Why blockchain-based voting could threaten democracy

Credit to Author: Lucas Mearian| Date: Mon, 12 Aug 2019 03:00:00 -0700

Public tests of blockchain-based mobile voting are growing.

Even as there’s been an uptick in pilot projects, security experts warn that blockchain-based mobile voting technology is innately insecure and potentially a danger to democracy through “wholesale fraud” or “manipulation tactics.”

The topic of election security has been in the spotlight recently after Congress held classified briefings on U.S. cyber infrastructure to identify and defend against threats to the election system, especially after Russian interference was uncovered in the 2016 Presidential election.

To read this article in full, please click here

Read more

China Unicom: Zero operational interruptions through 24/7 services support

Credit to Author: Roger Casellas| Date: Tue, 30 Jul 2019 14:52:29 +0000

China has been at the forefront of many different industry technologies, such as artificial intelligence (AI), the internet of things (IoT), virtual reality (VR), and they are now advancing with… Read more »

The post China Unicom: Zero operational interruptions through 24/7 services support appeared first on Schneider Electric Blog.

Read more

Apple’s shock Siri surveillance demands a swift response

Credit to Author: Jonny Evans| Date: Mon, 29 Jul 2019 07:51:00 -0700

News that Siri records snippets of our conversations with the voice assistant isn’t new, but claims that those short recordings are listened to by human agents is– particularly in light of the company’s big push on privacy.

These are bad optics

I’m a passionate believer in the importance of privacy.

It isn’t only important in terms of preserving hard-won liberties and protecting public discourse, it’s also of growing importance across every part of human existence, for every school, medical facility or enterprise. History shows that the absence of privacy has a corrosive effect on society, turning family members against each other and dampening innovation.

To read this article in full, please click here

Read more

Microsoft beefs up OneDrive security

Credit to Author: Gregg Keizer| Date: Wed, 26 Jun 2019 11:49:00 -0700

Microsoft today announced changes to its OneDrive storage service that will let consumers protect some or even all of their cloud-stored documents with an additional layer of security.

The new feature – dubbed OneDrive Personal Vault – was trumpeted as a special protected partition of OneDrive where users could lock their “most sensitive and important files.” They would access that area only after a second step of identity verification, ranging from a fingerprint or face scan to a self-made PIN, a one-time code texted to the user’s smartphone or the use of the Microsoft Authenticator mobile app. (The process is often labeled as two-factor security to differentiate it from the username/password that typically secures an account.)

To read this article in full, please click here

Read more

Attacking Containers and runC

Credit to Author: Mark Nunnikhoven (Vice President, Cloud Research)| Date: Tue, 12 Feb 2019 19:22:35 +0000

This week a new vulnerability was published (CVE-2019-5736) that highlights everything bad and good about containers. Simply put, this vulnerability can be exploited using an infected container to attack the host. It’s a real world example of a breakout attack that has long been a major concern in virtualized and container environment. Here, the attack…

The post Attacking Containers and runC appeared first on .

Read more

Start-up Devvio claims its blockchain can handle 8M transactions a second

Credit to Author: Lucas Mearian| Date: Thu, 17 Jan 2019 03:00:00 -0800

A start-up firm claims its highly efficient distributed ledger protocol can address all the major problems facing blockchain networks, including being able to scale for global financial business by executing up to eight million transactions per second (TPS).

The new blockchain protocol, called Devv, was unveiled and demonstrated at CES in Las Vegas last week.

If the claims prove true, Devv would be able to compete with traditional financial networks in terms of scalability, be far less expensive to use and would address fraud, theft and privacy issues. Like many blockchain protocols, Devv is not just a peer-to-peer (P2P) database technology but also a digital currency or cryptocurrency called Devcash.

To read this article in full, please click here

Read more

Ways to Improve Your Data Center Cybersecurity That Most People Don’t Think of Until It’s Too Late

Credit to Author: Steven Carlini| Date: Wed, 16 Jan 2019 16:00:00 +0000

It’s been well publicized that Microsoft fends off more than 7 trillion cyberthreats per day, and allocates over $1 billion each year to cybersecurity for its cloud data centers. While… Read more »

The post Ways to Improve Your Data Center Cybersecurity That Most People Don’t Think of Until It’s Too Late appeared first on Schneider Electric Blog.

Read more

Top Five Technology Trends for 2019

Credit to Author: Guest Blogger| Date: Mon, 07 Jan 2019 19:42:38 +0000

Craig Resnick covers the PLC, PAC, HMI, OIT and Industrial PC markets as well as the Packaging, Plastics and Rubber Industries for ARC.  He is the primary analyst for many… Read more »

The post Top Five Technology Trends for 2019 appeared first on Schneider Electric Blog.

Read more

Top 4 enterprise tech trends to watch in 2019

Credit to Author: Michelle Davidson| Date: Mon, 07 Jan 2019 03:00:00 -0800

If 2018 was the year of the data breach, the thinking among IT pros is that this will be the year companies take concrete steps to prevent future breaches.

That was the sentiment among tech professionals who took part in a recent @IDGTechTalk Twitter chat about enterprise tech trends for 2019.

In fact, a recent @IDGTechTalk poll found privacy and security to be the top enterprise tech issue for 2019 (45 percent), followed by artificial intelligence (30 percent), cloud computing (16 percent), and blockchain (9 percent).

To read this article in full, please click here

Read more

In 2019, look for AI-enabled mobile devices – and a UEM push

Credit to Author: Lucas Mearian| Date: Mon, 07 Jan 2019 03:00:00 -0800

This year, artificial intelligence will continue its push into mobile hardware and enterprise communication devices, challenging IT shops’ enterprise mobility management (EMM) capabilities while at the same time offering potential security benefits.

To read this article in full, please click here

(Insider Story)

Read more