Page 1,544«..1020..1,5431,5441,5451,546..1,5501,560..»

Cybersecurity frameworks and your company – Verdict

Like seatbelts, cybersecurity frameworks work best when you use them. Dozens of cybersecurity frameworks (CSFs) and models have been released over the years with the aim of assisting businesses in lowering the risks associated with cyberattacks.

Ransomware strains are being constantly modified and socially engineered to avoid detection by antivirus software. Some ransomware attacks incorporate worms that allow it to spread across networks, infecting devices beyond the initial source. SaaS applications, such as Microsoft 365, Google Workspace, and Dropbox are also vulnerable.Worse yet, ransomware attacks have skyrocketed over the past few years. According to Dattos 2020 Global State of the Channel Ransomware Report, 78% of managed service providers surveyed reported attacks against their small and medium-sized business clients over the last two years.Download this whitepaper to learn how Datto can help your organisations protect critical corporate data.

Please enter a work/business email address

By clicking the Download Free Whitepaper button, you accept the terms and conditions and acknowledge that your data will be used as described in the Datto privacy policy

By downloading this Whitepaper, you acknowledge that we may share your information with our white paper partners/sponsors who may contact you directly with information on their products and services.

Visit our privacy policy for more information about our services, how we may use, process and share your personal data, including information on your rights in respect of your personal data and how you can unsubscribe from future marketing communications. Our services are intended for corporate subscribers and you warrant that the email address submitted is your corporate email address.

Thank you.Please check your email to download the Whitepaper.

Which options firms should consider, with so many CSFs to pick from, is a difficult choice. The quick response is that it makes no difference; just make sure you use one. While no CSF is superior to any other, it is important to identify areas of similarity between them as well as discrepancies to make an optimal choice.

CIS (Centre for Internet Security): This is a non-profit organisation whose members work together to develop and identify efficient security methods. Its defence-in-depth strategy employs 18 CIS controls that are prioritised and created to guard against a.

CMMC (Cyber Security Maturity Model Certification): The US Department of Defence created the CMMC framework as a template for contractors in the Defence Industrial. It divides its controls into three categories: Foundation, Advanced, and Expert, and maps them to the NIST framework (below).

COBIT : (Control Objectives for Information and Related IT): ISACA, an international organisation with an emphasis on IT governance, developed the well-known COBIT framework, which is widely utilised in Europe and is suitable for large to medium-sized enterprises.

Essential Eight: The Australian Cyber Security Centre created this cybersecurity framework, and it consists of eight important elements created to help enterprises to defend themselves against different types of cyberattacks. This framework places a strong emphasis on safeguarding internet-connected networks running Microsoft Windows.

ISO 27001 (International Standards Organization): This is an international standard for managing information security. Upon a successful audit result, organisations receive certification. The 144 controls in 14 groups and 35 control categories covered by the ISO controls are extensive.

NIST: The National Institute of Standards and Technology published the NIST cybersecurity framework in 2014 with input from private-sector and government experts.

Zero Trust: Technically speaking, this is not a CSF, but a model that constantly verifies authenticity. Its basic tenet is never trust, always verify. The guiding concepts of the Zero Trust paradigm are that verification has to be explicit; it should employ the least privileged access, and anticipate that a system will definitely be compromised.

Almost continuous supply chain attacks, AI-based spear phishing, and hybrid work practices are behind a global cyber threats scenario that remains dangerous and severe. Attack strategies by bad actors are changing practically every minute, and cybercrime-as-a-service is becoming the norm.

More than 85% of attacks still originate at the human-machine interface, making it the main access point. This is because even with companies employing a wide range of security processes and technologies, social engineering and other emotional manipulation methods are the most effective ways to target employees.

Cyberattacks are rising daily and have to be defended by organisations because they pose a threat to normal company operations. Private-sector businesses across industries have implemented some of the many cybersecurity frameworks voluntarily, singly or in concert, like NIST and MITRE ATT&CK.

These were created to provide best practices to empower security teams to better manage and decrease cybersecurity risks, and to battle the constantly growing attack surface.

Organisations must not rely only on reactive measures to protect against the unprecedented rise in variety and direction of the threat landscape. Instead, they must go beyond cybersecurity frameworks to precisely identify, quantify, and manage key risks.

Companies must no longer only rely on a reactive detect-and-respond approach to protect their critical assets from pressing threats.

It is not true that maintaining compliance with security frameworks can absolutely guarantee system security for organisations. Firms must also assume responsibility for identifying their specific, individual security vulnerabilities/attack paths.

The moment has come to put security posture strengthening measures into action that go beyond merely satisfying compliance with regulations and baseline security standards.

Identify

The Identify function creates the base for further cybersecurity-related actions your firm will take. The success of the framework depends on knowing what is out there, what risks are associated with those settings, and how it relates to your business strategy.

Protect

Going deeper into the framework, PR.DS (Protect Data Security) comprises seven sub-categories, each of which is meant to assure the safety of data. These include measures for securing data while it is in motion (PR.DS-2), securing data while it is at rest (PR.DS-1), and so forth. For example, the organisation might require encryption of data at rest to comply with PR.DS-1.

Detect

The establishment and execution of the necessary processes to identify the presence of a cybersecurity event are required by the Detect function. It makes it possible to quickly identify cybersecurity incidents.

Respond

The Respond function is responsible for operations related to planning, analysing, and mitigating responses in order to ensure that the cybersecurity programme is always improving.

Recover

To lessen the impact of a cybersecurity incident, the Recover step permits a quick return to routine activity. Some examples of outcomes include communications, recovery planning, and improvements by this core Framework function.

The ability of a business to anticipate, withstand, and recover from a cyberattack is known as cyber resilience. This includes cyber security, business continuity, and incident response, and is based on the ability to successfully identify, protect, detect, respond, and recover fast from any cyber incident.

MSPs are at the heart of an asymmetrical battle, meaning the threat actor has numerous ways to attack that [Datto] partner, and partners are critical because they hold the keys to the kingdom; theyre the single point to multiple businesses so attacking a partner is really a juicy target for a bad actor, says Chris McKie, VP of security solutions product marketing at Datto.

They can attack them [a partner] or their customers by any number of means: email, network, endpoint, cloud. They have the advantage that they need to just to find one vulnerability, they need to find one person to click on one link to deliver the malicious payload.

On the flip side, the partner is at an unequalled disadvantage because they have to cover and protect everything. This asymmetrical battle puts threat actors at a huge advantage while putting the MSP at a tremendous disadvantage, says McKie.

To address this we, the [cyber security] industry have come up with these CSFs. Thats the genesis of why there are frameworks in the first place. To help everybody to evaluate their entire security stack from a holistic, comprehensive point of view to address the asymmetrical battle. If youre not using a framework, its like going into a battle without a plan. Youre probably going to lose, and lose badly.

The whole point of a framework says McKie is that it gives you that strategy, that roadmap and tools that strengthen not only the MSPs position, but also that of their customers. If you dont have a solid recovery solution in place, BCDR for example, and you suffer a breach by a ransomware attack and your systems go down, youre out of business for some time.

The average breach costs around $8k per hour between the point of attack to the time of remediation. Thats serious money lost and, possibly, reputational damage! Something like 60% of small businesses that get hit go out of business, says McKie.

Because of this, you need tools that provide comprehensive, defence-in-depth abilities to identify, protect, detect, respond and recover against a myriad of threats. You cant protect what you cant see. This makes Datto RMM a must-have weapon in your cybersecurity arsenal.

Datto RMM is a robust platform for remote monitoring and management. To reduce costs and enhance service delivery, managed service providers (MSPs) can use Datto RMM to remotely secure, monitor, and control endpoints.

The only channel RMM to be reviewed so far, Datto RMM is in the top 20% of all businesses that are going through their Building Security in Maturity Model (BSIMM) evaluation.

Datto RMM was developed with a strict emphasis on security. The company makes it simple for its customers to concentrate on service delivery as there is no hardware to maintain and it boasts an uptime of 99.99% availability. It is dedicated to improving client endpoint security for MSPs and platform security.

Ransomware strains are being constantly modified and socially engineered to avoid detection by antivirus software. Some ransomware attacks incorporate worms that allow it to spread across networks, infecting devices beyond the initial source. SaaS applications, such as Microsoft 365, Google Workspace, and Dropbox are also vulnerable.Worse yet, ransomware attacks have skyrocketed over the past few years. According to Dattos 2020 Global State of the Channel Ransomware Report, 78% of managed service providers surveyed reported attacks against their small and medium-sized business clients over the last two years.Download this whitepaper to learn how Datto can help your organisations protect critical corporate data.

Please enter a work/business email address

By clicking the Download Free Whitepaper button, you accept the terms and conditions and acknowledge that your data will be used as described in the Datto privacy policy

By downloading this Whitepaper, you acknowledge that we may share your information with our white paper partners/sponsors who may contact you directly with information on their products and services.

Visit our privacy policy for more information about our services, how we may use, process and share your personal data, including information on your rights in respect of your personal data and how you can unsubscribe from future marketing communications. Our services are intended for corporate subscribers and you warrant that the email address submitted is your corporate email address.

Thank you.Please check your email to download the Whitepaper.

Continued here:
Cybersecurity frameworks and your company - Verdict

Read More..

What cyber-victims need to do? – newagebd.net

THE crime pattern in the digital world is almost the same. In court, it is often observed that the perpetrators are more or less cyber experts while the victims are relatively cyber incompetent or unaware. About 30 per cent of cases pending in tribunals are romance scandals, where a womans private moments are captured with or without her consent. The criminal later publishes those obscene pictures or videos on social media to take revenge, defame the woman, or blackmail her for money. Cases of false information, threats, and denigrations account for close to 35 per cent, and the remaining 65 per cent of cases are filed against cheating, fraud, hacking, incitement, and attacks on religion. According to the CCAF research report, among the victims, 57 per cent are women, and 43 per cent are men. Women are more victims compared to men, mainly for two reasons: a lack of cyber security awareness among them and victim blaming. However, the lack of cyber awareness increases the possibility of becoming a victim of cybercrime for both men and women, while criminals take advantage of the latter, particularly blaming women.

Compared to other crimes, the magnitude and impact of cybercrime are dire. One of the reasons is that the incidents of cybercrime spread across the globe in an instant. People can see it before it is verified as true or false; the victims fame and purity will be at stake, and it will not be easy to recover. Secondly, identifying a cyber-criminal is not painless. Cyber criminals are usually cyber-savvy and may be able to remain anonymous. Thirdly, the perpetrator does not need to be present at the crime scene to commit a cybercrime. A criminal can hack anyones Facebook account while sitting abroad. That is why cybercrime is a transnational crime that has no borders. Fourthly, the evidence used in cybercrime is difficult to collect, and presenting it in court with an opinion after an expert examination is even more difficult. Fifthly, the Digital Security Act, 2018 is a special act, and the terms used in the act are highly technical and not easy to understand for ordinary people.

Currently, about four thousand cyber cases are pending in different tribunals nationwide. The actual number of cybercrimes is higher than the number of cases reported. Due to public shame of victims, fear, and the complexity of the prosecution process, fewer cases come to the tribunal for trial than the actual number of crimes.

According to the Bangladesh Telecommunication Regulatory Commission, there are about 12.5 crore internet users in Bangladesh. There is no debate that Facebook is the most popular social media site in the country. According to Napoleon Cut data, 5.90 crore people now use Facebook, with women accounting for 32 per cent and men accounting for 68 per cent. The number of conscious internet users is insignificant among this enormous number. There are set principles and norms for using social media. Some love to ignore those, and some are not well acquainted with them. Some are unknowingly committing cybercrimes and violating laws and rules. A common perception is that the victims cannot seek justice if obscene pictures or videos are captured with their consent. This is wrong. As per law, whoever publishes such photographs or videos with ill motives or intentions whether the person is a man or a woman commits a cybercrime. However, none should be allowed to take and share personal photos or videos. Sharing a secret password with anyone to show loyalty and prove trust is entirely unwise. Besides, the culprits are misusing the technology by editing normal pictures into naked ones and even making pornographic videos.

Prevention is better than cure and should be the policy to tackle cybercrime. The loss already incurred cannot be compensated for once the offence is committed. The following precautions are vital to prevent crime: (a) strong passwords. Simple passwords such as birthdays, cell phone numbers, and names are not suitable; (b) two-way authentication, one gets an alert notification if unauthorised access is noticed; (c) no sharing of passwords with anyone, not even close family members, because the relationship could end at any time, (d) no sharing of private photos or videos with anyone being emotional, as the emotion of a weak moment may bring extreme suffering in life. Photos or videos captured are stored in the cloud where a wrongdoer may get access and blackmail if the mobile is stolen, hacked, damaged, or needs repairing; (e) it is not wise to open unsolicited messages, emails, or online links, as these might be trapping; (f) updated internet security on the laptop, computer, or mobile for better protection; (g) it is essential to check and monitor the friends list on social media, choose friends carefully, and be vigilant to protect and respect ones privacy.

However, once the crime is committed, the first task is to collect and preserve screenshots, links, and pictures of the crime as evidence; and report the criminal incident to the cyber unit of the police department. The Helpline service is also very active. One can file a general diary or first information report at the police station if necessary. Another door that is open for litigation is the cyber tribunal. The required forensic evidence may not be found when the criminal deletes, edits, or makes only-me his post. Facebook and Google respect users privacy and do not give complete information to the police. It is crucial to recover and seize the device used in the crime to prove the case. The faster the perpetrator is identified and apprehended, the greater the chances of getting proper justice.

Along with technological development, cybercrime will also continue to grow. So let us be aware and vigilant and prevent cybercrime.

Md Ziaur Rahman studies at Queensland University of Technology, Australia.

Go here to read the rest:
What cyber-victims need to do? - newagebd.net

Read More..

WhatsApp users alert! This WhatsApp clone is riddled with malware; Do this NOW – HT Tech

Are you using a cloned WhatsApp? Check what it can do to your Android phone. Delete it immediately.

WhatsApp users need to bring their attention to this latest fake WhatsApp app which is riddled with malware to harm their device. The latest report by Malware protection and Internet Security firm ESET has revealed that India is among the countries with most Android infections as threat detections continued to rise by 9.5 percent. Shockingly, GB WhatsApp' is responsible for most of these apps, which is a third-party WhatsApp clone.

The report added that the fake WhatsApp application offers almost all the standard features of a real app to its users along with some extra benefits. These trojan-loaded apps carry malware files which can reach a target device without any detection with the ability to even secretly recording audio and video. The worst part is that it will not be noticed immediately, and will slowly spy on your smartphone's day-to-day activities.

Behind a large portion of Android/Spy.Agent detections recognized in ESET telemetry is GB WhatsApp a popular but cloned (and therefore unofficial) third-party version of WhatsApp with additional features. However, the cloned app is not available on Google Play; there are no security checks in place compared with the legitimate WhatsApp and versions available on various download websites are riddled with malware, the report mentioned.

It further stated that WhatsApp is temporarily banning WhatsApp accounts that use such unsupported apps and if these accounts continue to use them, they are permanently banned from accessing WhatsApp. Most of the cases of such apps are detected in Egypt, Brazil, India, and Peru. However, China (53%) and India (35%) continued to have the highest number of IoT bots geolocated inside the respective countries, the report mentioned.

Read more here:
WhatsApp users alert! This WhatsApp clone is riddled with malware; Do this NOW - HT Tech

Read More..

WISeKey and OISTE.org Foundation Presented AI and Digital Identity at the Global Dialog on the Interplay Between Human Intelligence and Artificial…

WISeKey and OISTE.org Foundation Presented AI and Digital Identity at the Global Dialog on the Interplay BetweenHuman IntelligenceandArtificial Intelligence

Geneva October 10, 2022 - WISeKey International Holding Ltd (WISeKey ) (SIX: WIHN, NASDAQ: WKEY), a leading global cybersecurity, AI, Blockchain and IoT company and the OISTE.org foundation presented the subject of AI and Digital Identity at the Global Dialog on the interplay betweenHuman IntelligenceandArtificial Intelligence.

TheUnited Nations Alliance of Civilizations (UNAOC) and theFundacin Onuartare co-organizing a high-level global dialogue on the interplay betweenHuman IntelligenceandA!for better public affairs management, to pave the way for new private sector initiatives that bolster positive global development driven by innovation and inclusiveness.

AI, in the service of humanity, can drive diversity, respect and progress for all through innovation. Moving forward under a strong public-private partnership is essential to this end. The Global Dialogue aims to further strengthen this cooperation.

The two-day event will be inaugurated by high-level keynote speakers, with participants from the public and private sector bringing forth their expertise in the field. Speakers will discuss and share with the audience how their organizations and companies approach AI and AI-enabled technologies and expound on their vision moving forward.

Carlos Moreira, WISeKeys Founder and CEO, during his presentation highlighted the need to use decentralized technologies related to Digital Identity and Blockchain which are in line with the United Nations Sustainable Development Goals aiming on providing every person on the planet with a solid and tamper-proof digital identity based on common, interoperable standards by 2030.

A digital identity under the control of the person is a fundamental human right which is not currently protected neither understood. It is also an endangered right due the exponentiality of the technology. Current digital technologies track and scrutinize us by taking into consideration onlyour consumer identity and not our human identity.

The digital economy considers every click, search or like as an asset to be monetized. Our lives, reflected in cyberspace, are plundered for behavioral data for the sake of a system that converts our freedom into profit. We are quietly being domesticated into accepting as normal that decision rights vanish before we even know that there is a decision to make.

We, collectively as humans, have to decide if we are building a better future for humanity with the help of magnificent technologyor building a future of better technology at the expense of humanity.Weve been down this road before, and it didnt turn out well. We collectively made the wrong decisionor, better said, we didnt make the right decision fast enough. We didnt put humanity first and instead got caught up in the promise of technology.A new awareness infused by a human-rights based approach that consider each individual netizen as a dignified moral being, worth of respect, is required. Otherwise, our connectivity will continue to offer a perverse amalgam of empowerment inextricably layered with diminishment, said Mr. Moreira.

About WISeKeyWISeKey (NASDAQ: WKEY; SIX Swiss Exchange: WIHN) is a leading global cybersecurity company currently deploying large-scale digital identity ecosystems for people and objects using Blockchain, AI, and IoT respecting the Human as the Fulcrum of the Internet. WISeKey microprocessors secure the pervasive computing shaping todays Internet of Everything. WISeKey IoT has an installed base of over 1.6 billion microchips in virtually all IoT sectors (connected cars, smart cities, drones, agricultural sensors, anti-counterfeiting, smart lighting, servers, computers, mobile phones, crypto tokens, etc.). WISeKey is uniquely positioned to be at the leading edge of IoT as our semiconductors produce a huge amount of Big Data that, when analyzed with Artificial Intelligence (AI), can help industrial applications predict the failure of their equipment before it happens.

Our technology is Trusted by the OISTE/WISeKeys Swiss-based cryptographic Root of Trust (RoT) provides secure authentication and identification, in both physical and virtual environments, for the Internet of Things, Blockchain, and Artificial Intelligence. The WISeKey RoT serves as a common trust anchor to ensure the integrity of online transactions among objects and between objects and people. For more information, visitwww.wisekey.com.

Press and investor contacts

Disclaimer:This communication expressly or implicitly contains certain forward-looking statements concerning WISeKey International Holding Ltd and its business. Such statements involve certain known and unknown risks, uncertainties and other factors, which could cause the actual results, financial condition, performance or achievements of WISeKey International Holding Ltd to be materially different from any future results, performance or achievements expressed or implied by such forward-looking statements. WISeKey International Holding Ltd is providing this communication as of this date and does not undertake to update any forward-looking statements contained herein as a result of new information, future events or otherwise.This press release does not constitute an offer to sell, or a solicitation of an offer to buy, any securities, and it does not constitute an offering prospectus within the meaning of article 652a or article 1156 of the Swiss Code of Obligations or a listing prospectus within the meaning of the listing rules of the SIX Swiss Exchange. Investors must rely on their own evaluation of WISeKey and its securities, including the merits and risks involved. Nothing contained herein is or shall be relied on as, a promise or representation as to the future performance of WISeKey.

Visit link:
WISeKey and OISTE.org Foundation Presented AI and Digital Identity at the Global Dialog on the Interplay Between Human Intelligence and Artificial...

Read More..

China’s Artificial Intelligence Market Will Exceed US$26.7 Billion by 2026, according to IDC EMSNow – EMSNow

IDC recently released the IDCWorldwide Artificial Intelligence Spending Guide. Data shows that total global IT investment in artificial intelligence (AI) in 2021 was US$92.95 billion, expected to increase to US$301.43 billion in 2026, and the compound annual growth rate (CAGR) was about 26.5%. As for the China market, IDC predicts that Chinas AI investment is expected to reach US$26.69 billion in 2026, accounting for about 8.9% of global investment, ranking second in the world among other countries. In recent years, more and more enterprises have become involved in the Digintelligence Era and started the deployment of digital transformation (DX) and intelligent upgrading, which has thus spawned more demand for AI. Driven by policies, technologies, and markets, AI empowering industries is becoming a mainstream development trend.

Technology Dimension

Over the next five years, the hardware market will be the largest primary market in Chinas AI market, accounting for more than half of the total AI investment. IDC predicts that Chinas IT investment in the AI hardware market will exceed US$15 billion in 2026, close to that of the AI hardware market size of the United States. With the gradual improvement of AI infrastructure construction, hardware growth will gradually slow down, with the five-year CAGR remaining around 16.5%. The server market, as the main part of the hardware market, will account for over 80% over the five-year forecast period.

At the same time, the services market will expand at a faster pace, with the five-year CAGR expected to be about 29.6%. Total investment in the services market is expected to exceed US$4 billion in 2026, nearly four times the investment in 2021, with significant market growth. The AI services market as defined by IDC is mainly dominated by the IT services segment. IDC predicts that IT services will lead the services market growth at a five-year CAGR of 31.0%.

From the perspective of AI software, under the joint promotion of the gradual development of technologies including machine learning (ML) and computer vision, Chinas policy environment, and the gradually diversified customer needs, Chinas AI software market share will increase year by year, and more than 25% of the AI marketrelated IT investment will flow to software in 2026. In terms of growth rate, the AI software market will become the fastest-growing primary market during the five-year forecast period, with a five-year CAGR of about 30.4%. From the perspective of the technology segment, AI platforms will absorb more than 70% of software-related spending over the next five years and will become an important driving force for software market growth at a five-year CAGR of 33.1%.

Industry Application

IDC predicts that the AI-related spending of users in the four major endpoint industries professional services, government, finance, and telecom will continue to lead over the five-year forecast period, which will collectively exceed 60% of the total spending of Chinas AI market. Specifically, local governments. AI spending will lead AI investment growth with a five-year CAGR of 24.3% and is expected to exceed US$2.51 billion in 2026; and it is expected that the central government will have a five-year CAGR of 19.4% and reach US$1.37 billion in 2026. The market size of the financial sector represented by banks will continue to grow over the next few years, with the five-year CAGR expected to exceed 21.0%. In addition, the construction, discrete manufacturing, and healthcare industries have also achieved high growth rates, jointly promoting the development and application of Chinas AI. In the future, AI will be applied in various industries, with expansion in both width and depth. It will further effectively support the industries to achieve intelligent marketing and decision-making. At the same time, the deep integration of AI with industries will stimulate more potential and foster more business opportunities.

Use Case

Based on research conducted on the industries mentioned earlier, IDC Worldwide Artificial Intelligence Spending Guide covers 29 typical key AI use cases, which will be updated to reflect the market dynamics. Three use cases, namely, augmented customer service agents, public safety and emergency response, and smart business innovation and automation, will continue to remain dominant. The three together will account for more than 30% during the five-year forecast period. Currently, there are mature applications of AI in various industry use cases. It completes independent judgment and behavior learning through technologies, such as deep learning, computer vision, and image recognition, to solve a variety of complex tasks, laying an important foundation for the intelligent transformation of the industry. In use cases, customer service agents are developing rapidly, with cases in finance, retail, and other industries. Public safety and emergency response are mainly involved in the field of government security, and biometrics is used for fingerprint and face recognition. In the future, with the increasing development of AI chips, 5G, and other technologies, AI will also be better implemented in more fields.

Read more:
China's Artificial Intelligence Market Will Exceed US$26.7 Billion by 2026, according to IDC EMSNow - EMSNow

Read More..

Talking Point: Secrets of The Dark Web – ABC News

Data breaches of our information are becoming more commonplace these days. Billions of records are stolen worldwide annually. It usually ends up on the Dark Web, so just what is it? Why isn't it controlled and supervised by communication authorities?

Although the Dark Web is associated with illegal activities, it is also used by the intelligence community, whistleblowers, members of the media and ordinary citizens whose communication may be monitored or restricted by the government.

Talking Point with Rod Quinn looked at what is considered the internet's lurid underbelly, the Dark Web with guest, Dr Jeffery Foster, Associate Professor in Cyber Security Studies at Macquarie University's Department of Security Studies and Criminology.

Broadcast7 Oct 20227 Oct 2022Fri 7 Oct 2022 at 3:00pm

Sydney, Arts, Culture and Entertainment, Business, Economics and Finance, Community and Society, Defence and National Security, Government and Politics, Human Interest, Information and Communication, Law, Crime and Justice, Lifestyle and Leisure, Unrest, Conflict and War

Read the original here:
Talking Point: Secrets of The Dark Web - ABC News

Read More..

Tech companies tapping artificial intelligence to treat and predict mental health disorders – CNA

SINGAPORE: Could the future of managing mental health lie in strings of code and predictive models?

Behavioural health tech provider Holmusk is banking on that, partnering authorities in Singapore to develop a suite of digital tools for hospitals and clinics.

One solution the firm is looking to introduce is a smart pill to track when patients forget or skip their medication.

How that works, is through a small, grain-sized biosensor embedded within the pill, and a sticky patch on the patients body that can detect when the pill is ingested. The technology is approved in the United States.

Let's say schizophrenia, depression patients with some psychosis not taking the pill for a few days can be bad enough to drive them off the cliff. And if you knew that they have stopped taking the pill two days in a row, you can intervene. You can catch them early, chief analytics officer of Holmusk, Joydeep Sarkar, told CNA.

He described the sensor as a "fascinating solution", which will work with other parts of the puzzle - ensuring that the information is fed into the patients clinical records, flagging missed doses, and ensuring any necessary intervention is part of the workflow.

The firm has also developed an artificial intelligence (AI) model to analyse information from notes-driven mental health treatment or therapy.

This may allow researchers to generate insights into the efficacy of treatments and the progression of disorders at a larger scale in future.

Such data in areas like medication and treatment could also feed into predictive models to understand the risks surrounding each patient.

"A big part of where artificial intelligence plays a role is more complex patients - where the answers are not obvious, Mr Sarkar said.

Let's say somebody comes in and you stabilise them, and you keep them in the hospital. When is it okay to release them What support systems could you actually really have in place so that patients don't get worse?

One disease his firm is looking to zoom in on is bipolar disorder, which has a high genetic component.

The aim is to tap data to identify and track those at risk of developing the disorder to catch the signs early.

"I call them the low-hanging fruit because you don't really need much, (you) just (need) to connect the data, Mr Sarkar said.

Other industry players are also looking to tap into artificial intelligence to help people take care of their own mental health.

Among them is mental health platform Intellect, which has attracted 3 million users globally since its launch in 2020.Mental health has long been a very strong need across Asia, in the world. That has been unmet in support. We've seen quite a sharp rise in client service over two years, said Intellect chief executive Theodoric Chew.

Intellect's app uses information like user-reported moods and usage patterns to recommend programmes to users. It also uses algorithms to match individuals to therapists, based on their needs and specialisations.

The app counts 24-year-old Charis Liang among its users. The undergraduate, who previously worked as an intern at the company, takes to the app for sessions when she's overwhelmed and needs help quickly.

You can't call up your therapist at 3am, but you can do this", she said. Ms Liang said exercises on the app, based on cognitive behavioural therapy, are similar to what she went through at a traditional therapy session with the added ease of being on-demand.

Originally posted here:
Tech companies tapping artificial intelligence to treat and predict mental health disorders - CNA

Read More..

Column: The artificial intelligence field is infected with hype. Here’s how not to get duped – Yahoo Finance

The star of the show at Tesla's annual "AI Day" (for "artificial intelligence") on Sept. 30 was a humanoid robot introduced by Tesla Chief Executive Elon Musk as "Optimus."

The robot could walk, if gingerly, and perform a few repetitive mechanical tasks such as waving its arms and wielding a watering can over plant boxes. The demo was greeted enthusiastically by the several hundred engineers in the audience, many of whom hoped to land a job with Tesla.

"This means a future of abundance," Musk proclaimed from the stage. "A future where there is no poverty. ... It really is a fundamental transformation of civilization as we know it."

We still don't have a learning paradigm that allows machines to learn how the world works, like human and many non-human babies do.

AI researcher Yann LeCun

Robotics experts watching remotely were less impressed. "Not mind-blowing" was the sober judgment of Christian Hubicki of Florida State University.

Some AI experts were even less charitable. "The event was quite the dud," Ben Shneiderman of the University of Maryland told me. Among other shortcomings, Musk failed to articulate a coherent use case for the robot that is, what would it do?

To Shneiderman and others in the AI field, the Tesla demo embodied some of the worst qualities of AI hype; its reduction to humanoid characters, its exorbitant promises, its promotion by self-interested entrepreneurs and its suggestion that AI systems or devices can function autonomously, without human guidance, to achieve results that outmatch human capacities.

"When news articles uncritically repeat PR statements, overuse images of robots, attribute agency to AI tools, or downplay their limitations, they mislead and misinform readers about the potential and limitations of AI," Sayash Kapoor and Arvind Narayanan wrote in a checklist of AI reporting pitfalls posted online the very day of the Tesla demo.

Story continues

"When we talk about AI," Kapoor says, "we tend to say things like 'AI is doing X artificial intelligence is grading your homework,' for instance. We don't talk about any other technology this way we don't say, 'the truck is driving on the road' or 'a telescope is looking at a star.' It's illuminating to think about why we consider AI to be different from other tools. In reality, it's just another tool for doing a task."

That is not how AI is commonly portrayed in the media or, indeed, in announcements by researchers and firms engaged in the field. There, the systems are described as having learned to read, to grade papers or to diagnose diseases at least as well as, or even better than, humans.

Kapoor believes that the reason some researchers may try to hide the human ingenuity behind their AI systems is that it's easier to attract investors and publicity with claims of AI breakthroughs in the same way that "dot-com" was a marketing draw around the year 2000 or "crypto" is today.

What is typically left out of much AI reporting is that the machines' successes apply in only limited cases, or that the evidence of their accomplishments is dubious. Some years ago, the education world was rocked by a study purporting to show that machine- and human-generated grades of a selection of student essays were similar.

The claim was challenged by researchers who questioned its methodology and results, but not before headlines appeared in national newspapers such as: "Essay-Grading Software Offers Professors a Break." One of the study's leading critics, Les Perelman of MIT, subsequently built a system he dubbed the Basic Automatic B.S. Essay Language Generator, or Babel, with which he demonstrated that machine grading couldn't tell the difference between gibberish and cogent writing.

"The emperor has no clothes," Perelman told the Chronicle of Higher Education at the time. OK, maybe in 200 years the emperor will get clothes. ... But right now, the emperor doesnt.

A more recent claim was that AI systems "may be as effective as medical specialists at diagnosing disease," as a CNN article asserted in 2019. The diagnostic system in question, according to the article, employed "algorithms, big data, and computing power to emulate human intelligence."

Those are buzzwords that promoted the false impression that the system actually did "emulate human intelligence," Kapoor observed. Nor did the article make clear that the AI system's purported success was seen in only a very narrow range of diseases.

AI hype is not only a hazard to laypersons' understanding of the field but poses the danger of undermining the field itself. One key to human-machine interaction is trust, but if people begin to see a field having overpromised and underdelivered, the route to public acceptance will only grow longer.

Oversimplification of achievements in artificial intelligence evokes scenarios familiar from science fiction: futurescapes in which machines take over the world, reducing humans to enslaved drones or leaving them with nothing to do but laze around.

A persistent fear is that AI-powered automation, supposedly cheaper and more efficient than humans, will put millions of people out of work. This concern was triggered in part by a 2013 Oxford University paper estimating that "future computerization" placed 47% of U.S. employment at risk.

Shneiderman rejected this forecast in his book "Human Centered AI," published in January. "Automation eliminates certain jobs, as it has ... from at least the time when Gutenberg's printing presses put scribes out of work," he wrote. "However, automation usually lowers costs and increases quality.... The expanded production, broader distribution channels, and novel products lead to increased employment."

Technological innovations may render older occupations obsolete, according to a 2020 MIT report on the future of work, but also "bring new occupations to life, generate demands for new forms of expertise, and create opportunities for rewarding work."

A common feature of AI hype is the drawing of a straight line from an existing accomplishment to a limitless future in which all the problems in the way of further advancement are magically solved, and therefore success in reaching "human-level AI" is "just around the corner."

Yet "we still don't have a learning paradigm that allows machines to learn how the world works, like human and many non-human babies do," Yann LeCun, chief AI scientist at Meta Platforms (formerly Facebook) and a professor of computer science at NYU, observed recently on Facebook. "The solution is not just around the corner. We have a number of obstacles to clear, and we don't know how."

So how can readers and consumers avoid getting duped by AI hype?

Beware of the "sleight of hand that asks readers to believe that something that takes the form of a human artifact is equivalent to that artifact," counsels Emily Bender, a computational linguistics expert at the University of Washington. That includes claims that AI systems have written nonfiction, composed software or produced sophisticated legal documents.

The system may have replicated those forms, but it doesn't have access to the multitude of facts needed for nonfiction or the specifications that make a software program work or a document legally valid.

Among the 18 pitfalls in AI reporting cited by Kapoor and Narayanan are the anthropomorphizing of AI tools through images of humanoid robots (including, sadly, the illustration accompanying this article) and descriptions that utilize human-like intellectual qualities such as "learning" or "seeing" these tend to be simulations of human behavior, far from the real thing.

Readers should beware of phrases such as the magic of AI or references to "superhuman" qualities, which "implies that an AI tool is doing something remarkable," they write. "It hides how mundane the tasks are."

Shneiderman advises reporters and editors to take care to "clarify human initiative and control. ... Instead of suggesting that computers take actions on their own initiative, clarify that humans program the computers to take these actions."

It's also important to be aware of the source of any exaggerated claims for AI. "When an article only or primarily has quotes from company spokespeople or researchers who built an AI tool," Kapoor and Narayanan advise, "it is likely to be over-optimistic about the potential benefits of the tool."

The best defense is healthy skepticism. Artificial intelligence has progressed over recent decades, but it is still in its infancy, and claims for its applications in the modern world, much less into the future, are inescapably incomplete.

To put it another way, no one knows where AI is heading. It's theoretically possible that, as Musk claimed, humanoid robots may eventually bring about "a fundamental transformation of civilization as we know it." But no one really knows when or if that utopia will arrive. Until then, the road will be pockmarked by hype.

As Bender advised readers of an especially breathless article about a supposed AI advance: "Resist the urge to be impressed."

This story originally appeared in Los Angeles Times.

Read more:
Column: The artificial intelligence field is infected with hype. Here's how not to get duped - Yahoo Finance

Read More..

Global Urban Security Screening Markets Report 2022: A $17.91 Billion Market by 2027 – Inclusion of Artificial Intelligence to Bring Digital…

DUBLIN--(BUSINESS WIRE)--The "Global Urban Security Screening Market (2022-2027) by Technology, Application, End-Use, Geography, Competitive Analysis, and the Impact of Covid-19 with Ansoff Analysis" report has been added to ResearchAndMarkets.com's offering.

The Global Urban Security Screening Market is estimated to be USD 11.06 Bn in 2022 and is projected to reach USD 17.91 Bn by 2027, growing at a CAGR of 10.12%.

These forces create pricing signals which result from the changes in the supply and demand curves for a given product or service. Forces of Market Dynamics may be related to macro-economic and micro-economic factors. There are dynamic market forces other than price, demand, and supply.

As the market dynamics impact the supply and demand curves, decision-makers aim to determine the best way to use various financial tools to stem various strategies for speeding the growth and reducing the risks.

The report provides a detailed analysis of the competitors in the market. It covers the financial performance analysis for the publicly listed companies in the market. The report also offers detailed information on the companies' recent development and competitive scenario.

Some of the companies covered in this report are 3DX-RAY, Adani systems, Analogic, Autoclear, Aware, Bruker, Cognitec Systems, Daon, Dermalog identification systems, Teledyne FLIR, Garett electronics, Leidos, Magal security systems, Metrasens, NEC, Nuctech Company, OSI Systems, Precise Biometrics, Smiths Detection, Stanley Black & Decker, Thales, Vidisco, Westminster Group, etc.

Report Highlights:

Company Profiles

Key Topics Covered:

1 Report Description

2 Research Methodology

3 Executive Summary

3.1 Introduction

3.2 Market Size, Segmentations and Outlook

4 Market Dynamics

4.1 Drivers

4.1.1 Global Increase in Terrorist Attacks

4.1.2 Public Gatherings Fuel Demand for Security Enhancement Solutions

4.1.3 Improvements in Security Screening at Airports

4.1.4 Surge In Demand for Biometrics Solutions in Private Sector

4.2 Restraints

4.2.1 High Installation and Maintenance Costs

4.3 Opportunities

4.3.1 Technological Advancements in Security Screening Systems

4.3.2 Inclusion Of Artificial Intelligence to Bring Digital Transformation in Security Applications

4.4 Challenges

4.4.1 Health Hazards of Full-Body Scanning

4.4.2 Privacy Concerns

5 Market Analysis

5.1 Regulatory Scenario

5.2 Porter's Five Forces Analysis

5.3 Impact of COVID-19

5.4 Ansoff Matrix Analysis

6 Global Urban Security Screening Market, By Technology

6.1 Introduction

6.2 X-Ray Screening

6.2.1 Body Scanners

6.2.2 Baggage Scanners

6.2.3 Handheld Scanners

6.2.4 Cabinet X-Ray Systems

6.3 Biometric

6.3.1 Facial Recognition Systems

6.3.2 Iris Recognition Systems

6.3.3 Fingerprint Recognition System

6.4 Electromagnetic Metal Detection

6.5 Spectrometry and Spectroscopy

6.6 Others

7 Global Urban Security Screening Market, By Application

7.1 Introduction

7.2 People Screening

7.3 Baggage and Cargo Screening

7.4 Vehicle Inspection

8 Global Urban Security Screening Market, By End-Use

8.1 Introduction

8.2 Transportation

8.3 Retail Stores and Malls

8.4 Hospitality

8.5 Government

8.6 Industrial

8.7 Commercial

8.8 Educational Institutes

8.9 Events and Sports

For more information about this report visit https://www.researchandmarkets.com/r/cljzn5

Continued here:
Global Urban Security Screening Markets Report 2022: A $17.91 Billion Market by 2027 - Inclusion of Artificial Intelligence to Bring Digital...

Read More..

Insights on the Artificial Intelligence in Supply Chain Global Market to 2027 – Rapidly Growing E-commerce Industry Presents Opportunities -…

DUBLIN--(BUSINESS WIRE)--The "Artificial Intelligence in Supply Chain Market Research Report by Offering (Hardware, Services, and Software), Technology, Application, Industry, Region (Americas, Asia-Pacific, and Europe, Middle East & Africa) - Global Forecast to 2027 - Cumulative Impact of COVID-19" report has been added to ResearchAndMarkets.com's offering.

The Global Artificial Intelligence in Supply Chain Market size was estimated at USD 2,661.57 million in 2021, USD 3,350.10 million in 2022, and is projected to grow at a CAGR 26.04% to reach USD 10,673.88 million by 2027.

Competitive Strategic Window:

The Competitive Strategic Window analyses the competitive landscape in terms of markets, applications, and geographies to help the vendor define an alignment or fit between their capabilities and opportunities for future growth prospects. It describes the optimal or favorable fit for the vendors to adopt successive merger and acquisition strategies, geography expansion, research & development, and new product introduction strategies to execute further business expansion and growth during a forecast period.

FPNV Positioning Matrix:

The FPNV Positioning Matrix evaluates and categorizes the vendors in the Artificial Intelligence in Supply Chain Market based on Business Strategy (Business Growth, Industry Coverage, Financial Viability, and Channel Support) and Product Satisfaction (Value for Money, Ease of Use, Product Features, and Customer Support) that aids businesses in better decision making and understanding the competitive landscape.

Market Share Analysis:

The Market Share Analysis offers the analysis of vendors considering their contribution to the overall market. It provides the idea of its revenue generation into the overall market compared to other vendors in the space. It provides insights into how vendors are performing in terms of revenue generation and customer base compared to others. Knowing market share offers an idea of the size and competitiveness of the vendors for the base year. It reveals the market characteristics in terms of accumulation, fragmentation, dominance, and amalgamation traits.

The report provides insights on the following pointers:

1. Market Penetration: Provides comprehensive information on the market offered by the key players

2. Market Development: Provides in-depth information about lucrative emerging markets and analyze penetration across mature segments of the markets

3. Market Diversification: Provides detailed information about new product launches, untapped geographies, recent developments, and investments

4. Competitive Assessment & Intelligence: Provides an exhaustive assessment of market shares, strategies, products, certification, regulatory approvals, patent landscape, and manufacturing capabilities of the leading players

5. Product Development & Innovation: Provides intelligent insights on future technologies, R&D activities, and breakthrough product developments

The report answers questions such as:

1. What is the market size and forecast of the Global Artificial Intelligence in Supply Chain Market?

2. What are the inhibiting factors and impact of COVID-19 shaping the Global Artificial Intelligence in Supply Chain Market during the forecast period?

3. Which are the products/segments/applications/areas to invest in over the forecast period in the Global Artificial Intelligence in Supply Chain Market?

4. What is the competitive strategic window for opportunities in the Global Artificial Intelligence in Supply Chain Market?

5. What are the technology trends and regulatory frameworks in the Global Artificial Intelligence in Supply Chain Market?

6. What is the market share of the leading vendors in the Global Artificial Intelligence in Supply Chain Market?

7. What modes and strategic moves are considered suitable for entering the Global Artificial Intelligence in Supply Chain Market?

Market Dynamics

Drivers

Restraints

Opportunities

Challenges

Companies Mentioned

For more information about this report visit https://www.researchandmarkets.com/r/1rs55q

More here:
Insights on the Artificial Intelligence in Supply Chain Global Market to 2027 - Rapidly Growing E-commerce Industry Presents Opportunities -...

Read More..