights on the evolving state of CEM.In the coming weeks, well speak to other CEM experts about what they believe the industry can expect in 2023.Emergencies and business disruptions happen. Its how you prepare and respond to them that determines their impact.To discover how customers using BlackBerryCEM solutions are able to deploy their response teams faster and enable them to better prepare for, respond to, and recover from critical events more quickly, talk to a BlackBerry expert now.
Go here to see the original:
CEM in 2022: Another Big Learning Curve - BlackBerry Blog
2017 BEYA Scientist of the Year wins Outstanding Metaverse CTO … – BlackEngineer.com
Ernest Smiley is the chief data scientist and CISO at Kingdom Capital. He is also the founding CEO of Georgetown Analytics and Technology. His Black Engineer of the Year awards includes the 2017 Scientist of the Year and the 2023 Outstanding Metaverse Chief Technology Officer Award.
His career spans over 25 years, integrating computer systems for the U.S. Army, Department of Defense, defense department health systems, the Intelligence community, and commercial organizations. A true visionary in data science, machine learning, artificial intelligence, and predictive analysis, Smileys work has been instrumental in advancing the field and shaping the future. He has demonstrated exceptional leadership, technical expertise, and a deep understanding of the metaverse technologys potential to change how we interact, communicate, and do business.
Two people have loomed large in my life, encouraging, influencing, and guiding me, Smiley said in his acceptance speech at the Historically Black College and University (HBCU) Engineering Deans Recognition Program during the 2023 BEYA STEM Conference. My mother inspired me to become a scientist and an engineer. My brother set an example for me to give back to my community, and he learned from the best. We grew up in Alabama, and my brother lived across the street from Dr. Martin Luther King Jr. So, I treasured the opportunity to work with youth, helping them find their talent. Im grateful for this award, for the chance to work in my chosen field of STEM, for my colleagues and mentors along the way, and of course, for boundless gratitude for my mother and brother, whose values and lessons I carry with me always.
His work also aligns with the events theme of engineering resilience as he focuses on building and maintaining robust and secure infrastructure that can withstand unexpected events. In addition, his work has catalyzed the development of new technologies and opened up new possibilities for collaboration and innovation. And on top of all that, he spends time mentoring and building up the next generation of science, technology, engineering, and math (STEM) leaders.
He held many jobs across 17 federal agencies, working together to protect the U.S. He served as a chief data scientist/CTO at the National Geospatial-Intelligence Agency (NGA). In 2003, the National Imagery and Mapping Agency became the National Geospatial-Intelligence Agency. The NGA analyzes billions of images and miles of video captured by drones and satellites.
As NGAs chief data officer, Smiley worked closely with the U.S. Air Force, collecting and analyzing aerial surveillance using unmanned systems. They played a crucial role in gathering U.S. intelligence, including replicating Bin Ladens compound for SEAL Team Six.
After Smiley graduated from the University of Maryland College Park with a Bachelor of Science in 1988, he joined the U.S. Army in 1990, following a stint with defense contractors in Washington, D.C.
Within five years, Smiley managed more than 40 networking and computer systems engineers supporting information technology combat support for the defense departments Defense Information Systems Agency. DISA comprises nearly 6,000 civilian employees, over 1,500 active duty military personnel from the Army, Air Force, Navy, and Marine Corps, and 7,500 defense contractors.
Smileys team managed radios, telecommunications equipment, and secure computers and devices for a network supporting 70,000 military personnel throughout Europe. In addition, they designed network plans for 20,000 military personnel in Colorado Springs, Colorado, and Germany.
In 1996, Smiley took on the added responsibility of senior data center manager and network engineer with the Department of Energys Office of Intelligence and Counterintelligence.
Smiley helped protect national security information and technologies and national security missions in defense, homeland security, cybersecurity, intelligence, and energy security. For example, he was responsible for 30 networking and software engineers supporting the Department of Energys nationwide nuclear waste program. They designed and implemented LAN/WAN supporting Sprint customers, remote access services, network security, Cisco Routers, financial web servers, firewalls, and financial trading systems supporting one billion dollars of transactions (per day).
On October 1, 1996, the National Imagery and Mapping Agency, or NIMA, was formed to unite all the government agencies involved in cartography. Cartographers collect geographic information to create maps and charts for political, educational, and other purposes.
The National Imagery and Mapping Agency included the Defense Mapping Agency, Central Imagery Office, National Photographic Interpretation Center, and parts of the Central Intelligence Agency, Defense Airborne Reconnaissance Office, Defense Intelligence Agency, and National Reconnaissance Office. After September 11, 2001, NIMA took on added responsibilities, including homeland security and assisting the armed forces work in Iraq and Afghanistan.
So, in 2001, when Smiley arrived at the Office of the Secretary of Defense as deputy director and senior security manager, other factors were in play. The Office of the Secretary of Defense is the principal staff element of the Secretary of Defense in the exercise of policy development, planning, resource management, fiscal, and program evaluation responsibilities.
In the OSD, Smiley provided technical support to the defense department Information Technology Security Certification and Accreditation Process, performed network security testing on sensitive information systems, using RETINA, E-Eye Digital Security, and Internet Security System for all network devices in Kuwait, Iraq, and Afghanistan.
Smiley was recognized as Scientist of the Year at the BEYA STEM Conference for his contributions to integrating systems for the Department of Defense, warfighters, Intelligence professionals, and first responders. He holds a masters degree in technology management from Georgetown University, an MBA in finance and accounting, and a bachelors degree from the University of Maryland. He also holds a graduate certificate in Data Science from Georgetown University.
He also holds the following certifications: Certified in the Governance of Enterprise I.T. (CGEIT), Certified Software Analyst (CSA), Certified Information Security Manager (CISM), Certified in Risk and Information Systems Control (CRISC), Certified Project Manager (CPM), Certified Forensic Consultant (CFC) and Certified E-Commerce Consultant.
See the original post:
2017 BEYA Scientist of the Year wins Outstanding Metaverse CTO ... - BlackEngineer.com
Xponance Inc. Increases Stake in Zscaler, Inc. Amid Predicted … – Best Stocks
Xponance Inc. has positioned itself for potential gains in Zscaler, Inc. by increasing its stake in the company during the fourth quarter of last year, according to their 13F filing with the SEC. The firms holdings in Zscaler now amount to 11,436 shares valued at $1,280,000 as of their most recent filing.
Zscaler is a cloud-based internet security platform that provides a range of services including Zero Trust Exchange and Zscaler Internet Access. Founded by Jagtar Singh Chaudhry and Kailash Janakiraman, the company has a market capitalization of $15.05 billion with a price-to-earnings ratio of -45.30 and a beta of 0.85.
Despite opening at $103.74 on Friday, which represents a 52-week low for the stock, Zscalers moving average prices have been higher over both 50 and 200 days. Further metric analysis reveals an impressive quick ratio and current ratio indicating favorable liquidity ratios for the company.
Xponances position increase could prove to be astute as industry experts predict growth within the cybersecurity sector over the next few years due to increasing cyber threats and data breaches worldwide. As businesses continue to rely on digital solutions such as cloud computing and remote-working software, investing in companies that provide secure internet access may continue to be an attractive option for investors seeking long-term gains.
Overall, Xponances move demonstrates confidence in Zscalers business strategy while also positioning themselves well during this period of potential cybersecurity industry growth. While variables such as market competition and cybersecurity trends remain factors that investors must consider before making investment decisions, this move by Xponance exhibits confidence in Zscalers future success.
Zscaler, a leading cloud security company, has seen recent activity from institutional investors and insiders. Institutional investors have been adding or reducing their stakes in the companys stock. International Assets Investment Management LLC boosted its stake by 2.7%, Flagship Harbor Advisors LLC by 3.4%, Huntington National Bank by 29.8%, Brown Advisory Inc. by 2.3%, and ICICI Prudential Asset Management Co Ltd by 23.8%. In total, institutional investors and hedge funds own 45.33% of the stock.
The company has also seen insider selling activity, as Robert Schlossman sold 3,645 shares for $389,249.55 on March 16th and now owns 132,553 shares valued at $14,155,334.87. COO Dali Rajic sold 5,638 shares worth $602,082.02 on the same day and now owns 291,182 shares valued at $31,095,325.78.
Equities research analysts have issued several reports on Zscalers stock with ratings ranging from Moderate Buy to Strong Buy. Deutsche Bank Aktiengesellschaft lowered their target price to $140 from $190 while Wedbush reduced their price target from $180 to $150 based on data compiled from Bloomberg.com.
Zscaler focuses on cloud network security through its Zero Trust Exchange platform that securely connects users to applications without exposing them to risks traditionally associated with remote access solutions.
As cloud computing grows more popular among businesses worldwide due to its economic efficiency and consolidated operational approach therein lays a long-term opportunity for firms like Zscaler that specialize in protecting enterprises sensitive data stored off-premises through dedicated facilities with secure networks providing tangible advantages over less secure public connections.
In conclusion, Zcaler is slowly making its mark as it continues to reshape the cybersecurity market through innovation and making cloud computing safe for businesses.
See the article here:
Xponance Inc. Increases Stake in Zscaler, Inc. Amid Predicted ... - Best Stocks
What Happened to You Man?: Matt Taibbi Spars with Mehdi Hasan in Tense MSNBC Interview – Yahoo News
Twitter Files journalist Matt Taibbi had a tense conversation with MSNBC anchor Mehdi Hasan in a long-awaited interview that aired on Thursday.
Ive mocked him in the past for doing PR work for the worlds richest man and hes accused me of being an ardent establishment moralist, Hasan said before introducing a visibly frustrated Tabbi.
So you started off, as I expected, with the whole What happened to you man? routine, Taibbi shot back before explaining the importance of his recent reporting. There was an organized systematic structure in place for the FBI and DHS to talk not just to Twitter and to forward thousands of moderation requests to companies like Twitter but also to virtually every other social-media platform.
This is essentially an organized system of quasistate censorship and its alarming, its a lot more than what we thought was going to be there.
Later on in the conversation, Hasan challenged Taibbis reporting of the Twitter Files, specifically three tweets among now hundreds that the investigative reporter has since published online.
One concerned Taibbismisidentifying the Center for Internet Security with the Cybersecurity and Infrastructure Security Agency. Another centers on a contested number of flagged tweets.
After the interview, Taibbi took to Twitter to share his thoughts on the matter.
Again, Just had a very contentious interview with @MehdiRHasan, who made me aware of three errors in the #TwitterFiles which as a responsible journalist unlike MSNBC, which has not corrected years of huge mistakes I am now retracing/correcting, Taibbi tweeted Thursday afternoon. The formerRolling Stonewriter later said there were only two mistakes.
A few hours later, Taibbi once more expressed his frustration with Hasan.
Part of the job is facing critics and making corrections when appropriate. This is how we arrive at truth in a free press system. I went on @mehdirhasan today to defend the #TwitterFiles precisely because MSNBC hasnt engaged in this process across years of Russiagate reports, Taibbi wrote.
Story continues
For @mehdirhasan to gloat over two minor errors, while dismissing both the substance of censorship story in the #TwitterFiles and the fact that those stories exposed significant uncorrected mistakes by his own network, is incredible. I stand by my work.
A similar sentiment was expressed by Lee Fang, an investigative journalist with the Intercept and fellow Twitter Files reporter, who criticized Hasan for getting lost in the weeds of acronyms and missing the broader point about government censorship and free speech.
This is a particularly stupid gotcha given that CIS was the gov contractor working for CISA/DHS to help facilitate social media takedown requests Mehdi focuses on a minor error while obscuring the big picture to defend the Department of Homeland Securitys overreach, Fang tweeted on Thursday night.
Shortly after the interview began, Taibbi released an article on his outlet, Racket News, titled Eat Me, MSNBC, confessing that he was looking forward to speaking with Hasan as one would a root canal or a rectal.
For his part, Hasan argued that Taibbi avoided answering his questions.
Nearly two weeks ago, @mtaibbi challenged me on Twitter to invite him onto my show to discuss Elon Musk working with the Indian government to censor speech online. Today, he came on the show . . . and refused to talk about it or criticize Musk, Hasan wrote on Thursday.
The MSNBC anchor further accused Taibbi of lying under oath when testifying before Congress in March.
Read the original:
What Happened to You Man?: Matt Taibbi Spars with Mehdi Hasan in Tense MSNBC Interview - Yahoo News