Friday, September 14, 2018

Would this be an act of war?
Ever since the forced bankruptcy of the investment bank Lehman Brothers triggered the financial crisis 10 years ago, regulators, risk managers, and central bankers around the globe have focused on shoring up banks’ ability to withstand financial shocks.
But the next crisis might not come from a financial shock at all. The more likely culprit: a cyber attack that causes disruptions to financial services capabilities, especially payments systems, around the world.




This should make the Computer Security manager the CEO’s best friend!
One-Third of Data Breaches Led to People Losing Jobs: Kaspersky
Nearly one-third of data breaches suffered by companies around the world have resulted in someone losing their job, according to a study conducted earlier this year by Kaspersky Lab.
The cybersecurity firm has interviewed nearly 6,000 people across 29 countries for its annual Global Corporate IT Security Risks Survey. Respondents worked for companies of various sizes, including small businesses with less than 50 employees and major corporations with over 1,000 workers.
The study found that, globally, 31% of incidents led to employees being laid off. China was the country with the highest percentage of senior IT security staff being laid off as a result of a data breach. People holding a senior IT role lost their job in roughly one-third of cases, with similar percentages across the globe.
Kaspersky’s survey shows a significant difference in the chances of C-level executives and presidents losing their job over a data breach in various parts of the world. In North America, for instance, 32% of CEOs and other C-level managers were laid off following a data breach – this is the region where the C-suite is most likely to lose its job.
Companies in China, APAC and North America are also most likely to have problems with attracting new customers following a data breach, according to Kaspersky’s report.




Perspective.
Cyber attacks cost German industry almost $50 billion: study
Two thirds of Germany’s manufacturers have been hit by cyber-crime attacks, costing industry in Europe’s largest economy some 43 billion euros ($50 billion), according to a survey published by Germany’s IT sector association on Thursday.




Catch up to Colorado.
Report: Kansas Plans to Spend $4.6M on Election Security
The U.S. Election Assistance Commission released the Kansas plan for its share of the $380 million allocated by Congress to strengthen voting systems amid ongoing threats from Russia and others. Nearly all the other states had released plans for their election security grants last month, but Kansas had gotten an extension to turn in its report.
Nearly $1.07 million has been budgeted to ensure every voting machine in Kansas has a verifiable paper audit trail, according to the budget breakdown. The majority of counties in the state already have a paper-based system, Kobach said.




How would the government prove I knew the password to a device? (Easy to see how they would make the assumption if it was my phone.)
Orin S. Kerr, Compelled Decryption and the Privilege Against Self-Incrimination, forthcoming in the Texas Law Review, available at SSRN: https://ssrn.com/abstract=3248286.
Abstract:
This essay considers the Fifth Amendment barrier to orders compelling a suspect to enter in a password to decrypt a locked phone, computer, or file. It argues that a simple rule should apply: An assertion of privilege should be sustained unless the government can independently show that the suspect knows the password. The act of entering in a password is testimonial, but the only implied statement is that the suspect knows the password. When the government can prove this fact independently, the assertion is a foregone conclusion and the Fifth Amendment poses no bar to the enforcement of the order. This rule is both doctrinally correct and sensible policy. It properly reflects the distribution of government power in a digital age when nearly everyone is carrying a device that comes with an extraordinarily powerful lock.
Orin had tweeted that he would welcome feedback on the article, particularly critical ones from techies.




Perspective.
The State of the Digital Workplace 2018




Perspective. (Denver doesn’t look good on their graphic)
Buried under bodies
… Over a five-year period, each detective in Detroit has been tasked with solving an average of about eight new slayings annually — a caseload exceeding what policing experts say should be no more than five homicides per detective, per year.
Major police departments that are successful at making arrests in homicides generally assign detectives fewer than five cases annually, according to a Washington Post analysis of homicide caseloads in 48 cities, including Detroit.
The Post study found that departments with lower caseloads tended to have higher arrest rates, while departments with higher caseloads tended to have lower arrest rates — 39 of the 48 departments fell within that pattern.




This could be a game changer, but how does it know what you intended the program to do?
Facebook’s new ‘SapFix’ AI automatically debugs your code
Facebook has quietly built and deployed an artificial intelligence programming tool called SapFix that scans code, automatically identifies bugs, tests different patches and suggests the best ones that engineers can choose to implement. Revealed today at Facebook’s @Scale engineering conference, SapFix is already running on Facebook’s massive code base and the company plans to eventually share it with the developer community.


(Related) Soon, computers will do the programming based on vague requirements.
Microsoft acquires AI startup Lobe to help people make deep learning models without code
Microsoft today announced it has acquired Lobe, creator of a platform for building custom deep learning models using a visual interface that requires no code or technical understanding of AI. Lobe, a platform that can understand hand gestures, read handwriting, and hear music, will continue to develop as a standalone service, according to the company’s website.




I might find a use for this.
Voicepods - Automatically Turn Text Into Voice Recordings
Voicepods is a neat service that will create voice recordings based on the text that you write. Voicepods offers eight voices in which you can have your text read-aloud. The voice recording that is generated from your text can be listened to online and you can download it as an MP3 to use wherever MP3 playback is supported. Watch my video that is embedded below to learn how easy it is to make a voice recording on Voicepods.




Something to listen to?
Agility in the Age of the Cloud
September 14, 2018 Runtime 0:57:19
In this webinar, you’ll learn:
  • How we will all have to react in real time to ever-richer data flows
  • How the cloud can help to break down data and organizational silos
  • The potential impacts of cloud-based collaboration on product development and innovation
  • Which ethical questions the cloud creates, and how to think about them


No comments: