Page 4,186«..1020..4,1854,1864,1874,188..4,2004,210..»

Cloud storage provider Box’s revenue rises as growth slows – Reuters

(Reuters) - Box Inc shares fell more than 3 percent in after-hours trading Wednesday after the company reported slower quarterly growth in revenue compared with a year prior.

The cloud content company turned in revenue of $122.9 million and a loss of 11 cents per share. Analysts on average had expected a loss of 13 cents and revenue of $121.7 million, according to Thomson Reuters I/B/E/S.

Despite beating expectations, Box saw its revenue growth slow. Revenue was up 28 percent, billings were up 31 percent and deferred revenue was up 32 percent year-to-year, but those figures were lower than the growth the company reported this time last year.

"Theres no question we can be driving pretty significant growth, and thats the opportunity that lays ahead of us," Chief Executive Officer Aaron Levie told Reuters on Wednesday.

Levie emphasized the companys July hire of new Chief Operating Officer Stephanie Carullo, who he said will be tasked with helping the company accelerate growth.

One of the core reasons we brought her in is to help Box go to $1 billion and beyond in revenue as quickly as possible, Levie said.

Despite slower revenue, Levie highlighted Boxs top deals in the quarter, saying the company closed eight deals over $500,000 and four over $1 million. By comparison, Box closed just five deals worth more than $500,000 and one over $1 million in the same period last year. These included deals with Amazon.com Inc and Delta Global Services, he said.

"We're seeing a significant migration from large enterprises," Levie said. "They're starting to move to the cloud."

Box's success with large customers is a good sign for the company going forward, said analyst Richard Davis of Canaccord Genuity.

That's the most important thing," Davis said. "That's what will help them become a big business."

Reporting by Salvador Rodriguez in San Francisco; Additional reporting by Laharee Chatterjee in Bengaluru; Editing by Grant McCool and Lisa Shumaker

Read this article:
Cloud storage provider Box's revenue rises as growth slows - Reuters

Read More..

As bitcoin surges in price and popularity, so do the complaints – CNBC

Virtual currencies such as bitcoin are becoming more and more popular as an alternative investment thanks to their rising value, but as more consumers engage with it, so are the number of complaints against tech companies offering digital currency products.

The number of complaints about virtual currencies filed with the U.S. Consumer Financial Protection Bureau (CFPB) has increased from seven last year to a projected 425 this year, according to a report from online loan refinancing marketplace LendEDU, published on Tuesday.

"In 2017, virtual currency transactions account for 0.0019 percent of the total complaints received by the CFPB. The CFPB is on pace to receive 425 complaints in 2017, up 5,971 percent from the seven complaints received in 2016," Jeff Gitlen, content marketing analyst at LendEDU, said in the report.

The report analyzed 145,948 complaints made against 2,731 different companies this year. Complaints to the CFPB cover a range of personal finance issues, including bank accounts and services, credit cards, debt collection and money transfers. The report did say it was possible that some complaints related to digital currency transactions could be tagged with a different category, such as "bank account."

The report highlighted Coinbase, a market-leading wallet provider for cryptocurrencies in the U.S., as being behind a number of the complaints. Six complaints were filed against Coinbase in 2016 and 288 complaints have been filed so far this year. LendEDU predicts it will receive 442 complaints this year, for various reasons and in various categories.

These are just complaints filed with the CFPB. Coinbase enjoys a marking leading position with nearly 10 million users, according to its website, but a scan of complaints made against the company on social media indicates a number of dissatisfied customers: Posts on Twitter to the company's customer support account shows some users attempting to resolve issues raised weeks ago.

Many of the complaints raised concern problems regarding verifying accounts, withdrawing money and making transactions.

Part of the problem, according to the report, is that regulators have placed greater restrictions on companies such as Coinbase in order to prevent money-laundering and other crimes, which have a knock-on effect for consumers.

"Regulators have forced exchanges, like Coinbase, to place tight restrictions and limits on users due to anti-money laundering concerns. Coinbase, and other exchanges, now require an in-depth verification process to withdraw money," Tyson Cross, an attorney with Cross Law and a specialist in bitcoin, said in the report.

Coinbase did not immediately respond to requests for comment when contacted by CNBC.

Regulations have tightened as cryptocurrencies such as bitcoin have become more popular. Bitcoin's price reached a fresh all-time high of $4,703.42 on Tuesday, up nearly 70 percent for the month of August. It is currently trading at around $4,598 for one bitcoin.

The rest is here:
As bitcoin surges in price and popularity, so do the complaints - CNBC

Read More..

Here is how Indians are minting a fortune in bitcoins – Economic Times

BENGALURU: When 32-year-old Harshad Gawde first invested in bitcoins in 2013, he couldn't have expected the returns from it to sponsor an all-India tour, beginning with a six-month trip through Roopkund hills in Uttarakhand. He will be living off $15 daily payouts from that investment.

"I invested in bitcoin when one coin was worth Rs 28,000, one-tenth of what it is today," the Mumbai-based Gawde said. On August 30, one bitcoin was worth Rs 2,91,822its value skyrocketing since Donald Trump's election as the US president in November and spawning an industry of auxiliary services for people rushing in to find gold in the virtual currency.

Bitcoin is a decentralised, paperless cryptocurrency invented by Satoshi Nakamoto, an alias for an anonymous programmer in 2009.

Unlike traditional currencies, crypto coins are not produced by a central authority like a bank or a consortium. It is a mathematical formula. These coins are produced by massively souped-up computers, called 'mining rigs', that solve complex math problems to obtain these virtual currencies. A ledger records all the transactions. A typical crypto currency mining rig runs round-the-clock, its performance depending on the high-end graphic cards and cooling systems used not an inexpensive proposition at an average Rs 3 lakh a machine. Even so, several online vendors as well as individuals are investing in these machines to mine crypto currencies.

A Chandigarh-based online vendor, who calls himself Letsmine, is one such 'miner.' He has built and sold 90 mining rigs through eBay at a base price of Rs 3,00,000 each.

Letsmine has been selling rigs for the past one year, assuring customers that the investment can be recovered in 8-9 months.

Not just building rigs, "we even host rig of others at a monthly cost. We will install your rig at our location in a temperature-controlled room and charge monthly," said a spokesperson for Delhi-based Gadgets Deal India, which also sells on eBay.

Bitcoins saw explosive growth in India after Prime Minister Narendra Modi recalled high-denomination banknotes in November. Indian bitcoin exchanges have received a lot of traction in the past few months with more than 1 million active crypto-currency users.

"We recently crossed 100,000 active users on our platform, and are adding 10,000-20,000 users a month," said Hesham Rehman, chief executive of bitcoin exchange Bitxoxo.

The rise in popularity of cryptocurrencies has enabled techies like Saket Nalegaonkar to build services around it. The 28-year-old Internet-of-Things engineer spends his spare time travelling around the country helping enthusiasts set up rigs for mining.

"I saw an opportunity in building rigs," he said. "So far, I have helped more than 10 people in India build rigs and charge them on a permonth basis for upgrade and maintenance." Kumar Badgujar, a management graduate, had other ideas for mining crypto-currencies. The 26-year-old rewired five computers in his college lab, making them work in tandem to mine ethereum (another crypto-currency that is on the rise).

"Assimilate the computing powers of five personal computers helps me mine faster," said Badgujar, who has been clustered mining the past four months to produce both bitcoins and ethereum.

CLOUD MINING Some companies Hashflare, Genesis and Bitconnect among them have even set up so-called farms to collectively mine crypto currencies for individuals unable to assemble their own machines, for a fee. "Cloud-mining is the in-thing now," said Gwade, who runs a bitcoin support website, bitcoinsupport24* 7, that receives about 10 email enquiries a day related to investments in bitcoin.

Individuals can now spend as low as $2 to start with for mining, and these companies assure fixed returns every month. "These give out fixed payouts... which is what I am going to spend during my trip," Gawde said.

Given the massive surge in the value of crypto-currencies, real-estate developers, too, are seeking a piece of the action.

Bengaluru-based Nalegaonkar, who helps set up rigs for mining, has been contracted by real estate developers to convert entire floors into mining farms. In the last two months, "I have gotten contracts from two real estate developers to create in-house mining farms in Indore and New Delhi," he said.

The lack of regulations, though, has cast a shadow over the bitcoin universe.

"Over the last six months, the (Reserve Bank of India) has issued several statements warning consumers about financial and regulatory risks associated with virtual currencies," said Kannan Sivasubramanian, co-chief of research and advisory firm Aranca.

"Considering the rise in usage of such currencies across the world and in India, the government should look at putting a policy framework in place immediately."

Excerpt from:
Here is how Indians are minting a fortune in bitcoins - Economic Times

Read More..

Heads in the cloud: banks inch closer to cloud take-up – Risk.net (subscription)

The attractions are obvious: in todays data-saturated world, cloud computing allows large institutions to rapidly expand their IT capacity, boost efficiency and slash infrastructure costs. The downside? New security threats, amplified by stricter rules on protecting customer data, and a dependence on third-party providers for potentially vitalservices.

It is with an eye on the downside that banks have been slow in adopting cloud computing, which involves on-demand access to a shared pool of computing resources, such as servers andapplications.

Earlier this year, the European Banking Authority (EBA) set out to change this in Europe, publishing draft recommendations for firms to enable them to reap the benefits of cloud computing, while ensuring that risks are appropriately identified and managed. The second objective is to harmonise, across the European Union, supervisors expectations of banks using the cloud. The EBA tells Risk.net it plans to publish final guidance in the fourth quarter of thisyear.

Cloud enthusiasts say such measures as well as ongoing work by cloud providers to meet banks unique needs are all steps in the rightdirection.

Luke Scanlon, Pinsent Masons

There is light at the end of the tunnel, and this [EBA] consultation will help a lot, says Luke Scanlon, who advises clients at law firm Pinsent Masons on newtechnologies.

The proverbial tunnel islong.

Take cyber security. On the one hand, cloud providers such as the leader of the pack, Amazon Web Services are likely to have security processes and technology that are at least as advanced as those of their banking clients, thanks to their technical expertise and economies of scale. On the other hand, providers can pass on a banks data or system management to yet another contractor, increasing security risks present in traditionaloutsourcing.

The EUs General Data Protection Regulation, coming into force next year, will up the ante on data security. The new rules require, among other things, that bank customers are able to request that their personal data held is deleted. One practical outcome, say lawyers, is that banks will have to clarify to cloud providers exactly how they should handle and categorise data to ensure it can be easily isolated and deleted ifrequired.

Of more concern are potentially punitive fines up to 4% of annual global turnover for firms found guilty of data breaches caused by neglect. The size of the potential fines is attracting a lot of attention from both clients and cloud service providers, says Peter George, partner at law firm Baker McKenzie, and responsible for the firms annual cloud computing survey. There will be contractual disagreements over where liabilitylies.

One way to spot and mitigate such outsourcing risks is to undertake regular audits of third-party providers, as banks in most EU countries are already required to do. The EBAs consultation now closed sets out similar guidance with a specific focus on cloud suppliers, and Scanlon at Pinsent Masons welcomes what he sees as a flexible approach to a difficulttask.

Cloud computing involves distributing data across any number of physical locations. Scanlon says that, given the largest cloud providers host services for thousands of banks, regular physical audits would be inefficient, costly and would create risks for other banking clients, related to the security of theirdata.

Rahul Prabhakar, in charge of regulatory compliance for financial services in Europe, Middle East and Africa at Amazon Web Services, puts it another way: A constant stream of people walking through our premises presents securityrisks.

Peter George, Baker McKenzie

The EBA recognises these challenges in its document and endorses alternative options where an outsourcing institution does not employ its own audit resources. These options are pooled audits, performed jointly with other banking clients, and third-party certifications or audits, provided they conform to widely recognised standards and meet the needs of the outsourcingbank.

This is a really positive step, Scanlonsays.

Prabhakar also welcomes the EBAs stance on audits but says the order of preference should be reversed. The EBA and other regulators should consider clearly stating that, one, logical [de-facto] access is more appropriate than physical access and, two, that third-party reports and certifications or pooled audits are more preferable than individualaudits.

Some regulators have been more prescriptive. Canadas Office of the Superintendent of Financial Institutions insists on being able to audit banks across their functions, says Robert Paolino, the former chief risk officer for Canada at Japanese bank MUFG. This effectively requires that data is stored within the country especially data considered as sensitive under Canadas PrivacyAct.

Oversight of cloud providers is even harder if they employ subcontractors. This may keep costs low but banking clients may not have a direct relationship with the provider of significant parts of the cloud service as a result. Its been a struggle to square that circle, says Jonathan Kirsop, partner at law firm Stephenson Harwood in London.

One solution has been for cloud providers to give notice that they are appointing a subcontractor and give clients the right to terminate that particular service. This does provide theoretical control over the supply chain, saysKirsop.

The EBAs draft advice on what it calls chain outsourcing says banks dont need to pre-approve every subcontractor, and providers can simply give clients notice of any subcontractor changes rather than require each change to be approved by all clients.

The EBA also proposes that the outsourcing institution should carefully delineate which activities can be subcontracted, and that any subcontractors fully comply with the obligations placed on the original cloud provider. The outsourcing agreement should also require the cloud provider to notify any changes to subcontracting arrangements in time for its clients to carry out a riskassessment.

A strategy for severing the relationship with a provider is another hurdle banks have to clear before cloud computing can properly take off in theindustry.

How do you extricate yourself from a cloud computing contract when youre dependent on the provider? asks George at BakerMcKenzie.

Guidance on outsourcing to the cloud released by the UKs Financial Conduct Authority (FCA) last year suggests that banks should ensure exit plans are documented, understood by appropriate staff and fully tested. It says banks should monitor concentration risk and consider how they would respond if a service provider were tofail.

Peter George, BakerMcKenzie

However, the details remain largely untested. No bank has ever exited from a significant public cloud technology arrangement, the BBA, a UK banking trade body, and Pinsent Masons wrote in a January discussion paper. The report focuses on the cloud model that is available to the general public, with Amazon Web Services the best-knownexample.

As a result, frictions arise as to the contractual terms between banks and cloud service providers and other third parties leveraging public cloud. There is added pressure as parties do not have the benefit of experience to call upon, the paper continues. The BBA is therefore calling on the FCA to work with the banking industry to produce a due diligence checklist for banks migrating from cloudcontracts.

The draft EBA guidance also acknowledges concentration risk inherent in cloud computing, not only from the point of view of individual institution but also at industry level where large suppliers of cloud services can become a single point of failure when many institutions rely onthem.

Among other recommendations, the EBA advises banks to develop key risk indicators to spot deterioration in the cloud service to unacceptable levels, and to prepare alternative solutions and plans for transitioning to them from the out-of-favour cloudprovider.

Not only will a smooth transition to another provider ensure the banks services are unaffected, but it will also spare the bank reputational damage from a failure by a thirdparty.

Neither the EBA nor the FCA guidance contains tips on negotiating contracts with cloud providers, which comes with its own unique challenges.

In traditional bespoke outsourcing, financial services clients tend to have a lot of bargaining power and are able to use their own master services agreements, says Kirsop at Stephenson Harwood. With a cloud service, its a one-to-many solution. Suppliers cant have lots of different terms or policies for different clients. Clients have to get comfortable with standard terms, with limited ability to negotiate around them. Thats the fundamentaldifference.

Finally, as with most banking activities in the post-financial crisis era, regulation can be a key determinant of the spread of innovativepractices.

The EBA wrote in its draft guidance that uncertainty among banks about how supervisors expect them to handle cloud computing poses a barrier to its adoption.

In Indonesia, banks are blocked outright from migrating to the cloud due to their regulators requirement that all critical services be hosted within the countrys borders. For banks, who could they find in Indonesia that could host those services? The big [cloud] providers dont want to set up data centres in Indonesia; its not viable for them right now, says Manish Chawda, partner at Singapore consulting firm Pragma, which specialises in cyber and technologyrisks.

Differences in rules between jurisdictions present another headache for banks.

Jonathan Scott-Lee, Standard Chartered

Standard Chartered, for example, has operations in 68 emerging markets. As the bank is ramping up its use of cloud computing, the answer is not as might be assumed to take a highest common denominator approach, says Jonathan Scott-Lee, the Singapore-based global head of compliance, data, technology, operations and outsourcing at StandardChartered.

For a start, a gold-plated cloud strategy would eliminate most if not all of the cost efficiencies of the cloud. Second, even the highest specifications can fall foul of some regulatory environments: China, for example, mandates specific regulatory standards on the commercial use ofencryption.

I advise our digital teams to develop technology as globally as possible but that is flexible enough to allow software to be deployed in local environments, Scott-Lee says. For example, a cloud-based system could be linked to a locally housed database for client information for jurisdictions where the regulator requires data on clients to be heldlocally.

However, the trend is now towards ironing out regulatory differences around cloud computing, as illustrated by the EBAinitiative.

Jeroen Prins, a London-based financial services technology risk expert at PwC, sums up: For key jurisdictions we believe that similar principles apply and it is now feasible for the larger banks to adopt cloud servicesglobally.

Continue reading here:
Heads in the cloud: banks inch closer to cloud take-up - Risk.net (subscription)

Read More..

Walmart Taps Nvidia for Massive Cloud to Take on Amazon – Fortune

Walmart, which is building its own cloud-based data centers, will be using morea lot moreNvidia chips going forward, according to a research note from Global Equities Research.

In doing so, the retail giant joins a number of cloud computing providers like Amazon Web Services that are using more of what's known as graphical processing units, or GPUs, to crunch data for machine learning. GPUs, the thinking goes, are better suited for analyzing huge data sets or controlling autonomous cars than more general-purpose chips that are used for more typical computing.

Over the next six months, Walmart (wmt) will go "full steam" into deep neural networks, using clusters of Nvidia chips, Global Equities analyst Trip Chowdhry says in a note released Tuesday, which Barrons first spotted. Neural networks, a subset of artificial intelligence (AI), are sophisticated computing systems that mimic how the human brain learns.

Chowdhry says that Walmart is building a "GPU farm" that will be about a tenth of the size of rival Amazon Web Services "GPU" cloud. He does not identify any sources.

Related: Walmart Gears Up Anti-Amazon Stance After Whole Foods Deal

The business context here is important. Walmart has seen AWS parent company Amazon (amzn) eat into its business for years and is thus loathe to use AWS cloud services for its own computing needs. That's one big reason it built its own OneOps cloud while also making that OneOps core technology available for other companies to use.

Walmart is not the only retailer wary of putting its IT budget into AWS services. On Tuesday, the day after Amazon closed its $13.7 billion acquisition of grocery chain Whole Foods, CNBC reported that Target is scaling back its own use of AWS. What was most surprising to many about that report was the notion that Target used AWS to begin with. But then again, software developers at big companies often AWS to build test versions of their software without their bosses knowing.

A Target spokesman said that company has used and will continue to use multiple cloud providerswhich he did not name. Early this year it evaluated that lineup and decided to make some changes, he added, without additional detail.

Neither Walmart nor Amazon could be reached for comment.

Get Data Sheet, Fortunes technology newsletter.

Going further back, in June after the Whole Foods deal was announced, Walmart reportedly told its partners and suppliers to stop using AWS services. The good news for retailers that are wary of using a competitor's cloud services is that Microsoft (msft) Azure and Google (goog) Cloud Platform are now seen as viable alternatives for many customers.

Note: (August 30, 2017 4:49 p.m. EDT) This story was updated to add comments from Target.

View post:
Walmart Taps Nvidia for Massive Cloud to Take on Amazon - Fortune

Read More..

Guest Commentary: Cloud computing tackles emerging cyber threats – Security Systems News

OTTAWACyber threats and ransomware attacks are no match for cloud computing design-built from the ground up for information technology security.

In physical security, particularly access control, the history of hacking formerly focused solely on stopping unauthorized users from duplicating or cloning information housed on cards and other devices. Now, its all about stopping criminals from gaining access to or attacking a customers network and its data through vulnerabilities in their physical security systems.

The mounting case for cybersecurity is real and escalating. Cyber threats and ransomware present a formidable threat across all businesses and vertical markets. In the example of ransomware an attacker manages to successfully place malware on the network with the intent of encrypting critical data or entirely locking systemsto hold the business ransom for payments, with the promise of releasing the information or unlocking the system. Much of the ransomware is coming from out-of-country hackers who are quite sophisticated in their attacks, often demanding bit coin as payment.

Online extortion had a banner year in 2016, according to Trend Micros annual security assessment report: 2016 Security Roundup: A Record Year for Enterprise Threats. In 2016 there was a 752 percent increase in new ransomware families, with $1 billion losses to enterprises worldwide.

Ransomware attacks are growing in frequency, causing devastating consequences to enterprises and organizations across the globe. Numerous, widespread breaches around the world occurred prior to and through Mothers Day weekend 2017 as the WannaCry ransomware spread. Britains National Health Service was hit by the cyber-attack and the same perpetrator froze computers at Russias Interior Ministry while further affecting tens of thousands of computers elsewhere.

Across Asia, several universities and organizations reportedly fell prey, including Renault, the European automaker. The attacks spread swiftly to more than 74 countries, with Russia worst hit and included Ukraine, India, Taiwan, Latin America and Africa.

The fact of the matter is that anything riding on the network is at risk. Physical security systems are vitally important to daily operations of every organization today. At many facilities any downtime of these systems may significantly affect the safety of people, property and assets.

Tackling data security risks

Cloud computing creates a solid path for customers to lower their total cost of ownership (TCO) with open architecture and other installation efficiencies that provide ready scalability. But it also provides healthy TCO in providing inherent safeguards that protect data regularly and automatically.

Cloud computing Access Control as a Service (ACaaS) Security Management Systems (SMS) offers respite to the practice of housing access control systems on premises, with inherently higher security. Many of the cloud-based solutions today redundantly store system data and video automatically or on schedule. In addition, most cloud providers are held to an extremely high level of cybersecurity with various levels of encryption and automatic disaster recovery. Acceptance of cloud solutions by organizations is at an all-time high and manufacturers are releasing cloud solutions for numerous technologies. Integrators need to take advantage of the opportunity to offer cloud solutions to customers for enhanced security and reliable network authentication.

What end users and security integrators are beginning to understand is that the cloud is much safer than a non-hosted environment. In the example of ACaaS SMS, there are multiple layers of safeguards and security in the technology available as opposed to on-premise software-based platforms using local servers. Cloud-hosted security management systems are purpose-built and designed with software security as a leading backbone. Hosted systems can follow what Microsoft refers to as SD3+C: Secure by Design, Secure by Default and Secure in Deployment in Communications.

Two-Factor Authentication and Password Policies

For those who have had their Facebook account hacked, the reality of the insecurity of passwords hits home. Secure cloud-hosted systems dont use default user names and passwords. Each hosted system is issued a unique password, providing the first step to an ultra-secure solution. In addition, the ability to create password policies for users that can be set for low, medium and high adds another layer of protection. Lastly, two-factor authentication, which is being used much more frequently with consumers, can be attached to the log-in credentials of any user.

With two-factor authentication, user accounts are linked with a second source of verification, such as a code generated for further authentication. Users must provide this code when entering their user name and password, while a potential hacker would need three things in order to access the system: user name, password and access to open the device which generates the two-factor authentication code. Two-factor authentication at the login for cloud-hosted access control reduces the risks of weak passwords while also simplifying password policy management for the IT staff.

Standards-based TLS 1.2 encryption

In addition to the SD3+C design concept, encryption further protects the transmission of data between the client and the cloud-based server using Secure Sockets Layer (SSL), a standards-based security technology for establishing an encrypted link between a server and a client. The SSL Transport Layer Security (TLS) 1.2 encryption secures the data connection to connected field hardware as opposed to using easily hacked Open SSL protocols. Further, TLS 1.2 encryption allows the server and client to authenticate each other and to negotiate an encryption algorithm and cryptographic keys before data is exchanged. Cloud computing takes this a step further: manufacturers auto-negotiate the TLS encryption with the access control controller boards as they initiate contact with the server.

Once logged in, SSL certifications further safeguard the communications between applications while TLS certificates protect the communications between field devices and the ACaaS SMS platform. Proactive and consistent vulnerability scanning also provides additional protection against emerging threats.

IP Client, versus IP Server, are also characteristic of cloud-computing which greatly reduces risk from outside threats. IP Client uses outbound ports at the users site instead of inbound ports, circumventing the possibility of security breaches and data compromise. With IP Client, IT staff does not have to open inbound network ports or set up port forwarding, keeping the network secure and lowering management workload on manual configurations and set up.

Advanced security safeguards

All software manufacturers have Quality Assurance (QA) departments inspecting their own software for bugs and issues. However, what are the risks if QA misses a critical issue with the code? Third party vulnerability assessments are not only becoming prevalent in the cloud-based solutions market, but expected by savvy end users who want support documentation to assure that the manufacturer has taken additional steps to further minimize risks. Veracode is one of those that provides these services in cloud-hosted ACaaS and tests for key application security risks to enterprise solutions. Software providers of all sizes use the VerAfied security rating to demonstrate their software has undergone stringent independent testing and certification against the latest industry standards.

Gartner predicts worldwide public cloud services to grow 18 percent in 2017 to $246 billion, up from $209 billion in 2016. ACaaS thats built for and hosted by the cloud provides the industrys most robust solutions for secure, connected environments in security and the emerging internet of Things. A major factor to consider for cloud-computing SMS today is the level of security a manufacturer provides for their application. The most robust solution should incorporate multiple layers of data and privacy protection to safeguard client information while delivering the highest end-to-end security, from system login to trusted field devices.

Paul DiPeso is executive vice president of Feenics, a company that specializes in cloud-based access control solutions including its Access Control as a Service (ACaaS) platform built specifically for and hosted in the public cloud.

Follow this link:
Guest Commentary: Cloud computing tackles emerging cyber threats - Security Systems News

Read More..

Google’s John Martinis Believes Quantum Computing Threat to Be Long Way Off – Bitcoin News (press release)

At a recent crypto event, Googles John Martinis addressed the hypothetical threats posed by quantum computing, stating that we are still many years from being able to realize quantum computers. Concerns regarding the threat quantum computing may pose to RSA encryption has been increasingly discussed within the cryptocurrency community in recent years.

Also Read:Antonopoulos Details Bitcoins Two Layers of Protection Against Quantum Computing

Googles John Martinis recently rejected the notion that quantum computing may pose a direct threat to cryptocurrency in the near future. Speaking at the University of California Santa Barbara as part of the Crypto 2017 event, Martinis says he believes it will take at least a decade until quantum computing may be realized, stating that building such is really, really hard, way harder than building a classical computer.

The perceived threat posed by quantum computing is that it may be able to break RSA encryption and digital signatures. That would mean you could forge transactions, and steal coins, stated Bernardo David, a cryptography expert from the Tokyo Institute of Technology. Martin Tomlinson, a professor in the Security, Communications and Networking Research Centre at Plymouth University, articulated the hypothetical threat that quantum computing may pose to bitcoin in a 2016 interview with MSN. If you have a quantum computer then youre able to just basically calculate the private key from the public key it would take just a minute or two. So by learning all the private keys using a quantum computer, youd have access to all the bitcoin thats available.

In refuting the threat, Martinis has pointed to an instability of quantum bits (qubits) which are the counterpart to bits in classical computing. Martinis describes qubits as resembling a three-dimensional version of bits, which rather than representing a strict, binary 1 or 0 (as is the case with bits), qubits can simultaneously represent both values in a dynamic array of superpositions. As such, Martinis argues that popular perception that competing quantum computing research labs are engaging in a race to produce the most qubits is inaccurate, stating that of equal importance is a labs ability to reduce the number of qubit errors that are generated.

Despite the distant nature of the hypothetical threat posed by quantum computing, many cryptocurrency developers are actively seeking to address such. QRL, or Quantum Resistant Ledger, is an altcoin that was developed with evading quantum computing as its principal stated utility. The Russian Quantum Centre has also stated its intention to expand its research in quantum proof blockchain solutions. These endeavors indicate the cryptocurrency community is taking the perceived threat seriously, well before quantum computing has become a reality.

Do you think that quantum computing poses a threat to bitcoin and cryptocurrency? Or do you think that developers will have the capacity to evade quantum computings threat by the time such has been realized? Share your thoughts in the comments section below!

Images courtesy of Shutterstock

Have you seen our newwidget service? It allows anyone to embed informative Bitcoin.com widgets on their website. Theyre pretty cool and you can customize by size and color. The widgets include price-only, price and graph, price and news, forum threads. Theres also a widget dedicated to our mining pool, displaying our hash power.

More:
Google's John Martinis Believes Quantum Computing Threat to Be Long Way Off - Bitcoin News (press release)

Read More..

Australian quantum computing outfit goes commercial – Networks Asia

The University of New South Wales (UNSW) is set to commercialize its quantum computing technology with the launch of what is being touted as Australias first quantum computing company.

The A$83 million (US$66 million) venture, from which the new company, Silicon Quantum Computing Pty Ltd, has emerged, has received backing from UNSW itself, which has contributed A$25 million, as well as the Commonwealth Bank of Australia and Telstra, which are contributing A$14 million and A$10 million, respectively.

This is in addition to the backing by the Australian Federal Government which, through its National Innovation and Science agenda, which is also investing A$25 million in the next five years in the company, and the NSW governments contribution, which is putting up A$8.7 million.

The creation of the new company is intended to help drive the development and commercialization of a 10-qubit quantum integrated circuit prototype in silicon by 2022 as the forerunner to a silicon-based quantum computer.

The company will work alongside the Australian Research Council (ARC) Centre of Excellence for Quantum Computation and Communication Technology (CQC2T), operating from new laboratories within the Centres UNSW headquarters.

Speaking at an event to launch the company at UNSW on 23 August, chief researcher and board member, Professor Michelle Simmons, said that the three-way collaboration between government, industry and universities was unique internationally.

I know the rest of the world is watching us, Simmons said.

The creation of the new company is expected to see up to 40 staff hired, including 25 postdoctoral researchers, 12 PhD students, and lab technicians. Recruitment is already underway.

Silicon Quantum Computings board members include Simmons; Hugh Bradlow, Telstras Chief Scientist; David Whiteing, CBAs Chief Information Officer; and Glenys Beauchamp, Secretary of the Department of Industry, Innovation and Science.

The board will be chaired initially by corporate lawyer and company director, Stephen Menzies.

Read this article:
Australian quantum computing outfit goes commercial - Networks Asia

Read More..

Symantec CEO Sees Broad-Based Internet Security Threats – Bloomberg


Bloomberg
Symantec CEO Sees Broad-Based Internet Security Threats
Bloomberg
Greg Clark, Symantec chief executive officer, discusses the company's research on ransomware attacks. He speaks with Bloomberg's Emily Chang on "Bloomberg Technology." (Source: Bloomberg) ...

and more »

See original here:
Symantec CEO Sees Broad-Based Internet Security Threats - Bloomberg

Read More..

Expert warns sexting is seen as normal by many young people – Evening Echo Cork

SEXUALLY explicit messages, photographs and images sent back and forth between young people is considered normal modern day flirting, according to internet security expert Avril Ronan.

Ms Ronan, who is head of internet security at Trend Micro, said the phenomenon called sexting is now viewed as normal and this new culture is putting pressure on teens to share such images.

I am not saying it is acceptable, but I am saying kids these days see it as modern day flirting.

Receiving naked images of an under 18-year-old is considered a child pornography crime under Irish legislation, however, according to Mr Ronan, there is an epidemic of young people engaged in such activity.

Sexting under the age of 18 is considered a professional distribution of child sexual abuse material, but kids dont know that, she said.

Ms Ronan said it was important to educate children on the legal guidelines surrounding the use of the internet and mobile phone applications.

Kids are smart and savvy all they need is the information and they will be wiser of it, she added.

The internet expert said the trend is putting a lot of young people in a compromising position and also under a lot of pressure.

It puts a lot of pressure on people and again how much of a violation of your privacy and your safety and your security it can be when you post images of yourself or others in compromising situations online.

In some situations, the images can lead to cyber bullying in schools and in communities.

You get exposed to cyber bullying as a result of it, Ms Ronan said.

The internet safety expert advised people to think twice before posting an intimate image online or sending a sexually explicit message or photograph to another individual as in some cases it can lead to blackmail called sextortion.

If you are a target of cyber bullying already you become automatically a potential victim or client for a predator to approach and befriend and build a trusting relationship with and then leads to sexual coercion which is when they blackmail you for money they may get you to take naked photographs of yourself, video yourself naked.

Ms Ronan encouraged young people to take care online and be savvy with the messages they send to others.

You may think you are in a trusting relationship and it turns out that they are not who they say they were and then they may ask you for money or they are going to potentially expose you to everyone in your broader community.

See the article here:
Expert warns sexting is seen as normal by many young people - Evening Echo Cork

Read More..