Canon ransomware attack highlights rise of name and shame tactics – Verdict

Canon has been hit by a ransomware attack perpetrated by Maze Group, an organisation known for its unorthodox name and shame tactics.

Maze is believed to have stolen at least 10TB of data from the camera maker, and has encrypted access to key systems. More than 20 websites operated by Canon have been impacted, and currently show a down for maintenance message.

However, somewhat unusually for a ransomware attack, Maze Group is threatening to publish the stolen data if Canon does not pay the currently undisclosed ransom fee a tactic dubbed name and shame.

While uncommon for ransomware generally, this is a standard approach for Maze, which has previously undertaken attacks against organisations including Cognizant, Chubb, Xerox and LG. It also was behind an attack on the government of the city of Pensacola, Florida, and began releasing files after the city refused to pay a $1m ransom.

The name and shame method used by Maze is particularly concerning because it challenges general advice from cybersecurity experts to not pay in ransomware incidents.

What makes the Maze cybercriminal group sothreateningis that it takes exploitation a step further, not only encrypting the victims data, but also stealing it and threatening to release it to the public, explained Stephen Manley, chief technologist at Druva.

This adds another layer of complexity to the conversation around whether to pay or not pay the ransom.

In general, those targeted by ransomware that do pay risk being re-targeted, as they become seen as easy prey. However, the risk of exposing data in the case of non-payment makes this decision harder to make while also increasing costs for those who are victims of ransomware.

The bullying tactics used by such ransomware groups are making attacks even more expensive, and they are not going to stop any time soon, particularly within the current climate, said Matt Walmsley, EMEA director at Vectra.

These attackers will attempt to exploit, coerce, and capitalise on organisations valuable digital assets.

And with growing numbers targeted by Maze, it is thought that more will be hit in the future.

Canon, LG and Xerox were all recent victims of a Maze ransomware attack, and well continue to see more and more organisations fall prey to such breaches, said Sanjay Jagad, senior director of products and solutions at Cloudian.

Get the Verdict weekly email

For organisations that fear they are at risk of being targeted by a ransomware attack similar to the one conducted against Canon, having a skilled and well-resourced security team is vital.

Ransomware attackers tend to seek privileged entities associated to accounts, hosts and services due to the unrestricted access they can provide and to ease replication and propagation. Attackers will manoeuvre themselves through a network and make that step from a regular user account, to a privileged account which can allow them to deploy their tools and access all the data they need in order to finalise their ransomware attack and coerce their victims, explained Walmsley.

Therefore, security teams need to be agile as time is their most precious resource in dealing with ransomware attacks. Early detection and response is key to gaining back control and stopping the attackers in their tracks before they can propagate across the organisation, stealing and denying access to data.

For senior decision makers, it is also important to remember that encryption, while valuable for many forms of cybersecurity, is not a silver bullet for ransomware.

Encryption doesnt work against ransomware because the attacker can simply re-encrypt the data to prevent access to its rightful owner, said Jagad.

Other traditional approaches to combating ransomware, such as anti-phishing training, firewalls and password software, often fall short. The only way for organisations to really safeguard themselves is to protect data at the storage layer.

The importance of effective cloud security is also vital to recognize.

Organisations that embrace the agility and flexibility of cloud data protection are best positioned to respond and ensure their data remains safe and accessible from cyberattackers, said Manley.

Its the most effective way to detect malware/ransomware intrusions and protect the entire environment, including endpoints, SaaS applications, the cloud and data centers, and can automatically restore systems that can neutralise the ransomware. Deploying a robust cloud-based ransomware protection and recovery solution will be the best medicine for staying ahead of malicious threats in the future.

Read more: Number of UK organistions paying ransomware has doubled: CrowdStrike

Continue reading here:
Canon ransomware attack highlights rise of name and shame tactics - Verdict

Blue Canyon Technologies Tapped to Build QETSSat Encryption Satellite – Via Satellite

Artist Rendering of the BCT YAM-4 (Photo: BusinessWire)

Loft Orbital awarded a contract to small satellite manufacturer Blue Canyon Technologies (BCT) to develop and build the YAM-4 spacecraft bus for the Canadian Space Agency (CSA) and Honeywells Quantum Encryption and Science Satellite (QEYSSat) mission, BCT announced August 5.

BCT will build the satellite using its new X-SAT Venus-Class bus design, which can carry payloads up to 90 kg. Financial details of the contract were not disclosed.

The CSA named Honeywell its prime contractor for QEYSSat in a $30 million dollar deal signed in June 2019. The QEYSSat mission aims to demonstrate the use of Quantum Key Distribution (QKD) encryption technology for secure online communications on Earth. QKD creates encryption codes that are designed to be unbreakable, allowing for more secure quantum computing.

Having a secure communication infrastructure is critical in this day and age. Our foundational support of the YAM-4 spacecraft will make the access to space for this type of demonstration less expensive and quicker to launch, allowing Canadian scientists to study how QKD behaves in space, BCT President and CEO George Stafford said in a statement.

Go here to see the original:
Blue Canyon Technologies Tapped to Build QETSSat Encryption Satellite - Via Satellite

WhatsApp UsersHeres Why Your Messages May Soon Disappear – Forbes

NurPhoto via Getty Images

WhatsApp is unique in the messaging worldstraddling security and functionality like no other platform. But others have the market-leader in their sights, and intend to close the gap. Specialists like Signal, and industry giants Google and Apple are all closing in. For its part, WhatsApp is developing and launching many new features to maintain its lead. And now we have news of yet another exciting feature on its way.

In keeping with its balancing act, some of WhatsApps updates are security focusedthink encrypted cloud backups, encrypted multiple device access and extended secure video calls, while others are more trivialthink stickers, QR codes and search. The latest feature to be trailedcurrently buried in beta codeis on the security side.

End-to-end encryption is the foundation of secure messagingif your messenger doesnt have this by defaultFacebook Messenger, Twitter, SMS, then dont use it. Period. But security can go furtherjust think of the issues buried in all the chat histories on all the phones youve messaged. The answer is self-deleting messages.

Signal disappearing messages

This is available and widely used on Signal, the best (and more secure alternative) to WhatsApp. You can set the messages in any conversation to automatically disappear after a settable period of between 5 seconds and 1 week. This doesnt stop screenshots or media attachments being stored, but it does prevent a build up of history.

We have known for some time that WhatsApp is developing a similar feature, and now we have confirmation from the ever-reliable WaBetaInfo that the feature is well-developed within the latest beta code, albeit we don't know how soon it will launch. We also now know that the feature will be called expiring messages.

One downside, though, we had thought that this expiring messages function would offer the same flexibility as in Signal, with options to set a timer by conversation. But it appears that WhatsApps expiring messages will delete after a fixed 7 days.

We can assume this feature will be assignable to specific chats, without impacting messages sent before it was applied. We can also assume that either side of a chat can apply the setting. For groups, only admins will have that option.

WhatsApp expiring messages

This isnt the most important forthcoming security update within WhatsAppthat would be extending end-to-end encryption to cloud backups, currently thats the biggest hole in WhatsApps security. Its also not the most criticalthat would be the forthcoming multiple linked devices, also due soon. But this helps close the gap to Signals better security-focused functionality, and thats clearly a good thing.

WABetaInfo has also revealed that WhatsApp intends to add a mute forever option for those annoying groups or chats that keep popping up unwanted notifications. This would be very much on the trivial functionality side of the line, when compared to the security advantages of cleaning message histories as you go.

Read more here:
WhatsApp UsersHeres Why Your Messages May Soon Disappear - Forbes

Microsoft releases Windows 10 build 20185 to the Dev channel – here’s what’s new – Neowin

Today, Microsoft is releasing Windows 10 Insider Preview build 20185 to the Dev channel, as is typical for Wednesdays. As usual, there's nothing new and exciting in the build. It's just a few minor changes, such as better DNS configuration in Settings, and ADMX Backed Policies in MDM.

Here's the full changelog:

Were making a few changes to the Network section in Settings:

Making DNS settings more easily accessible: Editing your DNS server assignment is now a top-level option when you go into your networks properties page.

Encrypted DNS controls in the Settings app: Encrypted DNS (DNS over HTTPS, or DoH) can help increase privacy and security while browsing the web. You can now configure DoH directly in the Settings app to more easily take advantage of this feature:

You can add any IP address listed here to unlock the DoH dropdown and choose to use encryption. Once encryption is enabled, you can confirm its working by looking at the applied DNS servers in the network properties and see them labeled as (Encrypted) servers. If you want to try a custom DoH server we dont recognize yet, you can configure an IP address to be recognized as a DoH server by using the netsh command documented here at the end of the blog post.

As always, appreciate your feedback!

Starting with Windows 10 Insider Preview Build 20175, we have enabled 647 new MDM policies across 56 ADMX files to enable commercial customers to configure policies that are also supported through Group Policies. Contains ADMX based Policies such as App Compat, Event Forwarding, Servicing and Task Scheduler. These new policies can be configured using Intune custom profile. Intune UX is planned to be available later this year.

ADMX file name:

As usual, the build comes from the Iron development branch, although it's not actually a preview of 21H1. It's similar to how the 195xx builds were from the Manganese branch, but they weren't 20H2. 21H1, if it arrives at all, will be a small, cumulative update-style update.

You can grab today's build via Windows Update, as always. If you're not on the Dev channel yet, you can enroll through the Windows Insider Program tab in Settings.

Here is the original post:
Microsoft releases Windows 10 build 20185 to the Dev channel - here's what's new - Neowin

Hardware-based Full Disk Encryption Market Analysis by Trends, Types, Applications, manufactures, Regions, Market size and Forecast up to 2023 – The…

Global Hardware-based Full Disk Encryption market- Report defines the vital growth factors, opportunities and market segment of top players during the forecast period from 2019 to 2025. The report Hardware-based Full Disk Encryption offers a complete market outlook and development rate during the past, present, and the forecast period, with concise study, Hardware-based Full Disk Encryption market effectively defines the market value, volume, price trend, and development opportunities. The comprehensive, versatile and up-to-date information on Hardware-based Full Disk Encryption market is provided in this report.

The latest research report on Hardware-based Full Disk Encryption market encompasses a detailed compilation of this industry, and a creditable overview of its segmentation. In short, the study incorporates a generic overview of the Hardware-based Full Disk Encryption market based on its current status and market size, in terms of volume and returns. The study also comprises a summary of important data considering the geographical terrain of the industry as well as the industry players that seem to have achieved a powerful status across the Hardware-based Full Disk Encryption market.

Get PDF Sample Copy of this Report to understand the structure of the complete report: (Including Full TOC, List of Tables & Figures, Chart) @ https://www.researchmoz.com/enquiry.php?type=S&repid=2745746&source=atm

Segment by Type, the Hardware-based Full Disk Encryption market is segmented intoHard Disk Drive (HDD) FDESolid State Drives (SSD) FDE

Segment by Application, the Hardware-based Full Disk Encryption market is segmented intoIT & TelecomBFSIGovernment & Public UtilitiesManufacturing EnterpriseOthers

Regional and Country-level Analysis:North AmericaUnited StatesCanadaAsia-PacificChinaJapanSouth KoreaIndiaSoutheast AsiaAustraliaRest of Asia-PacificEuropeGermanyFranceU.K.ItalyRussiaNordic CountriesRest of EuropeLatin AmericaMexicoBrazilRest of Latin AmericaMiddle East & AfricaTurkeySaudi ArabiaUAERest of MEA

Competitive Landscape and Hardware-based Full Disk Encryption Market Share AnalysisHardware-based Full Disk Encryption market competitive landscape provides details and data information by companies. The report offers comprehensive analysis and accurate statistics on revenue by the player for the period 2015-2020. It also offers detailed analysis supported by reliable statistics on sale and revenue by players for the period 2015-2020. Details included are company description, major business, Hardware-based Full Disk Encryption product introduction, recent developments, Hardware-based Full Disk Encryption sales by region, type, application and by sales channel.

The major companies include:Seagate Technology PLCWestern Digital CorpSamsung ElectronicsToshibaKingstonMicron Technology IncIntel

Do You Have Any Query Or Specific Requirement? Ask to Our Industry [emailprotected] https://www.researchmoz.com/enquiry.php?type=E&repid=2745746&source=atm

Complete Analysis of the Hardware-based Full Disk Encryption Market:

Comprehensive assessable analysis of the industry is provided for the period of 2019-2025 to help investors to capitalize on the essential market opportunities.

The key findings and recommendations highlight vital progressive industry trends in the global Hardware-based Full Disk Encryption market, thereby allowing players to improve effective long term policies

A complete analysis of the factors that drive market evolution is provided in the report.

To analyze opportunities in the market for stakeholders by categorizing the high-growth segments of the market

The numerous opportunities in the Hardware-based Full Disk Encryption market are also given.

You can Buy This Report from Here @ https://www.researchmoz.com/checkout?rep_id=2745746&licType=S&source=atm

Furthermore, Global Hardware-based Full Disk Encryption Market following points are involved along with a detailed study of each point:

Generation of this Global Hardware-based Full Disk Encryption Industry is tested about applications, types, and regions with price analysis of players that are covered.

Revenue, sales are planned for this Hardware-based Full Disk Encryption market, including with various essentials along yet another facet is assessed in this section for foremost regions.

In continuation using earnings, this section studies consumption, and global Hardware-based Full Disk Encryption market. This area also sheds light on the variance between ingestion and distribution. Export and Hardware-based Full Disk Encryption significance data are provided in this part.

In this section, key players have been studied depending on product portfolio, their Hardware-based Full Disk Encryption market company profile, volume, price, price, and earnings.

Hardware-based Full Disk Encryption market analysis aside from business, the information, and supply, contact information from manufacturers, consumers and providers can also be presented. Additionally, a feasibility study to asset and SWOT analysis for endeavors have been contained.

View original post here:
Hardware-based Full Disk Encryption Market Analysis by Trends, Types, Applications, manufactures, Regions, Market size and Forecast up to 2023 - The...

E-mail Encryption Market size and Key Trends in terms of volume and value 2020-2025 – CueReport

The study of E-mail Encryption market thoroughly analyzes the competitive landscape of this industry while focusing of market growth pattern over the past years and major global developments to predict the dynamics in the forthcoming years. The report is so drafted that companies operating in the business vertical can gain advantage from existing tends and construct strategies accordingly.

The document further highlights the growth opportunities and drivers stimulating the overall revenues of the market over the forecast period. Challenges and threats capable of dampening the industry growth are also enlisted in the report.

Request Sample Copy of this Report @ https://www.cuereport.com/request-sample/30846

A comprehensive documentation of comparison between past and present market scenario is prepared to reckon the growth rate of the industry over the estimated timeframe. The report also encompasses details about the impact of COVID-19 on the business outlook and offers insights about potentials for industry players.

Request Sample Copy of this Report @ https://www.cuereport.com/request-sample/30846

Key Takeaways from E-mail Encryption Market Report:

Product Landscape:

Application Spectrum:

Regional Terrain:

Competitive Hierarchy:

In closing, the E-mail Encryption market has been scrutinized extensively based on numerous parameters and segmentations, while elaborating on aspects like supply chain & sales channel, including downstream buyers and upstream raw material suppliers.

Market segmentation

The E-mail Encryption market is split by Type and by Application. For the period 2020-2026, the growth among segments provides accurate calculations and forecasts for sales by Type and by Application in terms of volume and value. This analysis can help you expand your business by targeting qualified niche markets.

Research Objective:

Why to Select This Report:

Key questions answered in the report:

MAJOR TOC OF THE REPORT:

Chapter 1 Industry Overview

Chapter 2 Production Market Analysis

Chapter 3 Sales Market Analysis

Chapter 4 Consumption Market Analysis

Chapter 5 Production, Sales and Consumption Market Comparison Analysis

Chapter 6 Major Manufacturers Production and Sales Market Comparison Analysis

Chapter 7 Major Product Analysis

Chapter 8 Major Application Analysis

Chapter 9 Industry Chain Analysis

Chapter 10 Global and Regional Market Forecast

Chapter 11 Major Manufacturers Analysis

Chapter 12 New Project Investment Feasibility Analysis

Chapter 13 Conclusions

Chapter 14 Appendix

Request Customization on This Report @ https://www.cuereport.com/request-for-customization/30846

More here:
E-mail Encryption Market size and Key Trends in terms of volume and value 2020-2025 - CueReport

GovCon Expert Bill Downer: Securing the Supply Chain; Securing the Data – GovConWire

Bill Downer GovConExpert

Bill Downer, vice president of national programsfor Seagate Government Solutions, has released his second article as a member of Executive Mosaics GovCon Expert program on Monday after exploring the impact or lack of impact CMMC will have on supply chains and data hygiene.

In his second article, Downer discussed the federal governments use of data and the simple steps that federal agencies could take to secure our nations data outside of CMMC.You can read GovCon Expert Bill Downers piece below:

Securing the Supply Chain; Securing the Data

In my first article for the GovCon Expert program, which you can read right here, I talked about how Cybersecurity Maturity Model Certification (CMMC) was focusing on the development of weapon systems and adhering to the methods needed to protect the data about those systems as opposed to securing our supply chains.

For this article, I wanted to discuss some very simple steps that the U.S. federal government can take to secure data beyond CMMC.

It is well documented that most personal data that has been stolen from our government systems (think Office of Personnel Management) was stolen because the federal government has many requirements for data encryption. As a result, the data was either not encrypted at all or encrypted improperly.

Unfortunately, these requirements are often waived or ignored. In many cases and systems, the government and its contractors do an exceptional job of protecting our data while in transit. However, they become much more relaxed about the level and discipline to protect data at rest.

The unfortunate aspect of this approach is that the data at rest becomes the largest attack surface. With the current pandemic, this situation has become much worse. With so many government employees and contractors working from home or other remote locations through laptops and tablets, the data on these devices is always at risk.

I happen to occupy an interesting seat during these times because I work for the largest storage device manufacturer in the world. From my seat, I know at a macro level who is buying what type of devices with what level of encryption.

The Federal Information Processing Standard (FIPS) 140-2 standard is aninformation technologysecurity approval program for cryptographic modules produced by private sector vendors who seek to have their products certified for use in government departments and regulated industries (such as financial and health-care institutions) that collect, store, transfer, share and disseminatesensitive but unclassified(SBU) information.

Tamper evident FIPS 140-2 security labels are utilized to deter and detect tampering of modules.

FIPS 140-2 establishes theCryptographic Module Validation Program(CMVP) as a joint effort by the National Institute of Standards and Technology (NIST) and theCommunications Security Establishment(CSE) for theGovernment of Canada

Security programs overseen by NIST and CSE focus on working with governments and industry to establish more secure systems and networks. They do that by developing, managing and promoting security assessment tools, techniques, services and supporting programs for testing, evaluation and validation.

They also address other areas like: the development and maintenance of security metrics, security evaluation criteria and evaluation methodologies, tests and test methods; security-specific criteria for laboratory accreditation; guidance on the use of evaluated and tested products; research to address assurance methods and system-wide security and assessment methodologies; security protocol validation activities; and appropriate coordination with assessment-related activities of voluntary industry standards bodies and other assessment regimes.

Unfortunately, the government is not a leader in buying FIPS 140-2 encrypted drives for their systems. That requirement is often waived or not required for federal information technology systems. Since it is not required and IT systems often fall under the category of lowest price technically acceptable, the bidders do not offer FIPS 140-2 storage devices.

If they do offer storage devices as a part of the proposal; there is no value attached to these secure devices. One possible suggestion is for the government to require FIPS 140-2 devices in all their systems and that these devices must always be in FIPS mode. It is a NIST standard that should be used and enforced.

About GovCon Expert

Through Executive Mosaics GovCon Expert program, you can access the words of caution and celebration from the elite minds behind the innovation and implementation of emerging technologies across federal agencies and industry, including artificial intelligence, national security, cybersecurity, 5G, cloud, big data as well as competitive intelligence, open source solutions and other aspects of the GovCon industry.

Dont hesitate to contact us, if you want to become a GovCon Expert and share your voice across our unmatched publications and other social media products that have a weekly circulation of over 1,000,000 direct emails as well as matching inbound traffic.

We look forward to hearing from our next GovCon Expert soon. Click here to become a GovCon Expert.

See the original post here:
GovCon Expert Bill Downer: Securing the Supply Chain; Securing the Data - GovConWire

Blue Canyon Technologies Selected by Loft Orbital to Provide Spacecraft Bus for Honeywell and the Canadian Space Agency Program – Business Wire

BOULDER, Colo.--(BUSINESS WIRE)--Small satellite manufacturer and mission services provider Blue Canyon Technologies (BCT) has been selected by Loft Orbital to develop and build the YAM-4 spacecraft bus for the Quantum Encryption and Science Satellite (QEYSSat) mission.

The QEYSSat mission is being led by the Canadian Space Agency (CSA) and Honeywell. The CSA awarded Honeywell a $30 million dollar contract for the design and implementation phases of the mission. The mission will demonstrate the use of advanced encryption technology, also known as quantum key distribution (QKD), in space for secure online communications on Earth. According to CSA, this QKD technology will create encryption codes that are virtually unbreakable, allowing for more secure communications in the age of quantum computing.

Having a secure communication infrastructure is critical in this day and age, says George Stafford, President and CEO of Blue Canyon Technologies. Our foundational support of the YAM-4 spacecraft will make the access to space for this type of demonstration less expensive and quicker to launch, allowing Canadian scientists to study how QKD behaves in space.

The satellite will be designed using BCTs newest X-SAT line of spacecraft, specifically the X-SAT Venus-Class which can carry payloads up to 90 kg. As with other BCT X-SAT buses, the X-SAT Venus-Class is a high-agility platform, enabling the onboard instrument to collect data and revisit sites frequently. The X-SAT Venus-Classs compact profile is designed to maximize the volume, mass and power available for the CSA mission.

BCT is a best-in-class bus provider and we are confident in their ability to deliver a spacecraft that meets the unique performance requirements of this mission, said John Eterno, VP Missions at Loft Orbital.

The benefits of QEYSSat will be substantial. Because encryption keys cannot be compromised, they are virtually impossible to crack, and integration this technology into Canadian communications networks would guarantee the privacy of public, private and commercial data. While ground-based QKD devices are available for use today, their capabilities are limited: current systems rely on cables to transmit quantum particles on land, but the signals can become unreliable over long distances. To provide the capacity across long distances, even globally, the network must be able to use satellites in lieu of cables.

Blue Canyons diverse spacecraft platform has the proven capability to enable a broad range of missions and technological advances for the New Space economy, further reducing the barriers of space entry.BCT is currently building more than 60 spacecraft for government, commercial and academic missions. The company has doubled in size over the past 12 months and recently opened its new 80,000-square-foot headquarters and satellite constellation production facility in Jun

About BCT

Blue Canyon Technologies, Inc., (BCT) a Colorado-based private company founded in 2008 to bring innovative, reliable and affordable solutions to space missions, is an experienced integrator of aerospace systems and developer of advanced aerospace products and technologies. BCT is a vertically integrated spacecraft manufacturer supporting nearly 40 unique missions with over 70 spacecraft. The company currently has more than 60 satellites in production and is developing a new 80,000-square-foot facility for high rate production.

BCT has supported missions for the U.S. Air Force, NASA, the Defense Advanced Research Projects Agency (DARPA) and many others and provided the Attitude Control Systems for the first interplanetary CubeSats which successfully traveled to Mars. The company has been recognized with awards including Inc Magazines 5000 Fastest Growing Private Companies, 2017 Colorado Companies to Watch, and the 2019 Colorado Biz Made in Colorado Emerging Manufacturer Winner.

For the latest news on Blue Canyon Technologies and for other company information, please visit http://www.bluecanyontech.com. You can follow the company on Instagram here or Twitter here.

See more here:
Blue Canyon Technologies Selected by Loft Orbital to Provide Spacecraft Bus for Honeywell and the Canadian Space Agency Program - Business Wire

Network Encryption Market : Segmented by Application and Geography Trends, Growth and Forecasts To 2027 | Cisco, Thales eSecurity, Gemalto, Juniper…

Environment, Health, and Safety (EHS) Market Report Forecast to 2027

Reports and Data has added a new research report titled Global Environment, Health, and Safety (EHS) Market to its extensive database. The report thoroughly explains the market dynamics from vital industry data to accurate estimation in the forecast years. It comprises of all the crucial segments of the changing dynamics of the market. The information can be beneficial for readers to gain a robust footing in the global market.

The report mainly focuses on the types, applications, overview, and major players in the Environment, Health, and Safety (EHS) market. The report provides historical data from 2017-2018 and industrial development trends and growth patterns for the forecast years 2020-2027. The report is updated with the latest economic scenario due to the global COVID-19 crisis. The pandemic has brought dynamic changes in the major segments of the market. The report covers the present and future impact of the COVID-19 crisis and the economic scenario post-COVID-19.

Get a sample of the report @ https://www.reportsanddata.com/sample-enquiry-form/1561

The report on the global Environment, Health, and Safety (EHS) market consists of up-to-date financial data formulated by extensive research to provide accurate analysis. The report also consists of the evaluation of key market trends, in-depth analysis of segmentations, and sub-market categorization on a regional and global scale. The report also provides strategic recommendations to key market players and new entrants based on current emerging trends.

Key players of the market mentioned in the report are:

Enablon, Intelex, SAP, ETQ, Enviance, Gensuite, Velocityehs, Cority, Verisk 3E and Sphera Solutions.

The report provides an in-depth analysis of production cost, market segmentation, end-use applications, and industry chain analysis. The report provides CAGR, value, volume, revenue, and other key factors related to the global Environment, Health, and Safety (EHS) market. All the findings and data have been gathered through extensive primary and secondary research and are validated by industry experts and research analysts.

The report further studies the segmentation of the market based on product types offered in the market and their end-use/applications.

Component Type Outlook (Revenue, USD Billion; 2020-2026)

Professionals type Outlook (Revenue, USD Billion; 2020-2026)

ApplicationType Outlook (Revenue, USD Billion; 2020-2026)

End-user Type Outlook (Revenue, USD Billion; 2020-2026)

Request customization of the report @ https://www.reportsanddata.com/request-customization-form/1561

Major geographical regions studied in this report include:

Request a discount on the report @ https://www.reportsanddata.com/discount-enquiry-form/1561

Key points covered in the report:

To get the Report Description and TOC, visit @ https://www.reportsanddata.com/report-detail/environment-health-and-safety-ehs-market

Thank you for reading our report. Please get in touch with us if you wish to request a customization of the report. Our team will ensure you get a report well-suited for your needs.

Follow this link:
Network Encryption Market : Segmented by Application and Geography Trends, Growth and Forecasts To 2027 | Cisco, Thales eSecurity, Gemalto, Juniper...

Australias anti-encryption law has damaged the countrys tech industry – Reclaim The Net

Nearly two years after Australia passed its controversial anti-encryption laws, the tech industry is already feeling an impact. Apparently, many non-Australian companies and IT professionals are no longer interested in doing business with Australia.

The typically-inconspicuously named Assistance and Access Act 2018 and Telecommunications and Other Legislation Amendment were supposed to create a safe online environment for Australians. The official description of AAA on Australias government website states that encryption technologies are employed by terrorists, paedophiles, drug smugglers and human traffickers to conceal illicit activities and facilitate crime.

The Australian government denies that these laws would be used to implement backdoors. Meanwhile, Australias Attorney-General Christian Porter has specifically said This ensures that our national security and law enforcement agencies have the modern tools they need, with appropriate authority and oversight, to access the encrypted conversations

As usual, fear-mongering tactics are used to justify authoritarian acts of government overreach that dwindle our freedoms. Then again, given the context its framed in, its no surprise the bill was passed. After all, lawmakers arent known to be the most informed and up to date on the latest technology.

Double your web browsing speed with today's sponsor. Get Brave.

The situation largely mirrors the FESTA/SESTA situation States-side. Initially pushed as anti-human trafficking bills, they in fact made human trafficking worse by forcing many informants underground. In the end, all they did was target innocent, consensual sex work.

But how could you not support a bill that says its against terrorism, pedophilia, and human trafficking? Only a monster wouldnt.

Australian tech giant Atlassian has decided to speak out against the laws, saying they have damaged the reputation of the technology sector, discouraged talent from working in Australia, and harmed an industry that could help drive economic growth in the nations post-Covid-19 recovery.

RELATED: FastMail says its staff are worried about being legally compelled to install secret backdoors in its software

It is my belief that the very rushed nature in which the [TOLA] bill was passed and then also the nature of the rights granted to government under TOLA have had a negative impact on the reputation of the Australian technology sector, said Patrick Zhang, Atlassians policy and government affairs head.

Another criticism is that a backdoor can be exploited not just by the government, but also by foreign governments or malicious actors weakening security as a whole.

He discussed technical capability notices (TCNs), which are basically subpoenas that can force companies to build backdoors into their encrypted services without the knowledge of their customers. Alternatively, they can also be used to compel IT employees to build said backdoors without the knowledge of their company.

That has given a number of our customers concerns. Because I think that the fear is that by working with an Australian company, whether by using its product or as a vendor is that company going to be subject to orders by the government to weaken its security or to build backdoors that will make the product less secure and expose a weak link, if you will, in the technology supply chain that is global in nature?

RELATED: Australias draconian anti-encryption laws mean device makers blacklist Australian telecoms firms

Zhangs fears arent just speculative either. Australias anti-encryption laws have already been used to strip journalists of their protections as we saw last year with the infamous AFP raid on ABC.

In June 2019, Australian federal police officers raided Australian Broadcasting Corporations headquarters with a warrant regarding allegations that Australian special forces were involved in war crimes.

The warrant, posted on Twitter, granted officers the right to add, copy, delete or alter any data in ABCs computers. The warrant further went on to detail the different types of data they were interested in, including handwritten and digital notes and correspondence, graphics, raw footage, documents classified as secret, along with any manual, instruction, password or other thing that assists to gain access to or interpret or decode any of the above things.

Former defence lawyer David McBride was charged with five counts of leaking classified information, on which the war crime allegations were based.

In a world where countries like Switzerland and Norway are considered havens of personal privacy protection, its not difficult to see where Zhang is coming from. China, Russia and India are already considered to be on the opposite end of that scale. Looks like Australia is squarely in the latter list now.

Continued here:
Australias anti-encryption law has damaged the countrys tech industry - Reclaim The Net