Future

now browsing by tag

 
 

#schoolsafety | Cops in Syracuse schools: friendly face or occupying force? Their future debated | #parenting | #parenting | #kids

Syracuse, N.Y. — In 2008, a police officer assigned to Corcoran High School broke a 15-year-old girl’s nose after he punched her in the face. The officer said the girl […] View full post on National Cyber Security

#deepweb | Scientist says aliens in UFOs might be Earthlings from the future

Source: National Cyber Security – Produced By Gregory Evans We’ve been chasing ET for millennia with nothing concrete to show for it. Aside from conspiracy theory claims that the US government has an alien spacecraft hidden away somewhere, the search for alien life has been a complete bust. Michael Masters, a professor of biological anthropology […] View full post on AmIHackerProof.com

#deepweb | ProSiebenSat.1 Using AWS to Transform the Future of Media in Europe

Source: National Cyber Security – Produced By Gregory Evans

SEATTLE–(BUSINESS WIRE)–Today, Amazon Web Services, Inc. (AWS), an Amazon.com company (NASDAQ: AMZN), announced that ProSiebenSat.1 Media SE, Europe’s leading satellite and cable broadcaster, operating television channels, digital VoD platforms and e-commerce brands, has selected AWS as its primary cloud provider. ProSiebenSat.1 is working closely with AWS to adopt cloud services within all parts of its broadcast and digital media businesses, production companies, and e-commerce platforms. With AWS, ProSiebenSat.1 is improving the time to market of new applications, and introducing advanced analytics and machine learning (ML) technologies across its organization, which is transforming the viewing experience for 45 million households across Germany, Austria, and Switzerland.

ProSiebenSat.1 has a long history of working with AWS because of its deep portfolio of cloud services, high levels of security and compliance, rapid pace of innovation, and proven experience in reliably supporting millions of customers around the world. Most of ProSiebenSat.1‘s brands have deployed applications on AWS, including its Joyn streaming platform, offering viewers over 20,000 episodes and 55 live channels in the cloud. ProSiebenSat.1 also runs the commerce businesses of its NuCom Group, a growing e-commerce player with 10 leading portfolio companies, on AWS as well as the production business of its Red Arrow Studios, one of the world’s leading creators and distributors of entertainment content.

Recently, ProSiebenSat.1 made a corporate-wide decision to integrate AWS ML services into every aspect of its business to automate processes and develop new, personalized products. Adopting AWS ML services will enable ProSiebenSat.1 to more intelligently tailor advertising to viewers and enhance personalization and recommendations across all of its media brands. One of its most strategic projects uses Amazon SageMaker, a fully managed service to build, train, and deploy ML models, and AWS data analytics tools to predict the future value of an upcoming advertising slot.

The solution uses a deep neural network —trained and deployed using Amazon SageMaker – to predict ad conversion rates based on inputs such as the slot time, genre of the TV show, and ad content. As a result, the service is able to predict, weeks in advance, how many impressions an advertisement will generate. This allows advertisers to predict who will watch their ads, helping them to make informed purchasing decisions, while simultaneously enhancing the viewer experience with ads that are more closely aligned with consumer preferences.

“ProSiebenSat.1 is a leading European entertainment conglomerate with a strong commerce business and we continue to drive the ongoing transformation of the Group into a technology-and data-led company with an emphasis on growing our digital and diversified future,” said Nick Thexton, Chief Technology Officer of ProSiebenSat.1. “AWS is a key strategic partner who has consistently driven cloud adoption for over a decade and is still setting the pace on what cloud services can do for media businesses. By moving more of our business to AWS and incorporating AWS’s ML services, we are able to enhance our agile software development practices and derive even more value from our large consumer data platforms.”

“Over the past few years, media companies have been using our unmatched portfolio of cloud services to transform the delivery of content and create more personalized viewing experiences to delight audiences on every platform,” said Andy Isherwood, Managing Director, Amazon Web Services EMEA. “As one of the largest and most well-respected media companies in Europe, it is exciting to see ProSiebenSat.1 embracing AWS ML services, and establishing itself as a leader in what is possible. We look forward to supporting the company on its journey to transform how it serves its customers across its media and e-commerce brands.”

About Amazon Web Services

For 13 years, Amazon Web Services has been the world’s most comprehensive and broadly adopted cloud platform. AWS offers over 165 fully featured services for compute, storage, databases, networking, analytics, robotics, machine learning and artificial intelligence (AI), Internet of Things (IoT), mobile, security, hybrid, virtual and augmented reality (VR and AR), media, and application development, deployment, and management from 69 Availability Zones (AZs) within 22 geographic regions, with announced plans for 13 more Availability Zones and four more AWS Regions in Indonesia, Italy, South Africa, and Spain. Millions of customers—including the fastest-growing startups, largest enterprises, and leading government agencies—trust AWS to power their infrastructure, become more agile, and lower costs. To learn more about AWS, visit aws.amazon.com.

About Amazon

Amazon is guided by four principles: customer obsession rather than competitor focus, passion for invention, commitment to operational excellence, and long-term thinking. Customer reviews, 1-Click shopping, personalized recommendations, Prime, Fulfillment by Amazon, AWS, Kindle Direct Publishing, Kindle, Fire tablets, Fire TV, Amazon Echo, and Alexa are some of the products and services pioneered by Amazon. For more information, visit amazon.com/about and follow @AmazonNews.

About ProSiebenSat.1

ProSiebenSat.1 is the leading German entertainment player with a strong commerce business. The company offers great entertainment – whenever, wherever and on any device. Every day, 45 million TV households in Germany, Austria and Switzerland enjoy the 15 free and pay TV channels. In 2018, ProSiebenSat.1 reached 3 billion video views on the Group’s digital platforms and invested more than one billion euros in 120,000 hours of programming.

Successful formats like “Germany’s next Topmodel”, “The Voice of Germany” and “Young Sheldon” as well as top-notch stars like Heidi Klum, Joko and Klaas or Dwayne Johnson belong to the Group. Shows like “Bosch” and “Married at First Sight” are created within the production and distribution business Red Arrow Studios. The global digital studio Studio71 achieves around 10 billion monthly video views and operates around 1,400 web channels. The NuCom Group is a rapidly growing e-commerce player with leading portfolio companies that offer online price comparison, matchmaking, experiences as well as beauty & lifestyle.

ProSiebenSat.1 are 7,000 passionate creators that love to entertain and delight their viewers and consumers each day. www.prosiebensat1.com

Source link
——————————————————————————————————

The post #deepweb | <p> ProSiebenSat.1 Using AWS to Transform the Future of Media in Europe <p> appeared first on National Cyber Security.

View full post on National Cyber Security

Gartner Says the Future of Network Security Lies with SASE

Source: National Cyber Security – Produced By Gregory Evans Cloud services and networking are driving the concept of digital businesses, yet traditional networking and cybersecurity architectures are far from meeting the demands of the digital business. Gartner’s “The Future of Network Security Is in the Cloud” report spells out the potential for the transformation of […] View full post on AmIHackerProof.com

International Workshop on Future Information, Security, Privacy and Forensic for Complex Systems (FISP)

General Cybersecurity Conference

 August 13 – 15, 2018 | Gran Canaria, Spain

Cybersecurity Conference Description

Availability, integrity and secrecy of complex information systems are increasingly important requirements for modern society as well as nations as with every passing day computers control and administer more and more aspects of human life. We entrust much of our lives to information and computer technologies (ICT’s). However, it is difficult and challenging task to understand security risk and to provide effective security solution as attackers only need to find a single vulnerability but developers or system administrators need to find and fix all vulnerabilities. In addition, cyber space is considered as fifth battle-field after land, air, water and space.

The aim of FISP-2018 is to provide a premier international platform for wide range of professions including scholars, researchers, academicians and Industry people to discuss and present the most recent challenges and developments in “Information Security, Privacy and Forensics for Complex systems” from the perspective of providing security awareness and its best practices for the real world. After the high success of the previous edition (FISP’2017) in conjunction with 12th International Conference on Future Networks and Communications 2017 (FNC-2017), Belgium, the fourth International Workshop on Future Information Security, Privacy and Forensics for Complex systems (FISP-2018) will continue to open to submit novel and high quality research contributions as well as state of the art reviews in the field of information security and privacy. We anticipate that this workshop will open new entrance for further research and technology improvements in this important area.

advertisement:

The post International Workshop on Future Information, Security, Privacy and Forensic for Complex Systems (FISP) appeared first on National Cyber Security Ventures.

View full post on National Cyber Security Ventures

The #future of #computer #security is #machine vs #machine

A growing number of computer security thinkers, including myself, think that in the very near future, most computer security will be machine versus machine–good bots versus bad bots, completely automated. We are almost there now.

Fortunately or unfortunately, I don’t think we’ll get to a purely automated defense for a long, long time.

Today’s security defenses
Much of our computer security defenses are already completely automated. Our operating systems are more securely configured out of the box, from firmware startup to the operating system running apps in secure hardware-enforced virtual boundaries, than ever before. If left alone in their default state, our operating systems will auto-update themselves to minimize any known vulnerabilities that have been addressed by the OS vendor.

Most operating systems come with rudimentary blacklists of “bad apps” and “bad digital certificates” that they will not run and always-on firewalls with a nice set of “deny-by-default” rules. Each OS either contains a built-in, self-updating, antimalware program or the users or administrators install one as one of the first administrative tasks they perform. When a new malware program is released, most antimalware programs get a signature update within 24 hours.

Most enterprises are running or subscribing to event log message management services (e.

Read More….

advertisement:

The post The #future of #computer #security is #machine vs #machine appeared first on National Cyber Security Ventures.

View full post on National Cyber Security Ventures

The #Future Of #Company #Cybersecurity? #Pentesting, Says #CyberByte

Source: National Cyber Security News

Companies rank cybersecurity as one of their top priorities – yet, when enquired, their respective departments hard-pressed to identify the core steps that need to be taken in order to maintain it at top levels. CyberByte, the preeminent Romanian cybersecurity firm, has recently published an informative article, wherein it maintains that penetration testing – or pentesting- will define the future of company cybersecurity.

The term pentesting refers to “a series of ethical hacking attacks on IT systems”, which are made with the ultimate goal of uncovering system vulnerabilities and potential cybersecurity issues. In addition to helping calculate the chances of a potential cyberattack succeeding, pentesting provides an overview of the efficacy of a company’s cybersecurity measures that are already in place, with its results acting as a guide for further improvements that need to be made in order to bolster existing cybersecurity strategies.

“Pentests are classified according to the information available for each system. The two most commonly used methods of pentesting, the Penetration Testing Execution Standard or PTES, and the OWASP method, are not particularly innovative. The same applies for the Open Source Security Testing Methodology Manual, or OSSTMT, which has now become an industry standard – despite the fact that, much like the aforementioned methods, it represents a very primordial approach to a universal cybersecurity structure,” said Mr.

Read More….

advertisement:

View full post on National Cyber Security Ventures

The most #notorious #hacks in #history, and what they mean for the #future of #cybersecurity

Source: National Cyber Security News

Where has the time gone? February is almost over, and already we’ve seen several major vulnerabilities and hacks this year! As we head further into what’s sure to be another busy year for cybersecurity, it’s important to take a step back and examine how we got here.

For nearly four decades, cyber criminals have been exploiting the latest and greatest technology for fun, profit and power. In that time, the word “hacker” has taken on many meanings. At first, it referred to mischievous young techies looking to build a reputation on the internet, but it has since become a worldwide title for data thieves, malicious online “entrepreneurs” and geopolitical operatives. The threats and tactics that hackers use have evolved, too – from small-time scams to dangerous worms and earth-shaking breaches.

As a result, the security industry has been in game of “cyber cat and mouse” for the better part of a half-century, looking to evolve security technology to thwart the constant evolution in malware and techniques used by sophisticated threat actors.

Let’s take a look back at the past four decades to assess the most notorious hacks in each era, why they mattered, and how the security industry responded.

Read More….

advertisement:

View full post on National Cyber Security Ventures

How #quantum #computing could create #unbreakable #encryption and save the #future of #cybersecurity

Source: National Cyber Security – Produced By Gregory Evans

A new breakthrough in quantum computing may mean quantum key distribution (QKD) is on its way toward being a practical cybersecurity protocol.

Researchers at Duke University, The Ohio State University, and Oak Ridge National Laboratory have announced in the latest issue of Science Advances that they’ve increased the speed of QKD transmission by between five and 10 times the current rates.

Up until this latest breakthrough, which is delivering megabit/second rates, speeds were restricted to between tens to hundreds of kilobits a second.

What is quantum key distribution?

It sounds like something straight out of science fiction, but quantum key distribution is reality, and it could be protecting your data before you know it.

QKD uses photons—particles of light—to encode data in qubits, or quantum bits. The qubits are transmitted to a sender and recipient as an encryption key, and here’s where things get crazy: The transmission channels don’t need to be secure.

QKD’s whole purpose rests on quantum indeterminacy, which states that measuring something affects its original state. In the case of QKD, measuring photonic qubits affects their encoding, which allows the sender and recipient to immediately know if a hacker is trying to crack their quantum encryption key.

That means, theoretically at least, that QKD would be a perfect encryption: Any attempts to crack it would immediately be noticed and keys could be changed.

Making QKD practical for cybersecurity

The breakthrough made by the Duke research team came from being able to pack more data onto a single photon. The trick was learning to adjust the time at which the photon was released, along with adjusting the phase of the photon, causing it to be able to hold two bits of information instead of just one.

What makes the new system developed by the researchers even more amazing is that they were able to do it with nothing but commercially available telecommunication hardware, save the single-photon detector.

“With some engineering,” said Duke graduate student Nurul Taimur Islam, “we could probably fit the entire transmitter and receiver in a box as big as a computer CPU.”

Islam and his research partners say that hardware imperfections render their QKD system less than hack-proof, but their research continues to incorporate hardware shortcomings to make up for them.

“We wanted to identify every experimental flaw in the system, and include these flaws in the theory so that we could ensure our system is secure and there is no potential side-channel attack,” Islam said.

While it’s likely to take some time to emerge from the research phase and become a practical tool, this latest QKD breakthrough gives cybersecurity a leg up on cybercriminals.

As quantum computing becomes accessible, the likelihood of it being used to obliterate current forms of encryption increases, making the development of practical QKD essential. This should come as good news to anyone concerned about the current, and future, state of cybersecurity.

The post How #quantum #computing could create #unbreakable #encryption and save the #future of #cybersecurity appeared first on National Cyber Security Ventures.

View full post on National Cyber Security Ventures

How To Look #Back To The #Future Of #Cybersecurity

Source: National Cyber Security – Produced By Gregory Evans

How To Look #Back To The #Future Of #Cybersecurity

As if to cap off an already eventful National Cybersecurity Awareness Month—and perhaps proving that there is no honor among thieves—a hacker breached a forum for hackers last week, and is ransoming fellow cyber-attackers’ user data for $50,000. And there certainly seems to be plenty of occasions to increase our awareness of cybersecurity issues.

About 1.9 billion data records got exposed in the 918 data breaches that occurred in the first half of 2017—up 164 percent from the last half of 2016—according to a digital security firm’s study. The U.S. Department of Homeland Security issued a warning last week about the Bad Rabbit ransomware, which is disrupting government, hospital and other systems internationally. And cybersecurity researchers confirmed last week that an enormous botnet has already infected more than one million organizations—and is on the verge of unleashing “the next cyber-hurricane.”

It’s crucial that we learn from these attacks. And—just as some are using high-tech for cyberattacks—others are using blockchain, artificial intelligence and other cutting-edge technology to improve cybersecurity.

Blockchain, AI, and IoT to the rescue

With so many cyberattacks targeting centralized services, blockchain’s decentralized technology offers cyber-defenses from many types of attacks, according to PC Magazine last week. Among the benefits are blockchain’s transparency and distributed nature, which eliminate the single failure points that many hackers prey upon. But …

“The best defense [organizations] have is the same thing that makes them such an appealing target for hackers: a mountain of data,” PC Magazine stated in a different story last week. “By using machine learning algorithms and other artificial intelligence techniques to identify data patterns, vulnerable user behaviors and predictive security trends, companies are mining and analyzing the wealth of data at their disposal to hopefully stop the next breach from happening.”

However, networks and Internet of Things sensors will still require cybersecurity technology, VentureBeat stated this month. Unsecured devices can be terrible liabilities, so organizations should earnestly evaluate the opportunities and vulnerabilities offered by AI and IoT—and ensure that all users are well trained.

Build a tech-savvy phalanx

Technical savvy helps employees across the organization better understand their work environment and, as a result, operate more securely, according to SmartBrief last week. This will only get more important, as data analytics is increasingly crucial to business success—and as workflow automation continues to get cheaper.

And making rules isn’t enough. For example, in healthcare, HIPAA regulations require that organizations train their workers to maintain patient privacy—and punish those who violate policies and procedures. But employee security awareness is the top healthcare data security concern for 80 percent of health IT executives, according to a 2017 healthcare security study.

“Build a culture of cybersecurity among your executive and physician leaders,” Theresa Meadows, CHCIO, Senior VP and CIO of Cook Children’s Health Care System, stated last month. “Educate them about the threats, myths and importance of good cyber hygiene … they can champion the cause among their peers and staff and get them to buy into safety processes.”

Of course, cybersecurity cultures don’t sprout up overnight.

Learning our lessons

Chief information security officers face the increasingly difficult job of convincing their c-suites that cybersecurity expenditures are worth the big bucks, according to Government Computer News this month. CISOs can use their organizations wealth of data to frame cybersecurity in terms that managers and executives can understand, such as managing risk, business continuity and regulatory compliance.

In short, it’s about taking a step back and learning lessons from the big picture.

“We are so overwhelmed with present security concerns that we don’t have the ability to look into the future — or we hesitate to second guess what cybercriminals might end up doing,” IT Business Edge stated last week. “It’s up to us to recognize what we’ve seen in the past in order to rethink our security solutions of the future.”

And last week’s hacking of the hackers’ forum—as well as other events from this year’s National Cybersecurity Awareness Month—have given us plenty of source material to learn from.

The post How To Look #Back To The #Future Of #Cybersecurity appeared first on National Cyber Security Ventures.

View full post on National Cyber Security Ventures