s:

Forget Whitelists and Blacklists: Go for 'Allow' or 'Deny'

Terminology Shift Announced by Britain's National Cyber Security Center
Forget "whitelists" and "blacklists" in cybersecurity. So recommends Britain's National Cyber Security Center, in a bid to move beyond the racial connotations inherent to the terminology. Henceforth, NCSC - part of intelligence agency GCHQ - will use the terms "allow list" and "deny list." Will others follow?




s:

Analysis: Ransomware's Costly Impact

The latest edition of the ISMG Security Report analyzes the rising costs of ransomware attacks and the latest victims. Also featured: An assessment of Australia's new contact-tracing app designed to help battle the spread of COVID-19, and a discussion of applying the "zero trust" model to the remote workforce.




s:

Analysis: The Contact-Tracing Conundrum

The latest edition of the ISMG Security Report analyzes the many challenges involved in developing and implementing contact-tracing apps to help in the battle against COVID-19. Also featured: A discussion of emerging privacy issues and a report on why account takeover fraud losses are growing.




s:

Hackers Try to Sell 26 Million Breached Records: Report

Data Apparently Obtained From Three Breaches, ZeroFox Reports
Hackers are attempting to sell a fresh trove of approximately 26 million user records apparently obtained from three data breaches, according to researchers at the security firm ZeroFox.




s:

Digital Contact-Tracing Apps: Hype or Helpful?

Australia, India and UK Pursuing Centralized Approach Many Privacy Experts Warn Against
Technology is no panacea, including for combating COVID-19. While that might sound obvious, it's worth repeating because some governments continue to hype contact-tracing apps. Such apps won't magically identify every potential exposure. But they could make manual contact-tracing programs more effective.




s:

Forget Whitelists and Blacklists: Go for 'Allow' or 'Deny'

Terminology Shift Announced by Britain's National Cyber Security Center
Forget "whitelists" and "blacklists" in cybersecurity. So recommends Britain's National Cyber Security Center, in a bid to move beyond the racial connotations inherent to the terminology. Henceforth, NCSC - part of intelligence agency GCHQ - will use the terms "allow list" and "deny list." Will others follow?




s:

Analysis: COVID-19 Contact-Tracing Privacy Issues

The latest edition of the ISMG Security Report analyzes the privacy issues raised by COVID-19 contact-tracing apps. Also featured: An update on efforts to fight fraud tied to economic stimulus payments; John Kindervag on the origins of "zero trust."




s:

Analysis: Ransomware's Costly Impact

The latest edition of the ISMG Security Report analyzes the rising costs of ransomware attacks and the latest victims. Also featured: An assessment of Australia's new contact-tracing app designed to help battle the spread of COVID-19, and a discussion of applying the "zero trust" model to the remote workforce.




s:

Analysis: The Contact-Tracing Conundrum

The latest edition of the ISMG Security Report analyzes the many challenges involved in developing and implementing contact-tracing apps to help in the battle against COVID-19. Also featured: A discussion of emerging privacy issues and a report on why account takeover fraud losses are growing.




s:

Hackers Try to Sell 26 Million Breached Records: Report

Data Apparently Obtained From Three Breaches, ZeroFox Reports
Hackers are attempting to sell a fresh trove of approximately 26 million user records apparently obtained from three data breaches, according to researchers at the security firm ZeroFox.




s:

Digital Contact-Tracing Apps: Hype or Helpful?

Australia, India and UK Pursuing Centralized Approach Many Privacy Experts Warn Against
Technology is no panacea, including for combating COVID-19. While that might sound obvious, it's worth repeating because some governments continue to hype contact-tracing apps. Such apps won't magically identify every potential exposure. But they could make manual contact-tracing programs more effective.




s:

Forget Whitelists and Blacklists: Go for 'Allow' or 'Deny'

Terminology Shift Announced by Britain's National Cyber Security Center
Forget "whitelists" and "blacklists" in cybersecurity. So recommends Britain's National Cyber Security Center, in a bid to move beyond the racial connotations inherent to the terminology. Henceforth, NCSC - part of intelligence agency GCHQ - will use the terms "allow list" and "deny list." Will others follow?




s:

Analysis: COVID-19 Contact-Tracing Privacy Issues

The latest edition of the ISMG Security Report analyzes the privacy issues raised by COVID-19 contact-tracing apps. Also featured: An update on efforts to fight fraud tied to economic stimulus payments; John Kindervag on the origins of "zero trust."




s:

Analysis: Ransomware's Costly Impact

The latest edition of the ISMG Security Report analyzes the rising costs of ransomware attacks and the latest victims. Also featured: An assessment of Australia's new contact-tracing app designed to help battle the spread of COVID-19, and a discussion of applying the "zero trust" model to the remote workforce.




s:

Analysis: The Contact-Tracing Conundrum

The latest edition of the ISMG Security Report analyzes the many challenges involved in developing and implementing contact-tracing apps to help in the battle against COVID-19. Also featured: A discussion of emerging privacy issues and a report on why account takeover fraud losses are growing.




s:

Digital Contact-Tracing Apps: Hype or Helpful?

Australia, India and UK Pursuing Centralized Approach Many Privacy Experts Warn Against
Technology is no panacea, including for combating COVID-19. While that might sound obvious, it's worth repeating because some governments continue to hype contact-tracing apps. Such apps won't magically identify every potential exposure. But they could make manual contact-tracing programs more effective.




s:

Forget Whitelists and Blacklists: Go for 'Allow' or 'Deny'

Terminology Shift Announced by Britain's National Cyber Security Center
Forget "whitelists" and "blacklists" in cybersecurity. So recommends Britain's National Cyber Security Center, in a bid to move beyond the racial connotations inherent to the terminology. Henceforth, NCSC - part of intelligence agency GCHQ - will use the terms "allow list" and "deny list." Will others follow?




s:

Analysis: Ransomware's Costly Impact

The latest edition of the ISMG Security Report analyzes the rising costs of ransomware attacks and the latest victims. Also featured: An assessment of Australia's new contact-tracing app designed to help battle the spread of COVID-19, and a discussion of applying the "zero trust" model to the remote workforce.




s:

Analysis: The Contact-Tracing Conundrum

The latest edition of the ISMG Security Report analyzes the many challenges involved in developing and implementing contact-tracing apps to help in the battle against COVID-19. Also featured: A discussion of emerging privacy issues and a report on why account takeover fraud losses are growing.




s:

Hackers Try to Sell 26 Million Breached Records: Report

Data Apparently Obtained From Three Breaches, ZeroFox Reports
Hackers are attempting to sell a fresh trove of approximately 26 million user records apparently obtained from three data breaches, according to researchers at the security firm ZeroFox.




s:

Digital Contact-Tracing Apps: Hype or Helpful?

Australia, India and UK Pursuing Centralized Approach Many Privacy Experts Warn Against
Technology is no panacea, including for combating COVID-19. While that might sound obvious, it's worth repeating because some governments continue to hype contact-tracing apps. Such apps won't magically identify every potential exposure. But they could make manual contact-tracing programs more effective.




s:

Forget Whitelists and Blacklists: Go for 'Allow' or 'Deny'

Terminology Shift Announced by Britain's National Cyber Security Center
Forget "whitelists" and "blacklists" in cybersecurity. So recommends Britain's National Cyber Security Center, in a bid to move beyond the racial connotations inherent to the terminology. Henceforth, NCSC - part of intelligence agency GCHQ - will use the terms "allow list" and "deny list." Will others follow?




s:

Analysis: Ransomware's Costly Impact

The latest edition of the ISMG Security Report analyzes the rising costs of ransomware attacks and the latest victims. Also featured: An assessment of Australia's new contact-tracing app designed to help battle the spread of COVID-19, and a discussion of applying the "zero trust" model to the remote workforce.




s:

Analysis: The Contact-Tracing Conundrum

The latest edition of the ISMG Security Report analyzes the many challenges involved in developing and implementing contact-tracing apps to help in the battle against COVID-19. Also featured: A discussion of emerging privacy issues and a report on why account takeover fraud losses are growing.




s:

Digital Contact-Tracing Apps: Hype or Helpful?

Australia, India and UK Pursuing Centralized Approach Many Privacy Experts Warn Against
Technology is no panacea, including for combating COVID-19. While that might sound obvious, it's worth repeating because some governments continue to hype contact-tracing apps. Such apps won't magically identify every potential exposure. But they could make manual contact-tracing programs more effective.




s:

Forget Whitelists and Blacklists: Go for 'Allow' or 'Deny'

Terminology Shift Announced by Britain's National Cyber Security Center
Forget "whitelists" and "blacklists" in cybersecurity. So recommends Britain's National Cyber Security Center, in a bid to move beyond the racial connotations inherent to the terminology. Henceforth, NCSC - part of intelligence agency GCHQ - will use the terms "allow list" and "deny list." Will others follow?




s:

Analysis: Ransomware's Costly Impact

The latest edition of the ISMG Security Report analyzes the rising costs of ransomware attacks and the latest victims. Also featured: An assessment of Australia's new contact-tracing app designed to help battle the spread of COVID-19, and a discussion of applying the "zero trust" model to the remote workforce.




s:

Analysis: The Contact-Tracing Conundrum

The latest edition of the ISMG Security Report analyzes the many challenges involved in developing and implementing contact-tracing apps to help in the battle against COVID-19. Also featured: A discussion of emerging privacy issues and a report on why account takeover fraud losses are growing.




s:

Hackers Try to Sell 26 Million Breached Records: Report

Data Apparently Obtained From Three Breaches, ZeroFox Reports
Hackers are attempting to sell a fresh trove of approximately 26 million user records apparently obtained from three data breaches, according to researchers at the security firm ZeroFox.




s:

Digital Contact-Tracing Apps: Hype or Helpful?

Australia, India and UK Pursuing Centralized Approach Many Privacy Experts Warn Against
Technology is no panacea, including for combating COVID-19. While that might sound obvious, it's worth repeating because some governments continue to hype contact-tracing apps. Such apps won't magically identify every potential exposure. But they could make manual contact-tracing programs more effective.




s:

Forget Whitelists and Blacklists: Go for 'Allow' or 'Deny'

Terminology Shift Announced by Britain's National Cyber Security Center
Forget "whitelists" and "blacklists" in cybersecurity. So recommends Britain's National Cyber Security Center, in a bid to move beyond the racial connotations inherent to the terminology. Henceforth, NCSC - part of intelligence agency GCHQ - will use the terms "allow list" and "deny list." Will others follow?




s:

Analysis: The Contact-Tracing Conundrum

The latest edition of the ISMG Security Report analyzes the many challenges involved in developing and implementing contact-tracing apps to help in the battle against COVID-19. Also featured: A discussion of emerging privacy issues and a report on why account takeover fraud losses are growing.




s:

Hackers Try to Sell 26 Million Breached Records: Report

Data Apparently Obtained From Three Breaches, ZeroFox Reports
Hackers are attempting to sell a fresh trove of approximately 26 million user records apparently obtained from three data breaches, according to researchers at the security firm ZeroFox.




s:

[Ticker] Coronavirus: Child sex-abuse content demand spikes

EU home affairs commissioner Ylva Johansson told MEPs that "the demand for child sexual abuse material has increased by up to 30 percent in some member states." Her comments were among a number of examples of criminal behavoir that has erupted since the pandemic outbreak. She said criminals also tried to cheat authorities out of €50m by selling them non-existent face masks.




s:

MEPs: Czech PM Babis can't be in budget talks

MEPs said the Czech PM should fully resolve the possible conflict of interest in a company that receives EU funds - or resign.




s:

Renewable Year-end Focus: Thailand

As the renewable energy market shifts and evolves each year, industry experts need to know where the next hot region will be in order to keep up with the changing tides.




s:

Renewable Year-end Focus: Poland

As the renewable energy market shifts and evolves each year, industry experts need to know where the next hot region will be in order to keep up with the changing tides.




s:

Perspectives: Let's Give Hydropower a Boost

Perspectives: Let's Give Hydropower a Boost




s:

Around the World in AI Days: NVIDIA’s Keith Strier Talks AI Nations

As NVIDIA’s vice president of worldwide AI initiatives, Keith Strier is thinking on a global scale. He leads an initiative called AI Nations, a worldwide program that helps government leaders and stakeholders develop plans to implement AI to advance national priorities and drive economic growth. Strier spoke to AI Podcast host Noah Kravitz about AI Read article >

The post Around the World in AI Days: NVIDIA’s Keith Strier Talks AI Nations appeared first on The Official NVIDIA Blog.




s:

Around the World in AI Days: NVIDIA’s Keith Strier Talks AI Nations

As NVIDIA’s vice president of worldwide AI initiatives, Keith Strier is thinking on a global scale. He leads an initiative called AI Nations, a worldwide program that helps government leaders and stakeholders develop plans to implement AI to advance national priorities and drive economic growth. Strier spoke to AI Podcast host Noah Kravitz about AI Read article >

The post Around the World in AI Days: NVIDIA’s Keith Strier Talks AI Nations appeared first on The Official NVIDIA Blog.




s:

Spotlight on Public Events: Microfinance as a Tool for Community Development

Spotlight on Public Events: Microfinance as a Tool for Community Development

EWC Changing Faces Women’s Leadership Program participant Kalpana Sankar, CEO of Hand in Hand in Tamil Nadu (India), speaking on microfinance initiatives.

 

Kathleen Stack, Vice President of Freedom from Hunger and a participant in EWC’s 2009 Changing Faces Women’s Leadership Program, speaking on her NGO’s microfinance projects.

 

 




s:

Spotlight on Seminars: Hong Kong Journalism Fellows Explore Post-Olympics China

Spotlight on Seminars: Hong Kong Journalism Fellows Explore Post-Olympics China

Hong Kong Journalism Fellows interview Tibetan monks at the Gedan Songzanlin Lamasery in Shangri-La, Yunnan, China.




s:

Spotlight on Publications: East-West Dialogue Discusses the U.S. Role in Fostering the ASEAN Economic Community

Spotlight on Publications: East-West Dialogue Discusses the U.S. Role in Fostering the ASEAN Economic Community

In the latest issue of the East-West Dialogue, How (and Why) the United States Should Help to Build the ASEAN Economic Community , EWC Senior Fellow Michael Plummer calls for ambitious new initiatives, leading to a U.S.-ASEAN Economic Space that would develop a framework for expanding FTAs and a U.S.-ASEAN Partnership Fund to deepen civic and cultural ties. These ideas are elaborated on in commentaries by Scot Marciel (U.S. Ambassador to ASEAN), Kishore Mahbubani (former Singaporean Ambassador to the UN), and Chalongphob Sussangkarn (former Thai Minister of Finance).




s:

Spotlight on Publications: Senior Policy Seminar 2008 Report

Spotlight on Publications: Senior Policy Seminar 2008 Report--Shifting Currents of U.S. and Asia Pacific Economics, Resources, and Security

Wendy Dobson (right), professor and director of the Institute for International Business at the University of Toronto, and EWC Senior Fellow Shabbir Cheema (far left) at the EWC Senior Policy Seminar 2008.




s:

Spotlight on Seminars: U.S. and Asian Muslim Journalists Explore Each Other’s Worlds

Spotlight on Seminars: U.S. and Asian Muslim Journalists Explore Each Other’s Worlds

 




s:

Spotlight on Seminars: Bangkok Media Conference 2008

Spotlight on Seminars: Bangkok Media Conference 2008

Fall 2007 Jefferson Fellows Johnny Brannon (Honolulu Advertiser), Dante Ramos (Boston Globe), and Christina Larson (Washington Monthly) interview Cambodians at a temple near Phnom Penh.

 

New Generation Seminar participant Kalolaine Moeaki of Tonga’s Ministry of Education (center) presents a gift to the principal (right) of Shanghai’s innovative South Dong Chang Middle School.

 




s:

Pakistan-U.S. Relations: Insights from the Field

Pakistani and American journalists discuss insights from their March 2013 Pakistan-U.S. Journalists Exchange study tours to each other's countries.




s:

MiFID II and Structured Deposits: New Duties for Banks

The European Commission (Commission) has contacted the European Securities and Markets Authority (ESMA) and, more recently, the European Banking Authority...




s:

New EU laws for marketing AIFs and UCITS: One step forward, one step back?

On 12 March 2018, the European Commission (the “Commission”) published legislative proposals for new rules on marketing AIFs and UCITS comprising: a Directive on the cross-border distribution of collective investment funds (COM(2018) 92...




s:

Hedge funds and UK management vehicles: a cheat-sheet for first-time managers

  The path to establishing a UK management entity for an offshore fund branches off in all manner of directions. One of the first crossroads faced by the first-time manager is the choice of UK management vehicle. Their decision has significan...