Feed aggregator
Train Fast, but Think Slow
Article URL: https://blog.bagel.net/p/train-fast-but-think-slow
Comments URL: https://news.ycombinator.com/item?id=42065377
Points: 1
# Comments: 0
Please take our programming assessment with an LLM
Article URL: https://creatingvalue.substack.com/p/please-take-our-programming-assessment
Comments URL: https://news.ycombinator.com/item?id=42065374
Points: 3
# Comments: 0
Jetsetters Should Snag This Wrangler Luggage Set While It's Down to Just $40
Russian influence on the 2024 election (queryable graph)
Article URL: https://russia-elections24.getzep.com/
Comments URL: https://news.ycombinator.com/item?id=42065331
Points: 1
# Comments: 0
Prova
Article URL: https://news.ycombinator.com/from?site=theregister.com
Comments URL: https://news.ycombinator.com/item?id=42065312
Points: 1
# Comments: 0
EU charges Corning with antitrust violations over Gorilla Glass dominance
Article URL: https://www.theregister.com/2024/11/06/eu_charges_corning_with_antitrust/
Comments URL: https://news.ycombinator.com/item?id=42065304
Points: 2
# Comments: 0
Champions League Soccer: Livestream Bayern Munich vs. Benfica From Anywhere
Zero Trust Workshop: Advance your knowledge with an online resource
Microsoft is on the front lines helping secure customers worldwide—analyzing and responding to cybersecurity threats, building security technologies, and partnering with organizations to effectively deploy these technologies for increased security. Many of you have been following as we’ve described our Secure Future Initiative, which is pushing the Zero Trust principles verify explicitly, least privilege and assume breach into the programmatic approach of Secure by Design, Secure by Default, and Secure Operations across Microsoft consistently, durably and at scale. In the Microsoft Security division, we are also focused on helping our customers deploy our suite of security products to protect themselves from cyber threats. We know that most of our customers are embarking on a Zero Trust journey, but many struggle with the enormity of the opportunity: where to start, what to do next, and how to measure progress.
We are announcing a resource to help our customers answer these questions: The Microsoft Zero Trust Workshop, a self-service tool to help you plan and execute your Zero Trust journey guide by yourself or with the guidance of a partner.
The Zero Trust Workshop lets you customize your organization’s end-to-end security deployment to your unique business needs and your environment with a powerful tool that: provides a comprehensive assessment of zero trust capabilities learned from hundreds of deployments; guides you with a visual easy-to-use tool that explains each step of the journey; and delivers a digital artifact that you and your team can use to plan and prioritize your next steps and to compare and measure progress regularly.
Zero Trust WorkshopA comprehensive technical guide to help customers and partners adopt a Zero Trust strategy and deploy security solutions end-to-end to secure their organizations.
Learn more How our workshop helps customers and partners solidify their Zero Trust strategyOver the past year, we have piloted this workshop with more than 30 customers and partners. They have consistently told us that this provides them with the clarity, coverage, and actionable guidance they need to secure their organization within each Zero Trust pillar and across the pillars. When asked how likely they are to recommend the workshop to their partner teams or to other customers, customers give the workshop a net promoter score of 73.
The layout and question structure is fantastic as it provokes a fair amount of thought around adding each of the capabilities to take a multi-faceted approach to authentication and authorization.
—Senior vice president at a major financial institution
Security is a team sport, and we recognize that customers often need security partners to help them plan and execute their security strategy. This is why we partnered with several deployment partners across the pillars of Zero Trust to get their feedback on the workshop and how they would use it to help their customers.
The Zero Trust Workshop is a great starting point for our customers who want to embrace Zero Trust principles, but don’t know how to align the technology they already own. Furthermore, the workshop allows our customers to measure the progress they’ve made and aim for the next incremental hardening of the Zero Trust model, which is part and parcel of the Zero Trust manner of thinking. As a Microsoft partner and as an MVP, I advocate that customers use the materials provided by Microsoft, including these workshops, to measure and further their security posture.
—Nicolas Blank, NBConsult
[The Zero Trust workshop] has enabled Slalom to help clients accelerate their efforts towards a comprehensive cyber resilience strategy. It provides a clear picture of an organization’s current state and provides a template for order of operations and best practices in a very tidy package. It’s an easy-to-use tool with a huge impact, and our clients and workshop participants have been very impressed by how it organizes and prioritizes a complex set of operations in an approachable and manageable way.
—Slalom
Please try the Zero Trust Workshop How to start using the workshop to plan your Zero Trust journeyThe Zero Trust Workshop is comprised of two main components, all in one handy file you can download and use to drive these conversations:
- The Zero Trust Basic Assessment (optional): For customers starting on their Zero Trust journey, the assessment is a foundational tool that customers can run before the workshop to check for common misconfigurations and gaps in settings (for example, having too many global admins) to remediate before starting to enable the security features and capabilities of a Zero Trust journey.
- The Zero Trust Strategy workshop: This is a guided breakdown of the Zero Trust areas according to the standard Zero Trust pillars (Identity, Devices, Data, Network, Infrastructure and Application, and Security Operations). For each pillar, we walk you through the associated areas with a proposed “do this first, consider this then, think about this next” order to how you should tackle them. For each area and capability, you have guidance on why it matters and options to address it and then can discuss it with your stakeholder and decide if this is something you already did, something you are going to do, or something you do not plan to implement at this time. As you progress through the different boxes and areas, you create an artifact for your organization on how well-deployed you are in this Zero Trust pillar and what are the next areas to tackle.
Now, we are launching the Identity, Devices, and Data pillars. We will add the Network, Infrastructure and Application, and Security Operations in the coming few months. The website for the workshop will announce these as they become available.
Figure 1. Example of the apps and users area of the Identity pillar of the workshop. Figure 2. Example of the strategy and co-management areas of the Devices pillar of the workshop. Figure 3. Example of the identification, classification and protection areas of the Data pillar of the workshop.I invite you to check out the Zero Trust Workshop site where we have detailed training videos and content.
For our valued security deployment partners, the workshop is also included in the recently launched Zero Trust Partner kit where, as a partner, you can take the workshop material and customize it for your customer engagements based on your needs.
Closing thoughtsWe all need to work together to help secure the world we live in and keep people safe with the intention of collective defense. As shared in the most recent Microsoft Digital Defense Report, the cyber threat landscape is ever-growing and requires a collaborative approach between product vendors, security experts, and customers to help protect everyone. In the spirit of working with the wider ecosystem to help secure all customers, we recently partnered with NIST’s NCCoE and more than 20 security vendors to publish a guide on how to adopt NIST’s Zero Trust reference architecture using Microsoft’s Security products and this is another example of us working with all of you deploying security out there to help secure the ecosystem.
Give the Zero Trust Workshop a tryWe would love to hear how you are using it. Use the feedback form on the site to share with us how we can improve it to help your organization implement a Zero Trust journey.
Additional resources to accelerate your Zero Trust journeyThis joins a library of other resources to guide your security modernization and Zero Trust journey, including:
- The Microsoft Security Adoption Framework (SAF) which includes the Microsoft Cybersecurity Reference Architecture and the Chief Information Security Officer (CISO) Workshop.
To learn more about Microsoft Security solutions, visit our website. Bookmark the Security blog to keep up with our expert coverage on security matters. Also, follow us at @MSFTSecurity for the latest news and updates on cybersecurity.
The post Zero Trust Workshop: Advance your knowledge with an online resource appeared first on Microsoft Security Blog.
Can I Install a Security Camera Outside My Apartment?
The Reasons Authoritarianism Is Growing – and How to Reverse It
Article URL: https://www.scottsantens.com/the-hidden-reasons-authoritarianism-is-growing-and-how-to-reverse-it-ubi/
Comments URL: https://news.ycombinator.com/item?id=42065269
Points: 3
# Comments: 0
Show HN: A location-based, privacy-sensitive photo app for on-site reports etc.
This little tool allows you to take multiple photos, load photos from a folder on your device, or save them to a folder on your device.
If you turn on geo-location, your filename includes the location, and you can see this location by clicking on the red pin.
Everything runs client-side in the browser, and none of your picture info is sent to any server.
This might come in handy if you need to go to a wharf, and take multiple pictures with a smartphone for example, and would like to easily see them & browse them, together with the location.
Comments URL: https://news.ycombinator.com/item?id=42065264
Points: 1
# Comments: 0
The best VPN routers of 2024
The Immigration-Wage Myth
Article URL: https://www.theatlantic.com/podcasts/archive/2024/11/immigration-worker-wages-myth-jobs/680523/
Comments URL: https://news.ycombinator.com/item?id=42065250
Points: 2
# Comments: 0
The Freedom of Quincy Jones
Article URL: https://www.theatlantic.com/culture/archive/2024/11/quincy-jones-obituary-future/680536/
Comments URL: https://news.ycombinator.com/item?id=42065238
Points: 1
# Comments: 0
The 2024 U.S. Election is Over. EFF is Ready for What's Next.
The dust of the U.S. election is settling, and we want you to know that EFF is ready for whatever’s next. Our mission to ensure that technology serves you—rather than silencing, tracking, or oppressing you—does not change. Some of what’s to come will be in uncharted territory. But we have been preparing for whatever this future brings for a long time. EFF is at its best when the stakes are high.
No matter what, EFF will take every opportunity to stand with users. We’ll continue to advance our mission of user privacy, free expression, and innovation, regardless of the obstacles. We will hit the ground running.
During the previous Trump administration, EFF didn’t just hold the line. We pushed digital rights forward in significant ways, both nationally and locally. We supported those protesting in the streets, with expanded Surveillance Self-Defense guides and our Security Education Companion. The first offers information for how to protect yourself while you exercise your First Amendment rights, and the second gives tips on how to help your friends and colleagues be more safe.
Along with our allies, we fought government use of face surveillance, passing municipal bans on the dangerous technology. We urged the Supreme Court to expand protections for your cell phone data, and in Carpenter v United States, they did so—recognizing that location information collected by cell providers creates a “detailed chronicle of a person’s physical presence compiled every day, every moment over years.” Now, police must get a warrant before obtaining a significant amount of this data.
EFF is at its best when the stakes are high.
But we also stood our ground when governments and companies tried to take away the hard-fought protections we’d won in previous years. We stopped government attempts to backdoor private messaging with “ghost” and “client-side scanning” measures that obscured their intentions to undermine end-to-end encryption. We defended Section 230, the common sense law that protects Americans’ freedom of expression online by protecting the intermediaries we all rely on. And when the COVID pandemic hit, we carefully analyzed and pushed back measures that would have gone beyond what was necessary to keep people safe and healthy by invading our privacy and inhibiting our free speech.
Every time policymakers or private companies tried to undermine your rights online during the last Trump administration from 2016-2020, we were there—just as we continued to be under President Biden. In preparation for the next four years, here’s just some of the groundwork we’ve already laid:
- Border Surveillance: For a decade we’ve been revealing how the hundreds of millions of dollars pumped into surveillance technology along the border impacts the privacy of those who live, work, or seek refuge there, and thousands of others transiting through our border communities each day. We’ve defended the rights of people whose devices have been searched or seized upon entering the country. We’ve mapped out the network of automated license plate readers installed at checkpoints and land entry points, and the more than 465 surveillance towers along the U.S.-Mexico border. And we’ve advocated for sanctuary data policies restricting how ICE can access criminal justice and surveillance data.
- Surveillance Self-Defense: Protecting your private communications will only become more critical, so we’ve been expanding both the content and the translations of our Surveillance Self-Defense guides. We’ve written clear guidance for staying secure that applies to everyone, but is particularly important for journalists, protesters, activists, LGBTQ+ youths, and other vulnerable populations.
- Reproductive Rights: Long before Roe v. Wade was overturned, EFF was working to minimize the ways that law enforcement can obtain data from tech companies and data brokers. After the Dobbs decision was handed down, we supported multiple laws in California that shield both reproductive and transgender health data privacy, even for people outside of California. But there’s more to do, and we’re working closely with those involved in the reproductive justice movement to make more progress.
- Transition Memo: When the next administration takes over, we’ll be sending a lengthy, detailed policy analysis to the incoming administration on everything from competition to AI to intellectual property to surveillance and privacy. We provided a similarly thoughtful set of recommendations on digital rights issues after the last presidential election, helping to guide critical policy discussions.
We’ve prepared much more too. The road ahead will not be easy, and some of it is not yet mapped out, but one of the reasons EFF is so effective is that we play the long game. We’ll be here when this administration ends and the next one takes over, and we’ll continue to push. Our nonpartisan approach to tech policy works because we work for the user.
We’re not merely fighting against individual companies or elected officials or even specific administrations. We are fighting for you. That won’t stop no matter who’s in office.
Samsamelo – Silicon Valley selling trolley problem lies
Article URL: https://lgwnncpcqsloqa4sqqqq5osup2rlqp7iiqliyu4y6vveu5jy6tlq.g8way.io/WazWieKElugDkoQhDrpUfqK4P-hEFoxTmPVqSnU49Nc?
Comments URL: https://news.ycombinator.com/item?id=42065193
Points: 1
# Comments: 1
The Reality of Hospitals
Article URL: https://rxjourney.com.ng/hospitals-are-depressing
Comments URL: https://news.ycombinator.com/item?id=42065129
Points: 1
# Comments: 0
Influence Agents
Article URL: https://geohot.github.io//blog/jekyll/update/2024/11/04/influence-agents.html
Comments URL: https://news.ycombinator.com/item?id=42065124
Points: 1
# Comments: 0
The Raspberry Pi CM5 Is Weeks Away?
Article URL: https://bret.dk/raspberry-pi-cm5-is-weeks-away/
Comments URL: https://news.ycombinator.com/item?id=42065070
Points: 2
# Comments: 0
Show HN: Terraform Module to Deploy Kubernetes on Hetzner Cloud
Article URL: https://github.com/hcloud-k8s/terraform-hcloud-kubernetes
Comments URL: https://news.ycombinator.com/item?id=42065069
Points: 1
# Comments: 0