Page 1,992«..1020..1,9911,9921,9931,994..2,0002,010..»

Statement on National Security Advisor Jake Sullivan meeting with Secretary Gustavo Beliz of Argentina – The White House

Today, National Security Advisor Jake Sullivan met with Argentine Secretary for Strategic Affairs Secretary Gustavo Beliz at the White House to discuss joint efforts to address the crisis in Ukraine, including Argentinas leadership at the Human Rights Council and addressing food security and energy resilience. They also spoke of the importance of responding to humanitarian crises. In addition, they continue their work on the roadmap for bilateral cooperation and a partnership for sustainable and inclusive development that has led to dialogues on information and communications technology, clean energy, satellite technology, and human rights since their first meeting in August 2021. They highlighted the importance of the knowledge economy and leading-edge technology in the recovery from the COVID-19 pandemic and promoted cooperation in strategic sectors such as green energy and lithium production. They noted the importance of a democratic and free internet and the importance of secure and trustworthy information and communications technology and services. They spoke about the importance of strengthening the multilateral development banks and attracting U.S. private investment to build a green, equitable, and inclusive recovery from the pandemic. Mr. Sullivan and Secretary Beliz discussed President Biden and President Fernandezs vison and shared commitments towards sustainable and inclusive development in the region that will be highlighted in the Summit of the Americas.

Read the original post:
Statement on National Security Advisor Jake Sullivan meeting with Secretary Gustavo Beliz of Argentina - The White House

Read More..

1 High-Conviction Growth Stock Down Over 50% to Buy Now – The Motley Fool

You only need two things to make money in the stock market: time and a portfolio of high-quality stocks. To be clear, that doesn't mean you need to be right every time you buy a stock. It just means you need to research what you're buying before you invest. Look for businesses that have durable competitive advantages and big market opportunities.

Personally, once I've identified a stock I want to buy, I rank it as either gold, silver, or bronze based on my conviction. I tend to allocate a little less capital to my low-conviction ideas and a little more to my high-conviction ideas. Cloudflare ( NET -3.32% ) falls into the high-conviction category, and with the stock trading 52% below its high, you can buy a few shares on sale right now.

Here's what you should know.

Image source: Getty Images.

Cloudflare is the highway of the internet. Its global cloud platform interconnects with 10,000other networks -- including internet service providers, public cloud vendors, and large enterprises -- which positions its servers within 50 milliseconds of 95% of internet users worldwide. That infrastructure is a significant competitive advantage, and it allows Cloudflare to accelerate and secure its clients' applications and networks.

Despite facing intense competition from vendors like Amazon and Microsoft, Cloudflare has differentiated itself in a few key ways. For instance, its platform is designed to be infrastructure-neutral. Vendors like Amazon and Microsoft tend to favor their own technologies, but Cloudflare works with on-premise data centers and public clouds. Its platform gives clients visibility and control over their entire IT ecosystems.

Additionally, Cloudflare offers a free service tier that has drawn a significant number of non-paying users to its platform. In fact, its content delivery network powers 19%of the internet -- more than every other cloud vendor combined. How is that an advantage? Cloudflare leverages those free users to test new products and gather data, and it uses that data to inform and accelerate development decisions.

Finally, Cloudflare has innovated at an incredible pace over the last decade, building a robust portfolio of application, network, and security services. The company also offers developer tools that help clients build websites, software, and services on its cloud platform. In fact, Forrester Research recently recognized Cloudflare as the leader in edge development, citing its stronger current offering and stronger growth strategy.

Digital transformation has become an imperative. Enterprises must keep pace with technology if they hope to remain competitive, and that has Cloudflare growing like wildfire. It surpassed 140,000 paying customers in 2021, up 26%from the prior year, and the average customer spent 25% more. As a result, revenue soared 52% to $656 million and the company generated positive cash from operations of $65 million, up from a loss of $17 millionin the prior year.

Looking ahead, Cloudflare has plenty of room to grow. Management puts its addressable market at $86 billion in 2022, but expects that figure to reach $100 billion by 2024. And one product accounts for about half of that figure: Cloudflare One.

Organizations have traditionally protected their sensitive data by routing all traffic through a central corporate hub. That's where security policies have been enforced and threats have been blocked. But that approach is costly -- both in terms of hardware and IT manpower -- and it's becoming increasingly irrelevant, because many corporate resources now live in the cloud.

Cloudflare One, a secure access service edge (SASE), allows clients to provision network connectivity and security through the internet, without investing in costly on-premise appliances. That means traffic is no longer routed through a corporate hub. Instead, requests are routed through Cloudflare, where traffic is inspected and zero-trust security policies are enforced. That makes it possible for employees to quickly and securely connect to corporate resources (and the internet) regardless of device or location.

By 2025, research company Gartner believes at least 60%of enterprises will have plans to implement SASE solutions, up from just 10% in 2020. That accelerated adoption should be a powerful tailwind for Cloudflare.

Despite falling sharply from its high, Cloudflare stock still trades at a pricey 53 times sales. With a valuation like that, investors should expect volatility. The stock could easily get cut in half again. However, Cloudflare is an impressive business with a massive market opportunity, and despite the rich valuation, I think the stock is worth buying. In fact, if revenue continues to growat a rapid clip, I think this $36 billion business could grow fivefold (or more) in the next decade.

This article represents the opinion of the writer, who may disagree with the official recommendation position of a Motley Fool premium advisory service. Were motley! Questioning an investing thesis even one of our own helps us all think critically about investing and make decisions that help us become smarter, happier, and richer.

Read more from the original source:
1 High-Conviction Growth Stock Down Over 50% to Buy Now - The Motley Fool

Read More..

As Europe Approves New Tech Laws, the U.S. Falls Further Behind – The New York Times

In just the last few years, Europe has seen a sweeping law for online privacy take effect, approved far-reaching regulations to curb the dominance of the tech giants and on Saturday reached a deal on new legislation to protect its citizens from harmful online content.

For those keeping score, thats Europe: three. United States: zero.

The United States may be the birthplace of the iPhone and the most widely used search engine and social network, and it could also bring the world into the so-called metaverse. But global leadership on tech regulations is taking place more than 3,000 miles from Washington, by European leaders representing 27 nations with 24 languages, who have nonetheless been able to agree on basic online protections for their 450 million or so citizens.

In the United States, Congress has not passed a single piece of comprehensive regulation to protect internet consumers and to rein in the power of its technology giants.

Its not for lack of trying. Over 25 years, dozens of federal privacy bills have been proposed and then ultimately dropped without bipartisan support. With every major hack of a bank or retailer, lawmakers have introduced data breach and security bills, all of which have withered on the vine. A flurry of speech bills have sunk into the quicksand of partisan disagreements over freedoms of expression. And antitrust bills to curtail the power of Apple, Amazon, Google and Meta, the owner of Facebook and Instagram, have sat in limbo amid fierce lobbying opposition.

Only two narrow federal tech laws have been enacted one for childrens privacy and the other for ridding sites of sex-trafficking content in the past 25 years.

Inertia is too kind of a word to describe whats happened in the United States; theres been a lack of will, courage and understanding of the problem and technologies, said Jeffrey Chester, the executive director of the Center for Digital Democracy, a public interest group. And consumers are left with no protections here and lots of confusion.

The prospects that any legislation will pass imminently are dim, though regulations at some point are almost inevitable because of the way tech touches so many aspects of life. Of all the proposals currently in front of Congress, an antitrust bill that would bar Apple, Alphabet and Amazon from boosting their own products on their marketplaces and app stores over those of their rivals has the best shot.

A co-author of the bill, Senator Amy Klobuchar, Democrat of Minnesota, said Democratic leaders had promised it would go to a vote by this summer. But even that bill, with bipartisan support, faces an uphill climb amid so many other priorities in Congress and a fierce tech lobbying effort to defeat it.

If history is a guide, the path toward U.S. tech regulation will be long. It took decades of public anger to regulate the railroads through the creation of the Interstate Commerce Commission in 1887. It took nearly 50 years from the first medical reports on the dangers of cigarettes to the regulation of tobacco.

Theres no single reason for the sludge of progress in Congress. Proposals have been caught in the age-old partisan divide over how to protect consumers while also encouraging the growth of business. Then there are the hundreds of tech lobbyists who block legislation that could dampen their profits. Lawmakers have also at times failed to grasp the technologies they are trying to regulate, turning their public foibles over tech into internet memes.

Tech companies have taken advantage of that knowledge blind spot, said Tom Wheeler, a former chairman of the Federal Communications Commission.

Its what I call the big con, where the tech companies spin a story that they are doing magic and that if Washington touches their companies with regulations theyll be responsible for breaking that magic, he said.

In the vacuum of federal regulations, states have created a patchwork of tech rules instead. California, Virginia, Utah and Colorado have adopted their own privacy laws. Florida and Texas have passed social media laws aimed at punishing internet platforms for censoring conservative views.

Amazon, Alphabet, Apple, Meta and Microsoft said they supported federal regulations. But when pressed, some of them have fought for the most permissive versions of the laws that have been under consideration. Meta, for instance, has pushed for weaker federal privacy legislation that would override stronger laws in the states.

Techs lobbying power is now on full display in Washington with the threat of the antitrust bill from Ms. Klobuchar and Senator Charles E. Grassley, a Republican of Iowa. The proposal passed its first hurdle of votes in January, much to the tech industrys surprise.

In response, many of the tech companies mobilized an extensive lobbying and marketing campaign to defeat the bill. Through a trade group, Amazon claimed in television and newspaper ads that the bill would effectively end its Prime membership program. Kent Walker, Googles chief legal officer, wrote in a blog post that the legislation would break popular products and prevent the company from displaying Google maps in search results.

Ms. Klobuchar said the companies claims were hyperbole. She warned that by fighting the proposal, tech companies might be choosing the worse of two difficult options.

They are letting Europe set the agenda on internet regulation, Ms. Klobuchar said. At least we listened to everyones concerns and modified our bill.

The inaction may appear surprising given that Republicans and Democrats are ostensibly in lock step over how tech companies have morphed into global powerhouses.

Consumers need confidence that their data is being protected, and businesses need to know they can keep innovating while complying with a strong, workable national privacy standard, said Senator Roger Wicker, Republican of Mississippi. The U.S. cannot afford to cede leadership on this issue.

Lawmakers have also forced many tech chief executives including Jeff Bezos of Amazon, Tim Cook of Apple, Sundar Pichai of Google and Mark Zuckerberg of Meta to testify multiple times before Congress in recent years. In some of those televised hearings, lawmakers of both parties have told the executives that their companies with a combined $6.4 trillion in market value arent above government or public accountability.

Some of these companies are countries, not companies, Senator John Kennedy, Republican of Louisiana, said in a January antitrust hearing, adding that they are killing fields for the truth.

But so far, the talk has not translated into new laws. The path to privacy regulations provides the clearest case study on that record of inaction.

Since 1995, Senator Edward J. Markey, Democrat of Massachusetts, has introduced a dozen privacy bills for internet service providers, drones and third-party data brokers. In 2018, the year Europes General Data Protection Regulation took effect, he proposed a bill to require a consumers permission to share or sell data.

Mr. Markey also tried twice to update and strengthen privacy legislation for youths following his 1998 law, the Childrens Online Privacy Protection Act.

With every effort, industry lobbying groups have denounced the bills as harmful to innovation. Many Republican lawmakers have opposed the proposals, saying they dont balance the needs of businesses.

Big Tech sees data as dollar signs, so for decades theyve bankrolled industry lobbyists to help them evade accountability, Mr. Markey said. Weve reached a breaking point.

Read more:
As Europe Approves New Tech Laws, the U.S. Falls Further Behind - The New York Times

Read More..

Farrow: Ohio Republicans rather you focus on ‘kids with 2 dads’ than mountain of scandals – The Columbus Dispatch

Kenyon Farrow| Guest columnist

Republican Larry Householder talks to the press after his expulsion

Expelled and indicted, Republican Larry Householder didn't rule out running for political office again.

Laura A. Bischoff, The Columbus Dispatch

At this point most peopleare familiar with House Bill 616, which somehave nicknamed Ohio's Dont Say Gay."

The bill would ban "any curriculum or instructional materials on sexual orientation or gender identity" and "divisive or inherently racist concepts and any other concept that the state board of education defines as divisive or inherently racist."

More: What's in Ohio House Bill 616, the divisive concept bill that includes sexual orientation?

And while there is a lotof discussion to be had about why these bills are bad for students andeducation, thats not theirintended purpose.

More: Kenyon Farrow: 'Too smart' Dave Chappelle has fallen for 'old right-wing political device'

In addition to being a cheap and cynical political ploy to scapegoat the LGBTQ and Black and brown people whove fought for education curricula to represent the full experiences of people in the U.S. and in Ohio, these bills are really a way to keep the total and utter ubiquity of scandals the Republican legislators are facing out of the minds of Ohioans when they go to the polls this year.

TheGOP does not want Ohioansto think about House Bill 6as they enter the voting booth.

Passed in 2019, the billwas a $1.3 billion bailout for two nuclear plants and two coal plantsone of which is not even in the state of Ohioas ostensibly a favor to First Energy, who stood to make $170 million annually as a result (this isnt counting the $61 million in bribes that were used to push the bill through).

As of now, five people former House SpeakerLarry Householder of Glenford includedhave been arrested.

Sam Randazzo, whoGov. MikeDeWines appointedOhio Public Utilities Commission chair,was paid $4 million from FirstEnergy.

More: Top state regulator paid millions for part-time work, FirstEnergy agreement shows

Questions still remain as to what point DeWine knew about the alleged bribe being paid.

Instead of talking about this, were spending time talking about whether kids should learnone of their classmates may have two moms or dads.

But there is much worse.

.

In the middle of the COVID-19 pandemic, as Ohioans were dying by the dozens per day and millions were out of work due to stay at home orders, the lack of legislative approved funding for basic internet security and technology upgrades allowed for scammers to file fraudulent claims, costing the state $3.8 billion,and costing hunger and hardship to everyday Ohioans who were out of work and not able to meet their own basic needs.

Ohio Medicaid Director Maureen Corcoran, who owned stock in United Healthcare gave their Ohio subsidiary (United Healthcare Community Plan of Ohio) the state contract to manage the states Medicaid program, even while theyve been ranked almost dead-last on federal oversight reports and denying the contract of a company that ranked near the top.

In essence, Corcoran handed $1.2 billion in 2019 alone in funds paid for by Ohioans through taxes to a company ranked low in its transparency and oversight.

Corcoran has refused to hand over its oversight documents and even say if she took these federal oversight reports into consideration when she chose to hand the system over to them to manage.

Waittheres even more.

More: Our View: While your groceries go up, DeWine, LaRose, Huffman, Cupp waste millions to keep power

The Ohio voters overwhelmingly approved a measure in 2018 to put an end to partisan gerrymandering, and 2021 was the year to redraw the districts based on the then-newly released census data.

The Ohio Redistricting Commission, which is dominated by five Republicans, refused to sit down and create a transparent and open process for setting new maps to not break communities up and create oddly carved out districts merely to benefit one part or another.

More: In Ohio's redistricting battle, Gov. Mike DeWine said he'd take the lead. But did he?

They would not meet with the twoDemocrats on the commission and over and over, submitted maps that violated the spirit of the law and gave Ohio voters a big middle finger by creating maps that were heavily partisan.

So much so the Ohio Supreme Court, which has a Republican majority,rejected the maps over, and over and over and over again.

More: Top Ohio House Republican leader: 4 Supreme Court justices should be 'benched'

Thechaos is leading two primary elections instead of one.

The mess will cost Ohioans millions.

These are the issues the Republicans dont want on the minds of Ohioans when they go vote this year. But Ohioans have much on their minds.

Facing a precarious future with a virus that has killed over 38,000 Ohioans alone, most people I know are thinking aboutrising inflation resulting in outrageous food and gas prices.

More: Our view: Let Ohio teachers teach truth. Educators, kids casualties of raging culture war

The GOP is selling the most cynical agenda, scapegoating teachers trying to make sure students are academically and socially prepared to live in a world with other people who may in fact be different from themselves, instead of dealing with the mess theyve left the state after years of supermajorities that they created and are desperate to perpetuate for their own greed and power.

I hope Ohioans see the through the smokescreen.

Kenyon Farrow is a Black gay activist and writer based in Cleveland Heights.He serves on the board of the LGBT Center of Greater Cleveland.

Follow this link:
Farrow: Ohio Republicans rather you focus on 'kids with 2 dads' than mountain of scandals - The Columbus Dispatch

Read More..

UK government employees receive billions of malicious emails per year report – The Daily Swig

Jessica Haworth20 April 2022 at 13:31 UTC Updated: 20 April 2022 at 13:33 UTC

Phishing, malware, and spam are popular techniques deployed by attackers

A new report released today reveals that UK government employees receive an average of 2,400 malicious emails per year, as cybercriminals continue to use email as their vector of choice.

The study, from Comparitech, found that the central government departments across the UK received an estimated 2.6 billion suspicious emails in total last year.

These findings were taken from Freedom of Information (FOI) requests sent to 258 public-sector and national organizations including central government departments, the National Health Service and Network Rail.

Across just under 260 government organizations, we estimate that 764,331 government employees received a total of 2.69 billion malicious emails in 2021, the report reads.

Comparitech notes that it defines malicious emails as containing either malware (including ransomware), phishing, or spam.

An average of 0.32 percent of the malicious emails were opened by staff in 2021, meaning 8.62 million malicious emails were at least previewed. Of those opened, less than 1% (57,736) of these malicious emails resulted in staff members clicking on suspicious links.

Comparitech noted that some government departments responded with additional historical data, which showed that the years 2018 to 2019 saw an average increase in malicious emails of 24.5% (or around a quarter).

From 2019 to 2020, this jumped to an increase of just over 146% - more than doubling. From 2020 to 2021, the rate slowed again to just over 16%.

Read more of the latest security news from across the UK

Its perhaps no surprise that the biggest increase coincides with the pandemic and most people working from home (and emails, therefore, being their predominant method of communication), Comparitech noted in the study.

The company also noted, however, that central government departments with high volumes of malicious emails arent necessarily that bigger targets for hackers or have weaker security systems.

Rather, their IT systems may be doing a better job at filtering out malicious emails, the report states.

NHS Digital had a total of 357 million malicious emails received by 3,996 employees, equating to 89,353 emails per employee.

Other critical infrastructure services such as railway provider Network Rail Limited received 223 million malicious emails received by a total of 44,356 employees, at a rate of 5,033 emails per employee, while tax department HM Revenue & Customs received 27.9 million malicious emails received by 67,267 employees, or 415 emails per employee.

Paul Bischoff, privacy advocate at Comparitech, told The Daily Swig that government employees are targeted because they often work for critical services and systems that cant afford to go down for long.

That makes some government agencies more likely to pay ransoms, especially those in healthcare where lives are on the line, Bischoff added.

Governments also have a lot of employees and not all of them are trained to spot phishing emails. Attackers can target a large number of employees to increase their chances of success.

He advised: Every government employee who uses the internet for work, has a work email address, or connects to government networks should be trained to spot and handle phishing emails. Phishing is more of an operational problem than a cyber security one.

YOU MAY ALSO LIKE Critical infrastructure entities on red alert over exceptionally rare and dangerous ICS malware

Go here to see the original:
UK government employees receive billions of malicious emails per year report - The Daily Swig

Read More..

DiDi’s Delisting Plan Just the Start of a Tough Road Ahead – Benzinga – Benzinga

Key Takeaways:

By Ken Lo

It wasnt exactly whatDiDi Global Inc.DIDI had in mind when its shares debuted on the New York Stock Exchange last year. But one year later, a hasty exit from New York looks almost inevitable for Chinas answer to Uber. No matter what route it takes including a possible new listing somewhere else the road ahead for the former high-tech superstar will be pockmarked with challenges.

DiDi revealed the first part of its bumpy roadmap forward in astatementlast Saturday, saying it will hold an extraordinary shareholder meeting on May 23 to vote on officially abandoning its New York listing with a privatization. It said it was taking the step to comply with Chinas latest internet security rules. It added it wouldnt seek a listing on any other exchange before the exit is concluded, shooting down talk that it might go public in Hong Kong first before withdrawing from New York.

If shareholders approve the decision, Didi would become the shortest-lived U.S.-listed Chinese stock of all time. The company rushed to complete its IPO last June 30, one day shy of the 100thbirthday of China Communist Party. Its price soared from $14 to as much as $18.01 on its debut, though the euphoria was short-lived. On 4 July, Chinas cyber security regulator accused the company of illegally collecting personal information, touching off a prolonged run-in with regulators that has weighed heavily on its shares ever since.

The stock was already down to $2.46, more than 80% lower than its IPO price, by the end of last week. After announcing its plans to convene the shareholder meeting, the stock slumped further still to close at $1.71 on Thursday. Compared with its IPO valuation of $73 billion, its market cap has contracted nearly 90% to the latest $8.2 billion.

The reality is that Chinas new Cybersecurity Law, which sealed DiDis fate, will have much more impact on U.S.-listed Chinese stocks than U.S. disclosure concerns that have also made recent headlines, wreaking havoc on Chinese shares this year.

The law mandates companies that possess personal information on more than 1 million users must undergo internet security reviews if they plan to go public overseas. Internet platforms with hundreds of millions of users like Didi,AlibabaBABA,Tencent(700.HK),Meituan(3690.HK) and the not-yet-publicly-listedByteDancewill almost certainly be subject to such reviews at some point.

Lack of transparency in the new laws implementation has made it very difficult for internet companies to cope with the new dynamics, said Kenny Wen, a commentator at Everbright Sun Hung Kai Co. Ltd. He pointed out that DiDi was especially hard hit because it possessed a big trove of sensitive data, including the whereabouts of government officials and locations of sensitive institutions.

DiDi was put on the spot as a result of not knowing what exactly were the legal and illegal ways of using data, Wen said. Maybe exiting the U.S. was the only way it knew to get out of the regulatory quagmire.

Wen added that shareholders were likely to green-light the exit plan. Major investors that account for more than 40% of the companys voting shares are likely to vote in favor, even though small and institutional investors who have lost big sums on the stock may vote against. Anyone who refuses to surrender their DiDi shares once the exit is complete will only be able to trade over-the-counter, boding poorly for the price due to lack of liquidity. As a result, small investors may scramble to get out while they can.

The latest information shows that DiDis top four investors are Softbank with 20.08% of its shares, Uber with 11.93%, Tencent with 6.54% and the companys president and CEO Cheng Wei with 6.5%. With 45.1% of the companys shares between them and all in favor of a U.S. withdrawal, an exit is highly likely.

But rather than end its troubles, an exit would only mark the beginning of a cascade of new challenges. DiDi would still need to find ways to meet regulatory demands for its safe handling of sensitive data. At the same time, it will need to keep investing in its business operations to fend off competition at home and abroad, meaning its longer-term sustainability could be at stake.

And even if it can re-list in Hong Kong, the company is likely to fetch a far lower valuation than it initially got in New York. So, the exit is really just a first step to solve its immediate predicament. Additional challenges down the road could include shareholder lawsuits from small investors for failing to reprivatize at a premium, though the company has yet to announce a price for any buyout offer.

DiDis latest financial statementreleasedlast week showed it generated revenue of 173.8 billion yuan ($27 billion) last year, up 22.6% from 2020. But its losses grew far faster from 10.6 billion yuan in 2020 to 49.3 billion yuan last year. Regulatory shocks in the latter half of last year caused the company to log a net investment loss of 20.8 billion yuan in the third quarter, resulting in a 30.6 billion yuan loss for the period. That loss narrowed considerably to 171 million yuan in the fourth quarter, in a rare bit of good news for the company.

By the end of last year, the companys cash and cash equivalents totaled 43.4 billion yuan, up by 24 billion yuan in a single year, mainly due to the addition of 28 billion yuan in new funds from its IPO. Its negative cash flow from operations for the year totaled 13.4 billion yuan. At that rate of spending, the company has enough money to hold out for just two to three years. So, finding a road to breakeven and profitability is a top priority for its survival.

DiDis many China-specific woes might make comparisons with global peers somewhat moot. But to provide some perspective, we can compare its price-to-sales (P/S) ratio withUberUBER andGrabGRAB, two other top-tier ride-hailing services. In that regard, Didis P/S of 0.36 times a tiny fraction of Ubers 11.2 times and Grabs 16.7 times.

The bottom line is that Didi will face many more uphill roads if and when it delists from the U.S., led by the challenges of compliance with Chinas cybersecurity regulations and strengthening its business operations to become profitable. How it meets those challenges could well determine whether it can embark on a new and lucrative journey ahead, or whether its road might come to an abrupt dead end.

Read the original:
DiDi's Delisting Plan Just the Start of a Tough Road Ahead - Benzinga - Benzinga

Read More..

What’s the difference between cloud backup and cloud sync? – TrustedReviews

Cloud storage can provide robust protection for your data, but its important to know what your solution is designed to do. While often free, synchronisation services are far more ephemeral than true cloud backups, while cloud backups arent generally designed for sharing.

Almost all of us now store files in the cloud to share between our devices or with our friends and family. This has online security implications regarding the strength of your passwords and the trustworthiness of the companies and countries that your data is held by, but thats not what Im going to focus on here.

Kaspersky Total Security Now 50% off

Award-winning protection against hackers, viruses and malware. Includes, Free VPN, Password Manager and Kaspersky Safe Kids.

50% off from just 19.99 per year (equivalent to 1.66 per month)

Today, were going to look at the difference between cloud backup and cloud sync.

Cloud sync (also known as cloud storage) instantly copies files between selected folders on your PC or mobile device and an online storage location, assuming youre connected to the internet at the time. Most popular cloud storage solutions, including both Microsoft and Apples native ones, are syncing services.

Files on local devices are mirrored and can be automatically synchronised to all devices connected to the account. However, sync services typically only retain a limited number of versions for a limited amount of time, and delete files from cloud storage when theyre removed from the local device.

Sync services are designed to make it each to share files with others, and often include collaborative working solutions for share document creation and editing, as youll find in Google Drive and Microsoft Office 365.

Cloud backup services more accurately retain folder structure, often have a longer version history, and will not delete a file from your online storage when you remove it from your hard disk. However, you may not be able to easily share files from inside a backup with other or edit them online, depending on your choice of service.

The entire point is to keep an unchanged copy of the files on your hard disk somewhere safe. This kind of storage provides the most robust cloud-based protection against ransomware. Some online backup services allow you send your data on a physical drive to avoid a time-consuming initial backup run, although this option is expensive.

While cloud sync services are designed to connect multiple devices, most (but not all) cloud backup services provide subscriptions on a per-device basis.

Hybrid backup and sync services provide both backup and synchronisation, often in different parts of the same app. Google Drive is probably the best-known example of this, but many online backup services offer some degree of online access to and sharing of backed up files.

Major cloud service providers such as Amazon AWS and Microsoft Azure also provide a range of enhanced online backup solutions, but Im going to focus on approachable consumer options here.

Some services, offer zero-knowledge storage, these are encrypted with a key that only you know, so that the service provider cannot even see what youre storing. This is more secure, but can limit your recovery options if youre prone to losing passwords.

Microsofts OneDrive cloud backup service gives you 5GB of storage just for having a Microsoft account, buts which is unlikely to be enough for users with lots of images. This goes up to 1TB if you subscribe to Office 365.

Apples iCloud also gives you 5GB, with paid tiers of between 50GB and 2TB.

Both of these provide tools are integrated with their respective operating systems and allow you to select the local folders you wish to back up. Assuming you have an internet connection and are properly logged into the services, files in selected folders are automatically synchronised with their online versions when theyre changed or created.

OneDrive lets you restore 25 previous versions of the file, but iCloud, unfortunately, has no versioning system. Further, when files are delete from the local directory youre syncing, theyre put in the cloud storages recycling bin and permanently deleted after 30 days.

If keeping costs down is a priority, Megas sync services provides unlimited versioning, 20GB of storage for free, and even a Linux desktop client as well as Windows and macOS versions. However, if you a delete a file on your hard disk, its only kept in Megas deleted files folder for 30 days before being permanently removed, which isnt appropriate for backups.

Google Drive, which gives you 15GB of storage for and has a range of paid tiers, retains up to 100 versions of non-native Drive files, but these are deleted after just thirty days, which is scant protection against ransomware.

It has a convenient backup and sync client for Windows and macOS, but its no longer integrated with Google Photos, so youll have to manage two storage interfaces one for your photos and one for your files, while your storage capacity is shared between the two.

Unlike most sync services, Google Drive does allow you to make true backups. These can be configured using Drives Backup and Sync desktop client and are handled different to synced files in Drives web interface. Backups are kept until manually deleted from storage, while synced files put in Drives recycle bin and fully removed after 30 days if you delete them from your local device.

Kaspersky Total Security Now 50% off

Award-winning protection against hackers, viruses and malware. Includes, Free VPN, Password Manager and Kaspersky Safe Kids.

50% off from just 19.99 per year (equivalent to 1.66 per month)

If you want serious security and protection against both deletion and ransomware, you should probably look for a dedicated cloud backup service.

Were fans of BackBlaze, which is surprisingly inexpensive, cross-platform, provides unlimited versioning, and no risk of accidentally deleting a file from your online storage when you remove it from your hard disk. Like most cloud backup services, youll need a separate license for each device you need to back up.

Other top-tier services include Carbonite, whose app can manage both local and cloud backups for a single computer, including cloud-based access to your backed up files and iDrive, which is unusual in that it allowed you to back up as many devices as you like.

Here is the original post:
What's the difference between cloud backup and cloud sync? - TrustedReviews

Read More..

How Russia Is Isolating Its Own Cybercriminals – DARKReading

Russian cybercriminals dominate the threat landscape, aided largely by a government that has heretofore turned a blind eye to their illicit dealings as long as their attacks target organizations and individuals outside of Mother Russia. However, since Russia's invasion of Ukraine on Feb. 24, the Kremlin has made a series of moves that threatens to disrupt the delicate balance that exists between them.

Without an extradition treaty with the United States, most of these cybercriminals operate with impunity or are nabbed when traveling outside of the United States. But in recent months this has not been the case. Several administrators and hosting providers were arrested in Russia in the past year for allegedly breaking the unspoken agreement between the government and cybercriminals. On Jan. 14, the Federal Security Service of the Russian Federation (FSB), in concert with US authorities, arrested members of the REvil ransomware-as-a-service (RaaS) collective that was responsible for the Kaseya attack. About a week later, the FSB detained four members of the Infraud Organization, including the group's founder, Andrey Novak, who was also wanted by the FBI. Though Russia is responsible for detaining these cybercriminals, these arrests and illicit marketplace takedowns have been few and far between and seem to signal more of a public relations ploy than a formal desire to stop cybercrime that affects its Western counterparts; there is no formal cyber alliance between Russia and the United States.

In some ways, Russian cybercrime has always been different, even in the underground. Russian cybercriminals, often young men, have had the autonomy to target foreign victims and establish various Dark Web-based marketplaces, card shops, and forums that attract like-minded threat actors. Wanted posters for these cybercriminals may very well be accompanied by images that showcase their Instagrammable lifestyles poses that include expensive luxury automobiles, exotic cats, and stacks on stacks of US dollars.

Connection to CybercrimeThere is a demonstrable connection between the Russian government and cybercrime. Public records show that Alyona Eduardovna Benderskaya is the wife of "Evil Corp" ringleader Maxim Yakubets and daughter of FSB agent Eduard Bendersky. The exotic cat-wielding Bogachev has also been associated with Yakubets regarding money laundering for various malware schemes. Former cybercriminal-cum-FSB officer Dmitry Dokuchaev sought the services of Shaltai-Boltai ringleader Vladimir Anikeyev and Yahoobreachers Alexsey Alexseyevich Belan and Karim Baratov. Dokuchaev was also sentenced to six years in prison for treason, so perhaps there is no love lost there. Aleksei Burkov, founder of cybercrime forum "DirectConnection" and co-administrator of "MazaFaka," was recently released from the United States and returned to Russia short of his nine-year sentence. Despite these indictments, all of these Russia cybercriminals remain at large, housed and protected in Russia.

But Russia may unconsciously be eating its own: Russia's war with Ukraine has resulted in a global effort to isolate Putin and, as a result, Russian cybercriminals are feeling the pressure.

For one, Russia has taken an aggressive stance on Internet blocking, which has increased since the start of the war and is affecting the ways in which cybercriminals operate. News and social media websites are actively being censored to create a filter bubble within Russia's borders. Previous reports indicate that Russia has attempted to block Internet protocols such as DNS over HTTPs (DoH) and DNS over TLS (DoT), threatening the security and privacy of Internet communications. Russia is also blocking access to the Tor network, which is having an effect on freedom of speech and the landscape through which cybercriminals can communicate. While dissidents are downloading VPNs in greater numbers, threat actors are actively seeking workarounds that bypass Russia's deep packet inspection (DPI) capability. Threat actor recommendations include "anti-DPI" technology, Tor bridges, and VPN-to-VPN services, though the effectiveness of these countermeasures remains to be seen.

Secondly, Russia previously faltered in implementing its "sovereign Internet," finding difficulty in going from an open global Internet to a closed one. Cybercriminals may be able to gamble on Russia unsuccessfully disconnecting from the Internet. While countries like China have been more successful in closing their borders to disinformation, dissent, and foreign influence, it has come at the cost of vast human, technical, and financial resources. Other examples, such as Iran's walled garden and North Korea's restricted Internet, have demonstrated that cybercrime can persist, though usually it is at the behest of the government.

Thirdly, foreign governments are also making it difficult for Russian cybercriminals to cash out and launder the proceeds of their criminal campaigns. On April 5, German law enforcement, in concert with the US Justice Department, shut down Hydra, Russia's largest cybercrime marketplace. The Treasury Department's Office of Foreign Assets Control (OFAC) followed by sanctioning over 100 cryptocurrency addresses and virtual currency exchange Garantex. The sanctions followed a September 2021 initiative to disrupt ransomware payments by sanctioning Suex, and then Chatex, which have helped facilitate ransomware payments to threat actors. All three were tied to the "Moscow tower," which has been a hub of money laundering and cash-out activity. These sanctions are affecting cybercriminals' ability, in combination with sanctions against Russian financial institutions, to move cryptocurrencies from illicit activities (such as ransomware payouts) into fiat currencies.

Changing Face of CybercrimeCybercrime has a way of transforming. When one threat actor group is taken offline, another one takes its spot. There has never been a shortage of victims, and despite increased cybersecurity, there are always loopholes that can be exploited. Russian cybercriminals will have a difficult time overcoming the recent sanctions, although they are not a panacea. Russia has benefited from an overly permissive stance on cybercrime, and cybercriminals have acted with impunity. However, the increased restrictions on protocols, illicit services, and cybercrime marketplaces will make it increasingly difficult to financially benefit from conducting cyberattacks within Russia's borders. The implicit treaty between Russia and cybercriminals has been broken, and it is yet to be seen how they respond.

View original post here:
How Russia Is Isolating Its Own Cybercriminals - DARKReading

Read More..

How to know if the infrastructure bill is actually working – Protocol

Good afternoon! It's been more than five months since President Biden signed the Infrastructure Investment and Jobs Act into law, so we asked the experts to look at how the rollout was looking and the best ways to measure its efficacy. Want more on the infrastructure bill? Protocol's Issie Lapowsky hosted a panel today about what to expect next.

Senior Vice President at Booz Allen Hamilton

In 1954, the Eisenhower Administration referred to the $175M down payment on the National Highway System as a good start. Two years later, Congress authorized $27B to launch nationwide efforts to construct one of Americas greatest achievements. In November 2021, President Biden signed the $1.2T infrastructure bill, the first significant down payment of modernizing a now aging infrastructure with 21st century technologies. A good start.

But how will we know its working and creating bipartisan support to finish the job as the National Highway System did? Its important to examine three long-term indicators that will foreshadow the degree to which we transform our infrastructure.

First, will states emerge as laboratories of innovation or just spend the money? In areas like alternative energy and electric vehicle adoption, we already see promising signs of states taking novel approaches and forming intriguing partnerships to spur innovation.

Second, will private industry invest heavily now or wait on the sidelines? When the Affordable Care Act was passed, for example, Congress appropriated $10B for innovative health pilots. But the market signal it sent generated a wave of large-scale industry investment, triggered market shifts, and stimulated innovation. Will a similar pattern emerge with infrastructure?

Third, will technology adoption accelerate or stagnate? In the automotive industry alone, EVs, AVs, and even UAVs could disrupt business and regulatory models and produce unpredictable advancements and consequences. The adoption curves shape over the next five to eight years will tell us much about the success of this down payment.

Tweet this.

Senior Fellow and Director of the Center for Technology Innovation at The Brookings Institution

The Infrastructure Investment and Jobs Act (IIJA) is primed to place a large down payment on the equitable deployment and adoption of affordable, high-speed broadband. If implemented, it will guarantee that no child nor community in America will be left offline ever again. But to determine its success, two factors should stay top of mind: the details of new broadband network deployments, and the percentage of Americans fully benefitting. The former may appear easy but may require some flexibility in how new networks are accounted for, including an approach that incorporates opportunities for novel technologies like 5G fixed wireless, as well as enhancements to existing network infrastructure. The latter will require metrics from states and other local stakeholders that provide data on local technology adoption and use. These should be made public to enable research and accountability from interested parties. Right now, many public and private sector leaders are focused on getting the monies allocated in accordance with legislative goals and timelines, but success will not come in the sole review of balance sheets. Rather, how human capital will be enhanced by these opportunities also matters and may take longer to determine. That is why ensuring that NTIAs Office of Internet Connectivity and Growth must expediently provide the nation with public landscape analyses on both broadband deployment and digital equity progress. Without knowledge of where the U.S. is starting on these key issues, it will be impossible to determine whether IIJA has succeeded or failed.

Tweet this.

President at the Information Technology and Innovation Foundation

The clearest indicator of success for the infrastructure bill will be a lot more infrastructure built in a cost-efficient and timely manner. However, the as intended question complicates things, as many progressive members of Congress did not intend for the bill to expand Infrastructure. For example, there is a risk that anti-road progressives will limit funding for expanding road and bridge capacity and instead focus on repair.

In the case of IT-related infrastructure, the metrics of success should be clear. For broadband, this means bringing up the percentage of households served by at least one fixed provider to around 98 percent. Trying for 100 percent would waste money. The last few percent are better served by low-earth-orbit satellite broadband. The way to achieve this goal is to limit broadband overbuilding: funding new networks in places with adequate broadband. And adequate broadband should be defined reasonably: no more than 100mbs down and 10 up.

Success also means widespread deployment of 5G networks to most places people live and regularly travel (e.g., along the Interstates).

If there is any money left over after building networks in unserved places, it should be spent helping low-income households adopt broadband and gain digital skills.

Finally, achieving these goals will be much harder if the administration insists on applying Buy America provisions on the IT components of infrastructure builds. ITIF estimates that this would raise IT costs by approximately 25 percent. By definition, this means less infrastructure being built.

Tweet this.

CEO and Co-founder at Illumio

From a cybersecurity standpoint, all eyes are on how organizations will respond to President Bidens Cyber Incident Reporting for Critical Infrastructure Act of 2022 (CIRCIA). The bill is significant in that it requires multiple sectors to report material cybersecurity incidents and ransomware payments within 72 and 24 hours, respectively to CISA.

If the bill works as intended, we can first expect to see more organizations across industries (from FinServ to agriculture) disclose cybersecurity incidents to CISA in a timely manner. This will lead to increased information sharing between public and private sectors, which will help us better understand imminent cyber threats.

This knowledge is key to helping organizations strengthen their defenses against cyber criminals and safeguard critical infrastructure.

If security decision makers take this bill seriously, we should also see more federal agencies and organizations taking proactive steps to bolster cyber resilience by shoring up their mission-critical assets: backing up data, practicing incident response plans, and segmenting networks.

The federal governments continued emphasis on cyber as a national imperative is a step in the right direction. Although it may take time for us to reach national resilience, its important to remember that decisive action is a win and any action beats entropy. Our attackers never stop, and its our mandate to push forward during this critical time.

Tweet this.

Global General Manager, IOT Cities & Transportation Solutions at Intel

The IIJA is a once-in-a generation bipartisan law that will provide hundreds of billions of dollars to upgrade and modernize U.S. transportation systems and physical infrastructure as well as expand broadband internet access and digital infrastructure. It is also an opportunity to rethink how these upgrades are approached and the value digital technologies can bring to transform our infrastructure, making it more resilient, innovative, and efficient and providing more value to our communities, municipalities, and states.

The digital revolution is already here transforming the way we live, work, and communicate. Smart infrastructure is a key part of this revolution. In todays knowledge-based society, we must think about infrastructure differently. Its not just concrete and steel, its also the digital components that can help make our roads, skies, waterways, and airways safer, cleaner, and more efficient. In effect, physical and digital infrastructure go hand in hand one cannot exist without the other.

Learn more.

Tweet this.

Area Vice President, U.S. Public Sector, State, Local Government and Education Markets (SLED) at Cisco

Regarding the IIJAs broadband provisions, success depends on federal agencies, state and local governments, community leaders, and private companies coordinating effectively so that all Americans have access to the connectivity necessary to succeed in a digital economy. Capturing the full picture of the digital divide in the United States is crucial, and accurate FCC-led mapping of unserved and underserved areas is central to making sure funding is going to struggling communities. As the true conveners of broadband infrastructure, state and local governments must navigate the needs of the community with available funding and solutions to achieve meaningful impact. These federal funds should also seed investments of private capital from ISPs and equity firms to make sure that there is a long-term solution increasing broadband access.

The IIJA aims to use unprecedented infrastructure investment to boost domestic manufacturing and provide quality jobs for American workers. In the case of high-tech broadband equipment, onshoring of manufacturing will be a multi-year process impacted by numerous factors affecting global supply chains. A clear indicator of success will be whether urgently needed broadband investment is allowed to proceed in parallel with the shift to increased domestic manufacturing.

Finally, we must move beyond the same old solutions to the same old problems. Beyond broadband, a strong indication of success will be strategic investments in operational technologies that support and secure our nations roadways, water systems, subways, pipelines, and utilities. Investments that include technology can lead to more sustainable, affordable, and secure solutions for years to come.

Tweet this.

Senior Vice President of Americas & Public Sector at Splunk

When it comes to our nations security, there are several provisions focused on tying physical infrastructure to its corresponding vulnerabilities. These sections of the bill showcase that cybersecurity is more important than ever and the ultimate indicator of the bills success is our investment in it. First, we must ask ourselves if we are funding for true success. Are we able to secure the tools, talent, and frameworks that allow for agility and innovation? Are we bringing the right talent together through expanding jobs and increased public/private partnerships to disseminate information and best practices?

We must use measurable data to ensure the provisions in the infrastructure bill are creating a lasting impact. For example, we must see the adoption of more automated solutions, like SOAR and SIEM, specifically for securing critical infrastructure; the growth of public/private partnerships across essential sectors of infrastructure at the state and local levels; and the implementation of zero-trust & DevSecOps operational capabilities. Providing agencies with the proper amount of funding - down to the state and local level - to implement these strategies and tools is vital in meeting the bills goals. However, without measuring the investment in these areas, we wont truly be able to assess if the infrastructure bill is working for increasing our cybersecurity posture and resilience.

Tweet this.

Senior Vice President and Acting General Manager of Operations and Security Services at the Center for Internet Security

In cybersecurity, it is often not what you see but what you dont see, or hear about, that offers the best indicator of success. The bipartisan Infrastructure Investment and Jobs Act invests almost $2 billion over the next four years to help defend our nation against cyberattacks intent on disrupting and endangering our hospitals, schools, water systems, energy sources, and other critical infrastructure. Much of that investment is focused on state and local governments down to rural areas, where the cyber risk has proven significant while resources to defend against it are limited.

The first indication of success may well be that we, as a nation, have recognized the enormous need of state and local governments. Until now, the U.S. government has primarily funded cybersecurity efforts to protect federal networks and systems with few exceptions so the acknowledgement that the cybersecurity deficit within state and local government is a national security issue is a major step in the right direction.

At the Multi-State Information Sharing and Analysis Center (MS-ISAC), we assess the cybersecurity maturity of state and local governments through the Nationwide Cybersecurity Review (NCSR). Our assessment focuses on cyber maturity in key areas ranging from implementing technical security controls to user awareness training. A key indicator of success for this grant program will be year-over-year increases to the maturity assessments of organizations participating in the NCSR.

Cybersecurity is a race without a finish line. We know it is impossible to defend against every conceivable threat and our goal is not to achieve perfect protection. Using these funds, we encourage state and local governments to drive decision making through risk management, ensure the involvement of executive leadership and governing bodies, and collaborate with others to make the most effective use of these funds. It may just be what were not hearing aboutmassive data breaches or ransomware incidents among local governmentsthat proves federal money has been well spent.

Tweet this.

Chief Strategy Officer and CISO Advisor at Sectigo

The Infrastructure Investment and Jobs Act has within it language that outlines improvements to cyber resiliency including $2 billion allocated towards state and local cybersecurity as it relates to critical infrastructure. While this is indeed much-needed funding towards cyber resiliency and protection, there must be increased funding considerations for the future. The measures outlined in the bill are a good step forward, however, the intricacies of cybersecurity and infrastructure are complex, and it may be some time before we can determine the benefits of this legislation. We cannot rely on tech if we dont understand the risks associated with it, especially when it comes to cyber threats to national-security and critical infrastructure which we saw firsthand with SolarWinds.

Importantly, the White Houses plans to bolster cyber education and critical infrastructure resilience should implement identity and cybersecurity solutions that are hand-in-hand with interoperability and openness. Though, ultimately, we need a Zero Trust security approach, which President Biden and his administration have put more of an emphasis on as outlined in their overall cybersecurity strategy. Ensuring that his priorities are intertwined with varying policy initiatives is especially critical and an opportunity for local, state and the federal government to work together and will help determine if the legislation is impactful and is working as intended.

Tweet this.

Original post:
How to know if the infrastructure bill is actually working - Protocol

Read More..

Official Visit of the Right Honourable Jacinda Ardern, Prime Minister of New Zealand, 18 to 20 April – Ministry of Foreign Affairs Singapore

The Right Honourable Jacinda Ardern, Prime Minister of New Zealand, received a ceremonial welcome at the Istana this morning and had a new orchid hybrid, the Dendrobium Jacinda Ardern, named in her honour. Prime Minister Ardern called on President Halimah Yacob and Prime Minister Lee. The two Prime Ministers also held a Joint Press Conference before adjourning for an Official Lunch hosted by Prime Minister Lee.

President Halimah and Prime Minister Ardern reaffirmed the strong and multifaceted relations between Singapore and New Zealand. They noted the strong COVID-19 cooperation between both sides, which demonstrates that we are close partners that can rely on each other in times of need. They had an engaging conversation on the contributions and progress of women in both countries. They also discussed the importance of maintaining social cohesion, particularly in diverse, multicultural societies such as Singapore and New Zealand.

Prime Minister Lee and Prime Minister Ardern reaffirmed the warm and excellent bilateral relations, which were upgraded to an Enhanced Partnership (EP) during Prime Minister Arderns last visit in 2019. The Prime Ministers were pleased with the good progress made under the EP across the four pillars of trade and economics, security and defence, science, technology and innovation, as well as people-to-people ties. They also welcomed the close cooperation between Singapore and New Zealand during the COVID-19 pandemic, including an air freight connectivity partnership that brought food supplies into Singapore and sent essential medical supplies to New Zealand.

The Prime Ministers agreed to explore new areas of cooperation to keep the EP forward-looking. They announced the establishment of a new pillar on climate change and green economy under the EP, which reflects the ongoing cooperation in this important area and the joint commitment to pursue closer collaboration. Cooperation under this pillar will include initiatives on energy transition technology, carbon markets, sustainable transport and waste management as a start. The Prime Ministers also welcomed the establishment of initiatives on sustainable aviation, business collaboration and supply chain resilience.

The Prime Ministers welcomed the timely launch of the Vaccinated Travel Framework by Singapore from 1 April 2022, and New Zealands reopening of borders to visa-free countries, including Singapore, from 1 May 2022. The reopening of borders is an important step towards living with COVID-19, and is critical in restoring the people-to-people and business links between both countries and with the rest of the world. The establishment of a bilateral Working Holiday Scheme will allow young Singaporeans and New Zealanders to travel and work in each others countries.

The Prime Ministers also exchanged views on key regional and international developments. They agreed on the importance of international law and the principles enshrined in the UN Charter. Both leaders strongly condemned the invasion of Ukraine by Russia and called on all parties to facilitate unhindered humanitarian assistance to those in need in Ukraine.

Following the meeting, the Prime Ministers issued a Joint Statement on the key outcomes of the meeting. The full text of the Joint Statement is at Annex.

. . . . .

MINISTRY OF FOREIGN AFFAIRS

SINGAPORE

19 APRIL 2022

Annex

JOINT STATEMENT BY THE PRIME MINISTERS OF NEW ZEALAND AND SINGAPORE

1. Prime Minister Lee Hsien Loong hosted Prime Minister Rt Hon Jacinda Ardern on an Official Visit to Singapore on 19 April 2022. The Prime Ministers acknowledged the longstanding friendship and multi-faceted, wide-ranging cooperation between Singapore and New Zealand across many fields, in spite of the challenges presented by COVID-19.

Reconnecting

2. The Prime Ministers discussed their respective countries responses to managing COVID-19. They reflected on the high value of the close cooperation and frequent discussions between health, border, transport, foreign affairs, and other officials throughout the pandemic. They welcomed reconnecting through the reopening of borders to each other, which will restore people-to-people links between the two countries.

3.The Prime Ministers welcomed a new Working Holiday Scheme for young Singaporeans and New Zealanders, who will soon once again be able to travel and work in each others country each year.

Bilateral Cooperation

4.The Prime Ministers welcomed the excellent progress made in the Enhanced Partnership between Singapore and New Zealand, established during Prime Minister Arderns Official Visit in 2019. The Enhanced Partnership currently covers four pillars: (a) Trade and Economics; (b) Security and Defence; (c) Science, Technology and Innovation; and (d) People-to-People links.

5.The Prime Ministers agreed to strengthen the Enhanced Partnership by adding a new pillar on Climate Change and Green Economy to better reflect our recognition of the existential threat posed by climate change and our shared commitment to implement the Paris Agreement and seize growth opportunities in the green economy. Cooperation under this pillar can include energy transition technology, carbon markets, sustainable transport, and waste management as a start. A list of agreed initiatives is in theAnnex.

6. As the region adapts to evolving global trends and supply chain vulnerabilities, the Prime Ministers agreed that increasing economic resilience will be crucial. Throughout the COVID-19 pandemic, Singapore and New Zealand have worked together to guard against protectionism to ensure that supply chains remained open. To help build resilience against current and future supply chain disruption, the Prime Ministers agreed to launch a Singapore and New Zealand Supply Chain Working Group. They asked officials, working closely with the private sector, to identify opportunities for collaboration in support of more productive, resilient, sustainable, and digitally enhanced supply chains for enterprises of all sizes and for improved food and energy security in both countries.

7.The Prime Ministers noted the ongoing opportunities for New Zealand and Singapore companies to work together to support the growth of exports and services to South East Asia, South Asia, and beyond. New Zealand is an important producer of food and agricultural products while Singapore is a natural transport and logistics hub for New Zealand businesses. They reaffirmed the importance of further strengthening partnerships in food and agriculture between the two countries, to enhance food security and facilitate the development of innovative food systems. They agreed to strengthen the relationship between our research institutions in areas such as alternative protein as well as collaborate on the commercialisation of new food products.

8.The Prime Ministers agreed that New Zealand and Singapore will continue to strengthen defence and security cooperation including through high-level dialogues, training exercises, professional exchanges, and cooperation at multilateral fora. The Prime Ministers were pleased to note an increase in both countries engagement on counter terrorism and exchange of maritime security insights, and climate change. The Prime Ministers also reaffirmed their commitment to the Five Powers Defence Arrangements, which marked its 50thanniversary in 2021, and to the ASEAN Defence Ministers Meeting-Plus.

9.The Prime Ministers noted that there have been frequent exchanges between Singapore and New Zealand cyber security experts since a Cyber Security Memorandum of Arrangement was signed in 2019.Wide-ranging discussions have covered the resilience of critical infrastructure and SMEs to cyber incidents, cyber security workforce development, Internet of Things security, ransomware and cooperation with the private sector for stronger cyber outcomes. The Prime Ministers directed their respective cyber security leads (Chief Executive of Cyber Security Agency of Singapore and the New Zealand Prime Ministers Special Representative for Cyber and Digital) to meet virtually to discuss opportunities to further deepen the cyber security partnership between the two countries.

Regional Economic and Trade Cooperation

10.The Prime Ministers welcomed the development of stronger economic linkages between Singapore and NewZealand arising from the implementation of the Comprehensive and Progressive Agreement for Trans-Pacific Partnership (CPTPP) and the recent entry into force of theRegional Comprehensive Economic Partnership(RCEP).

11.The Prime Ministers noted their support for ongoing efforts to conclude, ratify, implement and upgrade trade agreements in the region that benefit our peoples and our businesses. They also welcomed the ongoing efforts by the US to work with partners on the establishment of an Indo-Pacific Economic Framework. Both countries will continue to support the upgrade of the ASEAN Australia NewZealand Free Trade Area (AANZFTA) as well as the expansion of existing agreements such as the CPTPP and the Digital Economy Partnership Agreement (DEPA) to economies that can fully adhere to the agreements high standards.

Global Developments

12.The Prime Ministers exchanged views on global developments.

13.The Prime Ministers reiterated their strong condemnation of the invasion and occupation of Ukraine and demanded Russias immediate withdrawal. They agreed that actions by Russia are a flagrant violation of fundamental principles of international law and risk long-term global instability, and called on all parties to protect civilians and respect human rights. They also called on all parties to facilitate unhindered humanitarian assistance to those in need in Ukraine.

14.The Prime Ministers reiterated their shared commitment to an open, inclusive, rules-based and resilient Indo-Pacific region, which supports and promotes free trade and open markets, and respects the rights of countries to lead their national existence free from external interference, subversion and coercion. They reaffirmed the importance of ASEAN Centrality, and agreed to continue to work closely with ASEAN in ASEAN-led mechanisms such as the East Asia Summit and the ASEAN Regional Forum. They also reaffirmed their shared determination to strengthen the WTO and the rules-based multilateral trading system.

15.In the maritime domain, the Prime Ministers reaffirmed the right of freedom of navigation and overflight and other lawful uses of the seas accorded by international law, including the 1982 United Nations Convention on the Law of the Sea (UNCLOS). They reaffirmed the need to pursue peaceful resolution of disputes in accordance with international law, in particular UNCLOS, which sets out the legal framework within which all activities in the oceans and seas must be carried out. They affirmed the need to respect states ability to conserve, sustainably develop, and effectively manage their maritime natural resources in accordance with international law, in particular UNCLOS.They reaffirmed that all concerned parties must abide by the 2002 Declaration on the Conduct of Parties in the South China Sea, and reiterated their support for ASEAN-led efforts to develop an effective and substantive Code of Conduct for the South China Sea that upholds the legitimate rightsand interestsof all parties and is consistent with UNCLOS. They also affirmed the importance of acting consistently with the relevant Standards and Recommended Practices of the International Civil Aviation Organization, and the relevant instruments and conventions of the International Maritime Organization.

16.The Prime Ministers shared their deep concerns regarding the situation in Myanmar following the 2021 military coup. Both Prime Ministers agreed that the Five-Point Consensus on Myanmar adopted at the ASEAN Leaders Meeting on 24 April 2021 should be fully implemented as soon as possible and reiterated calls for the violence to end, for inclusive dialogue between all parties in Myanmar, for the release of all political detainees including State Counsellor Aung San Suu Kyi, President Win Myint and foreign detainees, and for the Myanmar military authorities to avoid actions that would be inimical to eventual national reconciliation in Myanmar. They appreciated the constructive role played by ASEAN in facilitating a peaceful solution in the interest of the people of Myanmar. Singapore and New Zealand also remain committed to supporting ASEANs efforts in alleviating the humanitarian situation in Myanmar.

17.The Prime Ministers reiterated their support for multilateral and UN engagement on Myanmar including the work of the UN Special Envoy for the Secretary General and the Special Rapporteur on the human rights situation in Myanmar and called for UN representatives and agencies to be granted full access to Myanmar.

18.Both Prime Ministers underscored that New Zealand and Singapore are staunch supporters of international law and the principles enshrined in the UN Charter. They agreed that New Zealand and Singapore will continue to work together to strengthen their bilateral relationship and uphold international law and the multilateral system, and to stay in close contact on regional and global issues of concern. On climate change specifically, the Prime Ministers acknowledged the need for intensified global effort to counter climate change, and committed to work together to build on the outcomes of the COP26 in Glasgow and the recommendations of the latest deeply concerning IPCC reports.

19.Both Prime Ministers also agreed that to ensure global security, prosperity and the meeting of challenges such as climate change in the coming decades, it is important to support regional and global institutions and approaches that facilitate constructive dialogue between all countries.

INITIATIVES FOR THE NEW CLIMATE CHANGE AND GREEN ECONOMY PILLAR UNDER THE SINGAPORE-NEW ZEALAND ENHANCED PARTNERSHIP

Read more:
Official Visit of the Right Honourable Jacinda Ardern, Prime Minister of New Zealand, 18 to 20 April - Ministry of Foreign Affairs Singapore

Read More..