Data security guide: Everything you need to know – TechTarget

Data security is one of the most daunting tasks for IT and infosec professionals. Each year, companies of all sizes spend a sizable portion of their IT security budgets protecting their organizations from hackers intent on gaining access to data through brute force, exploiting vulnerabilities or social engineering. Throughout this guide are links that will help you learn more about the challenges related to securing sensitive data, ensuring compliance with government and industry mandates, and maintaining customer privacy. Along with the challenges, you'll find advice on how to solve them.

The average cost of a data breach in 2019 was calculated at $3.92 million, according to a report by the Ponemon Institute and IBM Security. High-profile companies such as Capital One, Evite and Zynga experienced data breaches that exposed more than 100 million customer accounts each. The average security incident in 2019 involved 25,575 accounts, according to the report. To make matters worse, this information must be disclosed to customers, and organizations could potentially wind up as cautionary tales.

The lessons from these breaches are numerous, including the need to do the following:

The move to the cloud presents an additional threat vector that must be well understood in respect to data security. The 2019 SANS State of Cloud Security survey found that 19% of survey respondents reported an increase in unauthorized access by outsiders into cloud environments or cloud assets, up 7% since 2017.

Ransomware and phishing also are on the rise and considered major threats. Companies must secure data so that it cannot leak out via malware or social engineering.

Breaches can be costly events that result in multimillion-dollar class action lawsuits and victim settlement funds. If companies need a reason to invest in data security, they need only consider the value placed on personal data by the courts.

Sherri Davidoff, author of Data Breaches: Crisis and Opportunity, listed five factors that increase the risk of a data breach: access; amount of time data is retained; the number of existing copies of the data; how easy it is to transfer the data from one location to another -- and to process it; and the perceived value of the data by criminals.

Many organizations realize that the value of data and the cost to protect data are increasing simultaneously, making it near impossible to protect data by just layering on more security. Instead, IT and infosec teams must think proactively and creatively about their data protection strategies.

They should also assess their risk versus the protections their current security investments provide and make decisions accordingly. To do so requires an unprecedented level of visibility that most organizations do not possess right now.

Security expert Ashwin Krishnan advised IT and security professionals to focus on three key aspects when trying to improve data security in the modern enterprise: the more data generated and collected presents a bigger "surface" for data breaches; customer rights expand with new regulatory compliance and privacy compliance mandates, such as GDPR and the California Consumer Privacy Act; and companies have to be aware if they are involved in data brokering.

Data security has myriad aspects that protect information at rest, in motion and in use. Here are some technologies widely used by enterprises to protect data.

EncryptionOne of the most basic concepts of data security is encryption, as simply encrypting sensitive data can go a long way toward meeting privacy and compliance mandates and keeping sensitive information safe from hackers.

Encryption is not a one-size-fits-all proposition, as organizations must select the encryption algorithm that matches their enterprise security requirements. Our encryption tutorial deciphers the differences and helps you select the best approach for your organization.

The most common form of encryption -- symmetric -- involves converting plaintext to ciphertext using the same key for encryption and decryption. Asymmetric encryption uses two interdependent keys -- one to encrypt the data and one to decrypt it. Symmetric encryption has many "flavors," including Advanced Encryption Standard and Triple DES. Asymmetric has the Diffie-Hellman key exchange and RSA, among others. Companies that don't want to encrypt all their information must determine the priority of data through classification.

Perimeter securityIntrusion detection systems and intrusion prevention systems, along with access control lists, beef up an organization's security perimeter and reduce the severity of attacks that get through. Meanwhile, endpoint security management can track malware signatures and prevent them from causing harm. Networking expert Kevin Tolly explained the need for a multipronged approach to data security, as well as the unique traits of fast-and-frontal attacks compared to low-and-slow attacks.

Data loss prevention (DLP)DLP prevents users from transferring sensitive data, and organizations can roll it out as enterprise security software. DLP tools can be deployed as agents on endpoints or agentless at the network level. Learn how to choose DLP products as well as considerations for DLP deployment.

DLP software often includes templates to aid compliance with specific mandates, such as HIPAA and PCI DSS.

A cloud access security broker (CASB) also performs DLP tasks and can help mitigate the threat to data in the cloud. CASBs actively intervene in user-to-cloud application sessions by intercepting session traffic, helping to monitor and enforce corporate security policies. CASBs scan data objects, such as files and documents, to ensure they comply with corporate standards and government regulations.

Data security, often thought to be about the prevention, detection and mitigation tools an organization uses, is just as much about strategy and the implementation of best practices. A good start to developing a strategy lies in focusing on the following areas.

Governance, risk and compliance (GRC)Some companies use GRC as a framework for ensuring data security and privacy compliance. Governance refers to how a company uses information management systems and hierarchical controls to ensure adherence. Risk management is the identification, analysis and response to potential risks. Compliance is the assurance of conformity to regulations and corporate policies when handling data. Integrated risk management takes GRC a step further to speed up decision-making and performance.

Insider threatsThe human aspect -- or insider threat -- is often underestimated or even overlooked when companies develop a data security strategy. Privacy and risk management expert Sudeep Venkatesh said targeted phishing attacks and business email compromise attacks, which are aimed at top people in the organization, cause the most harm in terms of data loss. To combat this trend, companies should enact best practices that marry prevention and protection so that communication is secured and delivered to the appropriate person. If no action is taken, companies are left vulnerable to breaches initiated by an action taken by an insider -- whether malicious or accidental.

Social mediaSocial media is another vector users fall prey to when it comes to inviting malware into the enterprise. For instance, hackers will take advantage of users who search for "cheat codes" to access third-party applications, such as games on platforms like Facebook, for free. The cheat codes can be Trojans that enable a bad actor to control a device, install ransomware, activate the camera or microphone, and record keystrokes to steal passwords. Third-party applications are just one of many enterprise social media risks that should be monitored and mitigated.

Visibility and discoveryOrganizations also stumble on the data governance front when they are unable to locate critical data that lives in nooks across the enterprise. For instance, protecting data is a Herculean task when users can download sensitive information onto their hard drives and out-of-sight of compliance tools. Government regulations and corporate standards are pushing companies to gain better visibility into how they are handling, storing and processing data.

Cloud-based data also requires a discovery mechanism to ensure governance. Before deploying any project into the cloud, IT and security teams should understand the data types that will be involved, and they should each be categorized and assessed for risk.

Password hygieneOne of the more straightforward data security best practices is centered around passwords, which are a universal point of vulnerability for organizations. The 2019 Verizon Data Breach Investigations Report found that 80% of hacking-related breaches can be linked to stolen and reused credentials. Password spraying, keylogger attacks and other brute-force hacking techniques put on full display the weakness of traditional passwords. In addition, most users have far too many business application passwords to easily remember, resulting in poor password hygiene, which means not being unique enough or changed often enough.

Making passwords longer isn't necessarily the answer. They need to be more complex or be used in conjunction with tokens, biometrics or other types of authentication. Users also can deploy enterprise password managers, which store the encrypted passwords they use across applications, to ease the burden of remembering every application's sign-on.

Database protectionDatabases require best practices to secure the data within them as well. Four simple steps can ensure sensitive information stays protected:

Developing, implementing and enforcing data security best practices is made easier if organizations fully understand the privacy and compliance mandates to which they must adhere.

The California Consumer Privacy Act (CCPA) went into effect January of this year. It enforces consumers' rights to control their personal information. Many experts believe a version of the CCPA will likely become federal law. CCPA itself is a take on the European Union's General Data Protection Regulation, which also protects consumers' personal data.

While companies worry that the cost to comply with government mandates could be prohibitive, many are still going forward in their efforts to ensure data is able to be discovered, reported on and erased. That way, when consumers request to see their data and then delete it, businesses will be ready.

To follow the multiple compliance mandates, organizations can create a data inventory, establish processes to get consumers their information under deadline and make updates to their privacy statement.

AI and machine learning are going to be key in compliance efforts going forward. Companies are looking to automate some regulatory compliance processes, including data location and extraction. Inventories, as security expert Michael Cobb noted, become outdated unless automated scanning tools are deployed to sustain data discovery capture by recording regular snapshots of all applications and repositories where personal information resides. Automation, in his opinion, is the only way large organizations can remain compliant with a large volume of data that is structured and unstructured and stored in data centers and in the cloud.

Next-generation technology could also help companies fall in line with other compliance mandates, such as PCI DSS. For companies that have lagged behind on compliance, some security experts suggest considering a zero-trust model as a security strategy. With zero trust, companies would look at the full lifecycle of data management and broaden their focus beyond just payment card data to other forms of personal data, including financial data, intellectual property and customer data. They would make no assumptions on where data is expected to be found or how it is being used -- only that the risk must be mitigated.

Data security will remain a significant challenge well into the future, but creative applications of AI and machine learning and zero-trust models will help IT and infosec teams protect data and ensure consumer privacy.

Read the original post:
Data security guide: Everything you need to know - TechTarget

Hearing Tuesday: EFF, ACLU, and Cybersecurity Expert Ask Court to Unseal Ruling Denying DOJ Effort to Break Encryption – EFF

Seattle, WashingtonOn Tuesday, April 28, at 9 am, Electronic Frontier Foundation (EFF), the American Civil Liberties Union (ACLU), and Stanford cybersecurity scholar Riana Pfefferkorn will ask a federal appeals court to embrace the publics First Amendment right to access judicial records and unseal a lower courts ruling denying a government effort to force Facebook to break the encryption of its Messenger service.

Media widely reported in 2018 that a federal court in Fresno, California, denied a government request that would have required Facebook to compromise the security and privacy promised to users of its Messenger application. But the courts order and details about the legal dispute have been kept secret, preventing people from learning about how DOJ sought to break Facebooks encryption, and why a federal judge rejected those efforts.

ACLU Surveillance and Cybersecurity Counsel Jennifer Granick will argue on behalf of EFF, ACLU, and Pfefferkorn that the public has a right to know when and how law enforcement tries to compel a companyone that hosts millions of peoples private communicationsto circumvent its own security features and hand over the contents of its users voice calls and other private conversations. This is especially important now, as the Justice Department has repeatedly said that it wants access to encrypted communications, a position that endangers peoples privacy and undermines the security of everyones information.

The court will hear the argument remotely via videoconference, which will be livestreamed for the public on the website of the U.S. Court of Appeals for the Ninth Circuit.

WHO: ACLU Attorney Jennifer Granick

WHAT:Oral arguments in ACLU Foundation v. DOJ

WHEN:TuesdayApril 289 am

Livestream:https://www.ca9.uscourts.gov/media/live_oral_arguments.php

For more on this case:https://www.eff.org/cases/eff-aclu-v-doj-facebook-messenger-unsealing

See the rest here:
Hearing Tuesday: EFF, ACLU, and Cybersecurity Expert Ask Court to Unseal Ruling Denying DOJ Effort to Break Encryption - EFF

Data Encryption Service Market by Top Players, Types, Key Regions, Applications and Forecast to 2024 Aminet Market Reports – amitnetserver

The report on Global Data Encryption Service Market documents a detailed study of different aspects of the Global Data Encryption Service Market. It shows the steady growth in market in spite of the fluctuations and changing market trends. In the past four years the Global Data Encryption Service Market has grown to a booming value of $xxx million and is expected to grow more. Every market intelligence report is based on certain important parameters. It includes a meticulous analysis of market trends, market shares and revenue growth patterns and the volume and value of the market. Market studies are based on methodical researches.

Request a sample of this report @ https://www.orbisresearch.com/contacts/request-sample/4589757

This report on Global Data Encryption Service Market is also based on a meticulously structured methodology. These methods help to analyze markets on the basis of thorough research and analysis. Generally, research includes information about manufacturers, vendors, products, consumers, research papers and more. The analysis part mostly includes qualitative and quantitative analysis of markets like business models, market forecasts, market segmentations and other aspects that help in analysis. Every market research study gives specified importance to manufacturers dwelling in that market. A detailed analysis of manufacturers or key players is essential for anyone seeking to jumpstart business in any market.

Major companies of this report:

MicrosoftIBMOneNeckFlexentialGemaltoAmazon Web Services (AWS)Digital Guardian

Browse the complete report @ https://www.orbisresearch.com/reports/index/global-data-encryption-service-market-report-2020

Competitive analysis or competitor study includes detailed information of manufacturers business models, strategies, revenue growth and all the data required that would benefit the person conducting the market research. For new investors and business initiatives market research is a must as it gives them a direction and a plan of action to move forward keeping in mind their competitors. Global Data Encryption Service Market segmentation is also an important aspect of any market research report. Market segmentation is mostly based on demography, geography and behavior. It helps understand the consumers and their demands and behavior towards a particular product or market. Another important aspect covered in any market research report and is also a part of market segmentation is the regional study of the market. This section focusses on the regions with significant advancements in a particular market.

Segmentation by Type:

SymmetricAsymmetric Encryption

Segmentation by Application:

SMEsLarge Enterprise

Regional analysis of any market can give a detailed overview of regions which have more business opportunities, revenue generation potential and a forecast of next few years. For any new business establishment or business looking to upgrade and make impactful changes in their businesses, this particular section in a market report is very important. In this Global Data Encryption Service Market report, the region highlighted the most is North America. For many markets this region is of extreme importance.

Following regions are covered in Global Data Encryption Service Market Industry report:North America Country (United States, Canada)South AmericaAsia Country (China, Japan, India, Korea)Europe Country (Germany, UK, France, Italy)Other Country (Middle East, Africa, GCC)

Make an enquiry of this report @ https://www.orbisresearch.com/contacts/enquiry-before-buying/4589757

About Us :

Orbis Research (orbisresearch.com) is a single point aid for all your market research requirements. We have vast database of reports from the leading publishers and authors across the globe. We specialize in delivering customized reports as per the requirements of our clients. We have complete information about our publishers and hence are sure about the accuracy of the industries and verticals of their specialization. This helps our clients to map their needs and we produce the perfect required market research study for our clients.

Contact Us :

Hector CostelloSenior Manager Client Engagements4144N Central Expressway,Suite 600, Dallas,Texas 75204, U.S.A.Phone No.: +1 (972)-362-8199; +91 895 659 5155

Original post:
Data Encryption Service Market by Top Players, Types, Key Regions, Applications and Forecast to 2024 Aminet Market Reports - amitnetserver

Samsung A71 5G tipped to launch in S. Korea with a Quantum Encryption Chip – gizmochina

A recent report has revealed that the Samsung Galaxy A71 5G will launch with a Quantum Encryption chip technology in South Korea. The worlds largest smartphone brand was previously tipped to launch the first smartphone equipped with a quantum encryption chip, so this device might feature the technology.

According to reports from South Korean news agencies, Samsung and SK Telecom are gearing up for the launch of a smartphone equipped with Quantum technology chip for encryption. The device in question is expected to be announced in May 2020 and will be found in the Samsung Galaxy A71 5G. The South Korean tech giant will be integrating the Quantum encryption chip into the motherboard of the handset (with reports also claiming a rebranding to Samsung Galaxy Quantum).

For those unaware, the Quantum encryption chip technology enhances the smartphones data protection. In other words, it improves the security of the device and helps in better protecting sensitive data held within a device. Furthermore, it will make it harder for hackers to steal data from your handset.

Samsung smartphone that arrives with the new Quantum encryption chip will have their data encrypted in the form of random numbers. So even if the hacker attempts to read the memory, he would have to first pass the chips certification process before getting an approval. Similar to Samsung, even Sony has been reportedly working on the inclusion of Quantum encryption technology in its products.

(Via)

See original here:
Samsung A71 5G tipped to launch in S. Korea with a Quantum Encryption Chip - gizmochina

Hardware Based Encryption Market by Players, Types, Key Regions, Applications and Forecast to 2024 – Cole of Duty

The report delivers the driving factors, challenges, restraints, opportunities, acquisition & merger, revenue structure, business models, market players, segmentation, regional analysis, production price, manufacturing process, operations, methodology, market share, market size, CAGR, and investments.

Request a sample of this report @ https://www.orbisresearch.com/contacts/request-sample/4006084

Manufacturer Detail

Manufacturer DetailLGSamsungSharpCSOTBOECPTHannstarInnoluxJapan DisplayTianma Micro-ElectronicsAUO

BIS reports covers key roles in analyzing the industry outlook and let understand the prominent vendors about their strategies and future plans for the betterment of the market in the near future. Furthermore, the report also covers an ultimate goal of market target gained on the basis of product or services. In this Hardware Based Encryption market report, viewers can also experience detailed study of business introduction including benefits, restraints, opportunities, challenges, drivers, and more. The report smartly takes you to productive methodology in organizing, collection, and analyzing data. The report covers key aspects including production, market share, CAGR, key regions, leading vendors, and revenue rates. This keyword report also provides viewers with relevant figures at which the Hardware Based Encryption market was valued in the base year and estimated to project the revenue in the forecasted period. The Hardware Based Encryption market is categorizes several segmentations including type, application, end user industry, and region. This effective set of information delivers an in-depth analysis about the drivers, challenges, market share, market dynamics, emerging countries, pricing, investment activity, industry performance, revenue generation and CAGR.

Region Segmentation

North America Country (United States, Canada)South AmericaAsia Country (China, Japan, India, Korea)Europe Country (Germany, UK, France, Italy)Other Country (Middle East, Africa, GCC)

Product Type SegmentationLCDLEDIPSOLED

Industry SegmentationSamrtphoneFunction Phone

Browse the complete report @ https://www.orbisresearch.com/reports/index/global-hardware-based-encryption-market-report-2019

Channel (Direct Sales, Distributor) Segmentation

Section 8: 400 USDTrend (2019-2024)

Section 9: 300 USDProduct Type Detail

Section 10: 700 USDDownstream Consumer

Section 11: 200 USDCost Structure

Section 12: 500 USDConclusion

The research report is an overall draft when it comes to understand the investment structure and future analysis of the Hardware Based Encryption market. BIS Report manages to convey detailed information regarding prominent vendors of the Hardware Based Encryption market including recent innovations, advancements, improvements, business estimation, revenue margin, and sales graph.

Consumer-wise, the report studies about the demand coming from particular region and category of consumers taking interest in the product or services of the Hardware Based Encryption market. The global keyword market is majorly driven by key factors and offers an in-depth insight about the keyword market.

Make an enquiry of this report @ https://www.orbisresearch.com/contacts/enquiry-before-buying/4006084

The Hardware Based Encryption market reports delivers the information about market competition between vendors through regional segmentation of markets in terms of business opportunities, demand & supply, and revenue generation potential.

BIS report envision clear view about Hardware Based Encryption market including regional growth and falls down mentioning about particular forecast period along with appropriate reasoning about the market.

The Hardware Based Encryption market also delivers the market size, market appearances, segmentation, provincial collapses, tendencies, competitive background to gain the appropriate insights. Moreover, the report also covers about the acquisitions and mergers taken in the recent past.

About Us:

Orbis Research (orbisresearch.com) is a single point aid for all your market research requirements. We have vast database of reports from the leading publishers and authors across the globe. We specialize in delivering customized reports as per the requirements of our clients. We have complete information about our publishers and hence are sure about the accuracy of the industries and verticals of their specialization. This helps our clients to map their needs and we produce the perfect required market research study for our clients.

Contact Us:Hector CostelloSenior Manager Client Engagements4144N Central Expressway,Suite 600, Dallas,Texas 75204, U.S.A.Phone No.: USA: +1 (972)-362-8199 | IND: +91 895 659 5155Email ID: [emailprotected]

More:
Hardware Based Encryption Market by Players, Types, Key Regions, Applications and Forecast to 2024 - Cole of Duty

We all want high-performance, multi-gigabit switching. So, too, do hackers trying to siphon your corporate data… – The Register

Sponsored Since the World Health Organization declared COVID-19 a pandemic, businesses and organisations have struggled to adapt to the new normal in business operations connecting employees, customers, partners and stakeholders in the supply chain. Many business continuity plans have entailed intuitive self-service workflows with streamlined network on-boarding so users and endpoint devices can gain network access simply and securely.

High-performance access infrastructure enables enterprises to deliver great online experiences for remote workers. Security and privacy are critical pillars of superior user experience. But the sheer volume and diversity of devices that require network access pose enormous challenges for cybersecurity professionals.

The security risks of a multi-gigabit, mobile-first world have escalated with bring-your-own-device (BYOD), Internet of Things (IoT), and expanded threat surfaces exposed to new modes of cyber-attacks. Main threats include man-in-the-middle attacks that allow hackers to intercept traffic on poorly secured Wi-Fi networks. These attacks steal login credentials, financial information, or other sensitive business data.

More than 50 per cent of enterprise-generated data will be created and processed outside the data centre or cloud by 2022, according to Gartner. In other words, mobile devices have become points of entry for an attacker to gain access to sensitive data held on the device, in the cloud, or in the corporate network. This means that mobile security must operate not in a silo but in sync with other security products.

This has driven CommScope Ruckus to dovetail secure network access for BYOD, guest users, and IT-owned devices with its multi-gigabit networking solutions that drive exceptional wired and wireless connections.

The CommScope Ruckus ICX fixed form-factor switches work seamlessly with Ruckus Wi-Fi access points (APs), Ruckus SmartZone network controllers and Ruckus Cloud to unify wired and wireless network access. SmartZone controllers simplify network setup and management, enhance security, simplify troubleshooting with online tools, and ease upgrades for networks built on Ruckus switches and APs.

Aligned with simple ways to improve security related to wired and wireless access, the CommScope-Ruckus portfolio of solutions bolsters data security with increased visibility and control over devices and users allowed on the network. These solutions include:

Only AP, switch, and client management traffic are sent to the cloud but client data traffic is broken out to client-desired destination at local network and sent through existing firewall. Check out Ruckus Cloud privacy policy here.

With Ruckus Cloud and the infrastructure-agnostic Cloudpath softwares 802.1X certificate management, even small IT departments can remotely and easily add new users and wire-less APs connected with multi-gigabit switch; administer guest networks; and manage entire Wi-Fi 6-enabled buildings and campuses or multi-site deployments.

The Cloudpath system is supported across the Ruckus ICX switch family. Ruckus ICX switches, which are broadly deployed within the US federal government, support the most stringent security standards and encryption technologies. They are compliant with the following federal certifications: FIPS, Common Criteria, CSFC, and JITC. Each new release of the switch software is recertified by the relevant certification authorities on an ongoing basis.

To meet regulatory compliance and protect data in transit across both internal and external links, CommScope offers organisations a stackable switching solution that delivers encryption from the wiring closet. Dedicated encryption products are not needed.

For end-to-end data privacy, the Ruckus 7450 Service Module, for example, provides hardware-based acceleration (10 Gbps throughput) for IPsec VPNs using Advanced Encryption Standards. It offloads mathematically intensive processes so that the switch processor is freed to identify traffic for encryption, negotiate the security associations, and forward encrypted traffic. MacSec also protects large campus backbone communication on the ICX switch trunk side.

Further, a software-defined network controller with support for OpenFlow on the Ruckus ICX switches bring the benefits of programmatic control for higher levels of customisation, security and efficiency. Such flexibility and adaptability are a boon to robust communication networks that provide fast, reliable and secure Wi-Fi essential during a pandemic like COVID-19. Wi-Fi must safely connect patients, doctors, and nurses to their loved ones without risk of exposure. Wi-Fi connectivity and network access have also become must-haves for students and remote workers who need to collaborate and complete critical assignments or jobs.

Sponsored by CommScope.

Sponsored: Webcast: Build the next generation of your business in the public cloud

View post:
We all want high-performance, multi-gigabit switching. So, too, do hackers trying to siphon your corporate data... - The Register

Ripple breaks above $0.20 as Cryptocurrency buyers hold the bullish pressure – FXStreet

Cryptocurrencies have been producing a trading range since Sunday evening, but are gaining impulse today, as Ripple(+4.22%) had a strong push in the last hour that moved its price above $0.2. Bitcoin (+1.07%) and Ethereum( +0.75%) are still stuck below at their resistance levels. The best performer in the last 24 hours is Stellar Lumens( +13%), followed by Tezos (+4.34%) and Cardano (+4.41%).

Among the Ethereum-based projects, the best gainer today is XIN (+237.8%), followed by LEND (+25.2%), and UTC(+20%).

The total market cap daily chart shows it is currently $220.01 billion worth, and we see it moves in an ascending wedge that touches a resistance region that marked the beginning of the bit crash made in March. The prices are making small bodies lately. Thus, it may signal a top, at least short-term. The 24H volume has decreased to $36.190 billion (-2.,74%), and Bitcoin dominance descended slightly to 63-98 percent.

The Bank of China added six more cities to its fintech innovation pilot. The bank has plans to test pilot projects in Shanghai, Shenzhen, Chongqing, Hebei, Hangzhou, and Suzhou. The bank states that fintech following regulations will protect consumer rights.

China has approved 224 new blockchain projects from major brands. Corporations such as Alibaba, China Mobile, and Walmart China are among the names that had requested approvals. Fifty-three of them are Fintech blockchain projects.

The World Economic Forum has published a report in which it advocates decentralized ledger technologies as a useful tool to help restart the economy. The report cites the supply chain on pharma, medical supplies, and food among the sectors in which the efficiency of the supply chain relies on transparency, suggesting the adoption of DLTs to create the needed transparency among stakeholders.

To help businesses and governments in deploying DLT solutions, the Swiss-based World Economic Forum delivered its "Redesigning Trust: Blockchain Deployment Toolkit." More than 100 public and private groups from over 50 countries were contributors to the toolkit.

Bitcoin has not changed much in the last 24 hours. It is still moving inside an ascending wedge making higher highs but constrained below the $7,770 level. The MACD is still bearish, and the RSI is falling and making a bearish divergence. Thus, traders should wait for the resolution to this pattern. The bias is bullish, and only the divergence and the wedge warn of a possible top. Aggressive traders may buy on retracements while expecting the $7,770 breakout, whereas cautious traders should wait for a breakout of that level.

Standard Pivot levels

Support

Pivot Point

Resistance

7,050

7,411

8,064

6,405

8,425

6,043

9,067

On Monday, Ethereum sellers managed to drive its price momentarily below $190, but soon buyers came in and moved it above that level. Now the price is still moving near the +1SD line, although the Bollinger bands are shrinking, meaning it may be entering in a ranging pattern. The MACD and RSI moving south may confirm it. We see ETH is having trouble with the $200 resistance, but also we can see strength in the buyers as the last candles show good buying volume.

The overall trend is positive, as seen by the linear regression channel, and the price is not overbought. Thus Ether may be preparing the final assault fo the $200 range.

Standard Pivot levels

Support

Pivot Point

Resistance

176.5

188

210

155

222

143

243

Ripple has left the market behind and made a large 5% candle that broke through $0.20 and $0.205, creating a new higher high above its recent top made on April 07. This movement went on strong volume, and it moved its price directly into the overbought territory. Thus, Buyers should wait for a consolidation and break of the $0.21 level.

Standard Pivot levels

Support

Pivot Point

Resistance

0.1830

0.1915

0.2050

0.1695

0.2134

0.1610

0.2269

Try Secure Leveraged Trading with EagleFX!

Continue reading here:
Ripple breaks above $0.20 as Cryptocurrency buyers hold the bullish pressure - FXStreet

TradeHerald Becomes The First 100x Leverage Cryptocurrency Exchange with Zero Trading Fees – PRNewswire

TALLINN, Estonia, April 28, 2020 /PRNewswire/ --The coronavirus pandemic may be dominating the headlines, but crypto trading is advancing untethered by the crisis. As people around the globe are exploring the bitcoin investment opportunity as an alternative source of income during the lockdown period, crypto trading with leverage is the best way to boost profit.

Currently, there is a surge in the number of countries exploring the options to incorporate cryptocurrency into their mainstream economy. Some of the recent developments are:

Though a lot more legislationhas yet to happen, people have already started to reap benefits by trading.

If you are ready to put your trade experience into practice and explore the new growth possibilities, TradeHerald is the right place for you. It is the first 100x leverage Crypto trading platform with zero trading fees.

Currently, there is no other crypto exchange which enables you to take advantage of all trading profits without deducting any trade commissions.

Benefits of TradeHerald Exchange:

Our trade system is self-explanatory and easy to use. So, you need not worry about how to perform the trade in them. Register yourself to start trading now.

Leverage your time and trade position exponentially to attain profits.

TradeHerald is planning to come up with more intuitive features and reward-based trade competitions very soon.

Trade Smart. Trade with Leverage. Only on TradeHerald.

This press release was issued through 24-7PressRelease.com. For further information, visit http://www.24-7pressrelease.com.

SOURCE TradeHerald

https://tradeherald.com

The rest is here:
TradeHerald Becomes The First 100x Leverage Cryptocurrency Exchange with Zero Trading Fees - PRNewswire

North Koreas Alleged $670M Cryptocurrency Stash in Question Amid Rumors of Kim Jong-Uns Death – BeInCrypto

The news has been buzzing with speculation surrounding Kim Jung-un, leader of North Korea. He missed the countrys Day of the Sun event on April 15, an important national holiday celebrating the Eternal President Kim Il-sung.

Since then, many have speculated that Jong-un might be dead. China has reportedly dispatched a team of medics to tend to Kim Jung-un after botched heart surgery [Fox News].

If the rumors are true, then North Koreas stability is in serious jeopardy. All the serious geopolitical implications notwithstanding, the country also holds a massive cryptocurrency stash. It may sell these assets off quickly if the leadership feels it is under threat.

In August 2019, a UN SecurityOnce you've bought or received bitcoins; you now need to keep them as safe as possible. This guide will provide... More Council Report estimated that the pariah state has stolen some $2B in cryptocurrency since 2015. It was even using these funds to bankroll its nuclear weapons program.

Its unclear how much cryptocurrency the country currently holds, but it is thought to be very significant and upwards of $670 million.

The fate of this cryptocurrency treasure trove may now be uncertain. In fact, according to some commentators, it may even be sold off on the market en masse.

However, many seemed to scoff at the idea. Most repliers the tweet saw it as an absurd scenario that could never happen. As one user jokes, North Korea also possesses uranium minesdoes that mean Kim Jung-Uns death will cause a selloff of uranium as well?

However, it should be noted that comparing uranium to Bitcoin is apples and oranges. Bitcoin can easily be sold off since it is a digital asset; uranium, on the other hand, would need to be physically moved.

North Koreas uranium supply also has little to no impact on global markets. The impact North Korea has had on the global cryptocurrency market historically, however, seems to be more significant.

Still, it seems unlikely North Korea would selloff its cryptocurrency holdings unless it was really desperate. We will have to see how the leadership of the country responds to this current crisisand whether the rumors surrounding Kim Jung-Uns death are even true at all.

Do you want to Be In Crypto?Join our Telegram Trading Group for FREE Trading Signals,a FREE Trading Course for Beginners and Advanced Tradersand a lot of fun! Images courtesy of Shutterstock, Trading View and Twitter.

Disclaimer. Read MoreRead Less

As a leading organization in blockchain and fintech news, BeInCrypto always makes every effort to adhere to a strict set of editorial policies and practice the highest level of journalistic standards. That being said, we always encourage and urge readers to conduct their own research in relation to any claims made in this article.This article is intended as news or presented for informational purposes only. The topic of the article and information provided could potentially impact the value of a digital asset or cryptocurrency but is never intended to do so. Likewise, the content of the article and information provided within is not intended to, and does not, present sufficient information for the purposes of making a financial decision or investment. This article is explicitly not intended to be financial advice, is not financial advice, and should not be construed as financial advice. The content and information provided in this article were not prepared by a certified financial professional. All readers should always conduct their own due diligence with a certified financial professional before making any investment decisions. The author of this article may, at the time of its writing, hold any amount of Bitcoin, cryptocurrency, other digital currency, or financial instruments including but not limited to any that appear in the contents of this article.

Read more:
North Koreas Alleged $670M Cryptocurrency Stash in Question Amid Rumors of Kim Jong-Uns Death - BeInCrypto

New cryptocurrency ‘CRO’ to list on CoinDCX crypto exchange, to be traded in two pairs – CNBCTV18

Cryptocurrency CRO token of crypto payments provider Crypto.com will be listed on CoinDCX exchange. The cryptocurrency exchange and liquidity aggregator on Tuesday announced that it will be traded in two pairs -- CRO/BTC and CRO/INR -- which means Indian traders on the exchange will be able to buy or sell CRO token in exchange of BTC (Bitcoin) or Indian rupee.

Following the successful listing of the MCO token on CoinDCX earlier this month, CRO listing marks Hong Kong-based Crypto.coms official entry into the Indian market.

With the integration of MCO and CRO on to the CoinDCX exchange, the bourse bolsters its crypto-based financial services offering, CoinDCX said in a statement.

Speaking on the listing, Sumit Gupta, CEO & co-founder of CoinDCX, said: At a time when we are witnessing unprecedented growth in the use of cryptocurrencies in India, there is a need to provide users with an extensive range of crypto-based financial services that can ensure the faster, simpler, and uninterrupted flow of capital. We are thrilled that CRO is entering India, through our platform, which will help nearly 1.3 billion people in crypto trade CRO through INR.

This is also an amazing opportunity for us to encourage more people to enter the crypto market through our ongoing #TryCrypto initiative.

While the MCO token features key payment and finance utilities within the Crypto.com ecosystem, CRO token is primarily used for settlements on Crypto.com chain, enabling transactions worldwide between merchants and cryptocurrency users in a seamless, secure and cost-efficient way, it said.

By using CRO as an intermediary currency on the Crypto.com Chain, participants customers, merchants, crypto customer acquirers, and merchant acquirers can convert their cryptocurrencies to their fiat counterparts at a much-reduced cost, said Neeraj Khandelwal, co-founder of CoinDCX.

The combination of MCO and CRO creates a full-service, global system that encourages the adoption of cryptocurrencies that is inspired by real-life use cases.

In 2019, CRO token and the Crypto.com Chain project had made headlines based on the tokens dramatic price increases.

More:
New cryptocurrency 'CRO' to list on CoinDCX crypto exchange, to be traded in two pairs - CNBCTV18