Daily Tech Digest - March 26, 2020

3 Ways Role-Based Access Control can Help Organizations

Device Control
RBAC is a policy-neutral access control solution built around roles and privileges. Also known as role-based security, RBAC helps restrict access to authorized users only. It supports both discretionary and mandatory access controls per business requirements. Its features including but not limited to permission groups, role permissions, and user-role or role-role relationships help block or restrict users from doing unauthorized actions or tasks or from using unauthorized data storage. Without an enforcing access control system, employees can do almost anything. For example, an employee can send a modified invoice or quote with his bank account information, stealing the payment from the organization’s clients. Or, he can provide access to third-party persons or organizations, allowing them to infiltrate in your organization, check or steal your sensitive data, and more. ... Wiith a role-based access control system, you can reduce the paperwork for onboarding employees, changing passwords, switching roles, etc. You can make use of the control system to add or switch roles quickly, implement roles and permissions to multiple employees or globally, and do more. Since the complete access control settings sit under one platform, it generates fewer errors and more efficiency when assigning roles and permissions to the employees.



Data-layer security is a new imperative as employees telecommute due to coronavirus


Cybersecurity began as an effort to wall off companies from the outside world, protecting trade secrets, customer data, and other sensitive information from unauthorized people. Since then, the world has grown far more complicated. Data has become increasingly important even as it has been moved to the "cloud," and accessed through the internet. No longer do just employees need access to that data--customers do, too. And no longer do just people need access to that data--other computer systems do, too. Corporate computer systems are no longer isolated forts, they are interconnected hives with information passing back and forth in myriad ways. The result has been a steady increase in ways for criminals to get that data, and a steady drumbeat of increasingly spectacular breaches, with criminals stealing everything from credit card and social security numbers to the blueprints for nuclear power plants. With virtual private networks that were built to handle modest numbers of workers now facing hordes, the threat vectors are proliferating.


Big Data: Leading trends in use, governance and technology


One of the benefits of using AI is that it can improve data quality. This improvement is needed within any analytics-driven organisation where the proliferation of personal, public, cloud, and on-premise data has made it nearly impossible for IT to keep up with user demand. Companies want to improve data quality by taking advanced design and visualisation concepts typically reserved for the final product of a BI solution, namely dashboards and reports, and putting them to work at the very beginning of the analytics lifecycle. AI-based data visualisation tools, such as Qlik’s Sense platform and Google Data Studio, are enabling enterprises to identify critical data sets which need attention for business decision-making, reducing human workloads. In an effort to speed time-to-market for custom-built AI tools, technology vendors are introducing pre-enriched, machine-readable data specific to given industries. Intended to help data scientists and AI engineers, these kits include the data necessary to create AI models that will speed the creation of those models. For example, the IBM Watson Data Kit for food menus includes 700,000 menus from across 21,000 US cities and dives into menu dynamics like price, cuisine, ingredients, etc.


Executives: employees are the greatest threat to critical cyber security image
The independent report, “Weathering the Perfect Storm: Securing the Cyber-Physical Systems of Critical Infrastructure,” queried over 400 c-level executives from critical infrastructure organisations across North America, Europe and Asia/Pacific and found: 52% say employees are the biggest threat to operational security; Cyber incursion into IT data systems accounted for 53% of attacks in the last 12 months; 85% of security incursions made their way into Operational Technology networks – of those, 36% started in IT/data systems and 32% involved physical incursion into OT; More than half (64%) say it took a cyber or physical security breach to motivate them to move toward a more holistic approach to cyber security; and Only a quarter believe their existing security is adequate.  “The perfect storm of increasing cyber threats, digital transformation and IT/OT convergence means organisations must move swiftly to gain visibility and enhance cybersecurity into their OT and IoT networks,” said Kim Legelis, CMO, Nozomi Networks.


10 ways hackers are using automation to boost their attacks


The simple reason cyber criminals are automating processes is because they see it as an avenue for more successful attacks and generating larger amounts of profit, more quickly and more efficiently. "Threat actors have realized that, even though in the short term it may seem that you can have a bigger windfall if you do everything from beginning to end, in the long run, if you focus on doing one thing very well, you will likely make more money," Roman Sannikov, director of cybercrime and underground intelligence at Recorded Future, told ZDNet. The 10 types of automated tool listed in the report aren't in any particular order, but researchers note that they're all extremely useful to cyber criminals looking to boost their illicit activity. ... Powerful tools that are widely available on the dark web, banking injects are modules that are typically bundled within banking trojans that inject HTML or JavaScript code into processes to redirect users from legitimate banking websites, to fake ones designed to steal details. While these tools are typically expensive – they can sell for four figures on underground forums – they provide users with an automated kit that they can use to make that figure back many times over and with little effort.


China-Based Threat Group Launches Widespread Malicious Campaign

Researchers from FireEye who have been tracking the activity said APT41 attacked as many as 75 of its customers between January 20 and March 11 alone. The targeted organizations are scattered across 20 countries, including the US, UK, Canada, Australia, France, Japan, and India. Organizations from nearly 20 sectors have been impacted, including those in the government, defense, banking, healthcare, pharmaceutical, and telecommunication sectors. Though only a handful of the attacks resulted in an actual security compromise, FireEye described APT41's activity as one of the broadest malicious campaigns ever by a Chinese threat actor in recent years. Chris Glyer, chief security architect at FireEye, says the reason for APT41's sudden burst of activity is unclear. Based on FireEye's current visibility, the attacks appear to be targeted, but it is hard to ascribe a specific motive or intent behind APT41's behavior, he says. But likely triggers include the ongoing trade war between the US and China and the unfolding COVID-19 pandemic.


Apple Update Fixes WebKit Flaws in iOS, Safari


“This vulnerability allows remote attackers to execute arbitrary code on affected installations of Apple Safari,” Dustin Childs, manager with Zero Day Initiative, told Threatpost. “The specific flaw exists within the object transition cache. By performing actions in JavaScript, an attacker can trigger a type confusion condition. An attacker can leverage this vulnerability to execute code in the context of the current process.” The issue “was addressed with improved memory handling,” according to Apple. Another type confusion issue (CVE-2020-3901) was found in WebKit, that could lead to arbitrary code execution. This flaw could be exploited if an attacker persuades a victim to process maliciously crafted web content, according to Apple. Apple also addressed a memory corruption issue (CVE-2020-3895, CVE-2020-3900), and a memory consumption issue (CVE-2020-3899) that could could enable attackers to launch code execution attacks. Finally, the tech giant also fixed an input validation bug in WebKit (CVE-2020-3902) that could allow attackers to launch a cross-site scripting attack. The attackers would need to first persuade victims to process maliciously crafted web content.


Organizations are moving their security to the cloud, but concerns remain

Cloud computing
Asked why they've been moving to cloud-based security, 29% of the respondents cited improvements in the monitoring and tracking of attacks, while 22% pointed to reduced maintenance. Other reasons included reductions in capital expenditures and access to the latest features. But organizations also have specific fears about switching their security tools to cloud-based variants. Asked about their concerns, 30% of the respondents pointed to the privacy of their data, 16% to unauthorized access, 14% to server outages, 14% to integration with other security tools, and 13% to the sovereignty of their data. Further, some 32% said they thought it would be too hard or too risky to migrate their security tools to the cloud. Another 32% said they didn't know what concerns their organization had about this type of migration. Among the organizations that have moved to cloud-based security tools, 22% cited email as the most widely protected type of data, 21% customer information, 20% file sharing, and 18% personnel files. Only 12% of the respondents said they're using cloud-based security to protect corporate financial data.


Edge Computing: 5 Design Considerations for Storage

istock 1129519394
Today’s challenges with data are heterogeneous. Data is scattered and unstructured in mixed storage and computing environments – endpoints, edge, on-premises, cloud, or a hybrid, which uses a mix of these. Data is also accessible across different architectures, including file-based, database, object, and containers. There are also issues of duplications and conflicts of data. 5G will surely add more complexity to today’s existing challenges. With 5G, even more data will be generated from endpoints and IoT devices, with more metadata and contextual data produced and consumed. As a result, there will be more demand for real-time processing and more edge compute processing, analyzing, and data storage scattered throughout the network. Each application and use case is unique and has different storage requirements and challenges, including performance, integrity of data, workloads, retention of data, and environmental restrictions. In the past, the capabilities of general-purpose storage greatly exceeded the requirements of networks, data, and applications.


GitOps brings the power of Git into Ops

GitOps brings the power of Git into Ops
Linus Torvalds might be best known as the creator of Linux, but Git, the distributed version control system of his invention, is arguably even more important. Torvalds has said that “Git proved I could be more than a one-hit wonder,” but this is an understatement in the extreme. While there were version control systems before Git (e.g., Subversion), Git has revolutionized how developers build software since its introduction in 2005. Today Git is a “near universal” ingredient of software development, according to studies pulled together by analyst Lawrence Hecht. How “near universal?” Well, Stack Overflow surveys put it at 87 percent in 2018, while JetBrains data has it jumping from 79 percent (2017) to 90 percent (2019) adoption. Because so much code sits in public and (even more in) private Git repositories, we’re in a fantastic position to wrap operations around Git. To quote Weaveworks CEO Alexis Richardson, “Git is the power option, [and] we would always recommend it if we could, but it is very wrong to say that GitOps requires expertise in Git. Using Git as the UI is not required. Git is the source of truth, not the UI.” Banks, for example, have old repositories sitting in Subversion or Mercurial. Can they do GitOps with these repositories?



Quote for the day:


"All organizations are perfectly designed to get the results they are now getting. If we want different results, we must change the way we do things." -- Tom Northup


Daily Tech Digest - March 25, 2020

Windows has a zero-day that won’t be patched for weeks


For now, there are no CVE identifiers and the only confirmed details are in Microsoft’s warning: Microsoft is aware of limited targeted attacks that could leverage un-patched vulnerabilities in the Adobe Type Manager Library and is providing the following guidance to help reduce customer risk until the security update is released. Attackers could exploit the flaw by persuading users to open a malicious document. Importantly, however, the same danger would arise even if users viewed that document using the Windows Explorer file manager preview pane. The latter is significant because, for now, there’s no software fix, which could be as far away as the next Patch Tuesday update, scheduled for 14 April 2020: Microsoft is aware of this vulnerability and working on a fix. Updates that address security vulnerabilities in Microsoft software are typically released on Update Tuesday, the second Tuesday of each month. Until then, the only countermeasure is to use one of the recommended workarounds, which involves disabling Explorer’s preview and details pane.


Six industries that need to hire a data protection officer image
The fintech sector encompasses banking, investments, trading, payments and other related areas. It involves applying technology for improved decision-making, better transparency, enhanced security and more. Companies that deal with matters like stock trading and investments should strongly consider hiring data protection officers to help maintain best practices for security. Doing so is particularly important considering the amount of evaluation that a person or company typically goes through before making such investments. For example, some databases contain complete historical records of end-of-day data for exchange-traded and equity options in the United States. Clients need continual and reliable access to such data so that they can decide when to invest and which companies on the stock exchange deserve their attention. The fintech sector assists everyday people who are not investors, too. Many banks and financial apps track a consumer’s spending habits.


istock 1090857252
Historically, security systems often simply used a low-resolution camera to passively capture video. This trend held whether at private residences, commercial properties, or on-board public transportation. Now, smart security systems are being purpose-built to capture, store, and analyze continuous video streams. On top of the 4K video captured by high-resolution cameras, these systems can use an analytics layer with machine learning software to carry out pattern recognition and motion detection. ... Today’s factories are using IoT-enabled machines to work smarter, not harder. By equipping machines with sensors, factory managers can more accurately map machine workloads, inputs, and outputs. They can also more closely track machine wear-and-tear, which leads to maintenance that is predictive rather than reactive and improves lifespan. With these features, factories are increasingly becoming automated, thanks to the wave of Industry 4.0. Machine-to-machine (M2M) devices typically use embedded and removable flash solutions to aggregate data into a single stream at the edge.


COVID-19 stress tests cloud services
Amazon Web Services has included pandemic response in its resiliency planning and regularly scales to handle spikes in demand, such as on Black Friday. Pandemic response policies and procedures have been incorporated into disaster recovery planning. Measures have been taken to ensure ample capacity and service continuity. Google Cloud has formed an internal working group to plan for and mitigate against business impacts resulting from COVID-19. The company expressed confidence its systems can continue to support customers during this time. Microsoft Azure has seen a 500 percent increase in meetings, calling, and conferences on its Teams remote collaboration platform since January 31. In the same time frame, it has seen a 200 percent increase in Teams usage on mobile devices. The company maintains cloud service availability by running multiple instances in geographically dispersed locations. Forrester advises cloud users not to panic about cloud capacity, given the past decade of massive cloud buildouts. While the long-term impact of how people will work in the future is unclear, the pandemic offers a powerful case study and a first look at the promise of cloud computing.


How Microsoft is building new tech to bring precision agriculture to the world’s poorest farmers

A person holding FarmBeats soil sensor which is connected to an IOT network.
While the team could innovate their way to recreate a drone’s functionality, there was no replacement for sensors that provide critical soil-level data for insights. To capture data, one needs multiple sensors spread across the field, which costs hundreds of dollars. The technology is too expensive for small farmers. “That technology does not exist. It has to be built,” Chandra says. So they built it. The FarmBeats team has come up with a solution that can provide soil level data without requiring expensive sensors on the ground. “While it might not be possible for these farmers to buy multiple sensors, we realized they already have a sensor that they use—their Android smartphones,” Chandra says as his eyes light up. Instead of using a network of sensors, the solution uses a smartphone’s Wi-Fi chipset to beam signals to the ground. By analyzing the “time of flight” of the Wi-Fi signal, they can detect the soil moisture and conductivity, which provides insights about watering the field and fertilizer input.


Boost security defenses against Kwampirs RAT malware with new list of IOCs

malware-skull.jpg
ReversingLabs collected data samples from Kwampirs attacks to write a reliable malware configuration parser that extracts network configurations from the samples. Each of the Kwampirs samples collected by ReversingLabs came with a set of 200 control server URLs. Malicious operations are usually carried out in campaigns that share the same control server infrastructure. ReversingLabs was particularly looking for command-and-control (C2) URLs. These URLs are interesting because of how the malware finds active C2 servers. Every sample comes with a hardcoded list of 200 URLs that Kwampirs tries to access in sequential order. The C2 locations are either in the form of domain names or IP addresses. The malware uses the first active URL it finds as the C2 server. Because the malware configuration is hidden in the installer that drops the DLL onto the system, an unpacker needs to be created to use with the parser. This unpacker decomposes the installation component and extracts the DLL, allowing the parser to collect the necessary C2 information. Using these two methods, ReversingLabs identified 1,586 URLs. Analyzing these URLs revealed that some of the droppers used the same payload, even though their hashes were different.


Digital Transformation Efforts Hindered by Lack of Upskilling


According to the Upskilling 2020: Enterprise DevOps Skills Report from the DevOps Institute, based on 1,300 respondents, more than 50% of enterprises find challenges with all aspects associated with managing the people, processes and technologies that make DevOps possible. The report found 58% of enterprises have a tough time actually finding those with the right DevOps skills and 48% said it’s difficult to retain skilled DevOps professionals. With that in mind, it’s no surprise the report found DevOps salaries on the rise. According to the Robert Half Technology 2020 Salary Guide, salaries for experienced DevOps engineers can reach beyond $179,250. Survey respondents said that the skillsets necessary for DevOps practitioners skillsets should be multifaceted, including process skills and knowledge (69% of respondents), automation skills (67%) and interpersonal skills (61%). The 2019 survey found automation skills to be the top skill, followed by process skills and knowledge.


Improving Cyber-Risk Management with ISO 27001 and the 10 Steps to Cybersecurity


According to the 2020 Global Risk Report developed by the World Economic Forum, cyber-attacks and data breaches now feature in the top 10 most likely risks to businesses, while also featuring prominently in relation to potential impact. As the frequency and disruptive potential of cyber-attacks increases each year, so does the cost. According to the 2019 Cost of Cybercrime study carried out by Accenture, the total cost of cybercrime in 2018 increased by 12% over the prior year and 72% over the previous five years. Recognizing the threat posed by cyber-attacks, the National Cyber Security Centre (NCSC) – the information assurance arm of the UK Government – released ‘10 steps to cybersecurity.’ These guiding principles offer business leaders advice on how to improve cybersecurity and how to protect their information assets. They can be applied to almost all organizations regardless of their size, location or sector. The central message of the guidance is the need for businesses to establish an effective information risk management regime or culture, supported by top management.


Fintech taskforce established to help SMEs cope with COVID-19 pandemic

Fintech taskforce established to help SMEs cope with COVID-19 pandemic image
The taskforce, which includes Trade Ledger, Wiserfunding, Nimbla and NorthRow, is working to provide a new turn-key loan origination and underwriting platform to allow banks and lenders to provide funds to businesses. This platform would include risk assessment, ‘know your customer’ (KYC), and insurance capabilities, and could be used by individual lenders or as part of a consortium. The funds that are made available would be deployed virtually and digitally, and would aim to lessen the impact of the COVID-19 outbreak on SMEs. Options would include loans of over £500,000, deployed within days rather than weeks. Martin McCann, CEO at Trade Ledger, said: “With the COVID-19 outbreak putting immense financial pressure on global supply chains, now more than ever, SMEs need reliable cash flow if they are to stay in business. “On average, it takes around 90 days for lenders in this sector to onboard new customers and establish new credit lines.


How much do you know about the Russian Dark Web?

We're seeing unique information come out of there because they're technically way more advanced than other users of the Dark Web around the world. Russians are far advanced and ahead of the game. So for example, earlier this year before the BlueKeep vulnerability was disclosed, there were Russian threat actors on cybercrime forums talking about this vulnerability, creating exploits for it and testing it before anybody else had been talking about it. So they're ahead of the rest of the world. And I think there's many environmental factors that contribute to that culture of criminality in the Russian Dark Web. And one is that the government just turns a blind eye to most of it. If it's not specifically negatively affecting the Russian government or Russian entities, they turn a blind eye to the crime. It's almost like they're giving permission to criminals to use this Dark Web forum for crime and business. Basically, in Russia, it's free game. The Russian government has no accountability. They don't hold these people accountable for their actions.



Quote for the day:


"Let him who would be moved to convince others, be first moved to convince himself." -- Thomas Carlyle


Daily Tech Digest - March 24, 2020

What is Kotlin? The Java alternative explained

What is Kotlin? The Java alternative explained
Kotlin is a general purpose, free, open source, statically typed “pragmatic” programming language initially designed for the JVM (Java Virtual Machine) and Android that combines object-oriented and functional programming features. It is focused on interoperability, safety, clarity, and tooling support. Versions of Kotlin targeting JavaScript ES5.1 and native code (using LLVM) for a number of processors are in production as well. Kotlin originated at JetBrains, the company behind IntelliJ IDEA, in 2010, and has been open source since 2012. The Kotlin team currently has more than 90 full-time members from JetBrains, and the Kotlin project on GitHub has more than 300 contributors. JetBrains uses Kotlin in many of its products including its flagship IntelliJ IDEA. ... In Kotlin, functions may be declared at top level in a file, locally inside other functions, as a member function inside a class or object, and as an extension function. Extension functions provide the C#-like ability to extend a class with new functionality without having to inherit from the class or use any type of design pattern such as Decorator.



Coronavirus: Can the networks take the strain?

Operators’ measurements found that, in general terms up to 12 March, traffic through IP networks had seen increases of nearly 40% while mobile use has increased by about 50% in voice and 25% in data. Traffic from instant messaging tools such as WhatsApp had increased fivefold in recent days. In a tell-tale sign of the increased use of teleworking, network traffic related to remote work tools such as Skype and Webex has increased fourfold. There is nothing to suggest that the same scenario will be played out in all the European countries that enter lockdown, if they do. And therein lies an issue: who knows what is actually going on and when and what are networking firms doing to ensure that the lights stay lit? The UK’s second-largest broadband provider, Virgin Media, said it realises how important its network is to everyone right now. The company said it wants to reassure users that it is working as hard as it can to keep it in “great shape”. In particular, Virgin stressed that as more people work from home, it is important for users to know that its network can withstand any increased usage, including peaks throughout the day, in the evenings and at weekends.


Report: Most IoT transactions are not secure

Iot
“What this tells us is that employees inside the office might be checking their nanny cam over the corporate network. Or using their Apple Watch to look at email. Or working from home, connected to the enterprise network, and periodically checking the home security system or accessing media devices,” the company said in its report. Which is typical, to be honest, and let (s)he who is without sin cast the first stone in that regard. What’s troubling is that roughly 83% of IoT-based transactions are happening over plaintext channels, while only 17% are using SSL. The use of plaintext is risky, opening traffic to packet sniffing, eavesdropping, man-in-the-middle attacks and other exploits. And there are a lot of exploits. Zscaler said it detects about 14,000 IoT-based malware exploits per month, a seven-fold increase over the previous year. “Folks can keep their smart watches, smart closets, and whatever else they think is making them smart. Banning devices is not going to be the answer here. The answer is changing up the narrative on how we think about IoT devices from a security and risk standpoint, and what expectations we put on manufacturers to increase the security posture of these devices,” wrote Deepen Desai, Zscaler’s vice president of security research in a blog post.


Creating SQL containers on Azure Data Studio Notebooks with Python

The SQL Server tools team at Microsoft introduced Notebooks to Azure Data Studio (ADS) around March 2019. Since then, data professionals from the SQL Server community have been posting and sharing knowledge on how to make the most of this awesome new feature. It was probably May of 2019 when I decided to give ADS Notebooks a try. I started simply just creating some simplified versions of T-SQL notebooks. Then, I decided to move a step forward experimenting with the code cells that support markdown. I felt this step very natural for me, because of my familiarity with the markup language. However, I was looking for something else. Then, I discovered that ADS notebooks also support Python as one of the built-in kernels. That's when notebooks got my attention! I'm a big fan of Python, therefore I started to experiment around immediately. Python is a very modular language with many libraries and SDK's at our disposal, being the Docker SDK one of the most popular and personal favorites.


Iinscription COVID-19 on blue background with red ball
In an email, Kirkendall said his company has already been working with authorities to "proactively prevent, and take down any fraudulent or abusive domains or websites related to COVID19 or the Coronavirus." "These actions also include banning such terms from our available domain name search tool to prevent them from being registered going forward," Kirkendall told us. But only Namecheap appears to have taken proactive steps to block customers from registering coronavirus scammy-looking domains. On the other hand, GoDaddy and Endurance said they'd continue to rely on their abuse reporting mechanisms that are currently in place. "We have processes and procedures currently in place to investigate and respond promptly to notices of illicit customer activity, including alleged illegal activity or other violations of our terms of service," a spokesperson for the Endurance International Group told ZDNet in an email. GoDaddy provided a similar reply via email, but also in a tweet addressed to Attorney General James.


TrickBot and Emotet strains make process injection most prevalent attack technique

worm
According to Red Canary detection engineer Jason Killam, process injection is a technique used by cyberattackers to mix malicious activity with operating system processes that are fairly routine. "Its most useful function may be that arbitrary code, once injected into a legitimate process, can inherit the privileges of that process or, similarly, access parts of the operating system that shouldn't be otherwise available," Killam wrote. Scheduled tasks are similarly designed to take advantage of normal functions by allowing cybercriminals to take certain actions at prespecified times, enabling execution, persistence, and privilege escalation. Red Canary director of advanced threat detection and research Michael Haag said that Scheduled Tasks are a functionally necessary component of the Windows operating system, adding that they execute routinely, and malicious tasks readily blend in with benign ones. "Scheduled Tasks represent a versatile tool for adversaries. With the requisite privileges, an attacker can schedule tasks remotely. The technique is also useful for execution and persistence in conjunction with a variety of widely used scripting languages, such as PowerShell," Haag said.


WHO, coronavirus testing lab hit by hackers as opportunistic attacks ramp up


According to Reuters, WHO has seen a marked increase in attempted cyberattacks – with one of the most recent reportedly perpetrated by a hacker group called DarkHotel. The unsuccessful attack spoofed a webpage to look like a login portal for agency employees in an attempt to steal passwords. As healthcare organizations battle the COVID-19 pandemic, they’re also facing heightened cybersecurity threats from malicious actors looking to take advantage of the crisis caused by the outbreak. The U.S. Department of Health and Human Services also fended off an attack recently as it was simultaneously focused on coronavirus response. Now, a UK-based medical facility that has plans to test coronavirus vaccines, Hammersmith Medicines Research, has been hit by an attack from one of the ransomware groups that recently pledged not to target medical organizations during the COVID-19 pandemic. The criminals behind the Maze ransomware attacks apparently managed to exfiltrate a slew of patient records, and have subsequently published some of the files on the dark web, demanding ransom payment.


CV19: Meet The Volunteer COVID-19 Cyber Heroes Helping Healthcare Fight The Hackers

The CV19 logo of the Cyber Voulnteers 19 project
Radoslaw Gnat, a veteran information security professional, has a very personal motivation for being involved: two of his children were recently diagnosed with virus unrelated pneumonia, and healthcare practitioners are helping them. Radoslaw sees this as an opportunity to contribute back. "We are just a group of people that is using our skills and contacts to help people that are the first line of defense against COVID-19," Gnat says. Those skills cover incident response, research, risk management and training services, among other things. Daniel Card, a self-proclaimed "Cyber Ninja Warrior" and founder of the PwnDefend capture the flag games, has issued a call for more people to help CV19 with its work. Alongside the enormous amount of work that is going into enabling technology solution providers and infosec professional volunteers, Card says that CV19 "must ensure that the work we do is conducted in line with our mission to help, not hinder." To facilitate this, CV19 has published a code of conduct that provides a shared understanding of how everyone should work together during this time of crisis.


IT’s Sudden Challenge: Connecting a Distributed Workforce

istock 1130480436
For IT departments this shift is creating an entirely new set of challenges. The primary challenge is connecting a distributed, remote workforce to business-enabling applications and services residing in the data center and the cloud. Some users require access to VoIP systems, virtual desktops, and video conferencing that require fast and highly reliable network connections. A company that had 50 branch offices yesterday must now grapple with the idea that every user, and their home network, is a new branch they have to support, representing an exponential increase in the number of sites overnight. Over the past few weeks, as this shift has moved from possibility to reality, we’ve had a series of discussions with customers about how to best meet these changing organizational goals. We’ve taken these requirements into account and have compiled a reference architecture that allows for non-SD-WAN and SD-WAN users alike to connect to applications and services remotely. In this blog we’ll dig into this architecture in more depth.


Fintech Firm Finastra Recovering From Ransomware Attack

Fintech Firm Finastra Recovering From Ransomware Attack
CEO Tom Kilroy, who has posted a series of notices on the company's website, on Monday noted that Finastra was still working to "restore full IT operations. As mentioned previously, our solutions each have their own nuanced processes to move from being available to operationally live, and we are working closely with impacted customers to move through these essential steps securely." The ransomware attack. which started on Friday, forced Finastra to take its servers offline to prevent the malware from spreading further within its network, according to the online update. Kilroy did not offer details about the type of ransomware used in the attack on the company's infrastructure, but he noted that no customer or employee data apparently was inappropriately accessed or exfiltrated. Kilroy also noted that any clients running their own software on Finastra's network were not affected. The company is working with U.K. law enforcement officials as well as security firms to investigate the incident.



Quote for the day:


"Leaders begin with a different question than others. Replacing who can I blame with how am I responsible?" -- Orrin Woodward


Daily Tech Digest - March 23, 2020

You Need to Know SQL Temporary Table


We have been warned to NOT write any business logic in databases using triggers, stored procedures, and so on. It doesn’t mean we don’t need to know database systems. Being competent in database systems could save us a lot of work. For example, managers or customers often send us an email or a short notice asking for some one-off reports. Then we need to quickly log into the database servers and generate reports with either a list of parameters or a CSV file from requesters. ... There are two types of temporary tables: local and global temporary tables. Both of them share similar behaviors, except that the global temporary tables are visible across sessions. Moreover, the two types of temporary tables have different naming rules: local temporary tables should have names that start with a hash symbol (#); while the names of global temporary tables should start with two hash symbols (##). All temporary tables are stored in System Databases -> tempdb -> Temporary Tables.



Remote work tests corporate pandemic plans


IT leaders across the country are shifting gears from accommodating short-term remote work strategies for snowstorms, hurricanes and other natural disasters to how to help workers plan for and remain productive in a longer-term remote work environment. Due to the duration of the pandemic, Miami-based ChenMed, an operator of 60 senior health centers in the eastern U.S., intends to offer the small number of 2,500 users who don't have a laptop, such as front desk staff, the opportunity to take home their desktops so they can continue to answer patient calls and conduct other business. "Yes, it creates a lot more complexity in helping users set that up, but we want them to have a great experience versus trying to use an old computer at home," CIO Hernando Celada said. This strategy gives him confidence that the machines will be secure when the time comes for workers to be sent home, which will be at the first sign of community spread of the virus because ChenMed's patient population is the most vulnerable.


Private cloud reimagined as equal partner in multi-cloud world

hybrid cloud
Forrester's Gardner argues that repatriation is not a broad trend. "It's simply not true," he says. There may be some companies moving a specific application back to the private cloud for performance, regulatory or data gravity reasons, but repatriation is a relatively isolated phenomenon. The latest Gartner thinking on repatriation is in agreement with Gardner. "Contrary to market chatter that customers are abandoning the public cloud, consumption continues to grow as organizations leverage new capabilities to drive transformation. Certain workloads with low affinities to public cloud may be repatriated, largely because the migrations were not sufficiently thought through. But few organizations are wholly abandoning the public cloud at any technology layer," reads a 2019 Gartner report from analysts Brandon Medford, Sid Nag and Mike Dorosh. Warrilow says flatly, "Repatriation in net terms is not happening." He adds that there will always be a small number of workloads that go back to the private cloud as part of an organization's ongoing evaluation of the best landing spot for specific workloads.


What’s New in SQL Monitor 10?

SQL Monitor does the best job it can, out of the box, of setting up a useful core set of metrics and alerts, with sensible thresholds. However, the right alerts and the right thresholds are 100% dependent on your systems. A group or class of servers may all need the same alert types with the same thresholds, but these may well be different from those for other classes of server. Also, your group of VMWare-based servers, for example, may need different thresholds than your bare-metal servers for the same set of memory-related alerts. Configuring all this in the GUI, server-by-server, can be time consuming and it’s easy to introduce discrepancies. This alert configuration task, just like any other SQL Server management or maintenance task should be automated. With the PowerShell API, you now write PowerShell scripts to set up the alerts on a machine in a way that is exactly in accordance with your requirements. You then use that as a model to copy all the settings to other machines, or just groups of machines.


Can APIs be copyrighted?

Can APIs be copyrighted?
The law is very clear about copyright. If a programmer writes down some code, the programmer owns the copyright on the work. The programmer may choose to trade that copyright for a paycheck or donate it to an open source project, but the decision is entirely the programmer’s. An API may not be standalone code, but it’s still the hard work of a person. The programmers will make many creative decisions along the way about the best or most graceful way to share their computational bounty. ... APIs are purely functional and the copyright law doesn’t protect the merely functional expressions. If you say “yes” to a flight attendant offering you coffee, you’re not plagiarizing or violating the copyright of the ancient human who coined the word “yes.” You’re just replying in the only way you can. Imagine if some clever car manufacturer copyrighted the steering wheel and the location of the pedals. The car manufacturers have plenty of ways to get creative about fins and paint colors. Do they need to make it impossible to rent or borrow a car without a lesson on how to steer it? The law recognizes that there are good reasons not to allow copyright to control functional expressions.


From Zero to Hero: CISO Edition

With new attacks forming faster than the technologies to fight them, holding CISOs to an entirely unrealistic standard doesn’t actually serve anyone. The truth is that no matter how many technologies are deployed or how good the security posture is, 100% protection from cyberattacks is simply not possible. Perhaps senior leadership and boards of directors are finally starting to acknowledge this fact, or perhaps they're starting to realize that a successful response to an attack, along with actions by other parts of the organization, contribute to the ultimate scale and scope of the event. CISOs are uniquely capable of gauging cyber-risk and how to reduce it. Experienced CISOs understand the threats their companies face and know how to deploy the optimal mix of people, processes, and technologies, weighed against threats, to provide the best possible level of protection. Organizations that understand this are leading the charge in shifting the perception of the CISO from technical manager to strategic risk leader.


Most common cyberattacks we'll see in 2020


By convincingly impersonating legitimate brands, phishing emails can trick unsuspecting users into revealing account credentials, financial information, and other sensitive data. Spear phishing messages are especially crafty, as they target executives, IT staff, and other individuals who may have administrative or high-end privileges. Defending against phishing attacks requires both technology and awareness training. Businesses should adopt email filtering tools such as Proofpoint and the filtering functionality built into Office 365, said Thor Edens, director of Information Security at data analytics firm Babel Street. Business-focused mobile phishing attacks are likely to spread in 2020, according to Jon Oltsik, senior principal analyst for market intelligence firm Enterprise Strategy Group. As such, IT executives should analyze their mobile security as part of their overall strategy. "Spam filters with sandboxing and DNS filtering are also essential security layers because they keep malicious emails from entering the network, and protect the user if they fall for the phishing attempt and end up clicking on a malicious hyperlink," said Greg Miller, owner of IT service provider CMIT Solutions of Orange County.


Las Vegas shores up SecOps with multi-factor authentication


Las Vegas initially rolled out Okta in 2018 to improve the efficiency of its IT help desk. Sherwood estimated the access management system cut down on help desk calls relating to forgotten passwords and password resets by 25%. The help desk also no longer had to manually install new applications for users because of an internal web portal connected to Okta that automatically manages authorization and permissions for self-service downloads. That freed up help desk employees for more strategic SecOps work, which now includes the multi-factor authentication rollout. Another SecOps update slated for this year will add city employees' mobile devices to the Okta identity management system, and an Okta single sign-on service for Las Vegas citizens that use the city's web portal. Residents will get one login for all services under this plan, Sherwood said. "If they get a parking citation and they're used to paying their sewer bill, it's the same login, and they can pay them both through a shopping cart."


Coronavirus challenges capacity, but core networks are holding up

A stressed employee works alone in a dimly lit office.
Increased use of conferencing apps may affect their availability for reasons other than network capacity. For example, according to ThousandEyes, users around the globe were unable to connect to their Zoom meetings for approximately 20 minutes on Friday due to failed DNS resolution. Others too are monitoring data traffic looking for warning signs of slowdowns. “Traffic towards video conferencing, streaming services and news, e-commerce websites has surged. We've seen growth in traffic from residential broadband networks, and a slowing of traffic from businesses and universities," wrote Louis Poinsignon a network engineer with CloudFlare in a blog about Internet traffic patterns. He noted that on March 13 when the US announced a state of emergency, CloudFlare’s US data centers served 20% more traffic than usual. Poinsignon noted that Internet Exchange Points, where Internet service providers and content providers can exchange data directly (rather than via a third party) have also seen spikes in traffic. For example, Amsterdam (AMS-IX), London (LINX) and Frankfurt (DE-CIX), a 10-20% increase was seen around March 9.



With a large segment of the population confined to their homes having to consume bandwidth, the internet free-for-all we have enjoyed to date is all but done. Emergency legislation or an executive order needs to be enacted to limit video content streaming to 720p across all content services, such as from Netflix, Hulu, Apple TV, Disney+, YouTube, and other providers. Traffic prioritization and shaping need to be put in place for core business applications during prime hours, which includes video conferencing for business and personal use. This would effectively be the opposite of net neutrality, as an emergency measure. Internet video streaming traffic should be prioritized for essential news providers, and the government should provide incentives for them to broadcast their content (and for home-bound citizens to consume it) over-the-air (OTA) so that additional bandwidth can be freed up. Remember the antenna and devices with built-in tuners? It may be an appropriate time to shift some programming back to the airwaves, and even bring back the DVR, so that programming can be transferred to devices during off-hours when networks aren't saturated.



Quote for the day:


"Individual commitment to a group effort - that is what makes a team work, a company work, a society work, a civilization work." -- Vince Lombardi


Daily Tech Digest - March 22, 2020

How Is AI Helping To Commercialize Space?

AI Helping to commercialize space
The power of deep learning and AI-enabled recognition provides significant power in analyzing images and providing ability to review the millions of images produced by spacecraft. Artificial intelligence on the other end can analyze the images as they are being taken and determine if there are any issues with the images. Unlike humans, AI does not need to sleep or take breaks so it can rapidly process a lot of data. Using AI to capture images of Earth also prevents the need for large amounts of communication to and from Earth to analyze photos and determine whether a new photo needs to be taken. By cutting back on communication, the AI is saving processing power, reducing battery usage, and speeding up the image gathering process. Satellites are also being used to analyze natural disasters from space. Detailed imagery from a satellite can help those on the ground to see victims, determine the course of the disaster, and more. Artificial intelligence is being used to help speed up the response of satellites to natural disasters. With the help of the onboard AI, satellites are able to determine where a natural disaster is located and navigate to that location.


COVID-19: How to Adjust Business Continuity Plans

The COVID-19 pandemic present new challenges to healthcare IT and security teams, including the need to reassess and adjust business continuity plans, says Christopher Frenz, who leads information security at New York's Interfaith Medical Center. He's chair of an industry committee that has developed new guidance for dealing with those challenges. ... "Business continuity is something organizations should constantly test, particularly in healthcare," he says in an interview with Information Security Media Group. "Testing your backup and disaster recovery plans is something we should always be doing. But at a time like this where we're seeing an upswing in malware attacks against hospitals related to coronavirus, and you're going to have influxes of patients ... that puts additional stresses on systems. So it's definitely a good idea to test and verify that all this stuff works ahead of time," he says.


Once hailed as unhackable, blockchains are now getting hacked


Susceptibility to 51% attacks is inherent to most cryptocurrencies. That’s because most are based on blockchains that use proof of work as their protocol for verifying transactions. In this process, also known as mining, nodes spend vast amounts of computing power to prove themselves trustworthy enough to add information about new transactions to the database. A miner who somehow gains control of a majority of the network's mining power can defraud other users by sending them payments and then creating an alternative version of the blockchain in which the payments never happened. This new version is called a fork. The attacker, who controls most of the mining power, can make the fork the authoritative version of the chain and proceed to spend the same cryptocurrency again. For popular blockchains, attempting this sort of heist is likely to be extremely expensive. According to the website Crypto51, renting enough mining power to attack Bitcoin would currently cost more than $260,000 per hour. But it gets much cheaper quickly as you move down the list of the more than 1,500 cryptocurrencies out there.



Cyber crooks continue to exploit COVID-19 for their malicious schemes

“BEC attacks are often delivered in stages. The first email sent is typically innocuous, meaning that they do not contain the attacker’s end goal. The attackers craft plausible scenarios in hopes the recipient will reply. Once they’re on the hook, the attacker will send their true ask. (I need you to buy gift cards, wire transfer funds, etc.),” the researchers explained. “These coronavirus-themed BEC attacks often come with spoofed display names, which are likely real people known to the recipient. In the body of this message, the actor attempts to eliminate the possibility of voice-verification, in hopes of ensuring a higher success rate, by saying their phone is ‘faulty at the moment.'” They’ve also spotted an assortment of fake notices impersonating doctors and local health agencies and institutions (aimed at the general population), as well as more targeted emails aimed at enterprises (employees), such as fake internal emails for credential phishing attacks impersonating the organization’s president, IT staff, risk manager, and so on.


CIOs say personal disruption comes before digital disruption

cio to ceo man with briefcase on skateboard career growth speed blur career path
CIOs suggest personal disruption should be part and parcel to the overall disruptions that their organizations are making. At the same time, they say transformation needs to happen at many levels these days including the personal level. With this said, if an organization has been comfortable with the status quo for too time, CIOs say they need to start by driving the organizational change needed to be receptive to change and to perceive changes the organization needs. A key part of this, CIOs say is that IT leaders should resolve to be open to new ideas and ways of thinking this year and in the coming decade. Part of this involves getting out of the natural comfort zone and being open to thinking differently about how to impact the organization. CIOs suggest in 2020 IT leaders need to have increased awareness of the social and cultural impacts occurring from technology. CIOs say, for this reason, it makes sense to encourage the entire team to self-disrupt itself. To fix businesses, CIOs should get the business out of its comfort zone too.


4 Reasons Central Banks Should Launch Retail Digital Currencies

While domestic retail payments in many OECD countries are now free, cross border payments remain a minefield of pain, cost and delays for consumers. If I send money to my mum in India, she has no digital identity in the UK and I have no digital identity in India. So my bank in the UK verifies that I sent the money, my mum’s bank verifies that she’s the person the money is for and both the banks verify (or at least hope) that neither I nor my mum is a nefarious character. Then the banks wait until they have compared their respective spreadsheets and make me wait for this reconciliation. Only after that, both the banks take a nice cut on the FX and send the rest to my mum. If the bank was in rural Ghana instead of Delhi, there’d probably be two more banks in this bank-chain, which’d quadruple the delay and the pain. This whole process of cross border payments is not only a pain for consumers, it also makes the global AML regime ineffective and unenforceable. Instead, if the Bank of England and the Reserve Bank of India both were to rely on a shared set of data standards for their respective digital currencies and for the corresponding digital identity infrastructure


Exploring the risky behavior of IT security professionals

risky behavior security professionals
Almost 65% of the nearly 300 international cybersecurity professionals canvased by Gurucul at RSA Conference 2020 said they access documents that have nothing to do with their jobs. Meanwhile, nearly 40% of respondents who experienced bad performance reviews also admitted to abusing their privileged access, which is double the overall rate (19%). “We knew insider privilege abuse was rampant in most enterprises, but these survey results demonstrate that the infosecurity department is not immune to this practice,” said Saryu Nayyar, CEO of Gurucul. “Detecting impermissible access to resources by authorized users, whether it is malicious or not, is virtually impossible with traditional monitoring tools. That’s why many organizations are turning to security and risk analytics that look at both employee and entity behaviors to identify anomalies indicative of insider threats.” ... This showcases the problems organizations have with employees behaving outside of the bounds of practical and published security policies.


Covid-19: NHS tackles coronavirus crisis with the help of tech

NHS Digital’s website states: “Patients should be enabled to get advice and care without attending the practice unless in-person care is clinically required.” But although phone appointments are great, they won’t cover everything. This is where video appointments are invaluable – not just for patients who may be displaying coronavirus symptoms, but for anyone who needs to be seen by a GP. Some GPs already have online systems and video consultations in place, but many of those who have the service available have not yet begun to use it. EMIS is one of the biggest GP IT system providers in England, with nearly 4,000 GP practices using its EMIS Web service. In 2017, it launched its Video Consult service, but uptake has been limited. This echoes throughout GP practices in the UK – suppliers often offer the service, but few GP practices use it. EMIS, which normally charges GPs for the use of video consultations, has now decided to offer it free for the next few months.


To succeed in DevOps these days, go hybrid

building-observation-deck-world-trade-center-one-photo-by-joe-mckendrick.jpg
DevOps is not just a technical undertaking, it's a business proposition. This calls for hybrid skills that enable a more holistic view of the entire software development and deployment process. With a majority of enterprises (52%) intending to ramp up their recruiting of DevOps skills. close to two-thirds, 65%, reported having difficulties with finding these combinations of skills. DevOps is not just a technical undertaking, it's a business proposition. This calls for hybrid skills that enable a more holistic view of the entire software development and deployment process. With a majority of enterprises (52%) intending to ramp up their recruiting of DevOps skills. close to two-thirds, 65%, reported having difficulties with finding these combinations of skills. The DevOps journey is still very difficult for more than 50% of respondents. "DevOps is a fundamental change in the traditional structure of IT. It not only represents the adoption of new technology, but also an organizational transformation challenge with all that it implies with the 'evangelization of the existing responsibility silos.


The Anatomy of a Microservice, One Service, Multiple Servers

In addition to supporting multiple transport mechanisms that can improve performance and efficiency, when providing more than one API Server, there’s an architectural benefit. That is helping to enforce separation of concerns. While the high-level architecture diagram presented in Microservice Definition and Architecture depicts a clear separation of concerns, like any other development effort, implementing this pattern does require diligence. In a previous article in this series, I stated that I believe developers have the best intentions in mind. Of course, there are exceptions, but individuals do want to do a good job. The problem comes in when deadlines loom. Things start to get thrown off the back of the truck. Shortcuts are taken. Non-functional requirements such as metrics gathering and reporting are missed. The more an architecture helps guide a team, the less likely these things will happen. Specifically, in the case of having two API Servers, business logic remains where it’s supposed to remain: in the business service.



Quote for the day:


"Leadership is the other side of the coin of loneliness, and he who is a leader must always act alone. And acting alone, accept everything alone." -- Ferdinand Marcos


Daily Tech Digest - March 21, 2020

Cisco moves WiFi roaming technology to wireless broadband consortium

wireless communication network in big city concept iot ict picture id1026969404
With OpenRoaming, device users can employ methods such as Samsung ID, their mobile SIM card, or their cloud provider to sign into OpenRoaming once, granting them seamless access to participating wireless networks around the world, according to Cisco. In addition, OpenRoaming brings together a federation of trusted identity providers, to automatically allow users to join any network managed by an OpenRoaming federation member. The membership include service providers, device manufacturers, cloud ID, or even loyalty memberships. Boingo Wireless, GlobalReach Technology, Intel, Korea Telekom, and others have pledged support for OpenRoaming. “There is considerable pull from the industry and our customers, both enterprise and service provider, to automate secure onboarding across multiple verticals,” wrote Matt MacPherson, Cisco’s Wireless CTO in a blog about the transfer. WBA’s global ecosystem can integrate OpenRoaming into its technologies, regardless of equipment provider. He says that OpenRoaming supports seamless, secure roaming that can iprove Wi-Fi service in general.



There are many free online courses for learning data science and machine learning available. I previously covered a list of my top five in this article. However, books can be a really useful tool for learning the detail and theory behind these subjects. Fortunately, if you look hard enough you will find that there are a wealth of completely free books online that cover the majority of topics and concepts that you need to learn. ... "Think Stats" by Allen B. Downey can be read online or downloaded as a pdf here. It covers many of the core statistical concepts for data science including data analysis, distributions and probability. It also leans heavily towards coded examples written in python rather than mathematical equations, which I think makes it easier to digest for those without advanced maths degrees. ... "Bayesian Methods for Hackers: Probabilistic Programming for Bayesian Inference" by Cameron Davidson-Pilon attempts to bridge the gap between theoretical Bayesian machine learning methods and their practical application in probabilistic programming. It provides a really good introduction to Bayesian inference with a practical first approach.


60% of Security Pros Trust Cyberthreat Detections Verified by Humans over AI


According to research findings, based on the responses of 102 professionals in the cybersecurity industry, 45% of respondents opined that their companies lack a sufficiently staffed cybersecurity team. Over 70% of respondents agreed that AI-based tools made their security teams more efficient by eliminating over 55% of everyday security operations. Incorporating AI tools into security operations decreased employees’ stress levels, according to 40% of respondents. And, 65% claim that AI tools allow them to focus on cyberattack mitigation and preventive measures. Despite the advantages AI-based technologies offer, the majority of respondents stressed that there are skills and benefits the human element provides cybersecurity teams that AI and machine learning cannot match. WhiteHat provides services that are required for organizations to secure the entire software lifecycle (SLC) from the development through deployment and operation. Its Application Security Platform technology solutions include Software Composition Analysis (SCA), Static Application Security Testing (SAST), and Dynamic Application Security Testing (DAST).


How artificial intelligence is changing the game for banks

“Natural language processing will dramatically change the way we will operate. There is a tremendous amount of hidden knowledge locked away at a bank — we’re sitting on a goldmine. This will give us a way to access it,” he says. “We will be able to make faster, better decisions on everything from mortgages to calculating how much collateral the bank holds.” Legrand’s mention of collateral begs a big question: would AI — with all its better, faster ways of handling data — have been able to sound an early alarm on a big systemic problem like the financial crisis? Liu, for all his ambition, baulks at making quite such a big claim. “I don’t think it would avert a crisis because there are so many different elements that come into it. But it would help with crisis management. [This technology] can help show you things such as if one part of the bank goes bankrupt, how quickly would that crisis spread.” With the world economy rocked by COVID-19, he adds, banks are again coming under pressure to spot problems with liabilities and non-performing loans as quickly as possible.


Architectural Implications of IoT Data


Due to potential implications for enterprise and our transformation programs, we must plan data collection via IoT sensors carefully. Data sources for IoT solutions can be diverse and complex. As a first design activity, we must determine the type of physical signals to measure. Then, we can identify the number of sensors to be used. We need to calculate speed of signals for these sensors and document in our data acquisition plan. Digital transformation architects need to closely work with the IoT Solution Architects and solution designers to create stringent governance and innovative measures around streaming data collection plans. In addition to the architectural, design, and innovation challenges of massive data, application usage patterns are also essential factors for the performance of IoT solutions particularly in the enterprise modernisation and digital transformation initiatives. For example, minute details such as the processors and memory of the servers hosting the IoT applications matter and must be considered carefully using benchmarks. By using benchmarks for application, data, and infrastructure, we can create an exclusive IoT performance model and a set of test strategies to use in our digital transformation solutions.


Singapore introduces contact tracing app to slow coronavirus spread

The mobile app can plug the gaps and more quickly identify potential carriers, who then can monitor their health and take the necessary action sooner. Early detection is crucial in slowing down the spread of the coronavirus, according to the government agency. To safeguard personal privacy, it added that users would have to provide consent during the initial setup of the app to participate in TraceTogether and agree to have their mobile number and captured data used for contact tracing. GovTech said only the user's mobile phone was required during the installation, and no other data such as name, location, contact list, or address book would be collected. Data logs were stored locally on the mobile phone and contained only cryptographically generated temporary IDs. The data logs would be extracted only when needed by the authorities for contact tracing, it said.  TraceTogether is available for download via Google Play and Apple App Store.


Intel neuromorphic
Nabil Imam, a neuromorphic computing lab senior research scientist at Intel, believes the research will pave the way for neuromorphic systems that can diagnose diseases, detect weapons and explosives, find narcotics, and spot signs of smoke and carbon monoxide “We are developing neural algorithms on Loihi that mimic what happens in your brain when you smell something,” he said in a statement. “This work is a prime example of contemporary research at the crossroads of neuroscience and artificial intelligence and demonstrates Loihi’s potential to provide important sensing capabilities that could benefit various industries.” Neuromorphic engineering, also known as neuromorphic computing, describes the use of circuits that mimic the nervous system’s neuro-biological architectures. Researchers at Intel, IBM, HP, MIT, Purdue, Stanford, and others hope to leverage it to develop a supercomputer a thousand times more powerful than any today. ... According to Intel, Loihi processes information up to 1,000 times faster and 10,000 more efficiently than traditional processors, and it can solve certain types of optimization problems with more than three orders of magnitude gains in speed and energy efficiency.


Auto ML and the future of self-managing networks with Dr. Behnaz Arzani

Things like video analytics, like natural language processing, things like that are always needed, not necessarily something for networking. So my friend and I, Bita Rouhani from Doug Burger’s group, started to look at well, what happens if you just dump networking data into these systems? Like, just let’s see how well they do. And they did it abysmally bad. The state-of-the-art was like terrible. And so we looked at it and said okay, why is that the case? And what we found was that, well, there’s simple domain customizations that we could do, even on the input. Not anything to the machine learning, but just how we present the data that would significantly boost their accuracy. And so the idea was well, actually, operators are really good at that part. Like they really know their data. They really know things about the data that the auto ML frameworks don’t know. So is there a way to bridge this gap? Is there a way to provide that domain knowledge without him knowing anything about ML?


The Two Trends that Will Shape the Future of ITSM


The first trend is what I call the primacy of the customer. Essentially, this trend means that organizations are no longer creating value by delivering a mass product to a mass market as efficiently as possible. Instead, differentiating value is created by delivering a differentiated customer experience. Those that positively transform the experience win. This idea also has a few associated buzzwords like the experience economy, mass customization, and the market of one. These catchphrases all relate to this idea, but the big difference is that it’s now becoming the primary driver of organizational value. The second trend is more personal. I call it the primacy of algorithm. Throughout the industrial age, organizations needed workers who could perform work consistently, reliably, and repeatedly. Essentially, they needed robots, so we trained generations of humans to be the robots that would power the literal and figurative machinery of the industrial age. Today, however, we’re on the cusp of an algorithmic tipping point.


Mass move to work from home in coronavirus crisis creates opening for hackers

“People who have never worked from home before are trying to do it and they are trying to do it at scale,” said Wendy Nather, a senior advisor with Cisco’s Duo Security who has spent the past decade working from home for various jobs. She said the sudden transition would mean more scope for mistakes, more strain on information technology staff, and more opportunity for cyber criminals hoping to trick employees into forking over their passwords. Criminals are dressing up password-stealing messages and malicious software as coronavirus-themed alerts, warnings, or apps. Some researchers have found hackers masquerading as the U.S. Centers for Disease Control and Prevention in a bid to break into emails or swindle users out of bitcoin, while others have spotted hackers using a malicious virus-themed app to hijack Android phones. Advanced cyber spies also appear to be exploiting the coronavirus outbreak that has infected tmsnrt.rs/3aIRuz7 more than 210,000 people and killed 8,700 worldwide.



Quote for the day:


"The highest proof of virtue is to possess boundless power without abusing it." -- Lord Thomas Macaulay