Cloud computing services – ICT Nieuws http://ictnieuws.net/ Fri, 30 Sep 2022 09:49:32 +0000 en-US hourly 1 https://wordpress.org/?v=5.9.3 https://ictnieuws.net/wp-content/uploads/2021/10/icon-37-120x120.png Cloud computing services – ICT Nieuws http://ictnieuws.net/ 32 32 Industrial Blockchain Technology Market Size Worth $1.3 Billion by 2031, TMR Study https://ictnieuws.net/industrial-blockchain-technology-market-size-worth-1-3-billion-by-2031-tmr-study/ Thu, 29 Sep 2022 15:31:00 +0000 https://ictnieuws.net/industrial-blockchain-technology-market-size-worth-1-3-billion-by-2031-tmr-study/ A steady increase in funding and multiple deals in blockchain start-ups are likely to help companies develop blockchain services and solutions that are expected to drive the global market The demand for private blockchain technology is expected to increase as more companies implement private blockchain technologies to protect and accelerate the transfer of sensitive data […]]]>
  • A steady increase in funding and multiple deals in blockchain start-ups are likely to help companies develop blockchain services and solutions that are expected to drive the global market
  • The demand for private blockchain technology is expected to increase as more companies implement private blockchain technologies to protect and accelerate the transfer of sensitive data

WILMINGTON, Del., September 29, 2022 /PRNewswire/ — In 2021, the value of the global industrial blockchain technology market was $3.80 billion. The global market is expected to grow at 80.3% CAGR during the forecast period, 2022 to 2031. By 2031, the global market industrial blockchain technology market is likely to affect US$1.3,000,000. The numerous advantages offered by blockchain technology exert a favorable influence on the global industrial blockchain technology market. The deployment of industry-specific blockchain technology is expected to overcome typical constraints, including access to distribution channels and product differentiation, which should present growth opportunities for leading blockchain technology companies.


Additionally, blockchain industry applications in supply chain, industry 4.0, energy industry, and automotive industry are expected to be driven by the growing trend of digital transformation in all industries. sectors. There has been an increasing use of blockchain technology solutions for industries including the financial industry. It is mainly due to the growing use of cloud services in transaction and payment processes globally.

Due to their well-established financial and banking insurance sectors, countries like the UK and the US hold a disproportionate share of the global market. Moreover, the use of the enterprise blockchain platform guarantees data reliability and provides undeniable security to improve internal procedures. Additionally, recent developments in blockchain technology, such as the emergence of blockchain as a service and the metaverse, as well as the growing acceptance of non-fungible tokens (NFTs), are expected to boost the global market.

Request a sample report at https://www.transparencymarketresearch.com/sample/sample.php?flag=S&rep_id=85099

Key Findings of the Market Report

  • Investors are more likely to invest in blockchain technology now that cryptocurrencies are legalized. Moreover, it should motivate market players to work harder to improve their services to stand out from the competition. The industry is also growing as blockchain technology is increasingly used in business applications including digital ID, payments, smart contracts, and exchanges. Blockchain technology in the manufacturing industry is also expected to gain traction in the near future.
  • Over the past three to four years, blockchain technology has grown in popularity in a variety of applications. The use of blockchain technology is also driven by growing consumer and institutional demand for cryptocurrencies. As a result, a number of startups have sprung up and are working on developing blockchain technology solutions.
  • The increase in the number of projects is mainly attributable to the advantages offered by platforms and blockchain as a service, such as improved efficiency, greater transparency and a diversified technological offer in many end-user sectors. . This is expected to accelerate the use of the blockchain industry at a high rate in developing countries in the coming years.

Ask for references https://www.transparencymarketresearch.com/sample/sample.php?flag=ARF&rep_id=85099

Global Industrial Blockchain Technology Market: Growth Drivers

  • Due to the increasing use of blockchain technologies by different companies in the region, North America is expected to hold a major market share for industrial blockchain technology in the coming years.

Global Industrial Blockchain Technology Market: Key Players

Some of the major players in the market are

  • Hewlett Packard Enterprise Development LP
  • Digital Asset Holdings, LLC
  • Amazon Web Services, Inc.
  • IBM Corporation
  • Oracle Corporation
  • Ernst & Young Global Limited

Inquire Before You Buy – https://www.transparencymarketresearch.com/sample/sample.php?flag=EB&rep_id=85099

Global Industrial Blockchain Technology Market: Segmentation

Making up

size of the company

Type

  • Audience
  • Private
  • Consortium

Application

  • Payments
  • Smart contracts
  • Numeric identity
  • Supply chain management
  • Others

Final user

  • BFSI
  • Health care
  • Government
  • Travel, Transport & Logistics
  • Detail
  • Media and entertainment
  • Manufacturing
  • Others

Research reports on computing and telecommunications

data center rack market– The Data Center Rack Market is expected to reach $13.52 billion end of 2031

data center cooling market– The data center cooling market is expected to reach $45.49 billion end of 2031

Retail Analytics Market– The retail analytics market is expected to exceed the value of US$122.08 billion end of 2031

edge computing market– The Edge Computing market is expected to reach $161.66 billion end of 2031

Cloud Workload Protection Platform [CWPP] Market– The global Cloud Workload Protection Platform (CWPP) market is estimated to exceed the value of $22 billion by 2030, expanding at a CAGR of around 25% over the forecast period

Telecommunications market– The telecommunications market is expected to grow at a CAGR of around 5% from 2020 to 2030

artificial intelligence market– The Artificial Intelligence market is expected to grow at an explosive CAGR of 29% during the assessment period.

Managed Security Services Market– The managed security services market is expected to reach US$53.22 billion by the end of 2031, expand at a CAGR of 14.2% from 2022 to 2031

About Transparency Market Research

Transparency Market Research registered at Wilmington, Delaware, United Statesis a global market research company providing personalized research and consulting services. TMR provides detailed information on the factors driving the demand in the market. It discloses opportunities in various segments based on source, application, sales channel, and end use that will drive market growth over the next 9 years.

Our data repository is continuously updated and revised by a team of research experts, so that it always reflects the latest trends and information. With broad research and analytical capability, Transparency Market Research uses rigorous primary and secondary research techniques to develop distinctive datasets and research material for trade reports.

For more information on advanced industries research, visit our YouTube channel

https://www.youtube.com/channel/UC8e-z-g23-TdDMuODiL8BKQ

Contact us:

Rohit Bhisey
Transparency Market Research Inc.
HEADQUARTERS IN THE CITY CENTER,
1000 N. West Street,
Office 1200, Wilmington, Delaware 19801 United States
Tel: 1-518-618-1030
UNITED STATES – Canada toll-free: 866-552-3453
Website: https://www.transparencymarketresearch.com
Blog: https://tmrblog.com
E-mail: sales@transparencymarketresearch.com

Logo: https://mma.prnewswire.com/media/1682871/TMR_Logo_Logo.jpg

SOURCE Transparency Market Research

]]>
1.5k Certified in Data Science, Project to Prepare 3,000 Students for Industry – The New Indian Express https://ictnieuws.net/1-5k-certified-in-data-science-project-to-prepare-3000-students-for-industry-the-new-indian-express/ Thu, 29 Sep 2022 00:32:00 +0000 https://ictnieuws.net/1-5k-certified-in-data-science-project-to-prepare-3000-students-for-industry-the-new-indian-express/ By Express press service VIJAYAWADA: Approximately 1,500 students across the state have been certified in Data Science under the Emerging Technologies Certification Initiative by the AP State Skill Development Corporation (APSSDC), along with Indo Euro Synchronization (IES) . These students are drawn from various public and private universities and private engineering colleges from all districts […]]]>

By Express press service

VIJAYAWADA: Approximately 1,500 students across the state have been certified in Data Science under the Emerging Technologies Certification Initiative by the AP State Skill Development Corporation (APSSDC), along with Indo Euro Synchronization (IES) . These students are drawn from various public and private universities and private engineering colleges from all districts of the state.

In line with the vision of Chief Minister YS Jagan Mohan Reddy, APSSDC has developed the unique ecosystem of imparting the best skills to engineering students to prepare them for industry.
During the awards ceremony for the Hackathon under the Data Science program on Wednesday, APSSDC Chairman Konduru Ajay Reddy said the company took responsibility for the successful implementation of the mega event at the level of state and had focused on high-end skills activity for 3,000 engineering students across the state this year. in the fields of robotics, smart manufacturing, artificial intelligence, data science and e-mobility and other emerging technologies, which are indispensable to the young people of the current generation.

Government Advisor (Skills Development and Training) Challa Madhusudhan Reddy said, “Life goes on through hard work and willpower. And if you follow this mantra, you will succeed in life. APSSDC Managing Director S Satyanarayana called the scale and scope of the Data Science Hackathon 2022 unprecedented.

]]>
Advocating for Ethics-Driven Regulation for Blockchain Technologies https://ictnieuws.net/advocating-for-ethics-driven-regulation-for-blockchain-technologies/ Sat, 24 Sep 2022 16:15:29 +0000 https://ictnieuws.net/advocating-for-ethics-driven-regulation-for-blockchain-technologies/ “Given the complexity of the technologies emerging on the blockchain, careful consideration should be given to the moral issues that have or could emerge when determining use cases.” Blockchain technology can serve as a shared database ledger that tracks assets and transactions with little or no oversight but, in theory, an unlimited number of users. […]]]>

“Given the complexity of the technologies emerging on the blockchain, careful consideration should be given to the moral issues that have or could emerge when determining use cases.”

Blockchain technology can serve as a shared database ledger that tracks assets and transactions with little or no oversight but, in theory, an unlimited number of users. Its potential applications, ranging from smart contracts to IP blockchain, hold promise for smooth collaborations, effective compensation, and in-depth IP management. However, there remain critical issues including confidentiality, compatibility, liability and jurisdiction that remain undefined. Additionally, because all areas require specialized codes of conduct and ethics, if blockchain technology is meant to make a meaningful difference in society, then it too deserves its own area of ​​ethics, such as artificial intelligence (AI), nuclear technology, biotechnology and space exploration. Great minds in all disciplines need to think about how this technology can be shaped to have a positive impact, first by looking at what this field is capable of and its Potential consequences. For example, central to the idea of ​​blockchain is the creation of decentralized, leaderless organizations. This raises the question of who is responsible in the event of a problem? Who determines what behavior is allowed? Thinking macroscopically and into the future, if blockchain technology is expected to change the nature of money, how might this affect power dynamics, economies, and politics?

From Dolly to digital registers

In 1996, when Dolly the sheep was successfully cloned, ethical dilemmas and slippery slope arguments exploded. Is the ban on human cloning, remote as it is, consistent with human rights by interfering with the right to privacy and reproductive autonomy? While this is an admittedly extreme comparison, shouldn’t the blockchain field also be working towards standardizing guidelines for ethical research? For example, should we consider probing and disclosing security vulnerabilities in an ethical live blockchain smart contract? The Twitter poll prompted by Cornell University researcher Philip Daian found that two-thirds of respondents said yes; however, we must remember that such an act could endanger the life savings of blockchain participants.

Moreover, Blockchain technology is extremely flexible and has evolved rapidly in its various applications. In the healthcare sector alone, the blockchain market was valued at $2.12 billion in 2020. In healthcare, the ability to access input and consultation from specialists around the world would embody the dream of democratized healthcare and electronic medical records. The architectural concept of a shared digital ledger to disintermediate information sharing across ecosystems, however, requires accuracy of information, minimized manual interruptions in the process, and resolution of the tension between the need for transparency and the desire for privacy. . Although shared ledger transparency brings the promise of greater integrity and accountability in an ecosystem, with increased trust between participants (in part, based on the immutable nature of ledgers) and reduced counterparty risk , there are still many legitimate reasons why participants may not want full network visibility, so bespoke transparency may require further development.

Beware

Given the complexity of the technologies emerging on the blockchain, careful consideration should be given to the moral issues that have or could emerge when determining use cases. Moreover, one should not be blinded by the hype around the potential of this technology, namely the promotion of greater efficiency, security, confidentiality, integrity and its somewhat anti-authoritarian character, but rather be realistic about at exactly what it can offer. The more gullible among us should be wary of the real potential for harm. The scope of the blockchain, which should be regulated to some extent, should ensure a distributed architecture capable of maintaining the communications and processing power needed to manage and process all data exchanged. There should be regulatory agencies and institutions, free from conflict, that provide some degree of oversight to prevent, deter and penalize abuses. While such surveillance is arguably directly in violation of the libertarian freedom that this technology seeks, functionality unquestionably requires facilitation of function with rules and regulations, not only based on ethics but also on idealized principles. seamless transactions enabled by this platform technology.

Image Source: Depot Photos
Image ID:196614042
Copyright : light source

Image by Monica Jang

]]>
Recruitment alert! List of internships in data science, artificial intelligence, machine learning to apply https://ictnieuws.net/recruitment-alert-list-of-internships-in-data-science-artificial-intelligence-machine-learning-to-apply/ Sat, 24 Sep 2022 08:42:00 +0000 https://ictnieuws.net/recruitment-alert-list-of-internships-in-data-science-artificial-intelligence-machine-learning-to-apply/ Internships are a great way to start your career. They come with many benefits, including letters of recommendation, monthly stipends, and sometimes even full-time job offers. Working as an intern for a company provides familiarity with the office environment, which is beneficial in the future. Today, in order to help people looking for internships in […]]]>

Internships are a great way to start your career. They come with many benefits, including letters of recommendation, monthly stipends, and sometimes even full-time job offers. Working as an intern for a company provides familiarity with the office environment, which is beneficial in the future.

Today, in order to help people looking for internships in the fields of data science, artificial intelligence and machine learning, we have put together a list where all the important details can be checked. Consult the list below to apply for the internship that matches your skills:

Internship Data Science, IA, ML at Cognitive I

This will be a home-based internship program that will last 3 months. No allowance will be paid during the period of service. This is a great opportunity for those who wish to gain experience. The last day to apply is October 10. Interested candidates should apply through the AICTE internship portal.

Read also | ONGC Recruitment via GATE 2022 Scores: Open Applications for 871 Vacancies, Salary up to Rs 1,80,000

Internship in image processing (ML & AI) at Cube Highways And Transportation Assets Advisors Private ltd.

This internship requires candidates to work for a period of 6 months in Hyderabad. The company is ready to offer a monthly stipend of Rs 20,000. The deadline for submitting the application through the Internshala portal is October 6th.

Machine learning at UFF Foods Private ltd

UFF Foods Private Limited is recruiting candidates for 3 months. The company is willing to offer work from home to the selected individuals at a monthly stipend of Rs 2,500. Interested candidates can apply through Internshala before October 6.

Data Analytics Internship in Mumbai at Optiwise Online

This will be a 3 month internship. Applicants will be required to join the office located in Mumbai. Selected candidates will receive a monthly stipend of Rs 15,000. The deadline to apply through Internshala is October 8.

Data Science at Darwin Digitech

This is a 6 month internship at home. Those who are chosen will receive a stipend between Rs 6,000 and Rs 9,000. If a candidate’s performance meets company standards, they will receive a job offer. Applications can be submitted on Internshala. The deadline to do so is October 7.

Read all Latest education news and recent news here

]]>
Vendia’s Tim Wagner and Shruthi Rao on the Serverless Blockchain https://ictnieuws.net/vendias-tim-wagner-and-shruthi-rao-on-the-serverless-blockchain/ Fri, 23 Sep 2022 22:22:49 +0000 https://ictnieuws.net/vendias-tim-wagner-and-shruthi-rao-on-the-serverless-blockchain/ Hello and welcome to Protocol Enterprise! Today: why two AWS veterans think they’ve solved the enterprise blockchain conundrum, brace themselves for scrutiny of companies with ties to China, and a new round of Russian cyberattacks could be on the horizon. The Blockchain Gang The idea of ​​a cloud-centric approach to solving the challenges businesses face […]]]>

Hello and welcome to Protocol Enterprise! Today: why two AWS veterans think they’ve solved the enterprise blockchain conundrum, brace themselves for scrutiny of companies with ties to China, and a new round of Russian cyberattacks could be on the horizon.

The Blockchain Gang

The idea of ​​a cloud-centric approach to solving the challenges businesses face using blockchain to share data was one of those “aha” moments, according to Tim Wagner, co-founder and CEO of Vendia.

“It’s one of those things that you kind of feel the heel of your hand on your forehead like, ‘Duh, why didn’t anyone build this?’ Wagner told Protocol in a recent interview.

  • Wagner and co-founder Shruthi Rao, both AWS veterans, launched Vendia in 2020.
  • They reimagined the idea of ​​cloud-native blockchains and distributed ledgers with Vendia Share, a fully managed, serverless solution. platform for building decentralized real-time data applications.
  • “We have this thesis here: cloud has always been the missing ingredient in blockchain, and Vendia has added it,” Wagner said. “At the heart of our technology is a cloud-centric blockchain.”

Vendia Share makes it easier for customers to share code and data across clouds, enterprises, geographies, accounts, and technology stacks.

  • It allows companies to have complete visibility into all activities and transactions without worrying about their origin, because transactions are immutable thanks to the power of distributed ledger technology, according to Rao.
  • “We’re making sure whoever’s supposed to get the data gets it in real time, within five milliseconds, so there’s no manual movement,” Rao said.
  • “And it’s all on the ledger so you can see who you shared [with]what you shared, when you shared… and you can do a fine analysis of what was shared,” she said.

A database or API that could ensure consistency of enterprise data with their business partners — be it their upstream supply chains, their downstream logistics, or their financial partners — was a compelling prospect that did not escape CIOs, according to Wagner.

  • But the first generation of blockchain technology ignored the cloud and presented operational hurdles, including single-machine limitations, lack of throughput and scalability, high costs and difficulty of integration, according to Wagner.
  • “We sometimes joke at Vendia that we love nothing better than a failed blockchain experiment,” he said. “Probably half of our transactions last year are replacements for failed blockchain attempts.”
  • With cloud-integrated Vendia Share, you have access to virtually unlimited amounts of storage and network and processing capacity.
  • “It allows us to do things that conventional blockchains can’t: [Deliver] much higher throughput, lower latency, more processing power, much more parallelism, easier integration,” Wagner said.

Read the full story here.

— Donna Goodison (E-mail | Twitter)

A CAPITAL ONE SOFTWARE MESSAGE

Capital One’s embrace of modern cloud and data capabilities has led us to create tools to operate at scale in the cloud. Capital One Software markets these solutions to help accelerate your journey to cloud and data. Get started with Slingshot, a data management solution for Snowflake customers.

Learn more

Securing the business

In today’s global landscape, all businesses operating on the Internet have to deal with cybersecurity threats, not just huge tech companies. In this Protocol virtual event On October 4 at 10:00 a.m. PT, we’ll examine current best practices for securing large and small-to-medium businesses, providing viewers with a real landscape of threats and insights they can use to make decisions on the most suitable strategy. supports their business goals.

Protocol Enterprise’s Kyle Alspach will be joined by a large panel of speakers: Andre Rubinco-founder and CEO, Illumio; Alex Weinertvice president and chief identity security officer, Microsoft; Jameeka Green Aaron, Information Security Officer, Auth0; and Devdatta Akhawe, Security Chief. Figma.

RSVP here.

The Chinese Syndrome

High political winds are chilling the U.S.-China tech trade relationship, and perhaps more than anything right now, companies with operations in China are worried about one thing the U.S. government might do: change the rules governing investments from China to the United States.

To protect against cybersecurity vulnerabilities and the exploitation of Americans’ data, President Joe Biden on September 15 signed an executive order directing the Committee on Foreign Investment in the United States, or CFIUS (pronounced “if- ee-us” by foreign investment watchers), to be considered scrutinize foreign investment from a national security risk perspective.

“Everyone recognizes the need to protect the national security of the United States. But as Congress and the administration consider new tools, like an outbound investment review regime, it’s critical they get real input from the business community and be specific in what they’re trying to cover. said Rory Murphy, vice president of government affairs. at the US-China Business Council, Protocol said yesterday.

The oft-stated mission to ensure US leadership in emerging technologies is at the heart of this potential shift. During press conferencea senior administration official listed “a handful of priority emerging and critical technologies, such as semiconductors, quantum technologies, biotechnology and artificial intelligence, as well as supply chain considerations” as areas where investment reviews could take place.

The elephant in the room here is China, a “particularly concerning” country that has technology strategies that many in the US government say threaten US leadership in areas related to national security.

But because AI is intertwined with all industries and the technologies they use, AI agreements could face excessive scrutiny if a CFIUS rule is drafted too broadly. “How AI is defined will be important in determining what types of transactions are covered,” Murphy said.

-Kate Kaye (E-mail | Twitter)

Around the company

We already knew this, but there is growing evidence that Russian hackers work in conjunction with the Russian military as Ukraine begins to gain the upper hand in the seven-month war sparked by the Russian invasion, according to the Wall Street Journal.

IBM acquired Dialexa, a hybrid cloud consulting company based in Texas, as it continues to look for ways to latch onto existing customers by offering cloud expertise.

A CAPITAL ONE SOFTWARE MESSAGE

Capital One’s embrace of modern cloud and data capabilities has led us to create tools to operate at scale in the cloud. Capital One Software markets these solutions to help accelerate your journey to cloud and data. Get started with Slingshot, a data management solution for Snowflake customers.

Learn more

Thanks for reading – see you Monday!

]]>
Review of the malware landscape in 2022 https://ictnieuws.net/review-of-the-malware-landscape-in-2022/ Fri, 23 Sep 2022 11:28:42 +0000 https://ictnieuws.net/review-of-the-malware-landscape-in-2022/ Geopolitical tensions and the biggest war in Europe in decades have defined the malware landscape in 2022. Recorded Future has been capturing global threat information from internet, dark web and technical sources for over a decade. The company combines this vast amount of data with artificial intelligence and human expertise to quickly detect threats and […]]]>

Geopolitical tensions and the biggest war in Europe in decades have defined the malware landscape in 2022.

Recorded Future has been capturing global threat information from internet, dark web and technical sources for over a decade. The company combines this vast amount of data with artificial intelligence and human expertise to quickly detect threats and provide actionable insights to security professionals.

Toby Wilmington, Manager – Sales Engineering at Recorded Future, provided his analysis of the malware landscape in the first half of 2022 during a session at this year’s Cyber ​​Security & Cloud Expo Europe.

“We’re starting to see the world become a reflection of the internet,” says Wilmington. “So influence operations, things that happen online, start to have a geopolitical or kinetic impact – bombs are dropped, for example.”

Recorded Future gets its data from reports from security vendors, communication platforms like Telegram and Discord, social media, etc.

With its dark web gathering capabilities, the company is able to see what threat actors are talking about to help the good guys stay ahead of the game. This information could include malware sold, ransoms demanded, and penetration testing tools used.

Additionally, Recorded Future brings network traffic analytics data to see who is affected by cyberattacks, what technologies are targeted, what infrastructure is used, and who it can be attributed to.

All of this data is collated in real time to provide a much more complete picture of the malware landscape than has traditionally been possible. As a result, cybersecurity can become much more proactive than reactive.

Wiper variants

Following Russia’s invasion of Ukraine, nine distinct variants of the Wiper malware began circulating, designed to disrupt operations in the defending country.

According to Wilmington, the malware variants became increasingly simplistic over time, which “seemed to show that the hostile government had less time and fewer resources to develop malware against key geopolitical targets.” .

Wilmington presents a timeline of Wiper variants used around conflicts:

“We see nation states wanting to isolate specific countries and shut down operations,” Wilmington adds.

Ransomware

Ransomware also continues to plague global security teams.

Conti is one of the most infamous forms of ransomware due to how quickly it encrypts data and spreads to other systems. In May 2021, the Conti ransomware attack on the Irish Health Service resulted in weeks of disruption with a projected cost of $100 million.

When Russia invaded Ukraine, the Conti Group announced its support for Russia. However, around 60,000 internal chat log messages were leaked by an anonymous person who indicated support for Ukraine, along with source code and other files used by the group.

In April this year, Conti ransomware was used against the government of Costa Rica in a five-day intrusion. On May 8, Costa Rica was forced to declare a national emergency as the intrusion had spread to several government agencies.

Wilmington claims the Conti attack on Costa Rica was activated “as part of a disbandment that allowed individual members to support other ransomware gangs.”

Although Conti is making headlines, Wilmington says the most prolific operators are those behind the Lockbit 3.0 and Hive ransomware families.

Recorded Future has identified that ransomware group FIN7 created a fake cybersecurity firm called Bastion Secure to recruit IT specialists and deploy PoS exploit tools. Although the group is also considered Russian, Wilmington notes that such a tactic is often employed by North Korea.

Information thieves

Infostealers are a common type of malware that Recorded Future has seen a “real rise” in the past few years. This stolen information is then resold on the dark web.

Wilmington points out that information thieves take a fingerprint of your browser, then anything done in that window will be taken, and people can then buy it online.

“I can say, ‘If I buy this credential for $20, what does it give me access to? And does it also come with a session cookie so I can really jump around? says Wilmington.

According to Wilmington, Raccoon Stealer was one of the most popular information thieves this year. However, he “went on hiatus” in March 2022.

Threat actors then moved from Raccoon to Mars Stealer, MetaStealer, BlackGuard, RedLine, and Vidar. At the end of the first half of 2022, Raccoon Stealer 2.0 appeared and gained popularity again.

Wilmington goes on to show a chart of the top-ranked malware used in cyberattacks during the first half of 2022. Cobalt Strike takes the clear lead:

Vulnerabilities

When it comes to vulnerabilities, unsurprisingly, Log4Shell – which is likely still causing many sleepless nights – was by far the most referenced vulnerability in the first half of 2022:

The Microsoft Follina vulnerability took second place, followed by ProxyShell to round out the top three vulnerabilities referenced. It should be noted that ProxyShell has been used by Conti affiliates to hack into Microsoft Exchange servers and compromise corporate networks.

Recorded Future applies risk scores to vulnerabilities based on their active exploitation in the wild, either based on open source reports or the company’s internal honeypot.

Wilmington notes that Windows is normally the most affected vendor but, in the first half of 2022, the list was largely dominated by vulnerabilities affecting Linux:

“Generally, we see Microsoft at the very top in terms of vulnerabilities,” says Wilmington. “It’s quite interesting that Linux was the main focus at the start of this year.”

Recorded Future typically sees around 2-4 weeks from discovering a vulnerability to weaponizing it. Using early intelligence like that provided by Recorded Future can give the industry a sizable window to counter emerging threats. before they cause damage.

Toby Wilmington was speaking at this year’s Cyber ​​Security & Cloud Expo Europe. You can find more information about the World Series here.

Want to learn more about cybersecurity and the cloud from industry leaders? Discover Cyber ​​Security & Cloud Expo taking place in Amsterdam, California and London.

Check out other upcoming TechForge enterprise technology events and webinars here.

Key words: cobalt strike, conti, cybersecurity, cybersecurity and cloud expo, cybersecurity, fin7, follina, infosec, infostealer, log4shell, malware, proxyshell, raccoon thief, future saved, toby wilmington, vulnerabilities, wiper

]]>
Women in Data Science One-Day Workshop at IUST – Kashmir Reader https://ictnieuws.net/women-in-data-science-one-day-workshop-at-iust-kashmir-reader/ Thu, 22 Sep 2022 20:57:00 +0000 https://ictnieuws.net/women-in-data-science-one-day-workshop-at-iust-kashmir-reader/ Awantipora: A one-day workshop on Women in Data Science was organized today by the Center for Innovation and Entrepreneurship at the Islamic University of Science and Technology. The workshop, which was attended by students, scholars and faculty members from the computer science and computer engineering departments, was organized by the Centre’s Women’s Entrepreneurship Development Cell.The […]]]>

Awantipora: A one-day workshop on Women in Data Science was organized today by the Center for Innovation and Entrepreneurship at the Islamic University of Science and Technology. The workshop, which was attended by students, scholars and faculty members from the computer science and computer engineering departments, was organized by the Centre’s Women’s Entrepreneurship Development Cell.
The event was chaired by Dr Parvez A Mir (Director, CIED) and coordinated by Dr Rumaan Bashir (Coordinator, WEDC). Resource persons for the workshop were Aamir Khan (Head AI operations, TripAI), Maleeha S. Koul (Data scientist IBM), Umar Showkat (Data Analyst) and Fahyeem ul Nisa (Data Scientist).
Khan spoke about artificial intelligence and machine learning in the travel industry and career opportunities in the industry. He said, “Like the dynamic pricing engine that helps set the price based on market behavior and demand, there are several areas of data science where students can plan their projects.” He encouraged students to hone their skills, gain more knowledge and develop the right attitude to succeed as an entrepreneur.”
Koul spoke about the prospects and challenges in the field of artificial intelligence and data science. She shared information about several tools such as programming languages, development tools, open source libraries and development platforms that students can use to improve their skills and hone their skills as scientists and analysts of data.
Speaking about the objective of the workshop, Dr. Mir said, “CIED is committed to developing an ecosystem for the promotion of entrepreneurial culture in Kashmir and this workshop aimed to raise awareness among students about career opportunities in science. Datas”. He said CIED will also sign a memorandum of understanding with US-based TripIA, which will help train data science students on a regular basis. Welcoming the speakers, Dr. Rumaan Bashir said that women entrepreneurs can inspire young women to break stereotypes and take on challenging missions”. The workshop was also attended by Dr Shayika Nasreen and Dr Ruheela Hassan (members of WEDC).





]]>
Cybersecurity Best Practices for Hybrid and Remote Law Firms – New Technology https://ictnieuws.net/cybersecurity-best-practices-for-hybrid-and-remote-law-firms-new-technology/ Thu, 22 Sep 2022 13:57:25 +0000 https://ictnieuws.net/cybersecurity-best-practices-for-hybrid-and-remote-law-firms-new-technology/ In the wake of the COVID-19 pandemic, law firms continue to transition to a hybrid working model, providing their employees with more flexibility which, in turn, attracts more talent, improves retention and encourages growth. productivity. The sudden and dramatic shift to remote operations just a few years ago facilitated a rapid digital transformation, virtualizing almost […]]]>

In the wake of the COVID-19 pandemic, law firms continue to transition to a hybrid working model, providing their employees with more flexibility which, in turn, attracts more talent, improves retention and encourages growth. productivity.

The sudden and dramatic shift to remote operations just a few years ago facilitated a rapid digital transformation, virtualizing almost everything from paper documents to customer meetings to IT infrastructure. Digital transformation has brought significant benefits to the practice of law, such as improved information management, workflow efficiency, employee satisfaction, and improved client service. These key business advantages have become essential in an increasingly competitive legal market.

However, with the added benefits come significant risks.

As Canadian enterprises move to a more digitized hybrid work model, with members of the enterprise accessing systems from different locations and devices, they are exposed to more risk for three main reasons:

  1. Remote/hybrid workers have a larger attack surface, both digital and physical.

  2. The complexity of managing a hybrid network and remote users, combined with the increased risk it presents, places much higher demands on IT departments, which can lead to critical security holes in the infrastructure.

  3. The number of opportunistic and targeted cyberattacks has been on the rise since the shift to remote working, and law firms are being targeted.

The most common cyberattack against hybrid law firms

Cybercriminals use a variety of methods to attack, however, phishing emails are the most common, as they exploit the main hybrid workplace vulnerability: lawyers and staff.

Phishing emails are typically used for two main purposes:

Credential theft

The goal of a credential-seeking phishing email is to convince the target to click on a malicious link, visit their website, and insert their username and password. passes under the impression that it is a legitimate account, such as a bank or a retail offer. Another method is to stealthily load keylogging software onto the user’s device, which then records and transmits their credentials to cybercriminals, effectively handing them the keys to the network.

Ransomware

Canada often ranks among the best countries affected by ransomware, and in the first half of 2021 alone, the number of attacks increased by 151%. Opportunistic ransomware attackers will send phishing emails with links that, when clicked, launch ransomware on the user’s device. This is done discreetly, without the user noticing, so that the ransomware can spread through their files and shared network folders, encrypting and locking data as it penetrates deeper. Organizations often don’t know they’ve been infiltrated until they suddenly can’t access critical files and a notice pops up asking for a ransom payment.

There are other cyberattacks from remote users, including viruses, spyware, worms, and Trojans. Enhanced endpoint protection can detect most of them, however, phishing requires more than technology to prevent system infection – it also requires employee attention.

If you want to know how to add a second layer of protection to your organization, consider RICOH Ransomware Containment.

What businesses can do to protect themselves

Despite the challenges, businesses can—and should—quickly respond to today’s challenges and protect themselves and their customers from cyber threats. This is especially true for small businesses which are at serious risk as cybercriminals view them as “low hanging fruits”

Organizations of all sizes can protect themselves affordably with enterprise-grade security. Here’s where to start.

Changing behaviors

Empower your firm to become your first line of defense against cyber threats. Educating them about the risks, how to spot a phishing email, and cybersecurity best practices to follow will go a long way in protecting your business. There are a number of cybersecurity training modules on the market, many of which offer testing and reporting to ensure everyone is engaged and alert.

Bring your leadership and technology teams together to define – in writing – policies and a plan to implement them. Policies should address user behavior, as well as company practices, technologies, and education to support users and protect your data.

While the specifics vary from company to company, they should include technologies such as endpoint and network protection. Your policies should also address basic security measures, including:

Passwords – Using strong passwords is essential. Passwords should be reset often, at least every 90 days. Weak passwords remain a problem for many organizations and individuals which, while understandable with so many passwords needed today, creates a security risk. You want to educate your employees on what constitutes a strong password, require regular password updates using alerts to remind users, and share tools they can use to simplify password management. Passwords.

Use of mobile devices – If possible, firm members should not use personal devices for work-related activities. Company-provided devices must be secured with PINs or passwords. If a company permits the use of personal devices, it should have a clearly communicated BYOD policy and signed consent for the installation of a mobile device manager that protects company information.

Education – Provide regular training to keep firm members informed about current phishing scams and ransomware, as well as how to handle suspicious notifications, emails and other communications securely. Education is an essential part of the policy to ensure that everyone understands and is aware of their responsibility to secure data and maintain privilege.

Secure your IT infrastructure

With a hybrid workforce, there are plenty of technology options to stay connected. To ensure a secure infrastructure, consider using the following:

Multi-factor authentication – With Multi-Factor Authentication (MFA), you add an extra layer of protection around your network and data by requiring users to verify their login credentials in multiple independent ways. For example, you can ask a user to provide a randomly generated code sent to their mobile device or email address to terminate login to a system, after having already entered their username and password. pass.

Endpoint Protection – Due to the heightened risks associated with remote operations, hybrid enterprises must implement anti-threat systems that prevent, detect and act on potential threats. AI-based solutions like SentinelOne use machine learning to monitor the network and immediately recognize any unusual behavior. Once an alert is triggered, security specialists can act quickly to resolve the issue and prevent damage.

Secure traffic with VPN, firewalls and switches – Setting up a virtual private network (VPN) gives employees secure access to your network. Unless you’ve moved to a cloud-only app infrastructure, you should use a VPN to keep your data encrypted and your network secure. VPNs should be secured with next-generation firewalls that provide real-time reporting of threats that bypass endpoint protections. Hybrid intelligence combines both human learning and machine learning to apply rules to specific applications and other functions to allow or deny traffic to the network.

To get a clear picture of your business risks and identify gaps in your IT security, consider booking a security assessment with Ricoh. Book an assessment today.

RICOH empowers digital workspaces by enabling people to work smarter. Through our portfolio of innovative technologies and services, we support organizations, law firms and corporate legal departments on their journey to digital transformation and better business outcomes. Let us help you redefine work and change. For better.

The content of this article is intended to provide a general guide on the subject. Specialist advice should be sought regarding your particular situation.

]]>
Blockchain usage is set to increase according to Nirmala Sitharaman https://ictnieuws.net/blockchain-usage-is-set-to-increase-according-to-nirmala-sitharaman/ Thu, 22 Sep 2022 13:28:01 +0000 https://ictnieuws.net/blockchain-usage-is-set-to-increase-according-to-nirmala-sitharaman/ Nirmala Sitharam recently appeared in the third edition of FICCI Leads, where she stated that blockchain usage is expected to increase by 46% in the coming years. The future of finance remained the central theme of the event, with several speakers sharing their thoughts. The event kicked off with Sanjiv Mehta, the President of FICCI, […]]]>

Nirmala Sitharam recently appeared in the third edition of FICCI Leads, where she stated that blockchain usage is expected to increase by 46% in the coming years.

The future of finance remained the central theme of the event, with several speakers sharing their thoughts. The event kicked off with Sanjiv Mehta, the President of FICCI, welcoming Nirmala Sitharaman, the Minister of Finance and Corporate Affairs of the Union.

While talking about blockchain technology, Nirmala Sitharamn also said that artificial intelligence could play a bigger role in the fintech industry. There are no specific details on how artificial intelligence will help the fintech industry; however, a rough idea she shared was that AI could help detect crime and fraud and quantify risk.

Given that the future of finance is digital, there will be a central discussion on how the climate impact can be controlled with the advancement of a new era.

A rise in blockchain technology could pave the way for greater cryptocurrency adoption, with more details expected. If the talks are in favor of the crypto community, we can expect a big wave to come to India according to the latest crypto news.

Dr. Ruth P. Goodwin-Groen, CEO and Founder of Better Than Cash Alliance, shares the same belief that there is a huge opportunity in India to create a future that works for everyone.

Markets in India have wide adoption and positive growth provided there is a strong customer response to the offering.

Technology was the sole center of attention during the third edition of FICCI Leads. Mr Richard Abel, Macquarie Group Managing Director for UK Climate Investment, got a head start saying that the future of finance will very much depend on the importance given to diversity, inclusion and gender equity.

Moreover, global collaboration will form the backbone of all financial developments, believes Mrs. Naina Lal Kiwai, former President of FICCI. She underlined that the future of finance could only be built if a global partnership was envisaged.

As the use of technology increases in the financial industry, there will be a growing threat from bad actors looking to steal user data and funds. Many other black swan events may occur, and the financial industry must be prepared for all of these events, adds Nirmala Sitharaman.

The big picture, as portrayed by Snajic Mehta, is that there is a need to advocate for the realignment of credit lines as well as the promotion of greater momentum on sustainable financial instruments.

A specific reason for the rise in the use of blockchain technology has yet to be cited by an analyst.

India previously imposed a 30% tax on all revenue generated from cryptocurrency. The rule was implemented on April 1, followed by the imposition of TDS at 1% for transactions exceeding the value of ₹10,000/-, or approximately $125 from July 1.

]]>
The School of Data and Social Sciences is gaining momentum https://ictnieuws.net/the-school-of-data-and-social-sciences-is-gaining-momentum/ Thu, 22 Sep 2022 05:28:19 +0000 https://ictnieuws.net/the-school-of-data-and-social-sciences-is-gaining-momentum/ After years of planning by hundreds of faculty and campus administrators, Carolina’s School of Data Science and Society (SDSS) is well on its way. The school’s first dean, Stan Ahalt, former director of the Renaissance Computing Institute, worked tirelessly with an implementation leadership team. They are planning an official launch event later this semester. “The […]]]>

After years of planning by hundreds of faculty and campus administrators, Carolina’s School of Data Science and Society (SDSS) is well on its way.

The school’s first dean, Stan Ahalt, former director of the Renaissance Computing Institute, worked tirelessly with an implementation leadership team. They are planning an official launch event later this semester.

“The School of Data Science and Society will leverage the talents of world-class faculty across disciplines and focus on the foundations and applications of data science to improve lives in North Carolina and around the world,” said Chancellor Kevin M. Guskiewicz. “The new school will also prepare students for a changing workplace and help attract and retain competitive employers in our state.”

On September 12, Guskiewicz joined Ahalt for a well-attended public conversation about the school’s expectations and future plans at UNC CURRENT ArtSpace + Studio. Acting Vice Chancellor for Research Penny Gordon-Larsen and Assistant Professor of Art History Kathryn Desplanque were also on hand to answer Ahalt’s questions. The event was part of the popular Carolina Data Science Now series, co-sponsored by the new school and RENCI to inform data science research across disciplines.

“I love the ‘and society’ at the end of the school name,” Guskiewicz said when Ahalt was asked about his expectations for the school. “We are going to bring the social sciences, the human dimension, into the school, not only by capturing data, by analyzing data, by interpreting data, but (by considering) how society uses this data to make informed decisions. . »

During the event, Ahalt and his guests discussed how the school will address the growing need for data literacy across different sectors and research areas, including recruiting professors with diverse research backgrounds, building relationships with relevant industry partners, providing training in effective data science methods, and bolstering a curriculum that addresses critical topics such as cybersecurity, artificial intelligence, data privacy, and ethics.

And they talked a lot about the school’s role in helping to share data among experts at the University’s many research centers and institutes.

“Data really is the language of collaboration,” Gordon-Larsen said.

Birth of the new school

Gordon-Larsen’s insight into the collaborative nature of data science resonated with those in attendance on September 12 for good reason. Throughout the decade of planning leading up to this moment, collaboration has been a fundamental principle. The school’s interdisciplinary approach will be reflected in a pan-university advisory board to be appointed later this fall.

Other next steps include:

  • Build academic business, starting with a curriculum.
  • Establish faculty affairs such as guidelines for hiring new faculty, for establishing cross-appointments, and for promotion and tenure.
  • Focus on integrating faculty-developed approaches and applications of data science to address societal problems and policy issues at the state and national level.
  • Enrolling students and hiring staff and faculty.

Over the next several months, Ahalt and the implementation team—RENCI’s Jay Aikat, Caroline’s geneticist Terry Magnuson, and administrator Anna Rose Medley—will define research clusters based on the areas the school is focusing on. will focus. At first, this might mean three to five research clusters, all interdisciplinary, involving people from different schools focused on one major challenge that needs to be solved.

The implementation team views curriculum development as one of the group’s most important goals. They are well advanced in building the online masters program. A minor at the College introduced in the fall of 2021 has proven extremely popular, attracting over 500 students in its first year. And the team is working on both Bachelor of Science and Bachelor of Arts in collaboration with the College and other schools.

Members of the Implementation Team and Ahalt welcome engagement from faculty, staff, and students who have questions about the school’s next steps and how they can get involved. Email sdss@unc.edu with questions, comments, or suggestions.

The implementation team projects the first three years as a start-up phase – hiring faculty and staff and launching degree programs to bring the school to a stable operating state in five to seven years. A brick and mortar location will come later.

The school leadership team is building infrastructure to support curriculum, academic and faculty affairs, student enrollment, and student mentorship. Additionally, discussions are underway with campus units to develop a strategic roadmap to promote data literacy and data-related research and training across the university.

“The collective expertise we need is already present on this campus. The SDSS will develop this pool of expertise and provide a focal point for collaborations,” said Ahalt. “Carolina is a unique institution that practices the credo of collaboration across disciplines. We will focus on the science, methods and technologies that anchor data science as well as applications that impact society.

Based on the interest shown so far by faculty, staff and students, the School of Data and Social Sciences will be a welcome addition to the University.

What Data Science Will Mean For You — One Person’s Perspective

What: SDSS Distinguished Speaker Series with Dr. Phil Bourne, Founding Dean of the School of Data Science at the University of Virginia (public seminar, reception to follow)
When: Wednesday, September 28 at 12:20 p.m.
Where: Kerr Pavilion, Room 2001

Data science is transformative – an easy claim to make after working in academia for several years. Nevertheless, the digital transformation of society cannot be denied. University data science initiatives across the country are responding and contributing to the transformation with new trainees, innovative research, and local community action. As UNC launches its new School of Data Science and Society, we’ll spend time pondering the age-old question: What’s in it for me?

]]>