Space

now browsing by tag

 
 

More #CEOs to come from the #cyber security #space in #2018

Source: National Cyber Security – Produced By Gregory Evans

Oracle expects to see more chief executive officers to come from the cyber security space in 2018 as part of an effort to boost security.

Arun Khehar, senior vice-president of applications at Oracle Eastern Central Europe, Middle East, Africa, told Gulf News that enterprise security will be company’s top priority for 2018 and much of it will be automated.

With today’s ‘borderless enterprise as a result of cloud, mobile and edge technologies like IoT, he said that there is general consensus that there is no such thing as ‘total security’. As a result, business information can no longer be protected by the IT team trying to create digital castles and restrict access.

“We’ll see an increasing focus on security among companies, especially with new regulations such as General Data Protection Regulation (GDPR) [coming into effect from May 25, 2018] coming in with their associated penalties for failure,” he said.

He added that more companies are expected to turn to the cloud for security as researches show that more mature users recognise that cloud provides better security than on premises environments.

According to research firm Gartner’s latest forecast, worldwide security spending is expected to total $96.3 billion in 2018, an increase of eight per cent from 2017.

With skills continuing to be scarce, Khehar said that security will increasingly feature artificial intelligence/machine learning capabilities. By 2025, autonomous operations will become the catalyst to accelerate enterprise cloud adoption.

By 2025, he said that 80 per cent of cloud operations risk will vanish entirely — a higher degree of intelligent automation will permeate the cloud platform.

“Using machine learning and AI techniques, autonomous operations will anticipate outcomes, take remedial action, and be aware of real-time risks. The top concerns are infrastructure downtime, security threats and vulnerabilities and data protection,” he said.

It’s not just in security that humans can’t keep up, he said, right across the business and across industries; organisations are struggling to make sense of the rapid proliferation of data whether that is in finance, HR, sales or marketing systems or in operations around systems management and security.

Due to the growth in AI, he said that most of us will be chatting with chatbots by the end of 2018.

“We are going to see a new wave of more sophisticated conversational platforms that will be developed; creating chatbots that will feel completely natural to talk to replacing the currently, relatively unsophisticated interfaces,” he said.

Emirates NBD, Mashreqbank, DED, Aramex and Dewa are using chatbots to initiate and carry on conversations with their consumers in the UAE.

“Chatbots will be one of the key technologies that will be found on every organisation’s strategic customer experience road map. Those that get in and adopt them successfully early on will steal a march on the competition,” he said.

There will be a growing number of specialised ‘intelligent bots’ that will interact and learn from each other, he said.

For example, he said that CEOs, CFOs, or employees will be able to inquire about company data. Professionals such as doctors, pharmacists, lawyers, teachers, engineers, and service personnel can retrieve technical information. Citizens and consumers can interact with service organisations.

Oracle expects 2018 to be the year that hordes of smart devices begin to be tamed, as the focus moves away from the ‘things’ themselves to the integrated platforms that will turn IoT data into actionable insights and data-rich business models.

When it comes to IoT, he said that there are three core challenges — integration, analytics and security. “As smart devices share increases volumes of distributed data among themselves, and back into the enterprise, the challenges around these areas will become exponentially more complex,” he said.

The post More #CEOs to come from the #cyber security #space in #2018 appeared first on National Cyber Security Ventures.

View full post on National Cyber Security Ventures

China’s quantum breakthrough a step forward in space race to end hacking

Source: National Cyber Security – Produced By Gregory Evans

China’s quantum breakthrough a step forward in space race to end hacking

A record-breaking experiment by a Chinese satellite has taken the weird world of quantum physics to new heights and is likely to spur other nations, including Canada, in their efforts to develop an unhackable form of long-distance communication. “We have done something that was absolutely impossible using conventional approaches,” said…

The post China’s quantum breakthrough a step forward in space race to end hacking appeared first on National Cyber Security Ventures.

View full post on National Cyber Security Ventures

10 Steps To Open Up Space – Leadership 360 – Education Week

It is about opening up space for your mind and for your human interactions.

View full post on Education Week: Bullying







#pso #htcs #b4inc

Read More

The post 10 Steps To Open Up Space – Leadership 360 – Education Week appeared first on Parent Security Online.

View full post on Parent Security Online

Text Space Dance Arts Integration Lesson

[…]

The post Text Space Dance Arts Integration Lesson appeared first on EducationCloset.

View full post on EducationCloset







#pso #htcs #b4inc

Read More

The post Text Space Dance Arts Integration Lesson appeared first on Parent Security Online.

View full post on Parent Security Online

Israel, Pakistan To Join Nevada War Games As US Prepares For Large-Scale Space & Cyber Wars

NELLIS AIR FORCE BASE, NEV. -- An F-16 Aggressor takes off from the Nellis flight line during a Red Flag Exercise, March 3, 2010. Red Flag is a realistic combat training exercise involving the air forces of the United States and its allies. The exercise is conducted on the 15,000-square-mile Nevada Test and Training Range, north of Las Vegas.   (U.S. Air Force Photo by Staff Sgt. William P. Coleman/RELEASED)

Source: National Cyber Security – Produced By Gregory Evans

Israel, Pakistan To Join Nevada War Games As US Prepares For Large-Scale Space & Cyber Wars

NELLIS AIR FORCE BASE, Nevada — International war games being fought this week in the Nevada desert suggest the U.S. military is preparing for new, large-scale warfare against powerful enemies.
This year marks the 41st year of the Red Flag

The post Israel, Pakistan To Join Nevada War Games As US Prepares For Large-Scale Space & Cyber Wars appeared first on National Cyber Security.

View full post on National Cyber Security

North Korea’s Space Launch: An Initial Assessment

Source: National Cyber Security – Produced By Gregory Evans

At first glance, North Korea’s launch of an Unha Space Launch Vehicle (SLV) on February 7, 2016, looks very much like a repeat of its successful launch a little over three years ago. In fact, a close examination reveals that the North appears to have used some stock footage of the 2012 launch in its […] North Korea’s Space Launch: An Initial Assessment is an article from 38 North: Informed Analysis of North Korea, published by the US-Korea Institute at SAIS. View full post on 38 North: Informed Analysis of North Korea

For more information go to http://www.NationalCyberSecurity.com, http://www. GregoryDEvans.com, http://www.LocatePC.net or http://AmIHackerProof.com

The post North Korea’s Space Launch: An Initial Assessment appeared first on National Cyber Security.

View full post on National Cyber Security

Pyongyang’s Space Launch in Pictures

Source: National Cyber Security – Produced By Gregory Evans

North Korea conducted the fourth launch of a space launch vehicle (SLV) on February 7, 2016 at 9 AM (PYT), the third from its Sohae Satellite Launching Station. While commercial satellite imagery from the date of the launch was not available in time to make a judgment that it was imminent, ground and satellite pictures […] Pyongyang’s Space Launch in Pictures is an article from 38 North: Informed Analysis of North Korea, published by the US-Korea Institute at SAIS. View full post on 38 North: Informed Analysis of North Korea

For more information go to http://www.NationalCyberSecurity.com, http://www. GregoryDEvans.com, http://www.LocatePC.net or http://AmIHackerProof.com

The post Pyongyang’s Space Launch in Pictures appeared first on National Cyber Security.

View full post on National Cyber Security

Satellites, Warheads and Rockets: Is North Korea’s Space Program Really about Missile Development?

Source: National Cyber Security – Produced By Gregory Evans

  This article was originally published on September 28, 2015 but reprinted on February 5, 2016. When the Soviet Union shocked the world and opened the Space Age on October 4, 1957, it was not a coincidence that its first satellite was launched into orbit on a modified R-7 intercontinental ballistic missile (ICBM). For many […] Satellites, Warheads and Rockets: Is North Korea’s Space Program Really about Missile Development? is an article from 38 North: Informed Analysis of North Korea, published by the US-Korea Institute at SAIS. View full post on 38 North: Informed Analysis of North Korea

For more information go to http://www.NationalCyberSecurity.com, http://www. GregoryDEvans.com, http://www.LocatePC.net or http://AmIHackerProof.com

The post Satellites, Warheads and Rockets: Is North Korea’s Space Program Really about Missile Development? appeared first on National Cyber Security.

View full post on National Cyber Security

He is special guest at the Ground Zero Summit 2015 being organised by Indian Infosec Consortium – a group of ethical hackers. “Threat to national security has moved to the digital dimension. Terrorist organisations have turned social networks and online forums into recruitment hotbeds and propaganda mechanisms. We need a security apparatus in the digital space to address this threat. Hackers are the face of this digital army.” The actor said he is bringing his whole team including scriptwriters of the show to observe and interact with the ethical hacker community. (Also Read: Tabu Has Shown Interest in 24, Says Director ) “From November 22, I will start shooting for 24. It will go on air in 2016. When an actor prepares for a role, we often start to live like the character. Some call it method acting. We meet real life people like the character and try to understand their nuances, their life,” he said. As per the summit’s website, speakers will share details of the espionage mission as well as hold sessions on hacking of cellular networks, medical devices in hospitals, using technical loopholes in them. The consortium claims to have discovered cyber espionage operation under which phones of Indian Army personnel, who had downloaded some mobile application related to news, had been compromised by hackers based in Pakistan. IIC CEO Jiten Jain has said that the findings were handed over to security agencies who promptly acted and sanitised the infected handset early this year.

Source: National Cyber Security – Produced By Gregory Evans

He is special guest at the Ground Zero Summit 2015 being organised by Indian Infosec Consortium – a group of ethical hackers.   “Threat to national security has moved to the digital dimension. Terrorist organisations have turned social networks and online forums into recruitment hotbeds and propaganda mechanisms. We need a security apparatus in the digital space to address this threat. Hackers are the face of this digital army.”   The actor said he is bringing his whole team including scriptwriters of the show to observe and interact with the ethical hacker community. (Also Read: Tabu Has Shown Interest in 24, Says Director )   “From November 22, I will start shooting for 24. It will go on air in 2016. When an actor prepares for a role, we often start to live like the character. Some call it method acting. We meet real life people like the character and try to understand their nuances, their life,” he said.   As per the summit’s website, speakers will share details of the espionage mission as well as hold sessions on hacking of cellular networks, medical devices in hospitals, using technical loopholes in them.   The consortium claims to have discovered cyber espionage operation under which phones of Indian Army personnel, who had downloaded some mobile application related to news, had been compromised by hackers based in Pakistan.  IIC CEO Jiten Jain has said that the findings were handed over to security agencies who promptly acted and sanitised the infected handset early this year.

He is special guest at the Ground Zero Summit 2015 being organised by Indian Infosec Consortium – a group of ethical hackers. “Threat to national security has moved to the digital dimension. Terrorist organisations have turned social networks and online forums into recruitment hotbeds and propaganda mechanisms. We need a security apparatus in the digital space to address this threat. Hackers are the face of this digital army.” The actor said he is bringing his whole team including scriptwriters of the show to observe and interact with the ethical hacker community. (Also Read: Tabu Has Shown Interest in 24, Says Director ) “From November 22, I will start shooting for 24. It will go on air in 2016. When an actor prepares for a role, we often start to live like the character. Some call it method acting. We meet real life people like the character and try to understand their nuances, their life,” he said. As per the summit’s website, speakers will share details of the espionage mission as well as hold sessions on hacking of cellular networks, medical devices in hospitals, using technical loopholes in them. The consortium claims to have discovered cyber espionage operation under which phones […]

For more information go to http://www.NationalCyberSecurity.com, http://www. GregoryDEvans.com, http://www.LocatePC.net or http://AmIHackerProof.com

The post He is special guest at the Ground Zero Summit 2015 being organised by Indian Infosec Consortium – a group of ethical hackers. “Threat to national security has moved to the digital dimension. Terrorist organisations have turned social networks and online forums into recruitment hotbeds and propaganda mechanisms. We need a security apparatus in the digital space to address this threat. Hackers are the face of this digital army.” The actor said he is bringing his whole team including scriptwriters of the show to observe and interact with the ethical hacker community. (Also Read: Tabu Has Shown Interest in 24, Says Director ) “From November 22, I will start shooting for 24. It will go on air in 2016. When an actor prepares for a role, we often start to live like the character. Some call it method acting. We meet real life people like the character and try to understand their nuances, their life,” he said. As per the summit’s website, speakers will share details of the espionage mission as well as hold sessions on hacking of cellular networks, medical devices in hospitals, using technical loopholes in them. The consortium claims to have discovered cyber espionage operation under which phones of Indian Army personnel, who had downloaded some mobile application related to news, had been compromised by hackers based in Pakistan. IIC CEO Jiten Jain has said that the findings were handed over to security agencies who promptly acted and sanitised the infected handset early this year. appeared first on National Cyber Security.

View full post on National Cyber Security