tech

A1: Embracing Web 2.0 Technologies to Grease the Wheels of Team Cohesion

This session will review how a number of Web 2.0 technologies that are both internally and externally hosted and can be used to future proof the way that teams in institutions can work effectively together. The session was facilitated by Andy Ramsden and Marieke Guy, University of Bath.




tech

B2: People, Processes and Projects - How the Culture of an Organisation can Impact on Technical System Implementation

Claire Gibbons, Web Officer (Marketing and Communications), University of Bradford and Russell Allen, Project Manager (Portal and CMS), Management Information Services, University of Bradford will help delegates gain an understanding of 'organisational culture' and the effect this can have on change management and/or system implementation.




tech

B4: Search Technology within the University Environment

William Mackintosh, Web Manager, University of York and Damon Querry, Senior Web Development Officer, University of Newcastle upon Tyne will be looking at Search Technology within the University Environmen. The University of Newcastle upon Tyne has implemented a Google Search Appliance. The University of York is committed to the purchase of the Google Mini. The session will discuss the reasons for selecting these products and how they add value to an institution's Web site.




tech

Plenary Talk 1: Real World Emerging Technologies

Chris Scott from Headscape gave a talk on "Real World Emerging Technologies". Falling University entries and top-up fees have contributed to a step-change in the operational environment for the HE sector. This change has resulted in an acute pressure on institutions to innovate for success. This presentation will explore some opportunities for institutions to capitalise on new and emerging web technologies in response to such changes. While there is much hype about Web 2.0, there are some genuine opportunities for straightforward applications of Web 2.0 technologies in institutions that are low risk and low cost, and have potential for significant returns if they are introduced and managed correctly and the right people are involved.




tech

Data Security, Actual AI and Law’s Acceptance of Tech Spell the New Forefront of Law

Zev Eigen considers artificial intelligence and predictive coding to be tools in making better informed hiring decisions. 

Corporate Counsel

View Article




tech

4 Places BigLaw Is Putting Its Tech Budget Dollars

Scott Rechtschaffen talks about cybersecurity enhancements and the importance of investing in technology. 

Law360

View Article 




tech

ILTACON 2018: Emerging Roles in Legal Technology (Part 1)

Aaron Crews explains how data scientists can help attorneys with efficiencies and innovations both internally and externally.

Legal Executive Institute

View Article 




tech

ILTACON 2018: Emerging Roles in Legal Technology (Part 2)

Aaron Crews offers advice on how law firms' innovation efforts can be more successful.

Legal Executive Institute

View Article 




tech

Some law schools offer tech programs to help students find jobs, but does it work?

Jason Dirkx and Scott Rechtschaffen consider the intersection of technology and law degrees. 

ABA Journal

View Article 

 




tech

Littler’s Chief Knowledge Officer and Cornell Law Students Discuss How Hands-on Tech Training Enhances the Practice of Law

In this podcast, Littler’s Chief Knowledge Officer, Scott Rechtschaffen, talks with his Cornell Law School students about the potential for lawyers to use software to develop practical tools for the delivery of legal services. During their semester, the students experienced how to take their growing knowledge of the law, identify a problem, coordinate with subject matter and technical experts, and create a legal app designed to assist users, who might be either clients or fellow attorneys.




tech

Why the Legal Technologist Career Path Presents Both Opportunity and Danger

Aaron Crews describes the various duties of legal technologists.

Legaltech News

View Article 




tech

Legal Tech’s Predictions for Business of Law and ALSPs in 2021

Scott Forman explains how firms must adopt integrated technology in order to operate collectively.

LegalTech News

View Article (Subscription required.)




tech

As employers consider strategies for adapting the size of their workforces to meet changing business demands and technologies, what guidance should be top-of-mind?




tech

The ADA Turns 34: The Intersection of Technology, AI, and Individuals with Disabilities

On July 26, 1990, the Americans with Disabilities Act (ADA) was signed into law. On the recent 34th anniversary of the ADA, U.S. Equal Employment Opportunity Commission (EEOC) General Counsel Karla Gilbride and U.S.




tech

The ADA turns 34: The intersection of technology, AI, and individuals with disabilities

Bradford J. Kelley and Sean O'Brien discuss how, on the 34th anniversary of the Americans with Disabilities Act (ADA), the Equal Employment Opportunity Commission and Justice Department emphasize their commitment to ensuring that emerging technologies and AI comply with ADA standards.

Westlaw Today

View (Subscription required.)




tech

Artificial Intelligence, Technology and the Evolving Workplace




tech

OFCCP Preparing to Scrutinize Federal Contractors’ Use of AI Hiring Tools and Other Technology-based Selection Procedures

On August 24, 2023, the Office of Management and Budget approved a request from the U.S. Department of Labor’s Office of Federal Contract Compliance Programs (OFCCP) to revise the “Itemized Listing” that OFCCP uses to collect information from federal contractors that are selected for supply or service audits. Among the changes that have been approved is a new requirement that audited contractors:




tech

The CFPB Cautions Employers About Using Technology to Track, Assess, and Evaluate Workers

  • Employers should be mindful of whether workforce tracking technology, including AI, may provide information, such as employee performance scores, that triggers FCRA compliance.
  • The FCRA protects both job applicants and employees.
  • Education about basics of the FCRA is key for all employers, including in-house counsel, due to the proliferation of such tracking and scoring technology.




tech

TechNet and Littler’s Workplace Policy Institute Support the Illinois Senate’s Passage of Biometric Information Privacy Act Reform Bill

Update: On August 2, 2024, Illinois Governor J.B. Pritzker signed SB 2979 into law, reforming the liability guidelines under the Illinois Biometric Information Privacy Act.

CHICAGO (April 11, 2024) – Today, the Illinois Senate passed SB 2979, which would reform the liability guidelines under the state’s Biometric Information Privacy Act (BIPA). The bill marks an important milestone in the broader effort to resolve BIPA’s vague statutory language and courts’ expansive interpretations of the law, which have posed a threat to businesses that capture biometric information.




tech

Legal Tech's Milestones for Cybersecurity & Data Privacy in 2023

Denise Backhouse shares how best to alleviate data risks that many e-discovery professionals may face in the new year.

Legaltech News

View (Subscription required.)




tech

Legal Tech's Predictions for the Business of Law in 2024

Scott Forman gives his predictions for legal technology and data analytics tools, especially towards generative AI point solutions, in 2024.

Legaltech News

View (Subscription required.)




tech

ETSI publishes a white paper on Network Transformation - Building on key technologies for 5G

ETSI publishes a white paper on Network Transformation - Building on key technologies for 5G

SDN NFV World Congress, The Hague, 14 October 2019

ETSI is proud to announce the availability of a new white paper, entitled Network Transformation: Orchestration, Network and Service Management Framework, written by several of its Industry Specification Groups’ (ISG) Chairs. These groups have released specifications on key building block technologies for next-generation networks, feeding the 3GPP 5G specifications.

Read More...




tech

ETSI releases a Technical Report on Global Acceptance of EU Trust Services

ETSI releases a Technical Report on Global Acceptance of EU Trust Services

Sophia Antipolis, 16 January 2020

The ETSI Technical Committee on Electronic Signatures and Infrastructures (TC ESI) is pleased to release the ETSI TR 103684 technical report. This report addresses existing trust service infrastructures that operate in different regions of the world and their possible mutual recognition/global acceptance. The report identifies ways to facilitate cross recognition between EU trust services and trust services from other schemes. The trust services are based on ETSI standards and support the eIDAS Regulation (EU) No 910/2014.

Read More...




tech

ETSI releases a Technical Report on autonomic network management and control applying machine learning and other AI algorithms

ETSI releases a Technical Report on autonomic network management and control applying machine learning and other AI algorithms

Sophia Antipolis, 5 March 2020

The ETSI Technical Committee on Core Network and Interoperability Testing (TC INT) has just released a Technical Report, ETSI TR 103 626, providing a mapping of architectural components for autonomic networking, cognitive networking and self-management. This architecture will serve the self-managing Future Internet.

The ETSI TR 103 626 provides a mapping of architectural components developed in the European Commission (EC) WiSHFUL and ORCA Projects, using the ETSI Generic Autonomic Networking Architecture (GANA) model.

The objective is to illustrate how the ETSI GANA model specified in the ETSI specification TS 103 195-2 can be implemented when using the components developed in these two projects. The Report also shows how the WiSHFUL architecture augmented with virtualization and hardware acceleration techniques can implement the GANA model. This will guide implementers of autonomics components for autonomic networks in their optimization of their GANA implementations.

The TR addresses autonomic decision-making and associated control-loops in wireless network architectures and their associated management and control architectures. The mapping of the architecture also illustrates how to implement self-management functionality in the GANA model for wireless networks, taking into consideration another Report ETSI TR 103 495, where GANA cognitive algorithms for autonomics, such as machine learning and other AI algorithms, can be applied.




tech

ETSI releases Technical Report on requirements for smart lifts for IoT

ETSI releases Technical Report on requirements for smart lifts for IoT

Sophia Antipolis, 4 June 2020

To facilitate upcoming standards, the ETSI SmartM2M technical committee has released ETSI TR 103 546, a Technical Report on smart lifts, collecting and developing the type and range of data which should be exchanged between lifts and their relevant management applications. This study paves the way for technical requirements to monitor the activities and the performance of such lifts and describe their interaction with IoT devices and applications.

Read More...




tech

ETSI releases Technical Report on Citizen Requirements for Smart Cities

ETSI releases Technical Report on Citizen Requirements for Smart Cities

Sophia Antipolis, 9 November 2020

The ETSI Human Factors Technical Committee has released ETSI TR 103 455, a Technical Report that assesses the different citizen-related issues that smart city-related standardization in the ICT domain needs to address. These include fundamental aspects such as accessibility, usability, interoperability, personal data protection and security, and how services to citizens are to be designed to maximize benefits to the community. The study gives an overview of existing ETSI and other SDOs standards in that field, including ETSI community indicators. It aligns well with the UN Sustainable Development Goal 11 "Make cities inclusive, safe, resilient and sustainable".

Read More...




tech

ETSI releases a white paper on future ICT technology trends

ETSI releases a white paper on future ICT technology trends

Sophia Antipolis, 10 May 2021

“Information and Communications Technology (ICT) is an exciting and dynamic area, that is in constant innovation, through the evolution of existing concepts and technologies but also through the emergence of disruptive technologies and even sometimes unexpected new use cases”.

Read More...




tech

ETSI launches first specification for the 5th Generation Fixed Network, F5G technology landscape

ETSI launches first specification for the 5th Generation Fixed Network, F5G technology landscape

Sophia Antipolis, 23 September 2021

ETSI's 5th Generation Fixed Network group (F5G ISG) has just released its first specification, ETSI GS F5G 003, entitled F5G Technology Landscape. In this specification, the ISG studies the technical requirements, existing standards and gaps for 10 different new use cases, for home, enterprises or industrial needs.

ETSI GS F5G 003 use cases include PON (passive optical network) on-premises and passive optical LAN. In this case, a PON system could connect end devices (like HDTV, HD surveillance cameras and VR/AR helmets) and provide higher data rate, better coordination and controlled latency than current Ethernet and Wi-Fi mesh.

Read More...




tech

ETSI releases two Technical Reports to support US NIST standards for post-quantum cryptography

ETSI releases two Technical Reports to support US NIST standards for post-quantum cryptography

Sophia Antipolis, 6 October 2021

In 2016 the US National Institute of Standards and Technology (NIST) announced their intention to develop new standards for post-quantum cryptography. They subsequently initiated a competition-like standardization process with a call for proposals for quantum-safe digital signatures, public-key encryption schemes, and key encapsulation mechanisms. NIST have stated that they intend to select quantum-safe schemes for standardization at the end of the current, third round of evaluation.

Read More...




tech

World’s first non-cellular 5G technology, ETSI DECT-2020, gets ITU-R approval, setting example of new era connectivity

World’s first non-cellular 5G technology, ETSI DECT-2020, gets ITU-R approval, setting example of new era connectivity

Sophia Antipolis, 19 October 2021

ETSI DECT-2020 NR, the world’s first non-cellular 5G technology standard, has been recognized by the WP5D of the International Telecommunication Union’s Radiocommunication Sector (ITU-R) and included as part of the 5G standards in IMT-2020 technology recommendation. Dr. Günter Kleindl, Chair of the ETSI Technical Committee DECT, says: “With our traditional DECT standard we already received IMT-2000 approval by ITU-R twenty-one years ago, but the requirements for 5G were so much higher, that we had to develop a completely new, but compatible, radio standard.” Released last year, the standard sets an example of future connectivity: the infrastructure-less and autonomous, decentralized technology is designed for massive IoT networks for enterprises. It has no single points of failure and is accessible to anyone, costing only a fraction of the cellular networks both in dollars and in carbon footprint.

Read More...




tech

ETSI Top 10 Webinars in 2021 - Starring: DECT2020, Ultra-Wide Band radio technology, IPv6, MEC

ETSI Top 10 Webinars in 2021 - Starring: DECT2020, Ultra-Wide Band radio technology, IPv6, MEC.

Sophia Antipolis, 8 December 2021

As 2021 comes to an end, we have selected for you our most popular webinars of the year. If you missed them, listen to the recorded presentations and their Q&A sessions, deep dive into the non-cellular 5G radio DECT2020-NR, IPv6, Multi-access Edge Computing, Open Source MANO and much more.

Read More...




tech

ETSI launches a new group on Terahertz, a candidate technology for 6G

ETSI launches a new group on Terahertz, a candidate technology for 6G

Sophia Antipolis, 12 December 2022

On 8 December the newly launched ETSI Industry Specification Group on Terahertz (ISG THz) held its kick-off meeting and decided on work priorities for this candidate technology for 6G.

“ISG THz provides an opportunity for ETSI members to coordinate their pre-standards research efforts on THz technology across various European collaborative projects, extended with relevant global initiatives, a move towards paving the way for future standardization of the technology,” outlines Thomas Kürner, Chair of ISG THz.

Read More...




tech

ETSI releases new report enabling more transparent security techniques

Sophia Antipolis, 6 March 2023

The ETSI group on Encrypted Traffic Integration (ISG ETI) is pleased to announce the release of the group report GR-ETI-002 “Requirements definition and analysis”, the next step for the problems previously outlined in the report GR-ETI-001 “Problem Statement”.

Read More...




tech

ETSI’s Securing AI group becomes a Technical Committee to help ETSI to answer the EU AI Act

Sophia Antipolis, 17 October 2023

As the second term of the Industry Specification Group Securing AI (ISG SAI) is scheduled to conclude in Q4 2023, and in line with ETSI's commitment to AI and SAI, the group has suggested the closure of ISG SAI, with its activity transferred to  a new ETSI Technical Committee, TC SAI.

Read More...




tech

ETSI’s Security Conference Navigates Next Generation Technologies

Sophia Antipolis, 19 October 2023

ETSI’s well-known Security Conference came to a close today with nearly 250 onsite attendees from 29 countries. This year’s event focused on security research and global security standards in action, considering broader aspects such as attracting the next generation of cybersecurity standardization professionals and supporting SMEs.

Read More...




tech

ETSI Launches a New Group for Integrated Sensing and Communications, a Candidate Technology for 6G

Sophia Antipolis, 21 November 2023

ETSI is delighted to announce the launch of the Industry Specification Group for Integrated Sensing and Communications (ISG ISAC). This group will establish the technical foundations for ISAC technology development and standardization in 6G. 87 participants from both the industrial sphere and the academic sphere took an active part in the kick-off meeting, which was held at ETSI premises, in Sophia Antipolis, France, on 17 November 2023.

Read More...




tech

ETSI Releases Ground-breaking Technical Report to mitigate technology-enabled Coercive Control

Sophia Antipolis, 31 January 2024

The European Telecommunications Standards Institute (ETSI) has published a significant new technical report, "ETSI TR 103 936 V1.1.1 (2024-01): Cyber Security; Implementing Design Practices to Mitigate Consumer IoT-Enabled Coercive Control". This pioneering document addresses the increasingly important issue of safeguarding individuals from coercive control through the misuse of consumer Internet of Things (IoT) devices.

Coercive control encompasses a range of abusive acts such as security breaches, privacy invasions, harassment, physical assault, and other patterns of behaviour that can limit autonomy or cause emotional harm to potential targets.

Read More...




tech

Cybersecurity Snapshot: Apply Zero Trust to Critical Infrastructure’s OT/ICS, CSA Advises, as Five Eyes Spotlight Tech Startups’ Security

Should critical infrastructure orgs boost OT/ICS systems’ security with zero trust? Absolutely, the CSA says. Meanwhile, the Five Eyes countries offer cyber advice to tech startups. Plus, a survey finds “shadow AI” weakening data governance. And get the latest on MFA methods, CISO trends and Uncle Sam’s AI strategy.

Dive into six things that are top of mind for the week ending Nov. 1.

1 - Securing OT/ICS in critical infrastructure with zero trust

As their operational technology (OT) computing environments become more digitized, converged with IT systems and cloud-based, critical infrastructure organizations should beef up their cybersecurity by adopting zero trust principles.

That’s the key message of the Cloud Security Alliance’s “Zero Trust Guidance for Critical Infrastructure,” which focuses on applying zero trust methods to OT and industrial control system (ICS) systems.

While OT/ICS environments were historically air gapped, that’s rarely the case anymore. “Modern systems are often interconnected via embedded wireless access, cloud and other internet-connected services, and software-as-a-service (SaaS) applications,” reads the 64-page white paper, which was published this week.

The CSA hopes the document will help cybersecurity teams and OT/ICS operators enhance the way they communicate and collaborate.

 

 

Among the topics covered are:

  • Critical infrastructure’s unique threat vectors
  • The convergence of IT/OT with digital transformation
  • Architecture and technology differences between OT and IT

The guide also outlines this five-step process for implementing zero trust in OT/ICS environments:

  • Define the surface to be protected
  • Map operational flows
  • Build a zero trust architecture
  • Draft a zero trust policy
  • Monitor and maintain the environment

A zero trust strategy boosts the security of critical OT/ICS systems by helping teams “keep pace with rapid technological advancements and the evolving threat landscape,” Jennifer Minella, the paper’s lead author, said in a statement.

To get more details, read:

For more information about OT systems cybersecurity, check out these Tenable resources: 

2 - Five Eyes publish cyber guidance for tech startups

Startup tech companies can be attractive targets for hackers, especially if they have weak cybersecurity and valuable intellectual property (IP).

To help startups prevent cyberattacks, the Five Eyes countries this week published cybersecurity guides tailored for these companies and their investors.

“This guidance is designed to help tech startups protect their innovation, reputation, and growth, while also helping tech investors fortify their portfolio companies against security risks," Mike Casey, U.S. National Counterintelligence and Security Center Director, said in a statement.

These are the top five cybersecurity recommendations from Australia, Canada, New Zealand, the U.S. and the U.K. for tech startups:

  • Be aware of threat vectors, including malicious insiders, insecure IT and supply chain risk.
  • Identify your most critical assets and conduct a risk assessment to pinpoint vulnerabilities.
  • Build security into your products by managing intellectual assets and IP; monitoring who has access to sensitive information; and ensuring this information’s protection.
  • Conduct due diligence when choosing partners and make sure they’re equipped to protect the data you share with them.
  • Before you expand abroad, prepare and become informed about these new markets by, for example, understanding local laws in areas such as IP protection and data protection.

 

 

“Sophisticated nation-state adversaries, like China, are working hard to steal the intellectual property held by some of our countries’ most innovative and exciting startups,” Ken McCallum, Director General of the U.K.’s MI5, said in a statement.

To get more details, check out these Five Eyes’ cybersecurity resources for tech startups:

3 - Survey: Unapproved AI use impacting data governance

Employees’ use of unauthorized AI tools is creating compliance issues in a majority of organizations. Specifically, it makes it harder to control data governance and compliance, according to almost 60% of organizations surveyed by market researcher Vanson Bourne.

“Amid all the investment and adoption enthusiasm, many organisations are struggling for control and visibility over its use,” reads the firm’s “AI Barometer: October 2024” publication. Vanson Bourne polls 100 IT and business executives each month about their AI investment plans.

To what extent do you think the unsanctioned use of AI tools is impacting your organisation's ability to maintain control over data governance and compliance?

(Source: Vanson Bourne’s “AI Barometer: October 2024”)

Close to half of organizations surveyed (44%) believe that at least 10% of their employees are using unapproved AI tools.

On a related front, organizations are also grappling with the issue of software vendors that unilaterally and silently add AI features to their products, especially to their SaaS applications.

While surveyed organizations say they’re reaping advantages from their AI usage, “such benefits are dependent on IT teams having the tools to address the control and visibility challenges they face,” the publication reads.

For more information about the use of unapproved AI tools, an issue also known as “shadow AI,” check out:

VIDEO

Shadow AI Risks in Your Company

 

4 - NCSC explains nuances of multi-factor authentication

Multi-factor authentication (MFA) comes in a variety of flavors, and understanding the differences is critical for choosing the right option for each use case in your organization.

To help cybersecurity teams better understand the different MFA types and their pluses and minuses, the U.K. National Cyber Security Centre (NCSC) has updated its MFA guidance.

“The new guidance explains the benefits that come with strong authentication, while also minimising the friction that some users associate with MFA,” reads an NCSC blog.

 

 

In other words, what type of MFA method to use depends on people’s roles, how they work, the devices they use, the applications or services they’re accessing and so on.

Topics covered include:

  • Recommended types of MFA, such as FIDO2 credentials, app-based and hardware-based code generators and message-based methods
  • The importance of using strong MFA to secure users’ access to sensitive data
  • The role of trusted devices in boosting and simplifying MFA
  • Bad practices that weaken MFA’s effectiveness, such as:
    • Retaining weaker, password-only authentication protocols for legacy services
    • Excluding certain accounts from MFA requirements because their users, usually high-ranking officials, find MFA inconvenient

To get more details, read:

For more information about MFA:

5 - U.S. gov’t outlines AI strategy, ties it to national security 

The White House has laid out its expectations for how the federal government ought to promote the development of AI in order to safeguard U.S. national security.

In the country’s first-ever National Security Memorandum (NSM) on AI, the Biden administration said the federal government must accomplish the following:

  • Ensure the U.S. is the leader in the development of safe, secure and trustworthy AI
  • Leverage advanced AI technologies to boost national security
  • Advance global AI consensus and governance

“The NSM’s fundamental premise is that advances at the frontier of AI will have significant implications for national security and foreign policy in the near future,” reads a White House statement.

 

 

The NSM’s directives to federal agencies include:

  • Help improve the security of chips and support the development of powerful supercomputers to be used by AI systems.
  • Help AI developers protect their work against foreign spies by providing them with cybersecurity and counterintelligence information.
  • Collaborate with international partners to create a governance framework for using AI in a way that is ethical, responsible and respects human rights. 

The White House also published a complementary document titled “Framework To Advance AI Governance and Risk Management in National Security,” which adds implementation details and guidance for the NSM.

6 - State CISOs on the frontlines of AI security

As the cybersecurity risks and benefits of AI multiply, most U.S. state CISOs find themselves at the center of their governments' efforts to craft AI security strategies and policies.

That’s according to the “2024 Deloitte-NASCIO Cybersecurity Study,” which surveyed CISOs from all 50 states and the District of Columbia.

Specifically, 88% of state CISOs reported being involved in the development of a generative AI strategy, while 96% are involved with creating a generative AI security policy.

However, their involvement in AI cybersecurity matters isn’t necessarily making them optimistic about their states’ ability to fend off AI-boosted attacks.

None said they feel “extremely confident” that their state can prevent AI-boosted attacks, while only 10% reported feeling “very confident.” The majority (43%) said they feel “somewhat confident” while the rest said they are either “not very confident” or “not confident at all.”

 

 

Naturally, most state CISOs see AI-enabled cyberthreats as significant, with 71% categorizing them as either “very high threat” (18%) or “somewhat high threat” (53%).

At the same time, state CISOs see the potential for AI to help their cybersecurity efforts, as 41% are already using generative AI for cybersecurity, and another 43% have plans to do so by mid-2025.

Other findings from the "2024 Deloitte-NASCIO Cybersecurity Study" include:

  • 4 in 10 state CISOs feel their budget is insufficient.
  • Almost half of respondents rank cybersecurity staffing as one of the top challenges.
  • In the past two years, 23 states have hired new CISOs, as the median tenure of a state CISO has dropped to 23 months, down from 30 months in 2022.
  • More state CISOs are taking on privacy protection duties — 86% are responsible for privacy protection, up from 60% two years ago.

For more information about CISO trends:




tech

OSC Investor Alert: Nova Tech Ltd

TORONTO – The Ontario Securities Commission (OSC) is warning investors that Nova Tech Ltd (NovaTech), which operates the website www.novatechfx.com, is not registered with the OSC in any capacity.




tech

Canadian securities regulators warn public about unregistered trading platform Nova Tech Ltd

Toronto – The Canadian Securities Administrators (CSA) is warning the public that Nova Tech Ltd (NovaTech), which operates the website www.novatechfx.com, is not registered with a securities regulator in any province or territory in Canada.




tech

Tenable Research to Discuss Cloud Security Attack Techniques and Detection Strategies at fwd:cloudsec Europe 2024

Tenable®, the exposure management company, announced today that Shelly Raban, senior cloud security researcher for Tenable, will give a presentation at fwd:cloudsec Europe 2024, taking place on 17 September, 2024 in Brussels, Belgium.

During the session titled, “Who Watches the Watchmen? Stealing Credentials from Policy-as-Code Engines (and Beyond),” Raban will explore techniques adversaries use to exploit modern policy-as-code and Infrastructure-as-code (IaC) domain-specific languages (DSLs), compromise cloud identities and exfiltrate sensitive data. Raban will conclude her presentation by sharing various detection strategies that cyber defenders can implement to detect malicious activity. 

The session will be hosted in the Main Room from 2:50 - 3:10 pm CEST. 

More information on the event is available on the fwd:cloudsec Europe website

More information about Tenable Cloud Security is available at: https://www.tenable.com/products/tenable-cloud-security 

About Tenable

Tenable® is the exposure management company, exposing and closing the cybersecurity gaps that erode business value, reputation and trust. The company’s AI-powered exposure management platform radically unifies security visibility, insight and action across the attack surface, equipping modern organizations to protect against attacks from IT infrastructure to cloud environments to critical infrastructure and everywhere in between. By protecting enterprises from security exposure, Tenable reduces business risk for more than 44,000 customers around the globe. Learn more at tenable.com

###

Media Contact:

Tenable

tenablepr@tenable.com




tech

Moving through grief : proven techniques for finding your way after any loss / Gretchen Kubacky, PsyD.

Overcoming your pain-proven strategies for grief recovery Coping with loss is difficult, but that doesn't mean you have to suffer alone. Based on the proven-effective acceptance and commitment therapy (ACT) treatment, Moving Through Grief provides simple and effective techniques to help you get unstuck and start living a rich and fulfilling life again, loss and all. ACT is all about embracing what hurts and committing to actions that will improve and enrich your life. Whether you're dealing with the loss of a loved one, your health, home, or even career, Moving Through Grief provides you with creative exercises that will help you work through your pain and reconnect with the things you love. In Moving Through Grief, you will learn: - How you can show up for your life and experience joy and satisfaction again, even as you work through the pain of your loss -Ddiscover how the six tools of ACT-values, committed action, acceptance, being present, cognitive diffusion, and self-as-context-can ease your pain and aid with the healing process - And make real progress towards feeling like yourself again with straightforward exercises, like identifying your values and setting realistic goals. Find out how ACT can change the way you relate to your pain with Moving Through Grief.




tech

Adaptive Rec and Tech Showcase (November 13, 2024 11:30am)

Event Begins: Wednesday, November 13, 2024 11:30am
Location: School of Kinesiology Building
Organized By: School of Kinesiology


Stop by to learn about and try out adaptive sport, recreation, and daily living equipment!

Featuring demos from:
--- Michigan Disability Rights Coalition Assistive Technology Program
--- U-M Adaptive Sports & Fitness
--- U-M KidSport Adaptive Summer Camps
--- U-M Adaptive & Inclusive Sports Experience (UMAISE)

Questions? Email Dr. Haylie Miller at millerhl@umich.edu.




tech

Genentech’s Pharma Technical Development (PTDU) Summer Internship Info Session (November 13, 2024 11:00am)

Event Begins: Wednesday, November 13, 2024 11:00am
Location:
Organized By: University Career Center


Registration required to be invited to thevirtual  info session happening on Wednesday November 13th from 11am-12pm PST. Register here -  https://go.gene.com/PTDU-OSA-Info-Session-2024 During this Info Session, you will learn more about the Pharma Technical Development (PTDU) organization and the OutstandingStudent Award (OSA) program, which includes a paid 12-week long summer (May/June 2025 start dates) internship at Genentech which happens on-site in South San Francisco, California.  Target Audience: This info session is for undergraduate junior or seniors majoring in STEM who are looking for a Summer 2025 internship.  PTDU/OSA Award Details: 
Founded by Genentech to recognize outstanding students passionate about biotechnology
OSA award recipients will receive a paid internship opportunity in PTDUat Genentech in South San Francisco, CA
Recipients will also receive an additional $2,500 award
 EligibilityCriteria:
Enrolled in junior or senior year of undergraduate degree
Students from all majors with a passion for biotechnology are welcome
Demonstrated interested in biotech, strong critical thinking, communication, and collaboration skills
Experience working in research labs or industry is highly desirable







tech

CTA Leverages Extensive Security Camera Network to Pilot Gun Detection Technology

As part of its continued efforts to enhance the security of riders and our employees, the Chicago Transit Authority (CTA) today announced the pilot implementation of a proactive Artificial Intelligence (AI)-based technology that leverages existing security cameras to specifically monitor for and alert security officials to only brandished firearms.




tech

Tech giants and tiny dogs

What a business that makes ramps for wiener dogs teaches us about the massive power of tech giants. | Subscribe to our weekly newsletter here.

Learn more about sponsor message choices: podcastchoices.com/adchoices

NPR Privacy Policy




tech

Summer School 5: Tech and the innovator's dilemma

For anyone running a business, technology is both threat and opportunity. Today, we run through techniques entrepreneurs can use to take advantage of new tech or defend against the dangers. It's not just about the product you're selling. It's about consumer psychology, and ethics, and taking calculated risks to navigate uncertainty.

But, since this is Planet Money Summer School and we want to set your business on the path to riches, we're going to talk about how to use tech to dream big. Maybe more than anything, technology creates opportunities for the little guys where the big established companies can't be so nimble or have too much to lose.

Take the classic concept of the innovator's dilemma: a company that innovated and succeeded, now faces a choice about any disruptive new technology. Do they risk tossing out their existing advantage and switch to the new tech, or play it safe and risk becoming obsolete?

Most new technologies don't end up disrupting an industry. So it is totally rational for the big existing companies to ignore each new flash in the pan. But nobody wants to end up like Kodak: sticking with film while the digital camera takes off. So what to do?

Our friendly professor has a few ideas – for the little guy and the big old company. He'll explain the shape of how new technology gets adopted, sometimes called the S curve. We'll also hear examples of what stops promising new tech from taking off: from dishwashers to driverless cars, and even the humble elevator.

Learn more about sponsor message choices: podcastchoices.com/adchoices

NPR Privacy Policy