NSA Spying Damages US Economy, May End Up ‘Breaking the Internet’ – Video


NSA Spying Damages US Economy, May End Up #39;Breaking the Internet #39;
http://www.undergroundworldnews.com Technology giants claim the National Security Agency #39;s bulk surveillance programs are hurting the American economy, and one Senator is hoping to use that...

By: DAHBOO77

More here:
NSA Spying Damages US Economy, May End Up 'Breaking the Internet' - Video

Tech Talk: Technical overview of InfoSphere Guardium Data Encryption (1 of 3) Overview – Video


Tech Talk: Technical overview of InfoSphere Guardium Data Encryption (1 of 3) Overview
In part 1 of this 3-part tech talk, Tim Parmenter provides an introduction and architectural overview of the InfoSphere Guardium Data Encryption solution for data at rest.

By: InfoSphereGuardium

See the original post here:
Tech Talk: Technical overview of InfoSphere Guardium Data Encryption (1 of 3) Overview - Video

Tech Talk: Technical overview of InfoSphere Guardium Data Encryption (3 of 3) Customer use case – Video


Tech Talk: Technical overview of InfoSphere Guardium Data Encryption (3 of 3) Customer use case
In part 3 of this 3-part tech talk, Mark Jamison describes why a large retailer chose InfoSphere Guardium Data Encryption for their massive deployment and describes lessons learned.

By: InfoSphereGuardium

Originally posted here:
Tech Talk: Technical overview of InfoSphere Guardium Data Encryption (3 of 3) Customer use case - Video

Cloud Computing Security Strategy Includes Cryptography

The movement of data and software services to the cloud has left some businesses feeling less secure. Skyhigh Networks brought together academic experts for the first industry-focused cryptography advisory board to provide insights on using encryption schemes as part of cloud computing security, Becca Lipman reports on Wall Street & Technology.

Secure Cloud Data Through Encryption

The use of encryption means control of business files and data remains with the firm, while the cloud services provider independently handles software and infrastructure. Encryption is applied at the data source, and decryption occurs only when an accessing application or user has been authenticated. The cloud service handles the encrypted data without having access to the contents.

The addition of cryptographic techniques to cloud services comes with complications and cannot be applied naively in all cases. If the wrong encryption is employed, computational overhead can increase by orders of magnitude. Encryption cannot be paired with cloud services that require detailed data access to perform required functions, such as data transformation or detailed analytics. As Lipman notes, the advisory board's value is in avoiding inappropriate technology choices, and the focus is on selecting from existing encryption strategies rather than inventing new techniques to reduce service costs.

Big Security for Midsize Business via the Cloud

Academic advisory boards can be viewed as a metaphor for how the shared service delivery model tilts the playing field to favor midsize businesses by providing resources that were once reserved for large businesses alone. Efforts by cloud service providers to increase cloud computing security is one of the biggest advantages gained by midsize businesses that engage with cloud computing. Business size is no longer a determining factor in whether a business can access cutting-edge knowledge outside of its core business. Through the application of cryptographic techniques, the public cloud can become a more secure option for midsize businesses than developing in-house abilities.

Acting on Cloud Advice

Access to advice for improved data security may be an advantage of cloud services, but it still requires the businesses and their IT professionals to act on the advice. In the case of encryption, it must be employed consistently to be effective. The business is responsible for assessing security against disadvantages, such as computational overhead or limits to remote access and data sharing with partners. Data governance can be used to determine the appropriate level of security to apply to certain files and data. Encryption becomes another tool for the business to deploy as part of a larger cloud computing security strategy.

This post was brought to you by IBM for Midsize Business. Dedicated to providing businesses with expertise, solutions and tools that are specific to small and midsized companies, the Midsize Business program provides businesses with the materials and knowledge they need to become engines of a smarter planet.

Originally posted here:
Cloud Computing Security Strategy Includes Cryptography

Assange makes surveillance inquiry submission

Julian Assange has dismissed the Australia government's assurances on the limits of their surveillance powers, labelling them "absurb" and "meaningless". Photo: John Stillwell

Julian Assange has entered Australia's surveillance debate dismissing as "absurd" and "meaningless" government assurances that telecommunications interception is limited and subject to strict oversight.

In a late submission to a Senate committee inquiry into Australia's telecommunications interception laws the WikiLeaks publisher says the Australian government has "fundamentally misrepresented" information sharing between the "Five Eyes" intelligence partners the United States, Britain, Canada, Australia and New Zealand.

Mr Assange, an Australian citizen granted political asylum by Ecuador two years ago and living in its London embassy, argues that revelations from former US National Security Agency contractor Edward Snowden have confirmed that "bulk interception" and mass sharing of private communications "are routine among the Five Eyes intelligence agencies."

Mr Assange was granted political asylum on the grounds that he is at risk of extradition to the US to face conspiracy or other charges arising from the leaking of hundreds of thousands of secret military and diplomatic documents by US soldier Chelsea Manning. The Australian government has indicated that it will not make any representations on Mr Assange's behalf.

Advertisement

He is subject to a European arrest warrant to face questioning in Sweden about rape and sexual assault allegations.

The WikiLeaks submission responds to assurances given to the Senate legal and constitutional affairs committee by Australia's intelligence watchdog, the Inspector-General of Intelligence and Security, that Australia's electronic espionage agency, the Australian Signals Directorate, and its "data-sharing about Australian persons" is subject to "quite strict oversight."

"It is absurd that Australian government agencies continue to misrepresent the nature of interception and their access to intercepted data via Five Eyes sharing arrangements," Mr Assange writes.

Mr Assange urges the Senate committee to examine leaked top secret intelligence documents relating to the Five Eyes interception program code-named XKeyscore.

See the original post here:
Assange makes surveillance inquiry submission

Bitcoin ‘BearWhale’ rattles cryptocurrency world

Even without the big sell limit, bitcoin's value has seen a steady degradation since early July when its price topped $630. Various explanations have been offered for the move, but one of the most common has been that the increased merchant adoption of the currency has put downward pressure on it.

The theory holds that merchantswho almost always accept bitcoins as payment for products and services and then immediately exchange them back into local currenciesare creating an excess of sellers in the marketplace, thereby adding to the fall in exchange value.

"More merchants want to take advantage of the purchasing power of the community, and the more merchants accept, the more bitcoins will be for sale," Euro Pacific Capital's Peter Schiff told CNBC in September. "(The market is) not going to be able to come up with enough new buyers."

Read MoreApple Pay won't bite into bitcoin: Winklevoss

This point of view has been expressed by Citi and other observers.

But Gallippiwhose BitPay system enables businesses to accept bitcoins and then instantly exchange them for local currencydisputed this theory. While it is true that these transactions are bringing more sellers to the market, he said, most people are only using bitcoins for goods and services when they see the price spiking.

So in effect, the increased adoption of bitcoin by merchants is putting a ceiling on the price, but not applying general downward pressure, Gallippi said.

For more on the possible reasons why bitcoin may be sliding, CoinDesk put together a summary of the digital currency's third quarter.

Go here to see the original:
Bitcoin 'BearWhale' rattles cryptocurrency world

Cryptocurrency Round-Up: Bitcoin Bounces Back and FBI’s Silk Road Hacking was ‘Reasonable’

Bitcoin and other cryptocurrency markets see prices increase following days of decline.(IBTimes UK)

The price of bitcoin has received a much needed boost, bouncing back up above $350 following an 8% rise in value since yesterday.

The price increase has had a positive knock-on effect across all other major markets, with none of the top twenty most valuable cryptocurrencies seeing any negative movement in the last 24 hours.

The biggest gains amongst the big players come from darkcoin and namecoin, which both saw a 10% increase that took their market capitalisations above $10 million once again.

Bitcoin Foundation comments on BitLicense proposal

The Bitcoin Foundation has highlighted the need for public access to the "extensive research and analysis" cited by the New York Department of Financial Services's (NYDFS) in its BitLicense proposal.

Jim Harper, global policy counsel for the Bitcoin Foundation, said that the proposed BitLicense regulation should not "sacrifice bitcoin's benefits" if the outcome is unknown or merely speculative.

"A regulatory regime that is markedly out of step with others is very likely to create inefficiency in national and global markets, which would suppress competition, hamper the delivery of benefits to consumers and frustrate consumers," Harper said.

FBI's warrantless hacking of Silk Road was 'reasonable'

Prosecutors in the case of Ross Ulbricht, the alleged creator of the black market site Silk Road, have claimed that hacking the site without a warrant would have been lawful.

Read more:
Cryptocurrency Round-Up: Bitcoin Bounces Back and FBI's Silk Road Hacking was 'Reasonable'