Cryptographic Security Market To 2025 Emerging Niche Segments And Regional Markets – Market Research Sheets

Technological evolution in computer, information can be transferred in digital way has increased rapidly. So, there are so many applications such as data processing systems, electronic mail systems, and bank system. In these applications the transferred information must pass through communications channels that can be monitored by electronic auditor. While the degree of security may be different for different application, as it should generally pass important information directly from sender to a deliberate receiver intermediate parties being able to explicate the transferred message and without any loss of information.

Furthermore, information that is saved in memory bank of computer must be secure from threats. Cryptographic security is used to transfer a message between remote locations and to send information from one end to another end every system should include at least one encoding devices at one location and one decoding device at a second location. Cryptographic security decoding and encoding technology are available to protect the authentication and privacy for communication devices.

Technological development and the need for remote access security and wireless communication is increased due to this cryptography security application that provides security and protection on the adoption and decency of the data and network. The ongoing advancements is increasing continuously in the internet, technology and the development of new computers to support remote computation has led to increase in the requirement of network security for the secure data transmission.

Planning To Lay Down Future Strategy? Request Sample https://www.transparencymarketresearch.com/sample/sample.php?flag=S&rep_id=35813

Some of the main challenging factors are low customer awareness about cryptography security, and lack of expertise and skilled manpower are obstructing the growth of the Cryptographic security market. The cryptography security market is witnessing a stable growth with rising security threats, lack of the ability to acknowledge such attacks. The quality performance of cryptographic security is depend on the complication of the decoding and encoding devices. The problem regarding privacy of communication for a system where an auditor can listen to every transmitted message on the communication channel.

The Cryptographic security market can be segmented by hardware, services, organization size, application and geographical regions. By Hardware, the market can be segmented into blade, server, random number generator and research & development platform. The hardware is the main equipment of the Cryptographic security to make possible effective content transfer with secure system. The Most of the vendors are updating their hardware setup to maintain a competition in the Cryptographic market. By Services, the market can be bifurcated into consulting services, support and maintenance services and integration and deployment Services.

Request To Access Market Data Cryptographic Security Market

By Organization, the cryptographic security market can be segmented as large enterprises and small & medium-sized enterprises. According to the application, the cryptographic security market segment can be bifurcated as IT & telecom, network security, government & defense, database security, consumer goods & retail, healthcare & life sciences, banking, financial services & insurance and others. Furthermore, the Cryptographic security market can also be studied according to regional bifurcations such as North America, Europe, Asia Pacific, Middle East & Africa and South America. Moreover, with the feeling of enchanting experience, increase in demand, growth of technology and advancement in security system is expected to positively support the growth of cryptographic security market during the forecast periods. The cryptographic security market has seen huge growth in defense and banking industry in recent years.

Many players are involved in the Cryptographic Security market with wider solution portfolio. Some of the key players in the cryptographic security market are Crypta Labs, IBM, HP, Id Quantique, Magiq Technologies, NEC Corporation, Infineon, Mitsubishi, Nucrypt, Qutools, Qasky, PQ Solutions, Qubitekk, Quintessencelabs, and Toshiba among others. Most of these providers are headquartered in North America region. Most of the companies to upgrade their research and development activities to introduce innovations and security methods in this field.

This post was originally published on Market Research Sheets

Read more here:
Cryptographic Security Market To 2025 Emerging Niche Segments And Regional Markets - Market Research Sheets

Give the gift of privacy settings this year – Inverse

Ever since your parents got smartphones, it was game over. Now when you go home for the holiday season, the roles have reversed with parents constantly squinting at their bright phone screens and meticulously typing with one finger at a time.

Older family members have become just as addicted to their smartphones as the younger generation. However, some of them may not be as aware of the privacy risks associated with these devices.

If youre not careful about privacy settings, smartphones can track your location, phone applications can have access to your camera and microphone at all times and constantly collect your data to target you with certain ads. So, it was no coincidence that three different brands advertised snakeskin boots on your timeline after you wouldnt stop texting your friends to ask if you could pull them off.

Most of these features can be disabled by enabling the privacy settings of the phone, and checking what apps are allowed to access even when they are not in use.

While you are gathered with your family during this holiday break, give them the gift of privacy, by following a few simple steps as illustrated by Twitter user Matthew Green who also runs a blog on cryptography.

Dont find my iPhone

Without GPS on our smartphones, we would probably all be going around in circles. However, as convenient as it is, GPS tracking is also one of the more invasive features of our devices. Not only does your phone track where you are at all times, but apps also have access to that information and often share it with third-party companies.

In order to disappear off their corporate grid, go to settings, privacy then location services. On there, you will find a list of apps that have requested to access your location. For ones that dont necessarily require that information, like Facebook, switch the setting to Never but for the ones that do, including delivery or taxi services, then switch it to While using the app.

Privacy, please

On that privacy tab, there are also settings related to your camera and microphone. When you take a picture, your location is embedded into that photos metadata which means that someone could find out where you are through that photo. You can disable apps access to the camera through the camera settings on the privacy tab.

Youll find that plenty of apps have also requested access to your microphone, so disable those through the microphone settings as well because YouTube does not need to listen to you at any point.

The same goes for Bluetooth settings, which apps may use to track your phone as well.

Stop the ads

If you scroll way down to the bottom of the privacy settings, the very last tab is Advertising. One thing most people are not aware of is that the iPhone gives you the discrete option to limit advertising targeted at you.

If you switch on the tab, Limit Ad Tracking, then your phone will do just that. That doesnt mean you wont receive ads on your phone anymore, but it will limit the amount of ads that are targeted directly at you by collecting your information.

Originally posted here:
Give the gift of privacy settings this year - Inverse

Blockchain This Week: Farmers Kids Win Blockchain Hackathon, Blockchain Fights Deforestation & More – Inc42 Media

Out of $8.5 Mn blockchain investments, India has been at less than 0.2%

Zubi-IBCOL plans to help students apply cryptography and blockchain solutions to real-world problems across India

Nigeria's MIPAD to use blockchain technology, artificial intelligence and data science to identify and geo-tag planted trees

In recent times, blockchain technology has been gaining a lot of momentum across various industry verticals. Most certainly, the trend is shifting from the pilot stage to actual use cases. Nearly, 50% of the blockchain projects are driven by startups. For the ecosystem to thrive in the long run, it requires the support of all the stakeholders involved, including government, investors, innovators and entrepreneurs.

According to NASSCOM Avasant India Blockchain Report 2019, the investments through venture capital firms (VCs) or initial coin offerings (ICOs) in the blockchain ecosystem in India are at less than 0.2% out of $8.5 Mn globally. The drop in the investment collides with the uncertain policy and regulatory norms in the country.

This cautious regulatory environment in India is hindering the investment opportunities for both domestic and global investors into Indian startups. Surprisingly, several Indian-based investors are raising funds through VCs and ICOs in other jurisdictions such as Malta, Singapore, UK, Switzerland and others due to open regulatory environments.

Moreover, the uncertainties or risk around blockchain in India has made it difficult for startups to enter the radar of global investors that are specifically looking to invest in blockchain startups developing innovative products or solutions.

Graph Of The Week: Size of the blockchain technology market (2018-2023)

Global blockchain technology revenue is expected to see massive growth in the coming years. Currently, at the size of $2.2 Bn, the market is expected to touch $23.3 Bn by 2023.

(Source: Statista 2019)

Here are the biggest block-related headlines from across the world.

A blockchain community platform Zubi partners with International Blockchain Olympiad (IBCOL) to enable its users to apply cryptography and blockchain solutions to real-world problems across India. Through this collaboration, Zubis community of students and blockchain enthusiasts will leverage IBCOls resources to achieve a decentralised future.

With this, Zubi-IBCOL has started a National Chapter in India (IN-BCOL). The IN-BCOL will be responsible for selecting top-projects for the final round of the IBCOL, which will be held in Hong Kong. Both the parties believe in educating and encouraging people to build a sustainable blockchain talent ecosystem. Most importantly, the duo aims to promote awareness on blockchain technology and its applications and enhance employability by equipping participants with necessary skills.

At Indias largest artificial intelligence (AI), machine learning (ML) and blockchain hackathon held in Pune from December 18 to December 22 organised by Icertis, BlockchainMegaminds won an all-paid trip to Seattle along with INR 5 lakh grand prize.

Interestingly, the winning team members all hailed from agriculture backgrounds. The team utilised ML models to build an app that can analyse crop distress and weather patterns. Additionally, they harnessed blockchain-enabled smart contracts for instant and automated claim settlements to those adversely affected by crop failures and natural disasters.

Team Boopalan were the runners-up with INR 3 lakh cash prize, followed by Team Heuristic at third place, who won INR 2 lakh.

Nigerias Most Influential People of Africa Descent (MIPAD), through its social impact initiative My Roots in Africa Project, will be planting more than 200 Mn trees by 2024 before the end of the UN International Decade for People of Africa Descent. The company has partnered with Decagon Institute to deploy artificial intelligence and data science to identify and geo-tag trees planted using blockchain technology.

Through this initiative, people can place a request to have a tree named, planted or gifted in honour of themselves or anyone they love. This platform is said to bring transparency and enable users who have planted the trees to know the exact location and be able to see it using satellite imagery using Google Maps. This, in a way, helps prevent allocation of the same tree to more than one person and bring down deforestation.

The Blockchain World Forum (BWF) will be held in Dubai from February 27-28, 2020. The event gives all the industry stakeholders to explore the opportunities and challenges associated with blockchain ecosystem. The platform will enable leading technologists, entrepreneurs, regulators, investors and financial institutions in the emerging blockchain industry.

In addition to this, BWF will be giving out the Blockchain Innovation Awards for the highest achievements from the global blockchain industries and entrepreneurs.

Hedera, a multiple blockchain protocols for improving transaction throughput in digital currency, recently announced the launch of Hedera Boost, where it allows startups to plan, build or launch a blockchain-based application using Hedera.

The platform offers technical guidance and ecosystem tools, marketing and business development support and subsidising transaction fees. The platform lets developers design, and test multiple iterations on Hedera Boost. Once the startup is ready to launch its blockchain application, Hedera claims to be funding the project with $1000 worth of Hedera to cover initial transaction costs.

Message from our partner

Excerpt from:
Blockchain This Week: Farmers Kids Win Blockchain Hackathon, Blockchain Fights Deforestation & More - Inc42 Media

Can machine learning take over the role of investors? – TechHQ

As we dive deeper into the Fourth Industrial Revolution, there is no disputing how technology serves as a catalyst for growth and innovation for many businesses across a range of functions and industries.

But one technology that is steadily gaining prominence across organizations includes machine learning (ML).

In the simplest terms, ML is the science of getting computers to learn and act like humans do without being programmed. It is a form of artificial intelligence (AI) and entails feeding machine data, enabling the computer program to learn autonomously and enhance its accuracy in analyzing data.

The proliferation of technology means AI is now commonplace in our daily lives, with its presence in a panoply of things, such as driverless vehicles, facial recognition devices, and in the customer service industry.

Currently, asset managers are exploring the potential that AI/ML systems can bring to the finance industry; close to 60 percent of managers predict that ML will have a medium-to-large impact across businesses.

MLs ability to analyze large data sets and continuously self-develop through trial and error translates to increased speed and better performance in data analysis for financial firms.

For instance, according to the Harvard Business Review, ML can spot potentially outperforming equities by identifying new patterns in existing data sets and examine the collected responses of CEOs in quarterly earnings calls of the S&P 500 companies for the past 20 years.

Following this, ML can then formulate a review of good and bad stocks, thus providing organizations with valuable insights to drive important business decisions. This data also paves the way for the system to assess the trustworthiness of forecasts from specific company leaders and compare the performance of competitors in the industry.

Besides that, ML also has the capacity to analyze various forms of data, including sound and images. In the past, such formats of information were challenging for computers to analyze, but todays ML algorithms can process images faster and better than humans.

For example, analysts use GPS locations from mobile devices to pattern foot traffic at retail hubs or refer to the point of sale data to trace revenues during major holiday seasons. Hence, data analysts can leverage on this technological advancement to identify trends and new areas for investment.

It is evident that ML is full of potential, but it still has some big shoes to fil if it were to replace the role of an investor.

Nishant Kumar aptly explained this in Bloomberg, Financial data is very noisy, markets are not stationary and powerful tools require deep understanding and talent thats hard to get. One quantitative analyst, or quant, estimates the failure rate in live tests at about 90 percent. Man AHL, a quant unit of Man Group, needed three years of workto gain enough confidence in a machine-learning strategy to devote client money to it. It later extended its use to four of its main money pools.

In other words, human talent and supervision are still essential to developing the right algorithm and in exercising sound investment judgment. After all, the purpose of a machine is to automate repetitive tasks. In this context, ML may seek out correlations of data without understanding their underlying rationale.

One ML expert said, his team spends days evaluating if patterns by ML are sensible, predictive, consistent, and additive. Even if a pattern falls in line with all four criteria, it may not bear much significance in supporting profitable investment decisions.

The bottom line is ML can streamline data analysis steps, but it cannot replace human judgment. Thus, active equity managers should invest in ML systems to remain competitive in this innovate or die era. Financial firms that successfully recruit professionals with the right data skills and sharp investment judgment stands to be at the forefront of the digital economy.

Visit link:

Can machine learning take over the role of investors? - TechHQ

Are We Overly Infatuated With Deep Learning? – Forbes

Deep Learning

One of the factors often credited for this latest boom in artificial intelligence (AI) investment, research, and related cognitive technologies, is the emergence of deep learning neural networks as an evolution of machine algorithms, as well as the corresponding large volume of big data and computing power that makes deep learning a practical reality. While deep learning has been extremely popular and has shown real ability to solve many machine learning problems, deep learning is just one approach to machine learning (ML), that while having proven much capability across a wide range of problem areas, is still just one of many practical approaches. Increasingly, were starting to see news and research showing the limits of deep learning capabilities, as well as some of the downsides to the deep learning approach. So are peoples enthusiasm of AI tied to their enthusiasm of deep learning, and is deep learning really able to deliver on many of its promises?

The Origins of Deep Learning

AI researchers have struggled to understand how the brain learns from the very beginnings of the development of the field of artificial intelligence. It comes as no surprise that since the brain is primarily a collection of interconnected neurons, AI researchers sought to recreate the way the brain is structured through artificial neurons, and connections of those neurons in artificial neural networks. All the way back in 1940, Walter Pitts and Warren McCulloch built the first thresholded logic unit that was an attempt to mimic the way biological neurons worked. The Pitts and McCulloch model was just a proof of concept, but Frank Rosenblatt picked up on the idea in 1957 with the development of the Perceptron that took the concept to its logical extent. While primitive by todays standards, the Perceptron was still capable of remarkable feats - being able to recognize written numbers and letters, and even distinguish male from female faces. That was over 60 years ago!

Rosenblatt was so enthusiastic in 1959 about the Perceptrons promises that he remarked at the time that the perceptron is the embryo of an electronic computer that [we expect] will be able to walk, talk, see, write, reproduce itself and be conscious of its existence. Sound familiar? However, the enthusiasm didnt last. AI researcher Marvin Minsky noted how sensitive the perceptron was to small changes in the images, and also how easily it could be fooled. Maybe the perceptron wasnt really that smart at all. Minsky and AI researcher peer Seymour Papert basically took apart the whole perceptron idea in their Perceptrons book, and made the claim that perceptrons, and neural networks like it, are fundamentally flawed in their inability to handle certain kinds of problems notably, non-linear functions. That is to say, it was easy to train a neural network like a perceptron to put data into classifications, such as male/female, or types of numbers. For these simple neural networks, you can graph a bunch of data and draw a line and say things on one side of the line are in one category and things on the other side of the line are in a different category, thereby classifying them. But theres a whole bunch of problems where you cant draw lines like this, such as speech recognition or many forms of decision-making. These are nonlinear functions, which Minsky and Papert proved perceptrons incapable of solving.

During this period, while neural network approaches to ML settled to become an afterthought in AI, other approaches to ML were in the limelight including knowledge graphs, decision trees, genetic algorithms, similarity models, and other methods. In fact, during this period, IBMs DeepBlue purpose-built AI computer defeated Gary Kasparov in a chess match, the first computer to do so, using a brute-force alpha-beta search algorithm (so-called Good Old-Fashioned AI [GOFAI]) rather than new-fangled deep learning approaches. Yet, even this approach to learning didnt go far, as some said that this system wasnt even intelligent at all.

Yet, the neural network story doesnt end here. In 1986, AI researcher Geoff Hinton, along with David Rumelhart and Ronald Williams, published a research paper entitled Learning representations by back-propagating errors. In this paper, Hinton and crew detailed how you can use many hidden layers of neurons to get around the problems faced by perceptrons. With sufficient data and computing power, these layers can be calculated to identify specific features in the data sets they can classify on, and as a group, could learn nonlinear functions, something known as the universal approximation theorem. The approach works by backpropagating errors from higher layers of the network to lower ones (backprop), expediting training. Now, if you have enough layers, enough data to train those layers, and sufficient computing power to calculate all the interconnections, you can train a neural network to identify and classify almost anything. Researcher Yann Lecun developed LeNet-5 at AT&T Bell Labs in 1998, recognizing handwritten images on checks using an iteration of this approach known as Convolutional Neural Networks (CNNs), and researchers Yoshua Bengio and Jrgen Schmidhube further advanced the field.

Yet, just as things go in AI, research halted when these early neural networks couldnt scale. Surprisingly very little development happened until 2006, when Hinton re-emerged onto the scene with the ideas of unsupervised pre-training and deep belief nets. The idea here is to have a simple two-layer network whose parameters are trained in an unsupervised way, and then stack new layers on top of it, just training that layers parameters. Repeat for dozens, hundreds, even thousands of layers. Eventually you get a deep network with many layers that can learn and understand something complex. This is what deep learning is all about: using lots of layers of trained neural nets to learn just about anything, at least within certain constraints.

In 2010, Stanford researcher Fei-Fei Li published the release of ImageNet, a large database of millions of labeled images. The images were labeled with a hierarchy of classifications, such as animal or vehicle, down to very granular levels, such as husky or trimaran. This ImageNet database was paired with an annual competition called the Large Scale Visual Recognition Challenge (LSVRC) to see which computer vision system had the lowest number of classification and recognition errors. In 2012, Geoff Hinton, Alex Krizhevsky, and Ilya Sutskever, submitted their AlexNet entry that had almost half the number of errors as all previous winning entries. What made their approach win was that they moved from using ordinary computers with CPUs, to specialized graphical processing units (GPUs) that could train much larger models in reasonable amounts of time. They also introduced now-standard deep learning methods such as dropout to reduce a problem called overfitting (when the network is trained too tightly on the example data and cant generalize to broader data), and something called the rectified linear activation unit (ReLU) to speed training. After the success of their competition, it seems everyone took notice, and Deep Learning was off to the races.

Deep Learnings Shortcomings

The fuel that keeps the Deep Learning fires roaring is data and compute power. Specifically, large volumes of well-labeled data sets are needed to train Deep Learning networks. The more layers, the better the learning power, but to have layers you need to have data that is already well labeled to train those layers. Since deep neural networks are primarily a bunch of calculations that have to all be done at the same time, you need a lot of raw computing power, and specifically numerical computing power. Imagine youre tuning a million knobs at the same time to find the optimal combination that will make the system learn based on millions of pieces of data that are being fed into the system. This is why neural networks in the 1950s were not possible, but today they are. Today we finally have lots of data and lots of computing power to handle that data.

Deep learning is being applied successfully in a wide range of situations, such as natural language processing, computer vision, machine translation, bioinformatics, gaming, and many other applications where classification, pattern matching, and the use of this automatically tuned deep neural network approach works well. However, these same advantages have a number of disadvantages.

The most notable of these disadvantages is that since deep learning consists of many layers, each with many interconnected nodes, each configured with different weights and other parameters theres no way to inspect a deep learning network and understand how any particular decision, clustering, or classification is actually done. Its a black box, which means deep learning networks are inherently unexplainable. As many have written on the topic of Explainable AI (XAI), systems that are used to make decisions of significance need to have explainability to satisfy issues of trust, compliance, verifiability, and understandability. While DARPA and others are working on ways to possibly explain deep learning neural networks, the lack of explainability is a significant drawback for many.

The second disadvantage is that deep learning networks are really great at classification and clustering of information, but not really good at other decision-making or learning scenarios. Not every learning situation is one of classifying something in a category or grouping information together into a cluster. Sometimes you have to deduce what to do based on what youve learned before. Deduction and reasoning is not a fort of deep learning networks.

As mentioned earlier, deep learning is also very data and resource hungry. One measure of a neural networks complexity is the number of parameters that need to be learned and tuned. For deep learning neural networks, there can be hundreds of millions of parameters. Training models requires a significant amount of data to adjust these parameters. For example, a speech recognition neural net often requires terabytes of clean, labeled data to train on. The lack of a sufficient, clean, labeled data set would hinder the development of a deep neural net for that problem domain. And even if you have the data, you need to crunch on it to generate the model, which takes a significant amount of time and processing power.

Another challenge of deep learning is that the models produced are very specific to a problem domain. If its trained on a certain dataset of cats, then it will only recognize those cats and cant be used to generalize on animals or be used to identify non-cats. While this is not a problem of only deep learning approaches to machine learning, it can be particularly troublesome when factoring in the overfitting problem mentioned above. Deep learning neural nets can be so tightly constrained (fitted) to the training data that, for example, even small perturbations in the images can lead to wildly inaccurate classifications of images. There are well known examples of turtles being mis-recognized as guns or polar bears being mis-recognized as other animals due to just small changes in the image data. Clearly if youre using this network in mission critical situations, those mistakes would be significant.

Machine Learning is not (just) Deep Learning

Enterprises looking at using cognitive technologies in their business need to look at the whole picture. Machine learning is not just one approach, but rather a collection of different approaches of various different types that are applicable in different scenarios. Some machine learning algorithms are very simple, using small amounts of data and an understandable logic or deduction path thats very suitable for particular situations, while others are very complex and use lots of data and processing power to handle more complicated situations. The key thing to realize is that deep learning isnt all of machine learning, let alone AI. Even Geoff Hinton, the Einstein of deep learning is starting to rethink core elements of deep learning and its limitations.

The key for organizations is to understand which machine learning methods are most viable for which problem areas, and how to plan, develop, deploy, and manage that machine learning approach in practice. Since AI use in the enterprise is still continuing to gain adoption, especially these more advanced cognitive approaches, the best practices on how to employ cognitive technologies successfully are still maturing.

Read more:

Are We Overly Infatuated With Deep Learning? - Forbes

Machine Learning Market Accounted for US$ 1,289.5 Mn in 2016 and is expected to grow at a CAGR of 49.7% during the forecast period 2017 2025 – The…

Machine Learning Market indicates a top level view of current market scenario and offers a deep analysis on Machine Learning, focus at the readers point of view, turning in specified market facts and information insights. It contains inclusive crucial points that significantly have an effect on the increase of the market at global level. The report is made after a pin-point Market research and in-depth investigation of the market development in different sectors that requires correct analysis, technology-based ideas, and its validity.

Get Sample PDF @ https://www.theinsightpartners.com/sample/TIPTE100000804/

Market Key Players:

Are you looking for thorough analysis of the competition in the Machine Learning market? Well, this research report offers the right analysis which you are looking for. The authors of the report are subject matter experts and hold strong knowledge and experience in market research. The report provides enough information and data to help readers to gain understanding of the vendor landscape.

This Research gives the idea to aim at your targeted customers understanding, needs and demands. The Machine Learning industry is becoming increasingly dynamic and innovative, with more number of private players enrolling the industry.

Reason to Buy

The report presents a detailed overview of the enterprise which includes both qualitative and quantitative records. It offers assessment and forecast of the Machine Learning market primarily based on product and alertness. The file evaluates market dynamics effecting the market in the course of the forecast period i. E., drivers, restraints, opportunities, and destiny fashion and provides exhaustive PEST analysis for all five regions.

Ask for Discount @ https://www.theinsightpartners.com/discount/TIPTE100000804/

About The Insight Partners:

The Insight Partners is a one stop industry research provider of actionable intelligence. We help our clients in getting solutions to their research requirements through our syndicated and consulting research services. We specialize in industries such as Semiconductor and Electronics, Aerospace and Defense, Automotive and Transportation, Biotechnology, Healthcare IT, Manufacturing and Construction, Medical Device, Technology, Media and Telecommunications, Chemicals and Materials.

Contact Us:

Call: +1-646-491-9876Email: [emailprotected]

This post was originally published on The Picayune Current

Continued here:

Machine Learning Market Accounted for US$ 1,289.5 Mn in 2016 and is expected to grow at a CAGR of 49.7% during the forecast period 2017 2025 - The...

How to protect specific folders and files in Windows – TechRepublic

Learn how to hide or encrypt specific files in Windows in order to better protect them.

Image: Getty Images/iStockphoto

You can--and should--protect your Windows computer with a strong and secure login password or other means of authentication. Perhaps there are specific folders and files on your PC for which you want an extra layer of security. Windows gives you a couple of options:

SEE:Windows 10 security: A guide for business leaders(TechRepublic Premium)

First, open File Explorer on your Windows computer. Select a folder or file (or files) that you want to hide. Right-click on your selection and select Properties from the menu. From the Properties dialog box, click the checkbox for Hidden. Then click OK (Figure A).

Figure A

If you're still able to see the folder or files, that likely means the option to view hidden files is turned on. Click on the View tab and uncheck the box for Hidden Files. The files should then vanish (Figure B).

Figure B

Hiding folders and files is a simple process but one with a couple of obvious drawbacks. First, if you want to work with those files, you have to either unhide them or re-enable the option to view Hidden Files, which defeats the whole purpose of hiding them. Second, if someone does gain access to your computer, that person could easily turn on the option for Hidden Files, which acts like a red flag for any potentially secret or sensitive files.

A more secure option is to encrypt any folder or files you wish to safeguard. Windows offers a built-in encryption tool called Encrypted File Service (EFS). EFS is available in Windows 10 Pro, Windows 10 Enterprise, Windows 8/8.1 Pro, Windows 8/8.1 Enterprise, Windows 7 Professional, Windows 7 Ultimate, and Windows 7 Enterprise. If you encrypt a file with EFS, only you can access the file through your Windows account. Other accounts, even those with administrative privileges on the machine, will be unable to access it.

To set up the encryption, insert a USB stick into your computer, which you'll use to back up the encryption key. Select and right-click the specific folder or files. Select Properties from the menu. At the Properties box, click on the Advanced button and then check the box to Encrypt Contents To Secure Data. Click OK (Figure C). Back at the Properties window, click OK or Apply.

Figure C

If you're trying to encrypt a file or files, a message appears asking if you want to encrypt the file and its parent folder or only the file. If the file is encrypted but not its folder, and you modify that file, an unencrypted version of the file could be stored temporarily as you edit it. Plus, any new files you create in the folder would not be encrypted. Choose your preferred option and then click OK (Figure D).

Figure D

If you're trying to encrypt a folder, a message asks if you want to apply changes to this folder only or to this folder, subfolder, and files. In this case, you'll likely want to choose the latter option, which is selected by default. Click OK (Figure E).

Figure E

A message should then appear prompting you to back up your encryption key. Make sure a USB stick or other removable media is inserted into your computer. Choose the first option to Back Up Now. The Certificate Export Wizard pops up with a welcome screen. Click Next. At the next screen for file format, keep the default selections. Click Next. At the Security screen, enter and then re-enter a password to protect the encryption key. At the File To Export screen, type the name of the file you wish to store on the USB drive. Click Next. At the final screen, click Finish. A message will pop up telling you that the export was successful. Click OK (Figure F).

Figure F

As long as you're signed into Windows with your own account, you'll be able to access and work with the folders or files you encrypted. If another person signs in or tries to access the files without your account or the encryption key, that person will receive a message indicating that the document may be read-only or encrypted.

To decrypt the folder or files, simply reverse the process. Sign in with your account, right-click on the folder or files, select Properties. At the Properties box, click the Advanced button. Uncheck the box to Encrypt Contents To Secure Data. Click OK. At the Properties box, click OK or Apply. Choose the option to apply changes to the folder or the folder, subfolders, and files, or the file and its parent folder. Click OK. The folder or file is then decrypted (Figure G).

Figure G

Strengthen your organization's IT security defenses by keeping abreast of the latest cybersecurity news, solutions, and best practices. Delivered Tuesdays and Thursdays

See the original post:
How to protect specific folders and files in Windows - TechRepublic

What is VMware vSAN: Cluster Types, Encryption and More – BizTech Magazine

vSAN Cluster Types: 2 Node Clusters vs. Stretched Clusters

A regular vSAN cluster will reside at one site and requires at least two nodes (although three or more is common). Meanwhile, a vSAN stretched cluster divides nodes among multiple sites, which may reside just down the hallway from one another, or may be located in separate buildings on a campus or across a city. Schulz likens a stretched cluster to taking a 12-egg carton and cutting it in half.

Its all about availability, Schulz says. If theres a power outage or a hardware problem, if something happens to those eggs in one refrigerator, you can keep running.

Schulz notes that organizations may also opt to connect multiple clusters across more distant locations for instance, connecting clusters in Chicago and New York. While these sites are too distant to accommodate a single stretched cluster, infrastructure at far-flung sites can be set up to replicate to each other, providing a greater level of redundancy.

When organizations enable encryption, vSAN encrypts everything in the vSAN data store. Because all files are encrypted, all virtual machines (as well as their corresponding data) are protected, and only an administrator with encryption privileges can perform encryption and decryption tasks. Because theyre part of the VMware environment, the nodes themselves have that protection, where its difficult to get in there and tinker with the node and the encryption mechanism, Schulz says. Its multiple layers of protection.

MORE FROM BIZTECH:Learn about using VMware as a service on Microsoft Azure.

Data center operators can take advantage of vSANs features in an all-flash environment or a hybrid configuration. In an all-flash vSAN, flash storage is used throughout the entire solution. A hybrid vSAN, by contrast, uses flash only at the caching layer, with spinning disk storage used throughout the rest of the environment. An all-flash vSAN will, of course, offer an overall higher level of performance, and data center operators should understand that the cost of flash storage has dropped steeply in recent years, making all-flash a realistic option for many use cases. Still, hybrid solutions remain even more affordable, and the decision will ultimately come down to each individual organizations performance requirements and budget.

Theres plenty of demand for all-flash, and plenty of people also use hybrid, says Sheppard. You absolutely have to have both [as options]. What were seeing is that hyperconverged infrastructure has matured to a point where it cant be a single type of product. It has to be a little broader in terms of how it can be configured by the user.

Get as much flash as you can afford, Schulz advises. The price of flash is always coming down, but so is the price of spinning disk. If you cant afford all the flash you need for your capacity, hybrid is a home run. Its all about budget.

Read this article:
What is VMware vSAN: Cluster Types, Encryption and More - BizTech Magazine

Popular Encrypted Messaging App WhatsApp Has A History of Security Flaws – TechDecisions

If your company uses WhatsApp to communicate among its team or with customers, you might want to evaluate your other options as the popular end-to-end encrypted messaging service has endured some security issues this year.

Most recently is a vulnerability that could allow a hacker to deliver a malicious message to a group chat that would crash the app for all members of the group. Users would be forced to uninstall and reinstall the app and delete the group message that was targeted, according to cybersecurity provider Check Point, which discovered the latest vulnerability.

That could have serious consequences for a business using it to communicate with employees or its customers. This also has implications for U.S. national security, as some White House staffers have reportedly used the app to communicate.

Check Point disclosed its findings to WhatsApp in August, and the Facebook-owned company has since patched the issue, but users still need to update to the latest version of the app.

According to Forbes, this is hardly the apps only security issue.

In May, WhatsApp revealed that a major cybersecurity breach enabled targeted spyware to be installed on phones through voice calls thanks to a malicious code from Israeli technology firm NSO Group Technologies.

Other security flaws found this fall included the ability to use a GIF to access a users content and a stack-based buffer overflow that could be trigged by sending an MP4 file to a WhatsApp user that could compromise the system and allow malware to be implanted on the device to eavesdrop or control it remotely.

Now, government officials are working with Facebook to come up with a solution that would give law enforcement a backdoor into WhatsApp communications to help fight terrorism and other crimes.

Read Next: U.S. Wants Encryption Backdoor in Personal Devices

WhatsApp became popular because of its encryption, security and privacy, especially in the 21st century as when normal business functions like email and payment solutions are increasingly the target of cyberattacks.

The company does offer an enterprise-focused version of the app that it released in 2018 and made available on iOS this fall, WhatsApp Business, but Facebook confirmed that some versions of the business app were affected by the Israeli hack and GIF hack.

Its important to note that the company has since fixed the issues, but they seem to keep popping up.

View original post here:
Popular Encrypted Messaging App WhatsApp Has A History of Security Flaws - TechDecisions

State Department publishes long-awaited ITAR rule on encryption and other excluded activities – Lexology

On December 26 the State Department will publish a long-awaited rule amending the International Traffic in Arms Regulations (ITAR) by providing a definition of activities that are not exports, reexports, retransfers, or temporary imports at 22 CFR section 120.54. Notably, this definition provides much-needed guidance on whether and under what circumstances end-to-end encrypted technical data is controlled under the ITAR. Published as an interim final rule, the State Department will accept comments through January 25, 2020, which could result in additional changes. However, the effective date of the interim final rule is set to be March 25, 2020, ninety days after publication in the Federal Register.

In 2015, the State Department published a proposed rule with a number of possible revisions to key definitions of the ITAR. One of the main goals of these revisions was to harmonize the ITAR and the Department of Commerces Export Administration Regulations (EAR) as part of the Export Control Reform Initiative announced by President Obama in 2009. Several of these proposed definitions were eventually adopted in final rules, but many were not.

In 2016, the Commerce Department adopted a definition for activities that are not exports, reexports, or retransfers, at 15 CFR section 734.18, which it amended in December 2017. The present rule issued by the State Department adopts a similar definition for the ITAR. Additionally, the rule amends the definition of release (22 CFR section 120.50), adds a definition of access information (22 CFR section 120.55) and makes minor amendments elsewhere to reference these new sections.

As with the definition in the EAR, the ITAR lists five activities that are not considered exports or other controlled events that would otherwise require a license or approval. These five activities are:

In response to a number of comments, the State Departments interim final rule provides additional guidance and context relevant to the interpretation of these new and amended definitions in the ITAR.

Read this article:
State Department publishes long-awaited ITAR rule on encryption and other excluded activities - Lexology