Paladin Cloud lands $3.3 million seed funding with T-Mobile – SC Media

Paladin Cloud on Monday announced a $3.3 million seed round with T-Mobile Ventures that aims to equip developers with a strong platform to detect, visualize, and remediate important risks in their multi-cloud environments across Amazon Web Services, Microsoft Azure, and the Google Cloud Platform.

Developers can use Paladin Cloud to continuously monitor their cloud services in real-time. The open source platform promises to identify and eliminate misconfigurations, thus reducing security risks while automating workflow and remediation.

Leveraging T-Mobiles PacBot framework, Paladin Cloud aims to build a new open source community for developers dedicated to holistically improving cloud security.

Its become very important to incorporate security into development, both by setting policies as guardrails to block coding misconfigurations from being deployed, and to automate testing of apps to quickly identify and fix security issues, explained Melinda Marks, a senior analyst at the Enterprise Strategy Group.

This has been a challenge with modern software development, to build these processes into development in a non-disruptive way, Marks said. An investment from T-Mobile shows they are interested in helping developers get the resources they need to produce secure code for more secure applications. And because so many more transactions are happening now via mobile, it gives developers the right tools can help secure their appsotherwise anything disruptive will make them skip the security measures.

Frank Dickson, who covers security and trust at IDC, said misconfigurations have become the primary risk vector for cloud application, much worse than vulnerabilities, adding that developers desperately need offerings addressing misconfigurations.

I question the open source approach, though, Dickson said. I realize that open source is the rage in software, but open source also means that the customer owns the outcome. It also means yet another vendor to manage. The needs of the market are demand more integrated platform solutions that create outcomes for customers.

View post:

Paladin Cloud lands $3.3 million seed funding with T-Mobile - SC Media

Bridging the security gap in continuous testing and the CI/CD pipeline – Security Boulevard

Learn why Synopsys earned the highest score for the Continuous Testing Use Case in Gartners latest report.

Gartner recently released its 2022 Critical Capabilities for Application Security Testing (AST) report, and I am delighted to see that Synopsys received the highest score across each of the five Use Cases. Lets look at the Continuous Testing Use Case and dive into how Gartner ranks and rates it, and see why the Synopsys portfolio of offerings is well-suited for organizations that are looking to implement or are currently doing continuous testing.

When it comes to the criteria used to rate the top 14 tools ability to deliver continuous testing, Gartner places slightly more weight on a tools ability to perform dynamic application security testing (DAST), interactive application security testing (IAST), and API security testing and discovery. It places less or equal weight on a tools ability to perform static application security testing (SAST) and software composition analysis (SCA). To understand why, lets look at the role continuous testing plays in todays software ecosystem.

Download the Gartner report

First, we need to understand what exactly continuous testing is. As the name implies, continuous testing refers to the execution of automated tests every time code changes are made. These tests are carried out continuously and iteratively across the software development life cycle (SDLC). They are conducted as a part of the software delivery pipeline to drive faster feedback on changes pushed to the code and/or binary repository.

Continuous testing is important especially in an organizations drive toward DevOps continuous integration / continuous delivery (CI/CD). While CI/CD enables product innovations at lightning speed (which is crucial for businesses to stay ahead of the curve), continuous testing helps build trust in the quality. Continuous testing provides the much-needed peace of mind that the products perform as expected and are reliable and secure. Continuous testing in a delivery pipeline allows the team to introduce any number of quality gates anywhere they want, to achieve the degree of quality that they need.

Although continuous testing is becoming a standard practice today, embedding another layer of security oversight is something not readily undertaken by most organizations. It is simple to understand why.

Implementing continuous testing is already a massive undertaking without adding another layer of security on top of it. For continuous testing to work, both development and QA test teams need to get together to define the tests early, develop the test-driven or behavioral-driven test cases, and ensure good test coverage. To run a successful continuous testing operation, they will also need to have a complete test environment on demand, with dev-friendly tools (such as code, CI/CD integrations, and supported open source) for the various development and test teams use. These environments ideally should be ready for the various on-demand needs from unit test to integrated, functional, regression, and acceptance test needs and have the ability to provision the right test data so teams can perform comprehensive tests with production-like data. With continuous testing, the various types of tests are executed seamlessly in the different environments and at each stage of the continuous pipeline and in different environments that it gets deployed to. Tests are triggered automatically by events such as code check-in or code changes. The aim of continuous testing is to ensure prompt feedback to alert the team of problems as quickly as possible.

Continuous testing becomes tougher and longer as it progresses toward the production environment. The depth of testing also progresses as the simulation environment gets closer to production. You need to slowly add more tests and more complicated tests as the code matures and environment complexity advances. Chances are the same test cases developed earlier would not be run throughout the SDLC. The test cases need to be updated each time significant changes are introduced. The automated scripts will need to be updated at the different phases of testing as the code becomes more matured and progresses to a higher level of environment where configurations and infrastructure also advance until it reaches production.

Even the time needed to run the tests increases as the testing progresses toward the release point. For example, a unit test might take very little time to run, whereas some integration tests or system/load tests might take hours or days to run. With the amount of time and effort required to execute end-to-end continuous testing, its no wonder automated security tests lag behind other types of automation efforts (e.g., automating build, and release), according to Googles State of DevOps report.

For organizations that have security test practices and tools built into their continuous testing and delivery pipeline, its common to find SAST and/or SCA tools deployed in their automated pipeline. These tools have their own place in the SDLC, and in fact, they are necessary early in the SDLC to help secure proprietary codebases and external dependencies such as open source and third-party code. This may suffice in a controlled environment, with controlled codebases that ensure predictable user experiences.

Unfortunately, the software app development and delivery paradigm has shifted from monolithic to todays highly distributed computing model. There are innumerable software components and event-driven triggers thanks to technologies such as microservices architecture, the cloud, APIs, and serverless functions in todays modern, composite-based applications. And some critical vulnerabilities and exploits cannot be anticipated or caught in early development phasesthey dont get triggered until application runtime tests when the various components are integrated. The sheer volume of apps that an organization owns and must manage todayfrom internal proprietary codebases and applications to third-party components and APIscontributes to the growth of unanticipated attack surfaces.

Therefore, its more critical than ever to incorporate modern DAST approaches to testing, particularly those that can augment the continuous testing and CI/CD pipeline with the least friction.

Synopsys has the broadest and most comprehensive portfolio for your application security needs. Our AST tools provide seamless life cycle integration with end-to-end app security test coverage across the continuous pipeline.

Some key benefits of Synopsys solutions include

Continuous security testing and continuous delivery are processes that can take time to implement successfully. But close collaboration between development, security, and DevOps teams, along with continuous security feedback based on highly accurate data and the right tool set, will help bulletproof your critical applications.

Download the report

Here is the original post:

Bridging the security gap in continuous testing and the CI/CD pipeline - Security Boulevard

Who Is Edward Snowden, the Man Who Spilled the NSA’s Secrets?

Few have vaulted from anonymity to the front pages more spectacularly than Edward Snowden, the former government contractor who revealed secrets from the National Security Agency's spying program.

NBC News will devote an hour of primetime on Wednesday to the first American television interview with Snowden, who disclosed secrets from the National Security Agency. Brian Williams, the anchor and managing editor of "NBC Nightly News," traveled to Moscow last week for an exclusive, wide-ranging interview with Snowden. The interview airs Wednesday at 10 p.m. Eastern/9 p.m. Central.

While some call Snowden a traitor who disclosed American secrets, others call him a patriot who exposed violations of the constitution.

Although his intense gaze and stubbled chin became the face of an international debate over privacy and security, many questions remain about his motivations, the exact extent of his removal of documents, and his future.

The impact of Snowden's disclosures, however, is already widespread. President Barack Obama appointed a review panel that criticized the NSA's domestic data collection. Obama recommended in March that the NSA end the warrantless collection in bulk of metadata on Americans, which can show the most intimate details of an individual's life and the patterns of movement and communication of millions. And the House recently passed a bill to end that bulk metadata collection.

Here, in anticipation of Wednesday's special report, is a primer on Snowden's life, his actions, and his impact.

We apologize, this video has expired.

What did he disclose?

Snowden is a former systems administrator for the CIA who later went to work for the private intelligence contractor Dell, first inside a National Security Agency outpost in Japan and then inside an NSA station in Hawaii. In early 2013, he went to work for contractor Booz Allen Hamilton inside the same NSA center in Hawaii.

While working for the contractors, at some point Snowden began downloading secret documents related to U.S. intelligence activities and partnerships with foreign allies, including some that revealed the extent of data collection from U.S. telephone records and Internet activity.

We apologize, this video has expired.

What are the key disclosures?

Among the revelations are the NSAs bulk collection of phone and internet metadata from U.S. users, spying on the personal communications of foreign leaders including U.S. allies, and the NSAs ability to tap undersea fiber optic cables and siphon off data.

Based on the Snowden documents, NBC News reported on Jan. 27 that British cyber spies demonstrated a pilot program to their U.S. partners in 2012 in which they were able to monitor YouTube in real time and collect addresses from the billions of videos watched daily, as well as some user information, for analysis. At the time the documents were printed, they were also able to spy on Facebook and Twitter.

NBC News also reported on Feb. 7, based on the documents, that British spies have developed dirty tricks for use against nations, hackers, terror groups, suspected criminals and arms dealers that include releasing computer viruses, spying on journalists and diplomats, jamming phones and computers, and using sex to lure targets into honey traps. According to the documents, which come from presentations prepped in 2010 and 2012 for NSA cyber spy conferences, the agencys goal was to destroy, deny, degrade [and] disrupt enemies by discrediting them, planting misinformation and shutting down their communications.

What is his background?

Snowden, now 30, was born June 21, 1983, in Elizabeth City, N.C., where he lived with his parents, Lonnie, a Coast Guard officer, and Elizabeth, known as Wendy. The family moved to Maryland in the early 1990s, while he was still in grade school, and his parents divorced. He lived outside Baltimore with his mother, a federal court employee.

Snowden was, by his own admission, not a stellar student. He dropped out of high school in his sophomore year. But by that time, he had developed a fascination with computers and technology and was able to develop considerable skills on his own, and via friends and online forums. After attending a community college off and on, he passed a General Educational Development test in the early 2000s, receiving a high school equivalency credential.

He enlisted in an Army Reserve Special Forces training program in 2004 with the intention of fighting in Iraq to fight to help free people from oppression, he later told Britains Guardian newspaper. But he said he broke his legs in a training accident, and Army records show he was discharged after just four months.

He also worked briefly as a security guard before beginning his intelligence work in 2006, when he was hired by the CIA as a computer systems administrator.

How did Snowden gain access to top-secret documents?

Despite being a high-school dropout who eventually received a GED equivalency credential, Snowden was granted top-secret clearance when he was hired by the CIA.

He maintained that clearance during subsequent jobs with CIA and NSA contractors Dell and Booz Allen Hamilton.

Removing the documents was not complicated for someone with his access and expertise, NBC News reported in August. When Snowden stole the crown jewels of the National Security Agency, he didnt need to use any sophisticated devices or software or go around any computer firewall. All he needed, said multiple intelligence community sources, was a few thumb drives and the willingness to exploit a gaping hole in an antiquated security system to rummage at will through the NSAs servers and take 20,000 documents without leaving a trace. Its 2013 and the NSA is stuck in 2003 technology, said an intelligence official.

NBC also reported in August that intelligence sources said Snowden accessed some of the secret documents by assuming the electronic identities of top NSA officials. Every day, they are learning how brilliant [Snowden] was, said a former U.S. official with knowledge of the case. This is why you dont hire brilliant people for jobs like this. You hire smart people. Brilliant people get you in trouble.

Whom did he give the documents to?

In late 2012, Snowden began to reach out to journalists, and in 2013 he leaked documents to Glenn Greenwald of The Guardian, Barton Gellman of The Washington Post, and documentary filmmaker Laura Poitras.

The Pulitzer Prize board in April awarded its highest honor, the medal for public service, to The Washington Post and The Guardian for their articles based on the documents provided by Snowden. The award echoed the Pulitzer given in 1972 to The New York Times for its reports on the Pentagon Papers, the secret history of the Vietnam War.

The executive editor of The Washington Post, Martin Baron, said when the Pulitzers were announced, "Disclosing the massive expansion of the NSAs surveillance network absolutely was a public service. In constructing a surveillance system of breathtaking scope and intrusiveness, our government also sharply eroded individual privacy. All of this was done in secret, without public debate, and with clear weaknesses in oversight."

Without the disclosures, Baron said, "we never would have known how far this country had shifted away from the rights of the individual in favor of state power. There would have been no public debate about the proper balance between privacy and national security. As even the president has acknowledged, this is a conversation we need to have.

Congressman Peter King (R-N.Y.) tweeted that "awarding the Pulitzer to Snowden enablers is a disgrace."

How much information did he take?

Government officials initially said that it could be up to 200,000 classified NSA documents, and later gave the estimate of 1.7 million. Officials, including NSA Director Keith Alexander, have assured the public that the government knows the scope of the leak.

But Snowden has not said how many documents he took, and NBC News reported in August that officials say the NSA has been unable to determine how many documents he took and what they are.

What was in the documents?

Among the revelations from documents in the Snowden trove are the NSAs bulk collection of phone and Internet metadata from U.S. users; NSA spying on the personal communications of foreign leaders, including U.S. allies; and the NSAs ability to tap undersea fiber optic cables and siphon off data.

Did anyone suspect he was taking documents?

Snowdens CIA supervisor at the CIA during his assignment in Geneva placed a critical assessment of his behavior and work habits in his personnel file and voiced the suspicion that he had tried to break into classified computer files to which he was not authorized to have access, the New York Times reported after he was identified as the leaker.

The supervisors cautionary note and the CIAs suspicions apparently were not forwarded to the NSA or its contractors, and surfaced only after federal investigators began scrutinizing Mr. Snowdens record once the documents began spilling out, the newspaper reported, citing unidentified intelligence and law enforcement officials.

And the Wall Street Journal reported in August 2013 that a federal review of his employment at the CIA and the intelligence contractors found the final security check that Snowden underwent in 2011 was inadequate. Investigators failed to verify Mr. Snowden's account of a past security violation and his work for the CIA, didn't thoroughly probe an apparent trip to India that he had failed to report, and they didn't get significant information from anyone who knew him beyond his mother and girlfriend, it said.

Separately, the U.S. Department of Justice has joined a whisteblowers lawsuit against USIS, the company that vetted Snowden, alleging the company faked 665,000 background checks it conducted for the Office of Personnel Management. It is not clear whether Snowdens check was among those that, according to the criminal complaint, were fraudulently classified as complete. (The case is still pending. The company told NBC News in January that "a small group of individuals" was responsible for the bogus checks and a source said they had been terminated.)

What is he charged with?

In a criminal complaint unsealed in U.S. District Court for the Eastern District of Virginia on June 21, 2013, the U.S. Justice Department charged Snowden with theft, unauthorized communication of national defense information and willful communication of classified communications intelligence information to an unauthorized person. The latter two charges are violations of the 1917 Espionage Act.

Each of the three charges carries a maximum prison sentence of 10 years, for a total of 30 years. Additional counts could be added.

Snowden has retained a prominent Washington attorney who has represented several clients charged with violating the Espionage Act, reportedly in hopes of negotiating a plea deal.

Why did he do it?

Snowden has said in interviews that he acted out of the belief that the spying program was illegal and immoral.

"My sole motive is to inform the public as to that which is done in their name and that which is done against them," he told The Guardian in his first interview.

Snowden also has said he didnt trust the Obama administration, having seen it prosecute whistleblowers at an unprecedented rate.

Did he have foreign help?

Snowden has denied suggestions that he worked with or for foreign governments. NBC reported in January that law enforcement officials have not found any evidence that Snowden was working for Russia as a spy.

What damage did Snowdens leaks do to the U.S.?

That is a matter of considerable debate.

The man who leaked the Pentagon Papers, Daniel Ellsberg, has called the Snowden disclosures the most significant leak in U.S. history. "Edward Snowden has done more for our Constitution in terms of the Fourth and First Amendment," Ellsberg said, "than anyone else I know."

Privacy advocates say that Snowdens revelation of the extensive U.S. spying operations was a bold and necessary step that forced the federal courts, the Congress, and the Obama administration to re-examine the previously secret programs and, in some cases to reform them.

But U.S. officials, members of Congress, and others have said that the Snowden disclosures harmed national security by enabling foreign spies.

Director of National Intelligence James Clapper said the revelations caused "huge, grave damage" to the nation's intelligence capabilities.

Army Gen. Martin Dempsey, the chairman of the Joint Chiefs of Staff, testified in March that the Pentagon might need to spend billions to overcome the damage done to military security by Snowden's leaks of intelligence documents. Unnamed intelligence officials were quoted by AP saying that the agencies were scrambling to maintain surveillance of terror groups after they changed their methods of communication in the wake of Snowden's revelations.

The officials have not given details of any specific damage caused by the Snowden leaks.

The U.S. was also embarrassed by the disclosures or by the behavior being disclosed when the Snowden documents revealed that the U.S. has eavesdropped on the personal communications of foreign leaders, including allies.

Where is he now?

Since August of last year, Snowden has been living at an undisclosed location in Russia, under temporary asylum granted by Russian authorities as they consider his application for permanent political asylum.

What happens next?

His one-year temporary asylum in Russia expires on Aug. 1, but it could be extended if Moscow has not ruled on his request for permanent asylum.

It is also possible but considered unlikely that Russia would hand him over to U.S. authorities at that point.

View post:
Who Is Edward Snowden, the Man Who Spilled the NSA's Secrets?

Why so silent? Edward Snowden has gone underground since Russia’s …

Edward Snowden, the former National Security Agency contractor and press freedom advocate who has lived in Moscow in exile since 2013, hasn't uttered a word publicly on Russia's move to criminalize independent reporting about its invasion of Ukraine.

Snowden is the president of Freedom of the Press Foundation, a California-based charity that tracks "press freedom violations" in the United States as minor as journalists being denied access to press conferences. As recently as Jan. 26, Snowden urged Danish citizens to resist their government after it threatened to impose lengthy prison sentences to members of the media who reported on state secrets.

RUSSIAN POLICE ARREST MORE THAN 3,000 PROTESTERS ACROSS 49 CITIES

But Snowden hasn't said anything publicly, let alone issued a call for active resistance from the Russian people, about the legislation signed into law by Russian President Vladimir Putin last week that threatens imprisonment of up to 15 years for spreading what the Russian government deems to be "fake information."

Examples of "fake information" in the eyes of the Russian government include any reporting about its invasion of Ukraine that isn't sourced directly from the Russian Defense Ministry.

The law has led numerous Western news outlets to suspend reporting in Russia in recent days.

The change to the criminal code, which seems designed to turn any independent reporter into a criminal purely by association, makes it impossible to continue any semblance of normal journalism inside the country, Bloomberg News Editor-in-Chief John Micklethwait said Friday.

Snowden and the Freedom of the Press Foundation did not return requests for comment.

Snowden issued numerous tweets in the lead-up to Russia's invasion of Ukraine criticizing the Biden administration for claiming Russia's invasion was imminent and blasting American media for "pushing for war."

"So... if nobody shows up for the invasion Biden scheduled for tomorrow morning at 3AM, I'm not saying your journalistic credibility was instrumentalized as part of one of those disinformation campaigns you like to write about, but you should at least consider the possibility," Snowden tweeted on Feb. 15.

Snowden hasn't posted a tweet to his 5.1 million followers since Feb. 27, three days after the start of Russia's invasion.

"I'm not suspended from the ceiling above a barrel of acid by a rope that burns a little faster every time I tweet, you concern-trolling ghouls," he said. "I've just lost any confidence I had that sharing my thinking on this particular topic continues to be useful, because I called it wrong."

The Russian government granted Snowden permanent residency in October 2020. Snowden says he has never cooperated with or received funding from the Russian government.

Snowden worked at the CIA prior to a stint as a contractor for the National Security Agency. In 2013, he left his job at an NSA facility in Hawaii, flew to Hong Kong, and soon disclosed hundreds of thousands of classified NSA documents to journalists. Snowden revealed not just domestic surveillance programs, but also exposed global national security operations by the U.S. and its allies. Snowden, who was granted asylum by Russia and lives in Moscow, was charged with violating the Espionage Act.

The House Intelligence Committee, which released a redacted 36-page report on Snowden in 2016, argued Snowden was not a whistleblower and was, and remains, a serial exaggerator and fabricator.

Snowden caused tremendous damage to national security, and the vast majority of the documents he stole have nothing to do with programs impacting individual privacy interests they instead pertain to military, defense, and intelligence programs of great interest to Americas adversaries, the HPSCI report read. He handed over secrets that protect American troops overseas and secrets that provide vital defenses against terrorists and nation-states."

The report also cast doubt on Snowden's timeline of events: Two weeks before Snowden began mass downloads of classified documents, he was reprimanded after engaging in a workplace spat with NSA managers. Despite Snowdens later claim that the March 2013 congressional testimony of Director of National Intelligence James Clapper was a breaking point for him, these mass downloads predated Director Clappers testimony by eight months.

The report indicated that in June 2016, the deputy chairman of the Russian parliaments defense and security committee publicly conceded that Snowden did share intelligence with his government.

Snowden also gave a 2013 interview to the South China Morning Post while hiding out in Hong Kong, claiming that we hack network backbones ... that give us access to the communications of hundreds of thousands of computers. He also claimed that the NSA hacks Chinese cellphone companies and that U.S. spies hacked Chinese universities.

The committee sent a bipartisan letter to then-President Barack Obama, saying Snowden "took the material to China and Russia two regimes that routinely violate their citizens' privacy and civil liberties."

Among the signatories were current Democratic Chairman Adam Schiff, former Republican Chairman Devin Nunes, and former Secretary of State Mike Pompeo, then a congressman.

Trump tweeted about Snowden dozens of times before becoming president, calling the leaker a traitor and a spy as he lamented that we are being embarrassed by Russia and China on Snowden.

Im not that aware of the Snowden situation, but Im going to start looking at it, Trump said after being asked about a possible pardon in August 2020.

Then-Attorney General William Barr said he was vehemently opposed to pardoning the traitor.

The day Trump left office without pardoning him, Snowden tweeted: I am not at all disappointed to go unpardoned by a man who has never known a love he had not paid for.

Originally posted here:
Why so silent? Edward Snowden has gone underground since Russia's ...

Kids spend the summer in STEM camp – Marketplace

For kids across the country, its summer vacation time.

And in between days at the playground or family trips, some kids are staying busy learning advanced tech skills.

Though summer camps across the board saw a surge in early enrollment, one option popular with families is STEM camps, which offer training in science, technology, engineering and math.

The idea is that camps like these keep young brains active outside of school and could even inspire the next generation of tech leaders.

On the outskirts of Chicago, one summer camp is hoping to do just that. WBEZs Susie An has the story.

At a Code Ninjas center in suburban Chicago, kids are learning about robotics and how to program and code. Tensions are high as three teams race to build a cart out of Legos. The cart is attached to a computer program, but a bug was intentionally introduced into that program, and the kids have to fix it.

Jacob Liokumovich, whos headed to the sixth grade, has chosen to work alone.

I like building whatever comes to me while Im building. Thats how I build, he says.

Soon to be seventh-grader Alarese Gaden and third-grader Oliver Liokumovich have joined forces.

I have a lot of Lego sets at home that I build with, Alarese says.

The youngest team is made up of three 8-year-olds.The goal is to see who can program the fastest cart.

The coding camps owner and director, Nawroz Pirani, says it wont be such a rude awakening for these kids once they go back to school. He also has kids building their own websites and designing games. This week of camp costs $349.

Its not your traditional type of learning, Pirani says. Theyre learning a coding language and STEM skills, and its going to be useful for them.

Pirani says those STEM skills are important now, but he predicts that in the next 10 or 15 years, itll be even more necessary for people to know some kind of computer language.

Back in the robotics class, the teams have constructed their carts and now theyre going through lines of code. But some are hitting a few snags. Alarese is disassembling the cart.

Im trying to fix it because this got taken off, and we have to re-add the wheels, she says.

Her partner, Oliver, isnt paying much attention.

The team of 8-year-olds is being squeezed for time. Twins Michael and Gabriel Mendez have become enamored with Fred and Fredalina, Lego characters they created who have an extensive backstory.

We need to deliver Fred and Fredalinas lunch, the twins say.

Teammate Henry Voicu tries to get them back on track.

Were not going to deliver food to Fred and Fredalina, Henry says.

In the end, everyone is able to successfully debug their cart programs, including the team of 8-year-olds. But the kids dont have enough time to see whose cart wouldve been the fastest. Although most suspect that Jacob, the sixth-grader who worked alone, wouldve won. But hes being modest about it.

I mean, its been the fastest for pretty much everything, but maybe. I really dont know, he says.

Hell be coming back to later sessions to test more of his skills.

We did a show last year with the CEO of one of the highest-profile student coding programs, Girls Who Code. CEO Tarika Barrett shared how the program adjusted during the pandemic to teach students in areas with limited internet access.

She said it took a lot of coordination.

One funder for some coding summer camps is the National Security Agency. Yes, the government.

Bloomberg has a piece on the program, called GenCyber, which consists of over 100 camps across the country. The agency funds them but does not set the curriculum. More than 20,000 students have attended the program, which was started in 2014, just a year after Edward Snowden first leaked secret NSA documents.

Lastly, if youre thinking about jumping into a brief coding boot camp for an income boost, we have an article from Vox all about the promise of the six-figure salary associated with adult coding programs and how those expectations might not line up with reality.

Excerpt from:
Kids spend the summer in STEM camp - Marketplace

Thomas Demand: The Stutter of History – Announcements – E-Flux

From July 8 to September 4, 2022, UCCA Edge presents The Stutter of History,the first comprehensive survey of work by Thomas Demand (b. 1964, Munich, lives and works in Berlin and Los Angeles) in China. Capturing the uncanny intersections of history, images, and archtectonic forms, the exhibition features over 70 photographs, films, and wallpapers that span the arc of the artists career, and focuses on four important areas of his work: large-scale photographs depicting seemingly banal yet historically significant scenarios reconstructed from news images or other sources; Dailies based on images taken on his phone; photographic studies of paper models from other creative disciplines in Model Studies; and his moving image work. The exhibition is curated by Douglas Fogle for the non-profit organization the Foundation for the Exhibition of Photography and is organized at UCCA Edge by Ara Qiu, Mason Zha, Zhang Yao, and Lin Luqi. UCCA Edge thanks audiences for their understanding regarding the impact of recent pandemic-related restrictions on the exhibitions originally planned opening date and duration.

For Demand, The Stutter of History lies in the gap between existing images that depict the world around us, the 1:1 paper models he meticulously builds to reconstruct these images, the photographs he takes of these models, the subsequent destruction of the models, and the para-photographic forms that then relaunch into the world. In the first section, Demands large-scale photographs depict scenarios from the margins of recent history, from the Gangway (2001) that Pope John Paul II descended on his visit to unified Berlin, to the polling centers for the contentious 2000 United States presidential election (Poll, 2001). A selection of works confront images associated with the Nazi regime and other traumas in German history, such as Room (1994), the site of a failed attempt to assassinate Hitler in 1944, and the ransacked Office (1995) of the Stasi. Closer to the present day, the Refuge series (2021) re-creates the bleak, generic Russian hotel room presumably occupied by American whistleblower Edward Snowden.

As a counterpoint to the public and monumental, the Dailies series (20082020), shown on the third floor, consists of photographs of paper models Demand reconstructed based on images taken with his iPhone. They depict the ordinary, sometimes humorous, and often overlooked moments that populate everyday lifea pile of unopened mail, a poster on a telephone pole, plastic cups stuck in a fence.

In his Model Studies, Demand enters into dialogue with models from other creative professions. The photographs on display here make fragmented and abstract studies of well-worn paper models from the architecture studio SANAA and the radical paper dress patterns of fashion designer Azzedine Alaa, offering an alternative dimension to the use and haptic materiality of models.

Finally, the exhibition investigates Demands commitment to the moving image in his explorations of stop-motion filmmaking, as demonstrated in the work Pacific Sun (2012). Housed in a specially built cinema-like intervention, Demand fastidiously reconstructed this epic, absurd stop-motion animation film from two minutes of security footage from the cruise ship Pacific Sun as it was hit by gigantic waves off the coast of New Zealand. Its frenzied moments of uncontrolled chaos culminate in climatic absurdity, a state that is central to the gulf between the disquieting, utopian potential of his paper models and the mass consumption of their photographic doppelgngers.

Apart from individual artworks, exhibition design is an integral part of Demands conceptual approach to artistic production. With his architectural use of textiles, wallpapers, and temporary structures, Demand creates an immersive environment for the spectator, in which image and world collide.

Accompanying the exhibition, the English-language catalogue The Stutter of History has been produced in collaboration between art director Naomi Mizusaki, the artist, and his longtime publisher MACK. The catalogue contains an introduction by Douglas Fogle, an essay by art historian Margaret Iversen, and an original prose fiction piece by author Ali Smith.

More:
Thomas Demand: The Stutter of History - Announcements - E-Flux

Empire of Hacking: U.S. is the Biggest Threat to Cyber Security – Xinhua

By Xin Ping

Hackddos, an Internet media outlet focusing on information security, recently released a report revealing that the U.S. National Security Agency (NSA) has been stealing indiscriminate data from Internet users around the world. Using advanced technologies and tools, the NSA has intercepted 97 billion pieces of global Internet data and 124 billion pieces of telephone data in 30 days. It has also used submarines to conduct cyber theft from undersea fiber optic cables.

This is just one more disclosure of the numerous cyber attacks by the U.S. According to a report by the International Institute for Strategic Studies, a U.S. think tank, the United States has become the world's number one cyber superpower, especially in terms of cyber intelligence and cyber attack capabilities. As Mr. Edward Snowden revealed, the NSA organized and implemented at least 231 cyber attacks in 2011 alone, mainly targeting "adversaries" such as China, Russia, Iran and Venezuela. In 2010, U.S. and Israeli intelligence agencies used the "ShockNet" virus to cripple Iran's nuclear facilities. In March 2019, a cyber attack by the U.S. caused a major power outage in Venezuela. Eighteen states across the country were affected and half the country was plunged into darkness, with power outages lasting more than 48 hours in some areas.

The U.S. targets not only its rivals, but also its closest allies and even its own citizens. In 2013, the U.S. "Prism" surveillance program targeted the then German Chancellor Angela Merkel among many other dignitaries. In 2015, WikiLeaks revealed that the NSA had wiretapped three French presidents, Jacques Chirac, Nicolas Sarkozy and Francois Hollande. In 1975, Frank Church, then Chairman of the U.S. Senate Select Committee on Intelligence, said that U.S. surveillance capabilities could be "turned around and pointed at the American people at any time, and no American would have privacy." In August 2013, three documents declassified by the NSA showed that the agency had collected 56,000 private emails and other communications from U.S. citizens with no relevance to terrorism each year between 2008 and 2011. The White House, however, argued that the targets of such surveillance programs were strictly "external" and that domestic intelligence was intercepted only "incidentally".

As an empire of hacking, the U.S. is not satisfied with simply collecting information through cyber surveillance. It has taken further steps to transform the new frontier of cyberspace into a new battleground for cyber attacks. On May 18, 2010, the U.S. Air Force announced the creation of an interim "Cyber Command". According to an article on the RAND Corporation website, the number of fully combat-capable U.S. cyber mission units will likely reach 167 by 2024, representing an increase of about 10 percent in personnel. And of course, the U.S. wastes no opportunity to conduct combat exercises of cyber war in the Russia-Ukraine conflict. Paul Nakasone, commander of U.S. Cyber Command and director of the NSA, publicly admitted that U.S. Cyber Command was "helping Ukraine strengthen its cyber defenses" with cyber warfare operations such as "Cyber Hunt Forward Operations".

As a thief cries "stop the thief", the U.S. has always depicted itself as a victim of cyber attacks. Nevertheless, unrivaled in malicious cyber activities, the U.S. has been a major threat to global cyber security. It talks the loudest about freedom and security, but has undermined them more than anyone.

(The author is a commentator on international affairs, writing regularly for Xinhua News Agency, CGTN, Global Times, etc... He can be reached at xinping604@gmail.com)

The article reflects the author's opinions and not necessarily the views of Xinhuanet.

See more here:
Empire of Hacking: U.S. is the Biggest Threat to Cyber Security - Xinhua

Quantum Cryptography Services Market 2021; Region Wise Analysis of Top Players in Market and its Types and Application – NewsOrigins

The demand for Quantum Cryptography Services Industry is anticipated to be high for the next six years. By considering this demand we provide latest Quantum Cryptography Services Market Report which gives complete industry analysis, market outlook, size, growth and forecast till 2026. This report will assist in analyzing the current and future business trends, sales and revenue forecasts.

The Quantum Cryptography Services market research report thoroughly analyzes this industry vertical while elaborating on the various market segmentations. Key aspects of the market including the current industry size as well as position as per revenue and volume predications are highlighted in the document. Furthermore, the report delivers information regarding the regional contribution as well as the competitive scenario of this business landscape.

This report shows the outstanding growth of Quantum Cryptography Services market as well as increasing the Production Price Cost Production Value of Quantum Cryptography Services Market. Given report is shows Export Market Analysis, main region analysis and upcoming demand of Quantum Cryptography Services market.

Request Sample Copy of this Report @ https://www.newsorigins.com/request-sample/40930

Underlining the primary details of the Quantum Cryptography Services market report:

From the regional frame of reference:

Unveiling the competitive spectrum of the Quantum Cryptography Services market:

Additional data highlighted in the research report:

Highlights following key factors:

Request Customization for This Report @ https://www.newsorigins.com/request-for-customization/40930

Visit link:
Quantum Cryptography Services Market 2021; Region Wise Analysis of Top Players in Market and its Types and Application - NewsOrigins

Lets grab some knowledge about the basics of bitcoin! – Star of Mysore

Bitcoin is often used as a monetary system, not an actual currency. Undeniably people have heard about bitcoin, but not many know about the basics of bitcoin. Behind every digital currency, such as BTC, a complete proof ecosystem of technical aspects exists. If you want to get better at bitcoin trading, you can visit; here, you can get beneficial tips to become a proficient independent trader. First, lets discuss the basics of bitcoin.

Bitcoin Blockchain!

Bitcoin uses cryptography for its security. In the cryptocurrency world, it is the unique signature that identifies each user, which is called a public key and a private key to access the funds. A transaction between two users, signed with their private keys, becomes a block and has to be added to the ledger called a blockchain.

The blockchain can be considered a record or ledger of all transactions within a digital currency system since its inception. In other words, it can be considered a public database which keeps a record of all trading activities ever performed by any user at any time.

What is Bitcoin Mining?

Usually, in a public ledger system (blockchain), if each user can make changes, its prone to manipulation. To avoid this, bitcoin adjusts the difficulty of the cryptographic puzzle so that one block is generated every 10 minutes.

Mining is a process by which transaction data is verified and added to the blockchain ledger. As a reward for new bitcoins, miners acquire exchange charges and freshly formed bitcoins. This activity is also known as mining because its a costly procedure for Bitcoin miners in terms of computing power and electricity required for solving mathematical puzzles.

Bitcoin Wallet!

A bitcoin wallet is like your bank account for bitcoin. You can send/receive bitcoin and make payments to merchants with it! A wallet is a store of value (such as cash) and a means of payment (such as debit cards, credit cards, PayPal) in which bitcoins are stored.

There are many different types of wallets available

Hardware Wallet: This type of wallet stores the private keys locally on a physical device like a USB or an external hard drive. It can be kept offline and used for cold storage if you lose your computer.

Mobile Wallet: This type of wallet allows user to access their bitcoins from any smartphone mobile app or web application on smartphones. There are numerous other types of wallets.

Cryptography!

Data secured using cryptography can have decoded only with the private key. It is also known as encryption. Data needs to be encrypted with pairing keys before transmission between computers. This type of data security is called asymmetric encryption.

Private Key: A secret number used to encrypt information which can decrypt or unlock something. Public Key: A cryptographic key or random number used by a person to encrypt something and make it public. Anyone can use a cryptographic public key to encrypt something. Still, it can only have decryption with a corresponding private key that only the owner of the corresponding private key possesses.

Bitcoin Halving!

Bitcoin has an important date in its history called Halving. When the reward for mining new bitcoins halves, mining becomes more and more complex and to compensate for this mining difficulty, the bitcoin price increases.

When does the halving happen?

The first of two Bitcoin halves occurs roughly every four years. The second last one happened on Jul 9th, 2016, after which the reward will be 12.5 bitcoins per block (currently 10). As of now, the third halving occurred on Aug 5th 2017. Finally, the most recent having occurred in March 2020.

Private Keys!

A private key is a secret code that one can use to encrypt and perform decryption of cryptocurrency exchange. A digital signature is a private key that enables its associated digital signature algorithm to verify the integrity of a message or file.

The private key may be public only to the person who created it, or it may be known by anyone who knows how to find it. It may be kept on paper, written down on an electronic device, or stored in a computers memory or as an electronic file.

Read more from the original source:
Lets grab some knowledge about the basics of bitcoin! - Star of Mysore

Thanks To Apple, Microsoft And Google, Passwords Will Finally Die – Forbes

As a vignette to illustrate the state of the digital identity world in 2022, I can do no better than you tell you that when I was in San Diego recently (at a gathering of some of the brightest stars in the digital identity universe) I had need to change my flight. I opened up my airline app and (presumably because I was logging in from a new location) was required to complete an additional authentication step, which was to tell them my favourite breed of dog.

Now I am sure that some years ago, when setting up this account, I had been asked to choose a couple of additional security questions that must have included a canine conundrum, but of course I had forgotten all about it. The good news was that after a couple of guesses, I went for "Spaniel" and I was in (don't worry, I've changed it now so there's no need to email me about this gross security violation). While I was doing this, one of my fellow digital identity experts was taking a photograph of his passport to e-mail to someone so that he could check in. It was all very 1994, except we were being annoyed and confused with much smaller screens.

Password "Security".

The state of internet security is pathetic. It's no wonder that fraud is at such epic levels when vast swathes of the internet still depend on passwords for security. Passwords are just not security and password security is no such thing.

This is hardly news and this must be the ten millionth column pointing it out, since it must have been evident about a week after the world went online and smart people demanding the end of the password ever since.

Just to give one example, at the dawn of the millennium Bill Gates was saying that smart cards should replace passwords and then in 2004 he told the RSA Security Conference that the password must go because it cannot "meet the challenge" of keeping us secure. It was true in 1994, it was true in 2004 and 2014 and it will still be true in 2024!

So we all agree that passwords are a bad idea but we are all forced to use them. I just had to reset the password for one of my hotel apps because the password stored in my handy password manager was somehow wrong and after three attempts to log in to try and book at hotel room I got locked out.

(As for many other services, they may as well just automatically send me straight to the "I forgot my password" page to save time when I try to log in.)

Interestingly, the short term result of this was that I opened one of my other hotel apps and used that to book a room. Weird to think that in this modern world, my choice of hotel for a business trip was based on which password I can remember, rather than loyalty points or tea and coffee facilities.

Passwords are well beyond their sell-by date. Last year, the top five passwords used in the USA, according to password manager Nordpass, were "123456", "123456789", "12345", "qwerty" and "password". It's hardly surprising that there are so many hacks, frauds, account takeovers and all sort of other shenanigans that stem from the outdated view that passwords are some sort of security solution. They are not, and we (ie, the digital financial services sector) have known for years that they must die.

They should be replaced by real cryptography, preferable where the cryptographic keys are stored in tamper-resistant hardware rather than in software. A great many people already have suitable devices. Last year more than half of US teens and adults had tablets and smartphone penetration, which continues to rise, will be almost 90% this year. These devices are near-prosthetic. The average smartphone user will tap the device 2,617 times a day. Around half of US smartphone users say they "couldn't live without their devices" and a third of them look at their phones more than 50 times every day.

So if most people are most of the time attached to a device capable of strong authentication of keys in tamper-resistant hardware why are we still using passwords?

Well, we may not be in this bind for too much longer. I think that the recent announcement from the FIDO Alliance and Microsoft MSFT , Apple and Google GOOG that they will support the expansion of the common passwordless standard created by FIDO and the World Wide Web consortium (W3C) is really significant and should have attracted more media attention.

The three internet giants have said that they will be using the new multi-device FIDO credentials, sometimes referred to as "passkeys", to begin to rid the world of passwords. They have committed to support passwordless sign-in that will work across all the desktop, mobile, and browser platforms that they control. That is a large portion of modern technology, covering everything from laptops and desktops to smartphones, tablets, and smartwatches. The announcement covers the most used operating systems (Android, iOS, Windows, and macOS) as well as the three most used web browsers (Chrome, Edge and Safari).

A passkey is a credential, tied to what is known as an "origin" (which means a website or an application that you want to log in to) and a physical device (an authenticator). Passkeys allow users to authenticate without having to enter a username, password, or provide any additional authentication factor. These credentials follow the FIDO and W3C Web Authentication (WebAuthn) standards. Websites and apps can request that a user create a passkey to access their account.

The authenticators are FIDO-compliant devices which are used to, as you might imagine, authenticate the user. This includes special purpose devices (eg, USB sticks), as well as mobile phones and other computers which meet the authenticator requirements (they have to have secure tamper-resistant storage for cryptographic keys, essentially).

Apple got behind FIDO a couple of years ago. It calls its own implementation "Passkeys in iCloud Keychain" and what that boils down to is that in the future when I log in to my airline app or my hotel website in the future, it will authenticate me through my iPhone. Kind of like how "Log in with Apple" works today, except it will work everywhere that implements the FIDO standard.

Similarly, Microsoft announced a while back that some of its customers could go passwordless, and it followed up last year by telling people to start to get rid of their passwords altogether. You can already use Windows Hello to sign in to any site that supports passkeys but in the near future you will be able to sign in to your Microsoft account with a passkey from an Apple or Google device.

The ability to log in to Windows using an Apple Watch, to Google using a Microsoft tablet and to Apple using Android phone is surely a game changer and a step towards ending the fragmentation of identity solutions that leaves the typical user struggling with password managers, sticky notes and mnemonics.

Microsoft Co-Founder Bill Gates has been calling for the end of passwords for many, many years. ... [+] (Photo by Doug Wilson/CORBIS/Corbis via Getty Images)

Two decades on and Bill Gates call for smart cards to replace passwords is about to be answered, although the smart cards will be inside mobile phones and laptops and tablets rather than sitting in wallets. As the MIT Technology Review commented recently, these alternatives to passwords are finally winning. It's not before time.

The rest is here:
Thanks To Apple, Microsoft And Google, Passwords Will Finally Die - Forbes