The agencies involved in this case, dubbed Operation Tourniquet, include the US Justice Department’s Criminal Division and Office of International Affairs, the U.S. Secret Service’s Criminal Investigative Division, the FBI, the Criminal Division’s Computer Crime and Intellectual Property Section, the Joint Cybercrime Action Taskforce (Europol), the National Crime Agency (U.K.), the Swedish Police Authority, the Romanian National Police, the Portugal Judicial Police, the Internal Revenue Service Criminal Investigation and the Federal Criminal Police Office (Germany). “The takedown of this online market for the resale of hacked or stolen data disrupts one of the major ways cybercriminals profit from the large-scale theft of sensitive personal and financial information,” says assistant attorney general Kenneth A. Polite, Jr. of the Justice Department’s criminal division. “This is another example of how working with our international law enforcement partners has resulted in the shutdown of a criminal marketplace and the arrest of its administrator.”
Early adopters want to figure out how to operate in the emerging digital world, some for fear of falling behind or missing out altogether, said Nicolas Avila, the CTO for North America at professional services firm Globant. What companies are calling "metaverse" varies wildly. Currently, no extended reality platform enables users' avatars to live, work and shop in what many are calling the next version of the internet. And it's unclear how and whether extended reality projects will converge and integrate to become that vision. The developing metaverse is also fraught with potential problems, from its associated greenhouse gas emissions to legal challenges. ... One promising business-focused metaverse use case centers extended reality's promise of helping workers do their job better, particularly through the use of AR. The fully realized metaverse should be able to stream information in ways that make workers more efficient and productive, Nguyen said. ... A worker could look at a traffic light that was reported broken, get details on that complaint and update its repaired status immediately.
The quantum ecosystem is growing in all directions from academic to corporate boardrooms and producing new hardware, software and partnerships. Denis Mandich, CTO of quantum entropy startup Qrypt, said that the race to make qubits at scale is a winner-take-all competition. ... Quantum Brilliance is planning a joint research and development hub with La Trobe University and RMIT University to develop high-performance, scalable diamond-based quantum microprocessors. The Research Hub for Diamond Quantum Materials will develop fabrication techniques. Dr. Marcus Doherty is the co-founder and chief scientific officer of Quantum Brilliance, the head of the Diamond Quantum Science and Technology Laboratory at the Australian National University and the leader of the Australian Army’s quantum technology roadmap. Professor Chris Pakes, acting deputy vice chancellor for research and industry engagement at La Trobe University, said the partnership will use both universities’ expertise in diamond growth, surface imaging and engineering, and combine it with Quantum Brilliance’s industry experience and manufacturing capabilities.
Managing datacentre computing located at the edge of the corporate network is becoming as important as the management of centralised IT systems. There has always been a need to manage branch office IT and remote server rooms efficiently, because they are generally less resourced in terms of IT administrators on site, compared with the central IT function. There is now a groundswell of activity around managing the configuration of IT systems in the same way that source code is managed by software development teams. Scott McAllister, developer advocate at PagerDuty, says: “As IT infrastructure has progressively decoupled from physical machines we can touch, managing and provisioning that infrastructure has moved to software services in the cloud. Those services are built with robust user interfaces for manual configuration. However, handling those configurations at scale is tedious and can lead to system fragility.” Once hailed as the future of infrastructure management and now the de-facto best practice, infrastructure as code (IaC) is a process that automates the provisioning and management of compute resources with machine-readable templates.
SaaS applications are consumed and delivered through the cloud by the enterprise as software. The cloud providers take application and infrastructure security responsibility, yet the responsibility of access and data security resides with enterprise security teams. IaaS and PaaS are business-critical applications that are built and hosted by the enterprise, and the responsibility of the infrastructure, application logic, data and access security is managed by enterprise security teams. These environments are growing and changing quickly for enterprises. For the CISO, this means that the enterprise’s cloud environment on Tuesday might be very different than what it was on Monday. That’s problematic. Managing access credentials for these diverse and fast-changing environments is complicated, inconsistent, and hard. It’s worse for the CISO as these are the credentials that the cybercriminals want to cloud jack and use for commercial gains.
Despite their legacy baggage, virtual desktop infrastructure (VDI) and desktop as a service (DaaS) solutions address the above security risks. Such a migration protects against physical code exfiltration via lost or stolen laptops, since physical security of hard drives is delegated to your cloud provider’s data center. Additionally, most clouds implement encryption at rest, which secures persisted data against rare breaches. Citrix and VMWare are classic VDI/DaaS providers, while some cloud providers are introducing semi-managed first-party solutions like AWS Workspaces. Once workstations are in the cloud, it’s relatively easy to reduce digital risks via image management and network controls. Administrators can preinstall developer tools into their images, which reduces the need for developers to securely assess or install third-party applications. Meanwhile, the cloud infrastructure services that are hosting the VDI sessions will be subject to any network policy customizations, so administrators can filter out unwanted or unexpected outbound traffic.
IT professionals have long been communicating and collaborating across distributed teams, driven by a need to quickly respond to production outages, urgent client requests, or to source and recruit the best talent, regardless of location. We’ve standardized a set of tools that allow us to collaborate globally. When the COVID crisis hit, we were well-positioned to rapidly extend these capabilities to all parts of the company. Recently, as the return-to-work initiatives began, we have outfitted many of our conference facilities with equipment to help overcome the hybrid workforce challenges. Throughout these workforce shifts, we have remained focused on an important strategic priority: to be the easiest company to do business with. To create that seamless experience, every member of our team needs to fully understand our customers’ businesses, the specific problems we are solving for them, and how they and our employees will engage with and experience the technology solutions we’re building.
Quote for the day:
"A lot of people have gone farther than they thought they could because someone else thought they could." -- Zig Zigle