Reading view
The world’s toughest race starts Saturday, and it’s delightfully hard to call this year
![The peloton passing through a sunflowers field during the stage eight of the 110th Tour de France in 2023.](https://cdn.arstechnica.net/wp-content/uploads/2024/06/GettyImages-1527198417-800x533.jpg)
Enlarge / The peloton passing through a sunflowers field during the stage eight of the 110th Tour de France in 2023. (credit: David Ramos/Getty Images)
Most readers probably did not anticipate seeing a Tour de France preview on Ars Technica, but here we are. Cycling is a huge passion of mine and several other staffers, and this year, a ton of intrigue surrounds the race, which has a fantastic route. So we're here to spread Tour fever.
The three-week race starts Saturday, paradoxically in the Italian region of Tuscany. Usually, there is a dominant rider, or at most two, and a clear sense of who is likely to win the demanding race. But this year, due to rider schedules, a terrible crash in early April, and new contenders, there is more uncertainty than usual. A solid case could be made for at least four riders to win this year's Tour de France.
For people who aren't fans of pro road cycling—which has to be at least 99 percent of the United States—there's a great series on Netflix called Unchained to help get you up to speed. The second season, just released, covers last year's Tour de France and introduces you to most of the protagonists in the forthcoming edition. If this article sparks your interest, I recommend checking it out.
T-Mobile users enraged as “Un-carrier” breaks promise to never raise prices
![Illustration of T-Mobile customers protesting price hikes](https://cdn.arstechnica.net/wp-content/uploads/2024/06/tmobile-uncontract-furious-800x450.jpg)
Enlarge (credit: Aurich Lawson)
In 2017, Kathleen Odean thought she had found the last cell phone plan she would ever need. T-Mobile was offering a mobile service for people age 55 and over, with an "Un-contract" guarantee that it would never raise prices.
"I thought, wow, I can live out my days with this fixed plan," Odean, a Rhode Island resident who is now 70 years old, told Ars last week. Odean and her husband switched from Verizon to get the T-Mobile deal, which cost $60 a month for two lines.
Despite its Un-contract promise, T-Mobile in May 2024 announced a price hike for customers like Odean who thought they had a lifetime price guarantee on plans such as T-Mobile One, Magenta, and Simple Choice. The $5-per-line price hike will raise her and her husband's monthly bill from $60 to $70, Odean said.
Star Wars behind the scenes: Creating the unique aesthetic of The Acolyte
![poster art for the acolyte](https://cdn.arstechnica.net/wp-content/uploads/2024/06/acolyte-TOP-800x535.jpg)
Enlarge / A mysterious assassin is targeting Jedi masters in The Acolyte. (credit: Disney+)
The Star Wars franchise is creeping up on the 50-year mark for the original 1977 film that started it all, and Disney+ has successfully kept things fresh with its line of live-action Star Wars spinoff series. The Mandalorian and Andor were both unquestionably popular and critical successes, while The Book of Boba Fett ultimately proved disappointing, focusing less on our favorite bounty hunter and more on setting up the third season of The Mandalorian. Obi-Wan Kenobi and Ahsoka fell somewhere in between, bolstered by strong performances from its leads but often criticized for sluggish pacing.
It's unclear where the latest addition to the TV franchise, The Acolyte, will ultimately fall, but the first five episodes aired thus far bode well for its place in the growing canon. The series eschews the usual Star Wars space-battle fare for a quieter, space Western detective story—who is killing the great Jedi masters of the galaxy?—with highly choreographed fight scenes that draw heavily from the martial arts. And like its predecessors, The Acolyte is recognizably Star Wars. Yet it also boasts a unique aesthetic style that is very much its own.
(Spoilers below for episodes 1 through 5 of The Acolyte.)
Taking a closer look at AI’s supposed energy apocalypse
![Someone just asked what it would look like if their girlfriend was a Smurf. Better add another rack of servers!](https://cdn.arstechnica.net/wp-content/uploads/2024/06/GettyImages-1384950048-800x555.jpg)
Enlarge / Someone just asked what it would look like if their girlfriend was a Smurf. Better add another rack of servers! (credit: Getty Images)
Late last week, both Bloomberg and The Washington Post published stories focused on the ostensibly disastrous impact artificial intelligence is having on the power grid and on efforts to collectively reduce our use of fossil fuels. The high-profile pieces lean heavily on recent projections from Goldman Sachs and the International Energy Agency (IEA) to cast AI's "insatiable" demand for energy as an almost apocalyptic threat to our power infrastructure. The Post piece even cites anonymous "some [people]" in reporting that "some worry whether there will be enough electricity to meet [the power demands] from any source."
Digging into the best available numbers and projections available, though, it's hard to see AI's current and near-future environmental impact in such a dire light. While generative AI models and tools can and will use a significant amount of energy, we shouldn't conflate AI energy usage with the larger and largely pre-existing energy usage of "data centers" as a whole. And just like any technology, whether that AI energy use is worthwhile depends largely on your wider opinion of the value of generative AI in the first place.
Not all data centers
While the headline focus of both Bloomberg and The Washington Post's recent pieces is on artificial intelligence, the actual numbers and projections cited in both pieces overwhelmingly focus on the energy used by Internet "data centers" as a whole. Long before generative AI became the current Silicon Valley buzzword, those data centers were already growing immensely in size and energy usage, powering everything from Amazon Web Services servers to online gaming services, Zoom video calls, and cloud storage and retrieval for billions of documents and photos, to name just a few of the more common uses.
Work From Home Security Checklist: Top Cybersecurity Tips for Remote Workers
Cybersecurity Tips for Remote Workers
Know Your Organization's Cyberwork Policies
Understanding your organization's cyberwork policies ensures remote workers adhere to established protocols, safeguarding sensitive data. These policies typically include guidelines on using secure connections through VPNs, handling confidential information, and using approved applications. By following these protocols, the risk of phishing or malware attacks is reduced as vulnerabilities from unprotected networks and devices are minimized. Awareness of these policies empowers employees to identify and report suspicious activities promptly, facilitating swift responses to potential threats.Use Only Approved Devices
Using devices approved by your organization is critical for cybersecurity as it ensures compliance with company security standards. Approved devices are equipped with essential security measures such as firewalls, antivirus software, and encryption protocols, effectively reducing vulnerabilities. Regular monitoring and updates ensure these devices remain secure with the latest patches, enhancing protection against unauthorized access and cyber threats. Moreover, using approved devices ensures compatibility with secure networks and systems, maintaining overall cybersecurity integrity.Implement the Principle of Least Privilege
Implementing access controls based on the principle of least privilege limits access to sensitive information and systems to only those necessary for an employee's role. Strong authentication methods like two-factor authentication (2FA) further verify user identities, enhancing security. Regular review and updates of access permissions are essential, especially in remote work scenarios, to mitigate the risk of unauthorized access and ensure data security.Secure Home Wi-Fi Networks
Securing your home Wi-Fi network is crucial when working remotely. Use strong, unique passwords and enable WPA3 encryption to protect against unauthorized access. Changing default router login credentials and regularly updating router firmware further enhances security by safeguarding against vulnerabilities and potential breaches. Consider segregating work and personal network usage to further bolster security measures.Enable Two-Factor Authentication (2FA)
Activating two-factor authentication adds an extra layer of security by requiring a second form of verification alongside passwords. This significantly reduces the risk of unauthorized access, even if passwords are compromised. 2FA methods like SMS codes, authenticator apps, or biometric scans provide robust protection, particularly for handling sensitive work-related data remotely.Use Strong, Unique Passwords
Protect work-related accounts and devices with strong, unique passwords that include a mix of characters, numbers, and symbols. Avoid using the same password across multiple accounts to mitigate the impact of a potential breach. Consider using a password manager to generate and securely store complex passwords, ensuring optimal security without the risk of forgetting passwords or compromising data integrity.Use Antivirus and Antimalware Software
Deploy reliable antivirus and antimalware software to detect, block, and remove malicious software threats such as viruses and ransomware. Regular software updates ensure protection against evolving cyber threats, enhancing device and data security. Conducting regular scans helps identify and mitigate potential security risks, preserving the integrity of work devices and sensitive data.Use a Virtual Private Network (VPN)
Utilize a VPN to encrypt internet connections and enhance security when accessing work-related data remotely. VPNs mask IP addresses and encrypt online activities, safeguarding against unauthorized access and data interception on unsecured Wi-Fi networks. Whether working from home or public locations, VPNs provide a secure channel for transmitting sensitive information, ensuring confidentiality and data integrity.Keep Software Updated and Data Backed Up
Regularly update operating systems, applications, and security software to protect against vulnerabilities exploited by cybercriminals. Enable automatic updates to ensure devices have the latest security patches and firmware. Back up work data regularly using cloud-based solutions or external hard drives to safeguard against data loss due to hardware failures or cyberattacks. Automating backups ensures data integrity and availability, minimizing disruption and downtime.Have a Plan of Action for Cyberattacks
Prepare and maintain a comprehensive plan of action for responding to cyberattacks to mitigate damage and facilitate swift recovery. The plan should outline steps for identifying, isolating, and mitigating threats, as well as notifying IT teams for immediate remediation. Regular drills and simulations help familiarize employees with incident response procedures, ensuring a prompt and effective response to cybersecurity incidents when working remotely. By implementing these cybersecurity tips for remote workers, one can enhance data protection, mitigate risks, and contribute to maintaining a secure work environment from any location.Decades later, John Romero looks back at the birth of the first-person shooter
![Decades later, John Romero looks back at the birth of the first-person shooter](https://cdn.arstechnica.net/wp-content/uploads/2024/06/romero-boomer-shooter-doom-800x450.jpg)
Enlarge (credit: Aurich Lawson | Id | GDC)
John Romero remembers the moment he realized what the future of gaming would look like.
In late 1991, Romero and his colleagues at id Software had just released Catacomb 3-D, a crude-looking, EGA-colored first-person shooter that was nonetheless revolutionary compared to other first-person games of the time. "When we started making our 3D games, the only 3D games out there were nothing like ours," Romero told Ars in a recent interview. "They were lockstep, going through a maze, do a 90-degree turn, that kind of thing."
Despite Catacomb 3-D's technological advances in first-person perspective, though, Romero remembers the team at id followed its release by going to work on the next entry in the long-running Commander Keen series of 2D platform games. But as that process moved forward, Romero told Ars that something didn't feel right.
Empowering Women in Cybersecurity: Insights from Irene Corpuz
Strategies to Encourage Women in Cybersecurity
Irene Corpuz believes that collaboration and communication are key to empowering women in cybersecurity. One of the most effective strategies is to collaborate and communicate our objectives and advocacy for increasing and empowering women in cyber," she states. By showcasing women in various roles—from mentors and speakers to leaders—on platforms like conferences, the visibility and success of these women can inspire others to pursue their ambitions in the field. "Seeing other women grow and succeed motivates them to pursue their dreams and careers," Irene emphasizes. She highlights the importance of a supportive community, which acts as a backbone for women in cybersecurity, helping them navigate and thrive in the industry.Trends in Women's Participation in Cybersecurity
Reflecting on her journey, Irene observes a positive trend in the participation of women in cybersecurity. When WiCSME was founded in 2018, women made up only 12% of the cybersecurity workforce. However, this number has significantly increased to 25% by last year. This growth is attributed not just to WiCSME but to the collective efforts of various women-in-cyber organizations worldwide. "There’s a continuous growth, and awareness of the importance of diversity and inclusion in cybersecurity is becoming more widespread," Irene notes. This trend signifies a growing recognition of the value that diverse perspectives bring to the cybersecurity industry.Challenges for Small Businesses in Cybersecurity
Transitioning the conversation to small businesses, Irene sheds light on the challenges they face in prioritizing cybersecurity. "Small businesses and young entrepreneurs often face constraints in financial resources," she explains. As these businesses focus on growth and expanding their customer base, investing in cybersecurity often becomes a secondary priority. However, Irene stresses the importance of embedding a cybersecurity and awareness culture from the beginning, even if it means taking small steps. "Startups and SMEs need to take baby steps in embedding cybersecurity and awareness culture within their employees," she advises. As these companies mature, their cybersecurity measures should evolve accordingly to build a resilient defense against cyber threats.Conclusion
The insights shared by Irene Corpuz underscore the significance of community support and visibility in empowering women in cybersecurity. Furthermore, her perspective on the challenges faced by small businesses highlights the necessity of integrating cybersecurity practices gradually and consistently. As the cybersecurity landscape continues to evolve, the contributions of women and the resilience of small businesses will play a pivotal role in shaping a secure digital future.Internet Archive forced to remove 500,000 books after publishers’ court win
![Internet Archive forced to remove 500,000 books after publishers’ court win](https://cdn.arstechnica.net/wp-content/uploads/2024/06/GettyImages-119015596-800x609.jpg)
Enlarge (credit: Tim Macpherson | Image Source)
As a result of book publishers successfully suing the Internet Archive (IA) last year, the free online library that strives to keep growing online access to books recently shrank by about 500,000 titles.
IA reported in a blog post this month that publishers abruptly forcing these takedowns triggered a "devastating loss" for readers who depend on IA to access books that are otherwise impossible or difficult to access.
To restore access, IA is now appealing, hoping to reverse the prior court's decision by convincing the US Court of Appeals in the Second Circuit that IA's controlled digital lending of its physical books should be considered fair use under copyright law. An April court filing shows that IA intends to argue that the publishers have no evidence that the e-book market has been harmed by the open library's lending, and copyright law is better served by allowing IA's lending than by preventing it.
From Infocom to 80 Days: An oral history of text games and interactive fiction
![Zork running on an Amiga at the Computerspielemuseum in Berlin, Germany.](https://cdn.arstechnica.net/wp-content/uploads/2023/11/45897016062_e1c52b1dd9_k-800x1199.jpg)
Enlarge / Zork running on an Amiga at the Computerspielemuseum in Berlin, Germany. (credit: Marcin Wichary (CC by 2.0 Deed))
You are standing at the end of a road before a small brick building.
That simple sentence first appeared on a PDP-10 mainframe in the 1970s, and the words marked the beginning of what we now know as interactive fiction.
From the bare-bones text adventures of the 1980s to the heartfelt hypertext works of Twine creators, interactive fiction is an art form that continues to inspire a loyal audience. The community for interactive fiction, or IF, attracts readers and players alongside developers and creators. It champions an open source ethos and a punk-like individuality.
MacBook Air gets hosed, other models hold steady in macOS 15 as Intel support fades
![MacBook Air gets hosed, other models hold steady in macOS 15 as Intel support fades](https://cdn.arstechnica.net/wp-content/uploads/2024/06/macos-finder-faces-sequoia-800x450.jpg)
Enlarge (credit: Aurich Lawson)
As the Intel Mac era has wound down over the last couple of years, we've been painstakingly tracking the amount of software support that each outgoing model is getting. We did this to establish, with over 20 years' worth of hard data, whether Intel Mac owners were getting short shrift as Apple shifted its focus to Apple Silicon hardware and to software that leveraged Apple Silicon-exclusive capabilities.
So far, we've found that owners of Intel Macs made in the mid-to-late 2010s are definitely getting fewer major macOS updates and fewer years' worth of security updates than owners of Intel Macs made in the late 2000s and early 2010s but that these systems are still getting more generous support than old PowerPC Macs did after Apple switched to Intel's processors.
The good news with the macOS 15 Sequoia release is that Apple is dropping very few Intel Mac models this year, a much-needed pause that slows the steady acceleration of support-dropping we've seen over the last few macOS releases.
The Snowballing of the Snowflake Breach: All About the Massive Snowflake Data Breach
Why the Snowflake Breach Matters
Snowflake is a prominent U.S.-based cloud data storage and analytics company, with over 9,800 global customers. Its customer base includes major corporations like Adobe, AT&T, Capital One, DoorDash, HP, JetBlue, Mastercard, Micron, NBC Universal, Nielsen, Novartis, Okta, PepsiCo, Siemens, US Foods, Western Union, and Yamaha, among others. Snowflake holds approximately a 20% share of the data warehouse market and was recently ranked #1 on the Fortune Future 50 List, it an attractive target for cybercriminals. However, it is crucial to note that the breaches are not necessarily due to failures by Snowflake. The correlation does not imply causation, as emphasized by Snowflake’s Chief Information Security Officer Brad Jones. The company, along with its forensic partners, found no evidence of vulnerabilities or breaches within Snowflake’s platform.Ongoing Investigation and Preliminary Results in Snowflake Breach
On May 31, Snowflake revealed that attackers accessed customer accounts using single-factor authentication. According to preliminary results, these attackers leveraged credentials obtained through infostealing malware.Compromised Employee Account
Snowflake confirmed that a threat actor obtained credentials from a single former employee, accessing demo accounts that were isolated from production and corporate systems. Snowflake’s core systems are protected by Okta and Multi-Factor Authentication (MFA) but the demo accounts lacked such safeguards.Test Environments Targeted
Demo accounts are often overlooked as security risks. Despite assurances that these accounts do not contain sensitive data, they remain attractive targets due to their perceived value. Cybercriminals exploit the perception gap, knowing that a claimed breach of a high-profile company like Snowflake can generate significant media attention.Attack Path
The initial access point for the attackers was almost certainly compromised credentials obtained through infostealing malware. Mandiant, who helped Snowflake in its investigation, confirmed that the compromised credentials were from customer instances and were traced back to infostealer malware logs. Several variants of infostealer malware were used, including VIDAR, RISEPRO, REDLINE, RACOON STEALER, LUMMA, and METASTEALER.Possible Reasons for the Breach
Mandiant confirmed that there was no breach of Snowflake’s enterprise environment. They identified that most credentials used by the attackers originated from historical infostealer infections. The lack of MFA and failure to rotate credentials for up to four years were significant factors. Network allow lists were also not used to restrict access to trusted locations.Unconfirmed Threat Actor Claims
The threat actor also claimed to have logged into Snowflake’s ServiceNow using the same credentials. This claim has neither been confirmed nor explicitly refuted by Snowflake. Other unknowns include whether similar methods compromised other Snowflake employees, and the definition of "sensitive" data used for determining the impact on demo accounts. The investigation is ongoing, but Snowflake stands by its initial findings.Affected Customers from Snowflake Breach
The data breaches began in April 2024, and the company claimed it had impacted a “limited” number of Snowflake customers. Snowflake initially did not disclose the exact number or the names of all affected customers. However, a comprehensive report from Mandiant two weeks after the initial disclosure revealed that 165 customers were impacted in the Snowflake data breach. While some victims have been identified through attackers’ offers to sell stolen data, others were revealed via mandatory public disclosures. Most companies have yet to confirm the impact. Following is a list of all companies know to have been impacted in the Snowflake data breach:- Santander Group: The company confirmed a compromise without mentioning Snowflake.
- Impact: Santander Bank staff and 30 million customers’ data has allegedly been breached.
- TicketMaster (Live Nation Entertainment subsidiary): Confirmed via an SEC 8-K report, with Snowflake identified as the third party involved.
- Impact: 560 Million TicketMaster user details and card info potentially at risk.
- LendingTree: Notified by Snowflake about a potential data impact involving QuoteWizard.
- Impact: On June 1, a hacker going by the name “Sp1d3r” posted on the cybercriminal platform BreachForums that they had stolen the sensitive information of over 190 million people from QuoteWizard. The alleged database included customer details, partial credit card numbers, insurance quotes and other information.
- Advance Auto Parts: Unconfirmed by the company, but a dark web listing claimed significant data theft.
- Impact: Same actor as LendingTree claimed leak of 380 million customers and 358,000 former and current employees.
- Pure Storage: The Pure Storage data breach involved a third party temporarily gaining access to the workspace, which housed data such as company names, LDAP usernames, email addresses, and the Purity software release version number.
- Impact: The same threat actor known as “Sp1d3r” claimed responsibility, alleging the theft of 3 terabytes of data from the company’s Snowflake cloud storage that was reportedly being sold for $1.5 million.
Security Measures and Customer Support
Snowflake Chief Information Security Officer Brad Jones reiterated the company's findings, asserting that the breaches were not due to any vulnerabilities, misconfigurations, or breaches of Snowflake’s platform or personnel credentials. Snowflake is collaborating with customers to enhance security measures and plans to mandate advanced security controls such as multi-factor authentication (MFA) and network policies, especially for privileged accounts. The company acknowledges the friction in their MFA enrollment process and is working to streamline it. The shared responsibility model places MFA enforcement on customers, but Snowflake aims to make it a standard prerequisite due to the high sensitivity of the data stored in their cloud environments.Key Recommendations for Snowflake Customers:
- Enforce Multi-Factor Authentication: Make MFA mandatory for all accounts, particularly those with privileged access.
- Regularly Rotate Credentials: Ensure that all credentials are regularly updated to prevent long-term exposure from previous leaks.
- Implement Network Allow Lists: Restrict access to trusted IP addresses to minimize unauthorized access.
- Enhance Logging and Monitoring: Improve logging and monitoring capabilities to detect and respond to suspicious activities promptly.
Ubuntu 23.10 Reaches End of Life on July 11, 2024
Ubuntu 23.10, codenamed “Mantic Minotaur,” was released on October 12, 2023, nearly nine months ago. Since it is an interim release, its support period is now approaching with the end of life scheduled on July 11, 2024. After this date, Ubuntu 23.10 will no longer receive software and security updates from Canonical. As a result, […]
The post Ubuntu 23.10 Reaches End of Life on July 11, 2024 appeared first on TuxCare.
The post Ubuntu 23.10 Reaches End of Life on July 11, 2024 appeared first on Security Boulevard.
Don’t Be a Sitting Duck: The Cybersecurity Checklist You Need Right Now
Must-have Cybersecurity Checklist
1. Data Encryption
Data encryption converts sensitive information into a coded format, rendering it unreadable to unauthorized users. This security measure ensures confidentiality and compliance with privacy regulations. Even if attackers gain access to encrypted data, they cannot decipher it without the correct decryption key, thereby maintaining data integrity.2. Disaster Recovery Policy
A disaster recovery policy is vital for organizations to respond to and recover from cyberattacks or system failures swiftly. It includes procedures for data restoration, minimizing downtime, and ensuring business continuity. Regular updates and drills ensure readiness to handle emergencies effectively.3. External Hard Drive Backup
Maintaining backups on an external hard drive provides an offline data redundancy solution. This practice safeguards critical data independently from primary systems. In scenarios like ransomware attacks or network failures, offline backups facilitate quick data restoration, complementing cloud-based backups.4. Updated Software
Regularly updating software is critical to patch known vulnerabilities that cybercriminals exploit. Updates not only enhance security but also improve software functionality and performance. Neglecting updates leaves systems vulnerable to cyber threats and compromises overall system integrity.5. Cybersecurity Insurance
Cybersecurity insurance offers financial protection against losses resulting from cyber incidents. It covers expenses such as investigation costs, legal fees, and mitigation efforts. This insurance serves as a safety net, ensuring businesses can recover and resume operations following significant cybersecurity events.6. Antivirus Updates
Frequent updates to antivirus software are essential to defend against emerging malware threats. Updated antivirus solutions detect and block malicious activities, enhancing overall system security. Continuous updates ensure systems are protected against evolving cyber threats.7. Principle of Least Privilege
Implementing the principle of least privilege limits user access rights to only what is necessary for their roles. This mitigates the risk of insider threats and unauthorized access, maintaining control over system configurations and enhancing overall security posture.8. Secure Connections
Secure connections, often facilitated by VPNs (Virtual Private Networks), encrypt data during transmission over public or unsecured networks. This practice prevents interception and unauthorized access to sensitive information, ensuring data confidentiality and integrity.9. Robust Firewall
A robust firewall acts as a barrier between trusted internal networks and external networks, filtering incoming and outgoing traffic. It blocks malicious traffic and unauthorized access attempts, safeguarding network infrastructure and sensitive data from cyber threats.10. Cybersafety Policies
Establishing comprehensive cybersafety policies is crucial for promoting cybersecurity awareness and best practices among employees. These policies cover password guidelines, internet usage protocols, and email security measures. Regular training reinforces these policies, reducing vulnerabilities to phishing attacks and unauthorized access attempts.Conclusion
This cybersecurity checklist encompasses essential measures to prepare against potential cyber threats. It emphasizes proactive strategies both online and physically, including the use of external hard drives for backups and the implementation of robust cybersecurity policies. By adopting these practices, individuals and organizations can enhance their resilience against the evolving landscape of cyber threats. In a world where cybersecurity threats are increasingly prevalent, implementing these checklist points is crucial. We at The Cyber Express hope this guide has been informative and encourages widespread adoption of these cybersecurity best practices for a safer digital environment.Hello sunshine: We test McLaren’s drop-top hybrid Artura Spider
![An orange McLaren Artura Spider drives on a twisy road](https://cdn.arstechnica.net/wp-content/uploads/2024/06/2025-McLaren-Artura-Spider-1-800x533.jpg)
Enlarge / The introduction of model year 2025 brings a retractable hard-top option for the McLaren Artura, plus a host of other upgrades. (credit: McLaren)
MONACO—The idea of an "entry-level" supercar might sound like a contradiction in terms, but every car company's range has to start somewhere, and in McLaren's case, that's the Artura. When Ars first tested this mid-engined plug-in hybrid in 2022, It was only available as a coupe. But for those who prefer things al fresco, the British automaker has now given you that option with the addition of the Artura Spider.
The Artura represented a step forward for McLaren. There's a brand-new carbon fiber chassis tub, an advanced electronic architecture (with a handful of domain controllers that replace the dozens of individual ECUs you might find in some of its other models), and a highly capable hybrid powertrain that combines a twin-turbo V6 gasoline engine with an axial flux electric motor.
More power, faster shifts
For model year 2025 and the launch of the $273,800 Spider version, the engineering team at McLaren have given it a spruce-up, despite only being a couple of years old. Overall power output has increased by 19 hp (14 kW) thanks to new engine maps for the V6, which now has a bit more surge from 4,000 rpm all the way to the 8,500 rpm redline. Our test car was fitted with the new sports exhaust, which isn't obnoxiously loud. It makes some interesting noises as you lift the throttle in the middle of the rev range, but like most turbo engines, it's not particularly mellifluous.
Beyond Traditional: Why Cybersecurity Needs Neurodiversity
What is Neurodiversity in Cybersecurity?
Neurodiversity in cybersecurity refers to the recognition and inclusion of individuals with diverse cognitive profiles, including conditions such as autism, ADHD, dyslexia, and others, within cybersecurity teams. These individuals bring unique perspectives, skills, and talents to the table, enhancing the overall effectiveness of cybersecurity operations.How Neurodiversity Benefits in Cybersecurity Workplace
Neurodiversity brings numerous advantages to the cybersecurity workplace by introducing unique skills and perspectives that significantly enhance security measures.Challenges Faced by Neurodiverse Individuals in Cybersecurity
Neurodiverse individuals face several challenges in the workplace that can impact their ability to thrive, despite their unique strengths. For example, sensory sensitivities common in conditions like autism can make traditional office environments overwhelming due to bright lights, loud noises, or crowded spaces. This can lead to increased stress and decreased productivity. Communication barriers are another significant challenge, as some neurodivergent individuals may struggle with social cues and norms, making it difficult for them to participate effectively in team meetings or collaborative projects. For instance, someone with ADHD might find it challenging to maintain focus during long meetings, potentially missing critical information. Additionally, rigid workplace structures and a lack of flexibility can hinder neurodiverse employees, who may require different accommodations, such as varied working hours or remote work options, to perform optimally. These challenges highlight the need for inclusive workplace practices that recognize and support the diverse needs of neurodiverse individuals, enabling them to contribute their valuable skills more effectively.How to Create Neurodiverse-Friendly Work Environments
Creating a neurodiverse-friendly work environment involves considering several key factors to support and accommodate the unique needs of neurodivergent individuals. Here are the steps to create such an environment: Sensory: Addressing the sensory environment is crucial. This means ensuring that the workplace is comfortable regarding lighting, noise, and overall ambiance. For example, providing noise-canceling headphones, adjustable lighting, or quiet workspaces can help neurodivergent employees focus better and reduce sensory overload. Timely: A timely environment means allowing sufficient time for tasks and avoiding unrealistic deadlines. Clearly communicating timeframes and allowing flexibility can reduce stress. For instance, giving employees enough time to complete tasks without last-minute rushes can improve their productivity and job satisfaction. Explicit: Communication should be clear and explicit. This involves providing detailed instructions and avoiding ambiguous language. For example, instead of saying, "Get this done soon," specify, "Please complete this task by 3 PM tomorrow." This clarity helps neurodivergent individuals understand expectations and reduces anxiety. Predictable: Creating a predictable environment can help reduce anxiety and improve focus. This includes having regular schedules and clear procedures. For instance, if meetings are scheduled at consistent times and agendas are shared in advance, neurodivergent employees can prepare better and feel more secure. Social: Fostering a supportive social environment means recognizing that not everyone may be comfortable with the same level of social interaction. Offering structured social activities and respecting individual preferences can create a more inclusive workplace. For example, providing clear invitations to social events with detailed information about what to expect can help neurodivergent employees feel more comfortable. Additionally, implementing a "traffic-light" system with colored cards or post-it notes (green for willing to interact, yellow for maybe, and red for needing to focus) can help manage social interactions effectively and respect individual boundaries. By incorporating these STEPS, organizations can create an inclusive and supportive work environment that leverages the unique strengths of neurodivergent employees, ultimately enhancing overall productivity and innovation. Training Programs: Providing specialized training and development programs can help neurodivergent individuals thrive in cybersecurity roles. This includes offering tailored training sessions that address their unique learning styles and strengths. For example, using visual aids and hands-on activities can enhance understanding and retention. Mentorship programs where experienced employees guide neurodivergent staff can also be beneficial, offering personalized support and career development advice. Moreover, continuous learning opportunities, such as workshops on the latest cybersecurity trends and technologies, can keep neurodivergent employees engaged and up-to-date with industry advancements.Read Ahead
“Once we start to remove what those barriers are, the way that we do things, our culture of understanding and our bias of conditions, then we can start to be more inclusive and welcome a more diverse workforce,” said Foxcroft. By harnessing the unique strengths of neurodivergent individuals, organizations can unlock a wellspring of creativity, focus, and unconventional problem-solving. It's a future where cybersecurity teams aren't just well-equipped, but exceptionally prepared – a future where "thinking differently" becomes the key to defending against the unthinkable. So, what steps will you take to create a more inclusive cybersecurity workforce? The answers may well determine the future security of our digital world.Beyond ‘Password123’: 6 Steps to Create Unbreakable Passwords
Steps to Create a Strong Password
1. Avoid Common Words
Avoid using easily guessable words or phrases. Examples include "123456," "password," or "qwerty." Instead, use phrases that may hold an unobvious personal meaning to you, such as a combination of words from a favorite book or a childhood memory. Hackers often use common password lists to guess and breach accounts, so avoid anything too predictable.2. Avoid Personal Information
Refrain from including any personal information in your password, such as your name, birthday, or address. Hackers can easily obtain this information through social engineering or data breaches, making it relatively simple for them to guess your password. Keeping your password unrelated to your personal life adds an extra layer of security.3. The Lengthier, the Better
The longer your password, the harder it is for hackers to crack through brute force attacks. A minimum of 12 characters is recommended, but going longer is better. For example, using a 16-character password significantly increases the number of possible combinations, making it more challenging for hackers to guess and increasing their likelihood of failing.4. Use Complex Characters and Words
Passwords that use a variety of character types—such as uppercase letters, lowercase letters, numbers, and special characters—are better protected. For instance, a password like "P@ssw0rd123!" is much stronger than "password123." The complexity of using different forms of characters makes guessing much harder, especially if hackers use automated tools.5. Randomize Passwords
Generating random passwords using browser-recommended ones or a password manager can be very effective in protecting your account. Password managers can store the randomized passwords after creating them. If you are worried about forgetting these randomly generated ones, you can create your own passphrase that makes sense only to you, such as "Green!Apple#Mountain*Sky." Ensure it's not easily guessable or uses common phrases.6. Update and Change Regularly
Changing your passwords regularly is essential, especially if you have been warned of possible attempts at breaches or passwords being compromised. Regularly updating your passwords helps mitigate the risk of unauthorized access to your accounts, even if your current password is strong. It is important to create new ones instead of reusing old passwords, as hackers could use previously compromised credentials to gain access to other accounts.Conclusion
When these six tips are combined, your password will keep your information secure. Repeating passwords or making variations of the same one fails to protect you. But with these tips, your first level of authentication is set to be almost impossible for hackers to penetrate. In a world where hacking and stealing information in cyberspace is becoming more common, it is essential for users to take the necessary steps to keep their passwords strong and their data protected. By following these guidelines, you can significantly reduce the risk of falling victim to cyberattacks and ensure your personal information remains safe.Don’t Be a Victim: Simple Tips to Boost Your Online Security
10 Easy Steps to Secure Your Identity
By following these 10 easy steps, you can secure your credentials, personal information, and more.1. Using Strong Passwords
Using strong passwords is the most obvious tip. Ensuring a hard-to-guess password makes it difficult for attackers to guess or crack your login credentials. Strong passwords include a mix of letters, numbers, symbols, and avoid obvious information like your name or date of birth. This reduces the likelihood of unauthorized access to your accounts and safeguards them.2. VPN (Virtual Private Network)
A VPN protects your identity by masking your IP address and routing your data through secure servers. This prevents hackers, ISPs, and others from tracking your online activities, ensuring your data remains private and your location and identity are hidden.3. Encrypting Your Data
Data encryption works by converting your information into code, readable only with the correct decryption key. Even if your data is compromised, it remains confidential and secure. Encryption prevents unauthorized access and safeguards your personal and sensitive information from hackers.4. Installing Antivirus Software
Antivirus software protects your identity by detecting and removing malware, including viruses, spyware, and keyloggers, which can steal personal information. It safeguards against phishing attacks and other cyber threats, ensuring your data remains secure and preventing unauthorized access to sensitive information like passwords and financial details.5. Avoiding the Use of Public Wi-Fi
Avoiding public Wi-Fi reduces exposure to unsecured networks, which are prone to cyber-attacks. Hackers can retrieve sensitive information like passwords and personal details through public Wi-Fi. Using secure, private networks minimizes this risk, safeguarding your identity and personal data.6. Utilizing the Principle of Least Privilege
The principle of least privilege involves restricting account levels to only what users and systems necessarily need to perform their tasks. This limits potential damage from malware or insider threats, reducing the risk of unauthorized access to sensitive information and protecting your personal data and identity.7. Multi-Factor Authentication (MFA)
MFA protects your identity by requiring multiple forms of verification, such as email verifications or facial recognition, to access accounts. This extra layer of security makes it significantly harder for unauthorized users to gain access. Even if your password is compromised, your data remains secure.8. Installing Anti-Malware Software
Anti-malware software detects, blocks, and removes malicious software designed to steal personal information. It prevents spyware, ransomware, and other threats from compromising your data, ensuring details like login credentials and financial information remain inaccessible to cybercriminals.9. Switching to Digital Wallets
Digital wallets encrypt payment information, reducing the need to share sensitive details with merchants. Card numbers are replaced with unique identifiers, preventing the interception of financial data during transactions. This enhances security and shields personal information from theft and unauthorized access.10. Turning on Alerts
Using alerts protects your identity by notifying you of suspicious activities, such as unauthorized logins or transactions, in real time. This early detection allows you to take immediate action, such as changing passwords or contacting financial institutions, preventing further compromise of your personal information and minimizing potential damage from identity theft.Conclusion
We hope these tips have been informative and helpful in ensuring that you feel safer in an unsafe cyber world. Using these tips simultaneously is the best way to ensure your safety. Although one or two may seem like enough, you can never be too safe! As hacking becomes easier and more accessible to anyone who desires to steal identities or information, the cyber safety required to mitigate it is also becoming more accessible and easier to implement. We hope everyone stays safe out there with our tips!How Blockchain Technology Can Help Safeguard Data and Strengthen Cybersecurity
Understanding Blockchain Technology
At its core, blockchain is a decentralized ledger that records transactions across a network of computers, ensuring that data remains transparent, secure, and immutable. Each block in the blockchain contains a timestamp, transaction data, and a cryptographic hash of the previous block, creating a chain of records that is nearly impossible to alter. The exponential growth of blockchain technology is fueled by the need to simplify business processes, increase transparency, improve traceability, and cut costs. According to ReportLinker, the global blockchain market is expected to increase by 80% between 2018 and 2023, from $1.2 billion to $23.3 billion.Key Components of Blockchain That Ensure Data Security
Blockchain technology enhances data security by ensuring that data recorded once remains unalterable and undeletable without network consensus, thus maintaining integrity. One of the key features of blockchain technology is decentralization. Unlike traditional centralized databases, blockchain operates on a distributed network. This structure reduces the risk of a single point of failure and makes it much more difficult for malicious entities to compromise the entire system. By distributing data across multiple nodes, blockchain eliminates vulnerabilities associated with centralized servers, thereby enhancing overall security. Another feature is the Cryptographic hash function which plays a crucial role in blockchain security. These mathematical algorithms generate a unique identifier for each block, making it virtually impossible to alter any recorded data without detection. All the altered information on the blockchain is visible and immutable, which not only ensures data integrity but also provides a reliable mechanism to detect and prevent fraudulent activities. Blockchain also employs consensus mechanisms such as Proof of Work (PoW) and Proof of Stake (PoS) to validate transactions and ensure network consistency. By allowing only authentic transactions to be added to the blockchain, these mechanisms prevent double payments and other fraudulent practices. Digital signatures, which use a private key to sign transactions, further enhance this level of security. This ensures that only authorized individuals can initiate or modify data entries, while anyone with the public key can verify the authenticity of the transaction.Applications Across Sectors
The use of blockchain technology could have a significant impact on cybersecurity across various sectors. Many organizations are recognizing the significant business benefits of blockchain technology and are increasingly adopting it across various sectors. Blockchain has a lot to offer, from manufacturing and healthcare to supply chains and beyond. Financial services, for instance, can benefit from blockchain's ability to secure transactions, reduce fraud, and improve transparency. The healthcare sector can utilize blockchain to secure storage and share patient information between authorized personnel, ensuring confidentiality and accuracy. In the manufacturing industry, blockchain is primarily used for the movement and management of digital assets and physical goods, enhancing transparency and traceability. In order to ensure a transparent and immutable record of the origin of products, supply chain management can use blockchain technology to prevent counterfeiting and ensure authenticity. Government services can also use blockchain to increase the security and efficiency of public records, voting systems as well as identity management.Key Challenges and Considerations
There are certain challenges to the use of blockchain technology, despite its many benefits. Scalability is an important concern, as the number of transactions increases, the blockchain may become slow and costly to maintain. Furthermore, significant computational power is required for consensus mechanisms such as POW which could result in considerable energy consumption. Regulatory uncertainty is another issue, as the evolving legal landscape can obscure the widespread adoption of blockchain technology. Addressing these challenges is crucial for the continued growth and adoption of blockchain technology. Global efforts are being made to create scalable blockchain systems and more effective consensus methods. Additionally, regulatory frameworks are also evolving to offer more precise guidelines to implement blockchain technology.Growth of Blockchain Technology in India
India is seeing a strong increase in the adoption of blockchain technology in many sectors. This growth is driven by government-backed projects and initiatives, such as the National Blockchain Framework, to improve transparency, security, and efficiency. The technology's potential to enhance data integrity and operational efficiency aligns well with India's digital transformation goals, making blockchain a key component in the nation's technological advancement. The use of blockchain technology has been much more of a game-changer in terms of data security and is supporting cybersecurity. It provides robust security against all cyber threats since it is decentralized, immutable, and fully transparent. Overcoming the challenges of scaling and regulatory uncertainty would enable blockchain's distributed ledger technology to emerge as the key player in secure digital infrastructures that drive innovation across all sectors. The more organizations study its potential applications, the more blockchain will change the face of data security and cybersecurity. Disclaimer: The views and opinions expressed in this guest post are solely those of the author(s) and do not necessarily reflect the official policy or position of The Cyber Express. Any content provided by the author is of their opinion and is not intended to malign any religion, ethnic group, club, organization, company, individual, or anyone or anything.Are Open Source Community Databases really a ‘Prudent Choice’
Superior Features of Enterprise Editions
Here’s why enterprise editions are generally considered superior to community versions in an enterprise setting: Enhanced Support and Reliability - One of the most significant advantages of enterprise editions is the professional support provided by the OEM. Unlike community versions, which rely on community forums and public documentation for troubleshooting, enterprise editions offer dedicated, round-the-clock technical support. This support is crucial for enterprises that require immediate resolutions to any issues that may arise, thereby minimizing downtime, ensuring business continuity, and adherence to compliance mandates. Advanced Security Features - Security is paramount for any enterprise, and enterprise editions of open-source databases typically come with enhanced security features not available in community versions. These may include advanced authentication methods, transparent data encryption, auditing capabilities, and more granular access controls. With cyber threats constantly evolving, having these robust security measures in place helps protect sensitive data from breaches and ensures compliance with industry standards and regulations. Performance Optimization and Scalability - Enterprise editions often include performance optimization tools and features designed to handle large-scale operations efficiently. These enhancements can significantly improve database performance, supporting faster query processing and better resource management. For businesses experiencing rapid growth or those with high transaction volumes, the ability to scale seamlessly is critical. Comprehensive Management Tools - Managing a database effectively requires a suite of tools for monitoring, backup, recovery, and automation. Enterprise editions usually provide a range of advanced management tools that simplify these tasks, reducing the administrative burden on IT teams. Features like automated backups, performance monitoring dashboards, and easy-to-use management interfaces help ensure that databases run smoothly, and potential issues are promptly addressed. Long-Term Stability and Support - Community versions often follow rapid release cycles, which can lead to stability issues as new features are continuously added and older versions quickly become outdated. In contrast, enterprise editions typically offer long-term support (LTS) versions, ensuring stability and ongoing updates without the need for frequent major upgrades. This stability is vital for enterprises that require reliable, long-term operation of their database systems. Tailored Solutions and Customization - Vendors offering enterprise editions frequently provide customized solutions tailored to the specific needs of their clients. This level of customization can include optimizing the database for particular workloads, integrating with existing enterprise systems, and even developing new features upon request. Such tailored solutions ensure that the database aligns perfectly with the business’ operational requirements.To Wrap Up
In conclusion, while community versions of open-source databases are an excellent starting point, especially for small to medium-sized businesses or for non-critical applications, enterprise editions offer a suite of enhanced features and services that address the complex needs of larger organizations. With superior support, advanced security, performance optimizations, comprehensive management tools, and tailored solutions, enterprise editions ensure businesses can rely on their database systems to support their operations effectively and securely. Enterprise editions are a prudent choice for enterprises where data integrity, performance, and security are paramount. Disclaimer: The views and opinions expressed in this guest post are solely those of the author(s) and do not necessarily reflect the official policy or position of The Cyber Express. Any content provided by the author is of their opinion and is not intended to malign any religion, ethnic group, club, organization, company, individual, or anyone or anything.Mod Easy: A retro e-bike with a sidecar perfect for Indiana Jones cosplay
![The Mod Easy Sidecar](https://cdn.arstechnica.net/wp-content/uploads/2024/06/MOD_Easy_Sidecar_Section_2_1600x-800x800.webp)
As some Ars readers may recall, I reviewed The Maven Cargo e-bike earlier this year as a complete newb to e-bikes. For my second foray into the world of e-bikes, I took an entirely different path.
The stylish Maven was designed with utility in mind—it's safe, user-friendly, and practical for accomplishing all the daily transportation needs of a busy family. The second bike, the $4,299 Mod Easy Sidecar 3, is on the other end of the spectrum. Just a cursory glance makes it clear: This bike is built for pure, head-turning fun.
The Mod Easy 3 is a retro-style Class 2 bike—complete with a sidecar that looks like it's straight out of Indiana Jones and the Last Crusade. Nailing this look wasn't the initial goal of Mod Bike founder Dor Korngold. In an interview with Ars, Korngold said the Mod Easy was the first bike he designed for himself. "It started with me wanting to have this classic cruiser," he said, but he didn't have a sketch or final design in mind at the outset. Instead, the design was based on what parts he had in his garage.
May contain nuts: Precautionary allergen labels lead to consumer confusion
![May contain nuts: Precautionary allergen labels lead to consumer confusion](https://cdn.arstechnica.net/wp-content/uploads/2024/06/GettyImages-1417278236-800x572.jpg)
Enlarge (credit: TopMicrobialStock, Getty Images)
When Ina Chung, a Colorado mother, first fed packaged foods to her infant, she was careful to read the labels. Her daughter was allergic to peanuts, dairy, and eggs, so products containing those ingredients were out. So were foods with labels that said they may contain the allergens.
Chung felt like this last category suggested a clear risk that wasn’t worth taking. “I had heard that the ingredient labels were regulated. And so I thought that that included those statements,” said Chung. “Which was not true.”
Precautionary allergen labels like those that say "processed in a facility that uses milk" or "may contain fish" are meant to address the potential for cross-contact. For instance, a granola bar that doesn’t list peanuts as an ingredient could still say they may be included. And in the United States, these warnings are not regulated; companies can use whatever precautionary phrasing they choose on any product. Some don’t bother with any labels, even in facilities where unintended allergens slip in; others list allergens that may pose little risk. Robert Earl, vice president of regulatory affairs at Food Allergy Research & Education, or FARE, a nonprofit advocacy, research, and education group, has even seen such labels that include all nine common food allergens. “I would bet my bottom dollar not all of those allergens are even in the facility,” he said.
Inside the Titan submersible disaster
![A logo on equipment stored near the OceanGate Inc. offices in Everett, Washington, US, on Thursday, June 22, 2023.](https://cdn.arstechnica.net/wp-content/uploads/2024/06/oceangate-800x534.jpg)
Enlarge / A logo on equipment stored near the OceanGate Inc. offices in Everett, Washington, US, on Thursday, June 22, 2023. (credit: Bloomberg via Getty Images)
The Ocean Sciences Building at the University of Washington in Seattle is a brightly modern, four-story structure, with large glass windows reflecting the bay across the street.
On the afternoon of July 7, 2016, it was being slowly locked down.
Red lights began flashing at the entrances as students and faculty filed out under overcast skies. Eventually, just a handful of people remained inside, preparing to unleash one of the most destructive forces in the natural world: the crushing weight of about 2½ miles of ocean water.
Neutrinos: The inscrutable “ghost particles” driving scientists crazy
![The Super-Kamiokande neutrino detector at the Kamioka Observatory in Japan.](https://cdn.arstechnica.net/wp-content/uploads/2024/06/5b2121431ae6621d008b4d53-800x600.webp)
Enlarge / The Super-Kamiokande neutrino detector at the Kamioka Observatory in Japan. (credit: Kamioka Observatory, ICRR (Institute for Cosmic Ray Research), the University of Tokyo )
Somehow, neutrinos went from just another random particle to becoming tiny monsters that require multi-billion-dollar facilities to understand. And there’s just enough mystery surrounding them that we feel compelled to build those facilities since neutrinos might just tear apart the entire particle physics community at the seams.
It started out innocently enough. Nobody asked for or predicted the existence of neutrinos, but there they were in our early particle experiments. Occasionally, heavy atomic nuclei spontaneously—and for no good reason—transform themselves, with either a neutron converting into a proton or vice-versa. As a result of this process, known as beta decay, the nucleus also emits an electron or its antimatter partner, the positron.
There was just one small problem: Nothing added up. The electrons never came out of the nucleus with the same energy; it was a little different every time. Some physicists argued that our conceptions of the conservation of energy only held on average, but that didn’t feel so good to say out loud, so others argued that perhaps there was another, hidden particle participating in the transformations. Something, they argued, had to sap energy away from the electron in a random way to explain this.
How the Webb and Gaia missions bring a new perspective on galaxy formation
![NASA's James Webb Space Telescope reveals the Rho Ophiuchi cloud complex, the closest star-forming region to Earth.](https://cdn.arstechnica.net/wp-content/uploads/2024/06/GettyImages-1528025004-800x749.jpg)
Enlarge / NASA's James Webb Space Telescope reveals the Rho Ophiuchi cloud complex, the closest star-forming region to Earth.
In a feat of galactic archeology, astronomers are using ever more detailed information to trace the origin of our galaxy—and to learn about how other galaxies formed in the early stages of the Universe. Using powerful space telescopes like Gaia and James Webb, astronomers are able to peer back in time and look at some of the oldest stars and galaxies. Between Gaia’s data on the position and movements of stars within our Milky Way and Webb’s observations of early galaxies that formed when the Universe was still young, astronomers are learning how galaxies come together and have made surprising discoveries that suggest the early Universe was busier and brighter than anyone previously imagined.
The Milky Way’s earliest pieces
In a recent paper, researchers using the Gaia space telescope identified two streams of stars, named Shakti and Shiva, each of which contains a total mass of around 10 million Suns and which are thought to have merged into the Milky Way around 12 billion years ago.
These streams were present even before the Milky Way had features like a disk or its spiral arms, and researchers think they could be some of the earliest building blocks of the galaxy as it developed.
Building a Culture of Cybersecurity: Why Awareness and Training Matter
What is "Security Culture"?
Security culture is the set of values shared by all the employees in an organization, which determine how people are expected to perceive and approach security. It is the ideas, customs and social behaviours of an organization that influence its security. Security culture is the most crucial element in an organization’s security strategy as it is fundamental to its ability to protect information, data and employee and customer privacy. Perception about cybersecurity has a direct impact to the security culture. It could be either positive or negative. It’s deemed to be positive if information security is seen as a business enabler and viewed as a shared responsibility instead of becoming the CISO’s sole responsibility. On other hand it’s perceived negatively if security viewed a hindrance or a showstopper to business or production. A sustainable security culture requires care and feeding. It is not something that develops naturally, it requires nurturing, relevant investments. It is bigger than just ad-hoc events. When a security culture is sustainable, it transforms security from ad-hoc events into a lifecycle that generates security returns forever. Security culture determines what happens with security when people are on their own. Do they make the right choices when faced with whether to click on a link? Do they know the steps that must be performed to ensure that a new product or offering is secure throughout the development life cycle. Security culture should be engaging and delivering value because people are always keen to participate in a security culture that is co-created and enjoyable. Furthermore, for people to invest their time and effort, they need to understand what they will get in return. In other words, it should provide a return on investment, such as improving a business solution, mitigating risks associated with cyber breaches. Culture change can either be driven from the top or be a bottom-up approach, depending on the composition and culture of the organization. A bottom-up approach rollout allows engaged parties to feel they are defining the way forward rather than participating in a large prescriptive corporate program, while support from the top helps to validate the change, regardless of how it is delivered. In particular, a top-down mandate helps to break down barriers between various business functions, information security, information technology, development team, operations, as well as being one of the few ways to reach beyond the technical teams and extend throughout the business. Organizations that have a Strong Cybersecurity culture have the following:- Senior leadership support from Board and Exco that echo the importance of cybersecurity within the organization.
- Defined a security awareness strategy and programme, including the Key Performance Indicators (KPIs).
- Targeted awareness campaigns which segment staff based on risk. Grouping users by risk allows for messages and the frequency of messages to be tailored to the user group.
- A cybersecurity champion programme which allows for a group of users embedded in the organization to drive the security message.
- Usage of various of mediums to accommodate different types of people who learn differently.
- Employees are always encouraged to report cybersecurity incidents and they know where and how and to report incidents.
- Creating an organizational culture where people are encouraged to report mistakes could be the difference between containing a cyber incident or not.
- Measurements to test effectiveness: This is often done with phishing simulations.
- Employees have a clear understanding of what acceptable vs what is not acceptable.
- Information security becomes a shared responsibility instead of CISO’s sole responsibility.
The below image depicts percentage of adopted awareness capabilities
Security architecture principles such as Defence in Depth, the failure of a single component of the security architecture should not compromise the security of the entire system. A defense-in-depth mechanism should be applied to mitigate phishing related risks. This approach applies security in different layers of protection, which implies that if one control fails the next layers of controls will be able to block or stop the phishing attack. The controls involve a combination of people, processes and technologies. User behavior analytics (UBA) should be used to augment the awareness programme by detecting insider threats, targeted attacks, and financial fraud and track users’ activities. Advanced our phishing attack simulations by using GEN AI based simulations should also be conducted to combat advanced phishing attacks.Possible Measurements
There are several measures that can be applied to measure the level of a security conscious culture:- Employees attitudes towards security protocols and issues.
- Behaviour and actions of employees that have direct and indirect security implications.
- Employees understanding, knowledge and awareness of security issues and activities.
- How communication channels promote a sense of belonging and offer support related to security issues and incident reporting.
- Employee knowledge, support and compliance to security policies, standards and procedures.
- Knowledge and adherence to unwritten rules of conduct related to security.
- How employees perceive their responsibilities as a critical success factor in mitigating cyber risks.
Conclusion
According to Gartner, by 2025, 40% of cybersecurity programs will deploy socio-behavioural principles (such as nudge techniques ) to influence security culture across the organization. Recent human based cyber-attacks, together AI enabled phishing attacks, make it imperative to tighten human based controls. Promoting a security conscious culture will play a fundamental role in transforming people from being the weakest into the strongest link in the cybersecurity chain. Building a cybersecurity culture is crucial because it ensures that everyone understands the importance of cybersecurity, adherence to the relevant information security policies and procedures, increase the level of vigilance and mitigate risks associated with data breaches. Furthermore a strong cybersecurity culture fosters better collaboration, accountability and improved security maturity. Disclaimer: The views and opinions expressed in this guest post are solely those of the author(s) and do not necessarily reflect the official policy or position of The Cyber Express. Any content provided by the author is of their opinion and is not intended to malign any religion, ethnic group, club, organization, company, individual, or anyone or anything.Building a Cyber-Resilient Organization: Strategies and Best Practices
Understand Your Risks
The first step in building cyber resilience is understanding the unique risks facing your organization. Conduct a comprehensive risk assessment to identify potential threats, vulnerabilities, and their potential impact on your business operations. This assessment should encompass all aspects of your organization's IT infrastructure, including networks, systems, applications, and data assets.Develop a Cybersecurity Strategy
Based on your risk assessment, develop a robust cybersecurity strategy that aligns with your organization's goals and priorities. This strategy should outline clear objectives, policies, and procedures for protecting against cyber threats. Key components of your cybersecurity strategy may include:- Risk Management Framework: Establish a risk management framework to systematically identify, assess, and mitigate cyber risks across your organization.
- Security Controls: Implement a layered approach to cybersecurity by deploying a combination of preventive, detective, and responsive security controls.
- Incident Response Plan: Develop a detailed incident response plan outlining procedures for detecting, responding to, and recovering from cyber incidents.
- Employee Training and Awareness: Educate employees about cybersecurity best practices and raise awareness about the importance of security hygiene in everyday operations.
Implement Security Controls
Deploy a range of security controls to protect your organization's digital assets from cyber threats. These controls may include:- Firewalls and Intrusion Detection Systems: Implement firewalls and intrusion detection systems to monitor and control network traffic, identifying and blocking malicious activities.
- Endpoint Protection: Install endpoint protection solutions, such as antivirus software and endpoint detection and response (EDR) tools, to defend against malware and other malicious threats targeting end-user devices.
- Data Encryption: Encrypt sensitive data both at rest and in transit to prevent unauthorized access and protect confidentiality.
- Multi-Factor Authentication (MFA): Enable MFA for accessing critical systems and applications, adding an extra layer of security beyond passwords.
Continuously Monitor and Assess
Cyber threats are constantly evolving, so it's essential to continuously monitor your organization's security posture and assess for vulnerabilities. Implement threat detection tools and security monitoring systems to detect and respond to suspicious activities in real-time. Conduct regular security assessments, including penetration testing and vulnerability scanning, to identify weaknesses and address them proactively.Foster a Culture of Cyber Resilience
Building a cyber-resilient organization requires a collective effort from all stakeholders, from top management to frontline employees. Foster a culture of cyber resilience by promoting collaboration, accountability, and a shared responsibility for cybersecurity across the organization. Encourage open communication channels for reporting security incidents and provide support and resources for ongoing training and skill development.Conclusion
Building a cyber-resilient organization is an ongoing process that requires proactive planning, investment, and commitment from leadership and employees alike. By understanding your risks, developing a comprehensive cybersecurity strategy, implementing robust security controls, continuously monitoring and assessing your security posture, and fostering a culture of cyber resilience, you can strengthen your organization's ability to withstand and recover from cyber threats, ensuring the continuity of your business operations in an increasingly digital world. Disclaimer: The views and opinions expressed in this guest post are solely those of the author(s) and do not necessarily reflect the official policy or position of The Cyber Express. Any content provided by the author is of their opinion and is not intended to malign any religion, ethnic group, club, organization, company, individual, or anyone or anything.Redefining Cybersecurity Frontlines: AI-Enhanced Operations and the Future of L1 Analysts
Strategic Imperatives for AI Adoption in Cybersecurity
The digital threat landscape is characterized by its complexity and dynamism, challenging the traditional cybersecurity frameworks and necessitating a more agile and intelligent response mechanism. AI’s role in this context is twofold: augmenting human capabilities and enabling more sophisticated, real-time threat detection and mitigation strategies.The Transformative Impact of AI on L1 Analysts
- Operational Efficiency: Leveraging AI for routine and volumetric threat detection tasks enhances operational efficiency, allowing analysts to concentrate on higher-order problem-solving and strategic decision-making.
- Continuous Monitoring: AI’s capability for 24/7 surveillance addresses the limitations of human-centric monitoring, ensuring a proactive stance against potential security breaches.
- Accuracy and Reliability: By minimizing human error, AI contributes to a more reliable threat detection process, underpinning a robust cybersecurity defense mechanism.
A Collaborative Future
The narrative surrounding AI in cybersecurity transcends the simplistic notion of technology replacing human roles. Instead, it emphasizes a symbiotic relationship where AI enhances the analytical and operational capacities of L1 analysts. This collaborative approach envisions:- Elevated Analytical Roles: Analysts are liberated from the constraints of monitoring and preliminary analysis, enabling a focus on complex, strategic issues that demand expert judgment and creative problem-solving.
- Continued Professional Development: The shift in responsibilities encourages L1 analysts to pursue advanced training and skill acquisition in areas such as threat intelligence, incident response, and cybersecurity policy, ensuring career growth and adaptation in a changing technological landscape.
- Strengthened Cyber Defenses: The integration of AI into cybersecurity operations fosters a more agile and resilient defense ecosystem, capable of responding to sophisticated threats with unprecedented speed and accuracy.
Conclusion
The strategic integration of AI into cybersecurity heralds a new era for L1 analysts and the broader industry. This evolution is not a displacement but an enhancement of human capabilities, ensuring that cybersecurity professionals remain at the forefront of technological innovation and defense strategies. Disclaimer: The views and opinions expressed in this guest post are solely those of the author(s) and do not necessarily reflect the official policy or position of The Cyber Express. Any content provided by the author is of their opinion and is not intended to malign any religion, ethnic group, club, organization, company, individual, or anyone or anything.Brompton C Line Electric review: Fun and foldable, fits better than you’d think
![What can I say? It was tough putting the Brompton C Line Electric through its paces. Finding just the right context for it. Grueling work.](https://cdn.arstechnica.net/wp-content/uploads/2024/05/brompton_cafe2-800x600.jpg)
Enlarge / What can I say? It was tough putting the Brompton C Line Electric through its paces. Finding just the right context for it. Grueling work. (credit: Kevin Purdy)
There’s never been a better time to ride a weird bike.
That's especially true if you live in a city where you can regularly see kids being dropped off at schools from cargo bikes with buckets, child seats, and full rain covers. Further out from the urban core, fat-tire e-bikes share space on trails with three-wheelers, retro-style cruisers, and slick roadies. And folding bikes, once an obscurity, are showing up in more places, especially as they’ve gone electric.
So when I got to try out the Brompton Electric C Line (in a six-speed model), I felt far less intimidated riding, folding, and stashing the little guy wherever I went than I might have been a few years back. A few folks recognized the distinctively small and British bike and offered a thumbs-up or light curiosity. If anyone was concerned about the oddity of this quirky ride, it was me, mostly because I obsessed over whether I could and should lock it up outside or not.
Can a technology called RAG keep AI models from making stuff up?
![Can a technology called RAG keep AI models from making stuff up?](https://cdn.arstechnica.net/wp-content/uploads/2024/06/AI-RAG-bumper-guides-800x450.jpg)
Enlarge (credit: Aurich Lawson | Getty Images)
We’ve been living through the generative AI boom for nearly a year and a half now, following the late 2022 release of OpenAI’s ChatGPT. But despite transformative effects on companies’ share prices, generative AI tools powered by large language models (LLMs) still have major drawbacks that have kept them from being as useful as many would like them to be. Retrieval augmented generation, or RAG, aims to fix some of those drawbacks.
Perhaps the most prominent drawback of LLMs is their tendency toward confabulation (also called “hallucination”), which is a statistical gap-filling phenomenon AI language models produce when they are tasked with reproducing knowledge that wasn’t present in the training data. They generate plausible-sounding text that can veer toward accuracy when the training data is solid but otherwise may just be completely made up.
Relying on confabulating AI models gets people and companies in trouble, as we’ve covered in the past. In 2023, we saw two instances of lawyers citing legal cases, confabulated by AI, that didn’t exist. We’ve covered claims against OpenAI in which ChatGPT confabulated and accused innocent people of doing terrible things. In February, we wrote about Air Canada’s customer service chatbot inventing a refund policy, and in March, a New York City chatbot was caught confabulating city regulations.