Page 2,642«..1020..2,6412,6422,6432,644..2,6502,660..»

Sponsored post: Startups around the world are solving old problems with modern cloud services – TechCrunch

By Joseph Tsidulko, Senior Director of Communications, Oracle

How do application containers support truck shipments in Saudi Arabia, or serverless architectures aid trash removal in Brazil? Whats the link between machine learning and pest control on Israeli farms, or blockchain and Europes elite fashion houses?

The answer is that many innovative startups around the world are solving longstanding problems by building with those modern cloud services on Oracle Cloud Infrastructure (OCI). With next-gen computing technologies at their disposal, creative entrepreneurs can compete at a speed and scale never seen before.

Take Saudi-based Awini, a ridesharing startup that pairs truck drivers with companies looking to transport goods. Part of Oracle for Startups, Awini has been called the Uber for trucks.

Image Credits: Getty Images

While shipments are packed in containers of the old-fashioned variety, Awini turned to Oracle Container Engine for Kubernetes to realize the speed and agility of container-tech when developing route management, driver safety and fuel tracking features for its app.

Using the managed Kubernetes service to orchestrate application containers on OCI, Awini has seamlessly rolled out those new capabilities while expanding its network of drivers and its customer base.

In Brazil, the perennial burden of trash removal got the modern cloud treatment from Waste2Go, also participating in the Oracle for Startups program.

Waste2Go found that serverless computing, a cloud-native approach to running apps by executing code on-demand rather than provisioning servers, was the best architecture for connecting the countrys waste producers with waste collectors.

The startup turned to Oracle Cloud Functions, a serverless platform based on the Fn Project framework, to help them make cities cleaner, boost recycling and reduce deposits in landfills.

With cutting-edge computing technologies readily available to a new breed of tech-savvy entrepreneurs, the possibilities for improving the world seem endless.

AgroScout, also part of Oracle for Startups, is using advanced artificial intelligence to detect pests and diseases before they threaten crops and the livelihoods of farmers. The Israeli agritech startup turned to Oracle Cloud Infrastructure Data Science to develop machine learning algorithms that help them analyze photos captured by drones flying over fields.

Image Credits: Getty Images

AgroScout also took advantage of Oracle Cloud Native Services to implement micro-services, breaking its applications up into smaller service components connected by programming interfaces. Transitioning to that dynamic application architecture made it easier to onboard customers and put its tools at their disposal.

From farms in the Middle East to the fashion runways of Europe, modern cloud services are powering innovation.

German startup retraced is using blockchain, a securely shared ledger of decentralized data, to help prominent brands sustainably source their apparel.

Using a solution built with Oracle Blockchain Platform, retraced customers can map and verify their supply chains to certify raw materials, textile manufacturers, fabric dyers, craftspeople, factories, and seamsters.

The companies that have joined the Oracle for Startups program are tackling diverse problems across very different industries and far-flung geographies.

But their missions share a lot of common groundall are building novel products on OCI that not only help their customers succeed, but also make their countries cleaner, healthier and more equitable.

Awini, Waste2Go, AgroScout and retraced show that all it takes to change the world is a desire to solve complex problems, some creative entrepreneurship, and the right set of computing tools.

Read more:
Sponsored post: Startups around the world are solving old problems with modern cloud services - TechCrunch

Read More..

TOP 100: IBM makes big move toward transformation – Washington Technology

TOP 100: IBM makes big move toward transformation

A recurring theme that weve heard from companies on the 2021 Washington Technology Top 100 is transformation, both for themselves and for their customers.

But few companies can claim as a dramatic a transformation as the one happening at IBM, which is spinning off its managed infrastructure services business into a new $19 billion-annual revenue company to be called Kyndryl.

IBM will remain a $59 billion-annual revenue company focused on hybrid cloud adoption, digital transformation and other areas of innovation such as artificial intelligence-related solutions.

We are really returning to our roots as a core technology company, said Steve LaFleche, general manager for the U.S. public sector and federal market at Big Blue.

IBMs revenue today is about 65 percent services and 35 percent technology. ButLaFleche said that once Kyndryl is an independent company, IBMs revenue mix will flip to 65 percent technology and 35 percent services. The split is expected to happen by the end of this year.

For 2021, IBM is ranked No. 33 on the Top 100 with $1.1 billion in prime government contracts.

LaFleche said the split will have little impact on the federal business because most of the managed infrastructure business with public sector customers takes place in the state and local market.

A secondquestion that was top of mind going into our conversation was how does IBM distinguish between managed infrastructure services and its cloud offerings. Why dont they fit together?

LaFleche said it's rather simple: think of the managed infrastructure services as the people who run data centers and network operations, which makes it about hourly rates.

IBMs focus is on our hybrid cloud platform, LaFleche said. The software platform, some of the underlying integrated hardware that enables clients to modernize. Well keep that as part of IBM.

The company has positioned itself to help customers accelerate their digital transformation journeys, modernize applications and implement intelligent workflows.

We will not be running data centers or networks or storage farms or any clients on-premise infrastructure, LaFleche said.

Big Blue's journey began several years ago and can be tracked through the kinds of acquisitions it has made. Topping that list of course is the $34 billion acquisition of Red Hat in 2019. Much of IBMs hybrid cloud strategy is built around Red Hats Open Shift offering.

That is the foundation of our open hybrid cloud platform, LaFleche said. From there the company has invested in its software stack that sits on top of that platform and the company is retooling its services business to focus on accelerate adoption of the cloud platform.

Big Blue is also incorporating Open Shift into its System Z mainframes and IBM Power Servers.

This will better enable our clients to move to this open hybrid cloud world that we see as the predominant architecture for the foreseeable future, LaFleche said.

The opportunity is huge in the federal space because parts of many agencies are moving to a hybrid cloud environment, but the majority have not. Much work remains to be done.

IBM wants to help federal customers keep what they need on-premise in a private cloud but at the same time help them move what they can to a public cloud. This will be particularly important as agencies add mobile front ends to systems and improve how they interact with citizens.

Those kinds of moves require a hybrid cloud approach, according to LeFleche.

And IBMs strength is really in that hybrid multi-cloud arena, LaFleche added.

Earlier this year, IBM won an $850 million Navy contract for enterprise resource planning support services. That is an example of the kind of opportunities IBM is pursuing in the federal space. The contract is known as NETSS, short for Navy ERP Technical Support Services. It consolidates several existing contracts.

Thats exactly the type of work we want to see, LaFleche said. Anything that involves applications and application modernization and moving those applications forward.

Outside of Red Hat, many of IBM's other acquisitions have brought in capabilities such as Taos in the United States and NordCloud in Europe. Those deals happened earlier this year and focused on hybrid cloud consulting.

These companies are services companies that help clients modernize applications, move them to a hybrid cloud in an open way, LaFleche said. So they can run on IBMs cloud, Google Cloud, Amazon Web Services, Microsoft Azure. Its very agnostic.

Earlier this month, IBM acquired a DevOps consultancy and enterprise Kubernetes certified service provider. That deal for BoxBoat extends IBMs container capabilities, which are critical to a hybrid cloud implementation.

While its acquisition strategy moves forward, IBMs partnering strategy has evolved as well. IBM has forged relationships with AWS, Microsoft Azure and Google. Big Blue also partners with Workday, Salesforce and Palantir.

We have embraced a broad ecosystem but with a common mission -- we want to help drive this open hybrid cloud platform. Were not just partnering for empty calories, LaFleche said.

The pace of modernization and digital transformation is picking up in the government market. Part of that is driven by the COVID-19 pandemic which forced agencies to work remotely. Now they see a real benefit of a flexible workforce whether there is a pandemic or not, LaFleche said.

Theres a big pull in the marketplace and the technology is there and the skills to modernize these applications are there, LaFleche said. We are at a moment of time where everybody says, its time to go.

Posted by Nick Wakeman on Jul 16, 2021 at 12:42 PM

Read the original here:
TOP 100: IBM makes big move toward transformation - Washington Technology

Read More..

What Is a Container? | Understanding Containerization | SW – Server Watch

Containerization is the solution to the roadblocks posed by traditional virtualization. Since their inception, virtual machines (VMs) have enabled organizations to do more with less. A single physical device can contain several isolated, virtual environments through a hypervisor, and the benefits include reduced overhead, convenient mobility, and scalability.

Sounds great but theres one problem. Virtual machines are heavy units.

Because a significant appeal of virtualization is its use in DevOps, the ability to store and migrate applications between platforms is essential. Coming in to fill this gap is virtualizations younger, lightweight brother: containers.

A container, or application container, is an isolated computing environment in which programs are stored and accessed. Containers are a favorite for contemporary software development and deployment for two reasons.

Whereas virtual machines offer a complete hardware system simulation, containers only emulate the operating system. For the layman, this means containers only virtualize the OS and not a computers entire physical infrastructure like disks, drives, and server equipment.

In virtualization, two frameworks have emerged for modern networks: virtual machines and containers. Neither is mutually exclusive, and both facilitate moving one physical devices contents to another. The crucial difference and advantage for containers is their size or lack thereof.

With a VMs applications, bins and libraries, and the guest OS giving it hardware-level virtualization, a virtual machine takes up gigabytes (GB) of space. By comparison, containers will often contain only a single application and have a footprint in megabytes (MB).

Read more about how servers virtual machines and containerization differ in our Guide to Virtualization vs. Containerization.

Modernizing applications today means migrating programs from legacy on-premises deployments to cloud solutions. Because containers are agile, they enhance an organizations ability to migrate applications and workflows seamlessly. Immutable across environments, containers enable organizations to use the synergy of DevOps to develop and deploy applications more quickly.

The DevOps model is a paradigm shift for software providers. By joining development and operations engineers, organizations enable a faster-paced service delivery model. Whereas before developers and operations teams split work between devices, operating systems, and process steps, containers bridge the gap. This allows an organization to build, test, and ship its services more efficiently.

The microservices architecture allows software developers to produce applications made up of several independent deployable services. Different components of the application hosted in containers are scalable and amenable to updating without disrupting other services.

The modern organization infrastructure balances on-premises appliances, private cloud operations, and (potentially) multiple public cloud platforms. As organizations adopt this diversified approach, containers prove to have several benefits:

While virtualization is hot, hybrid infrastructure is the future. We look at the state of organization infrastructures, and which workloads go where between on-prem, public cloud, and private cloud environments.

Read more about why On-Prem Infrastructure is Here to Stay

A handful of estimates show the global application container industry was worth around $1 billion in 2018. Market research projects those numbers to climb to over $4 billion by 2023 and $8 billion by 2025. Market segments for the container industry include:

Container orchestration services remain a leading revenue segment as organizations attempt to manage a fleet of new containers serving ever-evolving networks. Leading cloud service providers like AWS and Azure have quickly offered cloud-based container management services (CaaS). At the same time, virtualization specialists VMware, Red Hat, and Docker continue to impress industry leaders.

As the dominant cloud service provider, Amazon Web Services (AWS) also offers many container solutions. Features AWS offers include running Kubernetes clusters, building microservices, and migrating existing applications.

In a multi-cloud world, the Cisco Container Platform (CCP) aims to reduce the diaspora of data across environments. Ciscos solution is a turnkey with built-in monitoring and Istio for fast implementation.

Docker, Inc. employs PaaS products based on its open-source technology, Docker, for containerization. Started in 2008, Docker has been so dominant in the container space that its flagship name is almost synonymous with containers themselves.

Informed by the rise of Docker and responsible for developing Kubernetes technology, the Google Cloud Platform (GCP) offers the Google Engines for Containers, Kubernetes, and Compute for virtualization management.

Second only to AWS in cloud service market cap, Azures container technology ranges from cloud-scale job scheduling to fully managed OpenShift clusters and microservice orchestration. Solutions include Azure Kubernetes Service (AKS), Container Instances, Service Fabric, and more.

The Oracle Container Engine for Kubernetes (OKE) offers one-click cluster creation, end-to-end container lifecycle management, and easy integration with Oracles cloud infrastructure. Private Kubernetes clusters come with embedded IAM, CASB, and RBAC.

Acquired by IBM in 2019 for a whopping $34 billion, Red Hats line of open-source and enterprise software is well known, along with its relationships with top industry players. Only behind Google in contributing to Kubernetes code, Red Hats container solution is the industry-respected OpenShift.

Without VMware, its hard to imagine what commercial virtualization would look like today. For containerization, VMwares Tanzu software brings Dev and Ops teams together to secure communication between apps, automate container management, and modernize apps fast.

Considering a container service with added security? Check out this list of 2021s Top Container Security Solutions.

Containers are a proven method for employing virtualization for enterprises of all sizes. While virtual machines are still the favorite for enterprise and critical workload virtualization, containers are gaining ground.

The truth is both virtualization techniques complement each other. Virtual machines address infrastructure by enabling portability of resource-heavy applications and enhanced server utilization. Containers address application development by facilitating DevOps and microservices. Combined, organizations can optimize these innovations with a hybrid approach to virtualization.

Also read: Best Server Virtualization Software for 2021

Link:
What Is a Container? | Understanding Containerization | SW - Server Watch

Read More..

PaaS Rating: An Easier Way to Build Software Applications – Illinoisnewstoday.com

Platform as a Service (PaaS) is software that enables third-party service providers to provide platforms to their customers and develop, run, and manage software applications without having to build and maintain the underlying infrastructure themselves. It is a development enabler.

Most platforms as a service include templates or build packs. opinion How to build a particular type of application is usually centered around the popular ones. 12-element methodology.. This is why PaaS options are often labeled as opinion and are ideal for new greenfield applications.

Appearance of Cloud computing Companies such as Amazon Web Services, Microsoft, and Google put together the key components needed to launch an application on their own platform, with a single command or mouse click on the code.

This simplification makes software development faster and easier, and hides the underlying compute, storage, database, operating system, and network resources needed to run applications, thus increasing the scope of the developers work. It will be reduced. PaaS providers charge for the use of these resources, and in some cases for the use of the platform itself, by the number of applications per user (or seat) or hosted.

Like other cloud services such as Infrastructure as a Service (IaaS) And Software as a Service (SaaS), PaaS is typically accessed over the Internet, but can also be deployed in on-premises or hybrid mode. In any case, the underlying infrastructure on which the application runs is managed by the service provider. In many cases, customers can decide where to physically host their applications and choose the performance or safety of their environment. Often there are additional costs.

The components of a typical PaaS are:

For many, the PaaS and IaaS debate is settled by the market, but the decision to use the underlying building block itself (IaaS) or the opinionable PaaS is to pursue speed. It is a decision that many people make today. Application to the market.

As with any other case of software development, this decision comes with trade-offs and depends on what your organization is trying to achieve.

One of the biggest benefits of using PaaS is the ability to quickly create and deploy applications. You dont have to take the hassle to set up and maintain the environment in which your application runs. This, in theory, allows developers to deploy faster and more regularly, allowing them to focus on differentiators rather than solving problems such as infrastructure provisioning.

PaaS is maintained by the service provider and comes with service level agreements and other guarantees, so developers dont have to worry about cumbersome and repetitive tasks such as patching and upgrading, ensuring the availability and stability of their environment. I can be sure it is expensive. , Although the outage still occurs.

PaaS can also be a convenient gateway to new things Cloud-native development method Program a language without up-front investment to build a new environment

Most of the risks associated with using PaaS result in a loss of control that professional developers must tolerate by handing over their applications to third-party providers. These risks include information security and data resident concerns, fear of vendor lock-in, and unplanned outages.

With PaaS, some team members may find it confusing because developers have a limited range of changes to their development environment. Failure to change the environment or deploy feature requirements by service providers can lead to enterprises. Build your own internal developer platform beyond PaaS..

So Benkepes wrote for Computerworld in 2017, PaaS is widely embedded in container management and automation ideas, and major providers such as Red Hat, VMware, and Big Three cloud providers are properly pivoting towards facilitating container adoption. Kubernetes in recent years.

That doesnt mean PaaS is deadInevitably, that PaaS has evolved as the industry has made widespread migration to containerized applications coordinated by Kubernetes. There is always a market that simplifies software development, but the underlying platforms for doing so are changing over time.

PaaS example

Some of the major PaaS providers include: Amazon web services (AWS), Google Cloud, Microsoft Azure, Red Hat, and Salesforce Heroku..

Big three cloud providers on AWS, Microsoft Azure, and Google Cloud have all made significant investments over the last decade to facilitate adoption of their services, integrating their own cloud components to facilitate adoption.

The major PaaS options still on the market include:

One of the first PaaS options, AWS Elastic Beanstalk, enables rapid deployment and management of cloud applications without having to learn about the underlying infrastructure. Elastic Beanstalk handles capacity provisioning, load balancing, scaling, and application health monitoring details automatically.

Cloud Foundry is an open source PaaS managed by the Cloud Foundry Foundation (CFF). Originally developed by VMware, it was transferred to Pivotal Software, a joint venture between EMC, VMware and General Electric, and then to CFF in 2015. Like OpenShift, Cloud Foundry is designed to build and run container-based applications. Kubernetes For orchestration.

Google App Engine is a PaaS offering for developing and hosting web applications in Google-managed data centers. Applications are sandboxed, run, and automatically scaled across multiple servers.

Microsoft Azure App Service is a fully managed PaaS that combines various Azure services on a single platform.

Red Hat OpenShift is a family of PaaS offerings that you can host or deploy on-premises in the cloud to build and deploy containerized applications. The flagship product is the OpenShift Container Platform. It is an on-premises PaaS built on Red Hat Enterprise Linux and built around a Docker container orchestrated and managed by Kubernetes.

Early very beloved PaaS, Heroku may have gone astray Since being acquired by SaaS giant Salesforce in 2010, Heroku has been part of a wide range of Salesforce platforms for developer tools, supporting a wide range of languages and thousands of developers running applications on them. I will. In fact, to use Heroku, you need to build a common runtime deployed in a virtualized Linux container. Dynos, As Heroku calls them, its spread across the dyno grid on AWS servers.

Platform as a Service has matured into its own important cloud service category, but containers (and Managed Container-as-a-Service (CaaS) option Developed by major vendors), Serverless computing,and Function as a service (FaaS) optionOffers many of the same benefits as PaaS, but for portability, flexibility, and serverless computing, it promises an environment where you pay only for what you use.

Error: Please check your email address.

tag paas

See the original post here:
PaaS Rating: An Easier Way to Build Software Applications - Illinoisnewstoday.com

Read More..

Center For Internet Security Updates CIS Controls With Focus On Cloud, Mobile, And Remote Work – Technology – United States – Mondaq News Alerts

Now is a great time to review your security posture, as you havea new tool to help you. On May 18, 2021, the Center for InternetSecurity (CIS) released Version 8 of its CIS Controls, formerly knownas the CIS Critical Security Controls (and often called the"CIS Top 20").

CIS intends the new version to better address some of the majordevelopments in IT and cybersecurity over the past several years,including the movement to cloud solutions, increased mobility, andnormalization of remote work. CIS is also updating the ecosystem oftools that support the Controls, including self-assessment toolsand a method for risk assessments that helps to justify securityinvestments.

The Version 8 update is likely to garner a lot of attention fromcompanies looking to address the "reasonable security"requirements referenced in California law (see Cal. Civ. Code1798.81.5(b), 1798.150(a)(1)), including in the forthcomingCalifornia Privacy Rights Act (CPRA), as well as numerous otherstate laws.

Then-California Attorney General (now Vice President) KamalaHarris concluded in her 2016 data breach report that anorganization's failure to implement all applicable CIS Controls"constitutes a lack of reasonable security." Since thatreport, many companies have used the CIS Controls as a primary wayfor evaluating their compliance with reasonable securityprovisions.

At their core, the CIS Controls are a list of security bestpractices similar to security frameworks such as NIST 800-53 andthe ISO 27000-series. Prior to Version 8, the CIS Controls wereorganized into 20 top-level controls that addressed, for example,access control, vulnerability assessment, audit log maintenance,and other foundational controls that mitigate security risk. Eachtop-level control includes specific "safeguards"(previously called "sub-controls"), which are actions,tools, or other resources that support the top-level control.

The key difference between the CIS Controls and other frameworksis their organization of the controls into "ImplementationGroups" (IGs), which define a set of recommended securitycontrols based on risk. Organizations may choose the IG appropriateto their risk and budget, then implement the controls listed forthat IG.

This grouping makes the CIS Controls an attractive option forbusinesses of varying sizes and risk profiles, including small- andmedium-sized businesses focused on basic cyber hygiene anddefense.

In addition to creating IGs, Version 8 consolidates severaltop-level controls, thereby reducing the total number from 20 to18, renames many of the controls, and reorganizes the relationshipbetween the controls and many of their underlying safeguards. TheVersion 8 safeguards place much more emphasis on mobile and cloudsecurity than prior versions' sub-controls.

In large part, these changes reflect CIS's goal of focusingmore holistically on system and asset security-regardless of wherethose systems or assets reside (within the corporate network, inthe cloud, at an employee's home, etc.) and which IT teamsmight be responsible for them. For example, Version 7.1 has acontrol specifically for "Wireless Access Control," whichincludes a sub-control to "Leverage the Advanced EncryptionStandard (AES) to Encrypt Wireless Data" (among others).

In Version 8, there is no control singularly focused on wirelesssecurity. Instead, wireless safeguards are dispersed throughout,and encryption of wireless traffic is rolled into a more generalsafeguard to "Encrypt Sensitive Data in Transit" underthe "Data Protocol" control. Version 8 notes that"[p]hysical devices, fixed boundaries, and discrete islands ofsecurity implementation are less important" in computing nowthan they were when prior versions were adopted.

New data privacy and security laws are increasing pressure onorganizations to adopt "reasonable" security controls forpersonal data. For instance, the New York Stop Hacks and Improve Electronic DataSecurity (SHIELD) Act, which went into effect in March 2020,requires businesses to "implement and maintain reasonablesafeguards to protect the security, confidentiality and integrityof the private information."

On the other side of the country, the CPRA will updateCalifornia law as of January 1, 2023, to require "[a] businessthat collects a consumer's personal information [to] implementreasonable security procedures and practices appropriate to thenature of the personal information to protect the personalinformation from unauthorized or illegal access, destruction, use,modification, or disclosure in accordance with Section1798.81.5."

Likewise, the Virginia Consumer Data Protection Act, which alsobecomes operative on January 1, 2023, requires businesses to"[e]stablish, implement, and maintain reasonableadministrative, technical, and physical data security practices toprotect the confidentiality, integrity, and accessibility ofpersonal data."

The White House, too, has joined the fray with its recent Executive Order on Improving the Nation'sCybersecurity (which we previously covered here). Intentionally or not, Version 8'smore holistic approach to security and increased emphasis on cloudand mobile technologies echoes many provisions of the ExecutiveOrder.

Among other things, the Executive Order directs the governmentto accelerate its movement to cloud systems and to adopt"zero-trust architecture" (ZTA), a security model thatchallenges the traditional notion of a security"perimeter" and focuses on the defense of computingassets wherever they reside.1Government contractors and suppliers who may need to shift towardscloud-based systems and ZTA-based security might consult the newCIS Controls to evaluate and develop their security programs.

Organizations of all sizes face some degree of informationsecurity risk to confidential or personal data. CIS ControlsVersion 8 makes mitigating those risks even more accessible andprovides a great excuse to take account of your securityposture.

Footnote

The National Institute of Standards and Technology (NIST) statesthat ZTA's "focus on protecting resources rather thannetwork segments is a response to enterprise trends that includeremote users and cloud-based assets that are not located within anenterprise-owned network boundary."

Originally published 05.24.21

The content of this article is intended to provide a generalguide to the subject matter. Specialist advice should be soughtabout your specific circumstances.

Read the rest here:
Center For Internet Security Updates CIS Controls With Focus On Cloud, Mobile, And Remote Work - Technology - United States - Mondaq News Alerts

Read More..

Cloudflare Solves the Internet’s Need for Speed and Security – InvestorPlace

Cloudflare(NYSE:NET) investors had to ride a roller coaster for the first five months of 2021. However, since mid-May, NET stock has been in growth mode, posting gains of over 50% from its low point. On July 9, it closed at $108.97, a new all-time high, though it has since eased back. Still within spitting distance of that record close, will NET stock run out of momentum, or does it still have room for growth?

I would argue that Cloudflare is a company with the right product mix at the right time to continue fueling long-term growth. Online shopping is only continuing to grow in popularity. Other services are moving online, including the transition from cable TV to streaming video services.

Cloudflare provides the critical services that keep online services fast, and keep them safe. Its even a big part of exploding IoT (Internet of Things) growth. This Portfolio Grader B rated stock is up nearly 500% from its September 2019 public debut. Given the business Cloudflare is in, the stock growth may just be getting started.

One of CloudFlares primary lines of business is being a CDN, or content delivery network. That may not sound exciting, but it is an increasingly important service and one that was in the spotlight during the pandemic.

Cloudflare uses local servers to host critical website services so that users enjoy the speed they expect. Even if a user is logging in on a PC across the country from a companys main data center, they hit a Cloudflare regional server first so there is no lag and no overload. That ensures online shopping, video conferencing, and other web-based activities offer a positive experience for all users, regardless of their location.

Now, more than ever, slow-loading websites are simply not acceptable. As Forbes Jason Hall wrote in 2019:

If a page loads slowly, many people will give up and go somewhere else. That can mean a loss of traffic to your site and a loss of dollars in your pocket. Your conversion rates may suffer, and your bounce rates the number of people who leave your site after only visiting one page may increase.

In addition, loading speed is also a factor in used search engine page rankings. Slow-loading websites show up lower in search results.

What holds true for websites also holds true for internet-based services. Streaming video, social media and mobile apps often rely on CDNs to keep their services fast and responsive no matter where customers are located.

Being a leading CDN is a big part of the NET stock story. Its going to continue to be a big part of the long-term growth story for Cloudflare stock as well.

Cybercrime is on the rise. Ransomware is a big problem, as seen from attacks like the Colonial Pipeline shutdown. Weve also seen an escalation in DDoS (distributed denial of service) attacks, with the volume of attack attempts up 31% in the first quarter. According to stats published by Cybercrime Magazine, damage from these attacks (including destroyed data, theft of money, and disruption to business) cost $3 trillion in 2015. By the time the damages are tallied for 2021, that number is expected to hit $6 trillion.

Boston Universitys Sharon Goldberg explains that taking security measures is a huge step in protection against ransomware attacks:

Attackers are not going to go after the organizations that are hard to breachtheyre going to go after the ones that are weaker.

Cloudflare security solutions protect companies against cyber attacks. This includes DDoS attacks that slow a website or service, even taking it offline. And we know how people react to slow websites. Cloudflare also protects against ransomware attacks. Security is a big market for the company, and its only going to continue to grow.

Is now the time to make a move on NET stock? The company is due to report second quarter earnings in three weeks, so you might want to take that into account. The current rally began shortly after Cloudflare delivered solid Q1 earnings that included 51% year-over-year revenue growth, a 70% increase in large customers, and boosted full-year 2021 guidance. If the market reacts in a similar fashion to Q2 earnings, todays price might seen like a bargain by then.

On the date of publication, Louis Navellier had a long position in NET. Louis Navellier did not have (either directly or indirectly) any other positions in the securities mentioned in this article. InvestorPlace Research Staff member primarily responsible for this article did not hold (either directly or indirectly) any positions in the securities mentioned in this article.

Louis Navellier, who has been called one of the most important money managers of our time, has broken the silence inthis shocking tell all video exposing one of the most shocking events in our countrys history andthe onemoveevery American needs to make today.

Go here to read the rest:
Cloudflare Solves the Internet's Need for Speed and Security - InvestorPlace

Read More..

If your company is held hostage, should you pay the ransom? Or should you be forced to tell the authorities? – ABC News

If someone broke into your home, and held all of your possessions to ransom, you would call the police.Right?

Or would you quietly pay whatever sum the thieves were demanding, and get your life back as quickly and easily as possible?

It might be a simple enough decision in a real-world scenario, but when it comes to cyber crime and ransomware, it seems to be much more complex.

Big companies can make good targets for cyber criminals who, in some cases, can extort millions of dollars with a pretty simple operation.

Ransomware attacks often see cyber criminals steal and encrypt data, or damage internal networks, and demand money to undo it.

More Australians are alert to the threat of cyber attacks but are we doing enough to prepare against the threat?

They might even threaten to publish sensitivestolen information, or offer it to competitors.

Sometimes paying the ransom can be easier than asking for help and fighting back.

Policy experts from the Cyber Security Cooperative Research Centre want to make it mandatory for Australian companies to tell authorities when they are being targeted.

And they want more clarity on whether paying ransoms is legal at all.

They warn a "tsunami of cyber crime" has cost the global economy about $1 trillion, and say Australia is a soft target.

In late March staff at Nine arrived at work on a Sunday morning, ready to put the Today show to air only to find they had been the victim of a near-crippling cyber attack.

It rocked the company's operations, with many Sydney-based staff forced to work from home or temporarily move to Melbourne, and it took weeks for workflows to be back to normal.

Nine was very upfront about the attack, and sought the help of authorities like the Australian Signals Directorate in managing it.

Knocking out the news is one thing, but only a few months ago a huge slice of the US was left scrambling for petrol after a ransomware attack knocked out Colonial Pipeline's networks.

Leanne Sherriff

The company was forced to completely shut down its pipelines, responsible for about half of the US East Coast's fuel supplies, for days.

Colonial later confirmed it paid a $US4.4m ($5.6m) ransom.

Australian logistics giant Toll Holdings was hit in two separate attacks last year.

It too worked with experts from the Australian Signals Directorate, and said at the time it had "no intention of engaging with any ransom demands."

And steaks were on the line when global meat processing company JBS Foods paid a $US11 million ($14.2 million) ransom in bitcoin about a month ago.

Its global operations, including in Australia, were all but brought to a standstill by the attack, and the company said it paid the money to avoid data being stolen.

Some experts warn many Australian companies do not fully appreciate the scale of the threats their companies face.

They compare the amount of money paid for security guards, alarms and sensors to protect a company's physical assets, compared to the relatively little money paid for cyber security.

ABC News

Rachael Falk from the Cyber Security Cooperative Research Centre said it is more common, and more serious, than many businesses appreciate.

"I think businesses are still woefully under prepared," she said.

"There are examples happening all around the world, and in Australia, almost on a weekly basis."

There are two things Ms Falk is suggesting the federal government could do to help companies better defend themselves.

The first is to use tax incentives to encourage businesses to invest in their cyber security.

The second is force them to speak up when they suffer an attack, and let authorities and security agencies know,to help protect others in future.

"We're saying be more transparent, because once it's out in the open, it helps everyone," she said.

"I can understand the need to want to protect the company, protect customers, and also the deep need to want to just get on with remediating what's going on, and not have to shout from the rooftops.

"I entirely understand that, but I think being transparent about it is helpful."

Those ideas are being pitched separately to legislation the government is already considering, imposing greater cyber security obligations on operators ofcritical assets like water, health energy and transport.

In a new policy paper, Ms Falk also argues the federal government has to clarify the legalities of paying ransoms.

While the official advice is always against paying ransoms, and instead working with authorities to combat ransomware attacks, some companies do take up the option.

It gets complex, because it is against the law to "deal with"money that could finish up involved in crime.

It is also illegal to provide funds to terrorist organisations which is another risk, in such a circumstance.

It used to be a business needed a lock on its door and a CCTV camera to protect against criminals, now experts say they need to invest in security they cannot see.

But duress is a defence, given the companies can reasonably believe a threat will be carried out if they do not pay.

Ms Falk does not suggest explicitly criminalising the payment of ransoms, arguing doing so would only further add to the burden of ransomware victims.

But she said those facing that difficult prospect should know legally where they stand.

"It will provide the victims with at least some certainty," she said.

"If we pay this, because we have to, we at least won't be facing some sort of action down the track from the Commonwealth that accuses our board of paying a ransom when we shouldn't have."

But she said better defences, and preventing an attack in the first place, were much simpler solutions.

"Ransomware is entirely foreseeable, and every business is at risk," she said.

"It's not just big organisations and household names, it's small companies.

"If they run a computer connected to the internet, they're at risk."

Continued here:
If your company is held hostage, should you pay the ransom? Or should you be forced to tell the authorities? - ABC News

Read More..

Ericsson to partner with Verizon in $8.3 billion deal to expand 5G coverage – The Dallas Morning News

Ericsson, a Swedish telecom company with its North American headquarters in Plano, will partner with Verizon to expand its U.S. 5G network in a $8.3 billion deal announced Friday.

Under the five-year agreement, Verizon will utilize Ericssons different technology solutions to expand its ultra-wideband 5G coverage. This includes the Massive MIMO, Ericsson Spectrum Sharing and the Ericsson Cloud Radio Access Network.

The deal is the single largest in Ericssons history, which stretches back to 1876.

This is a significant strategic partnership for both companies, and what were most excited about is bringing the benefits of 5G to U.S. consumers, enterprises and the public sector, said Niklas Heuveldop, president and head of Ericsson North America.

Ericsson and Verizon have a long track record of partnering together. In 2020, Verizon became the first communications service provider to receive a commercial 5G base station from the Ericsson smart factory in Lewisville.

Verizon wants to rapidly expand its 5G network as it competes with AT&T and T-Mobile to grant its customers reliable 5G access. The company pledged over $45.5 billion in a C-band auction that closed in February to secure more mid-band spectrum coverage.

5G is really going to change the future, said Karen Schulz, who works in global network and technology communications for Verizon. The fundamental capabilities of 5G will usher in applications and innovations that weve never seen before.

5G has the potential to enhance apps and technologies like augmented reality and the Internet of Things, Schulz said.

In Texas, Verizon users are connected to 5G over 12% of the time, while T-Mobile users are connected 40% of the time and AT&T users are connected over 26% of the time, according to the latest 5G User Experience Report by Opensignal. Nationally, Verizon users are connected to 5G over 10% of the time.

As 5G expands in Texas, businesses are most likely to initially see the largest changes in coverage because they can tap into the networks full capabilities, said Ram Dantu, director of the Center for Information and Cyber Security at the University of North Texas.

Consumers may not be able to see the immediate effects of 5G, Dantu said. Theyll see greater bandwidth, but likely this will be best for enterprise.

Even though 5G is still being rolled out, companies are looking ahead to the next generation of mobile networks. Last week, the University of Texas at Austin announced the launch of the 6G@UT research center in partnership with several industry partners, including AT&T and Samsung.

Ericsson announced its own partnership with the Massachusetts Institute of Technology to research the design of hardware that could power the 6G networks.

Read more from the original source:
Ericsson to partner with Verizon in $8.3 billion deal to expand 5G coverage - The Dallas Morning News

Read More..

Connecticut Becomes Third State to Incentivize Cybersecurity Best Practices for Businesses – PRNewswire

HARTFORD, Conn., July 12, 2021 /PRNewswire/ -- Connecticut Governor, Ned Lamont signed HB 6607, "An Act Incentivizing the Adoption of Cybersecurity Standards for Businesses" into law last week. The bill, introduced by Representative Caroline Simmons, prohibits the Superior Court from assessing punitive damages against an organization that implements reasonable cybersecurity controls, including industry recognized cybersecurity frameworks such as the National Institute of Standards and Technology Cybersecurity Framework (NIST CSF) and the Center for Internet Security (CIS) Critical Security Controls (CIS Controls).

The Connecticut bill states that in the result of a data breach of personal and restricted information, the court may not assess punitive damages if the organization created, maintained, and complied with a written cybersecurity program containing administrative, technical, and physical safeguards for protecting PII and restricted information.

"It is critically important to do a better job of protecting businesses and consumers against cyber-attacks," said Representative Simmons. "In Connecticut, we took a step to accomplish this voluntarily without regulation by incentivizing organizations to adopt cyber best practices, like the NIST framework and the CIS Critical Security Controls."

Connecticut joins Ohio and Utah in legislative efforts to adopt an incentive-based approach for businesses to implement cybersecurity best practices.

"Cybersecurity is largely unregulated today; there is no national statutory minimum standard of information security, making it difficult to improve cybersecurity on a wholesale basis," said CIS Executive Vice President & General Manager, Security Best Practices, Curtis Dukes. "Connecticut's cybersecurity bill introduces a critical interim step: incentivizing the adoption of cyber best practices like the CIS Controls, to improve cybersecurity and protect citizen data."

The CIS Controls are a set of internationally-recognized, prioritized actions that form the foundation of basic cyber hygiene and essential cyber defense. Applying the CIS Controls provides a critical, measurable security value against a wide range of potential attacks. Analysis shows that implementing the CIS Controls mitigates the majority of cyber-attacks when evaluated against attack patterns in the widely referenced ATT&CK framework published by the MITRE Corporation. Specifically, the CIS Controls mitigate:

Further, Implementation Group 1 (IG1), a subset of the Controls that is considered basic cyber hygiene, is effective in mitigating:

Under the bill, organizations have to conform with revisions and amendments to identified industry-recognized cybersecurity frameworks (like the CIS Controls), laws, and regulations within six months after the revised document is published.

The bill becomes law on October 1, 2021.

About CIS:The Center for Internet Security, Inc. (CIS) makes the connected world a safer place for people, businesses, and governments through our core competencies of collaboration and innovation. We are a community-driven nonprofit, responsible for the CIS Controls and CIS Benchmarks, globally recognized best practices for securing IT systems and data. We lead a global community of IT professionals to continuously refine these standards to proactively safeguard against emerging threats. Our CIS Hardened Images provide secure, on-demand, scalable computing environments in the cloud. CIS is home to the Multi-State Information Sharing and Analysis Center (MS-ISAC), the trusted resource for cyber threat prevention, protection, response, and recovery for U.S. State, Local, Tribal, and Territorial (SLTT) government entities, and the Elections Infrastructure Information Sharing and Analysis Center (EI-ISAC), which supports the cybersecurity needs of U.S. elections offices. To learn more, visit CISecurity.org or follow us on Twitter: @CISecurity.

Media Contact: Autum Pylant [emailprotected]518-266-3495

SOURCE Center for Internet Security

Here is the original post:
Connecticut Becomes Third State to Incentivize Cybersecurity Best Practices for Businesses - PRNewswire

Read More..

Israeli company is behind malware that affected Windows PCs: Microsoft – WION

Microsoft believes malware used to infect PCs running its Windows operating system was created by an Israeli organisation.

Microsoft is taking a new effort to reduce internet security issues.

The company has also been looking for government-backed hackers, such as the Chinese organisation Hafnium, which it believes is responsible for attacks on its Exchange Server email software.

The problem was only recently rectified by Microsoft, and it took them a long time to resolve, with several people claiming that it was ineffective for their experience.

The threat actors were revealed to be from the private sector, and the company launched an inquiry to learn more about their genuine motives.

Microsoft's investigation into their latest breach and zero-day vulnerability came from an Israeli private sector business called "Sourgum," according to the company's blog post.

Watch: India rolls out new education policy, teams up with Microsoft

The company in question is a PSOA, or private sector offensive actor, intending to sell "cyberweapons" to its clients to hack them.

Another group discovered in the investigation is known as "Candiru," and they have been related to Sourgum with regards to the recent Microsoft attack.

While the motives of Candiru are unknown, it poses a direct threat to Microsoft and would be subject to an inquiry in the hopes of apprehending the perpetrator.

(With inputs from agencies)

Continued here:
Israeli company is behind malware that affected Windows PCs: Microsoft - WION

Read More..