Page 1,971«..1020..1,9701,9711,9721,973..1,9801,990..»

Preparation Is Key: How America Can Get Ahead of Q-Day – The National Interest Online

Referring to Q-Day, the day when quantum computers are powerful enough to break our current encryption, Arthur Herman, senior fellow at the Hudson Institute, once wrote the following: Q-Day is the term some experts use to describe when large-scale quantum computers are able to factorize the large prime numbers that underlie our public encryption systems... Ironically, the phrase Q-Day was also used for the testing of the first atom bomb in 1945.

Today, most of the world s digital communications rely on standardized encryption to protect against classical (the computers we currently use today) computing attacks. This encryption, sometimes referred to as public-key encryption, PKI (Public Key Infrastructure), RSA (Rivest Shamir Adleman) or ECC (Elliptic Curve Cryptography), is based on a single transaction of factoring a large number. This mathematical equation is all that stands between our data and our adversaries. For example, the numbers three and five multiply into the number fifteen and thus they are the factors. Factoring refers to being able to find two numbers that multiply into a much larger number. With large numbers it is a difficult and largely impossible task for classical computers to figure out; for example, 14,378,234 has factors of 806 17839. So far, all public-key encryption schemes have done an adequate job of protecting our data and communications, and we have also been able to increase the size of the numbers to be factored (also known as the key sizes) to stay ahead of the curve.

However, quantum computers are good at factoring large numbers. Quantum computers operate by using subatomic properties such as superposition, entanglement, and interference which enable a quantum computer to scale very rapidly, at an exponential rate. As a result, quantum computers have the power to crack encryption and solve the factoring problem. The fact is that we know mathematically from Peter Shors algorithm that quantum computers will absolutely break our current encryption unless we upgrade. What does that mean for the United States?

How Can Q-Day Happen?

When a sufficiently powerful quantum computer comes online (these can be referred to as cryptographically relevant quantum computers or CRQCs), whoever has access to such a computer will be able to decrypt any previously encrypted data. As an example, if an attacker has stolen and locally stored encrypted military secrets on their local serversa practice referred to as steal now, decrypt later (or SNDL) that we know is happening todayand these secrets are protected only by public-key encryption using the factoring that we discussed above, they will be decrypted by a CRQC. That attacker will now be able to decrypt all of that stored data and make use of it for whatever purposes they choose. Additionally, the same attacker could use that CRQC to attack communications that are currently occurring over the internet via the airwaves. The same powerful CRQC could be used to eavesdrop or steal data from radio transmissions, fiber transmissions, or any other communications that are using PKI. So, if that attacker has listening devices in a variety of geographic areas or regions, they could effectively unlock any data in transit moving over those communications lines.

When Will Q-Day Happen?

No one knows the exact date when Q-Day will happen. Some are predicting it will be around 2030, some say it will never happen, and others are estimating that we could have a CRQC in two to three years. We know that nation-states are investing billions of dollars in quantum computing, and it is estimated that China is spending upwards of $15 billion to build a quantum computer just to crack PKI. This effort utilizing over 1,000 programmers and scientists is formidable and should not be underestimated.

Our own government has been concerned and is now acting to mitigate the threat and consequences of a CRQC. The National Institute of Standards and Technology (NIST) has been studying and finalizing quantum-resistant algorithms. Recently the White House issued a Memorandum on Improving the Cybersecurity of National Security, Department of Defense, and Intelligence Community Systems which mandates that Within 180 days of the date of this memorandum (Jan. 19, 2022), agencies shall identify any instances of encryption not in compliance with NSA-approved Quantum Resistant Algorithms... Additionally, the United States Innovation and Competition Act of 2021 allocates over $12 billion, and contains specific language and funding for quantum cryptography and post-quantum classical cryptography.

Do not be fooled by what you see in the news or in public-facing articles. You can be sure that a nation-state attacker is not going to announce that they have a CRQC capable of dissolving PKI. Their incentive is to stay underground, harvesting as much data as they can before anyone notices.

Possible Q-Day Scenarios

So, what could happen if a U.S. adversary fully utilized a powerful quantum computer? We could see massive amounts of data being stolen and decrypted, financial system collapses, energy grid hacks, and even control over major military systems. The fact is that we are all leaving ever-increasing digital footprints and every company and government agency on this planet utilizes increasing amounts of digital capabilities and assets. Everything we do has a digital trace, and all data is now flowing and openly accessible though current standard encryption. Imagine if all that data was available to whoever had access to a CRQC? The power they would have would be so great that it is hard to imagine the damage that would be done and the global power that would be held.

Arthur Herman (mentioned above) conducted two formidable studies on what a single, successful quantum computing attack would do to both our banking systems and a major cryptocurrency. A single attack on the banking system by a quantum computer would take down Fedwire and cause $2 trillion of damage in a very short period of time. A similar attack on a cryptocurrency like bitcoin would cause a 90 percent drop in price and would start a three-year recession in the United States. Both studies were backed up by econometric models using over 18,000 data points to predict these cascading failures.

Another disastrous effect could be that an attacker with a CRQC could take control of any systems that rely on standard PKI. So, by hacking communications, they would be able to disrupt data flows so that the attacker could take control of a device, crashing it into the groundor even using it against an enemy. Think of the number of autonomous vehicles that we are using both from a civilian and military standpoint. Any autonomous devices such as passenger cars, military drones, ships, planes, and robots could be hacked by a CRQC and shut down or controlled to perform activities not originally intended by the current users or owners.

In their fictional book 2034: A Novel of the Next World War, Admiral James Stavridis and Elliot Ackerman portray a scenario where China can hack into U.S. military systems and shut down the global positioning system, weapon systems, and communications. This renders the U.S. military helpless and Chinese submarines simply destroy the U.S. Navys entire fleet in the South China Sea with uncontested torpedoes. In the book, all the U.S. militarys assets cannot communicate, and we are sitting ducks allowing China to create some significant destruction in the mainland United States. While not specifically mentioning a CRQC as the tool of destruction, it is completely within reason to think that a quantum computer powerful enough to crack all encryption and communications would be able to create this scenario.

Preparation Starts Now

So, with the above near-term threat, what can we do now to protect ourselves against such disasters?

First, I recommend that leadership, whether government, commercial or other, begin to look at existing cryptographic systems to understand where digital vulnerabilities exist. In many cases with large enterprises and government agencies, the cryptographic upgrade process from PKI to post-quantum cryptography (PQC) to protect systems could take years. PQC refers to the implementation of software-based cryptography and systems that are resistant to quantum attacks. Even with CRQCs, both communications and data would be resilient to quantum attacks since they use much more complex algorithms and systems than our standard PKI, which uses factoring. This move from PKI to PQC will be the largest upgrade cycle in computer history, and all public-key encryption needs to change to provide a completely quantum resilient ecosystem. Data in transit and at rest, and all devices will need to upgrade to PQC, which will reduce or mitigate the ability for quantum computers to crack encryption. Enterprise and government agencies can start now by testing PQC to understand how it works in their environments. Companies today provide PQC that can be tested in an enterprise or via the cloud. It is vital that all company leaders start the process of understanding how to move to a PQC worldthe future of U.S. national security depends on it.

Skip Sanzeri has been an entrepreneur since 1986 and currently is the Founder, Board Chair, CRO and COO at QuSecure, a top post-quantum cyber-security company using post-quantum cryptography and quantum key distribution to help secure the US military, government and commercial businesses. Founder and Board Chair Quantum Thought a leading venture studio focused on quantum computing applications and is also the Founder and Partner at Multiverse Capital. Skip is a co-author of Quantum Design Sprint: A Workbook for Designing a Quantum Computing Application and Disruptive Business Model.

Visit link:
Preparation Is Key: How America Can Get Ahead of Q-Day - The National Interest Online

Read More..

Hardware-Based Full Disk Encryption Market Insight By Business Growth, Development Factors, Current And Future Trends Till 2028 themobility.club -…

This comprehensive Report on Hardware-based Full Disk Encryption Market provides real information about the statistics and state of the global and regional market. Its scope study extends from the market situation to comparative pricing between the main players, spending in specific market areas, and profits. It represents a comprehensive and succinct analysis report of the main competitor and price statistics with a view to helping beginners establish their place and survive in the market. In addition, it also focuses on the market overview for the coming period from 2022 to 2028. This proved to be a great help for entrepreneurs. This detailed market research is heavily based on information received during interviews with key leaders, research, and innovative resources.

Download Sample Copy with TOC, Graphs & List of Figures @https://www.stratagemmarketinsights.com/sample/86871

In addition to the information presented in this report on the Hardware-based Full Disk Encryption Market, it includes financial losses incurred as a result of COVID-19. It also explains how the most important business sectors in the market are coping with the epidemic and how to get out of it. This market report is a way to present accurate information on company profiles and competitiveness analyses in an orderly manner. It anticipates competition in the market for the planned period from 2022 to 2028. This Hardware-based Full Disk Encryption Market study also looks at industry channels and performance rates to help key players stay ahead of the competition.

The major players covered in Hardware-based Full Disk Encryption Market:

Ethicon Endo-Surgery, Olympus, Medtronic(Covidien ), Stryker, Smith & Nephew, Karl Storz, Boston Scientific, Richard Wolf, Aesculap(B. Braun), Intuitive Surgical, Apollo Endosurgery (Allergan), Tiansong, Medical Optical, Shenda, Shikonghou, HAWK, xinxing

The Regional analysis covers:

North America (U.S. and Canada)Latin America (Mexico, Brazil, Peru, Chile, and others)Western Europe (Germany, U.K., France, Spain, Italy, Nordic countries, Belgium, Netherlands, and Luxembourg)Eastern Europe (Poland and Russia)Asia Pacific (China, India, Japan, ASEAN, Australia, and New Zealand) The Middle East and Africa (GCC, Southern Africa, and North Africa)

The study accurately predicts the size and volume of the market in the present and future. The report offers a comprehensive study of the Hardware-based Full Disk Encryption Market industry and information on foreseeable future trends that will have a significant impact on the development of the market. The weekly then looks at the key global players in the industry.

Introduction

The report highlights the latest trends in revenue and market progress, and all realistic statistics on ventures. It provides prevention and pre-planned management and highlights a summary of the global Hardware-based Full Disk Encryption Market, along with classification, definition, and market chain structure. The Global Report highlights issues affecting the global Hardware-based Full Disk Encryption Market, including gross margin, cost, market share, capacity utilization, income, capacity, and supply. It also highlights the future scope of the global Hardware-based Full Disk Encryption Market during the upcoming period.

Marketing Statistics

The Global Hardware-based Full Disk Encryption Market Report estimates upfront data and statistics that make the report a very valuable guide for individuals dealing with advertising, advisors, and industry decision-making processes in the global Hardware-based Full Disk Encryption market. Provides regional analysis for the market. This report provides essential data from the Hardware-based Full Disk Encryption Market industry to guide new entrants in the global Hardware-based Full Disk Encryption market.

Dont miss out on business opportunities in Hardware-based Full Disk Encryption Market. Speak to our analyst and gain crucial industry insights that will help your business grow @https://www.stratagemmarketinsights.com/speakanalyst/86871

Market Dynamics

The global report shows details related to the most dominant players in the global Hardware-based Full Disk Encryption market, along with contact details, sales, and accurate figures for the worldwide market. Various data and detailed analyses collected from various trusted institutions of the global Hardware-based Full Disk Encryption Market are presented in the Global Hardware-based Full Disk Encryption Market Research Report.

Market Segmentation of Hardware-based Full Disk Encryption Market:

Hardware-based Full Disk Encryption Market is divided by type and application. For the period 2022-2028, cross-segment growth provides accurate calculations and forecasts of sales by Type and Application in terms of volume and value. This analysis can help you grow your business by targeting qualified niche markets.

Industry analysis can be an effective tool to help an organization devise strategies and policies for a business. Stratagem Market Insights investigates gaps in the existing market space and aligns clients outlook of the market by providing advanced data, research, and analytics. These research outcomes may offer valuable insights to our clients, thereby aiding them to project long-term and short-term future industry trends, consumer needs, cutting overall costs, etc. Stratagem Market Insights has skilled research analysts who leverage their knowledge perfected with years of expertise and that adopt advanced analytical tools to offer an unbiased competitive research analysis to assist our invaluable clients to align their strategies with their long-term growth targets.

WHY CHOOSE STRATAGEM MARKET INSIGHTS INDUSTRY ANALYSIS SERVICE?

Buy-Now this Premium Reporthttps://www.stratagemmarketinsights.com/cart/86871

This Hardware-based Full Disk Encryption Market reports themarket status and outlook of global and major regions, from angles of players, countries, product types, and end industries; this report analyzes the top players in the global industry and splits by product type and applications/end industries. This report also includes the impact of COVID-19 on the Hardware-based Full Disk Encryption Market industry. Global Hardware-based Full Disk Encryption Market Industry 2022 Market Research Report is spread across120+ pagesand provides exclusive vital statistics, data, information, market trends, and competitive landscape details in this niche sector.

Contact Us:

Mr. ShahStratagem Market InsightsTel: US +1 415 871 0703 / JAPAN +81-50-5539-1737Email:sales@stratagemmarketinsights.com

AJ

See the original post here:
Hardware-Based Full Disk Encryption Market Insight By Business Growth, Development Factors, Current And Future Trends Till 2028 themobility.club -...

Read More..

Let’s Encrypt Awarded the Levchin Prize – iProgrammer

This year's recipient of the $10,000 prize forsignificant advances in the practice of cryptography and its use in real-world systems, is Let's Encrypt. ItsExecutive Director, Josh Aasaccepted the award at this month's 2022 Real-World Crypto conference.

Since 2016, the Levchin Prize has been awarded annually to celebrate recent advances that have had a major impact on the practice of cryptography and its use in real-world systems. Established by the Ukrainian-AmericanInternet entrepreneur Max Levchin, founder and CEO of financial services technology company,Affirm and one of the original co-founders of PayPal, the only stipulation for the prize is the winner's attendance at theReal World Cryptography (RWC) conference for its presentation ceremony.

This year's RWC Symposium was held in Amsterdam on April 1315, 2022 as a hybrid event with remote attendance possible both for presenters and attendees. Anybody can be nominated for the prize and members of the RWC Steering Committee select up to two winners from among those nominated.

We first covered the Levchin Prize in 2018 when there were two recipients,Hugo Krawczykof the IBM T.J. Watson Research Center and theOpenSSLteam. See our report for more details of the award, including a video in which Max Levchin explains its background and rationale.

Let's Encrypt isa non-profit certificate authority run by Internet Security Research Group that provides X.509 certificates for Transport Layer Security encryption at no charge. It is these certificates that are required for a website to be deemed safe and hosting services typically charge upwards of $100 per annum. Being able toset up encryption on websites easily and without the usual hassleusing Let's Encrypt enabled websites to overcome the obstacles that threatened to curtail their operation when the switch to htpps was moreorless mandated.

Dan Boneh,Professor in Applied Cryptography and Computer Security at Stanford University and a member of the RWC Steering Committee stated:

"We are thrilled to award theLevchin Prize to Let's Encrypt. Thanks to Let's Encryptnearly every person browsing the Web experiences the benefits of cryptography."

In response Josh Aas thanked the RWC Steering Committee and Max Levchin for this recognition and went on to reveal thatLets Encrypt is currently used by more than 280 million websites, issuing between two and three million certificates per day. He also explained that the team behind it started working on it in 2013 saying:

Lets Encrypt ultimately came from a group of people thinking about a pretty daunting challenge. The billions of people living increasingly large portions of their lives online deserved better privacy and security, but in order to do that we needed to convince hundreds of millions of websites to switch to HTTPS. Not only did we want them to make that change, we wanted most of them to make the change within the next three to five years.

His speech also disclosed the remarkably small scale of the operation:

Today there are just 11 engineers working on Lets Encrypt, as well as a small team handling fundraising, communication, and administrative tasks. Thats not a lot of people for an organization serving hundreds of millions of websites in every country on the globe, subject to a fairly intense set of industry rules, audits, and high expectations for security and reliability. The team is preparing to serve as many as 1 billion websites. When that day comes to pass the team will be larger, but probably not much larger. Efficiency is important to us, for a couple of reasons. The first is principle - we believe its our obligation to do the most good we can with every dollar entrusted to us. The second reason is necessity - its not easy to raise money, and we need to do our best to accomplish our mission with whats available to us.

Lets Encrypt Receives the Levchin Prize for Real-World Cryptography

Levchin Prize website

Nomination Form

Levchin Prize for Real-World Cryptography

Let's Encrypt Now In Public Beta (2015)

To be informed about new articles on IProgrammer,sign up for ourweekly newsletter,subscribe to theRSSfeedandfollow us on Twitter,Facebook orLinkedin.

Make a Comment or View Existing Comments Using Disqus

or email your comment to: comments@i-programmer.info

See the rest here:
Let's Encrypt Awarded the Levchin Prize - iProgrammer

Read More..

Encryption Software Market Analyzed by Business Growth, Development Factors, Application and Future Trends The New York Irish Emgirant – The New York…

Software-based encryption is one of the fast emerging end point data security solutions. An increasing number of organizations worldwide are adopting encryption to address their growing concerns of data safety and data privacy compliance regulations. With data protection and compliance becoming a high priority, organizations have started to view encryption as an enabler to achieve compliance, data security and flexibility. In addition to the complex regulations, increasing adoption of new technologies such as mobility, cloud and virtualization have also fuelled the need for encryption more than ever before.

The main purpose of an encryption software is to protect the confidentiality of the data stored in files/folders and disks or data-at-rest; and the data travelling over wireless network or data-in-transit, depending upon the security and compliance requirements of an organization.

Request To Download Sample of This Strategic Report:-https://reportocean.com/industry-verticals/sample-request?report_id=30946

Market Statistics:

The file offers market sizing and forecast throughout 5 primary currencies USD, EUR GBP, JPY, and AUD. It helps corporation leaders make higher choices when foreign money change records are available with ease. In this report, the years 2020 and 2021 are regarded as historic years, 2020 as the base year, 2021 as the estimated year, and years from 2022 to 2030 are viewed as the forecast period.

According to Statista, as of 2021 data, the United States held over ~36% of the global market share for information and communication technology (ICT). With a market share of 16%, the EU ranked second, followed by 12%, China ranked third. In addition, according to forecasts, the ICT market will reach more than US$ 6 trillion in 2021 and almost US$ 7 trillion by 2027. In todays society, continuous growth is another reminder of how ubiquitous and crucial technology has become. Over the next few years, traditional tech spending will be driven mainly by big data and analytics, mobile, social, and cloud computing.

This report analyses the global primary production, consumption, and fastest-growing countries in the Information and Communications Technology (ICT) market. Also included in the report are prominent and prominent players in the global Information and Communications Technology Market (ICT).

This is achieved by converting a message or plain text into coded message called the Cipher text so that only the authorized parties can read it. Software-based encryption uses software to encrypt and decrypt data at-rest as well as data-in-transit. Thus, by rendering the data unreadable by unauthorized persons, encryption software ensures the safety and security of the confidential data. Additionally, a number of data privacy legislations mandate the use of encryption or cite encryption as one most appropriate measures of data protection. Thus, the adoption of encryption would continue to grow in response to data protection compliance regulations and the on-going cyber attacks.

Get a Request Sample Report:https://reportocean.com/industry-verticals/sample-request?report_id=30946

The global encryption software market is expected to reach $2.16 billion by 2020, growing at a CAGR (compounded annual growth rate) of CAGR of 14.27% from 2014 to 2020. The global encryption software market has been segmented in this report as per usage, segments, geography and verticals. On the basis of usage, the global encryption software market is categorized into Data-at-rest and Data-in-transit.

The Data-at-rest encryption software market is further bifurcated into two key segments; Full Disk Encryption (FDE) and File level encryption (FLE). The global encryption software market stakeholders encompass IT security providers, IT security consultants, venture capitalists, and enterprises across different industry verticals. The global encryption software market in terms of geography covers North America, Europe, APAC and LAMEA. Presently, North America dominates the global encryption software market, followed by Europe. It is expected that the North America would continue to dominate the global encryption software market from 2014 to 2020 owing to the burgeoning number of high profile data breaches, stringent data privacy compliance regulations and the increasing adoption of technologies specifically cloud and mobility.

KEY BENEFITS

The study provides an in-depth analysis of the encryption software market with current and future trends to elucidate the imminent investment pockets in the marketCurrent and future trends are outlined to determine the overall attractiveness and to single out profitable trends for gaining a stronger foothold in the marketThe report provides information regarding key drivers, restraints and opportunities with impact analysisQuantitative analysis of the current market and estimations through 2013-2020 are provided to highlight the financial caliber of the marketPorters Five Forces model and SWOT analysis of the industry illustrates the potency of the buyers & suppliers participating in the marketValue chain analysis in the report provides a clear understanding of the roles of stakeholders involved in the value chain

A release on June 8th, 2021, by the Bureau and Economic Analysis and U.S. The Census Bureau reports the recovery of the U.S. market. The report also described the recovery of U.S. International Trade in July 2021.In April 2021, exports in the country reached $300 billion, an increase of $13.4 billion. In April 2021, imports amounted to $294.5 billion, increasing by $17.4 billion. COVID19 is still a significant issue for economies around the globe, as evidenced by the year-over-year decline in exports in the U.S. between April 2020 and April 2021 and the increase in imports over that same period of time. The market is clearly trying to recover. Despite this, it means there will be a direct impact on the Healthcare/ICT/Chemical industries.

KEY MARKET SEGMENTATION

The market is segmented on the basis of usage, vertical and geography.

MARKET BY USAGE

Encryption for Data-at-restFull Disk Encryption (FDE)File Level Encryption (FLE)Encryption for Data-in-transitEmail Encryption

MARKET BY VERTICAL

Financial SectorHealthcarePublic SectorOthers (Retail)

Request full Report-https://reportocean.com/industry-verticals/sample-request?report_id=30946

MARKET BY GEOGRAPHY

North America

United StatesCanadaOthers

Europe

United KingdomFranceGermanyOthers

Asia Pacific

JapanChinaIndiaAustraliaOthers

LAMEA

MexicoUAESouth AfricaOthers

Table of Content:

What is the goal of the report?

Key Questions Answered in the Market Report

How did the COVID-19 pandemic impact the adoption of by various pharmaceutical and life sciences companies? What is the outlook for the impact market during the forecast period 2021-2030? What are the key trends influencing the impact market? How will they influence the market in short-, mid-, and long-term duration? What is the end user perception toward? How is the patent landscape for pharmaceutical quality? Which country/cluster witnessed the highest patent filing from January 2014-June 2021? What are the key factors impacting the impact market? What will be their impact in short-, mid-, and long-term duration? What are the key opportunities areas in the impact market? What is their potential in short-, mid-, and long-term duration? What are the key strategies adopted by companies in the impact market? What are the key application areas of the impact market? Which application is expected to hold the highest growth potential during the forecast period 2021-2030? What is the preferred deployment model for the impact? What is the growth potential of various deployment models present in the market? Who are the key end users of pharmaceutical quality? What is their respective share in the impact market? Which regional market is expected to hold the highest growth potential in the impact market during the forecast period 2021-2030? Which are the key players in the impact market?

Inquire or Share Your Questions If Any Before the Purchasing This Report https://reportocean.com/industry-verticals/sample-request?report_id=30946

About Report Ocean:We are the best market research reports provider in the industry. Report Ocean believes in providing quality reports to clients to meet the top line and bottom line goals which will boost your market share in todays competitive environment. Report Ocean is a one-stop solution for individuals, organizations, and industries that are looking for innovative market research reports.

Get in Touch with Us:Report Ocean:Email:sales@reportocean.comAddress: 500 N Michigan Ave, Suite 600, Chicago, Illinois 60611 UNITED STATESTel:+1 888 212 3539 (US TOLL FREE)Website:https://www.reportocean.com

Visit link:
Encryption Software Market Analyzed by Business Growth, Development Factors, Application and Future Trends The New York Irish Emgirant - The New York...

Read More..

What’s next: A look into the bright future of hybrid cloud – Fast Company

For Francois Paillier, the decision to take a hybrid cloud approach was made for him early in the pandemic, when his server literally went up in smoke. As the CEO and cofounder of the genomics startup CircaGene, he had immediately joined the race to genetically sequence the COVID virus, only to have his primary host catch fire. Improvising, his team fell back on their on-premises computer while racing to spin up new virtual machines. I had to pilot my business to go fully virtual, so it needed to be secure, scalable, and resilient, he said. And now we have a hybrid system that is much better, with different servers for different purposes.

Since the launch of Amazon Web Services 20 years ago, there has been a steady shift away from companies running their own hardware in favor of fully virtualized everything-as-a-service. But the persistence of legacy systems coupled with emerging technologies such as AI has CTOs seeking a platform-agnostic hybrid model that strives to have the best of both worlds. The goal isnt to slash IT costs but to give their companies the ability to deploy and iterate fasterat speeds no one thought possible until a few years agoand become true catalysts for innovation.

The original promise of the cloud was agility, said Talia Gershon, director of cloud infrastructure research at IBM, during a wide-ranging conversation at The Future of Hybrid Cloud, a virtual event hosted in partnership by Fast Company and IBM. How can we achieve business objectives faster? One way is to bring the cloud to new places while adding new capabilities. To explore what these applications and their business cases might look like, Gershon was joined by Paillier and Sam Carter, CEO of Moneo. Here are three key takeaways from their discussion.

In CircaGenes case, this meant learning how to sort tasks and stratify data by securing confidential genetic records both locally and in an encrypted cloud, while using another cloud for analytics and computation. The question of where do we go? is business-driven, Paillier said.

Moneo faced a similar challenge. As a cash-back rewards platform launched amidst the pandemic, its clientsconsumer packaged goods brands (CPGs)were desperate to harness its data for their suddenly all-important online advertising. Brands wanted to know who was buying their products, where they were buying them, and how they wanted to interact, Carter said. The pressure faced by CPGs and retailers was immense.

They, in turn, bombarded the startup with a constant stream of requests for real-time custom analyticsany scrap that would give them an edge as foot traffic to physical stores plunged. In addition to privately hosting its core operations, Moneo scrambled to create a replica of its data in IBMs public cloud to handle the mounting number of reports. They needed to work with someone who was quick, predictable, safe, and scalableand who could do all of those things immediately, Carter added.

Nimbly pivoting from a public- or private-only approach is one thing when youre a startup; its another altogether when your organization is nearly bankrupt from decades of technical debt. Imagine being the developers tasked with figuring out how to refactor millions of lines of code into microservices and bring them into a cloud-native model, Gerson said. Fortunately, AI can help analyze which pieces of the technology stack should be virtualized onto public clouds, which can be refactored efficiently, and which should be left alone. Thats where technologies such as Kubernetes and OpenShift are able to offer a consistent user experience while enabling you to run applications where they make sense, she added.

Those applications include such cutting-edge techniques as homomorphic encryption, which enables CircaGene to analyze private health records without needing to decrypt them. Its an approach perfectly suited to hybrid clouds, using a publicly accessible algorithm to run blind computation against data stored securely in private systems. But Pailliers original inspiration was personal: the plight of a friend with breast cancer whose reluctance to share her fears had delayed detection. I decided to develop a module that examines your encrypted DNA and returns the results with a private encryption key and a recommendation, he said. Above a certain level, you need to take action.

While less a matter of life or death, Moneo is also grappling with questions of data governance and consent. Countless consumers have found it easytoo easyto share personal data, with little recourse for opting out once they have opted in. Thats about to change with a wave of new global legislation and regulations aimed at protecting users privacy that has created a new headache for brands. Whos agreed to share what, and how does that change over time? Carter asked rhetorically. Weve become an attractive option for brands because we do something they currently cantand isnt really core to their business.

The timing of that statement is important. While Moneo, through its hybrid cloud reports, can now offer customers an innovative service, the same capability is inevitably tomorrows open-source commodity. In fact, it already isIBM Research has already launched a beta test of Fybrik, a cloud-based service for orchestrating secure data governance across companies and platforms.

This is a topic near and dear to our hearts in the research division, Gerson said. How can new technologies help your teams move faster while automating compliance and minimizing risk? Thats the vision guiding our technology roadmap for the future of cloud.

View original post here:
What's next: A look into the bright future of hybrid cloud - Fast Company

Read More..

StorPool Named Finalist in DCS Awards for Cloud Project of the Year – StreetInsider.com

News and research before you hear about it on CNBC and others. Claim your 1-week free trial to StreetInsider Premium here.

SOFIA, Bulgaria--(BUSINESS WIRE)--StorPool Storage, a leading global storage software provider, today announced it has been named a finalist for the Cloud Project of the Year in the 2022 DCS Awards, which honor product designers, manufacturers, suppliers and providers in the data center technology market.

StorPool is nominated for its collaboration with Krystal, one of the UKs largest independent web hosting companies. Krystal provides hosting, cloud VPS, and enterprise services to 30,000 clients and more than 200,000 websites. StorPool supports Krystals ultra-fast NVMe-powered cloud platform Katapult with massive storage performance, a robust API, unique capacity management features to save hardware costs, and an extremely high level of data protection via triple replication to safeguard Krystal clients data.

StorPools storage solution is a vital component of Katapult and gives us the ability to have maximum performance and reliability with no trade-off, said Alex Easter, CTO of Krystal.

Krystal indeed created an award-winning infrastructure that serves as a model for other xSPs and cloud builders to achieve the performance, data security, space savings, density improvements, and elastic scalability of Katapult, said Alex Ivanov, product lead at StorPool Storage. We appreciate being recognized for this award and for StorPool softwares fast, highly available, easily integrated storage platform for cloud projects both large and small.

To vote for StorPool or for more information visit https://dcsawards.com/vote.

StorPool allows cloud infrastructures in order to run mission-critical workloads without the pain and challenges typically associated with legacy storage technologies. StorPool storage systems are ideal for storing and managing the data of demanding primary workloads databases, web servers, virtual desktops, real-time analytics solutions, and other mission-critical software. Under the hood, the primary storage platform provides thin-provisioned volumes to the workloads and applications running in on-premises clouds. The native multi-site, multi-cluster, and BC/DR capabilities supercharge hybrid- and multi-cloud efforts at scale. For more information about how StorPool helps create simpler, smarter and more-efficient clouds, visit https://storpool.com/storage-for-msp/

About StorPool Storage

StorPool Storage is a primary storage platform designed for large-scale cloud infrastructure. It is the easiest way to convert sets of standard servers into primary or secondary storage systems. The StorPool team has experience working with various clients Managed Service Providers, Hosting Service Providers, Cloud Service Providers, enterprises, and SaaS vendors. StorPool Storage comes as a software, plus a fully managed data storage service that transforms standard hardware into fast, highly available and scalable storage systems.

View source version on businesswire.com: https://www.businesswire.com/news/home/20220426005182/en/

Dan Miller, JPR Communications818-651-1013

Source: StorPool Storage

Originally posted here:
StorPool Named Finalist in DCS Awards for Cloud Project of the Year - StreetInsider.com

Read More..

MIT Technology Review Insights and Infosys Cobalt Launch first-ever Global Cloud Ecosystem Index – PR Newswire

The cloud has become a foundational part of nearly every national economy's journey towardenhanced productivity. "Today, we see that cloudiscomputing. Cloud and cloud-led innovation are foundational for businesses and governments in driving enterprise and economic growth," saysElizabeth Bramson-Boudreau, CEO and publisher of MIT Technology Review.

Based on research conducted between November 2021 and February 2022, the interactive Index shows which countries are progressing fastest in global efforts to adopt and deploy cloud computing services. The Index reveals Singapore has the highest score (8.48/10) for overall cloud innovation. Next ranked were Finland (8.46/10) and Sweden (8.43/10).

The key findings of this report are as follows:

"Data gathered from the Global Cloud Ecosystem Index validates that now, more than ever, there is urgency to go to the cloud from both enterprises and policymakers, as cloud can create positive economic impact," saysRavi Kumar S., president of Infosys. He continues, "The future of work will depend heavily on effective cloud transformations to create a dynamic digital future that uplifts and equalizes us all, ensuring more opportunities for everyone, irrespective of location. Infosys Cobalt is poised to continue playing a key role in building a community through the cloud that nurtures knowledge, assets, and talent to drive innovation."

To view the research findings,visit the interactive pageor clickhereto download the report.

To learn more about the cloud, visit The cloud hub: From cloud chaos to clarity.

For more information, please contact us at[emailprotected].

About MIT Technology ReviewFounded at the Massachusetts Institute of Technology in 1899,MIT Technology Reviewisa world-renowned independent media company whose insight, analysis, interviews, and live events explore the newest technologies and their commercial, social, and political impacts. MIT Technology Review derives its authority from its relationship to the world's foremost technology institution and from its editors' deep technical knowledge capacity to see technologies in their broadest context and unequaled access to leading innovators and researchers. Insights, MIT Technology Review's custom publishing division, conducts research worldwide and publishes a wide variety of content, including articles, reports, and podcasts.

Contact:Laurel Ruma[emailprotected]

SOURCE MIT Technology Review Insights

Go here to read the rest:
MIT Technology Review Insights and Infosys Cobalt Launch first-ever Global Cloud Ecosystem Index - PR Newswire

Read More..

Google Cloud’s Media CDN lets companies build on the network that keeps YouTube running – The Verge

Companies like Netflix, Disney, and HBO do battle over media streaming of movies and TV shows, but all of their services combined pale in comparison to YouTube, which says it delivers over a billion hours of video streams every single day. Now, Google Cloud is announcing general availability of its Media CDN, a network for media companies to use for their own streaming experiences. Competitors like Microsoft Azure, Amazon CloudFront, Fastly, and Cloudflare are already in the market, but none of them can point to the service so many people use every day to help sell their products.

As we noted two years ago, the world is streaming more video than ever, and things have not slowed down since. While we think a lot about the algorithms that drive engagement on YouTube, the actual network that keeps the videos streaming is what makes the entire thing work as well as it has since Google bought the video platform for $1.65 billion in 2006.

The pitch is laid out plainly in a statement issued at the 2022 NAB Show Streaming Summit, The same infrastructure that Google has built over the last decade to serve YouTube content to over 2 billion users is now being leveraged to deliver media at scale to Google Cloud customers with Media CDN.

YouTube has the occasional outage. But unless youre willing to build the next Netflix, operating on a network of servers that claims to reach over 200 countries and more than 1,300 cities around the globe, could be a big help in keeping things running, and now its available to more businesses. It also includes support for modern transport protocols like QUIC to use less data and deliver content smoothly as well as the APIs media companies use to serve advertisements add real-time data feeds for live sports broadcasts, and support new platforms.

Originally posted here:
Google Cloud's Media CDN lets companies build on the network that keeps YouTube running - The Verge

Read More..

Experts warn that Hive ransomware gang can detect unpatched servers – VentureBeat

The Hive threat group has been targeting organizations across the finance, energy and healthcare sectors as part of coordinated ransomware attacks since June 2021.

During the attacks, the group exploits ProxyShell vulnerabilities in MSFT Exchange servers to remotely execute arbitrary commands and encrypt the data of companies with this unique ransomware strain.

The group is highly organized, with the Varonis research team recently discovering that a threat actor managed to enter an organizations environment and encrypt the target data with the ransomware strain in less than 72 hours.

These attacks are particularly concerning, as unpatched exchange servers are publicly discoverable via web crawlers. Anyone with an unpatched exchange server is at risk, said Peter Firstbrook, a Gartner analyst.

Even organizations that have migrated to the cloud version of Exchange often still have some on-premises Exchange servers that could be exploited if unpatched. There are circulating threats already and unpatched servers can be detected with a web crawler, so it is highly likely that unpatched servers will be exploited, Firstbrook added.

Despite the significance of these vulnerabilities, many organizations have failed to patch their on-premise Exchange servers (these vulnerabilities do not affect Exchange online or Office 365 servers).

Last year, Mandiant reported that around 30,000 Exchange Servers remain unpatched and recent attacks highlight that many organizations have been slow to update their systems.

This is problematic given that the vulnerabilities enable an attacker to remotely execute arbitrary commands and malicious code on Microsoft Exchange Server through the 443 port.

Attackers continue to exploit the ProxyShell vulnerabilities that were initially disclosed more than eight months ago. They have proven to be a reliable resource for attackers since their disclosure, despite patches being available, said Claire Tills, a senior research engineer at Tenable.

The latest attacks by an affiliate of the Hive ransomware group are enabled by the ubiquity of Microsoft Exchange and apparent delays in patching these months-old vulnerabilities. Organizations around the world in diverse sectors use Microsoft Exchange for critical business functions, making it an ideal target for threat actors.

According to Tills, organizations that fail to patch their exchange servers enable attackers to reduce the amount of reconnaissance and immediate steps they need to take to infiltrate target systems.

Organizations that are slow to patch, such as less mature or short-staffed IT organizations, can fall into the trap of thinking just because theres no obvious signs of intrusion that no ones used ProxyShell to gain a foothold in the environment but this isnt always the case.

Firstbrook notes that while ransomware attacks will be obvious to organizations when they happen, however there are lots of other attack techniques that will [be] much stealthier, so the absence of ransomware does not mean the Exchange server is not already compromised.

It is for this reason that Brian Donohue, a principal information security specialist at Red Canary, recommends that organizations ensure they can detect the execution Cobalt Strike or Mimikatz, even if they cant update Exchange.

Having broad defense in depth against a wide array of threats means that even if you cant patch your Exchange servers or the adversary is using entirely novel trade craft in certain parts of the attack, you might still catch the Mimikatz activity, or you might have an alert that looks for the heavily obfuscated PowerShell thats being used by Cobalt Strike all of which happens before anything gets encrypted, Donohue said.

In other words, enterprises that havent patched the vulnerabilities can still protect themselves by using managed detection and response and other security solutions to detect malicious activity that comes before ransomware encryption, so they can respond before its too late.

VentureBeat's mission is to be a digital town square for technical decision-makers to gain knowledge about transformative enterprise technology and transact. Learn more about membership.

View post:
Experts warn that Hive ransomware gang can detect unpatched servers - VentureBeat

Read More..

Hackers are using LemonDuck malware to target Docker cloud instances – The Indian Express

The boom in cryptocurrency prices have significantly increased the demand for crypto mining. Crypto mining, essentially, is running programs on high-end devices and gain cryptocurrency in return. Some crypto-miners even use cloud services to run these program.

Cyber criminals are now compromising Cloud servers and using crypto mining bots, in this case, LemonDuck malware. Researchers at the CrowdStrike Cloud Threat Research team detected LemonDuck targeting Docker,a cloud service to mine cryptocurrency on the Linux platform. This campaign is currently active.

The LemonDuck malware is code that can cause unwanted, usually dangerous changes to your system. It steals credentials, removes security controls, spreads via emails, moves laterally, and ultimately drops more tools for human-operated activity.

Due to the cryptocurrency boom in recent years, combined with cloud and container adoption in enterprises, cryptomining is proven to be a monetarily attractive option for attackers. Since cloud and container ecosystems heavily use Linux, it drew the attention of the operators of botnets like LemonDuck, which started targeting Docker for cryptomining on the Linux platform, the researchers said in the blog post.

According to the Google Threat Horizon report, 86 per cent of compromised Google Cloud instances were used to perform cryptocurrency mining.

The researchers call it a well-known cryptomining bot that infects Microsoft Exchange servers to mine cryptocurrency. It escalate privileges and moves laterally in compromised networks. This bot tries to monetize its efforts via various simultaneous active campaigns to mine cryptocurrency like Monero.

According to the researchers, LemonDuck targets exposed Docker APIs to get initial access. It then infects the system via an image file that has malicious code embedded inside it. CrowdStrike found multiple campaigns being operated by the hackers that were targeting Windows and Linux platforms simultaneously.

The researchers highlight that LemonDuck malware is so strong that it has the potential to evade Alibaba Clouds monitoring service that monitors cloud instances for malicious activities.

LemonDuck utilized some part of its vast C2 operation to target Linux and Docker in addition to its Windows campaigns. It utilized techniques to evade defenses not only by using disguised files and by killing monitoring daemon, but also by disabling Alibaba Clouds monitoring service, the researchers added.

CrowdStrike researchers expect such kinds of campaigns to increase as cloud adoption continues to grow.

Originally posted here:
Hackers are using LemonDuck malware to target Docker cloud instances - The Indian Express

Read More..