Showing posts with label security. Show all posts
Showing posts with label security. Show all posts

2019-06-13

CrowdStrike CEO George Kurtz on the $CRWD IPO 12 Jun 2019

CrowdStrike CEO George Kurtz on the company's IPO

George Kurtz, co-founder and CEO of CrowdStrike, discusses the cybersecurity company's IPO on the Nasdaq with CNBC's "Squawk Alley" team, June 12, 2019.

CrowdStrike, Inc. is a U.S.-based cybersecurity technology company, with headquarters in Sunnyvale, California, and a wholly owned subsidiary of CrowdStrike Holdings, Inc. The company provides endpoint security, threat intelligence, and incident response services to customers in more than 170 countries. Leveraging artificial intelligence (AI), the CrowdStrike Falcon® platform protects customers against cyberattacks on endpoints on or off the network by offering visibility and protection across the enterprise.
  • Domain: crowdstrike.com
  • Founded: 2011
  • Parent organization: CrowdStrike
  • CTO: Dmitri Alperovitch
  • Founders: George Kurtz, Dmitri Alperovitch, Gregg Marston
CrowdStrike Holdings, Inc. (NASDAQ: CRWD), announced June 11, 2019, the pricing of its initial public offering of 18,000,000 shares of its Class A common stock at a price to the public of $34.00 per share. CrowdStrike granted the underwriters a 30-day option to purchase up to 2,700,000 additional shares of Class A common stock at the initial public offering price less underwriting discounts and commissions. The shares began trading on the Nasdaq Global Select Market, June 12, 2019, under the symbol "CRWD."  The offering is expected to close on June 14, 2019, subject to customary closing conditions.
$CRWD June 12, 2019


feedback & comments via twitter @DomainMondo


DISCLAIMER

2019-06-10

Launch of the Report of the High-Level Panel on Digital Cooperation

Launch of the Report of the High-Level Panel on Digital Cooperation

  Report of the High-Level Panel on Digital Cooperation

LIVE Event June 10, 2019:
 Launch of the High Level Panel on Digital Cooperation’s Report
Monday, June 10, 2019, 10:45 - 11:30 am EDT, New York City, NY (US).
"The High-level Panel on Digital Cooperation was established by United Nations Secretary-General António Guterres to advance a dialogue on strengthening international cooperation in the digital age."
The High-level Panel on Digital Cooperation will launch its final report on Monday 10 June 2019. To mark the occasion, join a live conversation on digital cooperation with:
Moderated by international broadcast journalist, Femi Oke.

The LIVE webcast will begin at 10:45am EST and will be streaming on multiple channels, including:
"This global online event is an opportunity to discuss how the public sector, private sector and civil society can work together to realize the potential of digital technologies for advancing human well-being, while mitigating the risks. Communities, organizations and individuals working on issues ranging from digital inclusion, digital rights & security, governance and more are encouraged to tune in and join the online conversation during the broadcast." 
More information here. | #digitalcooperation  | email: digitalcooperation @ unops.org

Later Event: June 11: The Age of Digital Interdependence: The Launch of the Report of the UN Secretary-General’s High-level Panel on Digital Cooperation


feedback & comments via twitter @DomainMondo


DISCLAIMER

2019-05-24

Data Privacy & Protection | Will The European Union's GDPR Go Global?

One year on, can GDPR go global? Should it?

It’s been one year since the EU’s landmark privacy rules called GDPR went into effect. Now other countries, including the U.S., are looking to adopt their own versions of the law. CNBC.com’s Elizabeth Schulze reports. CNBC International video published May 22, 2019.

See also:
How Silicon Valley gamed Europe’s privacy rules--"The region’s data protection overhaul was supposed to help citizens. Instead, it’s helped Big Tech."--politico.euEditor's note: some are now saying GDPR has actually helped big tech companies enlarge their dominance in the digital data economy while smaller companies have suffered from GDPR complexity and its relatively high compliance costs.
Ireland's Data Protection Commission, the lead EU data protection authority (DPA) for Google, has announced an investigation into Google's online advertising data collection. 



feedback & comments via twitter @DomainMondo


DISCLAIMER

2019-04-12

US Government's Criminal Indictment & Arrest of Julian Assange (video)

Julian Assange arrested: What now for the Wikileaks founder?

Wikileaks founder, Julian Assange, is in custody in the United Kingdom (UK) after being arrested for allegedly breaching his bail conditions. His seven-year self-imposed exile in London's Ecuadorean embassy ended dramatically April 11, 2019, after his asylum was revoked. Mr Assange also faces extradition to the United States (see below). His supporters are calling it a 'dark day for journalism.' Channel 4 News (UK) video above published Apr 11, 2019.

Department of Justice
U.S. Attorney’s Office
Eastern District of Virginia
FOR IMMEDIATE RELEASE
Thursday, April 11, 2019
WikiLeaks Founder Charged in Computer Hacking Conspiracy

ALEXANDRIA, Va. – Julian P. Assange, 47, the founder of WikiLeaks, was arrested today in the United Kingdom pursuant to the U.S./UK Extradition Treaty, in connection with a federal charge of conspiracy to commit computer intrusion for agreeing to break a password to a classified U.S. government computer.

According to court documents unsealed today, the charge relates to Assange’s alleged role in one of the largest compromises of classified information in the history of the United States.

The indictment alleges that in March 2010, Assange engaged in a conspiracy with Chelsea Manning, a former intelligence analyst in the U.S. Army, to assist Manning in cracking a password stored on U.S. Department of Defense computers connected to the Secret Internet Protocol Network (SIPRNet), a U.S. government network used for classified documents and communications. Manning, who had access to the computers in connection with her duties as an intelligence analyst, was using the computers to download classified records to transmit to WikiLeaks. Cracking the password would have allowed Manning to log on to the computers under a username that did not belong to her. Such a deceptive measure would have made it more difficult for investigators to determine the source of the illegal disclosures.

During the conspiracy, Manning and Assange engaged in real-time discussions regarding Manning’s transmission of classified records to Assange. The discussions also reflect Assange actively encouraging Manning to provide more information. During an exchange, Manning told Assange that “after this upload, that’s all I really have got left.” To which Assange replied, “curious eyes never run dry in my experience.”

Assange is charged with conspiracy to commit computer intrusion and is presumed innocent unless and until proven guilty beyond a reasonable doubt. If convicted, he faces a maximum penalty of five years in prison. Actual sentences for federal crimes are typically less than the maximum penalties. A federal district court judge will determine any sentence after taking into account the U.S. Sentencing Guidelines and other statutory factors.

G. Zachary Terwilliger, U.S. Attorney for the Eastern District of Virginia, John C. Demers, Assistant Attorney General for National Security, and Nancy McNamara, Assistant Director in Charge of the FBI’s Washington Field Office, made the announcement after the charges were unsealed. First Assistant U.S. Attorney Tracy Doherty-McCormick, Assistant U.S. Attorneys Kellen S. Dwyer, Thomas W. Traxler and Gordon D. Kromberg, and Trial Attorneys Matthew R. Walczewski and Nicholas O. Hunter of the Justice Department’s National Security Division are prosecuting the case.

The extradition will be handled by the Department of Justice’s Office of International Affairs.

A copy of this press release is located on the website of the U.S. Attorney’s Office for the Eastern District of Virginia. Related court documents and information are located on the website of the District Court for the Eastern District of Virginia or on PACER by searching for Case No. 1:18-cr-111.

An indictment contains allegations that a defendant has committed a crime. Every defendant is presumed to be innocent until and unless proven guilty in court. [emphasis added]

DOJ's Indictment of Assange (pdf) embed below:

Reactions:
The extradition of Julian Assange to the US for exposing evidence of atrocities in Iraq and Afghanistan should be opposed by the British government.--Jeremy Corbyn MP, Leader of the Labour Party

feedback & comments via twitter @DomainMondo


DISCLAIMER

2019-04-09

Google Cloud Next ’19 San Francisco LIVE April 9-11

Google Cloud Next ’19 San Francisco, LIVE from the Moscone Center April 9-11
 Google Cloud Next '19
LIVE Online via the Next OnAir livestream. Watch more than 75 live sessions, behind-the-scenes interviews, and more.

Google Cloud Next '19: Day 1 Secure Channel

Google Cloud video above scheduled for Apr 9, 2019: "Innovate without sacrificing security. Our Secure channel includes sessions on how to secure applications and resources, plus develop comprehensive security and compliance strategies for your organization. Live sessions run all day starting at 11:10 AM PST, April 9, 2019."

Google Cloud Next '19: Day 1 Next Live Show

Google Cloud video above scheduled for Apr 9, 2019: "Join us at Next, wherever you are. With the Next Live Show channel, you’ll get a guided tour of the Next ’19 experience. Enjoy product demos, session recaps, plus 1:1 interviews with Google Cloud customers, partners, and industry experts."  2nd and 3rd day via YouTube: Google Cloud YouTube Channel.

See also:
  • The cloud demystified: How it works and why it matters--blog.google Apr 8, 2019


feedback & comments via twitter @DomainMondo


DISCLAIMER

2019-04-03

Inmarsat Satellite Telecom, IoT & Security Services, Going Private (video)

Inmarsat Fleet Secure Endpoint for cyber resilience at sea

The maritime industry is at increasing risk of cyber security breaches every day but conventional antivirus cover is no longer enough to protect vessels again new forms of malware which use the network to attack your systems. Inmarsat’s Fleet Secure Endpoint has an advanced ransomware detection engine to continually inspect, detect, alert and respond to threats and is remotely monitored 24/7/365. Video above published Jan, 2019.
UK’s Inmarsat Satellite Group Going Private in $3.4 Billion Deal--bloomberg.comInmarsat has been in play since last year as it faces growing competition from traditional rivals such as ViaSat Inc. and new challengers including Richard Branson-backed OneWeb and Elon Musk’s SpaceX offering smaller, cheaper satellites.
Inmarsat received an all-cash offer from a private equity consortium for a total consideration of $3.4B. The deal is not expected to close before Q4 2019--until then, any other party can submit an offer. Strong Q4 2018 results for maritime and aviation broadband indicates bright prospects.--SeekingAlpha.com: Inmarsat: Latest Offer Undervalues The Company.
LON: ISAT
Inmarsat plc is a UK satellite telecommunications company. It offers global mobile services, telephone and data services, to users worldwide, via portable or mobile terminals which communicate with ground stations through thirteen geostationary telecommunications satellites. Inmarsat has been working on selling faster, more reliable internet services to the world’s airlines.
  • Domain: inmarsat.com
  • Headquarters: London, United Kingdom
  • Investor Relations: investors.inmarsat.com
  • CEO: Rupert Pearce (Jan 1, 2012–)
  • Revenue: 1.465 billion USD (2018)
  • Number of employees: 1,500 (2019)
  • Founded: 1979
  • Subsidiaries include Stratos Global Corporation, Inmarsat Global Limited.
  • Stock Exchange & Symbol: LON: ISAT


feedback & comments via twitter @DomainMondo


DISCLAIMER

2018-10-31

SOSi Report on Cybersecurity Threats of China's Internet of Things (IoT)

A report, contracted by the USCC [U.S.-CHINA Economic And Security Review Commission] and authored by SOS International, outlines China’s state-led approach to IoT development, assesses the implications for the U.S. economy, national security, and the privacy of U.S. data, and makes recommendations for U.S. policymakers. China’s concerted, state-led approach, including ongoing efforts to influence international IoT standards, has put China in a position to credibly compete against the United States and other leaders in the emerging IoT industry. China’s research into IoT security vulnerabilities and its growing civil-military cooperation raise concerns about gaining unauthorized access to IoT devices and sensitive data. In addition, China’s authorized access to the IoT data of U.S. consumers will only grow as Chinese IoT companies leverage their advantages in production and cost to gain market share in the United States based on the terms of use and sweeping Chinese government data access powers.

Full SOSi Report (pdf)

Key Findings: 
  • The Chinese government is driving development of the IoT—an industry it views as strategic— through the creation of IoT industrial and innovation centers, extensive financial support, and favorable regulations. Foreign firms, which are considered strategic rivals, face an uneven playing field and are subject to a number of policies that disadvantage them in favor of domestic firms, including restrictions on foreign investment, selective enforcement of Chinese laws to hinder the operation of foreign IoT firms in China, and forced technology transfer. 
  • China’s large market size, production capacity, and government support offer it some significant advantages, but it is still behind U.S. and other foreign leaders in many IoT technologies. Therefore, there is still a window for U.S. companies and the U.S. government to maintain a technological edge and influence future IoT development, standards, and roll-out. 
  • The Chinese government is actively attempting to influence international technical standards for the IoT that would benefit Chinese companies at the expense of U.S. and other foreign counterparts. China pursues a more coordinated and comprehensive strategy than the United States’ private-sector-led approach with U.S. entities often absent from key international standardization processes.
  • China has laid a solid groundwork for a comprehensive roll-out of fifth-generation wireless technology (5G), which will make the IoT faster and more effective, relying on a whole-ofcountry approach that has created an entire ecosystem for domestically manufactured 5G technologies and furthered their inclusion in international technical standards. China is on track to roll-out the largest and most reliable 5G networks, gaining a head start in developing the technologies that 5G enables—first among them, the IoT.  
  • Chinese-manufactured IoT devices have already become common vehicles for unauthorized access due to their widespread usage and insecure device configurations that have resulted in surreptitious data collection and the exploitation for cyberattacks, unauthorized remote access, and data theft. 
  • China is actively researching IoT vulnerabilities, both for security purposes and almost certainly to collect intelligence, conduct network reconnaissance for cyberattacks, and enhance its domestic surveillance powers. The combination of widespread adoption of IoT products and Chinese research into IoT exploits raises the threat of unauthorized access to U.S.-based IoT devices and networks. 
  • China’s authorized access to the IoT data of U.S. consumers will only grow as Chinese IoT companies leverage their advantages in production and cost to gain market share in the United States. 
  • While authorized data access, collection, and processing are indispensable parts of the IoT’s transformative potential, China poses a grave threat to U.S. privacy as its government and surveillance apparatuses are empowered to access this data well in excess of accepted international norms. In the short term, Chinese government and corporate access to U.S. data would be a huge opportunity for Chinese intelligence targeting operations. In the longer term, such access would provide a major edge to Chinese artificial intelligence (AI) development efforts, eventually culminating in a substantial Chinese economic advantage in another field that is expected to shape the economy of the future.  Existing U.S. data protections appear insufficient to protect U.S. data against harmful but authorized data access. The patchwork nature of U.S. laws and authorities leaves loopholes that could facilitate Chinese access to U.S. IoT data in bulk, an especially risky proposition given known Chinese motivations for accessing big data.
See also:
Full Press Release (embed below):


feedback & comments via twitter @DomainMondo


DISCLAIMER

2018-10-25

Verisign $VRSN Q3 2018 Earnings, LIVE Webcast Oct 25, 4:30pm EDT

$VRSN
UPDATE: VeriSign, Inc. (NASDAQ: VRSN) (domain: Verisign.com), registry operator of top-level domains (TLDs), including gTLDs .COM and .NET, and an internet security services provider, released earnings for the third quarter, Q3 2018, at approximately 4:05 p.m. EDT Thursday, Oct 25, 2018.

UPDATE: Earnings Results (pdf) excerpts--GAAP EPS of $1.13, revenue of $305.78M (+4.6% Y/Y):
Third Quarter GAAP Financial Results VeriSign, Inc. and subsidiaries (“Verisign”) reported revenue of $306 million for the third quarter of 2018, up 4.6 percent from the same quarter in 2017. Verisign reported net income of $138 million and diluted earnings per share (diluted “EPS”) of $1.13 for the third quarter of 2018, compared to net income of $115 million and diluted EPS of $0.93 for the same quarter in 2017. The operating margin was 63.8 percent for the third quarter of 2018 compared to 61.9 percent for the same quarter in 2017.
On Oct. 24, 2018, Verisign entered into an agreement with NeuStar, Inc. (“Neustar”) to sell the rights, economic benefits, and obligations, in all customer contracts related to its Security Services business. The transaction includes the sale of customer agreements related to Verisign’s Distributed Denial of Service Protection, Managed Domain Name System (“DNS”), DNS Firewall, and Recursive DNS services. Verisign will retain its proprietary technology, network assets, critical infrastructure, software, and public DNS service to focus solely on supporting Verisign’s core mission: ensuring the security, stability, and resiliency of our core infrastructure. As part of the transaction, Verisign will continue to support the Security Services customers during the transition to Neustar, pursuant to a transition services agreement that is expected to be executed at closing. The transaction is subject to customary regulatory approval and is expected to close shortly following the receipt of such approval. The purchase price, subject to a cap of $120 million, consists of a payment of $50 million, due at the time of closing, plus an additional contingent amount, due after the first anniversary of closing. The additional contingent amount, which cannot be negative, is based upon, among other things, the successful transition of customers to Neustar during the 12-month period following closing. In commenting on the transaction, Jim Bidzos added: “Verisign is committed to focusing on its core mission of providing critical internet infrastructure, including Root Zone management, operation of 2 of the 13 global internet root servers, operation of .gov and .edu, and authoritative resolution for the .com and .net top-level domains, which support the majority of global ecommerce. For this reason, Verisign is transitioning its Security Services customers to Neustar.” (emphasis added)
Excerpts from the conference call [slides and transcript]:
  • Verisign is in negotiations to extend the Cooperative Agreement with NTIA and believes these negotiations will result in an extension agreement before Nov 30, 2018. Details to be finalized and Verisign could not disclose anything further.
  • Nothing to report re: new gTLD .WEB ("on hold" at ICANN).
  • Excerpts from the slides below. See also SEC 10-Q.

On Thursday, Oct 25, 2018, at 4:30 p.m. EDT, Verisign's management held the Q3 2018 earnings conference call that was webcast LIVE at investor.verisign.com. Replay available at the same website.

The conference call was also accessible by direct dial at (888) 676-VRSN (U.S.) or (786) 789-4776 (international), conference ID: Verisign.  An audio archive of the call will be available at https://investor.verisign.com/events.cfm.


feedback & comments via twitter @DomainMondo


DISCLAIMER

2018-10-24

Cybersecurity Awareness Month, Videos by Google and Amazon AWS

Inside a Google Data Center

Joe Kava, Vice President of Google Data Center Operations, gives a tour inside a Google data center in South Carolina (US), and shares details about the security, sustainability and the core architecture of Google's infrastructure in this video first published Dec 16, 2014.

AWS Security by Design

Amazon Web Services (AWS) video above first published May 23, 2018: AWS London Summit 2018 Breakout Session: A Deep Dive into the best practice guidelines for securing your workloads. Learn more about AWS at aws.amazon.com.
October Is Cybersecurity Awareness Month
Every year since 2003 October has been recognized as National Cyber Security Awareness Month (NCSAM), a collaboration between the U.S. Department of Homeland Security and the National Cyber Security Alliance. NCSAM was created to ensure that every individual stays safe and secure online. Learn more at https://staysafeonline.org/ncsam/about-ncsam/

Twitter: #cybersec #cybersafe #CyberSecMonth #CyberAware #NCSAM


feedback & comments via twitter @DomainMondo


DISCLAIMER

2017-12-20

Amazon $AMZN & Sqrrl, Machine Learning Analytics Cybersecurity Startup

Introduction to Sqrrl – "Who We Are in a Nutshell"

Sqrrl video above published Jan 5, 2017: "Want to find out more about Sqrrl? Watch this 2-minute overview video and in just seconds you'll hear our company mission and how our Threat Hunting Platform can help your organization discover hidden threats that already exist inside your network. 

"Sqrrl’s Threat Hunting Platform combines intuitive hunt capabilities with powerful machine learning analytics that detect subtle and linked anomalies associated with kill chain tactics. By transforming raw data into contextual knowledge and actionable insights, Sqrrl displays every asset or entity data (including users, hosts, IPs, domains, etc.) as connected nodes on a graph. Sqrrl simplifies hunting for users with any skill level, as hunters can seamlessly pivot through network, identity, endpoint, and security data based on pre¬defined connections between the various entities."

Amazon.com, Inc. (NASDAQ: AMZN) is in advanced talks to acquire Sqrrl, a startup that analyzes big data to detect cybersecurity threats, according to a report in Axios.com.

Sqrrl Data, Inc. (domain: sqrrl.com): a U.S.-based company founded in 2012 that markets software for big data analytics and cyber security; the company has roots in the United States intelligence community and National Security Agency according to Wikipedia.org.
  • Headquarters: Cambridge, MA
  • Founded: 2012
  • Type of business: Private -- startup Sqrrl has raised almost $30 million from venture capital firms including Accomplice, Matrix Partners, Rally Ventures and Spring Lake Equity Partners.



feedback & comments via twitter @DomainMondo


DISCLAIMER

2017-11-23

Quad9: A Safer Internet Experience, A Free Global DNS Service

Internet Security & Privacy In a Few Easy Steps: Quad9
IBM's new Quad9 [domain: quad9.net] Domain Name System (DNS) offering. Created in collaboration with Packet Clearing House (PCH) and the Global Cyber Alliance (GCA), Quad9 goes far beyond standard DNS name resolution, with four key areas of focus.--securityintelligence.com
  • Privacy: Unlike many other DNS services, Quad9 makes use of aggregated data, but by design does not store, correlate or otherwise employ any personally identifiable information (PII). Quad9 does not and never will share any of its data with marketers, nor will it use this data for demographic analysis.
  • Security: Quad9 makes security a chief priority to deliver superior protection against cybercrime networks and malware, integrating security analysis from individual machines’ DNS queries to global trends.
  • Scalability: Quad9 leverages PCH’s long history of providing highly robust DNS back-end infrastructure, including over 160 points of presence around the world.
  • Ease of use: Administrators can easily configure endpoint devices to point to the Quad9 DNS server at address 9.9.9.9.
Safer Internet Experience for South Africa Announced | allAfrica.com: "... a free new global Domain Name System (DNS) service ... Quad9 provides an immunisation service against malware. It supports end-to-end encryption. The system has been in pilot for a year, with almost 1 million users globally ..."





feedback & comments via twitter @DomainMondo


DISCLAIMER

2017-11-01

Securing Consumer Credit Data in the Age of Digital Commerce (video)

Securing Consumers’ Credit Data in the Age of Digital Commerce

U.S. House Energy and Commerce subcommittee hearing video above scheduled for Nov 1, 2017.

Securing Consumers’ Credit Data in the Age of Digital Commerce | Energy and Commerce Committee | energycommerce.house.gov: The Subcommittee on Digital Commerce and Consumer Protection will hold a hearing on Wednesday, November 1, 2017, at 10:30 a.m. ET in 2123 Rayburn House Office Building, Washington, D.C., entitled “Securing Consumers’ Credit Data in the Age of Digital Commerce.” 

The following issues may be examined at the hearing:
  • The legal and regulatory framework for CRAs, including the safeguards framework in GLBA and consumer protections contained in the FCRA. 
  • Current cybersecurity standards, trends, best practices, and emerging threats, particularly with respect to known cybersecurity vulnerabilities.
  • The relationship between data breaches and incidence of identity theft and fraud.

Witnesses:

Mr. Francis Creighton
President and CEO, Consumer Data Industry Association
Witness Statement and Truth in Testimony and CV

Ms. Anne P. Fortney
Partner Emeritus, Hudson Cook, LLP
Witness Statement and Truth in Testimony and CV

Mr. Jeff Greene
Senior Director, Global Government Affairs and Policy, Symantec
Witness Statement and Truth in Testimony and CV

Mr. Bruce Schneier
Adjunct Lecturer in Public Policy, Harvard Kennedy School
Witness Statement and Truth in Testimony and CV

Documents: Hearing NoticeHearing Notice – Time ChangeBackground Memo (embed below)

Background Memo:


@HouseCommerce  #SubDCCP

#SubDCCP Examines Data Security Practices For Consumers’ Credit Information - Energy and Commerce Committee: The Subcommittee on Digital Commerce and Consumer Protection, chaired by Rep. Bob Latta (R-OH), announced a hearing for Wednesday, November 1, 2017, at 10:00 a.m. in room 2123 of the Rayburn House Office Building. The hearing is entitled, “Securing Consumers’ Credit Data in the Age of Digital Commerce.” Less than a month after holding a hearing on the Equifax data breach, #SubDCCP will examine data security practices within the credit reporting industry to shed light on best practices, cybersecurity information sharing, trends, and steps for improvement. “The Equifax data breach was a stark demonstration of the responsibility that credit bureaus have in holding hundreds of millions of Americans’ personal information. In light of this breach and others, consumers are right to be skeptical. This subcommittee will continue to ask questions on behalf of consumers to illuminate what is currently being done, and what needs to be done, to prevent and mitigate future hacks and restore consumer confidence,” said Latta.

Note also: House Energy and Commerce Committee Chairman Greg Walden (R-OR) published op-ed Oct 27, "Consumer Protection in the 21st Century," announcing a series of hearings surrounding tech business practices and their impact on consumers. In the piece, Walden raises questions about how actions taken by tech companies and online businesses affect consumer privacy and choice.

feedback & comments via twitter @DomainMondo


DISCLAIMER

2017-10-13

Hackers Will Pose A Greater Cybersecurity Threat In 2018 (video)

Hackers will pose a greater cybersecurity threat in 2018

As more elements of our daily lives are linked to the internet, hackers will have greater opportunity to scale up cybercrimes, leaving our homes and personal lives more vulnerable to attack, reports The Economist (economist.com), which  published the above video on Oct 4, 2017:
"In 2018 cyber attacks will affect our lives like never before. Hackers have already compromised multi-national organisations, stealing the personal details of millions. Hackers have even been implicated in national elections.
"On the golden shores of Hawaii lives one of the most prolific hackers on the planet. At the age of 22, Jeremiah Grossman hacked Yahoo – one of the biggest tech companies in the world. In response, they offered him a job – Yahoo’s Chief Hacker.
"According to Jeremiah "There’s a vernacular in the industry, there is the white hat hackers and then there is the black hat hackers. The way I like to describe it is kind of like Star Wars where you have the Jedi and the Sith. The skills are the same but one uses their powers for good and the other one is for evil. I am more of the white hat variety. I use those skills to prevent other people from getting hacked. There is people all over the world attacking you and you have to remain calm and steadfast at every point because if you lose control you will lose the battle."
"White hat hackers break into computer systems to find the weaknesses and make companies aware of them. But it’s about to get even harder to keep up the defences.
"With an ever-increasing risk to corporate security, 2018 will see an unlikely saviour in the fight against hackers - Insurance companies.
"But cyber insurance can only go so far when we are all becoming vulnerable to attack. More and more of our every day lives are being hardwired to the internet from the lock on our front door to our heating. Being connected may bring convenience, but it also makes our homes and our personal lives more vulnerable to hackers."


feedback & comments via twitter @DomainMondo


DISCLAIMER

2017-10-03

LIVE Congressional Hearing: Equifax Data Breach, Answers for Consumers

Oversight of the Equifax Data Breach: Answers for Consumers

House Energy and Commerce Committee, Subcommittee on Digital Commerce and Consumer Protection, Hearing Oct 3, 2017, 10am EDT (video starts @22:22)@HouseCommerce  #SubDCCP



WITNESS:
Mr. Richard F. Smith
Former Chairman and CEO, Equifax Inc.
Witness Statement (embed below)


Subcommittee documents:




feedback & comments via twitter @DomainMondo


DISCLAIMER

2017-07-28

DEF CON 25 Hacking Conference, July 27-30, Caesars Palace, Las Vegas

DEF CON 25 - SupaFraud - Official DEF CON Teaser Video

25 Years! DEF CON is the world's longest running and largest hacker convention. It takes place immediately following Black Hat in Las Vegas every year.

DEF CON 25 Hacking Conference, July 27-30, 2017, at Caesars Palace in Las Vegas.

Excerpt from DefCon 25 schedule
Full Schedule here.

See also: The Story of DEFCON | YouTube.com




feedback & comments via twitter @DomainMondo


DISCLAIMER

2017-07-27

Q2 2017 Webcasts Jul 27: Twitter $TWTR Verisign $VRSN Amazon $AMZN

Q2 2017 Earnings Webcasts Thursday, July 27, 2017:
Twitter Inc.
Stock exchange: symbol | NYSE: TWTR
Principal domain: twitter.com

Twitter Q2 2017 results: Q2 total revenue was $574M; GAAP net loss $116M with -20% margin; adj. EBITDA was $178M, with adj. EBITDA margin of 31%; DAU grew 12% Y/Y, marking the third consecutive quarter of double-digit growth.Specifically, in Q2, we achieved the following results:
•  Q2 revenue totaled $574 million, a decrease of 5% year-over-year.
  • Advertising revenue totaled $489 million, a decrease of 8% year-over-year.
  • Data licensing and other revenue totaled $85 million, an increase of 26% year-over-year.
  • US revenue totaled $335 million, a decrease of 7% year-over-year.
  • International revenue totaled $239 million, a decrease of 1% year-over-year.
  • Total ad engagements increased 95% year-over-year.
  • Cost per engagement (CPE) decreased 53% year-over-year.
Tweet your question to @TwitterIR using #TWTR. Investor Relations:  investor.twitterinc.com for more information. Twitter has used, and intends to continue to use, its Investor Relations website and the Twitter accounts of @jack, @twitter and @TwitterIR as means of disclosing material non-public information and for complying with its disclosure obligations under Regulation FD."--Twitter Inc.

Verisign, Inc.
Stock exchange: symbol | NASDAQ:VRSN
Principal domain: verisign.com
The earnings call will also be accessible via direct dial at (888) 676-VRSN (U.S.) or (913) 312-6675 (international), conference ID: Verisign. An audio archive of the call will be available at https://investor.verisign.com/events.cfm.

Verisign FORM 10-Q excerpt:"On January 18, 2017, the Company received a Civil Investigative Demand (“CID”) from the Antitrust Division of the United States Department of Justice (“DOJ”) requesting certain material related to the Company becoming the registry operator for the . web  gTLD.  We are cooperating with the DOJ. At this time, the Company is unable to estimate a range of potential financial and non-financial outcomes in connection with this matter. Verisign is also involved in various investigations, claims and lawsuits arising in the normal conduct of its business, none of which, in its opinion, will have a material adverse effect on its financial condition, results of operations, or cash flows. The Company cannot assure you that it will prevail in any litigation. Regardless of the outcome, any litigation may require the Company to incur significant litigation expense and may result in significant diversion of management attention."

The Q2 2017 earnings news release and slides embedded below, via the company's investor relations website:




Verisign provides top-level domain (TLD) registry operator services (including .COM and .NET), as well as providing internet security services, and serving as the internet's root zone maintainer and operator of two (a. and j.) of the world's 13 internet root servers for the internet's Domain Name System (DNS). Verisign's security services include Distributed Denial of Service (DDoS) Protection and Managed DNS.

New gTLD .WEB
Last year, Verisign revealed it had provided funding to Nu Dot Co LLC, winner of the ICANN "last resort auction" for new gTLD (new generic top-level domain) .WEB, and had an agreement for transfer of Nu Dot Co's rights re: .WEB to Verisign.
New gTLD .WEB Auction Results | ICANN.org: An auction took place on 27 July 2016 to remove string contention among the .WEB .WEBS applicants. Nu Dot Co LLC was designated the winner of .WEB at the close of the auction. "Contention set on hold pending accountability mechanism."
More information re: new gTLD .WEB on DomainMondo.com:
See also: Application ID: 1-1296-36138 and Ruby Glen, LLC v. ICANN | ICANN.org. and Active ICANN CEP 2-Aug-2016 Donuts Inc. and Ruby Glen, LLC re: .WEB

Amazon’s 2017 Prime Day Was Its Best Sales Day Ever

Video above published Jul 12, 2017: Amazon’s 2017 Prime Day broke a new record with a 60% increase in sales compared to last year.

Amazon.com, Inc.
Stock exchange: symbol | NASDAQ: AMZN
Principal domain: Amazon.com
The event will be webcast live, and the audio and associated slides will be available for at least three months thereafter at www.amazon.com/ir.

Amazon.com Inc. Q2 2017 press release embed below--second quarter sales up 25% to $38.0 Billion:



feedback & comments via twitter @DomainMondo


DISCLAIMER

Domain Mondo archive