Page 2,303«..1020..2,3022,3032,3042,305..2,3102,320..»

Smarter Production and Data-Driven Insight | – Advanced Television

November 18, 2021

The pandemic has forced the pace on what is possible with creative content production in the cloud. This is just in time to help content providers and broadcasters step up to the spiralling demand for ever more and ever more creative content.

In a free-to-attend online event (see below) AWS hosts Sky revealing the ground-breaking work it has done pushing the boundaries of what is possible with live event production.

Also hear Deutsche Telekom and AWS partner ThinkAnalytics, on the data that can be surfaced and how to deploy it to create those vital better content discovery experiences for subscribers.

AWS describes how it is helping media and entertainment companies create content, optimize media supply chains, and compete for audience attention across streaming, broadcast, and direct-to-consumer platforms. Industry leaders such as Netflix, Formula 1, Discover, and Disney use the cloud to pioneer new ways to entertain, launching new streaming services, expanding their content catalogues, and setting new paradigms with audiences for viewing experiences.

You canjoin this live fascinating thought-leadership event free on the afternoon of November 23rd.

AWS brings 15 years of experience supporting transformation for leading industry customers such as Comcast, Discovery Communications, Disney, F1, FOX, HBO Max, Hulu, Method Studios, MGM, The NFL, Netflix, Nikkei, Peacock, Sky, TF1, Untold Studios, ViacomCBS, and Weta Digital.

AWS recently launched AWS for M&E, aligning the most purpose-built media and entertainment capabilities of any cloud against five solution areas (Spanning Content Production, Media Supply Chain & Archive, Broadcast, Direct-to-Consumer & Streaming, and Data Science & Analytics) to help customers transform the industry. We saw the industry faced with unprecedented audience demand for new content and a global pandemic accelerating the transition to remote production. For example:

Continue reading here:

Smarter Production and Data-Driven Insight | - Advanced Television

Read More..

Improving Your Odds of ML Success with MLOps – insideBIGDATA

In this special guest feature, Harish Doddi, CEO, Datatron, discusses what CEOs need to understand about using MLOps. He also shares insights on how to use MLOps to gain competitive advantage and provide tips on how to implement it. Over the past decade, Harish has focused on AI and data science. Before Datatron, he worked on the surge pricing model for Lyft, the backend for Snapchat Stories, the photo storage platform for Twitter, and designing and developing human workflow components for Oracle. Harish completed his masters degree in computer science at Stanford, where he focused on systems and databases.

Machine learning is a lofty, unreachable goal in some executives minds; they see it as a nice-to-have thats just too complex to execute. It doesnt have to be that way, however, thanks to Machine Learning Operations (MLOps). MLOps uses models to systematize the ML lifecycle by defining processes to make ML development more productive and reliable. But that alone is no guarantee of success. Business leaders need to understand several important aspects of MLOps to make it work for their enterprises.

Difficulties with MLOps

Enterprises need to dedicate people and resources to MLOps. Sometimes, enterprise leaders just assume it will all magically work out, but thats not a given. Specifically, you need to invest in people with the right skill sets. MLOps is a skill that needs to be developed because to really do analog, you need to understand the machine learning portion of the AI models, but you also need to understand the operations portion. It can be difficult to find people who understand all of this.

To implement MLOps successfully, youll need to do some planning in advance. Carefully consider the various contingencies and possible outcomes before you initiate deployment to ensure your organization is prepared in advance.

MLOps success requires culture change

Generally, when machine learning is involved, there are many different people involved. One of the most important adjustments to an organizations culture when introducing MLOps is being able to demonstrate the separation of duties. Traditionally, AI was seen as a project for the AI group or the data science group but thats no longer true.

Youll need to make sure you can carefully separate duties because in some cases, the priorities for the data scientists arent the same priorities for the business leaders. And those might not be the same priorities from an operations standpoint.

These days, there are many stakeholders involved: operations, engineering, line of business even the regulatory compliance people. Thats why, rather than having a one-size-fits-all approach, each of them will have different priorities. How you bridge this priorities gap is a key question. Because everyone needs to work together, this is the culture adjustment to aim for first.

MLOps: Understanding whats important

Its crucial to understand that when someone develops the first version of the model, its not the final version; its the first draft. When stakeholders push the draft to production, and they see how it behaves, they learn from it and then take what they learn back to the development environment. Its a highly iterative process.

In a production environment, many things are changing, including data and behaviors of users. So, the things they observe in the development, they may not observe in production. They may unlock some new insight. So, its important to remember that its always an iterative process.

A second important point is that you need to adopt MLOps processes. This journey is key for AI success, because things are going to be more difficult the longer it takes to adopt these best practices. Heres one example: If data scientists have the right set of tools in their development environment, they can move quickly. They can iterate fast on their models, but they dont see the same thing in the production environment once people get involved. So, this behavior unnecessarily creates friction between the data science teams and other parts of optimization engineering, operations, infrastructure and other parts of the organization. That is why the faster you can adopt best practices and have standardization, the better off youll be in terms of easing friction that could occur down the line.

The third important point is that auditing is happening across huge volumes of data and across different business units, and it can happen in terms of models, too. You need to be able to show evidence and accountability for any questions the auditing team might ask. For instance, if the model loses money during a particular time period, you explain why that happened, and what if any actions were taken.

Reap the MLOps benefits

Why do many AI and ML deployments fail? Its more often an issue of culture and process rather than a technology issue. To successfully adopt ML, you need the right systems, resources and skills, and this is where MLOps can provide a significant advantage. The above recommendations will help you make the needed shifts in culture and remind you of the iterative process involved. These changes will help you deploy MLOps and reap all the ensuing business benefits.

Sign up for the free insideBIGDATAnewsletter.

Join us on Twitter:@InsideBigData1 https://twitter.com/InsideBigData1

Continued here:

Improving Your Odds of ML Success with MLOps - insideBIGDATA

Read More..

It’s Time to Take a Deep Breath. Here’s How. – The Wall Street Journal

During a session of fitness phenom Taryn Toomeys The Class workout, after a grueling series of jumping jacks and squats, participants are instructed to take a moment and focus intently on their breathing. The directive is intended not to help them catch their breaththeyre generally pantingbut to make them conscious of it. In the face of a challenge, the mind often gets loud with complaints, excuses and judgements, thereby limiting us, says Natalie Kuhn, a founding teacher and the vice president of programming at The Class. Becoming aware of your breath and slowing it down actually slows down the thoughts, she says. The practice of returning our attention to the breath is what helps us self-regulate.

A general rule of thumb is that humans can go for about three weeks without food, three days without water and only three minutes without oxygen, says Ashley Neese, a California-based author and breathwork teacher. Yet, as vital as it is for our health, breath is not something that many of us think about; its simply a physical inevitability. We assume, at our peril, that breathing is a passive action, just something that we do: breathe, live; stop breathing, die, James Nestor writes in his recent book, Breath: The New Science of a Lost Art. But breathing is not binary.

Read the rest here:
It's Time to Take a Deep Breath. Here's How. - The Wall Street Journal

Read More..

Coping with conflict: Kids in Gaza learn deep breathing to ease their trauma : Goats and Soda – NPR

Teenager Sama Ahel was taught deep breathing to cope following the Gaza-Israel conflict in May. Fatima Shbair for NPR hide caption

Teenager Sama Ahel was taught deep breathing to cope following the Gaza-Israel conflict in May.

GAZA CITY When the Israeli missile landed at the foot of her building during the Hamas-Israel conflict this May, spraying bits of glass from the surrounding apartments into the room where she huddled with her family, 15-year-old Sama Ahel did what any other teenager might do. She took out her phone and started filming.

The video lasts about seven minutes. You see her in socks, running down a darkened stairwell and across a rubble-strewn street. You see a charred car flipped on its back, and flames in front of a Hamas government office on the ground floor, and her 17-year-old sister Tasneem covering her bloody face with her headscarf.

You hear rapid-fire explosions, and Sama's shrieks, as she crouches with her family behind a metal dumpster next to a United Nations compound across from her apartment building. A wailing ambulance collects them, and her father, a psychologist, tells her to stop filming, fearing Israel could pick up the cell phone signal and target them.

Not captured on video is what Ismael Ahel did next. He led his family in a deep breathing exercise. The idea, he says, is to ease yourself out of the shock and into the present, to make yourself recognize that the traumatic event is over.

"You just need to close your eyes and start to inhale," Sama, now 16, demonstrates. She draws a quiet breath and holds it for a few moments. "You will start to feel it going through you."

Her entire apartment building needed help.

A week after the war, Ahel and a group of therapists went to all 120 apartments in the building, making house calls. They referred some to therapy. With others, they taught deep breathing and other coping mechanisms, like shaking out your limbs to release stress.

"We have a hard time treating" Gazans, said Ahel, sitting on his couch at home. "We can't just deal with the first trauma or the second trauma. It's a complexity of trauma together."

One of the buildings in Gaza City that was bombed during the war in May. Fatima Shbair for NPR hide caption

One of the buildings in Gaza City that was bombed during the war in May.

The deadly 11-day conflict in May scarred Palestinians and Israelis both. But in the small Gaza Strip, where Palestinians faced heavy bombardment without the bomb shelters and missile defense systems that protect Israelis, the psychological wounds are deep.

Ahel and his colleagues diagnose it as "Gaza trauma"

It's the accumulation of trauma upon trauma from four punishing wars over the last decade and a half, fought between Gaza's Hamas rulers and their foe Israel.

"I maintain that the biggest damage that happened in May is psychological," said Matthias Schmale, who this summer finished his tenure as Gaza director of UNRWA, the U.N. agency that provides food, health care and schooling in Gaza.

About half of Gaza's two million residents are under 18 years old, and in the last six months, many have received mass therapy. The United Nations put 150,000 children through counseling and summer activities.

"If you look objectively at the numbers, people killed, buildings destroyed, et cetera, this was maybe not as heavy as the 2014 [war]. But I didn't meet any Palestinian who didn't describe this as worse, and that had to do with the heaviness [of the Israeli strikes] and the psychological impact," Schmale said.

Some children after the war had knee and ankle pain and difficulty walking. The Gaza Community Mental Health Programme, a local clinic supported by European donors, diagnosed it as trauma-induced, and referred them to traditional folk practitioners who perform a olive-oil body massage known as gata'at il-khofa, Arabic for "cutting the fear."

A mental health worker in Gaza walks with one of the children who participated in a psychodrama session aimed to help kids cope with the trauma of war. Fatima Shbair for NPR hide caption

A mental health worker in Gaza walks with one of the children who participated in a psychodrama session aimed to help kids cope with the trauma of war.

It improves "blood circulation, lymphatic circulation, and puts an end to some of those pains," said psychologist Yasser Abu Jamei, who directs the mental health organization.

Kids who don't communicate or collaborate

The mental health clinic still runs group psychodrama workshops, which Abu Jamei said is a cost-effective way to treat many kids at once.

"Ooooh! Oooooh!" psychologist Aida Kassab howls, flapping a window drape to simulate a storm, as kids huddle in a plastic playhouse during one group psychodrama session. Kassab wants the children to learn to find love and protection from others when their home feels threatened. The kids in the session barely speak to each other.

"Those children are from the same school and the same neighborhood. But there is no communication between them. No collaboration, no teamwork," Kassab said. "They have a behavior disorder, and trauma."

Psychologist Aida Kassab leads children through a psychodrama session aimed at helping them cope with the trauma of the Gaza-Israel conflicts. Fatima Shbair for NPR hide caption

Psychologist Aida Kassab leads children through a psychodrama session aimed at helping them cope with the trauma of the Gaza-Israel conflicts.

Helping traumatized families find their 'strength points'

It's hard to treat trauma in Gaza, where people don't feel the war is truly behind them. Israel and Hamas are still negotiating the terms of their ceasefire, and most destroyed homes have not been rebuilt.

Abu Jamei offers parents advice. "Sometimes the best thing which you can give the family is to make them identify their strength points in their life," he said. "You know, a strength point could be that you survived. A strength point could be that your home is still there. A strength by point could be that your school is a good one."

Yasser Abu Jamei, a psychologist, is the director of the Gaza Community Mental Health Programme. He tells parents, "Sometimes the best thing which you can give the family is to make them identify their strength points." Fatima Shbair for NPR hide caption

Yasser Abu Jamei, a psychologist, is the director of the Gaza Community Mental Health Programme. He tells parents, "Sometimes the best thing which you can give the family is to make them identify their strength points."

The Ahel family has those strength points: They survived the attack near their building. Their home is still there. Tasneem graduated with high marks on her matriculation exam shortly after the war and is searching for a scholarship to study medicine abroad. Sama is back in school.

But Sama finds it difficult to move on. Friends keep commenting on her video of the attack she posted on Facebook, and every other day or so, she goes back and watches those seven terrifying minutes. Her father says their apartment building is now tilting a few degrees. At school, when she looks out the window, she sees a bombed building.

Still, before she does her homework or takes a test, Sama sits on a comfortable chair, rests her hands on her legs, shuts her eyes, takes five or six deep breaths, and visualizes.

She pictures the Mediterranean Sea. Or Capital Mall, a shopping center with a bustling food court. Or her friend Yasmine's house. Or the Qattan children's library, her second home.

She has some happy places she can go to in her mind.

Fatima Shbair contributed to this story from Gaza City.

Read the original:
Coping with conflict: Kids in Gaza learn deep breathing to ease their trauma : Goats and Soda - NPR

Read More..

New London officials frustrated that environmental funds associated with the State Pier redevelopment won’t come to them – WSHU

The Connecticut Port Authority Board voted yesterday to approve a $3.4 million agreement with the Connecticut Department of Energy and Environmental Protection (DEEP) for fish habitat restoration projects in connection with the State Pier redevelopment.

However the city of New London, where the State Pier is located, will receive no funds.

Felix Reyes, the director of economic development for New London, cast the lone vote against the agreement. He said the money is not being distributed equitably and that it is being prioritized for wealthier municipalities rather than spent in distressed communities like New London.

There has to be a better disbursement of funds and theres absolutely no equity in this at all, Reyes said.

New London Mayor Michael Passero said DEEP has ignored New London completely.

Right next door to the State Pier is Winthrop Cove and feeding Winthrop Cove is Briggs Brooks and both of these areas are extremely environmentally important, and they need a lot of work, they need a lot of remediation. Why that money isnt being spent right there, where the impact is happening is mind boggling. DEEP doesnt seem to have even given us any consideration whatsoever, Passero said.

Some of the projects that could see funding are based as far away as Fairfield County.

DEEP said they had been unable to find any projects in the immediate New London area that were in advanced stages of planning or ready to begin immediately.

Go here to see the original:
New London officials frustrated that environmental funds associated with the State Pier redevelopment won't come to them - WSHU

Read More..

These Turkey Deep Fryers From Amazon Will Arrive Before Thanksgiving – Mental Floss

There's no image more definitively linked to Thanksgiving than that of a freshly cooked turkey sitting in the middle of the dinner table, waiting to be carved up, doused in gravy, and shoveled down a family's collective gullet. It's the food of choice for 88 percent of households that celebrate the holidaybut the consensus isn't as universal when it comes to preparation. Some people like the traditional oven-roasted turkey with stuffing crammed on the inside, while others cook the stuffing separately (technically, this is known as dressing) and leave the bird itself in a brine overnight for added flavor and moisture. Others, meanwhile, opt to deep-fry their turkeys, which has become a trendier pick in recent years. And if youre considering deep-frying your turkey this Thanksgiving, check out these two fryers you can get in time for the big day.

One of Amazons best-selling deep fryers is Masterbuilts eight-liter MB20010118 electric three-in-one deep fryer at $90. This gadget weighs 15.5 pounds and is 15.4-inches wide by 13.7-inches high, so it can easily fit on your countertop. Use the rotary dial to set the temperature at which you want to fry, boil, or steam your food. The included basket, drain clips, and hook will help you remove your freshly fried bird once its done. In addition, the appliancewhich has a 4.5-star rating after almost 3000 reviews on Amazonfeatures a built-in drain that will make cleaning up easier and faster. Because of the way this version was designed, youll be able to cook up your turkey, vegetables, and more with a third less oil than with traditional fryers. One user, who gave this model a five-star rating, fried up a 20-pound turkey in 80 minutes.

Another excellent option is the Char-Broil Big Easy oil-less liquid propane turkey fryer for $148. This 4.7-star-rated fryer, which weighs 28.9 pounds and is 20.8-inches wide by 23.5-inches high, can cook up to 16 pounds of food, including a turkey. Like the Masterbuilt, this model comes with a cooking basket, lifting hook, meat thermometer, and lid. Unlike the electric fryer, this one is best used outdoors because of its size and use of propane instead of oil. The fryer uses Char-Broils TRU-Infrared cooking technology to cook the turkey more quickly and evenly. The clean-up and cooking process is also much safer without the fear of hot oil popping and burning you.

Before using any of the above models, be sure to read the instructions carefully to avoid mishaps (namely, you should never deep-fry a frozen turkey). For more safety tips about deep-frying a turkey, here's what the FDNY Foundation says to keep in mind.

Head to Amazon to check out the Masterbuilt electric three-in-one deep fryer and the Char-Broil Big Easy oil-less liquid propane turkey fryer and get them by Thanksgiving when you sign up for Prime shipping.

Sign Up Today: Get exclusive deals, product news, reviews, and more with the Mental Floss Smart Shopping newsletter!

Here is the original post:
These Turkey Deep Fryers From Amazon Will Arrive Before Thanksgiving - Mental Floss

Read More..

CyCognito Named Tomorrow’s Top Growth Company by Qumra Capital during Calcalist’s Mind the Tech NY 2021 – PRNewswire

NEW YORK, Nov. 17, 2021 /PRNewswire/ --CyCognito, the leader in external attack surface management and attack surface protection, today announced it has been selected by Qumra Capital as one of Tomorrow's Top Growth Companies at Mind the Tech NYC, the industry's leading tech and innovation conference.

"We're thrilled to be named Tomorrow's Top Growth Company by Qumra Capital," said Rob Gurzeev, CEO and Co-Founder of CyCognito. "This recognition is a testament to the importance of attack surface protection, CyCognito's innovative approach, best-in-class technology, and the growing demand for our platform."

"Cycognito embodies five major characteristics we looked for when naming Tomorrow's Growth Companies: true innovation, a big market opportunity, proven product-market-sales fit, strong and continuous growth, and a leadership team that is eager and capable to become a global leader," said Erez Shachar, Managing Partner of Qumra Capital.

Dozens of companies applied to be included in the prestigious list. The selection committee, made up of top investment professionals from the Israeli tech ecosystems, looked for innovative companies with the potential to make a huge difference and lead their categories. Additional members of the list can be found here.

Aisling MacRunnels, Chief Growth Officer at CyCognito, added, "We have the WOW factor. It's fun to witness a sophisticated CISO running a trial with CyCognito across their organization. They expect us to find more attack surface than any other company, owned and third party, but they do not anticipate the ease at which the product runs, the context and insights that are returned immediately, and the actionable data that is provided. Our biggest objective today is to engage more channel partners and customers so they can enjoy the benefits of CyCognito as we continue to evolve our Attack Surface Management & Protection platform"

About CyCognitoCyCognito solves one of the most fundamental business problems in cybersecurity: seeing how attackers view your organization, where they are most likely to break in, what systems and assets are at risk, and how you can eliminate the exposure. Founded by national intelligence agency veterans, CyCognito has a deep understanding of how attackers exploit blind spots and a path of least resistance. The Palo Alto-based company is funded by leading Silicon Valley venture capitalists, and its mission is to help organizations protect themselves from even the most sophisticated attackers. It does this with a category-defining, transformative platform that automates offensive cybersecurity operations to provide reconnaissance capabilities superior to those of attackers.

About Qumra Capital Qumra is Israel's leading growth capital provider. With over $800 in AUM, Qumra is managed by Boaz Dinte, Erez Shachar, Sivan Shamri Dahan, and Sharon Barzik Cohen. The fund's portfolio includes successful IPOS such as Fiverr JFrog and Taboola and top hyper-growth technology companies such as AppsFlyer, Minute Media JoyTunes At bay, and many more.

SOURCE CyCognito

More here:
CyCognito Named Tomorrow's Top Growth Company by Qumra Capital during Calcalist's Mind the Tech NY 2021 - PRNewswire

Read More..

Will you be ready when quantum breaks encryption? Steps to take now to prepare – Lexology

While the potential opportunities quantum brings are impressive, the seismic risk it poses to current encryption methods cannot be ignored. Do you know the steps your organisation should be taking now to reduce your quantum cyber risk?

Last week Rob Sumroy, head of Slaughter and Mays Tech practice, spoke at ITech laws European conference on this very subject. He was joined by Dr Ali El Kaafarani (a visiting professor at Oxford University and founder of PQShield) and Professor Yasser Omar (Professor at IST University of Lisbon and President of the Portuguese Quantum Institute).

The problem quantum will break commonly used PKC

Put simply, we know that our data and systems need to be kept secure, and encryption methods like RSA (a type of public-key cryptography or PKC) help us do this. However, a cryptographically relevant quantum computer will, in the future, be able to solve the mathematical problems on which these encryption methods are based exponentially faster than a classical computer can. This means that an encryption algorithm that would have taken thousands of years to break (making it unbreakable in practice) could be cracked in a day or so by a quantum computer, creating both a current, and future, risk:

The solution

Thankfully, a number of solutions to the encryption problem exist, and there are steps organisations can take now to prepare.

The international community has been developing quantum-proof encryption based on both classical computing (quantum-safe cryptography) and quantum mechanics (quantum key distribution).

What can organisations do?

Organisations should consider the quantum risk now, and build transitioning to quantum-safe products and services into their future plans. Preparations include:

For more information on quantum, please see our quantum computing podcasts series, which includes a podcast on Cyber security in the era of quantum with Dr Ali El Kaafarani and Robert Hannigan (Chairman of BlueVoyant International and ex Director of Government Communications Headquarters (GCHQ)).

See the original post:
Will you be ready when quantum breaks encryption? Steps to take now to prepare - Lexology

Read More..

If cybercriminals cant see data because its encrypted, they have nothing to steal – The Register

Paid feature Heres the irony of ransomware data breach stories that gets surprisingly little attention: cybercriminals enthusiastically encrypt and steal sensitive data to extort money and yet their victims rarely bother to defend themselves using the same obviously highly effective concept.

It should be a no-brainer. If sensitive data such as IP are competently encrypted, that not only means that attackers cant access or threaten to leak it, in many cases they wont even be able to see it in the first place all encrypted data looks alike.

Ransomware is like a tap on the shoulder, telling everyone they have a problem. Its not that criminals are able to reach the data perhaps thats inevitable but that when they get there, the data is defenceless, exposed. You could even argue that ransomware wouldnt exist if encryption and data classification had been widely adopted in the Internets early days.

Historically, the calculation has always been less clear cut. Using encryption (or tokenisation) across an organisations data is seen as adding complexity, expense and imposing a rigour few beyond elite regulated industries and government departments are willing to take on. Its an issue thats not lost on Thales UKs cybersecurity specialist Romana Hamplova, and Chris Martin, IAM pre-sales solutions architect.

Ransomware targets sensitive data. But if the attackers cant see the contents of the file because of encryption, they cant see that its sensitive, agrees Hamplova. "On the other hand, there is no need to encrypt all data, only the data that qualifies as worth protecting. Just as you don't want to have exposed/unprotected all/sensitive data, you also don't want to have maximum security applied to public data because that just slows down the infrastructure.

The catch, she says, is that organisations often arent always certain where that sensitive data is in an increasingly complex world where data gets moved around, deleted, changed, and re-classified. In many cases, they dont have any easy way to identify what is and isnt sensitive. What youre left with is a form of data paralysis where organisations default back to trying to stop access to sensitive data rather than protecting the data itself.

The first job for organisations is to understand what data they have. We enable them to discover the data in both structured and unstructured format and scan those locations and find out what data is there. For instance, perhaps they want to understand what GDPR data they have, or to adhere to PCI-DSS or HIPAA, says Hamplova.

The ongoing chaos surrounding data and what to do with it was confirmed by Thaless 2021 Thales Data Threat Report, which found that three quarters of the 2,600 global IT respondents questioned werent certain where all their organisations data was located.

Less than a third said they were able to classify or categorise it according to sensitivity. Interestingly on the data protection side, despite 42 per cent saying theyd experienced a data breach within the previous 12 months, half of victims were still able to avoid making a notification to information commissioners because the stolen data had been encrypted.

In terms of near-term spending priorities, 37 per cent of respondents mentioned encryption, only one per cent less than the percentage mentioning data loss prevention. An identical 37 per cent rated tokenisation as the most effective technology for protecting data, followed by data discovery and classification at 36 per cent, with encryption seen as the most effective by 34 per cent.

Working from home has made organisations aware of the data risks they have been taking, says Martin. When people are in an office, there is an implicit amount of security. With working from home, the implied security is lost. You dont have the visibility of that person sitting in front of their computer.

Architectural changes such as cloud access exacerbate this. Whats happened in the last 18 months is that companies are protecting their VPN. But employees are using applications that are not internal, so VPN access wont necessarily control access to the applications or data. They are now separate.

Another anxiety was the burden of software complexity itself, with organisations securing themselves using a mesh of overlapping tools. For example, 40 per cent or organisations admitted to using between five and seven different key management systems, with 15 per cent putting the number at between eight and ten. Much of this headache is caused by the growing importance of diverse cloud platforms.

The companys 2021 Access Management Index uncovered a similar picture with authentication, with 34 per cent of respondents in the UK admitting that they used three or more authentication tools, with 26 per cent using three to five, and 8 per cent putting the number at more than five. That level of complexity makes management harder but also significantly raises the likelihood of misconfiguration and error.

By coincidence, just as the pandemic sent everyone scurrying to their spare rooms to work in early 2020, US super-body NIST published its first draft of SP 1800-25, which for the first time offered specific advice on coping with ransomware. This was followed in June this year with the NISTIR 8374, which related anti-ransomware strategy to the organisations risk-oriented Cybersecurity Framework, first published in 2014.

Built around the overarching Framework, everything NIST publishes these days is quickly funnelled into best practice presentations the world over. Its influence is being felt across an industry that cant pretend it hasnt been warned, agrees Martin.

The significance of this is huge. We are used to regulations such as PCI-DSS and GDPR, but NIST is trying to raise the profile of ransomware. It affects the supply chain. NIST is trying to use its weight to do something about this sooner rather than later. The urgency has been raised.

Frameworks work in a different way to rules. Rules create boundaries, a narrow focus, and the risk of the infamous tick box mindset that says that if the rule has been followed, the job is done. Twenty years of cybersecurity failure says rules arent enough. It could be that frameworks encourage more nuanced, long-term thinking.

Even though companies dont necessarily have to comply with the NIST recommendations, they still like to follow it because they understand that it is best practice, says Hamplova. We have been recommending best practice for years but unless there is a third-party body like NIST it doesnt always have enough strength. Having a guideline like this can help companies to focus.

A wider challenge remains the need to translate best practice into something which can be understood and implemented under real world conditions. Thales currently offers a wide range of data protection products and technology across the cybersecurity stack, bolstered by acquisitions including Alcatel Lucents cybersecurity division (2014), Vormetric (2016), and Gemalto (2017).

The Thales portfolio covers a large proportion of the data protection stack, starting with data classification and encryption, addressed by the CipherTrust platform. This also maps to the risk assessment subsection within the NIST Frameworks Identify risk assessment category (ID.RA). A critical element of CipherTrust is its transparent encryption approach, which means it is processed automatically without manual intervention.

In our systems, encryption should always be transparent to an authorised user or application, to ensure business processes run uninterrupted comments Hamplova.

As well as file encryption, CipherTrust also allows organisations to apply and manage encryption and tokenization for applications and databases using APIs. The second layer is access control and authentication, provided by SafeNet Trusted Access, which corresponds to NISTs Protect, access control category (PR.AC). Within the context of home working, SafeNet adds a layer of security that is more reliable than naively relying on VPNs alone.

This must go beyond simply identifying the user, says Martin. Its also about the context, for example where they are located. We can geo-locate with IP address or mobile phone. If someone is doing something from the same IP address as their home, we have a greater degree of confidence about their identity. Its about taking authentication to the next level.

Both Hamplova and Martin are cautiously optimistic about the latest cybersecurity bandwagon, zero trust (ZT), which can be thought of as a software-defined perimeter. The idea is a good one assess users, credentials, or applications before allowing them access but there are still practical difficulties in implementation. It would be perverse if an attempt to reform the nave trust in credentials that has caused so many cybersecurity problems simply created new layers of complexity.

Our society innovates built on trust. When we talk of zero trust, its not about being unable to trust anything but about establishing the right element of trust and build from there, says Hamplova.

Martin agrees: Is zero trust impossible? Ultimately, you have to trust someone or something in your organisations, or externally when accepting trust certificates.

The issue of complexity remains a lurking worry with too many trust gateways being used to manage poorly integrated technologies. If authentication becomes too complex, trust becomes impossible to deliver. The Thales perspective is that the acid test for cybersecurity is whether it can protect data.

Says Hamplova: As all cybersecurity specialists know, there is no nirvana! Its always about making it harder for the cyber criminals to reach the critical data and ensuring your organisation is resilient enough to continue operating, should the worst happen.

This article is sponsored by Thales.

Continued here:
If cybercriminals cant see data because its encrypted, they have nothing to steal - The Register

Read More..

Why You Should Encrypt Your WhatsApp Backups in iCloud – Lifehacker

Photo: Alberto Garcia Guillen (Shutterstock)

With over two billion active users, WhatsApp is one of the most popular messaging apps globallyand its also one of the few apps that offer end-to-end encryption by default. This means that no one other than you the other party can read your conversations. Even WhatsApp cant read your conversations because it doesnt have the key to un-encrypt your chats.

This was all true, except for one scenario: WhatsApp chats backed up to iCloud were all unencrypted, so if anyone got their hands on your iCloud backup, they could read all your messages pretty easily. But now, WhatsApp has an optional feature to protect your WhatsApp backups with the same two-factor authentication using a password or a secure key.

Before we begin, you should know that WhatsApp end-to-end encryption depends on a password or a 64-digit secure key. If you lose your password, you wont be able to restore your chats, so make sure you use a secure yet recognizable password. If you use something complicated, make sure to save it on your password manager (it can be iCloud Keychain or a third-party service like Bitwarden).

To get started, first update your WhatsApp application to the latest version. WhatsApp is slowly rolling this feature out to its two billion users, so if you dont see it yet, try again in a couple of days.

Open WhatsApp, and from the Settings tab, go to Chats. Here, select Chat Backups and tap the End-to-End Encrypted Backup button. Tap the Turn on button and from the next screen, choose the Create Password option.

G/O Media may get a commission

Screenshot: Khamosh Pathak

Here, create a password that includes at least six characters, and one letter. Then, tap the Next button.

Once everything is set up, tap the Create button to switch to the end-to-end encrypted backup. Give WhatsApp some time to transition to encrypted backups.

Screenshot: Khamosh Pathak

If you want to disable this feature, come back to Settings > Chats > Chat Backup > End-to-end Encrypted Backup > Turn off.

While WhatsApp has switched over to encrypted backups, your iPhone is still backing up the entire iPhone data to iCloud, in the same un-encrypted format. For the sake of security, we would suggest you disable iCloud backups altogether. To do this, open the Settings app and tap your Profile banner from the top. Then go to iCloud and disable the iCloud Backup option.

Go here to see the original:
Why You Should Encrypt Your WhatsApp Backups in iCloud - Lifehacker

Read More..