Global Central Lab Market Report 2022: Rising Number of Clinical Trials, and the Increased Use of Intelligent Technologies Like Automation and…

DUBLIN--(BUSINESS WIRE)--The "Central Lab Market Analysis, by Product, by End-user, and by Region - Global Forecast to 2029" report has been added to ResearchAndMarkets.com's offering.

The central lab market size is estimated to be USD 2,893.41 million in 2021 and is expected to witness a CAGR of 6.74% during the forecast period 2022-2029. The rising number of clinical trials, and the increased use of intelligent technologies like automation and artificial intelligence (AI) in central labs are projected to drive the market growth in near future. However, high operating costs associated with a central laboratory facility is expected to restrain the market growth.

By Product

Based on product, the market is categorized into biomarker services, special chemistry services, clinical research & trial services, genetic services, anatomic pathology/histology, microbiology services, specimen management & storage, and others. In 2021, the biomarker services accounted for the highest revenue share due to increasing use of biomarkers in clinical development programmes.

By End User

On the basis of product, the market is categorized into academic research institute, biotechnology companies, and pharmaceutical companies. In the global market, the pharmaceutical companies segment accounted for the largest revenue share in 2021 owing to rising demand from biotechnology and pharmaceutical industries for efficient and affordable clinical testing solutions and various central lab services.

This comprehensive research report focuses on the global and regional market size and forecasts of diverse segments including product and end user from 2021 to 2029.

Segmentation: Central Lab Market Report 2021-2029Product (Revenue, USD Million)

End user (Revenue, USD Million)

By Region (Revenue, USD Million)

Key Topics Covered:

1. Research Methodology

2. Introduction: Central Lab

3. Executive Summary

4. Market Dynamics

5. Market Environment Analysis

6. COVID-19 Impact Analysis: Central Lab Market

7. Market Analysis by Product

8. Market Analysis by End User

9. Regional Market Analysis

10. North America Central Lab Market

11. Europe Central Lab Market

12. Asia Pacific Central Lab Market

13. Latin America Central Lab Market

14. MEA Central Lab Market

15. Competitor Analysis

16. Company Profiles

17. Conclusion & Recommendations

Companies Mentioned

For more information about this report visit https://www.researchandmarkets.com/r/9ux9go

View original post here:
Global Central Lab Market Report 2022: Rising Number of Clinical Trials, and the Increased Use of Intelligent Technologies Like Automation and...

Luminate spotlight: Axion Technologies is building the next generation of encryption devices – Rochester Business Journal

By: Special to the RBJ October 14, 2022

Enter your user name and password in the fields above to gain access to the subscriber content on this site.

Your subscription includes one set of login credentials for your exclusive use. Security features have been integrated on this site: If someone signs in with your credentials while you are logged in, the site will automatically close your ongoing login and you will lose access at that time.

To inquire about group subscriptions or an enterprise site license for your organization, contact Tracy Bumba.

If you feel your login credentials are being used by a second party, contact customer service at 866-941-4130 or email [emailprotected] for assistance in changing your password.

Already a paid subscriber but not registered for online access yet? Click Here to register.

Forgot your password?

See more here:
Luminate spotlight: Axion Technologies is building the next generation of encryption devices - Rochester Business Journal

Banking Encryption Software Market Report 2022: Growing Partnerships Between Key Players Facilitating Further Expansion – Yahoo Finance UK

Company Logo

Global Banking Encryption Software Market

Global Banking Encryption Software Market

Dublin, Oct. 12, 2022 (GLOBE NEWSWIRE) -- The "Banking Encryption Software Market Size, Share & Trends Analysis Report by Component, by Deployment, by Enterprise Size, by Function (Cloud Encryption, Folder Encryption), by Region, and Segment Forecasts, 2022-2030" report has been added to ResearchAndMarkets.com's offering.

The global banking encryption software market size is expected to reach USD 5.03 billion by 2030, expanding at a CAGR of 13.0% from 2022 to 2030, according to this study conducted. The growing need for modern security solutions worldwide is anticipated to drive the growth of the industry. In addition, the rising incidences of cyber-attacks also bode well for growth.

Banking encryption software facilitates the confidential exchange of vital data by encrypting the data at the sender's end in a form not readable without a proper authentication key, which is usually in the form of a password. The receiver can use the authentication key to decrypt the data and read it. The strong emphasis banks and other financial institutions are putting on securing data transactions is driving the adoption of banking encryption software.

The growing partnerships among the encryption software providers are expected to drive market growth. For instance, In April 2021, Google Cloud and Broadcom collaborated. This collaboration increased the integration of cloud services into Broadcom's primary software franchises. In this partnership, Broadcom was able to make enterprise operations software and its security suite available on Google Cloud, enabling organizations to encrypt and decrypt data at the column level.

Banking Encryption Software Market Report Highlights

The software segment is expected to dominate the segment over the forecast period. This is due to its offered benefits such as security and privacy protection to the financial institutes

The cloud segment is anticipated to witness the fastest growth over the projection period. The growth of the segment can be attributed to the inexpensive deployment and customization options

The large enterprise segment dominated the market in 2021. Large organizations are adopting encryption solutions to meet the changing security needs owing to the rising incidences of cybercrimes

The cloud encryption segment is anticipated to witness the fastest growth because of its capability to facilitate a cost-effective and scalable encryption model

The Asia Pacific regional market is expected to witness the fastest growth over the projection period due to an increase in demand for encryption software among banks in developing countries in the Asia-Pacific, including China and India, to safeguard and ensure the privacy of data

Story continues

Key Topics Covered:

Chapter 1 Methodology and Scope

Chapter 2 Executive Summary

Chapter 3 Banking Encryption Software Industry Outlook

Chapter 4 Investment Landscape Analysis

Chapter 5 FinTech Industry Highlights

Chapter 6 Banking Encryption Software Component Outlook

Chapter 7 Banking Encryption Software Deployment Outlook

Chapter 8 Banking Encryption Software Enterprise Size Outlook

Chapter 9 Banking Encryption Software Function Outlook

Chapter 10 Banking Encryption Software Regional Outlook

Chapter 11 Competitive Analysis

Chapter 12 Competitive Landscape

Companies Mentioned

Broadcom

ESET North America

IBM Corporation

Intel Corporation

McAfee, LLC

Microsoft

Sophos Ltd.

Thales Group

Trend Micro Incorporated

WinMagic

For more information about this report visit https://www.researchandmarkets.com/r/y97abs

Attachment

The rest is here:
Banking Encryption Software Market Report 2022: Growing Partnerships Between Key Players Facilitating Further Expansion - Yahoo Finance UK

This flash drive will self-destruct (if you want it to) – ZDNet

Apricorn Aegis Secure Key 3

Losing hardware is a pain, but everything is replaceable.

Allowing data to fall into someone else's hands is the ultimate headache. Once your data is out there in the wild, it's game over.

The "solution" is to encrypt your data. But the problem with that solution is that unless the encryption is easy and foolproof, users are going to sacrifice data security for convenience.

If you want easy-to-use high security encryption, then you need hardware that's aimed at professionals, and that hardware doesn't get much better than the Apricorn Aegis Secure Key 3.0.

Also: This unusual ransomware attack targets home PCs, so beware

Not much bigger than a regular USB flash drive

Looking like an oversized USB flash drive, the Aegis Secure Key 3.0 packs a lot of high-tech into the tough aluminum shell.

The first thing that immediately stands out is the built-in keypad that's used to enter the passcode, which eliminates the risk of your passcode being compromised by a keylogger.

The keypad is rugged and blocks passcode leaking as a result of keyloggers

When I started using Aegis encrypted flash drives with the built-in keypad I expected the polymer-coated buttons to be the weak link, but they are exceedingly wear-resistant and do not seem to wear out over time to reveal the most commonly used buttons. I have similar drives that have been in regular usage for several years and the keypads still look like new.

It's not just the keypad that's tough. The flash drive is encased in aluminum (which also acts as a heatsink to keep the drive cool when in use), and there's even an extruded aluminum protective sleeve that protects the keypad and connector.

Not just secure, but also very tough

The drive is IP68 rated against water and dust damage, making it a really rugged storage drive that's just as much at home in the wilderness as it is in an air-conditioned office.

In use, the simplicity of the Aegis Secure Key 3.0 really shines. Once you've set up a passcode, you can unlock and lock the drive in a matter of seconds with a few taps on the keypad.

You can unlock it easily. But the bad guys can't.

The drive features built-in brute-force decrypt defense to wipe the drive if someone tries to guess the passcode, and it has a built-in unattended auto-lock feature that secures the drive in the event you walk away from it or become distracted.

For an added level of security, there's also the ability to set a self-destruct PIN to quickly wipe the drive of its contents yet make it seem like it is fully working.

How James Bond is that?

The drive works perfectly on USB-C Macs using a thord-party USB-C-to-USB-A adapter

All internal components are physically protected from tampering with hardened epoxy, and the firmware is locked down, making it immune to malware attacks such as BadUSB.

The Aegis Secure Key 3.0 is totally cross-platform compatible and OS agnostic. Whether you use Windows, Linux, Mac, Android, or Chrome, this encrypted storage drive will work as long as there's a powered USB port and storage file system available. All the encryption and decryption and control of the drive happens on the drive.

On the performance side, the drive is capable of read and write speeds up to 195MB/s and 162MB/s, respectively. I've tested this and found the real-world figures to be close to these published specs.

The real-world performance lives up to the published specs

The Apricorn Aegis Secure Key 3.0 also comes in a broad range of capacities, ranging from 30GB to 2TB, with prices ranging from $129 to $999.

Read the original here:
This flash drive will self-destruct (if you want it to) - ZDNet

Password management applications: Are they worth it? – Deseret News

It can be so difficult to remember hundreds of passwords maybe even impossible. Thats why so many people resort to using the same password over and over again. But what you may not know is that reusing passwords puts you at high risk for being hacked. So, to keep your personal information and data safe, consider using a password management application.

There are many password management applications available. They each offer different features and are all generally considered to be secure. Lets dive into everything you need to know about password management applications so that you can choose the right one for your situation.

A password management application (PMA) is a software program that helps users securely store their passwords. PMAs usually have built-in features that allow users to create strong passwords, manage multiple logins and auto-fill login information on websites. Some apps even come with two-factor authentication capabilities for extra security.

Most PMAs work by storing your passwords in an encrypted format on your device. When you need to log into a website, the management app will autofill your login information for you. To access your passwords, you must enter a master password that only you know. This way, even if someone were to gain access to your device, they would not be able to see your passwords.

In general, yes. Password management applications use strong encryption methods to protect your data. Additionally, many PMAs allow you to set up two-factor authentication, which adds an extra layer of security.

However, it is important to note that no system is 100% secure. There have been instances of password management apps being hacked. However, these hacks are usually the result of user error, such as using a weak master password or clicking on a phishing link.

People often opt to use a password management system for the following benefits. Password management applications:

There are a few drawbacks to using a password management application. First, if you lose your device or forget your master password, you will not be able to access any of your passwords. Additionally, all your passwords could be compromised if a password management application is hacked.

LastPass

LastPass is a password management system that allows users to store passwords in an encrypted format. LastPass password generator is considered a secure and reputable application and even offers a free password manager option.

Norton

The private password vault you can set up with the Norton password generator will help you create complex, encrypted and secure passwords. This password app also offers a Safety Dashboard feature that can help spot weak logins and quickly fix them with Autochange.

Bitwarden

Bitwarden is a strong password generator known for its ease of managing passwords for individuals, teams and enterprises. Some features of Bitwarden include secure data sharing, seamless integration with your existing systems and high security as open-source software.

KeePassXC

KeePassXC is a cross-platform password keeper. This password management system offers features such as a browser extension, industry-standard encryption and auto-type for easy password access across all your devices.

1Password

1Password is another reputable password management system. It will send you alerts about possible password data breaches and generate random passwords that are strong. With 1Password, you will no longer rely on weak or reused passwords that are easy to remember yet simple for hackers to break.

Overall, password management applications can be very helpful in keeping your passwords secure. However, it is essential to do your research to make sure you are using a reputable and safe application. There are many secure password generators available with different features. Consider what is important to you and try out a few options to find the best application for you.

Password management applications can be very beneficial as they can help make it easier to remember passwords, provide extra security and securely store all passwords in one place. However, password management applications can also be a security risk if not used correctly. So, remember to create a strong master password and never click on links from unknown sources.

Here is the original post:
Password management applications: Are they worth it? - Deseret News

9 top Dropbox alternatives: Free and premium tools – TechRepublic

Image: Nicole Lienemann/Adobe Stock

Dropbox can be a useful tool for file-sharing needs, but as businesses scale, it can easily out-price smaller budgets. Growing businesses that use Dropbox may quickly become frustrated with the tools pricing and fees compared to the features it offers. When that happens, they may find themselves on the hunt for more robust or cost-effective alternatives.

SEE: Checklist: Cloud storage management (TechRepublic Premium)

Jump to:

Dropbox is a cloud-based file-sharing service that allows users to have a single location for files and storage that can be accessed via any compatible device. By adding a Dropbox folder to their devices, users can seamlessly transfer or store files for sharing, backup or other collaborative needs.

Although Dropbox does have a free version, the storage limit is only 2GB, which can fill up rather quickly, even for occasional users. The first premium tier of Dropbox, known as Dropbox Plus, comes in at $11.99 per month or $119.99 billed annually. This ups the storage considerably to 2TB.

However, this Dropbox premium plan is limited to one user; business and enterprise users can quickly see the prices go up as per-user rates start to apply. For example, a 10-person team on the Dropbox Standard Business plan would cost $1,800 annually.

Google Drive is probably the most obvious free alternative to Dropbox. Anyone with a free Google account of any kind already has access to Google Drive. Although, there are Google Workspace premium plans for businesses and enterprises.

Starting with 15GB of free storage, Google Drive exceeds Dropboxs free offering of 2GB; though, paid plans are in line with Dropbox and offer no cost savings in that regard.

For those tied to the Google suite of productivity tools, Google Drive is a great choice. Drive integrates nicely with other Google tools like Mail or Calendar.

On the other hand, privacy is one concern with Google Drive, as the company openly states in the terms of service that it scans Drive contents to help serve more targeted ads. So, for security-conscious users, this may be a serious negative.

Sync boasts increased security over Dropbox and many other competitors. Unlike Google Drive, there is no scanning of your data. On top of that, Sync uses an encryption method called zero-knowledge encryption. This means only the user can view and decrypt messages, as the host does not have access to your decryption keys. So overall, Sync offers a much higher level of security for those looking for increased protection.

Pricing is slightly cheaper than Dropbox, with its Solo Basic tier coming in at $8 per month with 2TB of storage.

Mega takes the prize for the most free storage among the Dropbox alternatives. At a whopping 20GB for free accounts, Mega is a generous starting level that should satisfy many users without the need to move to paid tiers, which are slightly more expensive than Dropbox.

Security and privacy are also top-notch, with zero-knowledge and AES 256-bit encryption. In addition, Mega uses TLS to protect files as they are uploaded or downloaded.

While Mega is not quite as refined as other options when it comes to the interface, its by no means difficult to use. Syncing features are strong and allow for syncing of any folder.

OneDrive is similar to Google Drive in that it is part of Microsofts larger ecosystem of tools. If your teams and users are operating in the Office 365 ecosystem, OneDrive is an obvious choice.

Free versions are limited to 5GB, which is on the low side. But, paid tiers of Microsoft OneDrive start at $9.99 for 6TB, making it one of the cheapest Dropbox alternatives.

Privacy and security are not as good as some other options; for instance, OneDrive does not offer zero-knowledge encryption, similar to Googles issues.

pCloud is a strong alternative to Dropbox with added security features like zero-knowledge encryption; though, this feature does come at an additional cost of $3.99. Other than that, pricing is reasonable with free plans limited to 10GB and paid plans starting at $7.99 for 2TB.

pCloud has strong syncing and sharing features that rival free Dropbox offerings. These include features such as password sharing and expiration dates.

While mostly a backup service, IDrive does also work for cloud storage and syncing, making it a hybrid alternative to Dropbox. IDrive forgoes some collaborative and file-sharing tools, but the basic features are all there via the web interface to share files. However, there is no password or expiration date support for file shares.

IDrive has a generous 10GB free tier, and the 10TB paid plan at $6.22 a month is a great value if your business needs mostly backup services.

Icedrive takes the prize when it comes to the interface, which is clean, elegant and unclutteredthis goes for both the web interface and app interface. Security is strong with zero-knowledge and AES 256-bit encryption, but these are limited to paid plans.

Icedrive is missing collaborative features and document-sharing features. But, you do get file previews on many formats and fast transfer speeds.

Icedrives free tier comes with a 10GB limit, and paid tiers start as low as $1.67 a month for 250GB.

Box is clearly aimed at business users and enterprises, and it offers all of the features of Dropbox but with added support that business users would need. These include basic but useful project management features to go along with traditional syncing features.

Pricing is clearly aimed at business users as well. Free storage options are limited to 10GB, and plans with 100GB of storage start at $7 per month, making Box one of the more expensive options.

Security is a top priority, but once again it will cost you. Adding zero-knowledge encryption on top of AED 256-bit will cost extra.

App integration is where Box really shines and where users may find value to offset the higher cost. Box integrates with both Google and Microsoft productivity tools as well as 1,500 other apps.

Rounding out the list of Dropbox alternatives is NordLocker, which comes from the makers of the well-known Nord VPN services. NordLocker is focused on security and privacy with features that include zero-knowledge and AES 256-bit encryption, along with advanced ciphers and TLS transfers.

All of this security with NordLocker is relatively affordable. While the free tier is a little paltry with only 3GB of storage, 2TB of storage in a premium tier is only $7.99 a month; this premium tier also comes with 24/7 email and phone support.

Read the rest here:
9 top Dropbox alternatives: Free and premium tools - TechRepublic

Ford Wont Give Unauthorized Tuners Access To The 2024 Mustang S650 – CarScoops

Muscle cars are as American as apple pie or road trips. Modifying and customizing ones muscle car is also a very traditional move but now were learning that such tweaking will be considerably harder on Americas newest muscle car, the S650 Ford Mustang. Heres why those who seek to pull more power out of the latest pony car will find it harder to do so.

Advancements in technology have made many tuning strategies safer and more powerful than ever before. Despite that, the chief engineer of the all-new Mustang, Ed Krenz, recently told Ford Authority that tuning the new pony car would be much more difficult. Ultimately, that result is more collateral than it is intentional.

More: 2024 Ford Mustang Lands With BMW-Style Digital Dash, Manual Box And A 5.0 V8 You Can Rev From The Keyfob

Encryption on the full stack or the complete package of electronic hardware and software in the S650 Mustang is the barrier. Ford claims that the encryption isnt the product of wanting to keep extra power from owners but rather the ongoing battle against the dangers of hacking. Hackers have already proven that vulnerabilities in software can be dangerous for owners. Now that the S650 uses Fords Fully-Networked Vehicle (FNV) electrical architecture, it says that the need for cybersecurity is paramount.

On top of that, Ford plans to offer the most tailored experience ever to new Mustang owners and it wants to ensure that any personal user data stored in the cars memory is kept safe and secure. The result of that intention is a car that could limit functions if it experiences what the software sees as a break in authentication from a third party.

NO To Unauthorized Tuners

At the same time, Ford has worked with aftermarket tuners in many different instances over the years. And while we expect that same spirit of collaboration to continue, when asked by Musclecarsandtrucks if just any 3rd party would be able to tune the S650s new engines, Krenz responded with a resounding NO.

There are new requirements within the software. Regulatory driven. That is going to restrict access to aftermarket tunes. This is cross OEM, which has to do with CAN message authentication, Krenz explained.

It is likely that we will continue to make available tunes for the ECUs, he added. There will be tunes, both Ford and outside of Ford. But youll probably see a reduced variety of them, based on constraints that cyber security, CAN message authentication, and all of that put into the software.

What that means is that youll only be able to get a performance upgrades for your new 5.0-liter Coyote V8 or revised 2.3-liter turbocharged four pot from the Blue Opels trusted tuners / partners and no one else. Its never fun to lose access to customization but theres no doubt that hacking of modern cars is a credible threat.

Go here to read the rest:
Ford Wont Give Unauthorized Tuners Access To The 2024 Mustang S650 - CarScoops

10 Biggest Data Breaches Ever – And How to Prevent Them – Techopedia

Data breaches. The term itself can ring alarm bells in most organizations, and for good reason. A data breach usually means thousands spent on remedial measures, millions in regulatory fines and the invaluable loss of customers' trust and confidence. (Also read: Massive Data Breaches: The Truth You Might Not Know About.)

There have been numerous data breaches in modern times, forcing other organizations to undertake adequate data privacy and protection measures.

Here are the top 10 such breaches, and how to keep your organization from landing on a list like this:

There's really no other way to start a list of the biggest data breaches ever than with the 2013 Yahoo breach, which affected almost three billion users.

The breach's impact was a rapid $350 million reduction in Yahoo's market value -- while they were in the middle of a Verizon acquisition. The cyberattack's perpetrators were never identified, but Yahoo issued a statement asserting it believed "state-sponsored actors" may have been responsible.

Almost all Yahoo users' real names, email addresses, dates of birth, telephone numbers, authentication questions and other sensitive information was leaked in what is still considered the biggest data breach of all time.

Nearly a billion records were compromised when the First American Financial Corporation faced a data breach that led to bank account numbers, mortgage and tax records, social security numbers, wire transfer receipts and bond transaction receipts being compromised.

What sets this breach apart from the rest on this list is that it wasn't a breach in the traditional sense of the word. Rather than hackers breaking into the databases, the First American Financial Corporation failed to implement a secure authentication protocol which meant no one had to prove their identity to view the aforementioned documents. Once they accessed the documents, hackers used Advanced Persistent Bots (APBs) to collect, catalog and copy all data they had access to.

This glaring error went unnoticed for years. The New York State Department Financial Services (NYDFS) claimed the First American Financial Corporation did very little to ensure it had appropriate security measures to protect its critical data.

Marriott is not a typical digital service provider, which sets it apart from some of the other names on this list. However, the international hotel chain suffered a breach in 2018 that affected more than 500 million users.

The affected users' contact information, passport numbers, travel history, credit card information, social security details and Starwood Preferred Guest numbers were among the sensitive data that was breached.

Marriott faced a PR catastrophe, as it was slapped with a $24 million fine in the UK, hundreds of class action lawsuits and calls for its senior management to resign.

Following an internal audit, Marriott's use of outdated encryption protocols to store and secure its databases was the primary cause of the breach. The audit concluded the breach was carried out using a Remote Access Trojan (RAT) and Mimikatz. (Also read: Encryption Just Isn't Enough: Critical Truths About Data Security.)

MySpace may not have been as popular as some of the other social networking sites in 2016, but it wasn't any less shocking when the company announced to its users that their old information may be available for sale online -- or, more accurately, that it had been up for sale online for at least three months.

Time Inc., which acquired MySpace, reported a data breach had left 360 million accounts compromised, with their usernames and passwords available to be used to access users' information on other sites. The hackers behind the data breach were thought to be responsible for similar data breaches at Tumblr and LinkedIn.

When Adult FriendFinder suffered a data breach, there was absolute pandemonium all around. This was owed to the nature of the data breach, with information about users' casual hookups and other adult content being made public.

More than 400 users' the names, email addresses, passwords, pictures and other personal details were leaked online and freely available on leaksource.com. The databases compromised had 20 years' worth of information, with the users' credentials also available online. The site's use of SHA-1 hashing algorithm -- a fragile protocol by modern standards -- was the primary reason the database was so easily breached.

How a company the size of Twitter managed to commit such a gaffe will forever remain a mystery. In May 2018, the company sent an email to its 330 million users urging them to change their passwords, since some of them passwords had been stored on its internal computer system in readable text format.

Twitter reassured its users that the glitch had been identified before any data breach, so none of their information had been compromised. However, a 2010 Federal Trade Commission inquiry revealed that there had been at least two data breaches at Twitter where users' private data had been compromised due to lapses in Twitter's security protocols. (Also read: Uncovering Security Breaches.)

Compared to some others on this list, the Equifax data breach is fairly mild. However, the fact that the organization had to spend upwards of $700 million in remedial measures to help affected users made it a cautionary tale for other organizations.

Approximately 150 million users had their social security numbers, dates of birth, home addresses, driver's license numbers and credit card information stolen. The people responsible for the breach were never identified, even after lengthy congressional inquiries.

The inquiries did discover, however, that a vulnerability within the Equifax website had been exploited for months by those responsible for the breach. Other inadequate measures, such as the lack of database system segmentation, made the attacks even easier to carry out.

Facebook was already facing a public relations nightmare in 2019 over its less-than-adequate data protection practices when news of the 2019 breach broke. It was, and remains, the most significant breach in the company's history, affecting up to 540 million users globally. The perpetrators were never identified or caught, but it did reveal just how vulnerable Facebook's databases were.

How did it happen? Facebook had failed to adequately protect its global databases with the appropriate levels of encryption, and these databases were easily searchable online as a result. Users' phone numbers, genders and geolocation in the United Kingdom, United States and Vietnam databases were particularly vulnerable. This is precisely why it proved impossible to identify the perpetrators, since the databases were literally available via a simple Google search with no appropriate security measures to protect them.

The eBay breach came a few months after the Yahoo breach, with similar cases of compromised user data. While the 145 affected users (by some estimates) comes nowhere near Yahoo's numbers, the impact was not any less severe. Internal investigations revealed three of eBay's employees had been socially engineered, and their compromised credentials were used to gain access to the main eBay database. (Also read: Insider Threat Awareness: Avoiding Internal Security Breaches.)

The company informed all affected users and advised them to change their passwords, since attackers had accessed encrypted passwords as well. This led to New York's Attorney General calling on eBay to provide free credit monitoring services to users, which the company refused, citing a lack of financial fraud.

One of the most recent major data breaches, what makes the SolarWinds data breach so notorious is that there still isn't a reliable number of how many records may have been compromised. However, more than 18,000 organizations and government agencies globally are said to have been affected. The United States Attorney General at the time stated that the attack may have been Russian-backed.

The attackers got insider access to SolarWinds update packages and placed malware into the next scheduled update. These updates contained the necessary e-signatures, so whichever networks accepted the updates were compromised. The hidden malware spread throughout the entire SolarWinds supply chain, with at least 50 United States government agencies facing a "grave impact" since the attackers gained a foothold within their networks.

The aforementioned list should be reason enough for most organizations to consider a robust data protection and governance framework that can minimize the chance of a data breach occurring.

Here are five some steps most organizations can undertake to do so:

By far, the most fundamental measure an organization can take to minimize the risk of a data breach is to limit the number of people who have access to the data in the first place -- which is known as access governance. Theres no shortage of effective solutions that can help organizations address this issue.

For example, Securitis access intelligence via its Unified Data Controls allows organizations to identify which employees need access to what data and grant it to them on a strictly "needs-based" basis while also keeping detailed records to help with future assessments if necessary.

This may seem rather obvious, but many organizations make the mistake of not appropriately training their employees about just how easily hackers may gain access to the company's databases by exploiting careless employee behavior online.

Regular workshops and training can educate your team on best practices to ensure they follow adequate security protocols online. This could also include anti-phishing training on adequately securing their footprint online via cybersecurity tools such as anti-virus software, VPNs or proxies like IPRoyal and Avast. (Also read: VPNs vs Proxies: What's Best for Business.)

Yet another example of a relatively minor mistake that can lead to significant damage: Far too often, hackers exploit glitches in the software.

If an organization does not update its software regularly, the glitch will likely be present for that entire duration and can be exploited more easily.

Often, organizations are too rattled and disorganized if they do find themselves victims of a data breach. It's worth mentioning that, if proper measures are taken in the immediate aftermath of a data breach, the impact of the breach can be drastically reduced.

You should have protocols in place that can give real-time insights into exactly what data was compromised, how the damage can be limited and the remedial measures most necessary.

Last, but probably the most important, is to know precisely how to leverage encryption to your benefit. Organizations that have an old-fashioned approach to encryption fail to maximize the security encryption has to offer.

With lattice-based encryption and quantum computing now gathering steam, organizations can afford to ensure the best possible protection for all their data. Doing so guarantees that, if all else fails, your data is so well-protected that hackers gain nothing by breaking into the company's internal database.

Data breaches can happen to anyone -- even the largest, most well-established organizations. And often, they're the result of simple, easily solvable data management mistakes. By implementing proper data breach prevention practices beforehand, you can drastically reduce the likelihood of your organization suffering a data breach and recover more efficiently in the worst-case scenario. (Also read: What Is an Air Gap Backup and Why Do You Need One?)

Here is the original post:
10 Biggest Data Breaches Ever - And How to Prevent Them - Techopedia

NocoDB takes on Airtable with open source no-code platform that connects to production databases – TechCrunch

A new company is setting out to challenge Airtable, the 10-year-old company recently valued at a whopping $11 billion, with a slightly different take on what it means to be a no-code database platform.

NocoDB is one of a number of startups to emerge on the scene with plans to usurp the mighty Airtable, with an open source foundation serving as a core selling point. While NocoDB works in a similar fashion in terms of allowing non-technical users to create fresh databases, its twist is that it also works directly on live production data that resides in databases such as Postrgres, MySQL or MariaDB, or data warehouses, and turns them into what it calls a smart spreadsheet.

This allows anyone to leverage legacy databases without needing ITs input no SQL queries or code required. Its all about enabling business, finance or even marketing teams to connect to live data and collaborate with developers to build no-code applications.

U.K.-based founder and CEO Naveen Rudrappa claims that the core open source project has already been used by more than 2,000 companies, including behemoths such as Google, Walmart, American Express and McAfee.

The adoption weve seen has been really unprecedented weve had 7 million Docker downloads within one year of launch and more than 30,000 GitHub stars, putting us amongst the top 350 open source projects in the world, Rudrappa told TechCrunch.

NocoDB: Grid view. Image Credits: NocoDB

A little more than a year on from its inception, the company is announcing a sizeable seed funding round from a veritable whos who from the angel investment world.

The funding has in fact dripped in over a couple of tranches since its incorporation in June last year, but in total the round amounts to around $10.5 million, with institutional backers including Decibel, OSS Capital, Uncorrelated Ventures and Together.fund. The angel side, meanwhile, includes YouTube co-founder Chad Hurley; WordPress creator Matt Mullenweg; RedHat co-founder Bob Young; early Google investor Ram Shriram; and founders from Cloudera, CockroachDB, PipeDream, Talend, AngelList, BrightRoll and Freshworks.

The genesis of NocoDB can be traced back to 2017, when Rudrappa was working on a related open source database passion project under a different name, one that was purely a backend with no user interface at all. The problem he was trying to solve involved creating APIs to access a MySQL database of U.K. real estate data something that wasnt easy to achieve.

I realized that the fundamental problem of making a database API-accessible still remained unsolved, Rudrappa said. So, I built a prototype, released it on GitHub, and the next morning woke up to see a thousand GitHub stars for my project. The problem was much more widespread than I had imagined and my initial prototype had struck a chord with the users. This hobby project received a quarter of a million downloads, then I decided to team up with a friend and started building NocoDB.

When NocoDB arrived on GitHub last year, Rudrappa said that it garnered more than a million downloads within the first 10 weeks.

Live production data stores, like MySQL or Snowflake, are intimidating for business users, or even to developers who arent used to working with the backend tech stack, he said. But they need access to this data in order to build useful applications quickly. NocoDB makes it possible to connect any organizational data source to the universally well-understood spreadsheet interface, allowing users with zero coding experience to build workflows and automations that work in concert with real business data.

With $10.5 million in the bank, and the support of some of the biggest names from the technology sphere, NocoDB is well-positioned to build out a commercial component to the main open source project. This includes a new premium incarnation thats currently in private beta, one that allows companies to connect to Oracle Database and Snowflake.

This commercial version is a request from the customer side, as they need a working contract with us when they use the software, Rudrappa explained. Enterprise customers need different support, and we want to accommodate that while also balancing the needs of our open source community.

On top of that, NocoDB is also working on a managed and hosted cloud version, replete with enterprise-grade features including connectors, single sign-on (SSO), access control, auditing and more.

Go here to see the original:

NocoDB takes on Airtable with open source no-code platform that connects to production databases - TechCrunch

Microsoft’s GitHub Copilot AI is making rapid progress. Here’s how its human leader thinks about it – CNBC

Earlier this year, LinkedIn co-founder and venture capitalist Reid Hoffman issued a warning mixed with amazement about AI. "There is literally magic happening," said Hoffman, speaking to technology executives across sectors of the economy.

Some of that magic is becoming more apparent in creative spaces, like the visual arts, and the idea of "generative technology" has captured the attention of Silicon Valley. AI has even recently won awards at art exhibitions.

But Hoffman's message was squarely aimed at executives.

"AI will transform all industries," Hoffman told the members of the CNBC Technology Executive Council. "So everyone has to be thinking about it, not just in data science."

The rapid advances being made by Copilot AI, the automated code writing tool from the GitHub open source subsidiary of Microsoft, were an example Hoffman, who is on the Microsoft board, directly cited as a signal that all firms better be prepared for AI in their world. Even if not making big investments today in AI, business leaders must understand the pace of improvement in artificial intelligence and the applications that are coming or they will be "sacrificing the future," he said.

"100,000 developers took 35% of the coding suggestions from Copilot," Hoffman said. "That's a 35% increase in productivity, and off last year's model. ... Across everything we are doing, we will have amplifying tools, it will get there over the next three to 10 years, a baseline for everything we are doing," he added.

Copilot has already added another 5% to the 35% cited by Hoffman. GitHub CEO Thomas Dohmke recently told us that Copilot is now handling up to 40% of coding among programmers using the AI in the beta testing period over the past year. Put another way, for every 100 lines of code, 40 are being written by the AI, with total project time cut by up to 55%.

Copilot, trained on massive amounts of open source code, monitors the code being written by a developer and works as an assistant, taking the input from the developer and making suggestions about the next line of code, often multi-line coding suggestions, often "boilerplate" code that is needed but is a waste of time for a human to recreate. We all have some experience with this form of AI now, in places like our email, with both Microsoft and Google mail programs suggesting the next few words we might want to type.

AI can be logical about what may come next in a string of text. But Dohmke said, "It can't do more, it can't capture the meaning of what you want to say."

Whether a company is a supermarket working on checkout technology or a banking company working on customer experience in an app, they are all effectively becoming software companies, all building software, and once a C-suite has developers it needs to be looking at developer productivity and how to continuously improve it.

That's where the 40 lines of code come in. "After a year of Copilot, about 40% of code was written by the AI where Copilot was enabled," Dohmke said. "And if you show that number to executives, it's mind-blowing to them. ... doing the math on how much they are spending on developers."

With the projects being completed in less than half the time, a logical conclusion is that there will be less work to do for humans. But Dohmke says another way of looking at the software developer job is that they do many more high-value tasks than just rewrite code that already exists in the world. "The definition of 'higher value' work is to take away the boiler-plate menial work writing things already done over and over again," he said.

The goal of Copilot is to help developers "stay in the flow" when they are on the task of coding. That's because some of the time spent writing code is really spent looking for existing code to plug in from browsers, "snippets from someone else," Dohmke said. And that can lead coders to get distracted. "Eventually they are back in editor mode and copy and paste a solution, but have to remember what they were working on," he said. "It's like a surfer on a wave in the water and they need to find the next wave. Copilot is keeping them in the editing environment, in the creative environment and suggesting ideas," Dohmke said. "And if the idea doesn't work, you can reject it, or find the closest one and can always edit," he added.

The GitHub CEO expects more of those Copilot code suggestions to be taken in the next five years, up to 80%. Unlike a lot going on in the computer field, Dohmke said of that forecast, "It's not an exact science ... but we think it will tremendously grow."

After being in the market for a year, he said new models are getting better fast. As developers reject some code suggestions from Copilot, the AI learns. And as more developers adopt Copilot it gets smarter by interacting with developers similar to a new coworker, learning from what is accepted or rejected. New models of the AI don't come out every day, but every time a new model is available, "we might have a leap," he said.

But the AI is still far short of replacing humans. "Copilot today can't do 100% of the task," Dohmke said. "It's not sentient. It can't create itself without user input."

With Copilot still in private beta testing among individual developers 400,000 developer signed up to use the AI in the first months it was available and hundreds of thousands of more developers since GitHub has not announced any enterprise clients, but it expects to begin naming business customers before the end of the year. There is no enterprise pricing information being disclosed yet, but in the beta test Copilot pricing has been set at a flat rate per developer $10 per individual per month or $100 annually, often expensed by developers on company cards. "And you can imagine what they earn per month so it's a marginal cost," Dohmke said. "If you look at the 40% and think of the productivity improvement, and take 40% of opex spend on developers, the $10 is not a relevant cost. ... I have 1,000 developers and it's way more money than 1000 x 10," he said.

The GitHub CEO sees what is taking place now with AI as the next logical phase of the productivity advances in a coding world he has been a part of since the late 1980s. That was a time when coding was emerging out of the punch card phase, and there was no internet, and coders like Dohmke had to buy books and magazines, and join computer clubs to gain information. "I had to wait to meet someone to ask questions," he recalled.

That was the first phase of developer productivity, and then came the internet, and now open source, allowing developers to find other developers on the internet who had already "developed the wheel," he said.

Now, whether the coding task is related to payment processing or a social media login, most companies whether startups or established enterprises put in open source code. "There is a huge dependency tree of open source that already exists," Dohmke said.

It's not uncommon for up to 90% of code on mobile phone apps to be pulled from the internet and open source platforms like GitHub. In a coding era of "whatever else is already available," that's not what will differentiate a developer or app.

"AI is just the third wave of this," Dohmke said. "From punch cards to building everything ourselves to open source, to now withina lot of code, AI writing more," he said. "With 40%, soon enough if AI spreads across industries, the innovation on the phone will be created with the help of AI and the developer."

Today, and into the foreseeable future, Copilot remains a technology that is trained on code, and is making proposals based on looking things up in a library of code. It is not inventing any new algorithms, but at the current pace of progress, eventually, "it is entirely possible that with help of a developer it will create new ideas of source code,," Dohmke said.

But even that still requires a human touch. "Copilot is getting closer, but it will always need developers to create innovation," he said.

See the rest here:

Microsoft's GitHub Copilot AI is making rapid progress. Here's how its human leader thinks about it - CNBC