tech A1: Embracing Web 2.0 Technologies to Grease the Wheels of Team Cohesion By www.ukoln.ac.uk Published On :: 2008-07-22 This session will review how a number of Web 2.0 technologies that are both internally and externally hosted and can be used to future proof the way that teams in institutions can work effectively together. The session was facilitated by Andy Ramsden and Marieke Guy, University of Bath. Full Article
tech B2: People, Processes and Projects - How the Culture of an Organisation can Impact on Technical System Implementation By www.ukoln.ac.uk Published On :: 2007-07-17 Claire Gibbons, Web Officer (Marketing and Communications), University of Bradford and Russell Allen, Project Manager (Portal and CMS), Management Information Services, University of Bradford will help delegates gain an understanding of 'organisational culture' and the effect this can have on change management and/or system implementation. Full Article
tech B4: Search Technology within the University Environment By www.ukoln.ac.uk Published On :: 2006-06-15 William Mackintosh, Web Manager, University of York and Damon Querry, Senior Web Development Officer, University of Newcastle upon Tyne will be looking at Search Technology within the University Environmen. The University of Newcastle upon Tyne has implemented a Google Search Appliance. The University of York is committed to the purchase of the Google Mini. The session will discuss the reasons for selecting these products and how they add value to an institution's Web site. Full Article
tech Plenary Talk 1: Real World Emerging Technologies By www.ukoln.ac.uk Published On :: 2006-06-14 Chris Scott from Headscape gave a talk on "Real World Emerging Technologies". Falling University entries and top-up fees have contributed to a step-change in the operational environment for the HE sector. This change has resulted in an acute pressure on institutions to innovate for success. This presentation will explore some opportunities for institutions to capitalise on new and emerging web technologies in response to such changes. While there is much hype about Web 2.0, there are some genuine opportunities for straightforward applications of Web 2.0 technologies in institutions that are low risk and low cost, and have potential for significant returns if they are introduced and managed correctly and the right people are involved. Full Article
tech Data Security, Actual AI and Law’s Acceptance of Tech Spell the New Forefront of Law By www.littler.com Published On :: Tue, 07 Mar 2017 17:32:37 +0000 Zev Eigen considers artificial intelligence and predictive coding to be tools in making better informed hiring decisions. Corporate Counsel View Article Full Article
tech 4 Places BigLaw Is Putting Its Tech Budget Dollars By www.littler.com Published On :: Mon, 26 Feb 2018 21:35:55 +0000 Scott Rechtschaffen talks about cybersecurity enhancements and the importance of investing in technology. Law360 View Article Full Article
tech ILTACON 2018: Emerging Roles in Legal Technology (Part 1) By www.littler.com Published On :: Mon, 24 Sep 2018 21:53:16 +0000 Aaron Crews explains how data scientists can help attorneys with efficiencies and innovations both internally and externally. Legal Executive Institute View Article Full Article
tech ILTACON 2018: Emerging Roles in Legal Technology (Part 2) By www.littler.com Published On :: Tue, 25 Sep 2018 15:54:56 +0000 Aaron Crews offers advice on how law firms' innovation efforts can be more successful. Legal Executive Institute View Article Full Article
tech Some law schools offer tech programs to help students find jobs, but does it work? By www.littler.com Published On :: Thu, 28 Feb 2019 20:43:30 +0000 Jason Dirkx and Scott Rechtschaffen consider the intersection of technology and law degrees. ABA Journal View Article Full Article
tech Littler’s Chief Knowledge Officer and Cornell Law Students Discuss How Hands-on Tech Training Enhances the Practice of Law By www.littler.com Published On :: Tue, 28 Jan 2020 14:50:55 +0000 In this podcast, Littler’s Chief Knowledge Officer, Scott Rechtschaffen, talks with his Cornell Law School students about the potential for lawyers to use software to develop practical tools for the delivery of legal services. During their semester, the students experienced how to take their growing knowledge of the law, identify a problem, coordinate with subject matter and technical experts, and create a legal app designed to assist users, who might be either clients or fellow attorneys. Full Article
tech Why the Legal Technologist Career Path Presents Both Opportunity and Danger By www.littler.com Published On :: Mon, 09 Mar 2020 16:23:53 +0000 Aaron Crews describes the various duties of legal technologists. Legaltech News View Article Full Article
tech Legal Tech’s Predictions for Business of Law and ALSPs in 2021 By www.littler.com Published On :: Wed, 17 Feb 2021 17:25:56 +0000 Scott Forman explains how firms must adopt integrated technology in order to operate collectively. LegalTech News View Article (Subscription required.) Full Article
tech As employers consider strategies for adapting the size of their workforces to meet changing business demands and technologies, what guidance should be top-of-mind? By www.littler.com Published On :: Fri, 10 Nov 2023 17:21:34 +0000 Full Article
tech The ADA Turns 34: The Intersection of Technology, AI, and Individuals with Disabilities By www.littler.com Published On :: Wed, 21 Aug 2024 16:08:09 +0000 On July 26, 1990, the Americans with Disabilities Act (ADA) was signed into law. On the recent 34th anniversary of the ADA, U.S. Equal Employment Opportunity Commission (EEOC) General Counsel Karla Gilbride and U.S. Full Article
tech The ADA turns 34: The intersection of technology, AI, and individuals with disabilities By www.littler.com Published On :: Tue, 17 Sep 2024 13:56:11 +0000 Bradford J. Kelley and Sean O'Brien discuss how, on the 34th anniversary of the Americans with Disabilities Act (ADA), the Equal Employment Opportunity Commission and Justice Department emphasize their commitment to ensuring that emerging technologies and AI comply with ADA standards. Westlaw Today View (Subscription required.) Full Article
tech Artificial Intelligence, Technology and the Evolving Workplace By www.littler.com Published On :: Tue, 17 Sep 2024 21:49:24 +0000 Full Article
tech OFCCP Preparing to Scrutinize Federal Contractors’ Use of AI Hiring Tools and Other Technology-based Selection Procedures By www.littler.com Published On :: Thu, 07 Sep 2023 13:25:15 +0000 On August 24, 2023, the Office of Management and Budget approved a request from the U.S. Department of Labor’s Office of Federal Contract Compliance Programs (OFCCP) to revise the “Itemized Listing” that OFCCP uses to collect information from federal contractors that are selected for supply or service audits. Among the changes that have been approved is a new requirement that audited contractors: Full Article
tech The CFPB Cautions Employers About Using Technology to Track, Assess, and Evaluate Workers By www.littler.com Published On :: Tue, 29 Oct 2024 15:35:22 +0000 Employers should be mindful of whether workforce tracking technology, including AI, may provide information, such as employee performance scores, that triggers FCRA compliance. The FCRA protects both job applicants and employees. Education about basics of the FCRA is key for all employers, including in-house counsel, due to the proliferation of such tracking and scoring technology. Full Article
tech TechNet and Littler’s Workplace Policy Institute Support the Illinois Senate’s Passage of Biometric Information Privacy Act Reform Bill By www.littler.com Published On :: Thu, 11 Apr 2024 20:58:58 +0000 Update: On August 2, 2024, Illinois Governor J.B. Pritzker signed SB 2979 into law, reforming the liability guidelines under the Illinois Biometric Information Privacy Act. CHICAGO (April 11, 2024) – Today, the Illinois Senate passed SB 2979, which would reform the liability guidelines under the state’s Biometric Information Privacy Act (BIPA). The bill marks an important milestone in the broader effort to resolve BIPA’s vague statutory language and courts’ expansive interpretations of the law, which have posed a threat to businesses that capture biometric information. Full Article
tech Legal Tech's Milestones for Cybersecurity & Data Privacy in 2023 By www.littler.com Published On :: Wed, 27 Dec 2023 18:48:03 +0000 Denise Backhouse shares how best to alleviate data risks that many e-discovery professionals may face in the new year. Legaltech News View (Subscription required.) Full Article
tech Legal Tech's Predictions for the Business of Law in 2024 By www.littler.com Published On :: Wed, 17 Jan 2024 21:38:17 +0000 Scott Forman gives his predictions for legal technology and data analytics tools, especially towards generative AI point solutions, in 2024. Legaltech News View (Subscription required.) Full Article
tech ETSI publishes a white paper on Network Transformation - Building on key technologies for 5G By www.etsi.org Published On :: Thu, 28 Apr 2022 09:23:58 GMT ETSI publishes a white paper on Network Transformation - Building on key technologies for 5G SDN NFV World Congress, The Hague, 14 October 2019 ETSI is proud to announce the availability of a new white paper, entitled Network Transformation: Orchestration, Network and Service Management Framework, written by several of its Industry Specification Groups’ (ISG) Chairs. These groups have released specifications on key building block technologies for next-generation networks, feeding the 3GPP 5G specifications. Read More... Full Article
tech ETSI releases a Technical Report on Global Acceptance of EU Trust Services By www.etsi.org Published On :: Thu, 28 Apr 2022 06:13:56 GMT ETSI releases a Technical Report on Global Acceptance of EU Trust Services Sophia Antipolis, 16 January 2020 The ETSI Technical Committee on Electronic Signatures and Infrastructures (TC ESI) is pleased to release the ETSI TR 103684 technical report. This report addresses existing trust service infrastructures that operate in different regions of the world and their possible mutual recognition/global acceptance. The report identifies ways to facilitate cross recognition between EU trust services and trust services from other schemes. The trust services are based on ETSI standards and support the eIDAS Regulation (EU) No 910/2014. Read More... Full Article
tech ETSI releases a Technical Report on autonomic network management and control applying machine learning and other AI algorithms By www.etsi.org Published On :: Thu, 28 Apr 2022 06:14:33 GMT ETSI releases a Technical Report on autonomic network management and control applying machine learning and other AI algorithms Sophia Antipolis, 5 March 2020 The ETSI Technical Committee on Core Network and Interoperability Testing (TC INT) has just released a Technical Report, ETSI TR 103 626, providing a mapping of architectural components for autonomic networking, cognitive networking and self-management. This architecture will serve the self-managing Future Internet. The ETSI TR 103 626 provides a mapping of architectural components developed in the European Commission (EC) WiSHFUL and ORCA Projects, using the ETSI Generic Autonomic Networking Architecture (GANA) model. The objective is to illustrate how the ETSI GANA model specified in the ETSI specification TS 103 195-2 can be implemented when using the components developed in these two projects. The Report also shows how the WiSHFUL architecture augmented with virtualization and hardware acceleration techniques can implement the GANA model. This will guide implementers of autonomics components for autonomic networks in their optimization of their GANA implementations. The TR addresses autonomic decision-making and associated control-loops in wireless network architectures and their associated management and control architectures. The mapping of the architecture also illustrates how to implement self-management functionality in the GANA model for wireless networks, taking into consideration another Report ETSI TR 103 495, where GANA cognitive algorithms for autonomics, such as machine learning and other AI algorithms, can be applied. Full Article
tech ETSI releases Technical Report on requirements for smart lifts for IoT By www.etsi.org Published On :: Thu, 28 Apr 2022 06:19:22 GMT ETSI releases Technical Report on requirements for smart lifts for IoT Sophia Antipolis, 4 June 2020 To facilitate upcoming standards, the ETSI SmartM2M technical committee has released ETSI TR 103 546, a Technical Report on smart lifts, collecting and developing the type and range of data which should be exchanged between lifts and their relevant management applications. This study paves the way for technical requirements to monitor the activities and the performance of such lifts and describe their interaction with IoT devices and applications. Read More... Full Article
tech ETSI releases Technical Report on Citizen Requirements for Smart Cities By www.etsi.org Published On :: Thu, 28 Apr 2022 09:28:29 GMT ETSI releases Technical Report on Citizen Requirements for Smart Cities Sophia Antipolis, 9 November 2020 The ETSI Human Factors Technical Committee has released ETSI TR 103 455, a Technical Report that assesses the different citizen-related issues that smart city-related standardization in the ICT domain needs to address. These include fundamental aspects such as accessibility, usability, interoperability, personal data protection and security, and how services to citizens are to be designed to maximize benefits to the community. The study gives an overview of existing ETSI and other SDOs standards in that field, including ETSI community indicators. It aligns well with the UN Sustainable Development Goal 11 "Make cities inclusive, safe, resilient and sustainable". Read More... Full Article
tech ETSI releases a white paper on future ICT technology trends By www.etsi.org Published On :: Wed, 19 May 2021 12:51:44 GMT ETSI releases a white paper on future ICT technology trends Sophia Antipolis, 10 May 2021 “Information and Communications Technology (ICT) is an exciting and dynamic area, that is in constant innovation, through the evolution of existing concepts and technologies but also through the emergence of disruptive technologies and even sometimes unexpected new use cases”. Read More... Full Article
tech ETSI launches first specification for the 5th Generation Fixed Network, F5G technology landscape By www.etsi.org Published On :: Thu, 23 Sep 2021 10:02:40 GMT ETSI launches first specification for the 5th Generation Fixed Network, F5G technology landscape Sophia Antipolis, 23 September 2021 ETSI's 5th Generation Fixed Network group (F5G ISG) has just released its first specification, ETSI GS F5G 003, entitled F5G Technology Landscape. In this specification, the ISG studies the technical requirements, existing standards and gaps for 10 different new use cases, for home, enterprises or industrial needs. ETSI GS F5G 003 use cases include PON (passive optical network) on-premises and passive optical LAN. In this case, a PON system could connect end devices (like HDTV, HD surveillance cameras and VR/AR helmets) and provide higher data rate, better coordination and controlled latency than current Ethernet and Wi-Fi mesh. Read More... Full Article
tech ETSI releases two Technical Reports to support US NIST standards for post-quantum cryptography By www.etsi.org Published On :: Wed, 06 Oct 2021 13:28:24 GMT ETSI releases two Technical Reports to support US NIST standards for post-quantum cryptography Sophia Antipolis, 6 October 2021 In 2016 the US National Institute of Standards and Technology (NIST) announced their intention to develop new standards for post-quantum cryptography. They subsequently initiated a competition-like standardization process with a call for proposals for quantum-safe digital signatures, public-key encryption schemes, and key encapsulation mechanisms. NIST have stated that they intend to select quantum-safe schemes for standardization at the end of the current, third round of evaluation. Read More... Full Article
tech World’s first non-cellular 5G technology, ETSI DECT-2020, gets ITU-R approval, setting example of new era connectivity By www.etsi.org Published On :: Tue, 19 Oct 2021 07:36:18 GMT World’s first non-cellular 5G technology, ETSI DECT-2020, gets ITU-R approval, setting example of new era connectivity Sophia Antipolis, 19 October 2021 ETSI DECT-2020 NR, the world’s first non-cellular 5G technology standard, has been recognized by the WP5D of the International Telecommunication Union’s Radiocommunication Sector (ITU-R) and included as part of the 5G standards in IMT-2020 technology recommendation. Dr. Günter Kleindl, Chair of the ETSI Technical Committee DECT, says: “With our traditional DECT standard we already received IMT-2000 approval by ITU-R twenty-one years ago, but the requirements for 5G were so much higher, that we had to develop a completely new, but compatible, radio standard.” Released last year, the standard sets an example of future connectivity: the infrastructure-less and autonomous, decentralized technology is designed for massive IoT networks for enterprises. It has no single points of failure and is accessible to anyone, costing only a fraction of the cellular networks both in dollars and in carbon footprint. Read More... Full Article
tech ETSI Top 10 Webinars in 2021 - Starring: DECT2020, Ultra-Wide Band radio technology, IPv6, MEC By www.etsi.org Published On :: Wed, 08 Dec 2021 08:31:05 GMT ETSI Top 10 Webinars in 2021 - Starring: DECT2020, Ultra-Wide Band radio technology, IPv6, MEC. Sophia Antipolis, 8 December 2021 As 2021 comes to an end, we have selected for you our most popular webinars of the year. If you missed them, listen to the recorded presentations and their Q&A sessions, deep dive into the non-cellular 5G radio DECT2020-NR, IPv6, Multi-access Edge Computing, Open Source MANO and much more. Read More... Full Article
tech ETSI launches a new group on Terahertz, a candidate technology for 6G By www.etsi.org Published On :: Mon, 12 Dec 2022 09:44:30 GMT ETSI launches a new group on Terahertz, a candidate technology for 6G Sophia Antipolis, 12 December 2022 On 8 December the newly launched ETSI Industry Specification Group on Terahertz (ISG THz) held its kick-off meeting and decided on work priorities for this candidate technology for 6G. “ISG THz provides an opportunity for ETSI members to coordinate their pre-standards research efforts on THz technology across various European collaborative projects, extended with relevant global initiatives, a move towards paving the way for future standardization of the technology,” outlines Thomas Kürner, Chair of ISG THz. Read More... Full Article
tech ETSI releases new report enabling more transparent security techniques By www.etsi.org Published On :: Mon, 06 Mar 2023 10:16:04 GMT Sophia Antipolis, 6 March 2023 The ETSI group on Encrypted Traffic Integration (ISG ETI) is pleased to announce the release of the group report GR-ETI-002 “Requirements definition and analysis”, the next step for the problems previously outlined in the report GR-ETI-001 “Problem Statement”. Read More... Full Article
tech ETSI’s Securing AI group becomes a Technical Committee to help ETSI to answer the EU AI Act By www.etsi.org Published On :: Tue, 17 Oct 2023 16:01:10 GMT Sophia Antipolis, 17 October 2023 As the second term of the Industry Specification Group Securing AI (ISG SAI) is scheduled to conclude in Q4 2023, and in line with ETSI's commitment to AI and SAI, the group has suggested the closure of ISG SAI, with its activity transferred to a new ETSI Technical Committee, TC SAI. Read More... Full Article
tech ETSI’s Security Conference Navigates Next Generation Technologies By www.etsi.org Published On :: Thu, 19 Oct 2023 14:17:54 GMT Sophia Antipolis, 19 October 2023 ETSI’s well-known Security Conference came to a close today with nearly 250 onsite attendees from 29 countries. This year’s event focused on security research and global security standards in action, considering broader aspects such as attracting the next generation of cybersecurity standardization professionals and supporting SMEs. Read More... Full Article
tech ETSI Launches a New Group for Integrated Sensing and Communications, a Candidate Technology for 6G By www.etsi.org Published On :: Tue, 21 Nov 2023 09:28:14 GMT Sophia Antipolis, 21 November 2023 ETSI is delighted to announce the launch of the Industry Specification Group for Integrated Sensing and Communications (ISG ISAC). This group will establish the technical foundations for ISAC technology development and standardization in 6G. 87 participants from both the industrial sphere and the academic sphere took an active part in the kick-off meeting, which was held at ETSI premises, in Sophia Antipolis, France, on 17 November 2023. Read More... Full Article
tech ETSI Releases Ground-breaking Technical Report to mitigate technology-enabled Coercive Control By www.etsi.org Published On :: Fri, 12 Apr 2024 09:02:36 GMT Sophia Antipolis, 31 January 2024 The European Telecommunications Standards Institute (ETSI) has published a significant new technical report, "ETSI TR 103 936 V1.1.1 (2024-01): Cyber Security; Implementing Design Practices to Mitigate Consumer IoT-Enabled Coercive Control". This pioneering document addresses the increasingly important issue of safeguarding individuals from coercive control through the misuse of consumer Internet of Things (IoT) devices. Coercive control encompasses a range of abusive acts such as security breaches, privacy invasions, harassment, physical assault, and other patterns of behaviour that can limit autonomy or cause emotional harm to potential targets. Read More... Full Article
tech Cybersecurity Snapshot: Apply Zero Trust to Critical Infrastructure’s OT/ICS, CSA Advises, as Five Eyes Spotlight Tech Startups’ Security By www.tenable.com Published On :: Fri, 01 Nov 2024 09:00:00 -0400 Should critical infrastructure orgs boost OT/ICS systems’ security with zero trust? Absolutely, the CSA says. Meanwhile, the Five Eyes countries offer cyber advice to tech startups. Plus, a survey finds “shadow AI” weakening data governance. And get the latest on MFA methods, CISO trends and Uncle Sam’s AI strategy.Dive into six things that are top of mind for the week ending Nov. 1.1 - Securing OT/ICS in critical infrastructure with zero trustAs their operational technology (OT) computing environments become more digitized, converged with IT systems and cloud-based, critical infrastructure organizations should beef up their cybersecurity by adopting zero trust principles.That’s the key message of the Cloud Security Alliance’s “Zero Trust Guidance for Critical Infrastructure,” which focuses on applying zero trust methods to OT and industrial control system (ICS) systems.While OT/ICS environments were historically air gapped, that’s rarely the case anymore. “Modern systems are often interconnected via embedded wireless access, cloud and other internet-connected services, and software-as-a-service (SaaS) applications,” reads the 64-page white paper, which was published this week.The CSA hopes the document will help cybersecurity teams and OT/ICS operators enhance the way they communicate and collaborate. Among the topics covered are:Critical infrastructure’s unique threat vectorsThe convergence of IT/OT with digital transformationArchitecture and technology differences between OT and ITThe guide also outlines this five-step process for implementing zero trust in OT/ICS environments:Define the surface to be protectedMap operational flowsBuild a zero trust architectureDraft a zero trust policyMonitor and maintain the environmentA zero trust strategy boosts the security of critical OT/ICS systems by helping teams “keep pace with rapid technological advancements and the evolving threat landscape,” Jennifer Minella, the paper’s lead author, said in a statement.To get more details, read:The report’s announcement “New Paper from Cloud Security Alliance Examines Considerations and Application of Zero Trust Principles for Critical Infrastructure”The full report “Zero Trust Guidance for Critical Infrastructure”A complementary slide presentationFor more information about OT systems cybersecurity, check out these Tenable resources: “What is operational technology (OT)?” (guide)“Discover, Measure, and Minimize the Risk Posed by Your Interconnected IT/OT/IoT Environments” (on-demand webinar)“How To Secure All of Your Assets - IT, OT and IoT - With an Exposure Management Platform” (blog)“Blackbox to blueprint: The security leader’s guidebook to managing OT and IT risk” (white paper)“Tenable Cloud Risk Report 2024” (white paper)2 - Five Eyes publish cyber guidance for tech startupsStartup tech companies can be attractive targets for hackers, especially if they have weak cybersecurity and valuable intellectual property (IP).To help startups prevent cyberattacks, the Five Eyes countries this week published cybersecurity guides tailored for these companies and their investors.“This guidance is designed to help tech startups protect their innovation, reputation, and growth, while also helping tech investors fortify their portfolio companies against security risks," Mike Casey, U.S. National Counterintelligence and Security Center Director, said in a statement.These are the top five cybersecurity recommendations from Australia, Canada, New Zealand, the U.S. and the U.K. for tech startups:Be aware of threat vectors, including malicious insiders, insecure IT and supply chain risk.Identify your most critical assets and conduct a risk assessment to pinpoint vulnerabilities.Build security into your products by managing intellectual assets and IP; monitoring who has access to sensitive information; and ensuring this information’s protection.Conduct due diligence when choosing partners and make sure they’re equipped to protect the data you share with them.Before you expand abroad, prepare and become informed about these new markets by, for example, understanding local laws in areas such as IP protection and data protection. “Sophisticated nation-state adversaries, like China, are working hard to steal the intellectual property held by some of our countries’ most innovative and exciting startups,” Ken McCallum, Director General of the U.K.’s MI5, said in a statement.To get more details, check out these Five Eyes’ cybersecurity resources for tech startups:The announcement “Five Eyes Launch Shared Security Advice Campaign for Tech Startups”The main guides: “Secure Innovation: Security Advice for Emerging Technology Companies”“Secure Innovation: Security Advice for Emerging Technology Investors”These complementary documents:“Secure Innovation: Scenarios and Mitigations”“Secure Innovation: Travel Security Guidance”“Secure Innovation: Due Diligence Guidance”“Secure Innovation: Companies Summary”3 - Survey: Unapproved AI use impacting data governanceEmployees’ use of unauthorized AI tools is creating compliance issues in a majority of organizations. Specifically, it makes it harder to control data governance and compliance, according to almost 60% of organizations surveyed by market researcher Vanson Bourne.“Amid all the investment and adoption enthusiasm, many organisations are struggling for control and visibility over its use,” reads the firm’s “AI Barometer: October 2024” publication. Vanson Bourne polls 100 IT and business executives each month about their AI investment plans.To what extent do you think the unsanctioned use of AI tools is impacting your organisation's ability to maintain control over data governance and compliance?(Source: Vanson Bourne’s “AI Barometer: October 2024”)Close to half of organizations surveyed (44%) believe that at least 10% of their employees are using unapproved AI tools.On a related front, organizations are also grappling with the issue of software vendors that unilaterally and silently add AI features to their products, especially to their SaaS applications.While surveyed organizations say they’re reaping advantages from their AI usage, “such benefits are dependent on IT teams having the tools to address the control and visibility challenges they face,” the publication reads.For more information about the use of unapproved AI tools, an issue also known as “shadow AI,” check out:“Do You Think You Have No AI Exposures? Think Again” (Tenable)“Shadow AI poses new generation of threats to enterprise IT” (TechTarget)“10 ways to prevent shadow AI disaster” (CIO)“Never Trust User Inputs -- And AI Isn't an Exception: A Security-First Approach” (Tenable)“Shadow AI in the ‘dark corners’ of work is becoming a big problem for companies” (CNBC)VIDEOShadow AI Risks in Your Company 4 - NCSC explains nuances of multi-factor authenticationMulti-factor authentication (MFA) comes in a variety of flavors, and understanding the differences is critical for choosing the right option for each use case in your organization.To help cybersecurity teams better understand the different MFA types and their pluses and minuses, the U.K. National Cyber Security Centre (NCSC) has updated its MFA guidance.“The new guidance explains the benefits that come with strong authentication, while also minimising the friction that some users associate with MFA,” reads an NCSC blog. In other words, what type of MFA method to use depends on people’s roles, how they work, the devices they use, the applications or services they’re accessing and so on.Topics covered include:Recommended types of MFA, such as FIDO2 credentials, app-based and hardware-based code generators and message-based methodsThe importance of using strong MFA to secure users’ access to sensitive dataThe role of trusted devices in boosting and simplifying MFABad practices that weaken MFA’s effectiveness, such as:Retaining weaker, password-only authentication protocols for legacy servicesExcluding certain accounts from MFA requirements because their users, usually high-ranking officials, find MFA inconvenientTo get more details, read:The NCSC blog “Not all types of MFA are created equal”The NCSC guide “Multi-factor authentication for your corporate online services”For more information about MFA:“Multifactor Authentication Cheat Sheet” (OWASP)“Deploying Multi Factor Authentication – The What, How, and Why” (SANS Institute)“How MFA gets hacked — and strategies to prevent it” (CSO)“How Multifactor Authentication Supports Growth for Businesses Focused on Zero Trust” (BizTech)“What is multi-factor authentication?” (TechTarget)5 - U.S. gov’t outlines AI strategy, ties it to national security The White House has laid out its expectations for how the federal government ought to promote the development of AI in order to safeguard U.S. national security.In the country’s first-ever National Security Memorandum (NSM) on AI, the Biden administration said the federal government must accomplish the following:Ensure the U.S. is the leader in the development of safe, secure and trustworthy AILeverage advanced AI technologies to boost national securityAdvance global AI consensus and governance“The NSM’s fundamental premise is that advances at the frontier of AI will have significant implications for national security and foreign policy in the near future,” reads a White House statement. The NSM’s directives to federal agencies include:Help improve the security of chips and support the development of powerful supercomputers to be used by AI systems.Help AI developers protect their work against foreign spies by providing them with cybersecurity and counterintelligence information.Collaborate with international partners to create a governance framework for using AI in a way that is ethical, responsible and respects human rights. The White House also published a complementary document titled “Framework To Advance AI Governance and Risk Management in National Security,” which adds implementation details and guidance for the NSM.6 - State CISOs on the frontlines of AI securityAs the cybersecurity risks and benefits of AI multiply, most U.S. state CISOs find themselves at the center of their governments' efforts to craft AI security strategies and policies.That’s according to the “2024 Deloitte-NASCIO Cybersecurity Study,” which surveyed CISOs from all 50 states and the District of Columbia.Specifically, 88% of state CISOs reported being involved in the development of a generative AI strategy, while 96% are involved with creating a generative AI security policy.However, their involvement in AI cybersecurity matters isn’t necessarily making them optimistic about their states’ ability to fend off AI-boosted attacks.None said they feel “extremely confident” that their state can prevent AI-boosted attacks, while only 10% reported feeling “very confident.” The majority (43%) said they feel “somewhat confident” while the rest said they are either “not very confident” or “not confident at all.” Naturally, most state CISOs see AI-enabled cyberthreats as significant, with 71% categorizing them as either “very high threat” (18%) or “somewhat high threat” (53%).At the same time, state CISOs see the potential for AI to help their cybersecurity efforts, as 41% are already using generative AI for cybersecurity, and another 43% have plans to do so by mid-2025.Other findings from the "2024 Deloitte-NASCIO Cybersecurity Study" include:4 in 10 state CISOs feel their budget is insufficient.Almost half of respondents rank cybersecurity staffing as one of the top challenges.In the past two years, 23 states have hired new CISOs, as the median tenure of a state CISO has dropped to 23 months, down from 30 months in 2022.More state CISOs are taking on privacy protection duties — 86% are responsible for privacy protection, up from 60% two years ago.For more information about CISO trends:“What’s important to CISOs in 2024” (PwC)“The CISO’s Tightrope: Balancing Security, Business, and Legal Risks in 2024” (The National CIO Review)“State of CISO Leadership: 2024” (SC World)“4 Trends That Will Define the CISO's Role in 2024” (SANS Institute) Full Article
tech OSC Investor Alert: Nova Tech Ltd By www.osc.ca Published On :: Fri, 17 Feb 2023 13:47:06 GMT TORONTO – The Ontario Securities Commission (OSC) is warning investors that Nova Tech Ltd (NovaTech), which operates the website www.novatechfx.com, is not registered with the OSC in any capacity. Full Article
tech Canadian securities regulators warn public about unregistered trading platform Nova Tech Ltd By www.osc.ca Published On :: Fri, 17 Mar 2023 12:54:31 GMT Toronto – The Canadian Securities Administrators (CSA) is warning the public that Nova Tech Ltd (NovaTech), which operates the website www.novatechfx.com, is not registered with a securities regulator in any province or territory in Canada. Full Article
tech Tenable Research to Discuss Cloud Security Attack Techniques and Detection Strategies at fwd:cloudsec Europe 2024 By www.tenable.com Published On :: Mon, 09 Sep 2024 16:05:00 -0400 Tenable®, the exposure management company, announced today that Shelly Raban, senior cloud security researcher for Tenable, will give a presentation at fwd:cloudsec Europe 2024, taking place on 17 September, 2024 in Brussels, Belgium.During the session titled, “Who Watches the Watchmen? Stealing Credentials from Policy-as-Code Engines (and Beyond),” Raban will explore techniques adversaries use to exploit modern policy-as-code and Infrastructure-as-code (IaC) domain-specific languages (DSLs), compromise cloud identities and exfiltrate sensitive data. Raban will conclude her presentation by sharing various detection strategies that cyber defenders can implement to detect malicious activity. The session will be hosted in the Main Room from 2:50 - 3:10 pm CEST. More information on the event is available on the fwd:cloudsec Europe website. More information about Tenable Cloud Security is available at: https://www.tenable.com/products/tenable-cloud-security About TenableTenable® is the exposure management company, exposing and closing the cybersecurity gaps that erode business value, reputation and trust. The company’s AI-powered exposure management platform radically unifies security visibility, insight and action across the attack surface, equipping modern organizations to protect against attacks from IT infrastructure to cloud environments to critical infrastructure and everywhere in between. By protecting enterprises from security exposure, Tenable reduces business risk for more than 44,000 customers around the globe. Learn more at tenable.com. ###Media Contact:Tenabletenablepr@tenable.com Full Article
tech Moving through grief : proven techniques for finding your way after any loss / Gretchen Kubacky, PsyD. By library.gcpl.lib.oh.us Published On :: Overcoming your pain-proven strategies for grief recovery Coping with loss is difficult, but that doesn't mean you have to suffer alone. Based on the proven-effective acceptance and commitment therapy (ACT) treatment, Moving Through Grief provides simple and effective techniques to help you get unstuck and start living a rich and fulfilling life again, loss and all. ACT is all about embracing what hurts and committing to actions that will improve and enrich your life. Whether you're dealing with the loss of a loved one, your health, home, or even career, Moving Through Grief provides you with creative exercises that will help you work through your pain and reconnect with the things you love. In Moving Through Grief, you will learn: - How you can show up for your life and experience joy and satisfaction again, even as you work through the pain of your loss -Ddiscover how the six tools of ACT-values, committed action, acceptance, being present, cognitive diffusion, and self-as-context-can ease your pain and aid with the healing process - And make real progress towards feeling like yourself again with straightforward exercises, like identifying your values and setting realistic goals. Find out how ACT can change the way you relate to your pain with Moving Through Grief. Full Article
tech Adaptive Rec and Tech Showcase (November 13, 2024 11:30am) By events.umich.edu Published On :: Tue, 05 Nov 2024 10:21:55 -0500 Event Begins: Wednesday, November 13, 2024 11:30am Location: School of Kinesiology Building Organized By: School of Kinesiology Stop by to learn about and try out adaptive sport, recreation, and daily living equipment! Featuring demos from: --- Michigan Disability Rights Coalition Assistive Technology Program --- U-M Adaptive Sports & Fitness --- U-M KidSport Adaptive Summer Camps --- U-M Adaptive & Inclusive Sports Experience (UMAISE) Questions? Email Dr. Haylie Miller at millerhl@umich.edu. Full Article Exhibition
tech Genentech’s Pharma Technical Development (PTDU) Summer Internship Info Session (November 13, 2024 11:00am) By events.umich.edu Published On :: Wed, 13 Nov 2024 00:32:31 -0500 Event Begins: Wednesday, November 13, 2024 11:00am Location: Organized By: University Career Center Registration required to be invited to thevirtual info session happening on Wednesday November 13th from 11am-12pm PST. Register here - https://go.gene.com/PTDU-OSA-Info-Session-2024 During this Info Session, you will learn more about the Pharma Technical Development (PTDU) organization and the OutstandingStudent Award (OSA) program, which includes a paid 12-week long summer (May/June 2025 start dates) internship at Genentech which happens on-site in South San Francisco, California. Target Audience: This info session is for undergraduate junior or seniors majoring in STEM who are looking for a Summer 2025 internship. PTDU/OSA Award Details: Founded by Genentech to recognize outstanding students passionate about biotechnology OSA award recipients will receive a paid internship opportunity in PTDUat Genentech in South San Francisco, CA Recipients will also receive an additional $2,500 award EligibilityCriteria: Enrolled in junior or senior year of undergraduate degree Students from all majors with a passion for biotechnology are welcome Demonstrated interested in biotech, strong critical thinking, communication, and collaboration skills Experience working in research labs or industry is highly desirable Full Article Careers / Jobs
tech At ASHG, Illumina to Share Updates to Sequencing, Proteomics, and Single-Cell Technologies - Genetic Engineering & Biotechnology News By news.google.com Published On :: Sun, 03 Nov 2024 07:00:00 GMT At ASHG, Illumina to Share Updates to Sequencing, Proteomics, and Single-Cell Technologies Genetic Engineering & Biotechnology News Full Article
tech , Revolutionary Fluorescence Signal Removal Technology, Transforming CellScape Spatial Proteomics Platform - Business Wire By news.google.com Published On :: Fri, 08 Nov 2024 12:00:00 GMT , Revolutionary Fluorescence Signal Removal Technology, Transforming CellScape Spatial Proteomics Platform Business Wire Full Article
tech Seer Showcases Deep Proteomics Capabilities, Announces Co-Marketing Deal with Thermo Fisher Scientific - Genetic Engineering & Biotechnology News By news.google.com Published On :: Sun, 10 Nov 2024 16:09:58 GMT Seer Showcases Deep Proteomics Capabilities, Announces Co-Marketing Deal with Thermo Fisher Scientific Genetic Engineering & Biotechnology News Full Article
tech CTA Leverages Extensive Security Camera Network to Pilot Gun Detection Technology By www.transitchicago.com Published On :: Thu, 29 Aug 2024 05:00:00 GMT As part of its continued efforts to enhance the security of riders and our employees, the Chicago Transit Authority (CTA) today announced the pilot implementation of a proactive Artificial Intelligence (AI)-based technology that leverages existing security cameras to specifically monitor for and alert security officials to only brandished firearms. Full Article
tech Tech giants and tiny dogs By www.npr.org Published On :: Fri, 18 Mar 2022 23:44:04 +0000 What a business that makes ramps for wiener dogs teaches us about the massive power of tech giants. | Subscribe to our weekly newsletter here.Learn more about sponsor message choices: podcastchoices.com/adchoicesNPR Privacy Policy Full Article
tech Summer School 5: Tech and the innovator's dilemma By www.npr.org Published On :: Wed, 09 Aug 2023 17:43:39 +0000 For anyone running a business, technology is both threat and opportunity. Today, we run through techniques entrepreneurs can use to take advantage of new tech or defend against the dangers. It's not just about the product you're selling. It's about consumer psychology, and ethics, and taking calculated risks to navigate uncertainty.But, since this is Planet Money Summer School and we want to set your business on the path to riches, we're going to talk about how to use tech to dream big. Maybe more than anything, technology creates opportunities for the little guys where the big established companies can't be so nimble or have too much to lose. Take the classic concept of the innovator's dilemma: a company that innovated and succeeded, now faces a choice about any disruptive new technology. Do they risk tossing out their existing advantage and switch to the new tech, or play it safe and risk becoming obsolete?Most new technologies don't end up disrupting an industry. So it is totally rational for the big existing companies to ignore each new flash in the pan. But nobody wants to end up like Kodak: sticking with film while the digital camera takes off. So what to do? Our friendly professor has a few ideas – for the little guy and the big old company. He'll explain the shape of how new technology gets adopted, sometimes called the S curve. We'll also hear examples of what stops promising new tech from taking off: from dishwashers to driverless cars, and even the humble elevator.Learn more about sponsor message choices: podcastchoices.com/adchoicesNPR Privacy Policy Full Article