Page 1,545«..1020..1,5441,5451,5461,547..1,5501,560..»

IoT Security Foundation The Global Home of IoT Cybersecurity

Raising the bar ondigitalsafety and security

We are the Super Blue Team, and were here to help. The Internet of Things Security Foundation (IoTSF) is a non-profit, global membership organisation striving to make the connected world ever-more secure. We are an international response to the complexchallenges posed by cybersecurity in theexpansive hyper-connected world of IoT. By collaborating on cyber protection, we can raise the quality bar for secure IoT. Working with our members, we like to think of ourselves as the super blue team of defenders and a natural home for IoT users and technology providers.

In diversity we have strength.We each have a valuable role in keeping the digital world secure. Our stakeholders includeIoT hardware and software productvendors, network operators, system specifiers, integrators, distributors, retailers, insurers, local authorities, academic institutions, government agencies security professionals, researchers and risk managers anybody with an interest in cyber safety, security and privacy.

Security is a team sport: by workingtogether we can build safer and defend better we are stronger.Becoming a member is a solid investment for you and your business it shows you care; we invite you to come and join the super blue team.

$ The economic impact of the Internet of Things will be measured in $trillions. The number of connected devices will be measured in billions. The resultant benefits of a connected society are significant, disruptive and transformative.

Yet along with the many societal, environmental and economic benefits, the rapidly-expanding connected world, represents a growing attack surface for adversaries of all denominations to exploit. Everyday vulnerabilities in IoT are being used for malicious intent yetthe vast majority of them can be prevented simply and cost-effectively.

Enter IoTSF:Were here to help make it safe to connect so the many benefits of IoT can be realized. Through a dedicated program of guidance, reports, events, training, standards, advocacy and so much more, we represent a collaborative international response to the wicked challenge of IoT insecurity.

Continued here:
IoT Security Foundation The Global Home of IoT Cybersecurity

Read More..

Op-ed: Cryptocurrency isn’t a smart investment and hasn’t been for a while – CNBC

  1. Op-ed: Cryptocurrency isn't a smart investment and hasn't been for a while  CNBC
  2. Crypto News: What is happening in the World of Cryptocurrency? Forbes Advisor Australia  Forbes
  3. Crypto Crisis Latest: What's Happening With Sam Bankman-Fried's FTX, Cryptocurrency Miners and Bitcoin Prices  The Wall Street Journal
  4. Will the FTX Collapse Lead to Better Cryptocurrency Regulation?  The New Yorker
  5. What the FTX Collapse Means for the Cryptocurrency Market  University of Pennsylvania
  6. View Full Coverage on Google News

See the rest here:
Op-ed: Cryptocurrency isn't a smart investment and hasn't been for a while - CNBC

Read More..

Cryptocurrency mining limited under New York law, first of its kind in US – MassLive.com

  1. Cryptocurrency mining limited under New York law, first of its kind in US  MassLive.com
  2. Hochul signs partial cryptocurrency mining ban into New York law  POLITICO
  3. Hochul signs cryptocurrency mining legislation  WIVT - NewsChannel 34
  4. Gov. Hochul signs two-year moratorium on cryptocurrency mining operations  Yahoo News
  5. New York Enacts 2-Year Ban on Some Crypto-Mining Operations  The New York Times
  6. View Full Coverage on Google News

More:
Cryptocurrency mining limited under New York law, first of its kind in US - MassLive.com

Read More..

What is Cloud Computing & Why is it Important? | Accenture

We've established that most of us are already using cloud technology in some form or another. But where does all this data actually live and who runs it?

Cloud computing can be deployed in different ways depending on what services a business needs. The first thing to consider is the deployment modelpublic cloud, private cloud, hybrid cloud, and multi-cloud. The next element is the service categorySaas (Software as a Service), Paas (Platform as a Service) and Iaas (Infrastructure as a service). When a company is considering itscloud migration strategy, it must consider both factors. Here's a primer on how they work and what they mean for your business.

Deployment models

Public CloudConnecting to a public cloud means using an internet connection to access computing resources hosted on data centers managed by a third-party cloud service provider, rather than owning and maintaining these resources on-premise. A shared public cloud has many organizations (or tenants) sharing the same infrastructure.

The largest cloud service providers with data centers that enable massive scaling are called hyperscalers. The big four hyperscalers, collectively referred to as MAAGs, are:Microsoft (Azure),Amazon (Amazon Web Services or AWS),Alibaba (Alicloud), andGoogle (Google Cloud). Other cloud providers includeIBMandOracle.

Private CloudThis cloud model is great for organizations concerned about sharing resources on a public cloud. It is implemented on servers owned and maintained by the organization and accessed over the internet or through a private internal network.

A private cloud environment gives you complete control over data and security in order to meet specific regulatory and other compliance requirements (e.g., HIPAA for healthcare, GDPR, GxP for Pharma, etc.).

Hybrid CloudMany organizations actually use a combination of several cloud environments. This is referred to as a hybrid cloud approach. Hybrid cloud often includes a combination of public cloud and private cloud, frequently in combination with some on-premise infrastructure. To create a true hybrid cloud architecture, you must set up communication or orchestration between the various deployments.

Hybrid cloud eliminates reliance on any single cloud provider and allows for additional levels of flexibility in terms of capabilities, security compliance, etc.

In the past, choosing a hyperscaler meant pickingpublic over private. This is no longer the case. To support regulatory, performance, and data gravity requirements, the hyperscalers are now offering private cloud carveouts in public environments.VMware on AWS(VMC),Azure VMware Services (AVS), andGoogles SAP,OracleandBare Metalsolutions are good examples. Similarly, the hyperscalers have been working on private cloud extensions. This blurring of public and private under a hybrid cloud umbrella is likely to accelerate in the future. Over time, we will no longer see a delineation between "public" and "private" but instead, between "dedicated" and "shared."

Multi-cloudA multi-cloud approach is a particular case of hybrid cloud in which an organization uses services from multiple public cloud providers.

Service categories

Software as a Service (SaaS)SaaS is the most commonly used cloud application service and is becoming a dominant way for organizations to access software applications.

With SaaS, an organization accesses a specific software application hosted on a remote server and managed by a third-party provider. On a subscription basis, the application is accessed through a web browser, reducing the need for on-device software downloads or updates. Popular SaaS products includeSalesforce,Workday, orMicrosoft Office 365.

Link:
What is Cloud Computing & Why is it Important? | Accenture

Read More..

Cloud Computing Market Size, Share, Trends, Analysis and Forecast by IT Infrastructure, Products and Services (Cloud Management Platforms, IaaS, SaaS,…

Cloud Computing Market Size, Share, Trends, Analysis and Forecast by IT Infrastructure, Products and Services (Cloud Management Platforms, IaaS, SaaS, PaaS, Hybrid, Managed and Private Cloud Services), Region and Vertical, 2022-2026  PR Newswire

Read the rest here:
Cloud Computing Market Size, Share, Trends, Analysis and Forecast by IT Infrastructure, Products and Services (Cloud Management Platforms, IaaS, SaaS,...

Read More..

Turn on device encryption – Microsoft Support

Encryptionhelps protect the data on your device so itcan only be accessed by people whohave authorization. Ifdevice encryption isn't available on your device, you might be able to turn on standard BitLocker encryption instead.

Turn on device encryption

Sign in to Windows with an administrator account (you may have to sign out and back in to switch accounts). For more info, seeCreate a local or administrator account in Windows.

Select Start > Settings > Privacy& security > Device encryption. If Device encryption doesn't appear, it isn't available. You may be able to use standard BitLocker encryption instead.Open Device encryption in Settings.

If Device encryption is turned off, turn it On.

Turn on standard BitLocker encryption

Sign in to your Windows device with an administrator account (you may have to sign out and back in to switch accounts). For more info, seeCreate a local or administrator account in Windows.

In the search box on the taskbar, type Manage BitLocker and then select it from the list of results. Or,select Start > Settings > Privacy& security > Device encryption >BitLocker drive encryption.

Note:You'll only see this option if BitLocker is available for your device. Itisn't available on Windows 11Home edition.

Select Turn on BitLocker and then follow the instructions.

Want to learn more and find out if your device supports device encryption? See Device encryption in Windows.

Encryptionhelps protect the data on your device so itcan only be accessed by people whohave authorization. Ifdevice encryption isn't available on your device, you might be able to turn on standard BitLocker encryption instead. (Note that BitLocker isn't available on Windows 10 Home edition.)

Turn on device encryption

Sign in to Windows with an administrator account (you may have to sign out and back in to switch accounts). For more info, seeCreate a local or administrator account in Windows.

Select theStart button, then selectSettings > Update & Security> Device encryption. If Device encryption doesn't appear, it isn't available. You may be able to use standard BitLocker encryption instead.Open Device encryption in Settings.

If device encryption is turned off, select Turn on.

Turn on standard BitLocker encryption

Sign in to your Windows device with an administrator account (you may have to sign out and back in to switch accounts). For more info, seeCreate a local or administrator account in Windows.

In the search box on the taskbar, type Manage BitLocker and then select it from the list of results. Or,select theStartbutton, and then under Windows System, select Control Panel. In Control Panel, select System and Security, and then under BitLocker Drive Encryption, select Manage BitLocker.

Note:You'll only see this option if BitLocker is available for your device. Itisn't available on Windows 10 Home edition.

Select Turn on BitLocker and then follow the instructions.

Want to learn more and find out if your device supports device encryption? See Device encryption in Windows.

Go here to see the original:
Turn on device encryption - Microsoft Support

Read More..

10 Quotes on Cloud Computing That Really Say it All – Forbes

Plenty has been said or written on cloud computing in recent years -- pro, con and somewhere in between. Periodically throughout the rise of cloud computing, there have been some real gems put out there, aptly describing what's on people's minds -- and maybe what was needed to be said. Oracle CEO Larry Ellison's famous "fashion-driven" analogy back in 2008 is the stuff of legend, and makes this list, compiled below. Here are some memorable quotes and apropos quotes about cloud that that have surfaced over the years:

1) "First to mind when asked what 'the cloud' is, a majority respond its either an actual cloud, the sky, or something related to weather." - Citrix Cloud Survey Guide (August 2012)

2) "Ultimately, the cloud is the latest example of Schumpeterian creative destruction: creating wealth for those who exploit it; and leading to the demise of those that dont." - Joe Weinman, Senior VP at Telx and author of Cloudonomics: The Business Value of Cloud Computing

3) "Cloud computing is often far more secure than traditional computing, because companies like Google and Amazon can attract and retain cyber-security personnel of a higher quality than many governmental agencies." - Vivek Kundra, former federal CIO of the United States

4) "Discontinued products and services are nothing new, of course, but what is new with the coming of the cloud is the discontinuation of services to which people have entrusted a lot of personal or otherwise important data and in many cases devoted a lot of time to creating and organizing that data. As businesses ratchet up their use of cloud services, theyre going to struggle with similar problems, sometimes on a much greater scale. I dont see any way around this its the price we pay for the convenience of centralized apps and databases but its worth keeping in mind that in the cloud were all guinea pigs, and that means were all dispensable. Caveat cloudster." - Nick Carr, author of Does IT Matter?, The Big Switch and The Shallows

5) "We believe we're moving out of the Ice Age, the Iron Age, the Industrial Age, the Information Age, to the participation age. You get on the Net and you do stuff. You IM (instant message), you blog, you take pictures, you publish, you podcast, you transact, you distance learn, you telemedicine. You are participating on the Internet, not just viewing stuff. We build the infrastructure that goes in the data center that facilitates the participation age. We build that big friggin' Webtone switch. It has security, directory, identity, privacy, storage, compute, the whole Web services stack." - Scott McNealy, former CEO, Sun Microsystems

6) "The interesting thing about cloud computing is that we've redefined cloud computing to include everything that we already do. I can't think of anything that isn't cloud computing with all of these announcements. The computer industry is the only industry that is more fashion-driven than women's fashion. Maybe I'm an idiot, but I have no idea what anyone is talking about. What is it? It's complete gibberish. It's insane. When is this idiocy going to stop?" - Larry Ellison, chairman, Oracle

7) "I don't need a hard disk in my computer if I can get to the server faster... carrying around these non-connected computers is byzantine by comparison." - Steve Jobs, late chairman of Apple (1997)

8) "Line-of-business leaders everywhere are bypassing IT departments to get applications from the cloud (also known as software as a service, or SaaS) and paying for them like they would a magazine subscription. And when the service is no longer required, they can cancel that subscription with no equipment left unused in the corner." - Daryl Plummer, Gartner analyst

9) "If you think you've seen this movie before, you are right. Cloud computing is based on the time-sharing model we leveraged years ago before we could afford our own computers. The idea is to share computing power among many companies and people, thereby reducing the cost of that computing power to those who leverage it. The value of time share and the core value of cloud computing are pretty much the same, only the resources these days are much better and more cost effective." - David Linthicum, author, Cloud Computing and SOA Convergence in Your Enterprise: A Step-by-Step Guide

10) Flying by the seat of the pants must have been a great experience for the magnificent men in the flying machines of days gone by, but no one would think of taking that risk with the lives of 500 passengers on a modern aircraft. The business managers of a modern enterprise should not have to take that risk either. We must develop standard cloud metrics and ROI models, so that they can have instruments to measure success. - Dr. Chris Harding, director for interoperability and SOA at The Open Group

See more here:
10 Quotes on Cloud Computing That Really Say it All - Forbes

Read More..

The Global Edge Computing Market size is expected to reach $111.4 billion by 2028, rising at a market growth of 16.8% CAGR during the forecast period…

The Global Edge Computing Market size is expected to reach $111.4 billion by 2028, rising at a market growth of 16.8% CAGR during the forecast period  GlobeNewswire

Read this article:
The Global Edge Computing Market size is expected to reach $111.4 billion by 2028, rising at a market growth of 16.8% CAGR during the forecast period...

Read More..

Global Mining Explosives Consumables Market is Set to be Valued at Around US$ 224.8 Mn by year 2032-end and is Anticipated to Progress at a Healthy…

Global Mining Explosives Consumables Market is Set to be Valued at Around US$ 224.8 Mn by year 2032-end and is Anticipated to Progress at a Healthy CAGR of 5.5% | Data by Future Market Insights, Inc.  Yahoo Finance

Follow this link:

Global Mining Explosives Consumables Market is Set to be Valued at Around US$ 224.8 Mn by year 2032-end and is Anticipated to Progress at a Healthy...

Read More..

5 Essential Hardware Components of a Quantum Computer | Quantum …

[47] R. Barends, J. Kelly, A. Megrant, A. Veitia, D. Sank, E. Jeffrey, T.C. White, et al., 2014, Superconducting quantum circuits at the surface code threshold for fault tolerance, Nature 508(7497):500.

[48] L. DiCarlo, J.M. Chow, J.M. Gambetta, L.S. Bishop, B.R. Johnson, D.I. Schuster, J. Majer, A. Blais, L. Frunzio, S.M. Girvin, and R.J. Schoelkopf, 2009, Demonstration of two-qubit algorithms with a superconducting quantum processor, Nature 460:240-244.

[49] E. Lucero, R. Barends, Y. Chen, J. Kelly, M. Mariantoni, A. Megrant, P. OMalley, et al., 2012, Computing prime factors with a Josephson phase qubit quantum processor, Nature Physics 8:719-723.

[50] P.J.J. OMalley, R. Babbush, I.D. Kivlichan, J. Romero, J.R. McClean, R. Barends, J. Kelly, et al., 2016, Scalable quantum simulation of molecular energies, Physical Review X 6:031007.

[51] N.K. Langford, R. Sagastizabal, M. Kounalakis, C. Dickel, A. Bruno, F. Luthi, D.J. Thoen, A. Endo, and L. DiCarlo, 2017, Experimentally simulating the dynamics of quantum light and matter at deep-strong coupling, Nature Communications 8:1715.

[52] M.D. Reed, L. DiCarlo, S.E. Nigg, L. Sun, L. Frunzio, S.M. Girvin, and R.J. Schoelkopf, 2012, Realization for three-qubit quantum error correction with superconducting circuits, Nature 482:382-385.

[53] J. Kelly, R. Barends, A.G. Fowler, A. Megrant, E. Jeffrey, T. C. White, D. Sank, et al., 2015, State preservation by repetitive error detection in a superconducting quantum circuit, Nature 519:66-69.

[54] A.D. Crcoles, E. Magesan, S.J. Srinivasan, A.W. Cross, M. Steffen, J.M. Gambetta, and J.M. Chow, 2015, Demonstration of a quantum error detection code using a square lattice of four superconducting qubits, Nature Communications 6:6979.

[55] D. Rist, S. Poletto, M.-Z. Huang, A. Bruno, V. Vesterinen, O.-P. Saira, and L. DiCarlo, 2015, Detecting bit-flip errors in a logical qubit using stabilizer measurements, Nature Communications 6:6983.

[56] N. Ofek, A. Petrenko, R. Heeres, P. Reinhold, Z. Leghtas, B. Vlastakis, Y. Liu, et al., 2016, Extending the lifetime of a quantum bit with error correction in superconducting circuits, Nature 536:441-445.

[57] IBM Q Team, 2018, IBM Q 5 Yorktown Backend Specification V1.1.0, https://ibm.biz/qiskit-yorktown; IBM Q Team, 2018, IBM Q 5 Tenerife backend specification V1.1.0, https://ibm.biz/qiskit-tenerife.

[58] Ibid.

[59] M.W. Johnson, M.H.S. Amin, S. Gildert, T. Lanting, F. Hamze, N. Dickson, R. Harris, et al., 2011, Quantum annealing with manufactured spins, Nature 473:194-198.

[60] D Wave, Technology Information, http://dwavesys.com/resources/publications.

[61] John Martinis, private conversation.

[62] W.D. Oliver and P.B. Welander, 2013, Materials in superconducting qubits, MRS Bulletin 38:816.

[63] D. Rosenberg, D.K. Kim, R. Das, D. Yost, S. Gustavsson, D. Hover, P. Krantz, et al., 2017, 3D integrated superconducting qubits, npj Quantum Information 3:42.

[64] B. Foxen, J.Y. Mutus, E. Lucero, R. Graff, A. Megrant, Y. Chen, C. Quintana, et al., 2017, Qubit Compatible Superconducting Interconnects, arXiv:1708.04270.

[65] J.M. Chow, J.M. Gambetta, A.D. Corcoles, S.T. Merkel, J.A. Smolin, C. Rigetti, S. Poletto, G.A. Keefe, M.B. Rothwell, J.R. Rozen, M.B. Ketchen, and M. Steffen, 2012, Universal quantum gate set approaching fault-tolerant thresholds with superconducing qubits, Physical Review Letters 109:060501.

[66] See, for example, J.W. Silverstone, D. Bonneau, J.L. OBrien, and M.G. Thompson, 2016, Silicon quantum photonics, IEEE Journal of Selected Topics in Quantum Electronics 22:390-402;

T. Rudolph, 2017, Why I am optimistic about the silicon-photonic route to quantum computing?, APL Photonics 2:030901.

Read more:
5 Essential Hardware Components of a Quantum Computer | Quantum ...

Read More..