Firms Need to be Secure to the Core Before Considering Digital Transformation – EnterpriseTalk

While embarking on a digital transformation journey, firms need to ensure that their infrastructure meets the expected level of security

CEOshave always focused on implementing digital transformation journeys to deliver innovative business models, creating new digital customer experiences, and to optimize and automate processes to ensure enhanced business performance.

Are CIOs Investing correctly for Digital Transformation?

Despite all these advances, organizations are constantly under pressure to prevent attacks on digital technologies that are leveraged to transform the business. Enterprises need to fight cyber-threats and stop them from becoming a hurdle to their digital transformation initiatives. Data security needs to be part of the very fabric of every digital enterprise for them to transform.

Organizations need to move on to a digital transformation journey only once they are assured about their security framework, tools, and structure. Businesses can transform when they become secure to the core, with a defined framework in place to secure all digital transformation efforts.

Continuous monitoring

The first key pillar to secure digital transformation for organizations is to monitor everything across IT and operational technology in real-time. Enterprises today need to possess a plethora of security tools to strengthen their infrastructure across the increasing number of endpoints firewalls, networks, servers, devices, applications, storage, data, etc.

With the humongous volume of data generated each day, it is almost impossible for firms to identify and respond to the true cyber-threats. Enterprises need to be confident about fighting breaches by applying automation and intelligence to handle the enormous volume of incidents occurring across the globe.

Adobe Survey CIO Priorities are Changing Due to Rise in Remote Working

Verify and encrypt

In addition to monitoring,the other two critical activities IT teams need to ensure for securing theenterprise are verification and encryption.

For verification of IDs, firms need to adopt a zero-trust security approach to access and digital identity management. Identity and access management needs to be established conclusively as an essential parameter to strengthen the digital transformation efforts.

Encryption is essential to minimize the risk of unauthorized or unlawful processing of business-critical information. It serves to avoid destruction or damage to data or any other accidental loss. All sensitive data requires proper tokenization or encryption using trusted services, encryption solutions, and rights management to prevent data loss from malicious cyberattacks.

Having an effective defense system in place

A future-proof their cyber-defense mechanism is required for companies to be secure to the core. They need to adopt an approach that provides next-generation digital services. It has to run with an enhanced degree of automation through a security platform, applying lean processes, in-depth analytics, and incidence management processes. The underlying technologies described as SOAR security, orchestration, automation, and response are getting increasingly popular.

IDC describes such cybersecurity technologies as AIRO Analytics, Incident, Response, and Orchestration. The AIRO technologies trace the requirements in the Security Operations Center (SOC) to adequately protect the enterprise network with effective threat detection and formal remediation.

Technology and Automation Propels Process Change Workers Are Reluctant

Whether organizations decide to adopt SOAR or AIRO technologies, they must apply automation to cyber defenses to keep up with the massive volume of data and incidents generated across a wide array of endpoints and infrastructure.

The occurrence of cyberattacks on organizations has shot up, but the sophisticated methods to counter these heightened threats have also evolved at a similar pace. It is crucial for businesses to first get the security framework in place before embarking on their digital transformation journey.

Read the original here:
Firms Need to be Secure to the Core Before Considering Digital Transformation - EnterpriseTalk

Have You Been Zoom Bombed? Here’s How to Stop It – HowStuffWorks

Advertisement

Like many professors, "Karen Wilson" (not her real name) was teaching a college class online for the first time in late March, since the COVID-19 outbreak had sidelined in-person classes. She was using the videoconferencing platform Zoom for her presentation.

"Ten minutes into my lecture, I started hearing laughter and giggling. Then a voice drops into the classroom asking, 'What class is this?'" she says via email. When Wilson asked what was going on, "a couple of girls answered in unison that they were supposed to be in a high school online class, and they were confused. They asked a few questions and they promptly left."

But things were just getting started.

"A while later, another anonymous person, this time a male, started commenting about smoking marijuana and the kind of great weed he'd found last week. Only the audio was heard and he wasn't seen. I asked him to identify himself. When he would not, I asked him to leave which, thankfully, he promptly did."

She says that because she was brand-new to Zoom, the experience was confusing and disorienting.

"I wasn't sure where the audio was coming from and thought it might be background noise from one of my students," she says. "If I had been more familiar with Zoom, I would have immediately muted everyone's audio, but I was a newbie using it online. I had never considered other people could get the Zoom number and 'drop into' a classroom."

Wilson had just been Zoom bombed. Zoom bombing is shorthand for when strangers intrude on others' meetings on Zoom. Sometimes, these folks might just listen in without anyone knowing they're there. Other times, they totally disrupt the meetings in silly or even threatening ways.

Ultimately, Wilson was lucky. Other victims of Zoom bombing have been subjected to hate speech, profanities, threats and pornographic images.

But how could someone just "drop into" a private meeting?

"Zoom bombing is nothing more than enumerating different URL combinations in the browser," says Dan Desko, a cybersecurity expert from accounting firm Schneider Downs, in Columbus, Ohio.

He gives an example: To find a Zoom meeting, you enter the URL Zoom.us/ plus a string of numbers, which serves as the meeting identification number (e.g., https://zoom.us/j/55555523222).

"The problem becomes when people don't have their meetings protected by passwords, and just by flipping a couple of numbers," you could potentially get lucky and suddenly enter someone else's meeting, he says. "Now obviously, you'd have to do that at the right time [when] the meeting's taking place," he adds.

Just to test the flaw, he tried it himself. Within just a minute or so, he stumbled onto a legitimate meeting ID but the meeting wasn't happening at that particular moment. "It's technically sort of like wiretapping or being able to spy on somebody," says Desko.

But why would Zoom have this particular flaw? It was exposed partly because Zoom exploded exponentially in popularity during the coronavirus pandemic, going from 10 million daily users in December 2019 to 200 million daily users in March. The company simply wasn't prepared for the rush of people wanting to use it for classes, meetings and virtual happy hours with friends.

"Zoom is primarily a corporate collaboration tool that allows people to collaborate without hindrance. Unlike social media platforms, it was not a service that had to engineer ways to manage the bad behavior of users until now," says David Tuffley, a lecturer in Applied Ethics & SocioTechnical Studies at Griffith University in Australia, in an email interview. "Their user base has grown enormously, and there [is] bound to be bad behavior."

The sudden traffic surge exposed other security flaws, too, like dark web accounts and lack of encryption. The FBI put out an advisory warning of Zoom bombing on March 30. Some organizations have opted to ban Zoom. Google won't let its employees use it on their laptops. It's all fallout because Zoom failed to address its flaws quickly enough, says Desko.

"In information security and cybersecurity, we talk about three things: We talk about confidentiality, integrity and availability," says Desko. People want to keep their meetings (especially in business) extremely confidential.

Furthermore, he says, the Citizen Lab at the University of Toronto "showed that the encryption technology that Zoom purported to use wasn't as strong as they say [it was]. They're actually using an encryption technology that was fairly crackable."

It's something, he says, that will take months to fix. (Zoom hopes to do it in the next 90 days.)

And as for integrity?

As Zoom has expanded its server capacity, it has begun to use servers based in China, with Chinese employees. "There are a lot of people calling the confidentiality of the tools into question," Desko says. That's one reason the U.S. Senate asked members to refrain from using Zoom. The Pentagon also followed suit on April 10.

Since Zoom bombing became a problem, Zoom has changed its default settings so that every meeting is automatically assigned a required password to enter it; also, the "waiting room" feature is now automatically enabled when you set up a meeting. This prevents users from joining a call before they've been screened by you, the host. Finally, the meeting ID code is not shown in the title bar during a Zoom meeting.

Desko thinks these measures will go a long way to stopping Zoom bombing. "It's good to keep the meeting ID private so that people can't associate your meeting ID with you or your company," he says. "Or if you are a high-profile person like Boris Johnson, sharing his meeting ID [as he did on a tweet as part of a Zoom screenshoton March 31] was like sharing the address to the bat cave. Even though the bat cave is secure, it is now a specific target. The password is then key to keeping the meeting secure."

He adds that "If you want to be super-secure you should change up your meeting ID with every call and password too. There is a setting to generate a new meeting ID automatically and you can also set the password personally as well."

At the very least, make sure that Zoom's new security features have actually been enabled on the meetings you're setting up.

"If you have a [recurring] meeting set up already that used the old default, you have to go back into Zoom and update those," says Desko. "That's easy enough to do."

Another way to prevent outsiders from hijacking your meeting is to make the "share screen" option only available to the host. You also can mute the microphones of everyone but the host or the speaker and lock the meeting when everyone has joined to prevent break-ins. These features can be done on the Zoom toolbar. And finally, don't post a public link to your meeting that may invite unwanted guests to try to enter.

See the original post here:
Have You Been Zoom Bombed? Here's How to Stop It - HowStuffWorks

8×8 Raises the Bar with New Secure Video Meeting Solution; Oracle Cloud – AiThority

Jitsi.org Publishes Specification for Secure Video Meetings with True End-to-End Encryption; Now Open for Public Comment by Open-sourceDeveloper Community

88, Inc., a leading integrated cloud communications platform, announced the launch of 88 Video MeetingsPro. The solution is powered byJitsi, an open source community for secure video meetings technology sponsored by 88. The company also announced that Jitsi.org and 88 video meetings solutions will run on the Oracle Cloud Infrastructure, which offers optimized cloud security and performance, perfect for workloads like video meetings. In a separate event, the Jitsi community published a specification for true end-to-end encrypted WebRTC-based video meetings that is now open for public comment.

.@88 Raises the Bar with New Secure Video Meeting Solution; @OracleCloud to Power 88 Video Meetings and @jitsinews Services; @jitsinews publishes end-to-end encryption for meetings spec for comment

Secure video meetings are a critical part of the day-to-day work of everyone around the world, stated Vik Verma, CEO of 88, Inc. Our Video Meetings, powered by Jitsi open-source technology, are designed from the ground up with security and privacy in mind to give peace of mind so public and private organizations of every size can confidently use them to conduct confidential business meetings. This is true for all of our video meeting products, both paid and free. We collaborated with Oracle to further enhance our strong product and technology platform with Oracle Clouds top-tier security, performance and affordability. We are looking forward to further scaling our global reach with the Oracle go-to-market team.

88, a member of Oracle PartnerNetwork (OPN), also announced today that its 88 video meetings solutions, Powered by Oracle Cloud, will be available in the Oracle Cloud Marketplace. The Oracle Cloud Marketplace offers an intuitive user interface to browse and search for available applications and services, as well as user ratings and reviews to help customers determine the best business solutions for their organization.

Recommended AI News: Opinion: Young Jamaicans Invention Could Help Tackle Spread of Viruses Like COVID-19

Oracle Cloud delivers tremendous price-performance for resource-intensive applications like video meetings. As the world redefines working from home, video meetings are one of our fastest-growing workloads, and we are excited to have 88 and the Jitsi open-source community on our cloud infrastructure platform, said Vinay Kumar, Vice President, Product Management, Oracle.

Priced at $9.99 per user per month after a 30-day free trial, 88 Video MeetingsPro includes password-protected and randomly named meetings, real-time closed-captioning with post-call transcription, 60 days of cloud storage for meetings recordings, and the ability to easily secure authorized attendees through dial out features. More capabilities will be added, and 88 Video MeetingsPro is available today at88.comvia self-serve e-commerce.

The new solution is in addition to the currently available88 Video MeetingsFree, which is athttps://88.vc, and includes unlimited usage and international dial-in numbers in more than 55 countries.

Recommended AI News: The Digital Dollar Project Names 22 New Advisory Group Members

88 is the main contributor to theJitsi.orgopen-source solution, and the standalone and integrated versions of 88 Video Meetings are powered by Jitsi. The Jitsi.org code has been hardened with over a million downloads and is embedded in applications like banking video conferencing, education as a service platforms, and home security applications globally. 88 Video Meetings utilizes the WebRTC standard which enables attendees to instantly join meetings without any downloads or plugins.

88 Video Meetings is also packaged with88 X Seriesmeeting the needs of businesses with a mobile and remote workforce by providing a highly reliable and resilient solution across desktop and mobile devices for voice, video conferencing, chat,contact center, APIs and advanced analytics built on an open cloud technology platform. This allows companies to rapidly unify a distributed workforce and enable flexible workstyles. It is also offered with88 Express, which is for small organizations and teams that require a complete, preconfigured business phone system with a dedicated business number, video meetings and messaging in a single desktop and mobile application.

88 will host a webcast on Tuesday, April 14, 2020 at 10 am PT / 1 pm ET with Ray Wang, Principal Analyst, Founder and Chairman of Constellation Research, and Emil Ivov, Ph.D., Founder of the Jitsi.org open-source project and the head of 88 Video Collaboration, to discuss 88 video meetings solutions, the importance of open-source video security for all, and why todays encryption and upcoming advanced capabilities are critical for highly-sensitive information and meetings.

Recommended AI News: AiThority Interview with Josh Poduska, Chief Data Scientist at Domino Data Lab

Continue reading here:
8x8 Raises the Bar with New Secure Video Meeting Solution; Oracle Cloud - AiThority

Google Meet vs Hangouts: Which Video Conferencing App Should You Use – Guiding Tech

Video conferencing has become a basic need for small and large companies. Most tend to look a Google for options and it has Hangouts that allows users to text and make audio and video calls. To make things a little simpler, or complicated, they decided to launch another video conferencing app called Meet and call it Hangouts Meet. It's a similar name policy that's confusing.

Google Hangouts is more focused and available to everyone with a Google account. Meanwhile, Meet is designed for businesses and enterprise users subscribing to the G Suite family of apps. There are plenty of differences under the hood, even though both are usable to initiate a video call.

Visit Hangouts

Visit Hangouts Meet

Let's understand what these differences are.

Open your favorite browser. If you are signed in to Chrome or Gmail, Hangouts will directly sign you in. The same goes for smartphone apps. The UI is pretty easy on the eyes with contacts on the left and three options to connect with them on the right.

You can chat and make audio and video calls to friends and relatives whom you have added to your Gmail or Contacts app and have Hangouts installed. You can click on the New conversation button to search for contacts. The wallpaper will change every time you refresh the page.

The mobile apps follow suit with a list of contacts on the main screen and a '+' icon to initiate a text or video conversation. Where is the audio call option? You need to open contact to find that. Not sure why they choose to go this weird UI route on mobile apps.

Once you open a conversation, there are other people-centric options like archive, block, create or add to a group, and notifications. There is no way to attach files, even from Google Drive, which surprised me a little. You can send images (device and Drive) or take photos. No audio clips either. But you can send video clips. These are some strange choices.

Overall, Hangouts works well but lacks certain features that you can find in other popular messaging apps like WhatsApp and Telegram like attachments and end-to-end encryption.

Google Meet or Hangouts Meet is an extension of the same platform but for business users. Meet is a direct Zoom competitor, and it is apparent the moment you launch it.

Meet focuses majorly on HD video conferencing, but also supports audio calls. Most global companies have employees joining from different regions, and Meet supports real-time captions to accommodate everyone. How does it all work?

Create a room and share the meeting code with others via either a click-and-join link or by directly sending the code. Just like Hangouts, the background wallpaper changes randomly but is much nicer to look at, thanks to the Hangouts Canvas Project.

Well, there are plenty of differences under the surface. Meet supports HD calls and was designed with G Suite users in mind. What this means is that you can only connect to a meeting but can't create one if you aren't a G Suite user. Hangouts is available for all Google users including G Suite.

You can schedule a Hangouts meeting but from the Google Calendar app only. That means you have to use that app, whether you prefer using it or not. The same is also true for Meet. I guess Google wants you to use Calendar, which makes sense if you have a G Suite account.

You will see additional options once a meeting has started. Some useful ones are screen sharing and meeting recording for future references. You can also chat with users, but only after a meeting has begun. That is not a messenger app. That's what Hangouts was developed for.

Hangouts is not end-to-end encrypted. However, Google notes that messages are encrypted in transit. That's quite odd while ther messenger apps like Telegram are focusing on the privacy and security of users. The same is also true for Meet, but Google notes that recordings saved in Google Drive are encrypted.

Google Hangouts support some additional features like adding special effects like hats during calls, status messages, and supports emojis. Meet doesn't and takes a more professional approach.

Both Hangouts and Hangouts Meet are available on the web and have mobile apps for both Android and iOS. Hangouts support up to 150 users in conversations and up to 25 in video calls for G Suite users but only 10 for free users.

Meet supports up to 100 participants in G Suite's basic plan, 150 in the business plan, and 250 in the enterprise plan. Note that up to 100,000 users can watch a live stream, which is huge but also needs a very powerful PC and internet connection. Useful for streaming a live event. Free users can only join a meeting but not create and manage one, as we discussed earlier.

The distinction is pretty clear once you look at the features. Hangouts is for every person who doesn't want to invest in G Suite apps. It is a regular messenger that lacks several features that you will otherwise find in popular messaging apps. Meet is an enterprise solution purpose-built for holding video conference meetings and is geared towards G Suite subscribers which makes a lot of sense. Why go for another video conferencing app when you are already paying for Meet?

Next up:Do you spend a lot of time on video conference calls? Here are some of the best webcams that were built just for that. Click on the link below to find out more.

Last updated on 14 Apr, 2020

Read the original:
Google Meet vs Hangouts: Which Video Conferencing App Should You Use - Guiding Tech

WikiLeaks founder Julian Assange fathered two children in embassy, partner says – NBC News

LONDON WikiLeaks founder Julian Assange fathered two children while he was living in London's Ecuadorian Embassy, their mother said Sunday as she pleaded with British authorities to release him from prison over fears for his health amid the coronavirus epidemic.

Stella Morris, who was a member of Assange's legal team, publicly revealed that Assange was a parent for the first time in a video interview WikiLeaks released on its social media channels.

Assange, 48, is being kept in London's Belmarsh high-security prison while he fights extradition to the U.S., where he faces 18 counts, including conspiring to hack government computers and violating an espionage law.

He was dragged out of the embassy and arrested by British police almost exactly a year ago after his asylum was revoked.

Morris said in the video that she first met Assange in 2011 but that their relationship started four years later, when he was living in the embassy. They deliberately chose to have children to ''break down the walls around him" and "imagine a life beyond prison," she added.

She said she was worried that Assange's life "might be coming to an end" as he remains in confinement amid the coronavirus outbreak.

Let our news meet your inbox. The news and stories that matters, delivered weekday mornings.

In a five-page witness statement, which has been seen by NBC News, Morris said she was going public in support of a bail application for Assange.

Assange's attorney Jennifer Robinson told NBC News in a statement Sunday that Morris had not made the decision to tell her story lightly, having fiercely protected her family's privacy for many years.

"She wanted to speak in support of Julian's bail application given the grave risk to his health in prison during the COVID pandemic and the judge refused her anonymity," Robinson said.

Assange's extradition hearing is scheduled to resume next month. Last month, he was denied bail after his attorneys said he should be released because he was highly vulnerable to the coronavirus.

Morris said she has gone to great lengths to shelter her children "from the climate that surrounds" Assange but felt that she needed to speak up because their lives are "on the brink" and she feared Assange could die in prison.

Download the NBC News app for breaking news and politics

In her statement, signed March 24, Morris said she had recently learned that Assange is in isolation "for effectively 23 out of each 24 hours and perhaps longer," adding that she cannot visit him in prison because of the coronavirus epidemic.

She said she has sensed "an increasing fear and panic" in her phone conversations with Assange about the coronavirus situation at the prison.

"I have feared with strong reason for a long time that I will lose Julian to suicide if there is no way in which he can stop his extradition to the U.S.," Morris wrote.

"I now fear I may lose him for different reasons and sooner to the virus," she added.

CORRECTION (April 12, 2020, 10:30 p.m. ET): A photo caption on an earlier version of this article misstated when Julian Assange was photographed arriving at Westminster Magistrates Court in London. The photo was taken in April 2019, not last month.

Yuliya Talmazan is a London-based journalist.

Michele Neubert is a London-based producer for NBC News.She has been awarded four Emmy Awards, an Edward R. Murrow Award and an Alfred I. duPont Award for her work in conflict zones, including the Balkans, Afghanistan and Kurdistan.

See original here:
WikiLeaks founder Julian Assange fathered two children in embassy, partner says - NBC News

WikiLeaks founder Julian Assange fathered two children during seven years in embassy – National Post

LONDON WikiLeaks founder Julian Assange fathered two children with a lawyer who was representing him while he was holed up in the Ecuadorian embassy in London fighting extradition, the lawyer told a British newspaper on Sunday.

The Mail on Sunday said 37-year-old South African lawyer Stella Morris has been engaged to Assange since 2017. The couple have two sons, aged 1 and 2, both conceived while Assange was in the embassy and kept secret from media covering his case and intelligence agencies monitoring his activity, the paper said.

It showed pictures of Assange with a baby, identified as the older son, who it said had been smuggled into the embassy to meet him. Both of the children are British citizens, it said. Assange had watched the births on a video link.

I love Julian deeply and I am looking forward to marrying him

The Australian-born Assange was dragged out of the embassy last year after a seven-year standoff, and is now jailed in Britain fighting extradition to the United States on computer hacking and espionage charges. His supporters say the U.S. case against him is political and he cannot receive a fair trial.

Morris said she had chosen to speak out now because she was worried about his susceptibility to the coronavirus in jail.

I love Julian deeply and I am looking forward to marrying him, the paper quoted her as saying.

Over the past five years I have discovered that love makes the most intolerable circumstances seem bearable but this is different I am now terrified I will not see him alive again.

Reporting by Peter Graff. Editing by Frances Kerry

See the original post here:
WikiLeaks founder Julian Assange fathered two children during seven years in embassy - National Post

The Global Quantum Cryptography Solutions Market is expected to grow by $ 2.71 bn during 2020-2024 progressing at a CAGR of 39% during the forecast…

NEW YORK, April 13, 2020 /PRNewswire/ --

Global Quantum Cryptography Solutions Market 2020-2024The analyst has been monitoring the quantum cryptography solutions market and it is poised to grow by $ 2.71 bn during 2020-2024 progressing at a CAGR of 39% during the forecast period. Our reports on quantum cryptography solutions market provides a holistic analysis, market size and forecast, trends, growth drivers, and challenges, as well as vendor analysis covering around 25 vendors.

Read the full report: https://www.reportlinker.com/p05483120/?utm_source=PRN

The report offers an up-to-date analysis regarding the current global market scenario, latest trends and drivers, and the overall market environment. The market is driven by the un-hackability of photons assured by laws of QM, possible obsolescence of traditional encryption, and proliferation of download now, decrypt later hacking paradigm. In addition, un-hackability of photons assured by laws of QM is anticipated to boost the growth of the market as well.The quantum cryptography solutions market analysis includes end-user segments and geographic landscapes

The quantum cryptography solutions market is segmented as below:By End-user G and P Defense BFSI Telecom Others

By Geographic Landscape APAC Europe MEA North America South America

This study identifies the emergence of QKD as a service as one of the prime reasons driving the quantum cryptography solutions market growth during the next few years. Also, extending the range of secure communication using twin-field QKD, and increasing popularity of free-space QKD will lead to sizable demand in the market.The analyst presents a detailed picture of the market by the way of study, synthesis, and summation of data from multiple sources by an analysis of key parameters. Our quantum cryptography solutions market covers the following areas: Quantum cryptography solutions market sizing Quantum cryptography solutions market forecast Quantum cryptography solutions market industry analysis

Read the full report: https://www.reportlinker.com/p05483120/?utm_source=PRN

About ReportlinkerReportLinker is an award-winning market research solution. Reportlinker finds and organizes the latest industry data so you get all the market research you need - instantly, in one place.

__________________________Contact Clare: clare@reportlinker.comUS: (339)-368-6001Intl: +1 339-368-6001

Link:
The Global Quantum Cryptography Solutions Market is expected to grow by $ 2.71 bn during 2020-2024 progressing at a CAGR of 39% during the forecast...

How a girl grasped the Holy Grail of encryption and changed the paradigm for safely sharing data – SiliconANGLE

Women are a minority in tech, with an average of three men for every one woman. When it comes to cybersecurity, the imbalance is even more acute.

A 2020 report shows that female cybersecurity experts are outnumbered five to one by their male counterparts. Inside the National Security Agency, cybersecuritys inner sanctum, the ratio is anyones guess.So the fact that a woman not only entered, but conquered and emerged victorious, from the NSA andwith the rights to market the ultimate encryption treasureis a feat worthy of attention.

How did she do it?Math, said Ellison Anne Williams (pictured), founder and chief executive officer of Enveil Inc. Math and grit.

Williams spoke withJohn Furrier, host of theCUBE, SiliconANGLE Medias mobile livestreaming studio, during the RSA Conference in San Francisco. They discussed her time at the NSA and how homomorphic cryptography provides the missing link in the cybersecurity chain.

The treasure Williams carried from the NSA is one that has often been described as the Holy Grail of cryptologists: Homomorphic encryption. Developed within the NSA by researchers wanting to maintain security for data in-use,the technology enables data to be handled securely while remaining encrypted.

This week theCUBE spotlights Williams in its Women in Tech feature.

Data security has three parts: data at rest, data in transit, and data at use, explained Williams. The first part involves securing data at rest on the file system and the database.This would be your more traditional in-database encryption, she said.

The second part is securing data as its moving around through the network, known as data in transit. The third part of the data security process is securing data that is in-use data under analysis or search. This is when the data is both at its most vulnerable and its most valuable.

While there are many security solutions for both data at rest and in transit, protecting data while it is being processed has always been the weak point. Data was secure before and after processing but had to be decrypted in order to be accessed, then re-encrypted. Homomorphic encryption solves that issue.

It means we can do things like take searches or analytics, encrypt them, and then go run them without ever decrypting them at any point during processing, Williams explained.

With her blonde curls and Southern charm, Williams doesnt match the stereotype of a socially awkward cybersecurity specialist. But while her looks may cause some to double-take at business meetings, her intelligence and expertise are indisputable. Williams holds adoctorate in mathematics (algebraic combinatorics) from North Carolina State University and two masters degrees, one in mathematics from the University of South Carolina and another in computer science from Nova Southeastern University in Florida.

As an undergrad, Williams was a pre-med student with a plan to study infectious diseases. Instead, she fell in love with math and became an expert in distributed computing and algorithms, cryptographic applications, graph theory, combinatorics, machine learning, and data mining.

After graduating from North Carolina State, Williams joined the research team at the NSA, where she spent 12 years doing a little bit of everything, including large-scale analytics, information security and privacy, computer network exploitation, and network modeling. She also advocated for women to join the NSAs team and mentored her male colleagues.

During her last few years at the NSA, she had the opportunity to work at The John Hopkins University Applied Physics Laboratory in Maryland. It was there that she worked on homomorphic encryption as part of a larger project for the NSA.

Although she had worked in research her whole career, Williams had always harbored entrepreneurial dreams. So when she learned she could declassify some of her research through the NSA Technology Transfer Program, she jumped at the chance to create a homomorphic encryption solution for the marketplace.

The idea of homomorphic encryption is not new. The concept has been around since 1978, but a first-generation fully homomorphic solution wasnt proposed until 2009. Research continued, and second- and third-generation fully homomorphic solutions were proposed. But problems remained with implementing these solutions at scale.

With the launch of Enveil Inc. in 2016, Williams took a bet that by combining the entrepreneurship in her DNA with the results of her years of research at John Hopkins and the NSA she could change that.

Less than a year after founding, the company got the cybersecurity communitys attention at the finals of theRSA Innovation Sandbox. Thats where the conversation really started to change around this technology called homomorphic encryption, the market category space called securing data in use, and what that meant, Williams said.

Williams expected a surprised reaction when the community discovered Enveil had a market-ready homomorphic encryption solution. She didnt expect that big-name early adopters, such as Bloomberg Beta, Thomson Reuters Corp., Capital One Financial Corp., and Mastercard Inc., would be eager to strategically invest in the company.

The enthusiasm is because homomorphic encryption solves the problem of secure data sharing. New technologies such as machine learning rely on ingesting massive amounts of data. Being restricted to just one data source limits the potential for powerful insights, but sharing data resources for analysis is a risky business.

There are also codes and regulations that govern data sharing, such as Europes General Data Protection Regulationand the California Consumer Privacy Act, which limit how data can be managed.Not to mention, people can get upset if they discover a company has a cavalier attitude tosharingpersonal data; as Google discovered withProject Nightingale.

This makes the ability to maintain anonymity and security while sharing data critically important for businesses, especially those in the financial sectors, where the payoff and the risks are high stakes. Say a bank suspects a client of financial misconduct, such as money laundering, and as part of establishing the trail, it needs to verify transactions with other institutions.

[Banks] cant necessarily openly, freely share all the information. But if I can ask you a question and do so in a secure and private capacity, still respecting all the access controls that youve put in place over your own data, then it allows that collaboration to occur, Williams stated.

Homomorphic encryption enables the data to be searched while remaining encoded, so no personally identifiable information is ever revealed and regulation compliance and security is ensured.

Current use casesamong Enveils clients include financial regulation, with banks able to securely share information to combat money laundering and other fraudulent activity. Global transactions are simplified by allowing collaboration regardless of national privacy restrictions. And in healthcare, hospitals and clinics can share patient details to research facilities and remain confident that they are not disclosing sensitive personal data.

After just over three years in operation, Williams is proud of what her company has accomplished. Its really pretty impressive, she said.

It is. Breaking the male-dominated culture of cybersecurity, Williams has created a company that is at the forefront of data in-use security, recently announceda $10 million Series A funding and is looking to expand globally with new product lines that enable advanced decisioning in a completely secure and private capacity.

Were creating a whole new market, Williams said. [Were] completely changing the paradigm about where and how you can use data for business purposes.

Heres the complete video interview, part of SiliconANGLEs and theCUBEs coverage of theRSA Conference:

Show your support for our mission with our one-click subscription to our YouTube channel (below). The more subscribers we have, the more YouTube will suggest relevant enterprise and emerging technology content to you. Thanks!

Support our mission: >>>>>> SUBSCRIBE NOW >>>>>> to our YouTube channel.

Wed also like to tell you about our mission and how you can help us fulfill it. SiliconANGLE Media Inc.s business model is based on the intrinsic value of the content, not advertising. Unlike many online publications, we dont have a paywall or run banner advertising, because we want to keep our journalism open, without influence or the need to chase traffic.The journalism, reporting and commentary onSiliconANGLE along with live, unscripted video from our Silicon Valley studio and globe-trotting video teams attheCUBE take a lot of hard work, time and money. Keeping the quality high requires the support of sponsors who are aligned with our vision of ad-free journalism content.

If you like the reporting, video interviews and other ad-free content here,please take a moment to check out a sample of the video content supported by our sponsors,tweet your support, and keep coming back toSiliconANGLE.

More:
How a girl grasped the Holy Grail of encryption and changed the paradigm for safely sharing data - SiliconANGLE

Snowden Warns Governments Are Using Coronavirus to Build the ‘Architecture of Oppression’ – VICE UK

This article originally appeared on VICE US.

The future may be unpredictable, but global pandemics arent. There isnt a single government on the planet that hasnt been warned, repeatedly, that at some point a viral pandemic will sweep the globe, causing untold death and economic disruption.

And yet most failed to prepare for the novel coronavirus.

Every academic, every researcher who's looked at this knew this was coming, says famed whistleblower Edward Snowden in an exclusive interview with VICE co-founder Shane Smith. Yet when we needed it, the system has now failed us, and it has failed us comprehensively.

Snowden is the first guest in the new Shelter in Place series debuting on VICE TV on Thursday at 10 p.m. EST, which looks at the global response to COVID-19 and its lasting impact around the world. Smith will discuss these themes, as well as how to survive quarantine, with a host of thinkers from science, entertainment, economics, and journalism.

In the premiere episode, Smith talks to Snowden, who blew the lid off of the National Security Agencys surveillance of the American people in 2012. In the interview conducted from Smiths home in Santa Monica over video chat, the two tackle topics including the lack of preparedness in the face of a global pandemic, how long this will be a threat to humanity, and whether the power were handing to global leaders will come back and bite us in the ass.

Smith: Why does it seem like we're so ill-prepared?

Snowden: There is nothing more foreseeable as a public health crisis in a world where we are just living on top of each other in crowded and polluted cities, than a pandemic. And every academic, every researcher who's looked at this knew this was coming. And in fact, even intelligence agencies, I can tell you firsthand, because they used to read the reports had been planning for pandemics.

Are autocratic regimes better at dealing with things like this than democratic ones?I don't think so. I mean, there are arguments being made that China can do things that the United States can't. That doesn't mean that what these autocratic countries are doing is actually more effective.

If you're looking at countries like China, where cases seem to have leveled off, how much can we trust that those numbers are actually true?I don't think we can. Particularly, we see the Chinese government recently working to expel Western journalists at precisely this moment where we need credible independent warnings in this region.

It seems that [coronavirus] may be the greatest question of the modern era around civil liberties, around the right to privacy. Yet no one's asking this question.As authoritarianism spreads, as emergency laws proliferate, as we sacrifice our rights, we also sacrifice our capability to arrest the slide into a less liberal and less free world. Do you truly believe that when the first wave, this second wave, the 16th wave of the coronavirus is a long-forgotten memory, that these capabilities will not be kept? That these datasets will not be kept? No matter how it is being used, what is being built is the architecture of oppression.

Watch the full interview Thursday at 10 p.m. on VICE TV or catch the episode later on VICEtv.com.

Cover: VICE co-founder Shane Smith interviews Edward Snowden for a new show, "Shelter in Place" from VICE TV.

See the rest here:
Snowden Warns Governments Are Using Coronavirus to Build the 'Architecture of Oppression' - VICE UK

Barton Gellman Joins The Atlantic as Staff Writer – The Atlantic

The Atlantic has hired the three-time Pulitzer Prize winner Barton Gellman as a staff writer, editor in chief Jeffrey Goldberg announced today. Gellman, one of the most esteemed investigative reporters in America, is known in particular for his coverage of national-security issues. He broke the story of the NSA whistleblower Edward Snowden for The Washington Post, which was awarded the 2014 Pulitzer Prize for Public Service.

Gellman, Goldberg said, will focus his early reporting on the coronavirus pandemic and the governments response to the unfolding crisis. Bart is an astonishingly gifted reporter, and adding him to our formidable roster of talent means that our coverage of the biggest story of our time will only become stronger. Goldberg added: As we know from his distinguished career, Bart excels across a wide range of topics, including, of course, national security, surveillance, terrorism, and privacy, and we are excited about publishing great stories from him on these subjects as well.

Gellman has a long-standing interest in subjects concerning infectious disease. In 2000, he was a Pulitzer Prize finalist for his in-depth reporting on the AIDS crisis. In addition to the Pulitzer awarded for his Snowden reporting, Gellman was part of the Washington Post team that won the Pulitzer in the national-reporting category in 2002, for coverage of the 9/11 attacks. And he was awarded another Pulitzer for stories written with Jo Becker about the work and influence of former Vice President Dick Cheney. His book on Cheney, Angler, was a national best seller. Gellmans next book, Dark Mirror: Edward Snowden and the American Surveillance State, will be published in May by Penguin Press.

The rest is here:
Barton Gellman Joins The Atlantic as Staff Writer - The Atlantic