Would this be an act of war?
Ever since the forced bankruptcy of the investment
bank Lehman Brothers triggered the financial crisis 10 years ago,
regulators, risk managers, and central bankers around the globe have
focused on shoring up banks’ ability to withstand financial shocks.
But the next crisis might not come from a
financial shock at all. The more likely culprit: a cyber attack that
causes disruptions to financial services capabilities, especially
payments systems, around the world.
This should make the Computer Security manager the
CEO’s best friend!
One-Third
of Data Breaches Led to People Losing Jobs: Kaspersky
Nearly
one-third of data breaches suffered by companies around the world
have resulted in someone losing their job, according to a study
conducted earlier this year by Kaspersky Lab.
The
cybersecurity firm has interviewed nearly 6,000 people across 29
countries for its annual Global Corporate IT Security Risks Survey.
Respondents worked for companies of various sizes, including small
businesses with less than 50 employees and major corporations with
over 1,000 workers.
The
study found that, globally, 31% of incidents led to employees being
laid off. China was the country with the highest percentage of
senior IT security staff being laid off as a result of a data breach.
People holding a senior IT role lost their job in roughly one-third
of cases, with similar percentages across the globe.
Kaspersky’s
survey shows a significant difference in the chances of C-level
executives and presidents losing their job over a data breach in
various parts of the world. In
North America, for instance, 32% of CEOs and other C-level managers
were laid off following a data breach – this is the
region where the C-suite is most likely to lose its job.
… Companies
in China, APAC and North America are also most likely to have
problems with attracting new customers following a data breach,
according to Kaspersky’s
report.
Perspective.
Cyber
attacks cost German industry almost $50 billion: study
Two thirds of Germany’s manufacturers have been
hit by cyber-crime attacks, costing industry in Europe’s largest
economy some 43 billion euros ($50 billion), according to a survey
published by Germany’s IT sector association on Thursday.
Catch up to Colorado.
Report:
Kansas Plans to Spend $4.6M on Election Security
The U.S. Election Assistance Commission released
the Kansas plan for its share of the $380 million allocated by
Congress to strengthen voting systems amid ongoing threats from
Russia and others. Nearly all the other states had released plans
for their election security grants last month, but Kansas had gotten
an extension to turn in its report.
… Nearly
$1.07 million has been budgeted to ensure every voting machine in
Kansas has a verifiable paper audit trail, according to the budget
breakdown. The majority of counties in the state already have a
paper-based system, Kobach said.
How
would the government prove I knew the password to a
device? (Easy to see how they would make the assumption if it was my
phone.)
Orin S. Kerr, Compelled
Decryption and the Privilege Against Self-Incrimination,
forthcoming in the Texas Law Review, available at SSRN:
https://ssrn.com/abstract=3248286.
Abstract:
This essay considers the Fifth Amendment barrier to orders compelling a suspect to enter in a password to decrypt a locked phone, computer, or file. It argues that a simple rule should apply: An assertion of privilege should be sustained unless the government can independently show that the suspect knows the password. The act of entering in a password is testimonial, but the only implied statement is that the suspect knows the password. When the government can prove this fact independently, the assertion is a foregone conclusion and the Fifth Amendment poses no bar to the enforcement of the order. This rule is both doctrinally correct and sensible policy. It properly reflects the distribution of government power in a digital age when nearly everyone is carrying a device that comes with an extraordinarily powerful lock.
Orin had tweeted that he would welcome feedback on
the article, particularly critical ones from techies.
Perspective.
The State
of the Digital Workplace 2018
Perspective. (Denver doesn’t look good on their
graphic)
Buried
under bodies
… Over a five-year period, each detective in
Detroit has been tasked with solving an average of about eight new
slayings annually — a caseload exceeding what policing experts say
should be no more than five homicides per detective, per year.
Major police departments that are successful at
making arrests in homicides generally assign detectives fewer than
five cases annually, according to a Washington Post analysis of
homicide caseloads in 48 cities, including Detroit.
The Post study found that departments with lower
caseloads tended to have higher arrest rates, while departments with
higher caseloads tended to have lower arrest rates — 39 of the 48
departments fell within that pattern.
This could be a game changer, but how does it know
what you intended the program to do?
Facebook’s
new ‘SapFix’ AI automatically debugs your code
Facebook
has quietly built and deployed an artificial intelligence
programming tool called SapFix that scans code, automatically
identifies bugs, tests different patches and suggests the best ones
that engineers can choose to implement. Revealed
today at Facebook’s @Scale engineering conference, SapFix is
already running on Facebook’s massive code base and the
company plans to eventually share it with the developer community.
(Related) Soon, computers will do the programming
based on vague requirements.
Microsoft
acquires AI startup Lobe to help people make deep learning models
without code
Microsoft today announced it has acquired Lobe,
creator of a platform for building custom deep learning models using
a visual interface that requires no code or technical understanding
of AI. Lobe, a platform that can
understand hand gestures, read handwriting, and hear
music, will continue to develop as a standalone service, according to
the company’s website.
I might find a use for this.
Voicepods -
Automatically Turn Text Into Voice Recordings
Voicepods
is a neat service that will create voice recordings based on the text
that you write. Voicepods offers eight voices in which you can have
your text read-aloud. The voice recording that is generated from
your text can be listened to online and you can download it as an MP3
to use wherever MP3 playback is supported. Watch
my video that is embedded below to learn how easy it is to make a
voice recording on Voicepods.
Something to listen to?
Agility in
the Age of the Cloud
September 14, 2018 Runtime 0:57:19
In this webinar, you’ll learn:
-
How we will all have to react in real time to ever-richer data flows
-
How the cloud can help to break down data and organizational silos
-
The potential impacts of cloud-based collaboration on product development and innovation
-
Which ethical questions the cloud creates, and how to think about them
No comments:
Post a Comment