For my Computer Security managers. An ounce of prevention can save a
ton of repair costs.
Berlin’s
high court should rebuild computer system after Emotet infection,
report finds
Berlin’s
highest court should completely rebuild its computer infrastructure
after hackers ran roughshod through the network and likely stole data
in the process, according to a forensic report released Monday.
Poor
security controls allowed the attackers to install two
types of information-stealing malware last fall, said the study
conducted by an IT subsidiary of Deutsche Telekom and released by
German lawmakers investigating the incident.
“A
motivated attacker would have been able to use this network structure
to infect almost every device,” the report
states.
A
ransomware minimum?
Federal
agency offers guidelines for businesses defending against ransomware
attacks
The
National Institute of Standards and Technology (NIST) published draft
guidelines Monday providing businesses with ways to defend against
debilitating ransomware attacks.
The
two
draft practice guidelines to
help firms create strategies to protect data in the event of an
cyberattack.
Should
th US do less?
IoT
security: Your smart devices must have these three features to be
secure
Proposed
laws from the UK for Internet of Things security mean vendors will
need to follow new rules to be considered secure.
…
the
legislation would require that IoT devices sold in the UK must follow
three particular rules to be allowed to sell products in the UK.
They are:
- All consumer internet-connected device passwords must be unique and not resettable to any universal factory setting
- Manufacturers of consumer IoT devices must provide a public point of contact so anyone can report a vulnerability and it will be acted on in a timely manner
- Manufacturers of consumer IoT devices must explicitly state the minimum length of time that the device will receive security updates at the point of sale, either in store or online
Architecture for AI.
AI IS
DRIVING STORAGE DOWN NEW AVENUES
Storage systems are inherently data intensive. But
the rapid emergence of artificial intelligence as a standard
datacenter workload has storage vendors scrambling to design
platforms that better meet the more stringent performance needs of
these applications.
… Our recent conversation with Panasas storage
architect Curtis Anderson, shows how AI has is driving these designs
in new directions. The full interview filmed live at The Next HPC
Platform can be found below.
(Related)
Why Apple
And Microsoft Are Moving AI To The Edge
Artificial intelligence (AI) has traditionally
been deployed in the cloud, because AI algorithms crunch massive
amounts of data and consume massive computing resources. But AI
doesn’t only live in the cloud. In many situations, AI-based data
crunching and decisions need to be made locally, on devices that are
close to the edge of the network.
Another
look at ethics.
DAY ZERO
ETHICS FOR MILITARY AI
Examining
the legal, moral, and ethical implications of military artificial
intelligence (AI) poses a chicken-and-egg problem: Experts and
analysts have a general sense of the risks involved, but the broad
and constantly evolving nature of the technology provides
insufficient technical details to mitigate them all in advance.
Employing AI in the battlespace could create numerous ethical
dilemmas that we must begin to guard against today, but in many cases
the technology has not advanced sufficiently to present concrete,
solvable problems.
To
this end, 2019 was a bumper year for general military AI ethics. The
Defense Innovation Board released
its ethical military AI principles; the National Security
Commission on AI weighed in with its interim
report; the European Commission developed guidelines
for trustworthy AI; and the French Armed Forces produced
a white paper grappling with a national ethical approach.
General principles like these usefully frame the problem, but it is
technically difficult to operationalize “reliability” or
“equitability,” and assessing specific systems can present
ambiguity — especially near the end of development.
No comments:
Post a Comment