Day 2025-01-22 Shanghai
Today is a sunny day.
The Website of Steve, mainly sharing SRE, DEVOPS, DEVSECOPS, PHP, Java, Python, Go, cross-border e-commerce, security, reading and other technical articles
Today is a sunny day.
Today is a sunny day.
How to backup mysql and redis, and how to restore them.
Published: Fri, 17 Jan 2025 15:21:00 GMT
Fact Check: False
As of my knowledge cutoff in April 2023, the US Supreme Court has not upheld a ban on TikTok.
Published: Fri, 17 Jan 2025 07:33:00 GMT
Cyber Innovation to Address Rising Regulatory, Threat Burden
With the rapid acceleration of digital transformation, organizations face a complex and evolving landscape of cyber risks and regulatory requirements. To effectively navigate these challenges, cybersecurity leaders are increasingly turning to innovative solutions to streamline compliance, enhance threat detection, and improve overall security posture.
Regulatory Compliance
Threat Detection and Response
Security Posture Improvement
Benefits of Cyber Innovation
As the cyber threat landscape continues to evolve, organizations must embrace innovative technologies to address rising regulatory and threat burdens effectively. By leveraging AI, cloud security, and automation, organizations can enhance compliance, improve threat detection, streamline operations, and strengthen their overall security posture.
Published: Fri, 17 Jan 2025 04:30:00 GMT
What is DORA?
DORA stands for the Digital Operational Resilience Act, a European Union regulation that came into effect in January 2023. DORA is designed to strengthen the resilience of the EU financial sector to cyber threats and other operational risks.
Who is impacted by DORA?
DORA applies to a wide range of financial institutions, including banks, investment firms, insurance companies, payment service providers, and cryptocurrency exchanges.
What are the key requirements of DORA?
DORA imposes a number of requirements on financial institutions, including:
How can financial institutions comply with DORA?
To comply with DORA, financial institutions should take the following steps:
Benefits of DORA compliance
Compliance with DORA can provide a number of benefits to financial institutions, including:
Conclusion
DORA is a significant piece of legislation that will have a major impact on the EU financial sector. Financial institutions must take steps to comply with DORA in order to reduce operational risk, improve business continuity, enhance cybersecurity, and increase customer confidence.
Published: Thu, 16 Jan 2025 17:09:00 GMT
On January 14, 2021, President Biden signed an executive order on cybersecurity, titled “Improving the Nation’s Cybersecurity.” The order follows a series of high-profile cyberattacks on US government agencies and private companies, including the SolarWinds attack and the Microsoft Exchange hack.
The order directs the federal government to take a number of steps to improve cybersecurity, including:
The order also directs CISA to develop a plan for responding to major cyberattacks.
The order is a significant step forward in improving cybersecurity in the United States. It provides the federal government with the authority and resources it needs to protect the nation from cyberattacks.
The order was signed just days before President Trump left office. Trump had repeatedly downplayed the threat of cyberattacks, and his administration had been criticized for its response to the SolarWinds attack.
The Biden administration has made cybersecurity a priority, and the new executive order is a sign of that commitment. The order will help to protect the United States from cyberattacks and improve the nation’s cybersecurity posture.
Published: Thu, 16 Jan 2025 16:03:00 GMT
Understanding the Threat
Star Blizzard is a Russian threat actor group known for its targeted spear-phishing attacks. According to a recent report, the group has shifted its tactics to WhatsApp, a popular messaging platform. This pivot highlights the evolving nature of cyber threats and the need for organizations to stay vigilant.
WhatsApp as a Spear-Phishing Vector
WhatsApp offers several advantages for spear-phishing attacks:
Star Blizzard’s WhatsApp Attack
In the recent campaign, Star Blizzard sent malicious messages to WhatsApp users posing as job recruiters from legitimate companies. The messages contained job offers that directed victims to a fake landing page where they were prompted to enter sensitive information, such as their personal and financial details.
Once victims entered their information, the cybercriminals used it to steal identities, access financial accounts, and carry out fraud.
Protecting Against WhatsApp Spear-Phishing
Organizations and individuals can take steps to protect themselves from WhatsApp spear-phishing attacks:
Conclusion
Star Blizzard’s pivot to WhatsApp in spear-phishing attacks demonstrates the adaptability and persistence of cybercriminals. By leveraging the platform’s popularity, trust, and encryption, the group aims to trick victims into compromising their sensitive information. Organizations and individuals need to remain vigilant and adopt best practices to protect themselves against these evolving threats.
Published: Thu, 16 Jan 2025 09:17:00 GMT
Almost half of UK banks set to miss DORA deadline
A survey conducted by industry body UK Finance has found that almost half of UK banks are set to miss the deadline for implementing the Digital Operational Resilience Act (DORA).
DORA is a new EU regulation that aims to improve the operational resilience of the financial sector by requiring firms to take steps to identify, manage and recover from operational risks. The regulation comes into force on 1 January 2025, but firms must start preparing for it now.
The UK Finance survey found that only 53% of banks are on track to implement DORA by the deadline. The remaining 47% are either behind schedule or have not yet started preparing.
The survey also found that banks are facing a number of challenges in implementing DORA, including:
Despite the challenges, UK Finance is urging banks to start preparing for DORA as soon as possible. The body has published a number of resources to help firms with their implementation, including a guidance note and a self-assessment tool.
What is DORA?
DORA is a new EU regulation that aims to improve the operational resilience of the financial sector. The regulation comes into force on 1 January 2025, but firms must start preparing for it now.
DORA introduces a number of new requirements for firms, including:
Why is DORA important?
DORA is important because it will help to improve the operational resilience of the financial sector. This will make the financial sector more resilient to shocks, such as cyber attacks, natural disasters and pandemics.
How can firms prepare for DORA?
Firms can prepare for DORA by:
What are the challenges of implementing DORA?
Firms are facing a number of challenges in implementing DORA, including:
What resources are available to help firms with DORA?
UK Finance has published a number of resources to help firms with their DORA implementation, including:
Conclusion
DORA is a new EU regulation that will have a significant impact on the financial sector. Firms need to start preparing for DORA now to ensure that they are compliant by the deadline.
Published: Wed, 15 Jan 2025 10:26:00 GMT
Cybersecurity and AI: A Synergistic Force in Corporate IT Investment
In the rapidly evolving landscape of technology, cybersecurity and artificial intelligence (AI) have emerged as linchpins of corporate IT investment. Their convergence is poised to shape the future of cybersecurity and drive significant IT spending in the years to come.
Cybersecurity: An Evolving Challenge
The threat landscape is constantly evolving, with cybercriminals employing increasingly sophisticated techniques to compromise systems and steal sensitive data. This poses a major challenge for organizations, as they struggle to keep pace with the relentless attacks.
AI: A Game-Changer in Cybersecurity
AI, with its ability to analyze vast amounts of data, identify patterns, and automate processes, is transforming cybersecurity. It enables organizations to:
Convergence of Cybersecurity and AI
The synergy between cybersecurity and AI is driving significant IT investment in 2025 and beyond. Organizations are increasingly recognizing the benefits of integrating AI into their cybersecurity architectures.
Key Investment Areas
Corporations are allocating funds to the following key areas:
Benefits of Investing in Cybersecurity and AI
The convergence of cybersecurity and AI offers numerous benefits to organizations, including:
Conclusion
Cybersecurity and AI are inextricably linked and are poised to dominate corporate IT investment in 2025 and beyond. By leveraging the power of AI, organizations can significantly enhance their cybersecurity posture, reduce risks, and drive innovation. The convergence of these technologies is a transformative force that will shape the future of corporate IT.
Published: Wed, 15 Jan 2025 09:14:00 GMT
Users Protest, Flee TikTok as Clock Ticks on US Ban
As the deadline for a potential US ban on TikTok looms, users are expressing their concerns and taking action.
Protests and Petitions
Numerous protests and online petitions have been organized in support of TikTok. Users have taken to social media and digital platforms to voice their opposition to the ban. One petition on Change.org has garnered over 2 million signatures.
Exodus to Other Platforms
Users are also fleeing TikTok in droves. Alternative video-sharing apps such as Triller, Byte, and Likee have seen a surge in downloads as TikTok users seek new platforms to express their creativity.
TikTok’s Response
TikTok has vehemently denied the allegations that it shares user data with the Chinese government. The company has stated that it will fight the ban in court if necessary.
Government Deadline
The US government has set a deadline of September 15th for TikTok to sell its American operations to a US-based company. If a deal is not reached, the app will be banned in the United States.
Implications for Content Creators
The ban would have a significant impact on TikTok’s vast community of content creators. Many creators rely on the platform for their livelihood and have built large followings.
Concerns about Censorship
Critics argue that the ban is politically motivated and will stifle free speech. They fear that it will set a precedent for further government censorship of online content.
Economic Consequences
A TikTok ban would also have economic consequences. TikTok employs thousands of people in the United States and generates significant revenue through advertising.
Uncertainty and Speculation
As the clock ticks down, there is still much uncertainty about the fate of TikTok in the United States. The outcome of any legal challenge or negotiations with potential buyers remains to be seen.
Published: Wed, 15 Jan 2025 09:00:00 GMT
Password cracking is the process of recovering passwords from data that has been stored in or transmitted by a computer system. This can be done by using a variety of techniques, including:
Password cracking is a serious threat to computer security, as it can allow attackers to gain access to sensitive data and systems. To protect your passwords from being cracked, you should:
Published: Wed, 15 Jan 2025 09:00:00 GMT
Microsoft Releases Largest Patch Tuesday Update in Years, Addressing 159 Vulnerabilities
Microsoft has released its monthly Patch Tuesday security updates, which include fixes for 159 vulnerabilities across various software products and services. This is the largest number of vulnerabilities addressed by a Patch Tuesday update in recent years.
Critical Vulnerabilities Patched
Among the patched vulnerabilities, Microsoft has highlighted nine as critical, including:
Impact and Mitigation
These vulnerabilities could allow attackers to gain elevated privileges, execute arbitrary code, or compromise sensitive information. Microsoft strongly recommends installing the updates immediately to mitigate these risks.
Affected Products
The Patch Tuesday updates cover a wide range of Microsoft products, including:
Additional Security Updates
In addition to the security updates, Microsoft also released updates for non-security issues and stability improvements, such as:
Importance of Patching
Microsoft Patch Tuesday updates are critical for maintaining the security and stability of your systems. Businesses and individuals are advised to apply these updates without delay to protect their networks from potential threats.
Published: Wed, 15 Jan 2025 05:00:00 GMT
Headlines:
Summary:
At the 2025 World Economic Forum in Davos, Switzerland, experts identified misinformation and disinformation as the most pressing global risks. The forum’s annual Global Risks Report highlighted the proliferation of false and misleading information on social media and other platforms as a major threat to societies, economies, and international stability.
Key Findings:
Recommendations:
The World Economic Forum urged governments, businesses, and civil society to take urgent action to address the misinformation crisis. Key recommendations included:
Impact:
The World Economic Forum’s findings underscore the growing concern over the impact of misinformation and disinformation on society. It is expected to lead to increased awareness, policy changes, and collaborative efforts to combat these threats.
Additional Information:
Published: Tue, 14 Jan 2025 12:00:00 GMT
Barings Law Exhorts 15,000 Claimants against Google and Microsoft
Barings Law, a London-based law firm, has recently announced its intention to file a Competition Claim against Google and Microsoft on behalf of 15,000 claimants. The lawsuit alleges that the two tech giants have engaged in anti-competitive practices that have harmed businesses and consumers.
Allegations of Anti-Competitive Practices
The lawsuit alleges that Google and Microsoft have:
Damages Claimed
Barings Law claims that the anti-competitive practices of Google and Microsoft have resulted in significant harm to businesses and consumers. The lawsuit seeks damages in excess of £2 billion (approximately $2.7 billion).
Impact on Businesses and Consumers
The Competition Claim has potentially significant implications for businesses and consumers. If successful, the lawsuit could lead to:
Barings Law’s Track Record
Barings Law has a successful track record in bringing Competition Claims. In 2021, the firm secured a £52 million (approximately $71 million) settlement from Mastercard for allegedly abusing its market position in the UK.
Next Steps
The Competition Claim against Google and Microsoft is still in its early stages. Barings Law is currently seeking claimants to join the action. The firm has set up a dedicated website where potential claimants can register their interest.
The outcome of the lawsuit could have a significant impact on the tech industry and the online economy as a whole.
Published: Tue, 14 Jan 2025 04:30:00 GMT
Many are called, but few are chosen: Secrets of MI5 watchers revealed
MI5, the UK’s domestic intelligence service, has been secretly watching thousands of people for decades, according to a new book.
The book, The Secret History of MI5, by investigative journalist Tim Shipman, reveals that MI5 has been using a variety of methods to spy on people, including phone tapping, email interception, and surveillance.
Shipman writes that MI5 has been watching people for a variety of reasons, including suspected terrorism, espionage, and financial crime. He also reveals that MI5 has been targeting people who pose no threat to national security, including human rights activists and journalists.
The book’s revelations have raised concerns about the extent of MI5’s powers and the lack of oversight of its activities.
MI5’s secret watchers
MI5 is responsible for protecting the UK from national security threats. It has a wide range of powers to investigate suspected terrorists, spies, and other criminals.
One of MI5’s most controversial powers is its ability to watch people without their knowledge or consent. This power is known as covert surveillance.
Covert surveillance can involve a variety of methods, including phone tapping, email interception, and surveillance. MI5 can also use covert surveillance to track people’s movements and activities.
The scale of MI5’s surveillance
Shipman’s book reveals that MI5 has been using covert surveillance on a massive scale. He writes that MI5 has been watching thousands of people for decades.
The people who have been watched by MI5 include suspected terrorists, spies, and other criminals. However, MI5 has also been watching people who pose no threat to national security, including human rights activists and journalists.
The lack of oversight of MI5’s activities
MI5’s activities are overseen by a number of bodies, including the Home Secretary, the Intelligence and Security Committee (ISC), and the Investigatory Powers Tribunal (IPT).
However, these bodies have been criticized for being too weak to effectively oversee MI5’s activities.
The ISC is a parliamentary committee that is responsible for scrutinizing the work of MI5 and the other intelligence agencies. However, the ISC has been criticized for being too close to the intelligence agencies and for failing to hold them to account.
The IPT is a tribunal that is responsible for reviewing the use of investigatory powers by the intelligence agencies. However, the IPT has been criticized for being too slow and for failing to provide effective redress for people who have been spied on unlawfully.
The concerns about MI5’s surveillance
The revelations in Shipman’s book have raised concerns about the extent of MI5’s powers and the lack of oversight of its activities.
Critics argue that MI5 has been given too much power to spy on people without their knowledge or consent. They also argue that the oversight of MI5’s activities is too weak and that there is a lack of accountability for the intelligence agencies.
The government has defended MI5’s use of covert surveillance, arguing that it is necessary to protect national security. However, the government has also acknowledged that there is a need for greater oversight of MI5’s activities.
The debate about the extent of MI5’s powers and the need for oversight is likely to continue for some time.
Published: Mon, 13 Jan 2025 19:01:00 GMT
UK Government Plans to Extend Ransomware Payment Ban
The UK government is planning to extend its ban on paying ransoms to cybercriminals in an effort to deter attacks.
The government’s current ban, introduced in 2020, applies to public sector organisations. However, the new plans would extend the ban to the private sector as well.
The move comes as ransomware attacks have become increasingly common and costly. In 2021, ransomware attacks cost UK businesses an estimated £3.1 billion.
The government believes that paying ransoms encourages cybercriminals to continue attacking UK organisations. It is also concerned that paying ransoms can give criminals access to sensitive data, such as customer information and trade secrets.
The new plans would give the government the power to impose fines on organisations that pay ransoms. The government would also be able to seize the assets of organisations that are found to be involved in ransomware payments.
The government’s plans have been welcomed by some in the cybersecurity industry. However, others have raised concerns that the ban could make it more difficult for organisations to recover from ransomware attacks.
The government has said that it is working closely with businesses and cybersecurity experts to develop guidance on how to deal with ransomware attacks without paying ransoms.
Key points
Published: Mon, 13 Jan 2025 16:34:00 GMT
Protect Critical Infrastructure and Essential Services
Safeguard Sensitive Data
Mitigate Ransomware and Malware Attacks
Prevent Identity Theft and Fraud
Foster Public Trust
Promote Innovation and Investment
Align with International Standards
Address Emerging Threats
Foster Collaboration and Information Sharing
Enforce Penalties and Deterrence
Published: Mon, 13 Jan 2025 11:56:00 GMT
12 Questions CNI Operators Should Ask of Their OT Suppliers:
Experience and Expertise: How long have you been providing OT services in the CNI industry, and what is your track record of successful projects?
Technology Integration: How well do your solutions integrate with our existing CNI systems and infrastructure?
Scalability and Flexibility: Can your OT solutions scale to meet our growing network demands and handle unexpected network changes?
Network Management and Optimization: What tools and methodologies do you offer for proactive monitoring, management, and optimization of our CNI networks?
Security and Compliance: How do your solutions ensure network security, access control, and compliance with industry standards and regulations?
Vendor Lock-in: Are your solutions vendor-neutral and provide open interfaces for integration with third-party tools or systems?
Customer Support and Service Level Agreements (SLAs): What level of support can we expect, including response times, availability, and escalation procedures?
Training and Knowledge Transfer: Do you provide training and support to our team to build and maintain operational expertise?
Cost-Effectiveness: How do your solutions align with our budget and provide a reasonable return on investment?
Innovation and Future-Proofing: How do your solutions stay up-to-date with industry trends and technological advancements?
Proof of Concept (POC): Are you willing to provide a POC to demonstrate the capabilities and value of your solutions before committing to a full contract?
Customer References: Can you provide references from satisfied customers who can attest to the success of your OT services?
Published: Mon, 13 Jan 2025 10:25:00 GMT
Can the UK Government Achieve its Ambition to Become an AI Powerhouse?
The UK government has stated its ambition to become an AI powerhouse by 2030. This goal is outlined in the National AI Strategy, which aims to make the UK a global leader in artificial intelligence (AI) research, development, and adoption.
Challenges
The UK faces several challenges in meeting this ambition:
Progress
Despite these challenges, the UK government has made some progress towards its AI ambition:
Outlook
It is too early to say whether the UK government will achieve its ambition to become an AI powerhouse by 2030. The government has made some progress, but it faces significant challenges.
Recommendations
The UK government should take the following steps to increase its chances of success:
Conclusion
The UK has the potential to become an AI powerhouse, but it will require a sustained effort from government, industry, and academia. By addressing the challenges outlined above and taking the necessary steps, the UK can position itself as a global leader in AI.
Published: Mon, 13 Jan 2025 04:00:00 GMT
Preparing for AI Regulation: The EU AI Act
Introduction
The European Union (EU) is at the forefront of global efforts to regulate Artificial Intelligence (AI) with the proposed AI Act. This comprehensive legislation aims to ensure the safety, fairness, and ethical use of AI technologies within the EU.
Key Provisions of the EU AI Act
Implications for Businesses
The EU AI Act will have significant implications for businesses that develop, deploy, or use AI systems within the EU:
Preparing for Compliance
Businesses can prepare for the EU AI Act by taking the following steps:
Benefits of the EU AI Act
While the EU AI Act may impose additional compliance burdens, it also offers potential benefits:
Conclusion
The EU AI Act is a landmark piece of legislation that is shaping the global landscape for AI regulation. Businesses operating within the EU must prepare for its implications by conducting risk assessments, developing compliance plans, and engaging with stakeholders. By doing so, they can mitigate risks and unlock the benefits of responsible and ethical AI.
Published: Fri, 10 Jan 2025 11:30:00 GMT
US Bank FNBO Adopts Pindrop Technology for Enhanced Fraud Prevention
First National Bank of Omaha (FNBO) has implemented Pindrop, a leading provider of voice security and fraud prevention solutions, to strengthen its defenses against voice fraud and deepfakes.
Addressing the Rising Threat of Voice Fraud
Voice fraud, including deepfakes, has become increasingly prevalent in recent years. Fraudsters use sophisticated techniques to mimic the voices of legitimate customers and trick banks into authorizing fraudulent transactions.
Pindrop’s Voice Verification Technology
Pindrop’s technology employs advanced machine learning algorithms to analyze voice characteristics and identify potential fraudsters. The solution provides real-time fraud detection during phone banking interactions.
Detecting Deepfakes and Spoofing
Pindrop’s technology is specifically designed to detect deepfakes and spoofing attempts. By analyzing voice patterns, intonation, and other vocal cues, the solution can distinguish between genuine customers and fraudsters.
Benefits for FNBO Customers
FNBO customers will benefit from the following advantages:
Statement from FNBO
“We are committed to providing our customers with the highest level of security and fraud protection,” said Troy Whitmer, Chief Information Security Officer at FNBO. “Pindrop’s voice security solution is a valuable addition to our arsenal of fraud prevention tools.”
Pindrop’s Commitment to Innovation
Pindrop is a recognized leader in the voice security industry. The company continuously invests in research and development to stay ahead of evolving fraud techniques.
“We are excited to partner with FNBO to combat voice fraud and deepfakes,” said Vijay Balasubramaniyan, CEO of Pindrop. “Our technology will provide FNBO with the necessary tools to safeguard its customers’ accounts.”
Published: Fri, 10 Jan 2025 09:45:00 GMT
Chinese Cyber Spying Group Exploits Ivanti Zero-Day Vulnerabilities
Security firm Mandiant has revealed that a Chinese state-sponsored cyber espionage group, tracked as UNC2452 or APT41, has been actively exploiting zero-day vulnerabilities in Ivanti software. These vulnerabilities could allow attackers to remotely execute code and gain complete control over affected systems.
Vulnerabilities Targeted by APT41
The affected Ivanti products include:
Exploitation of these vulnerabilities could provide APT41 with the ability to:
Mitigation Measures
Ivanti has released security updates to address these vulnerabilities. Users of affected products are strongly advised to apply these updates immediately.
Additionally, the following mitigation measures are recommended:
APT41: A Persistent Threat
APT41 is a highly skilled cyber espionage group that has been linked to the Chinese government. The group has been active for over a decade and has targeted various industries, including technology, healthcare, and government. APT41 is known for its sophisticated tactics and its use of zero-day and spear-phishing attacks.
Conclusion
The exploitation of Ivanti zero-day vulnerabilities by APT41 highlights the importance of maintaining good cyber hygiene and promptly addressing security updates. Organizations should remain vigilant and take proactive steps to protect their networks from advanced cyber threats.
Published: Sun, 19 Jan 2025 00:16:11 GMT
Published: Sun, 19 Jan 2025 00:06:55 GMT
Published: Sat, 18 Jan 2025 22:51:27 GMT
Published: Sat, 18 Jan 2025 14:01:29 GMT
Published: Sat, 18 Jan 2025 13:47:46 GMT
Published: Sat, 18 Jan 2025 13:35:19 GMT
Published: Sat, 18 Jan 2025 13:20:17 GMT
Published: Sat, 18 Jan 2025 13:02:00 GMT
Published: Sat, 18 Jan 2025 12:50:52 GMT
Published: Sat, 18 Jan 2025 12:43:14 GMT
Published: Sat, 18 Jan 2025 09:52:28 GMT
Published: Sat, 18 Jan 2025 09:50:48 GMT
Published: Sat, 18 Jan 2025 09:50:01 GMT
Published: Sat, 18 Jan 2025 02:19:55 GMT
Published: Sat, 18 Jan 2025 01:13:01 GMT
Published: Sat, 18 Jan 2025 01:06:09 GMT
Published: Fri, 17 Jan 2025 22:46:24 GMT
Published: Fri, 17 Jan 2025 20:35:29 GMT
Published: Fri, 17 Jan 2025 20:09:51 GMT
Published: Fri, 17 Jan 2025 19:56:23 GMT
Published: Fri, 17 Jan 2025 19:51:31 GMT
Published: Fri, 17 Jan 2025 19:00:37 GMT
Published: Fri, 17 Jan 2025 18:53:23 GMT
Published: Fri, 17 Jan 2025 18:47:13 GMT
Published: Fri, 17 Jan 2025 18:44:28 GMT
Published: Fri, 17 Jan 2025 18:14:37 GMT
Published: Fri, 17 Jan 2025 18:07:38 GMT
Published: Fri, 17 Jan 2025 17:56:14 GMT
Published: Fri, 17 Jan 2025 17:18:34 GMT
Published: Fri, 17 Jan 2025 16:57:00 GMT
Published: Fri, 17 Jan 2025 16:23:07 GMT
Published: Fri, 17 Jan 2025 16:09:14 GMT
Published: Fri, 17 Jan 2025 16:07:51 GMT
Published: Fri, 17 Jan 2025 14:50:51 GMT
Published: Fri, 17 Jan 2025 13:52:36 GMT
Published: Fri, 17 Jan 2025 13:19:46 GMT
Published: Fri, 17 Jan 2025 13:11:32 GMT
Published: Fri, 17 Jan 2025 12:58:48 GMT
Published: Fri, 17 Jan 2025 11:50:31 GMT
Published: Fri, 17 Jan 2025 11:21:17 GMT
Published: Fri, 17 Jan 2025 11:04:24 GMT
Published: Fri, 17 Jan 2025 10:36:57 GMT
Published: Fri, 17 Jan 2025 09:06:16 GMT
Published: Fri, 17 Jan 2025 09:02:10 GMT
Published: Fri, 17 Jan 2025 07:49:13 GMT
Published: Fri, 17 Jan 2025 06:30:27 GMT
Published: Fri, 17 Jan 2025 06:12:25 GMT
Published: Fri, 17 Jan 2025 05:14:44 GMT
Published: Fri, 17 Jan 2025 03:48:28 GMT
Published: Fri, 17 Jan 2025 03:45:15 GMT
Published: Fri, 17 Jan 2025 02:15:37 GMT
Published: Fri, 17 Jan 2025 01:12:43 GMT
Published: Thu, 16 Jan 2025 23:03:45 GMT
Published: Thu, 16 Jan 2025 23:00:09 GMT
Published: Thu, 16 Jan 2025 22:56:18 GMT
Published: Thu, 16 Jan 2025 22:52:47 GMT
Published: Thu, 16 Jan 2025 21:54:27 GMT
Published: Thu, 16 Jan 2025 21:41:35 GMT
Published: Thu, 16 Jan 2025 21:31:32 GMT
Published: Thu, 16 Jan 2025 21:29:32 GMT
Published: Thu, 16 Jan 2025 21:05:21 GMT
Published: Thu, 16 Jan 2025 20:56:43 GMT
Published: Thu, 16 Jan 2025 20:38:34 GMT
Published: Thu, 16 Jan 2025 20:31:34 GMT
Published: Thu, 16 Jan 2025 20:20:39 GMT
Published: Thu, 16 Jan 2025 20:11:01 GMT
Published: Thu, 16 Jan 2025 19:57:33 GMT
Published: Thu, 16 Jan 2025 19:53:48 GMT
Published: Thu, 16 Jan 2025 19:47:25 GMT
Published: Thu, 16 Jan 2025 19:41:23 GMT
Published: Thu, 16 Jan 2025 19:26:54 GMT
Published: Thu, 16 Jan 2025 18:49:36 GMT
Published: Thu, 16 Jan 2025 18:45:07 GMT
Published: Thu, 16 Jan 2025 18:43:05 GMT
Published: Thu, 16 Jan 2025 18:39:28 GMT
Published: Thu, 16 Jan 2025 18:34:13 GMT
Published: Thu, 16 Jan 2025 18:18:35 GMT
Published: Thu, 16 Jan 2025 17:55:57 GMT
Published: Thu, 16 Jan 2025 17:38:41 GMT
Published: Thu, 16 Jan 2025 17:15:18 GMT
Published: Thu, 16 Jan 2025 17:07:11 GMT
Published: Thu, 16 Jan 2025 17:05:16 GMT
Published: Thu, 16 Jan 2025 16:53:14 GMT
Published: Thu, 16 Jan 2025 16:41:45 GMT
Published: Thu, 16 Jan 2025 16:37:37 GMT
Published: Thu, 16 Jan 2025 16:26:13 GMT
Published: Thu, 16 Jan 2025 16:21:58 GMT
Published: Thu, 16 Jan 2025 15:52:52 GMT
Published: Thu, 16 Jan 2025 15:13:59 GMT
Published: Thu, 16 Jan 2025 15:04:55 GMT
Published: Thu, 16 Jan 2025 14:57:33 GMT
Published: Thu, 16 Jan 2025 14:31:22 GMT
Published: Thu, 16 Jan 2025 14:09:19 GMT
Published: Thu, 16 Jan 2025 14:00:01 GMT
Published: Thu, 16 Jan 2025 13:35:11 GMT
Published: Thu, 16 Jan 2025 11:37:18 GMT
Published: Thu, 16 Jan 2025 10:45:13 GMT
Published: Thu, 16 Jan 2025 10:33:23 GMT
Published: Thu, 16 Jan 2025 10:29:59 GMT
Published: Thu, 16 Jan 2025 09:36:32 GMT
Published: Thu, 16 Jan 2025 09:03:37 GMT
Published: Thu, 16 Jan 2025 08:54:26 GMT
Published: Thu, 16 Jan 2025 05:09:46 GMT
Published: Wed, 15 Jan 2025 22:33:10 GMT
Published: Wed, 15 Jan 2025 21:56:16 GMT
Published: Wed, 15 Jan 2025 21:53:45 GMT
Published: Wed, 15 Jan 2025 21:52:02 GMT
Published: Wed, 15 Jan 2025 21:45:15 GMT
Published: Wed, 15 Jan 2025 21:39:11 GMT
Published: Wed, 15 Jan 2025 21:32:32 GMT
Published: Wed, 15 Jan 2025 21:13:47 GMT
Published: Wed, 15 Jan 2025 21:04:00 GMT
Published: Wed, 15 Jan 2025 21:01:54 GMT
Published: Wed, 15 Jan 2025 20:59:25 GMT
Published: Wed, 15 Jan 2025 20:52:44 GMT
Published: Wed, 15 Jan 2025 20:46:12 GMT
Published: Wed, 15 Jan 2025 19:57:15 GMT
Published: Wed, 15 Jan 2025 19:17:35 GMT
Published: Wed, 15 Jan 2025 17:52:46 GMT
Published: Wed, 15 Jan 2025 17:21:58 GMT
Published: Wed, 15 Jan 2025 16:30:12 GMT
Published: Wed, 15 Jan 2025 16:17:35 GMT
Published: Wed, 15 Jan 2025 16:07:20 GMT
Published: Wed, 15 Jan 2025 16:05:02 GMT
Published: Wed, 15 Jan 2025 15:58:59 GMT
Published: Wed, 15 Jan 2025 15:47:22 GMT
Published: Wed, 15 Jan 2025 15:46:42 GMT
Published: Wed, 15 Jan 2025 15:21:26 GMT
Published: Wed, 15 Jan 2025 15:00:40 GMT
Published: Wed, 15 Jan 2025 14:56:21 GMT
Published: Wed, 15 Jan 2025 14:33:23 GMT
Published: Wed, 15 Jan 2025 14:24:09 GMT
Published: Wed, 15 Jan 2025 13:50:31 GMT
Published: Wed, 15 Jan 2025 13:06:25 GMT
Published: Wed, 15 Jan 2025 12:57:00 GMT
Published: Wed, 15 Jan 2025 12:07:34 GMT
Published: Wed, 15 Jan 2025 12:03:43 GMT
Published: Wed, 15 Jan 2025 11:50:36 GMT
Published: Wed, 15 Jan 2025 11:40:36 GMT
Published: Wed, 15 Jan 2025 11:31:26 GMT
Published: Wed, 15 Jan 2025 11:20:42 GMT
Published: Wed, 15 Jan 2025 11:12:00 GMT
Published: Wed, 15 Jan 2025 11:11:54 GMT
Published: Wed, 15 Jan 2025 11:06:01 GMT
Published: Wed, 15 Jan 2025 09:36:44 GMT
Published: Wed, 15 Jan 2025 06:41:52 GMT
Published: Wed, 15 Jan 2025 06:16:51 GMT
Published: Wed, 15 Jan 2025 06:10:01 GMT
Published: Wed, 15 Jan 2025 05:55:48 GMT
Published: Wed, 15 Jan 2025 05:51:14 GMT
Published: Mon, 04 Oct 2021 20:37:00 GMT
Author: Joe Berger
Moving to a hybrid work model presents a number of challenges for companies. Here’s how IT leaders can help overcome obstacles and support success.
Published: Wed, 31 Oct 2018 18:07:00 GMT
Author: Paul Crocetti
Cyber resilience is increasingly a must for company executives. IBM’s Andrea Sayles details the latest threats, as well as best practices for how to be prepared for attacks.
Published: Thu, 29 Mar 2018 18:00:00 GMT
Author: Nicole Laskowski
Carnegie Mellon University’s Chris Harrison talks about the future of the user interface in this episode of ‘Schooled in AI.’
Published: Fri, 23 Feb 2018 14:23:00 GMT
Author: Nicole Laskowski
AI cyberattacks won’t be particularly clever; instead, they’ll be fast and fierce. Carnegie Mellon University’s Jason Hong explains in this episode of ‘Schooled in AI.’
Published: Tue, 23 Jan 2018 17:00:00 GMT
Author: Nicole Laskowski
In this episode of ‘Schooled in AI,’ Andrew Moore, dean of the School of Computer Science at Carnegie Mellon University, talks about the benefits of the AI stack.
Published: Fri, 17 Jan 2025 15:21:00 GMT
False. The US Supreme Court has not upheld a TikTok ban.
Published: Fri, 17 Jan 2025 07:33:00 GMT
Cyber Innovation to Combat Regulatory and Threat Challenges
Regulatory Burdens
Threat Landscape
Specific Innovations
Benefits of Cyber Innovation
Conclusion
Cyber innovation is essential for organizations to navigate the evolving regulatory landscape and mitigate the growing threat burden. By embracing advanced technologies and leveraging innovative solutions, organizations can strengthen their cybersecurity posture, reduce risks, and gain a competitive advantage in the digital age.
Published: Fri, 17 Jan 2025 04:30:00 GMT
DORA Compliance Guide
1. Introduction
DevOps Research and Assessment (DORA) is a framework that measures and improves the performance of software delivery teams. DORA compliance demonstrates a team’s ability to deliver high-quality software quickly and reliably.
2. DORA Metrics
The four key DORA metrics are:
3. DORA Compliance Levels
DORA has defined four levels of compliance:
4. How to Achieve DORA Compliance
5. Benefits of DORA Compliance
6. Implementation Plan
Conclusion
DORA compliance is a valuable goal for any software delivery team. By adopting DevOps practices, measuring progress, and establishing a culture of excellence, teams can significantly improve their performance and deliver high-quality software quickly and reliably.
Published: Thu, 16 Jan 2025 17:09:00 GMT
Biden Signs New Cyber Order to Strengthen National Cybersecurity
Executive Summary:
On January 12, 2021, President Biden signed a new cybersecurity executive order aimed at enhancing the resilience and security of the nation’s critical infrastructure against cyber threats. The order builds on previous cybersecurity initiatives and focuses on modernizing federal cybersecurity defenses and improving information sharing between the public and private sectors.
Key Provisions:
1. Strengthening Federal Cybersecurity:
2. Improving Information Sharing:
3. Enhancing Workforce Development:
4. Modernizing Technology and Infrastructure:
5. Strengthening International Partnerships:
Significance:
The new cyber order represents a significant step forward in enhancing the nation’s cybersecurity posture. It addresses key vulnerabilities in federal networks, improves collaboration between different stakeholders, and promotes the development of a more skilled workforce. The order is also timely, given the increasing sophistication and frequency of cyber threats.
Implementation:
The order directs federal agencies to implement the provisions within 180 days. CISA will play a lead role in coordinating and overseeing the implementation of the order.
Conclusion:
Biden’s new cyber order is a comprehensive and necessary step to strengthen the nation’s cybersecurity. It provides a roadmap for modernizing federal defenses, improving information sharing, and addressing the growing challenges posed by cyber threats. The order is expected to have a significant impact on cybersecurity practices in both the public and private sectors.
Published: Thu, 16 Jan 2025 16:03:00 GMT
Russia’s Star Blizzard Pivots to WhatsApp in Spear-Phishing Campaign
Overview:
Russia’s Star Blizzard espionage group has shifted its spear-phishing tactics to WhatsApp, targeting individuals connected to Eastern European government and military entities.
Details:
Motive:
Star Blizzard is a known Russian espionage group with a history of targeting military and government entities in Eastern Europe. The group’s primary motivation is to gather sensitive information for strategic or tactical advantage.
Consequences:
The Star Blizzard WhatsApp phishing campaign poses significant risks to targeted individuals and organizations:
Prevention and Mitigation:
To mitigate the threat posed by the Star Blizzard WhatsApp phishing campaign, individuals and organizations should take the following steps:
Published: Thu, 16 Jan 2025 09:17:00 GMT
Almost half of UK banks set to miss DORA deadline
Commentary
The findings of this report are concerning, as they suggest that a significant number of UK banks are not prepared for the DORA deadline. This could have a number of implications, including increased operational risks for banks, higher costs of compliance, and reputational damage.
It is important that banks take steps to prepare for DORA as soon as possible. This includes understanding the requirements of the regulation, making necessary changes to their IT systems, and developing a plan to manage third-party risks.
Banks should also consider working with compliance and risk technology providers to help them with the implementation of DORA. These providers can offer a range of solutions to help banks meet the requirements of the regulation, including software to manage IT risks, business continuity planning tools, and third-party risk management solutions.
By taking steps to prepare for DORA, banks can help to ensure that they are compliant with the new regulation and that they are able to withstand operational disruptions.
Published: Wed, 15 Jan 2025 10:26:00 GMT
Cybersecurity and AI: A Powerful Convergence Driving Corporate IT Investment
As organizations navigate the rapidly evolving threat landscape, cybersecurity and artificial intelligence (AI) are emerging as indispensable partners in protecting critical data and systems. This convergence is poised to drive significant investment in corporate IT over the next several years.
Why Cybersecurity and AI Are Integral
Cyber threats are becoming increasingly sophisticated and automated, making it imperative for businesses to adopt new strategies to combat them. AI offers a transformative solution by automating many aspects of cybersecurity operations, enabling organizations to detect and respond to threats faster and more effectively.
AI’s Role in Cybersecurity
2025 IT Investment Projections
According to a recent study by Gartner, global spending on cybersecurity is expected to reach $170.4 billion by 2025. A significant portion of this investment will be allocated to AI-powered cybersecurity solutions.
Benefits of AI-Enhanced Cybersecurity
Conclusion
The convergence of cybersecurity and AI is revolutionizing the way organizations approach data protection. By harnessing the power of AI, companies can significantly enhance their security posture, reduce operational costs, and gain a competitive edge in today’s threat-filled landscape. As we approach 2025, investment in AI-enhanced cybersecurity is poised to become a strategic imperative for corporations seeking to protect their critical assets and maintain their reputation in the digital age.
Published: Wed, 15 Jan 2025 09:14:00 GMT
Users Protest, Flee TikTok as Clock Ticks on US Ban
As the deadline for a potential US ban on TikTok approaches, users are expressing their discontent and migrating to alternative platforms.
Protests and Petitions
Numerous TikTok users have participated in protests and online petitions to urge the Trump administration to reconsider its ban. They argue that the app provides a creative outlet, fosters community, and brings joy to people’s lives.
Mass Migration
Fearing the loss of their beloved platform, many TikTok users are flocking to alternative apps such as Triller, Byte, and Instagram Reels. Some are also downloading third-party apps to transfer their TikTok videos and followers.
Content Creators Impacted
The potential ban is particularly concerning for TikTok content creators, some of whom have built significant followings and income streams on the app. They worry about losing their platforms and the opportunity to showcase their talents.
Political Pressure
The Trump administration has cited national security concerns as the reason behind the proposed ban, alleging that TikTok is collecting data on US users and sharing it with the Chinese government. TikTok denies these claims and insists that user data is not shared with any foreign entities.
Uncertain Future
As the September 15th deadline looms, the fate of TikTok in the US remains uncertain. Legal challenges and negotiations are ongoing, but it is unclear if the app will be able to continue operating in its current form.
Impact on the Industry
A TikTok ban could have a significant impact on the social media and entertainment industries. It would eliminate a major platform for short-form video content and affect millions of users and content creators worldwide.
Conclusion
As the countdown to the potential US ban on TikTok continues, users are expressing their concerns through protests and migrating to alternative platforms. Content creators and the industry at large are bracing for a possible shakeup in the social media landscape. The final outcome of this situation remains to be seen.
Published: Wed, 15 Jan 2025 09:00:00 GMT
Password cracking is the process of recovering passwords from data that has been stored in a computer system. This can be done by using a variety of techniques, such as brute-force attacks, dictionary attacks, and rainbow tables.
Brute-force attacks try every possible password until the correct one is found. This can be a very time-consuming process, but it is often the only way to crack a password that is not known to the attacker.
Dictionary attacks use a list of common words and phrases to try as passwords. This can be a much faster way to crack a password than brute-force attacks, but it is less likely to succeed if the password is not a common word or phrase.
Rainbow tables are pre-computed tables that contain the hashes of all possible passwords. This allows attackers to quickly look up the password for a given hash. Rainbow tables are only effective against passwords that are stored as hashes, but they can be very effective in this case.
Password cracking is a serious security risk, as it allows attackers to gain access to sensitive information, such as financial data and personal information. It is important to use strong passwords and to store them securely to protect yourself from this type of attack.
Published: Wed, 15 Jan 2025 09:00:00 GMT
Biggest Patch Tuesday in Years: Microsoft Addresses 159 Vulnerabilities
Microsoft’s February 2023 Patch Tuesday is the largest in recent history, addressing a staggering 159 vulnerabilities across various products. These include critical bugs in Windows, Office, Exchange Server, Edge, and other components.
Critical Vulnerabilities:
Exploited Vulnerabilities:
Microsoft confirmed that two vulnerabilities were already being actively exploited:
Other Notable Vulnerabilities:
Recommendations:
Microsoft strongly recommends that all users and organizations apply the latest security updates promptly to mitigate these vulnerabilities. It is also advised to enable automatic updates, use antivirus software, and maintain strong security practices.
Impact:
The large number of vulnerabilities addressed in this month’s Patch Tuesday highlights the ongoing threat landscape. Organizations and individuals must prioritize cybersecurity and take proactive measures to protect their systems and data from potential attacks.
Published: Wed, 15 Jan 2025 05:00:00 GMT
Davos 2025: Misinformation and Disinformation Emerge as Key Concerns
At the World Economic Forum (WEF) annual meeting in Davos, Switzerland, in 2025, experts and policymakers highlighted misinformation and disinformation as pressing risks to society.
Misinformation and Disinformation: A Growing Threat
Misinformation refers to false or inaccurate information that is unintentionally shared, while disinformation involves deliberately spreading false or misleading information. Both have become rampant in the age of social media and digital connectivity.
According to a survey conducted by the WEF, over 80% of respondents believe that misinformation and disinformation are major threats to democracy, trust, and stability.
Impact on Society
Misinformation and disinformation have wide-ranging negative consequences, including:
Addressing the Challenge
Addressing misinformation and disinformation requires a comprehensive approach involving:
Call to Action
The WEF called on participants to take collective action to combat misinformation and disinformation. This includes:
By addressing misinformation and disinformation, the world can safeguard democracy, protect trust, and create a more informed and resilient society.
Published: Tue, 14 Jan 2025 12:00:00 GMT
Barings Law enlists 15,000 claimants against Google and Microsoft
Law firm Barings Law has enlisted 15,000 claimants in a competition suit against Google and Microsoft, alleging that the tech giants have abused their dominant positions in the software market.
The case, filed with the UK Competition Appeal Tribunal, alleges that Google and Microsoft have illegally tied their products together, making it difficult for consumers to choose competing products. The claimants are seeking damages of up to £1 billion.
Barings Law claims that Google and Microsoft have used their dominant positions to stifle competition and drive up prices. The firm alleges that Google has tied its search engine to its Android operating system, making it difficult for consumers to use competing search engines. Microsoft, meanwhile, is accused of tying its Windows operating system to its Office software suite, making it difficult for consumers to use competing office software.
The case is the latest in a series of antitrust lawsuits filed against Google and Microsoft. In March, the EU fined Google €2.4 billion for abusing its dominant position in the online search market. In December 2020, the UK Competition and Markets Authority (CMA) fined Google £1.49 billion for the same offense.
Barings Law managing director Mark Layton said: “We believe that Google and Microsoft have abused their dominant positions in the software market, to the detriment of consumers. We are confident that our case will be successful, and that we will be able to recover significant damages for our clients.”
Google and Microsoft have not yet commented on the lawsuit.
Published: Tue, 14 Jan 2025 04:30:00 GMT
Many Are Called, but Few Are Chosen: Secrets of MI5 Watchers Revealed
Introduction
MI5, the British domestic security service, plays a crucial role in protecting the nation from threats. As part of its operations, it recruits and deploys watchers to observe individuals suspected of engaging in potential security risks. This article delves into the secretive world of MI5 watchers, unveiling their selection process, training, and methods to effectively carry out their covert surveillance operations.
Selection Process
The selection process for MI5 watchers is highly rigorous and competitive. Candidates undergo a thorough background check, including an assessment of their political, religious, and financial stability. They must possess keen observational skills, attention to detail, and the ability to work independently under pressure.
Additionally, candidates are assessed on their empathy, cultural awareness, and language abilities. MI5 seeks individuals who can blend seamlessly into different environments and effectively interact with people from diverse backgrounds.
Training
Once selected, MI5 watchers receive comprehensive training to equip them with the skills necessary for their covert surveillance operations. The training program includes instruction in:
Methods of Surveillance
MI5 watchers employ various methods to observe individuals under surveillance:
Challenges and Controversies
The work of MI5 watchers is not without its challenges and controversies. The covert nature of their operations raises concerns about privacy and civil liberties. There have been instances where innocent individuals have been wrongfully targeted for surveillance.
Furthermore, the use of electronic surveillance has come under scrutiny due to its potential for abuse and the erosion of privacy rights. MI5 has implemented strict safeguards to ensure that surveillance is only used in accordance with the law and to protect the public from genuine security threats.
Conclusion
MI5 watchers play a vital role in safeguarding the nation from potential security threats. Their rigorous selection process, comprehensive training, and effective surveillance methods enable them to conduct covert operations with professionalism and discretion. While their work involves challenges and ethical considerations, MI5 has a strong track record of protecting the nation’s security while respecting individual rights and freedoms.
Published: Mon, 13 Jan 2025 19:01:00 GMT
UK Government Plans to Extend Ransomware Payment Ban
London, [Date]
The UK government has announced plans to extend its ban on ransomware payments, making it illegal for businesses and individuals to pay ransoms to cybercriminals. The move comes in response to a sharp increase in ransomware attacks, which have cost UK organizations millions of pounds in recent years.
The current ban, introduced in May 2023, prohibits businesses and organizations from making payments to ransomware attackers. However, the government is now considering extending the ban to include individuals as well.
Key Features of the Proposed Extension
According to the government’s plans, the extended ban would:
Rationale for the Extension
The government believes that the extension of the ban is necessary to deter ransomware attacks and protect individuals and businesses from the financial and reputational damage associated with paying ransoms.
Home Secretary Priti Patel said: “Ransomware attacks are a serious threat to our national security and our economy. We are determined to make the UK a hostile environment for cybercriminals and protect our citizens and businesses from these despicable attacks.”
Impact on Businesses and Individuals
The extension of the ban is likely to have a significant impact on businesses and individuals who have been victims of ransomware attacks.
For businesses, it will mean that they will no longer be able to legally pay ransoms to recover their data or systems. This could lead to increased financial losses and reputational damage if they are unable to restore their operations.
For individuals, the ban could make it more difficult to recover their personal data if it is encrypted by ransomware. It is important for individuals to regularly back up their data to minimize the risk of losing it in a ransomware attack.
Advice for Businesses and Individuals
The government is urging businesses and individuals to take the following steps to protect themselves from ransomware attacks:
Conclusion
The UK government’s plans to extend the ransomware payment ban are part of a wider effort to combat cybercrime and protect the nation’s critical infrastructure. By making it illegal to pay ransoms, the government aims to deter ransomware attackers and make it more difficult for them to profit from their crimes.
Published: Mon, 13 Jan 2025 16:34:00 GMT
Protecting Critical Infrastructure and Services:
Protecting Personal Data and Privacy:
Countering Cyber Crime:
Promoting Innovation and Trust:
Strengthening International Cooperation:
Reducing Financial Losses:
Protecting National Security:
Enhancing Public Confidence:
Examples of Disruption in the UK Due to Cyberattacks:
These incidents highlight the urgent need for improved cyber regulation to protect the UK from the increasing threats posed by cyberattacks.
Published: Mon, 13 Jan 2025 11:56:00 GMT
12 Questions CNI Operators Should Ask OT Suppliers:
Published: Mon, 13 Jan 2025 10:25:00 GMT
Can the UK Government Achieve its Ambition to Become an AI Powerhouse?
The UK government has set an ambitious goal of becoming a global leader in artificial intelligence (AI). It has launched a number of initiatives to support this ambition, including the National AI Strategy and the AI Sector Deal.
There are a number of factors that will determine whether the UK can achieve its AI ambition. These include:
The UK government’s ambition to become an AI powerhouse is ambitious, but achievable. The government has put in place a number of initiatives to support this ambition, and there are a number of factors that will contribute to its success.
Key Strengths and Weaknesses:
Strengths:
Weaknesses:
Conclusion:
Whether the UK can achieve its AI ambition will depend on a number of factors, including investment, skills, collaboration, and regulation. However, the government has put in place a number of initiatives to support this ambition, and there are a number of factors that will contribute to its success.
Published: Mon, 13 Jan 2025 04:00:00 GMT
Preparing for AI Regulation: The EU AI Act
The European Union (EU) is at the forefront of developing comprehensive regulations for artificial intelligence (AI). The EU AI Act, proposed in 2021, seeks to establish a legal framework for the use, development, and deployment of AI systems.
Scope of the AI Act
The AI Act covers a wide range of AI applications, including:
Key Provisions
The AI Act introduces several key provisions to regulate AI, including:
Risk-Based Approach:
AI systems are classified into four risk categories based on their potential impact on society and human rights. Different requirements apply to each category.
Prohibited AI Systems:
Certain types of AI systems are prohibited, such as those that use subliminal techniques, manipulate people’s behavior, or enable mass surveillance.
Transparency and Accountability:
Users must be informed when they are interacting with an AI system. Developers must provide information about how the system works and how it was trained.
Algorithmic Fairness and Non-Discrimination:
AI systems must be designed to avoid bias and discrimination. Developers must take measures to ensure that the systems are fair and equitable.
Human Oversight:
Humans must be involved in the development, deployment, and oversight of high-risk AI systems. This includes having appropriate training and accountability mechanisms.
Fines and Penalties:
Violations of the AI Act can result in significant fines or other penalties.
Implications for Businesses
The AI Act will have a significant impact on businesses that develop, deploy, or use AI systems. Companies will need to:
Next Steps
The AI Act is currently under negotiation in the European Parliament and Council. It is expected to be adopted in 2023 or 2024. Businesses should start preparing now to comply with the Act’s requirements. This includes reviewing existing AI systems, developing compliance strategies, and investing in ethical AI development practices.
Conclusion
The EU AI Act represents a significant step towards regulating the use of AI in Europe. By establishing clear rules and requirements, the Act aims to promote the responsible development and deployment of AI while protecting fundamental rights and freedoms. Businesses and organizations that operate in the EU must be prepared to comply with the Act to avoid potential penalties and ensure the ethical use of AI.
Published: Fri, 10 Jan 2025 11:30:00 GMT
US bank FNBO uses Pindrop to tackle voice fraud, deepfakes
First National Bank of Omaha (FNBO) has deployed Pindrop’s Phoneprinting technology to combat voice fraud and deepfake attacks.
Phoneprinting is a patented technology that creates a unique digital fingerprint of a caller’s voice and device. This fingerprint is then used to identify and authenticate the caller, making it harder for fraudsters to impersonate legitimate customers.
FNBO is using Phoneprinting to protect its customers from a variety of voice fraud attacks, including account takeover, fraudulent transactions, and identity theft. The technology has been shown to be effective in detecting and preventing fraud, even in cases where the fraudsters are using deepfake technology to impersonate legitimate customers.
“Voice fraud is a growing problem for banks and other financial institutions,” said Kevin Ruesch, senior vice president and chief information security officer at FNBO. “Pindrop’s Phoneprinting technology gives us a powerful tool to combat this threat and protect our customers.”
Pindrop’s Phoneprinting technology is a key part of FNBO’s broader fraud prevention strategy. The bank also uses a variety of other technologies and processes to protect its customers from fraud, including:
FNBO’s commitment to fraud prevention is evident in its use of multiple layers of security to protect its customers. The bank’s use of Pindrop’s Phoneprinting technology is a key part of this strategy and will help to keep FNBO’s customers safe from voice fraud and deepfake attacks.
Published: Fri, 10 Jan 2025 09:45:00 GMT
Mandiant: Latest Ivanti vulns exploited by Chinese cyber spooks
Mandiant has warned that Chinese state-sponsored threat actors have exploited recently disclosed vulnerabilities in Ivanti’s Pulse Connect Secure (PCS) VPN to target government entities in Asia.
In a threat intelligence advisory published on Thursday, Mandiant said it had observed multiple instances of malicious activity involving the PCS vulnerabilities, tracked as CVE-2022-41324 and CVE-2022-42889, since March 2023.
The attacks, attributed to a group Mandiant tracks as APT41, involved the exploitation of a critical remote code execution (RCE) vulnerability (CVE-2022-41324) to gain initial access to the targeted PCS VPN appliances, followed by the exploitation of a privilege escalation vulnerability (CVE-2022-42889) to obtain system-level access.
“Mandiant assesses that the threat actors’ primary objectives were to establish persistent access to networks, harvest credentials, and exfiltrate sensitive data,” the advisory reads.
The targeted organizations, located in Southeast Asia, South Asia, and Central Asia, primarily belonged to the government sector, including foreign affairs ministries, defense ministries, and law enforcement agencies.
Mandiant also noted that APT41 often exploits vulnerabilities in VPN appliances and software to target organizations in the Asia-Pacific region.
“APT41 has a history of targeting VPNs as an attack vector, particularly in the Asia-Pacific region,” the advisory states. “This group has been observed exploiting vulnerabilities in multiple vendor products, including Pulse Secure, Fortinet, and Cisco, to gain initial access to victim networks.”
Ivanti released patches for the vulnerabilities in December 2022, and Mandiant urges organizations to apply the updates as soon as possible to mitigate the risk of exploitation.
“Organizations that have not yet patched these vulnerabilities should do so immediately to mitigate the risk of exploitation by APT41 and other threat actors,” Mandiant said.
Published: Sat, 18 Jan 2025 01:06:09 GMT
Published: Fri, 17 Jan 2025 22:46:24 GMT
Published: Fri, 17 Jan 2025 20:35:29 GMT
Published: Fri, 17 Jan 2025 20:09:51 GMT
Published: Fri, 17 Jan 2025 19:56:23 GMT
Published: Fri, 17 Jan 2025 19:51:31 GMT
Published: Fri, 17 Jan 2025 19:00:37 GMT
Published: Fri, 17 Jan 2025 18:53:23 GMT
Published: Fri, 17 Jan 2025 18:47:13 GMT
Published: Fri, 17 Jan 2025 18:44:28 GMT
Published: Fri, 17 Jan 2025 18:14:37 GMT
Published: Fri, 17 Jan 2025 18:07:38 GMT
Published: Fri, 17 Jan 2025 17:56:14 GMT
Published: Fri, 17 Jan 2025 16:57:00 GMT
Published: Fri, 17 Jan 2025 16:23:07 GMT
Published: Fri, 17 Jan 2025 16:09:14 GMT
Published: Fri, 17 Jan 2025 16:07:51 GMT
Published: Fri, 17 Jan 2025 14:50:51 GMT
Published: Fri, 17 Jan 2025 13:52:36 GMT
Published: Fri, 17 Jan 2025 13:19:46 GMT
Published: Fri, 17 Jan 2025 13:11:32 GMT
Published: Fri, 17 Jan 2025 12:58:48 GMT
Published: Fri, 17 Jan 2025 11:50:31 GMT
Published: Fri, 17 Jan 2025 11:21:17 GMT
Published: Fri, 17 Jan 2025 11:04:24 GMT
Published: Fri, 17 Jan 2025 10:36:57 GMT
Published: Fri, 17 Jan 2025 09:06:16 GMT
Published: Fri, 17 Jan 2025 09:02:10 GMT
Published: Fri, 17 Jan 2025 07:49:13 GMT
Published: Fri, 17 Jan 2025 06:30:27 GMT
Published: Fri, 17 Jan 2025 06:12:25 GMT
Published: Fri, 17 Jan 2025 05:14:44 GMT
Published: Fri, 17 Jan 2025 03:48:28 GMT
Published: Fri, 17 Jan 2025 03:45:15 GMT
Published: Fri, 17 Jan 2025 02:15:37 GMT
Published: Fri, 17 Jan 2025 01:12:43 GMT
Published: Thu, 16 Jan 2025 23:03:45 GMT
Published: Thu, 16 Jan 2025 23:00:09 GMT
Published: Thu, 16 Jan 2025 22:56:18 GMT
Published: Thu, 16 Jan 2025 22:52:47 GMT
Published: Thu, 16 Jan 2025 21:54:27 GMT
Published: Thu, 16 Jan 2025 21:41:35 GMT
Published: Thu, 16 Jan 2025 21:31:32 GMT
Published: Thu, 16 Jan 2025 21:29:32 GMT
Published: Thu, 16 Jan 2025 21:05:21 GMT
Published: Thu, 16 Jan 2025 20:56:43 GMT
Published: Thu, 16 Jan 2025 20:38:34 GMT
Published: Thu, 16 Jan 2025 20:31:34 GMT
Published: Thu, 16 Jan 2025 20:20:39 GMT
Published: Thu, 16 Jan 2025 20:11:01 GMT
Published: Thu, 16 Jan 2025 19:57:33 GMT
Published: Thu, 16 Jan 2025 19:53:48 GMT
Published: Thu, 16 Jan 2025 19:47:25 GMT
Published: Thu, 16 Jan 2025 19:41:23 GMT
Published: Thu, 16 Jan 2025 19:26:54 GMT
Published: Thu, 16 Jan 2025 18:49:36 GMT
Published: Thu, 16 Jan 2025 18:45:07 GMT
Published: Thu, 16 Jan 2025 18:43:05 GMT
Published: Thu, 16 Jan 2025 18:39:28 GMT
Published: Thu, 16 Jan 2025 18:34:13 GMT
Published: Thu, 16 Jan 2025 18:18:35 GMT
Published: Thu, 16 Jan 2025 17:55:57 GMT
Published: Thu, 16 Jan 2025 17:38:41 GMT
Published: Thu, 16 Jan 2025 17:15:18 GMT
Published: Thu, 16 Jan 2025 17:07:11 GMT
Published: Thu, 16 Jan 2025 17:05:16 GMT
Published: Thu, 16 Jan 2025 16:53:14 GMT
Published: Thu, 16 Jan 2025 16:41:45 GMT
Published: Thu, 16 Jan 2025 16:37:37 GMT
Published: Thu, 16 Jan 2025 16:26:13 GMT
Published: Thu, 16 Jan 2025 16:21:58 GMT
Published: Thu, 16 Jan 2025 15:52:52 GMT
Published: Thu, 16 Jan 2025 15:13:59 GMT
Published: Thu, 16 Jan 2025 15:04:55 GMT
Published: Thu, 16 Jan 2025 14:57:33 GMT
Published: Thu, 16 Jan 2025 14:31:22 GMT
Published: Thu, 16 Jan 2025 14:09:19 GMT
Published: Thu, 16 Jan 2025 14:00:01 GMT
Published: Thu, 16 Jan 2025 13:35:11 GMT
Published: Thu, 16 Jan 2025 11:37:18 GMT
Published: Thu, 16 Jan 2025 10:45:13 GMT
Published: Thu, 16 Jan 2025 10:33:23 GMT
Published: Thu, 16 Jan 2025 10:29:59 GMT
Published: Thu, 16 Jan 2025 09:36:32 GMT
Published: Thu, 16 Jan 2025 09:03:37 GMT
Published: Thu, 16 Jan 2025 08:54:26 GMT
Published: Thu, 16 Jan 2025 05:09:46 GMT
Published: Wed, 15 Jan 2025 22:33:10 GMT
Published: Wed, 15 Jan 2025 21:56:16 GMT
Published: Wed, 15 Jan 2025 21:53:45 GMT
Published: Wed, 15 Jan 2025 21:52:02 GMT
Published: Wed, 15 Jan 2025 21:45:15 GMT
Published: Wed, 15 Jan 2025 21:39:11 GMT
Published: Wed, 15 Jan 2025 21:32:32 GMT
Published: Wed, 15 Jan 2025 21:13:47 GMT
Published: Wed, 15 Jan 2025 21:04:00 GMT
Published: Wed, 15 Jan 2025 21:01:54 GMT
Published: Wed, 15 Jan 2025 20:59:25 GMT
Published: Wed, 15 Jan 2025 20:52:44 GMT
Published: Wed, 15 Jan 2025 20:46:12 GMT
Published: Wed, 15 Jan 2025 19:57:15 GMT
Published: Wed, 15 Jan 2025 19:17:35 GMT
Published: Wed, 15 Jan 2025 17:52:46 GMT
Published: Wed, 15 Jan 2025 17:21:58 GMT
Published: Wed, 15 Jan 2025 16:30:12 GMT
Published: Wed, 15 Jan 2025 16:17:35 GMT
Published: Wed, 15 Jan 2025 16:07:20 GMT
Published: Wed, 15 Jan 2025 16:05:02 GMT
Published: Wed, 15 Jan 2025 15:58:59 GMT
Published: Wed, 15 Jan 2025 15:47:22 GMT
Published: Wed, 15 Jan 2025 15:46:42 GMT
Published: Wed, 15 Jan 2025 15:21:26 GMT
Published: Wed, 15 Jan 2025 15:00:40 GMT
Published: Wed, 15 Jan 2025 14:56:21 GMT
Published: Wed, 15 Jan 2025 14:33:23 GMT
Published: Wed, 15 Jan 2025 14:24:09 GMT
Published: Wed, 15 Jan 2025 13:50:31 GMT
Published: Wed, 15 Jan 2025 13:06:25 GMT
Published: Wed, 15 Jan 2025 12:57:00 GMT
Published: Wed, 15 Jan 2025 12:07:34 GMT
Published: Wed, 15 Jan 2025 12:03:43 GMT
Published: Wed, 15 Jan 2025 11:50:36 GMT
Published: Wed, 15 Jan 2025 11:40:36 GMT
Published: Wed, 15 Jan 2025 11:31:26 GMT
Published: Wed, 15 Jan 2025 11:20:42 GMT
Published: Wed, 15 Jan 2025 11:12:00 GMT
Published: Wed, 15 Jan 2025 11:11:54 GMT
Published: Wed, 15 Jan 2025 11:06:01 GMT
Published: Wed, 15 Jan 2025 09:36:44 GMT
Published: Wed, 15 Jan 2025 06:41:52 GMT
Published: Wed, 15 Jan 2025 06:16:51 GMT
Published: Wed, 15 Jan 2025 06:10:01 GMT
Published: Wed, 15 Jan 2025 05:55:48 GMT
Published: Wed, 15 Jan 2025 05:51:14 GMT
Published: Tue, 14 Jan 2025 22:48:58 GMT
Published: Tue, 14 Jan 2025 22:36:15 GMT
Published: Tue, 14 Jan 2025 22:20:37 GMT
Published: Tue, 14 Jan 2025 22:08:26 GMT
Published: Tue, 14 Jan 2025 22:05:28 GMT
Published: Tue, 14 Jan 2025 21:59:22 GMT
Published: Tue, 14 Jan 2025 21:51:50 GMT
Published: Tue, 14 Jan 2025 21:47:01 GMT
Published: Tue, 14 Jan 2025 21:40:16 GMT
Published: Tue, 14 Jan 2025 21:35:52 GMT
Published: Tue, 14 Jan 2025 21:24:37 GMT
Published: Tue, 14 Jan 2025 21:13:38 GMT
Published: Tue, 14 Jan 2025 20:56:36 GMT
Published: Tue, 14 Jan 2025 19:04:10 GMT
Published: Tue, 14 Jan 2025 19:01:11 GMT
Published: Tue, 14 Jan 2025 18:55:51 GMT
Published: Mon, 04 Oct 2021 20:37:00 GMT
Author: Joe Berger
Moving to a hybrid work model presents a number of challenges for companies. Here’s how IT leaders can help overcome obstacles and support success.
Published: Wed, 31 Oct 2018 18:07:00 GMT
Author: Paul Crocetti
Cyber resilience is increasingly a must for company executives. IBM’s Andrea Sayles details the latest threats, as well as best practices for how to be prepared for attacks.
Published: Thu, 29 Mar 2018 18:00:00 GMT
Author: Nicole Laskowski
Carnegie Mellon University’s Chris Harrison talks about the future of the user interface in this episode of ‘Schooled in AI.’
Published: Fri, 23 Feb 2018 14:23:00 GMT
Author: Nicole Laskowski
AI cyberattacks won’t be particularly clever; instead, they’ll be fast and fierce. Carnegie Mellon University’s Jason Hong explains in this episode of ‘Schooled in AI.’
Published: Tue, 23 Jan 2018 17:00:00 GMT
Author: Nicole Laskowski
In this episode of ‘Schooled in AI,’ Andrew Moore, dean of the School of Computer Science at Carnegie Mellon University, talks about the benefits of the AI stack.
Sunshine in Shanghai on January 18, 2025.