Organizations are creating the perfect storm by not implementing security basics – Help Net Security

European organizations have a false sense of security when it comes to protecting themselves, with only 68% seeing themselves as vulnerable, down from 86% in 2018, according to Thales.

This confidence flies in the face of the findings of the survey of 509 European executives which reveals 52% of organizations were breached or failed a compliance audit in 2019, raising concerns as to why 20% intend to reduce data security spend in the next year.

The findings come as workers across Europe are working from home due to COVID-19, often using personal devices which dont have the built-in security office systems do, significantly increasing risk to sensitive data.

Across the board, companies are racing to digitally transform and move more applications and data to the cloud; 37% of European countries stated they are aggressively disrupting the markets they participate in or embedding digital capabilities to enable greater enterprise agility.

A key aspect of this transformation is in the cloud becoming the leading data environment. 46% of all data stored by European organizations is now stored in the cloud, and with 43% of that data in the cloud being described as sensitive, it is essential that it is kept safe.

As more sensitive data is stored in cloud environments, however, data security risks increase. This is of particular concern given that 100% of businesses surveyed report that at least some of the sensitive data they are storing in the cloud is not encrypted.

Only 54% of sensitive data in the cloud is protected by encryption and even less (44%) is protected by tokenisation, highlighting the disconnect between the level of investment companies are making into cybersecurity and the increasing threats they face.

Despite the multitude of threats, businesses feel that the complexity (40%) of their environments is holding their data security capabilities back.

Multi-cloud adoption is the main driver of this complexity; 80% of businesses are using more than one IaaS (Infrastructure as a Service) vendor, whilst 29% have more than 50 SaaS (Software as a Service) applications to manage.

Businesses also identified a lack of budget (30%), staff to manage (28%) and organization buy-in/low priority (25%) as other top blockers.

Businesses are continuing to race towards digital transformation and many are increasingly reliant on complex cloud environments, without taking a zero-trust approach. Data is more at risk than ever, whilst organizations are unwittingly creating the perfect storm for hackers by not implementing the security basics, commented Rob Elliss, EMEA Vice President for Data Security solutions at Thales.

Unfortunately, this will result in increasing problems, particularly in a world where working remotely will be part of the new-normal, unless companies can step up to the plate when it comes to keeping data safe.

Whilst organizations continue to look at the threat of today, many are starting to turn their attention to peril that the acceleration of computing power, quantum, could bring to them. In fact, 93% respondents are concerned quantum computing will lead to exploits being created that could expose the sensitive data they hold.

Whats more, 69% European organizations expect quantum to affect their cryptographic operations in the next five years.

As a result, most organizations are reacting, with 31% planning to offset quantum computing threats by switching away from static encryption or symmetric cryptography. Furthermore, a similar amount (30%) plans to implement key management that supports quantum safe random number generator.

It is clear that businesses are aware of evolving threats they face and its reassuring to see them acknowledging some of the key steps they need to take including moving away from static encryption and implementing quantum-proof key management.

Its critical, though, that organizations dont just look at threats years away, but invest in their cybersecurity processes now and see it as an integral part of their digital transformation, Elliss concluded.

Continue reading here:
Organizations are creating the perfect storm by not implementing security basics - Help Net Security

Global Quantum Cryptography Services Market 2020 | Know the Companies List Could Potentially Benefit or Loose out From the Impact of COVID-19 | Top…

A perfect mix of quantitative & qualitative Quantum Cryptography Servicesmarket information highlighting developments, industry challenges that competitors are facing along with gaps and opportunities available and would trend in Quantum Cryptography Servicesmarket. The study bridges the historical data from 2014 to 2019 and estimated until 2025.

The Quantum Cryptography ServicesMarket report also provides the market impact and new opportunities created due to the COVID19/CORONA Virus Catastrophe The total market is further divided by company, by country, and by application/types for the competitive landscape analysis. The report then estimates 2020-2025 market development trends of Quantum Cryptography ServicesIndustry.

Downlaod Sample ToC to understand the CORONA Virus/COVID19 impact and be smart in redefining business strategies. https://inforgrowth.com/CovidImpact-Request/6358861/quantum-cryptography-services-market

The Top players are MagiQ Technologies, Quantum XC, Qubitekk, QuintessenceLabs, NuCrypt, Qasky, Crypta La.

Market Segmentation:

Quantum Cryptography Services Market is analyzed by types like Consulting and Advisory, Deployment and Integration, Support and Maintenan

On the basis of the end users/applications, G&P, Defense, BFSI, Telec

Download Free Sample PDF along with few company profileshttps://inforgrowth.com/sample-request/6358861/quantum-cryptography-services-market

Be the first to knock the door showing the potential that Quantum Cryptography Servicesmarket is holding in it. Uncover the Gaps and Opportunities to derive the most relevant insights from our research document to gain market size.

A major chunk of this Global Quantum Cryptography ServicesMarket research report is talking about some significant approaches for enhancing the performance of the companies. Marketing strategies and different channels have been listed here. Collectively, it gives more focus on changing rules, regulations, and policies of governments. It will help to both established and new startups of the market.

The study objectives of this report are:To analyze global Quantum Cryptography Servicesstatus, future forecast, growth opportunity, key market, and key players.To present the Quantum Cryptography Servicesdevelopment in the United States, Europe, and China.To strategically profile the key players and comprehensively analyze their development plan and strategies.To define, describe and forecast the market by product type, market, and key regions.

Get Special Discount Up To 50%, https://inforgrowth.com/discount/6358861/quantum-cryptography-services-market

Major Points from Table of Contents

1 Quantum Cryptography Services Quantum Cryptography Services Market Overview2 Quantum Cryptography Services Market Competition by Manufacturers3 Production Capacity by Region4 Global Quantum Cryptography Services Market by Regions5 Production, Revenue, Price Trend by Type6 Global Quantum Cryptography Services Market Analysis by Application7 Company Profiles and Key Figures in Quantum Cryptography Services Business8 Quantum Cryptography Services Manufacturing Cost Analysis9 Marketing Channel, Distributors and Customers10 Market Dynamics11 Production and Supply Forecast12 Consumption and Demand Forecast13 Forecast by Type and by Application (2021-2026)14 Research Finding and Conclusion15 Methodology and Data Source.

ENQUIRE MORE ABOUT THIS REPORT AT https://inforgrowth.com/enquiry/6358861/quantum-cryptography-services-market

FOR ALL YOUR RESEARCH NEEDS, REACH OUT TO US AT:Address: 6400 Village Pkwy suite # 104, Dublin, CA 94568, USAContact Name: Rohan S.Email:[emailprotected]Phone: +1-909-329-2808UK: +44 (203) 743 1898Website: http://www.inforgrowth.com

Follow this link:
Global Quantum Cryptography Services Market 2020 | Know the Companies List Could Potentially Benefit or Loose out From the Impact of COVID-19 | Top...

Quantum computing is the next big leap – Lexology

Traditional network infrastructures and cybersecurity standards will be compromised if quantum computing becomes viable, the reason why quantum R&D is a key factor of EUs digital strategy

Our most sensitive information, say banking or browsing data, is kept secure by rather resilient encryption methods. With current computing capabilities, it is a very difficult task for a computer to run the necessary math in order to extract information from encrypted data. That is not the case, however, with quantum computing.

At their smallest, computers are made up of transistors, which process the smallest form of data: bits or 0s and 1s. Contrary to regular machines, which operate in bits, quantum computers process qubits, which carry not one of those two values, but any of those two. Because they operate in qubits, they are able to process data unseemingly faster.

If a regular computer were to guess the combination of two bits, it would take, at worst, four different tries (22 00, 01, 10, 11) before guessing it. A quantum computer would only require the square root of that, because each qubit carries any of the two values. When processing large numbers this makes a huge difference.

While it is not expected that quantum computers will be commercially viable or even sufficiently developed anytime soon to squander computing as it is today, a number of the encryption algorithms used today are not quantum-resistant.

Having considered the above, it is not uncalled for that organizations are rethinking their cybersecurity standards in order to protect their data in view of new developing technologies, namely quantum computing.

Portugal signed up for EU's Quantum Communication Infrastructure initiative ("EuroQCI"). The initiative trusts on developing a network over the next ten years for sensitive information to be shared. As with anything that may be ill-used, quantum computing poses a serious cyberthreat. EuroQCI will use quantum technologies to ensure the secure transfer and storage of sensitive information. As computer parts are now as small as the size of an atom and current computing is reaching its physical limits, the EuroQCI aims at making quantum computing and cryptography a part of conventional communication networks, which is in line with Portugal's strategy to strengthen the country's digital ecosystem.

Objective number one of Portugal's National Cybersecurity Strategy is to ensure national digital resilience by leveraging inclusion and cooperation in order to bolster the security of cyberspace in view of threats which may jeopardize or cause disruption of networks and information systems essential to society. Currently, the EU's Study on the System Architecture of a Quantum Communication Infrastructure (within the EuroQCI initiative) is open for contributions on the future of quantum network infrastructures. The consultation is open until 10 June 2020.

Go here to read the rest:
Quantum computing is the next big leap - Lexology

UC San Diego’s CREATE and SDSC Awarded National K-12 STEM Grant – UC San Diego Health

Image credit: UC San Diego CREATE

The U.S. Department of Defenses (DoD) Defense STEM Education Consortium (DESC) has awarded a one-year grant to the San Diego Supercomputer Center (SDSC) at UC San Diego and the UC San Diego Mathematics Project housed at the universitys Center for Research on Educational Equity, Assessment, and Teaching Excellence (CREATE), to introduce computing into high school math classrooms.

The DSEC Innovation Bloc grant, called ICAT through DM - short for Introducing Computing and Technology Through Discrete Math problem-solving - will fund a Summer Institute for regional high school mathematics teachers and a Summer Academy for military-connected, underserved, and underrepresented rising seniors.

Robert Sinkovits, director of SDSCs scientific computing applications and lead for SDSCs Education and Training program; and Osvaldo Soto, director of the UC San Diego Mathematics Project at CREATE, are the Principal Investigators for the grant.

The DSEC Innovation Bloc grant was awarded as part of a five-year, $75 million award by the DoD under which DSEC focuses on K-16 (kindergarten through college) STEM enrichment programs for military-connected and/or low-income students and educators, as well as workforce engagement, program evaluation, and public outreach efforts across the nation. The consortium is comprised of 18 organizations, includes UC San Diego CREATE, which serves as a program hub lead on the DSEC grant.

UC San Diego CREATE is helping our campus to leverage its contacts and networks to support STEM learning for all students, particularly those from less advantaged backgrounds, to make use of learning opportunities funded by the DoD and its many STEM partners, said Susan Yonezawa, associate director of CREATE and a co-director of the UC San Diego Math Project. Were pleased the DSEC Innovation Bloc grant, a collaboration between the UC San Diego Mathematics Project and SDSC, will bring crucial computer and mathematics skills and knowledge to military-connected, underserved, and underrepresented students in San Diego.

The ICAT through DMs Summer Institute professional development program for teachers and Summer Academy for students were slated to be held at SDSC, but because of COVID-19 restrictions the programs have been moved online. The online Summer Institute will be held June 22-July 2, 2020, for 20 teachers from the Oceanside Unified School District, San Diego Unified School District, San Marcos Unified School District and Sweetwater Union High School District. Teachers will explore Discrete Math content and be introduced to Python computer language through games of strategy, cryptography and counting techniques. The curriculum will focus on identifying the best conditions for using computing and technology to solve math problems (an example of Standard for Mathematical Practice #5: Use appropriate tools strategically).

The online Summer Academy, led by the Institute teachers, will be held the following week, July 6-10, 2020, for 24 military-connected, underserved, and underrepresented rising seniors from the teachers high schools.

Computational and mathematical thinking are essential to the DoD workforce in nearly every domain, from climate simulations and aerodynamics to analyzing large volumes of text data and satellite imagery, said Sinkovits. Discrete mathematics is particularly important in areas as diverse as cryptography, logistics, communications networks and complex decision making.

Mathematics is traditionally taught using a pencil-and-paper approach and often lacks a real-world context, frequently leading to a sense of alienation among middle and high school students along with missed opportunities to advance critical mathematical and computational ways of thinking, noted Sinkovits.

Many of todays real-world problems require mathematical solutions that can only be solved using computational techniques and resources and a strong understanding of key mathematical concepts backed with the power of technology to help students as well as teachers better connect empirical and deductive reasoning, Soto said.

SDSCs involvement with UC San Diego CREATE began when Sinkovits and SDSC Education Manager Ange Mason met Yonezawa to discuss ideas for SDSCs summer program for teachers.

One could say that Susan was our matchmaker, said Sinkovits. She suggested that we meet with Osvaldo from the UC San Diego Math Project, as well as Trang Vu, a veteran math teacher and one of the developers of the Discrete Math Pre-Collegiate Curriculum. Together, the ideas started flowing quickly for a proposal to DSEC to fund a discrete mathematics program for teachers and their students. Were excited to be involved in this very worthwhile initiative.

As the project got underway, we were fortunate enough to recruit more outstanding teachers to help prepare for our summer activities: Tony Claudio, a computer science teacher from Sweetwater Union High School District, and Jorge Hernandez Leon, a math teacher from San Diego Unified School District, said Soto.

Originally posted here:
UC San Diego's CREATE and SDSC Awarded National K-12 STEM Grant - UC San Diego Health

Hardware Encryption Market to Witness Increase in Revenues by 2025 – Cole of Duty

Global Hardware Encryption Market: Snapshot

A variety of factors or specific business needs influences the choice of specific encryption solutions among various end-use industries. Hardware encryption is gaining popularity for protecting sensitive data on portable devices such as laptops and USB flash drives. Its ease of use, consistent performance, and robust protection against numerous common and less sophisticated attacks offsets its high cost compared to software-based encryption. For instance, any brute-force attacks by hackers to gain access to hardware encrypted chips can be easily thwarted with the help of this. The mechanism of hardware encryption works on the devices on-board security, which performs the needed encryption and decryption. Unlike software-based encryption, it doesnt require drivers and has minimal configuration requirements.

Download Brochure of This Market Report at https://www.tmrresearch.com/sample/sample?flag=B&rep_id=647

However, since it is tied to a particular device, hardware encryption methods may not prove so helpful. Nevertheless, the soaring use of mobile devices by several governmental agencies and the storage of confidential financial and healthcare data in mobile devices have propelled the demand for hardware encryption methods. In case the devices are stolen, the data cannot be compromised.

In recent years, Advanced Encryption Standard (AES), a specification standard by the National Institute of Standards and Technology (NIST) has been gaining prominence for data security for hardware as well as software encryption method. The cryptographic module is fast gaining adoption among several military, government, healthcare institutions, and financial organizations world over, especially in developing and developed nations. AES has become one of the most popular algorithms adopted in symmetric key cryptography by various governmental agencies in the U.S. Boasting of marked improvements over its predecessors, AES employs longer cryptographic keys, offers easy implementation, and can be used in restricted environments such as in smart cards.

Global Hardware Encryption Market: Overview

The global market for hardware encryption is projected to witness healthy growth throughout the forecast period, thanks to the advent of portable storage devices in order to transfer files and information between computers. In addition, these devices help in improving the security concerns and confidentiality of data. These devices cannot be altered or removed by any malware or virus or be uninstalled by the user, owing to which the market is likely to witness high growth over the coming few years.

The research report on the global hardware encryption market offers a thorough overview, focusing on the key growth drivers and currents trends in the market. The research study throws light on the product segmentation, applications, technological advancements, and the regional segments of the global hardware encryption market. In addition, the limitations and challenges that are being faced by the prominent players in the overall market have been discussed in the research study.

Global Hardware Encryption Market: Drivers and Restraints

The rising concerns related to the privacy of data and data security and tremendous expansion of the digital content are anticipated to encourage the growth of the global hardware encryption market throughout the forecast period. In addition, several advantages offered by hardware encryption in comparison with software encryption technology and the rising need of regulatory framework are some of the other factors estimated to accelerate the growth of the overall market in the near future.

On the contrary, the need for high capital investment and the lack of awareness among consumers reading the benefits of hardware encryption technology are projected to restrict the growth of the global hardware encryption market in the next few years. Nevertheless, the emergence of economical and compact hardware encryption technique and the rising adoption of cloud computing are expected to offer promising opportunities for market players in the coming years.

Global Hardware Encryption Market: Region-wise Outlook

The global market for hardware encryption has been divided on the basis of geography into Europe, the Middle East and Africa, North America, Latin America, and Asia Pacific. The research study has provided a detailed analysis of the leading regional segment, highlighting the market share and anticipated growth rate. In addition, the key factors that are encouraging the growth of these segments have been discussed in the scope of the research study.

According to the research study, Asia Pacific is anticipated to witness strong growth throughout the forecast period, owing to the robust development of the IT industry. In addition, a substantial contribution from China, India, Malaysia, and South Korea is expected to accelerate the growth of the hardware encryption market in Asia Pacific throughout the forecast period. Furthermore, with the presence of a large number of established hardware encryption manufacturing companies, North America is anticipated to witness healthy growth in the next few years.

Key Players Mentioned in the Research Report are:

The global hardware encryption market is projected to witness a high level of competition in the coming few years. The leading players in the market are focusing on offering new products to consumers in order to enhance their market penetration and maintain their dominant position throughout the forecast period. Some of the prominent players operating in the hardware encryption market across the market are Netapp, Maxim Integrated Products, Inc., Toshiba Corp., Gemalto NV., Micron Technology, Inc., Samsung Electronics Co. Ltd., Kanguru Solutions, Thales (E-Security), Winmagic Inc., Kingston Technology Corp., Western Digital Corp., and Seagate Technology PLC.

Furthermore, the research study has provided a detailed analysis of the competitive landscape of the global hardware encryption market. An in-depth overview of company profiles and their financial overview have been discussed at length in the scope of the research study. Additionally, the business strategies, SWOT analysis, and the recent developments have been included to offer a clear understanding of the overall market.

Request For TOC On this Market Report at https://www.tmrresearch.com/sample/sample?flag=T&rep_id=647

About TMR Research:

TMR Research is a premier provider of customized market research and consulting services to business entities keen on succeeding in todays supercharged economic climate. Armed with an experienced, dedicated, and dynamic team of analysts, we are redefining the way our clients conduct business by providing them with authoritative and trusted research studies in tune with the latest methodologies and market trends.

More:
Hardware Encryption Market to Witness Increase in Revenues by 2025 - Cole of Duty

Global Blockchain Market 2020: Trends, Market Share, Industry Size, Growth, Opportunities Analysis and Forecast to 2023 – Personal Injury Bureau UK

A blockchain, originally block chain, is a growing list of records, called blocks, which are linked using cryptography. Each block contains a cryptographic hash of the previous block, a timestamp, and transaction data (generally represented as a merkle tree root hash).

According to this study, over the next five years the Blockchain market will register a xx% CAGR in terms of revenue, the global market size will reach US$ xx million by 2023, from US$ xx million in 2017. In particular, this report presents the global revenue market share of key companies in Blockchain business, shared in Chapter 3.

This report presents a comprehensive overview, market shares and growth opportunities of Blockchain market by product type, application, key companies and key regions.

This study considers the Blockchain value generated from the sales of the following segments:

Segmentation by product type: breakdown data from 2013 to 2018, in Section 2.3; and forecast to 2023 in section 10.7.

On-premise

Software

Segmentation by application: breakdown data from 2013 to 2018, in Section 2.4; and forecast to 2023 in section 10.8.

SMEs

Large Enterprises

This report also splits the market by region: Breakdown data in Chapter 4, 5, 6, 7 and 8.

Americas

United States

Canada

Mexico

Brazil

APAC

China

Japan

Korea

Southeast Asia

India

Australia

Europe

Germany

France

UK

Italy

Russia

Spain

Middle East & Africa

Egypt

South Africa

Israel

Turkey

GCC Countries

The report also presents the market competition landscape and a corresponding detailed analysis of the major vendor/manufacturers in the market. The key manufacturers covered in this report: Breakdown data in in Chapter 3.

IBM (US)

AWS (US)

Microsoft (US)

SAP (Germany)

Intel (US)

Oracle (US)

Bitfury (US)

Cegeka (Netherlands)

Earthport (UK)

Guardtime (Estonia)

Digital Asset Holdings (US)

Chain (US)

Huawei (China)

BlockCypher (US)

Symbiont (US)

BigchainDB ( Germany)

Applied Blockchain (UK?

RecordsKeeper (Gibraltar)

Blockpoint (US)

Auxesis Group (India)

BTL Group (Canada)

Blockchain Foundry (Singapore)

In addition, this report discusses the key drivers influencing market growth, opportunities, the challenges and the risks faced by key players and the market as a whole. It also analyzes key emerging trends and their impact on present and future development.

Research objectives

To study and analyze the global Blockchain market size by key regions/countries, product type and application, history data from 2013 to 2017, and forecast to 2023.

To understand the structure of Blockchain market by identifying its various subsegments.

Focuses on the key global Blockchain players, to define, describe and analyze the value, market share, market competition landscape, SWOT analysis and development plans in next few years.

To analyze the Blockchain with respect to individual growth trends, future prospects, and their contribution to the total market.

To share detailed information about the key factors influencing the growth of the market (growth potential, opportunities, drivers, industry-specific challenges and risks).

To project the size of Blockchain submarkets, with respect to key regions (along with their respective key countries).

To analyze competitive developments such as expansions, agreements, new product launches and acquisitions in the market.

To strategically profile the key players and comprehensively analyze their growth strategies.

Table of Contents

2018-2023 Global Blockchain Market Report (Status and Outlook)

1 Scope of the Report

1.1 Market Introduction

1.2 Research Objectives

1.3 Years Considered

1.4 Market Research Methodology

1.5 Economic Indicators

1.6 Currency Considered

2 Executive Summary

2.1 World Market Overview

2.1.1 Global Blockchain Market Size 2013-2023

2.1.2 Blockchain Market Size CAGR by Region

2.2 Blockchain Segment by Type

2.2.1 On-premise

2.2.2 Software

2.3 Blockchain Market Size by Type

2.3.1 Global Blockchain Market Size Market Share by Type (2013-2018)

2.3.2 Global Blockchain Market Size Growth Rate by Type (2013-2018)

2.4 Blockchain Segment by Application

2.4.1 SMEs

2.4.2 Large Enterprises

2.5 Blockchain Market Size by Application

2.5.1 Global Blockchain Market Size Market Share by Application (2013-2018)

2.5.2 Global Blockchain Market Size Growth Rate by Application (2013-2018)

3 Global Blockchain by Players

3.1 Global Blockchain Market Size Market Share by Players

3.1.1 Global Blockchain Market Size by Players (2016-2018)

3.1.2 Global Blockchain Market Size Market Share by Players (2016-2018)

3.2 Global Blockchain Key Players Head office and Products Offered

3.3 Market Concentration Rate Analysis

Go here to read the rest:
Global Blockchain Market 2020: Trends, Market Share, Industry Size, Growth, Opportunities Analysis and Forecast to 2023 - Personal Injury Bureau UK

It happened today – this day in history – June 9 – Yellow Advertiser

68AD: Roman Emperor Nero commits suicide, imploring his secretary Epaphroditos to slit his throat to evade a Senate-imposed death by flogging.

1534: Jacques Cartier sails into the mouth of the St Lawrence River.

1660: Louis XIV of France marries Maria Theresa of Spain.

1672: Tsar Peter The Great (Pyotr Alexeyevich Romanov) is born in Moscow.

1752:The French army surrenders to the British in Trichinopoly, India.

1822: Charles Graham patents porcelain false teeth in New York.

1856: 500 Mormons leave Iowa, and head west for Salt Lake City, Utah, carrying all their possessions in two-wheeled handcarts.

1870: Author Charles Dickens dies from a stroke aged 58.

1873: Alexandra Palace burns down after being open for only 16 days.

1891: French painter Paul Gauguin arrives in Papeete, Tahiti.

1898: China leases Hong Kongs new territories to the UK for 99 years.

1899: James J Jeffries KOs defending champion Bob Fitzsimmons of England in the 11th round in Brooklyn, New York to win the lineal World Heavyweight title.

1908: Edward VII visits Tsar Nicholas II at Reval, Russia, where the two discuss the growing power of Germany and British plans for reform in Macedonia.

1930: Chicago Tribune reporter Jake Lingle is killed during rush hour at the Illinois Central train station by the Leo Vincent Brothers, allegedly over a $100,000 gambling debt owed to Al Capone.

1934: The first appearance of Donald Duck in the cartoon The Wise Little Hen.

1940: Gen Charles de Gaulle and Winston Churchill meet for the first time.

1942: Nazis kill all inhabitants of Lidice, which had been implicated in the assassination of Reinhard Heydrich, controller of Bohemia and Moravia.

1946: Bhumibol Adulyadej becomes King of Thailand after the death of his brother King Ananda Mahidol. On the same day, Joe Louis KOs Billy Conn in Round 8 for the heavyweight boxing title.

1958: The Queen opens Gatwick Airport. On the same day, actor Robert Donat dies aged 53.

1968: Ken Rosewall beats Rod Laver 6-3, 6-1, 2-6, 6-2 to win the French Open tennis title, the first Grand Slam tournament of the open era , allowing professional players to compete.

1978: Larry Holmes beats Ken Norton in 15 for the heavyweight boxing title.

1980: Comedian Richard Pryor suffers burns from free basing cocaine.

1983: Margaret Thatchers Conservative Party wins the general election.

1984: Martina Navratilova defeats Chris Evert 6-3, 6-1, becoming the second woman in the open era to hold all four Grand Slam titles at once.

1985: American Thomas Sutherland is kidnapped and held hostage in Lebanon. On the same day, the USSRs Vega 1 deposits a lander on the surface of Venus.

1990: Monica Seles wins her first Grand Slam singles title at the French Open, beating Steffi Graf 7-6, 6-4.

1991: Bruce Springsteen marries E Street Band backup singer Patti Scialfa.

1997: British lease on the New Territories in Hong Kong expires.

1998: Liam Gallagher and Mick Hucknall were involved in a brawl at The Metropolitan Hotel, London.

2013: Edward Snowden publicly makes his identity known as the leaker of NSA documents.

2014: Comedian/actor Rik Mayall dies aged 56.

2015: Bandleader James Last dies aged 86.

2017: 1960s Batman actor Adam West dies aged 88.

2019: Over 1 million people protest in Hong Kong over proposed new extradition laws to China in one of largest-ever protests in the city.

BIRTHDAYS: Jackie Mason, comedian, 92; Francis Monkman, keyboards/composer, 71; Patricia Cornwell, author, 64; Michael J Fox, actor, 59; Aaron Sorkin, screenwriter, 59; Johnny Depp, actor, 57; Gloria Reuben, actress, 56; Ed Simons, keyboards (The Chemical Brothers) 50; Matt Bellamy, singer-guitarist/pianist (Muse) 42; Natalie Portman (Neta-Lee Herschlag) actress, 39.

See the rest here:
It happened today - this day in history - June 9 - Yellow Advertiser

How open source software vulnerabilities create risk for organizations – TechRepublic

Security flaws in open source software have increased and can take a long time to be added to the National Vulnerability Database, says RiskSense.

Image: RiskSense

Open source software offers certain benefits over commercial products. As the source code is publicly available, developers can modify and tweak OSS applications to enhance their capabilities. Plus, the huge number of people who use these programs serve as a crowdsourced way to test their reliability and security. However, that doesn't mean OSS applications are immune from flaws and vulnerabilities.

SEE:SQL injection attacks: A cheat sheet for business pros(TechRepublic Premium)

In fact, when a security hole emerges in an open source product, the damage can be widely felt throughout all uses and reuses of the source code. A report released Monday by vulnerability management firm RiskSense describes the impact of security vulnerabilities on OSS.

For its report "The Dark Reality of Open Source," RiskSense found that the total number of CVEs (Common Vulnerabilities and Exposures) in OSS are on the rise, more than doubling to 968 in 2019 from 421 in 2018 and 435 in 2017. The increase doesn't seem to be an anomaly as the number of new CVEs has stayed at a high level (178) during the first three months of 2020.

Further, OSS vulnerabilities often take a long time to get added to the US National Vulnerability Database (NVD), a valued resource for information on security flaws. RiskSense discovered that the average time between the public disclosure of a vulnerability and its inclusion in the NVD was 54 days. A total of 119 CVEs had lag times of more than a year, while almost a quarter had lag times of more than a month. The longest lag time seen was 1,817 days for a critical PostgreSQL vulnerability.

The lags were observed across all severities of vulnerabilities, with critical vulnerabilities having some of the longest average lag times, according to the report. The long waits create a risk for organizations and users who rely on the NVD as a primary source for data on security bugs.

Some OSS applications are plagued with more vulnerabilities than are others. The Jenkins open source automation server had the most CVEs with 646, while MySQL came in second with 624. These two OSS products tied for the most weaponized vulnerabilities (those exploited in the wild) with 15 each. HashiCorp's Vagrant had only nine CVEs, but six of them were weaponized. Such OSS products as Apache Tomcat, Magento, Kubernetes, Elasticsearch, and JBoss all had security flaws that were popular in real-world attacks.

Among the vulnerabilities found in OSS, cross-site scripting (XSS) and input validation were among the most common and the most weaponized. XSS issues were the second most common but the most weaponized, while input validation issues were the third most common and the second most weaponized. Other vulnerabilities that were much less common yet still popular in cyberattacks were deserialization issues (28 CVEs), code injection (16 CVEs), error handling issues (2 CVEs), and container errors (1 CVE).

Image: RiskSense

On the plus side, of the 978 vulnerabilities seen in 2019, only 15, or 1.5%, were weaponized. And among the 2,694 total vulnerabilities that RiskSense tracked over the past five years from 2015 through the first three months of 2020, only 89, or 3.3%, of them were weaponized. Still, OSS vulnerabilities can be a "blind spot" for many organizations who may not be aware of all the open source projects and dependencies found in the applications they use.

"While open source code is often considered more secure than commercial software since it undergoes crowdsourced reviews to find problems, this study illustrates that OSS vulnerabilities are on the rise and may be a blind spot for many organizations," RiskSense CEO Srinivas Mukkamala said in a press release. "Since open source is used and reused everywhere today, when vulnerabilities are found, they can have incredibly far-reaching consequences."

You don't want to miss our tips, tutorials, and commentary on the Linux OS and open source applications. Delivered Tuesdays

Read more:
How open source software vulnerabilities create risk for organizations - TechRepublic

OWEAR release Open Source Software and Datasets Database for its website – BSA bureau

OWEAR database includes the organizations initial index of open source software and datasets, together with validation papers

Shimmer Research, a global leader in wearable technology for research applications, today announced that the Open Wearables Initiative (OWEAR) has uploaded its open-source software and datasets database for wearable sensors and other connected health technologies to its website atwww.owear.org.

We are proud to announce the release of the OWEAR database, which includes the organizations initial index of open source software and datasets, together with validation papers, said Geoffrey Gill, president of Shimmer Americas and an OWEAR co-founder. This is an evolving resource and we are actively encouraging researchers to continue to register algorithms and datasets atwww.owear.orgso we can achieve our shared goal of creating high-quality, sensor-generated health measures that can help streamline drug development and enable digital medicine.

Shimmers latest OWEAR contribution is its step-count algorithm. There are so many proprietary step-counting algorithms in use, which generate different results from the same data, that clinical researchers cannot compare data across studies employing different wearable sensors. By donating this open-source algorithm, we hope to enable clinical researchers to use the same algorithm across wearables and projects and so gain access to much richer datasets, explained Mr. Gill.

OWEAR is also launching the public phase of aDREAM Challengewhich will benchmark measures of gait later this year. Generating accurate and consistent gait assessments is extremely important because they serve as a diagnostic and prognostic tool for neurological conditions, such as stroke, cerebral palsy, Parkinsons disease, traumatic brain injury, multiple sclerosis, and partial paralysis; a general assessment of aging; and as a proxy for assessing cognition.

DREAM Challenges crowdsource solutions to important biomedical and bioinformatics research problems, and then evaluate the solutions objectively to identify the best one. A few sponsorship opportunities remain for this first OWEAR DREAM Challenge.

Mr. Gill will discuss these OWEAR initiatives further during his IEEE Wearables and Medical IoT Interoperability & Intelligence (WAMIII) Workshop presentation entitled The Open Wearables Initiative: Helping Realize the Potential of Wearables to Revolutionize Clinical Trials at 11 a.m. ET on June 11. Registration for this complimentary webinar is available athttps://standards.ieee.org/events/wamiii/virtual-talk-series-2020.html.

Original post:
OWEAR release Open Source Software and Datasets Database for its website - BSA bureau

Open-Source, Geospatial Mapping Software Helps Business & Community Solve Real-World Problems – Geospatial World

1904labs, a digital transformation consulting firm, and Bayer Crop Science, a division of German life sciences company Bayer AG, jointly released a new geospatial mapping framework to the open source community. The framework, ol-kit, is a free, easy-to-use, map component toolkit built with React and OpenLayers and is compatible with many popular open source tools in the geospatial community.

Geospatial technology has captured the attention of the public eye in the current crisis with maps being created to track COVID-19 cases, essential supplies, and more. However, many existing mapping frameworks are costly or not robust enough to meet these crucial challenges. While geospatial tools are some of the most expensive and complex software, ol-kit gives anyone these comprehensive capabilities at no cost.

Bayer and 1904labs started working on this mapping framework four years ago. Internally, the ol-kit is a backbone for many of Bayers applications for managing fields, research experiments, monitoring yields, and more. These applications gather a huge amount of data. Without the interactive map, driven by ol-kit, it would be impossible to interpret the data.

This is an important piece of functionality from which small businesses, governments, and community organizations would see tremendous benefit. Contributing to the open source community wasnt something that our group had done before, but it was well worth

The effort, and I cant wait to see how ol-kit is used, Shaun Diltz, Principal Product Manager at Bayer Crop Science.

With open source software, its core code is available for anyone to view, change, or use in their own way free of charge. Typically more cost effective than proprietary software, open source software also benefits from community collaboration to make it better, more secure, and stable.

Robin Carnahan, Fellow at Georgetown University, and previous director of the state and local practice at the federal General Services Administrations tech consultancy team, 18F, said, Its great to see a big international enterprise and a small business collaborating to create something really valuable for the larger community and to make it freely available to them. Thats the power of open source.

As the use of location plays an ever-increasing role in our global economy, open sourcing ol-kit will enable small business and community organizations alike to leverage its geospatial capabilities to study and solve critical challenges that they previously may not have been able to afford to tackle. During the pandemic, smaller municipalities with minimal IT budgets can use ol-kits fully customizable toolkit to analyze patterns within their communities to better contain the virus. It can also be applied to provide helpful insights and chart trends in areas like census tracking, election mapping, and combating natural disasters such as wildfires

See original here:
Open-Source, Geospatial Mapping Software Helps Business & Community Solve Real-World Problems - Geospatial World