Page 3,795«..1020..3,7943,7953,7963,797..3,8003,810..»

Five Interesting Takeaways From RSA Conference 2020 – Forbes

L. Columbus

Bottom Line: Passwordless authentication, endpoint security, cloud-native SIEM platforms, and new API-based data security technologies were the most interesting tech developments, while keynotes focusing on election security, industrial control systems vulnerabilities and the persistent threat of state-sponsored ransomware dominated panel discussion.

This years RSA Conference was held February 24th to 28th in San Franciscos Moscone Center, attracting more than 36,000 attendees, 704 speakers, and 658 exhibitors unified by the theme of the Human Element in cybersecurity. The conferences agenda is here, with many session recordings and presentation slides available for download. Before the conference, RSA published the RSAC 2020 Trend Report (PDF, 13 pp., no opt-in). RSA received 2,400 responses to their Call for Speakers and based their report on an analysis of all submissions. The ten trends in the RSAC 2020 Trend Report are based on an analysis of all papers submitted to the conference. Its a quick read that provides a synopsis of the main themes of the excellent sessions presented at RSAC 2020.

The following are the five most interesting takeaways from the 2020 RSA Conference:

Delivering on the promise of security AI to help defenders protect todays hybrid environments https://blogs.microsoft.com/blog/2020/02/20/delivering-on-the-promise-of-security-ai-to-help-defenders-protect-todays-hybrid-environments/

https://www.nullafi.com/

Read the original post:
Five Interesting Takeaways From RSA Conference 2020 - Forbes

Read More..

Cloudera Looks Like A Hidden Gem In The World Of Data Cloudification – Forbes

Rob Bearden, Cloudera CEO

Data never dies. Its lifecycle extends from creation through a never-ending stream of business cycles.At the same time, enterprises are swimming in data that ranges broadly from customer-generated information, financial transactions, edge-generated data, and even operational IT server logs.

Understanding how to mine an organizations data for maximum impact, securely and in compliance with a vast and growing array of regulatory frameworks, is one of the most significant challenges facing nearly every CIO across every industry today.This is a challenge that is expanding, as the volume of enterprise data is estimated to be doubling every 18 to 24 months, with no sign of slowing down.

Complicating matters is the explosion of cloud-based architectures. Between edge, on-prem, public cloud, private cloud, and the rapidly expanding array of on-demand and as-a-service offerings, things can become confusing fast. It truly is a multi-cloud world in which data can live nearly anywhere. Understanding how to wrangle that data is paramount.

Its at this intersection of cloud solutions that Cloudera lives and delivers value. I believe its Cloudera Data Platform (CDP) is the hidden gem of cloudification. Clouderas fundamental goal is to help organizations get a handle on the data to allow them to manage it effectively, wherever it may reside.

I recently had the pleasure of talking with Clouderas newly minted CEO, Rob Bearden. He talked to me about the challenges facing CIOs as they navigate this world, while also attempting to break down the silos between business units that are created by segregated and unmanaged pools of data.

Focused on multi and hybrid cloud

There was a time, during the early days of cloud, where it seemed as if the public cloud was the answer to all of IT's woes. Public cloud provided a simple model delivered without the burdens of capital expenditures that often plague data center expansions. An IT administrator could push a button, and a server would suddenly appear.The pitfalls began to emerge quickly.Data ended up where it was impractical to utilize and expensive to move around. The phrase "data gravity" began to take hold in nodding acceptance of the underlying challenges of placing data where it belonged.

The real answer, as IT discovered, is not to limit yourself. Options are good. Place data and workloads where they make both the most practical and most operational sense. This has given us the hybrid multi-cloud world that we find ourselves in today.Its also given us continued challenges in understanding and managing the data that lives across the various environments.

Clouderas vision is to build a modern data architecture to help organizations derive very fast time-to-value from their data.Data management begins at the point of creation, which is why the companys solutions begin at the edge, where data is collected from multiple streams, and extend to the where it is ultimately consumed which could be the public cloud, private cloud, or in an enterprise's own on-prem data center.

Managing data from cradle-to-grave allows Clouderas platform to break down the barriers between business units that exist in every enterprise and expose an organizations data to where it makes the most sense. Data delivers value, after all, when it has real-time visibility and applicability across the enterprise.

The common wisdom is that unstructured data is the bulk of an organizations data, with unstructured data expected to comprise nearly 80% of all data within the next half-decade.Managing that data requires understanding what that data is so that it can be consistently and transparently secured and managed within a growing universe of regulatory requirements. Metadata must be normalized and cataloged, and data must be placed where it makes the most sense from both economic and operational considerations.

Delivering these capabilities is a formidable challenge, yet one that I believe Cloudera is successfully taking on. The benefits of bringing Clouderas solution into an enterprise are quickly realized, which is why it is no surprise that the company has over 400,000 servers under management, providing insight into more than five exabytes of data.

A powerful merger

Cloudera has a long history of understanding how to leverage AI and machine learning to help enterprises manage contained data.As the world evolved, and edge computing became a more significant part of the equation, it was clear to Cloudera that any enterprise data strategy must span edge to cloud. Data must be managed from its point of origination to where it comes to rest.

Hortonworks, a leader in big-data solutions, thought about data management in the same way. In January of last year, the two joined together under the Cloudera name. Clouderas traditional offerings of AI-driven data management with Hortonworks expertise in managing data from its point of inception make the combined organization a powerhouse in data management that is nearly unmatched in the industry.

The vision for the combined company, Rob told me, is to provide the tools to manage an enterprises data cloud with a platform that is natively multi-cloud and multifunction. Data is managed from creation through its entire lifecycle, all with consistent security and governance, and managed through a single pane of glass.That's no small challenge.

Rob said that all of the tactical and organizational elements of the merger are now complete. The two companies today execute as a single team, with fully integrated roadmaps.

Illustrating just how smoothly the integration was, note that in just 9 months Cloudera delivered its Cloudera Data Platform on public cloud, including Cloudera Data Warehouse and Cloudera Machine Learning services. Its available on AWS and Microsoft Azure today.

Beyond its existing solutions bringing together data management for edge and cloud, its on-going focus is centered on delivering private cloud capabilities to its CDP products. These features will be in beta soon, with a general availability happening sometime this summer.

A new CEO, focused on execution

One of my favorite parts of my job is getting to spend time with CEOs of great technology companies.It helps me understand the companys vision while also allowing me to gauge the passion behind the products.

Meeting Rob Bearden is an excellent example of this. Rob is genuinely excited about the challenges facing both Cloudera, and in how Cloudera is helping CIOs face the mounting challenges of a mountain of data.

Rob was named CEO of Cloudera about a month ago, and he told me that hes a little bit grateful that he came in after the hard work of the integration between traditional Cloudera and Hortonworks was complete. This allows him to immediately focus on execution, delivering to the promise of the vision.

Clouderas business is built on a total addressable market worth nearly $26B today, doubling to $52B within the next three years. That a huge market opportunity.

Rob believes, and made me believe, that Cloudera has the right vision and right sets of technology to ride the growth of hybrid-cloud moving forward.Without giving enterprise organizations the ability to manage its data in this complex world of mixed solutions, Digital Transformation can't happen.

Clouderas future

There is no question that managing data is one of the most challenging problems facing both enterprise IT and the business units that those IT organizations support.The rise of edge, which is only accelerating as 5G deploys and enables new capabilities, brings new challenges in providing the capabilities required for cataloging, security, compliance, and placement.

The integration of the various private and public cloud offerings, with on-prem architectures and the emergence of on-demand and as-a-service offerings, makes data placement and management seem nearly insurmountable.

Theres more than one solution on the market to help enterprises manage data. There are fewer that look across the horizon, providing a consistent experience and set of capabilities from edge to cloud. I believe the combination of Clouderas technologies and its expanded portfolio puts Cloudera on a perch where it poised to dominate the space.

I recognize this is aggressive, but I cant help but to see some of the similarities between Cloudera and Microsoft when Nadella took the helm. If you recall, when Nadella took over for Ballmer, Microsoft was very much an on-prem company. Sure, Azure existed, but it was in its infancy and on-prem was 95% of the revenue. In a very similar way, Cloudera is very successful on-prem and is moving rapidly to a hybrid and multi-cloud model. Trust is another aspect. The reasons many choose Azure and Azure Stack is that the company is very trusted. Cloudera, with its management of so much data in very regulated industries, is a very trusted company. Anyways, I wanted to share that compare.

I asked Rob why he stepped up to be CEO . He told me that its Clouderas opportunity to define how data will be managed over the next 15-20 years that excites him. I believe the company is poised to influence a generation of IT. He plainly states that the opportunity is Clouderas to lose. That's what gets him out of bed in the morning.

Note: Moor Insights & Strategy data and storage analyst Steve McDowell contributed to this article.

Disclosure: Moor Insights & Strategy, like all research and analyst firms, provides or has provided paid research, analysis, advising, or consulting to many high-tech companies in the industry, including Amazon.com, Advanced Micro Devices, Apstra,ARM Holdings, Aruba Networks, AWS, A-10 Strategies, Bitfusion,Cisco Systems, Cloudera, Dell, DellEMC, Dell Technologies, Diablo Technologies, Digital Optics, Dreamchain, Echelon, Ericsson, Foxconn, Frame, Fujitsu, Gen Z Consortium, Glue Networks, GlobalFoundries,Google,HPInc., Hewlett Packard Enterprise, HuaweiTechnologies,IBM, Intel, Interdigital, Jabil Circuit, Konica Minolta, Lattice Semiconductor, Lenovo, Linux Foundation, MACOM (Applied Micro), MapBox, Mavenir, Mesosphere,Microsoft,National Instruments, NetApp, NOKIA, Nortek,NVIDIA, ON Semiconductor, ONUG, OpenStack Foundation, Panasas, Peraso, Pixelworks, Plume Design, Portworx, Pure Storage,Qualcomm, Rackspace, Rambus, Rayvolt E-Bikes, Red Hat, Samsung Electronics, Silver Peak, SONY, Springpath, Sprint, Stratus Technologies, Symantec, Synaptics, Syniverse, TensTorrent, Tobii Technology, Twitter, Unity Technologies, Verizon Communications,Vidyo, Wave Computing, Wellsmith, Xilinx, Zebra, which may be cited in this article.

Link:
Cloudera Looks Like A Hidden Gem In The World Of Data Cloudification - Forbes

Read More..

Here’s the biggest free cloud storage right now, 200GB exclusive to TechRadar readers – TechRadar India

Cloud storage company Degoo may not be a household name, but it has managed to carve out a niche in the competitive cloud storage market, with its offerings attracting more than 15 million users over the past eight years.

The Swedish company has teamed up with TechRadar to deliver an even better package than usual - get 200GB free cloud storage for a year with no strings attached.

After 12 months, this will revert back to the regular 100GB package, which is still plenty for most.

You can also get a staggering 10TB for two years at just $99.99 (about 77 / AU$152) exclusive to TechRadar. Thats 58% off the standard price of $9.99 per month (that's around 8 / AU$15) - blowing the cloud storage competition out of the water.

Unlike some rival services, there are no file size limits and you dont need another Degoo account to receive files.

Uploaded files are encrypted in chunks (zero knowledge encryption) and spread out to data centres on four continents to eliminate the risk of account compromise.

Carl Hasselkog, CEO of Degoo, told TechRadar its infrastructure is five times more efficient than Dropbox per stored byte.

It's worth noting the free version has basic storage replication and no zero knowledge encryption, plus a 90-day account inactivity limit. It also carries adverts in the feed on Android.

Go here to see the original:
Here's the biggest free cloud storage right now, 200GB exclusive to TechRadar readers - TechRadar India

Read More..

Top 5 cloud-based storage apps that you can use – Hindustan Times

Cloud storage enables the storing of data in a remote location which can be accessed from any device. What makes cloud storage special is the security and the ability to store large amounts of data without needing to invest in any other memory devices.

Cloud storage has made sharing and collaboration between users easier and many businesses prefer using cloud storage to a local device.

Here are the top cloud-based storage apps that you can use:

Dropbox: This app is available both on Android and on iOS. Users can use it to store documents, videos and other files. The best thing about this app is that users can access it even when there is no internet connectivity.

Google Drive: Users can store up to 15GB of data in Google Drive without spending a dime. It is integrated with the companys other apps such as Docs, Sheets and Slides, which makes it easier for users to view and edit documents on the go. Apart from documents and spreadsheets, users can also store photos and videos in Google Drive.

Mega: This cloud solution can house up to 50GB of data. It comes with a drag and drop interface, which makes it easy for users to upload files, pictures and videos.

IDrive: This app is accessible through mobile, desktop, and web-based platform. It is available on both Android and iOS-based smartphones. IDrive also allows users to save a backup of their Instagram and Facebook data. It comes with 5GB of free storage. Users can use an additional 1TB of storage at a price.

Microsoft OneDrive: This one comes with Windows 10 does. It is similar to Google Drive. It has an automatic tagging feature that lets users sort photos easily. It also notifies users as soon as a document is edited or shared by others. Additionally, users can access data stored even when they are offline.

Read this article:
Top 5 cloud-based storage apps that you can use - Hindustan Times

Read More..

Virgin Media breach: unprotected database was stored in the cloud, telco confirms – NS Tech

Virgin Media revealed last night (5 March) that the misconfiguration of a marketing database had led to around 900,000 customers contact details being breached.

Now, a spokesperson for the telecoms giant has confirmed to NS Tech that, as many security pros suspected, the data had been stored in a cloud-based server.

The incident makes the firm just the latest in a long line of businesses to have leaked customers contact details after failing to properly protect a cloud database.

The data, which was left in the unprotected database for ten months, included the names, home and email addresses and phone numbers of customers and potential customers. It was accessed by an unauthorised individual at least once over that period, according to the company, which said the extent of the access was unknown.

Security experts have warned that while the data does not include financial information, if it is sold on to scammers, it could be used in phishing attacks. Coupled up with Virgins broadband outage in the week, this could be a particularly good target for malicious actors to prey on, said Jake Moore, a security specialist at ESET.

A number of similar breaches have involved misconfigured Amazon Web Services S3 buckets in recent months and the company has said that, if it could, it would go back in time and redesign its security setup. Virgin refused to disclose the name of its cloud provider, citing security concerns.

Marco Essomba, founder of iCyber-Security, said he suspected the misconfiguration was related to inadequate access control or authentication permission. Its amazing how many of these flaws you can find if you dig on the internet using automated tools, he told NS Tech. This owes to the perception that cloud infrastructures are secure by default, which is simply not true. Access control for cloud storage systems are often left on default settings and completely forgotten once deployed in production.

Virgin Media said it had informed the Information Commissioners Office. Ryan Dunleavy, head of media disputes at the law firm Stewarts, said fines can be eye-wateringly high under the GDPR, even for an incident which doesnt involve passwords or financial details of consumers.

He added: Virgin could be facing a fine of multiples of millions of pounds. This is an opportunity for the ICO to put down another benchmark in terms of the value of fine for a breach of this nature in the UK.

Virgin Medias chief executive, Lutz Schler, said: We immediately solved the issue by shutting down access to this database, which contained some contact details of approximately 900,000 people, including fixed line customers representing approximately 15% of that customer base. Protecting our customers data is a top priority and we sincerely apologise.

More here:
Virgin Media breach: unprotected database was stored in the cloud, telco confirms - NS Tech

Read More..

The ideal cloud security solution – Education Technology

While colleges and universities seem to be embracing cloud solutions especially when it comes to reducing data storage costs schools seem more reluctant. By 2019, over two thirds of universities had moved to cloud-based email systems, with 50% also adopting cloud collaboration systems. But what makes for the ideal cloud security solution in education, and why is it so important?

If theres one major difference between the education sector and its counterparts, its the particular need for a good deal. The ideal cloud security solution would inevitably be one of great value. Veniamin Simonov, director of product management at data protection at site recovery software company NAKIVO, says, Education providers tend to have a limited IT budget, yet they have vast amounts of data to protect and its a challenge to find and implement a suitable solution. Universities and schools are cost sensitive and they are looking for products that can help them back up their data without breaking the bank. Nevertheless, he points out that many providers have specific academic pricing to ease the accounts of their education customers. Whats more, cloud-based systems are often cheaper than on-site systems overall.

Jose Kingsley agrees that budget is a factor. He is head of the charity LGfLs SuperCloud. The charity invests in services which support the acceleration of cloud technology and provide the necessary resilience and high bandwidth schools need to embrace it. This ultimately saves them money by moving services into a secure, shared location. But Kingsley sees that a lack of working knowledge about current IT practices may also be to blame for a certain reticence: Educators are forever on a quest to find smarter ways to tackle their workload, meet the demands of curriculum objectives and find the right work-life balance. On top of all this, they are presented with the phrase cloud technology and asked its purpose, along with how sustainable it is to integrate into their daily practice. For many teachers, there is an immediate reaction of fear, along with the question Do we have the budget for that?

While small budgets are one issue, size can also be a challenge when it comes to the staff and student body. Mick Bradley is vice president at Arcserve, a company that provides data protection, replication and recovery solutions. He says, Education providers frequently have a large number of access points, with tens of thousands of different students and teachers accessing applications and systems from various geographical locations, with many institutions still holding a great deal of legacy software and hardware. This puts them at increased risk of ransomware attacks, as there are a higher number of points where criminals can potentially infiltrate the system. Its hard to ensure that an entire user base of that scale can stay clear of phishing emails and to entirely avoid the threat of human error that can open the door to ransomware.

Universities, schools and colleges therefore need watertight ransomware protection to ensure there is no risk to critical data. Thats where the cloud comes in. Bradley says, Multi-cloud options and hybrid cloud options are extremely beneficial here, as these types of infrastructure provide adequate protection even if any one of your physical sites is compromised, as there is an offsite backup stored safely in the cloud. Using some on-premise storage ensures that your data is also protected in case your public cloud providers data centre experiences an outage as a result of a natural disaster or an unforeseen event.

Richard Harley, CEO of ScholarPack, a cloud-based management information system designed specifically for schools, agrees: Cloud-based systems are more secure as access can only be granted over an encrypted browser connection. Its your cloud suppliers job to keep data safe and secure. We heard of a school who lost all of their MIS data when their server room was flooded and backups failed. With a cloud-based MIS, recovering from a natural disaster would be as simple as logging in from another device.

Whats more, updates and fixes are constantly being rolled out across cloud systems, eliminating the need to be manually applied to each organisation, and the systems themselves are always up to date. Harley comments that with cloud, Integrations with other software are also easier to set up and dont require any further software installed on the server. Being cloud-based means you dont have to pay for costly repairs, maintenance and upgrades to the server or physical hardware. The economies of scale that come with cloud hosting mean up-front costs are usually smaller too because theres no installation required.

For universities in particular, the ability to manage large volumes of data securely starts with having a stable network connection to support its safe transfer. This is a very real concern for researchers, although they may not necessarily be the ones with the buying power. By way of example, a team at the University of Bristol is working on a new class of synthetic vaccinations for highly contagious diseases. To do this, they need to produce sophisticated 3D images of the target particles, only possible through fast, high-volume cloud computing. Dr. Matt Williams, research software engineer at the University of Bristol, explained to the technology charity Jisc that, You need lots and lots of images because each image is quite fuzzy and noisy but by using very advanced reconstruction software packages to align, classify and then reconstruct, we were able to get a full 3D model of the particle at a far higher resolution than was ever available previously. They use cluster in the cloud technology to recreate the images. As Williams explains, It allows anyone with access to cloud resources to create a very familiar software environment but fully based in the cloud, making the best use of cloud facilities and cloud technologies. If we hadnt had access to the high-speed Janet Network, I think the real constraint it would put on us is that we would have to use smaller amounts of data in our analysis, which would have resulted in a lower resolution. We wouldnt be able to do our jobs.

So, for education providers looking for the optimum security solution, are there any tips on how to get it right? Bradley says that education providers must be realistic about the staff time needed to run security systems: Education providers IT teams are often less well-staffed and under-resourced in comparison to larger corporate organisations, without the benefit of having specialist staff handling roles in cybersecurity or storage. Due to limited resources, providers will be seeking all-in-one solutions which provide cloud security. Meanwhile, Kingsley recommends planning. He says, From experience, starting with a clear end point allows schools to carefully plan those small, tangible steps on their journey to successfully utilise cloud technology and make teaching and learning more simple, effective and impactful. For successful cloud adoption, there must be a clear transformational plan in place where all stakeholders are invited to be part of the process. He also says that whole organisation buy-in is needed for a new cloud system to work: Only when there is engagement on all levels can the ambition to aim high and drive adoption forward be achieved.

You might also like: The rise of personalised learning

Originally posted here:
The ideal cloud security solution - Education Technology

Read More..

6 Cybersecurity Trends Worth Looking at in 2020: Blockchain Is on the List – The Daily Hodl

HodlX Guest PostSubmit Your Post

If 2019 has taught us anything about cybersecurity, it is that cyber-attacks are the reality of our times, hardware is still vulnerable and high-profile data leaks are becoming frighteningly more common.

The cybersecurity market is booming as recent data from MarketsandMarkets reveals that investments in cybersecurity can reach $250 billion by 2023 with spending already rising higher in 2019 than in any other industry sector.

The forces driving growth are increasingly strict measures and requirements on data protection imposed by the European Union and the growing threat of cyberterrorism. Cybercrime is forecasted to inflict damages of up to $6 trillion yearly by 2021, bellowing demand for security solutions both on the individual and corporate levels.

Growing threats mean growing demand

2019 has seen a number of IPOs in the cybersecurity industry as CrowdStrike, a California-based cybersecurity company, announced that was going public with an IPO, raised $700 million, and is valued at $6.8 billion.

The American Cloudflare web-infrastructure and website-security company, providing content-delivery-network services, also went through an IPO and added a whopping 20% to its market price on the first day. And KnowBe4 announced that it received a staggering $300 million investment from private equity firm KKR. A number of other cybersecurity companies like Palo Alto Networks, Proofpoint, and Zscaler also enjoyed bullish rounds in stocks making the cybersecurity market attractive for investors.

Its evident that the B2B security industry is experiencing a renaissance. While the market is stronger than ever, there is a massive market cap shift from legacy security vendors like Splunk, McAfee, Symantec, and Check Pointto the new breed of leaders, as stated by Jeb Miller, general partner at Icon Ventures.

Given that 90% of all data available online was generated over the last few years and the fact that cloud, mobile, API and other services are being increasingly integrated into the frameworks of corporations, the enticement of cybercriminals to tap into the wealth of information is simply irresistible. According to Juniper Research, overcall cybercrime costs have reached $2 trillion at the end of 2019 making companies increase their spendings on cybersecurity.

The growing demand for confidentiality caused by data leaks, as well as the needs of companies and organizations to comply with the new European General Data Protection Rules (GDPR), are attracting entrepreneurs and investors to next-generation solutions, including blockchain, artificial intelligence-based data management solutions, and advanced cryptography.

Cybersecurity as a Service

Cybersecurity as a service is part of the global trend towards the transition to the sharing economy model. In 2020, companies are not willing to overpay for tools, so they will be switching to using the required services for the period of time needed. The IT startups that started offering the given model have already become unicorns. Among such firms are McAfee Inc. and NortonLifeLock. Other alternative endpoint security providers include Carbon Black, Cylance, Palo Alto Networks, FireEye, and others.

New and promising providers are also emerging with viable solutions, such as Cloudstrike with its Falcon the first Software-as-a-Service multi-tenant, cloud-native, intelligent security platform. A competitor Infoblox is offering security coupled with simplicity and automation via SD-WAN, hybrid cloud and IoT, reducing manual tasks by 70% and increasing productivity by 300%. Their BloxOne Threat Defense allows for traffic monitoring, proactive threat identification, network breach protection and automation. With 52% of the DDI market in their grasp, InfoBlox is the industry leader gripping 59% of Fortune 1000 companies and 58% of the Forbes 2000.

Blockchain

Routing all business and personal data through a centralized server with one main point of contact poses an overwhelming number of threats for information security. In 2019, $2 trillion was the cost of cyber-crime for businesses.

A new promising category to solve this problem is blockchain technology that makes data near impossible to change, with decentralized end-to-end encryption data services replacing traditional encryption tools. In 2020, we can see the projects that managed to offer decentralized data storage.

A new way to store data privately in a decentralized way was found by Jeff Pulver, the US VoIP entrepreneur behind $3 billion Vonage, an early Twitter investor. In 2018, he co-founded a new company to develop a blockchain-enabled communication network offering clients new authentication layers and decentralized solutions.

The solution, called Debrief, is said to be the most secure end-to-end business communication network that no longer exposes user confidential information unlike existing services like Facebook, Skype, and Zoom. As claimed by Pulver, with data encryption used in the network, information cannot be edited or tampered with in any type of way once it is placed onto the network. Each recipient on that network receives the same piece of information as it is inputted in real-time. In order for a hacker to tamper or edit the information on one recipients computer, the other computers on the network would have to accept this as edited information, which they would immediately reject.

The data leaks that we witnessed in 2018-2019 had their causes and we believe that the best way of making high-security communications services universally available is through the use of blockchain technologies. By refraining from centralized control, we will be removing the weak link from the equation the third parties, Pulver explained.

Debrief consists of a decentralized storage system and secure blockchain authentication, making it impenetrable for hackers. The Debrief DApp, operating on the network to showcase its extensive functional capabilities, provides clients HD Video Conferencing, P2P audio and video calling, messaging, decentralized file storage, ensuring the confidentiality of all data. Its also a middleware for other mainstream blockchains and traditional communication applications to utilize and enable blockchain communication features.

Demand for blockchain solutions capable of tracking vulnerabilities and suspicious transactions will continue to grow. Solutions like CipherTrace and Chainalysis, which managed to enter the market first, are now being used not only by large organizations, but also by government organizations, even the Interpol.

Employee training

The need for proper staff training will rise as cybercriminals become more devious. The new breed of employees will need to understand social engineering, phishing schemes, malware, ransomware and much else. Proper investments in people-oriented security systems will reduce losses.

AI and ML

Artificial Intelligence (AI) and Machine Learning (ML) are set to take the lead in security in 2020 as Richard Cassidy, senior director security strategy at Exabeam predicts,

2020 should herald a truly golden age of deep learning, which will see a resurgence of artificial intelligence embedded into the fabric of our security frameworks. Expect to see some exciting machine learning developments in the seemingly ad infinitum war on cyberthreats and bad actor group attack circuits.

Cassidys words are backed by numbers. A Capgemini study shows that 69% of senior executives believe that AI and ML are inseparable from cybersecurity. An example is Kounts Omniscore, which employs AI and ML to provide fraud analysts with necessary data for improving customer experiences and reducing fraud.

In 2020, the amount of ransomware attacks will increase, as it is easier for the attackers to find a security breach using new AI and machine learning technologies, since temporary data blocking is a quick way to make a buck. By 2022 , 50% of servers will encrypt all data, over 50% of security alerts will be handled by automatic AI-based mechanisms, and 150 million people will receive blockchain-based digital identifiers. New technologies, such as encryption, blockchain, machine learning and analytics will be used to improve security measures, as state-sponsored hackers and cybersecurity firms are both using artificial intelligence to get an edge.

SECURITI.ai is one company to watch out for as it enables enterprises to issue data rights and complies with global privacy regulations to improve the brands image. Another company is Tel Aviv-based Deep Instinct, which uses AI and deep learning to safeguard enterprise endpoints, both mobile and stationary. Deep Instinct is revolutionary in that it offers real-time cyberthreat identification and blocking.

Cloud

Cloud storage is on the rise as businesses shift their operations to cloud computing provided by the likes of Amazon Web Services. The company will be competing with mainstays like Fortinet, Palo Alto Networks and others as software-defined wide area networks (SD-WAN) technologies start taking over the cloud storage security frontier. But the giants have more competition coming up, as Netskope and Menlo Security are among the cloud security startups going public in 2020 that investors will be looking out for.

ID management

Identity management is another key area in the cybersecurity domain. Email and data-loss protection are being offered by a number of companies like Proofpoint, Okta, Qualys, Mimecast, Rapid7. Hackers know that targeting key employee or management emails is the easiest way of gaining access to corporate data management and storage systems.

Cyberark offers privileged accounts, Okta provides advanced identity management, while other companies are focusing on Zero Trust approaches. Cisco Systems, which recently acquired Duo Security for $2.35 billion, is fully vesting in the Zero Trust sector as it conducts full identity checks of all users and device health analysis before granting device access.

Gartner Research states that approximately 75% of all large companies will be employing selective access management systems by 2021, which is a 25% increase from their previous 2018 report. Forrester Research indicates that 80% of all security breaches are caused by compromised credentials. Among the most prominent victims of such attacks were Quest Diagnostics, Marriott International, Equifax, Yahoo Anthem, Target and others.

Tightening the rivets

Unlike generalized world-scale problems, digital threats pose a greater risk to the cornerstone of the global economy data. As criminals are becoming ever more devious and sophisticated in their approaches to milking money from individuals and enterprises, the challenge is up to cybersecurity firms to step up and take on the mantle of viable solution providers.

2020 is set to become a make-or-break year in the cybersecurity industry as new approaches to handling threats are coming to the forefront. Whether it be AI, ML, blockchain, Zero Trust or any other technology, the aim is the same safeguarding data and reducing economic damages that are so far showing signs of abating.

See the original post here:
6 Cybersecurity Trends Worth Looking at in 2020: Blockchain Is on the List - The Daily Hodl

Read More..

What are the main components of a Computer system? – TWCN Tech News

A computer is nothing without the components or parts inside of it. Many users are taking advantage of what these powerful machines have to offer, yet have no idea what components make them tick. Bear in mind that a computer contains several mechanical, electric, and electronic components are known as hardware.

Do you know what these hardware components are? If not, then continue reading and well explain everything you need to know. But first, let us explain what a computer is before moving forward to the good stuff. Now, bear in mind this wont be a long article since the information here is pretty simple, but believe us, a lot of computer users have no idea.

A computer is merely an electronic device that operates under the control of commands stored in its own memory. The instructions here can accept data, and then process that data according to specific rules. Additionally, it can produce results and store these same results for future reference.

Bear in mind that a computer is not only a machine that is powered by Windows 10, but also Linux, macOS, Android, and other operating systems designed only for industrial use. Even modern cars rely heavily on computers to perform.

The 5 the main components of a Computer system are:

Let us take a look at them.

The input allows the user to enter information and commands into a computer. A scanner, keyboard, touchscreen, and mouse are the perfect examples of an input device. Interestingly enough, mics have become quite important for inputting data.

Today, its possible to add texts in Microsoft Word without ever using a keyboard. Just activate Office Dictation, then speak into your mic to input the data. We can say for certain that it works quite well if words are pronounced correctly. It wont replace the keyboard completely, but its a good alternative when your fingers become too sore to type.

When you look at what an Input component is, it should then be very easy to determine what is an Output component. If you have yet to figure it out, well, its a hardware component that transports information to one or more people. A computer monitor, printer, projector, and speakers are examples of Output hardware.

As you might have already known, the projector is very similar to a monitor. The main difference is that it projects data onto a hard surface, while a monitor shows the information on a screen.

Additionally, television can also be used as a monitor if it has the right connection. Today, every television with an HDMI connector can act as a monitor

If youre using a desktop computer, then the System Unit would be the case that contains all the electronic hardware that is used to process data. The primary tool inside of the System Unit is the processor, the brain of your computer. Not only that, but it contains the memory unit, which is also known as the RAM (Random Access Memory). Furthermore, it is also the home of the motherboard, hard drive, cooling unit, and more.

In truth, the system unit is the most important aspect of a consumer-grade computer, at least, for now. Things might change in the future when cloud computing becomes the norm.

OK, so lets talk a little about storage and what it all means. You see, Storage in a computer is all about recording and retrieving items to and from other storage media. For example, users can store data for future use in the ROM (Read Only Memory), or on a hard drive.

The hard drive is home to the operating system and all files saved on the machine. As for the ROM, well, it is designed to keep software that wont be modified. Firmware is one such software that is only located on the ROM and nowhere else.

This is why whenever a computer is wiped clean, the firmware stays the same at all times. And this is a good thing for the system and the user in general.

Older computers have a CD drive built-in for various reasons. Most folks would use this drive-bay to add DVDs to watch movies, listen to music, and more. However, a DVD or CD can also be used to store files for future use in the same way as a hard drive. Not as reliable, but possible.

A computer in todays world is nothing without the ability to communicate with other devices or on the internet. With this ability, then, folks can send and receive data from mobile devices and other computers with ease.

They can even do so over the cloud. An example of this is the use of Windows 10 to send and retrieve Office files from a OneDrive cloud storage account.

The ability to communicate relies on internal hardware components such as Bluetooth and Wi-Fi adapters. But also the USB ports for sending data from the computer to a mobile device, and HDMI for communicating with another screen.

See the original post here:
What are the main components of a Computer system? - TWCN Tech News

Read More..

IT Priorities 2020: AI, cloud to dominate IT spending in India – ComputerWeekly.com

As an IT powerhouse, India continues to be the pace setter for growth in Asia-Pacifics IT industry.

According to the 2020 TechTarget/Computer Weekly IT Priorities survey, organisations in the subcontinent remain buoyant about their digital transformation efforts, with 71% expecting to spend more in key areas such as artificial intelligence (AI).

Just 6% of more than 200 Indian IT professionals polled in the survey expect their IT budgets to be slashed, underscoring the growing resolve of Indian companies to ramp up on technology investments to gain a competitive advantage.

Besides AI, which over half of respondents plan to spend more on this year, cloud services (38%) and network infrastructure (35%) have been allocated bigger budgets by Indian organisations, signalling their desire to shore up their digital foundation to propel a new wave of growth.

Increasingly, this foundation is likely to reside outside the datacentre in the form of multiple public cloud services (44%), more so than other respondents in the region, even as some organisations continue to favour a hybrid cloud (34%) setup.

Investments in automation tools (55%) to improve operational efficiency in the datacentre is also high on the agenda, along with cyber security (37%), which remains a hot-button issue for organisations that have been doubling up on digital transformation.

The penchant for cloud in India is most evident in storage deployments. According to the study, more than half of Indian organisations plan to deploy cloud-based storage in 2020, along with their growing preference for software-defined technologies.

A healthy proportion of respondents also see hyperconverged infrastructure (39%) as key to their storage strategy, driven by the need to modernise the datacentre and overcome the challenges of traditional legacy infrastructure.

As a software development powerhouse, India is naturally one of the regions keenest adopters of DevOps (48%) and agile project management software (42%), according to the survey.

Indian organisations are also developing more internet of things (IoT) applications (39%) this year, while refactoring legacy applications (33%) for the cloud. These development efforts are pulling in bigger budgets for application programming interface management tools (60%) to support further development and co-creation initiatives.

Meanwhile, Indian organisations are not giving up core enterprise applications even as they ramp up on their own software development efforts. Enterprise resource planning (ERP) investment plans remain widespread (43%), followed by digital experience management (41%) and core HR software (38%).

On the networking front, software-defined wide-area networks (SD-WAN) remained at the top of the agenda, fuelled by the growing adoption of cloud services in India. Almost half of local firms also prefer to turn to managed service providers to supply SD-WAN services.

When it comes to security, a majority of survey respondents (63%) placed governance, risk and compliance tools as their top priority over end-user security training (56%) and fraud detection tools (46%). Along with more in-house development initiatives, they are also putting more money into container security (47%).

The security agenda extends to the edge of the network where the growing number of employee and IoT devices has greatly expanded an organisations attack surface. In 2020, more than half of Indian firms plan to spend more on virtual desktop infrastructure (VDI) even as Microsoft Windows 10 migrations are not prioritised as highly (42%).

According to GlobalData, a market research firm, ICT spending in India is estimated to grow at a compound annual growth rate of 7.2% from around $101bn in 2018 to $144bn in 2023.

With core industry verticals in India such as energy, manufacturing and construction aligning their business model with an IT driven approach, the spending is bound to grow in the coming years, said Sunil Kumar Verma, lead ICT analyst at GlobalData.

Here is the original post:
IT Priorities 2020: AI, cloud to dominate IT spending in India - ComputerWeekly.com

Read More..

Samsung Galaxy Note 20 could ship with less storage than the Galaxy Note 10 – TechRadar

The Samsung Galaxy Note 20 might actually have less memory than its predecessor, the Galaxy Note 10, if a new mobile industry rumor is to be believed.

This news comes from Sammobile, which states that the new Galaxy Note phones are currently in development, and one decision that's apparently been settled on is that the phone will come with 128GB of memory in its smallest variant.

That's an interesting titbit because both the Galaxy Note 10 and Galaxy Note 10 Plus had 256GB as the lowest options, so it seems the Galaxy Note 20 might actually have a reduced specs (and possibly also reduced price) version compared to its predecessor.

It's worth pointing out that the Samsung Galaxy Note 10 Lite, released many months after its non-Lite counterparts, actually did have 128GB of storage, so the company likely still does have a plan for putting out such phones with less storage.

Perhaps, then, Samsung is considering putting out the Note 20's 'Lite' variant as part of the main launch lineup, but not naming it as such, just as how the Samsung Galaxy S20 was actually the most affordable device in its respective series.

That would explain the lower storage in the Galaxy Note 20, although it's also possible that Samsung realized some people don't need loads of storage in a phone (now that cloud storage exists).

Then again, it's equally possible that this information is incorrect, as early leaks tend to be tenuous and the fact the phone is in development means the information could change.

We'd expect the new Samsung Galaxy Note 20 phones to launch in August, and it's best waiting until then before we assume anything for certain about the handsets.

Excerpt from:
Samsung Galaxy Note 20 could ship with less storage than the Galaxy Note 10 - TechRadar

Read More..