Archive for the ‘security’ category: Page 23

Jul 22, 2023

Microsoft to stop locking vital security logs behind $57-per-user monthly plan

Posted by in categories: business, education, government, security

Microsoft will expand access to important security log data after being criticized for locking detailed audit logs behind a Microsoft 365 enterprise plan that costs $57 per user per month. The logging updates will start rolling out “in September 2023 to all government and commercial customers,” the company said.

“Over the coming months, we will include access to wider cloud security logs for our worldwide customers at no additional cost. As these changes take effect, customers can use Microsoft Purview Audit to centrally visualize more types of cloud log data generated across their enterprise,” Microsoft announced yesterday.

Microsoft Purview Audit Premium is available on the $57-per-user Microsoft 365 E5 plan for businesses as well as the similar A5 education plan and G5 government plan. There’s also a Purview Audit Standard service that comes with a much wider range of plans, including the Microsoft 365 Business Basic tier that costs $6 per user per month.

Jul 21, 2023

Software system can find, track moving objects as small as a pixel

Posted by in categories: computing, drones, satellites, security, surveillance

Remember what it’s like to twirl a sparkler on a summer night? Hold it still and the fire crackles and sparks but twirl it around and the light blurs into a line tracing each whirl and jag you make.

A new patented software system developed at Sandia National Laboratories can find the curves of motion in streaming video and images from satellites, drones and far-range security cameras and turn them into signals to find and track moving objects as small as one . The developers say this system can enhance the performance of any remote sensing application.

“Being able to track each pixel from a distance matters, and it is an ongoing and challenging problem,” said Tian Ma, a computer scientist and co-developer of the system. “For physical security surveillance systems, for example, the farther out you can detect a possible threat, the more time you have to prepare and respond. Often the biggest challenge is the simple fact that when objects are located far away from the sensors, their size naturally appears to be much smaller. Sensor sensitivity diminishes as the distance from the target increases.”

Jul 20, 2023

A strong commercial space industry secures America’s future

Posted by in categories: economics, robotics/AI, security, space

The United States remains the only nation to have landed humans on the Moon and returned them safely to Earth. It is among the greatest achievements in human history, and it has significantly contributed to America’s leadership on the world stage. As a young man I had the opportunity of working on the Apollo program as an inspector with McDonnell Douglas. It was an exciting experience, and I am both grateful and humbled to have been a part of it.

The success of the Apollo Missions led to other significant accomplishments like building reusable Space Shuttles to test the limits of human space flight, prolonged robotic exploration of Mars, deploying a space-based telescope that can see far beyond our solar system, and conducting scientific research on the International Space Station. In more recent years we’ve seen an explosion in commercial space activity which has culminated in private companies conducting successful human space launches. This too is a significant milestone.

Our investment in space is critical to our national security, scientific discovery, technological advancement, and economic competitiveness. So much of our modern-day life is dependent on space making a bank transaction, for example, or even a phone call, these days requires using some type of space-faring technology. And while NASA’s leadership of our space efforts will continue to be indispensable, the U.S. commercial space industry’s role in space exploration will grow larger and more critical. American companies must continue to lead the way.

Jul 13, 2023

Zachary Kallenborn — Existential Terrorism

Posted by in categories: existential risks, mathematics, policy, security, terrorism

“Some men just want to watch the world burn.” Zachary Kallenborn discusses acts of existential terrorism, such as the Tokyo subway sarin attack by Aum Shinrikyo in 1995, which killed or injured over 1,000 people.

Zachary kallenborn is a policy fellow in the center for security policy studies at george mason university, research affiliate in unconventional weapons and technology at START, and senior risk management consultant at the ABS group.

Continue reading “Zachary Kallenborn — Existential Terrorism” »

Jul 12, 2023

Will AI Take Over The World?

Posted by in categories: robotics/AI, security

AI is growing in its capability, and threatens the way we live and our security. Other technologies like Web3/metaverse and defi are not as threatening, and are shrinking in importance as interest rates rise.

Jul 6, 2023

Dr. Behnaam Aazhang, Ph.D. — Director, Rice Neuroengineering Initiative (NEI), Rice University

Posted by in categories: biotech/medical, computing, engineering, information science, neuroscience, security

Restoring And Extending The Capabilities Of The Human Brain — Dr. Behnaam Aazhang, Ph.D. — Director, Rice Neuroengineering Initiative, Rice University

Dr. Behnaam Aazhang, Ph.D. ( is the J.S. Abercrombie Professor, Electrical and Computer Engineering, and Director, Rice Neuroengineering Initiative (NEI —, Rice University, where he has broad research interests including signal and data processing, information theory, dynamical systems, and their applications to neuro-engineering, with focus areas in (i) understanding neuronal circuits connectivity and the impact of learning on connectivity, (ii) developing minimally invasive and non-invasive real-time closed-loop stimulation of neuronal systems to mitigate disorders such as epilepsy, Parkinson, depression, obesity, and mild traumatic brain injury, (iii) developing a patient-specific multisite wireless monitoring and pacing system with temporal and spatial precision to restore the healthy function of a diseased heart, and (iv) developing algorithms to detect, predict, and prevent security breaches in cloud computing and storage systems.

Continue reading “Dr. Behnaam Aazhang, Ph.D. — Director, Rice Neuroengineering Initiative (NEI), Rice University” »

Jul 1, 2023

Moorebot Scout

Posted by in categories: drones, robotics/AI, security

Now that’s cool. I’d like one to keep harass me cats and dog haha actually it be useful. Am wondering what ever happened to the indoor Amazon security drone.

Advanced family robots from Moorebot.

Jun 27, 2023

Taking Quantum Security to New Heights: A New Secure and Fast Source-DI QRNG Protocol

Posted by in categories: particle physics, quantum physics, security

The use of single-photon.

A photon is a particle of light. It is the basic unit of light and other electromagnetic radiation, and is responsible for the electromagnetic force, one of the four fundamental forces of nature. Photons have no mass, but they do have energy and momentum. They travel at the speed of light in a vacuum, and can have different wavelengths, which correspond to different colors of light. Photons can also have different energies, which correspond to different frequencies of light.

Jun 26, 2023

Grid Down Power Up — What You Can Do with David Tice

Posted by in categories: health, security

What you can do to right now in just a few minutes to help secure the grid. See special quest producer David Tice explain how he is using the Grid Down Power Up movie, narrated by Dennis Quad to give us hope for a secure future. Do it for the kids!

Grid Down Power Up:

Continue reading “Grid Down Power Up — What You Can Do with David Tice” »

Jun 26, 2023

How Generative AI Can Dupe SaaS Authentication Protocols — And Effective Ways To Prevent Other Key AI Risks in SaaS

Posted by in categories: business, robotics/AI, security

Security and risk teams are already overwhelmed protecting their SaaS estate (which has now become the operating system of business) from common vulnerabilities such as misconfigurations and over permissioned users. This leaves little bandwidth to assess the AI tool threat landscape, unsanctioned AI tools currently in use, and the implications for SaaS security.

With threats emerging outside and inside organizations, CISOs and their teams must understand the most relevant AI tool risks to SaaS systems — and how to mitigate them.

Page 23 of 139First2021222324252627Last