A melee broke out at midfield of Ohio Stadium after Michigan upset No. 2 Ohio State 13-10 on Saturday. After the Wolverines' fourth straight win in the series, players converged at the block "O" to plant its flag. The Ohio State players were in the south end zone singing their alma mater in front of the student section. When the Buckeyes saw the Wolverines' flag, they rushed toward the 50-yard line. Social media posts showed Michigan offensive lineman Raheem Anderson carrying the flag on a long pole to midfield, where the Wolverines were met by dozens of Ohio State players and fights broke out. Buckeyes defensive end Jack Sawyer was seen ripping the flag off the pole and taking the flag as he scuffled with several people trying to recover the flag. A statement from the Ohio State Police Department read: "Following the game, officers from multiple law enforcement agencies assisted in breaking up an on-field altercation. During the scuffle, multiple officers representing Ohio and Michigan deployed pepper spray. OSUPD is the lead agency for games and will continue to investigate." Michigan running back Kalel Mullings on FOX said: "For such a great game, you hate to see stuff like that after the game. It's bad for the sport, bad for college football. At the end of the day, some people got to learn how to lose, man. "You can't be fighting and stuff just because you lost the game. We had 60 minutes and four quarters to do all that fighting. Now people want to talk and fight. That's wrong. It's bad for the game. Classless, in my opinion. People got to be better." Once order was restored, officers cordoned the 50-yard line, using bicycles as barriers. Ohio State coach Ryan Day in his postgame press conference said he wasn't sure what happened. "I don't know all the details of it. But I know that these guys are looking to put a flag on our field and our guys weren't going to let that happen," he said. "I'll find out exactly what happened, but this is our field and certainly we're embarrassed at the fact we lost the game, but there's some prideful guys on our team that weren't just going to let that happen." The Big Ten has not yet released a statement on the incident. --Field Level MediaISLAMABAD: The World Population Review (WPR) has ranked Pakistan 198th globally in internet speed rankings, below Palestine, Bhutan, Ghana, Iraq, Iran, Lebanon, and Libya in internet speed. According to WPR’s recent report, the average mobile internet download speed in Pakistan is 19.59 Mbps, while broadband internet averages 15.52 Mbps. It said the United Arab Emirates (UAE) leads globally in both mobile and broadband internet speed, followed by Singapore in mobile internet and Qatar in broadband speed. Hong Kong and Chile rank third and fourth in mobile internet speed, respectively. The report anticipates improvements in internet speed with advancements in technology. Chairman of the Pakistan Software Houses Association (P@SHA), Sajjad Mustafa Syed, has stated that the current internet speed issues are expected to be resolved within a three-month timeframe, amidst concerns that the implementation of a firewall may cause connectivity problems. He remarked, “If a message is being sent via WhatsApp but images are not transmitting, it may indicate that monitoring is taking place.” Users in various regions of Pakistan are experiencing intermittent internet outages and reduced speeds, which hinder their ability to browse, download, and share media effectively. Reports suggest that both Wi-Fi and mobile data services are suffering from significant slowdowns, rendering it extremely difficult for users to send or receive media files, including images, videos, and voice notes on widely used platforms like WhatsApp. Save my name, email, and website in this browser for the next time I comment. Δ document.getElementById( "ak_js_1" ).setAttribute( "value", ( new Date() ).getTime() );
AUM of USD 635 Billion at ADFW Caps Stellar Q4 as Trillion-Dollar Club Flock to ADGMAP News Summary at 2:19 p.m. EST
CAMBRIDGE, UK , Dec. 19, 2024 /PRNewswire/ -- Darktrace, a global leader in AI for cybersecurity, today announces that Darktrace / EMAILTM, has been recognized in the first ever Gartner Magic QuadrantTM for Email Security Platforms (ESP) as a Challenger. Chris Kozup, Chief Marketing Officer, Darktrace, said of the recognition: "We are extremely proud to have been recognized in the first Magic Quadrant for ESP. Since launching Darktrace / EMAIL in 2019, we have grown quickly to support email security for nearly 5,000 organizations around the world, helping to keep them safe from even the most sophisticated and novel email compromises. We believe this wide-scale adoption is a result of our unique, AI-native approach to developing products. We are dedicated to delivering exceptional customer service and innovations that safeguard our customers against the email challenges of today— and tomorrow." Darktrace customers consistently acknowledge its exceptional customer support, delivered by an award-winning 1 service team. Darktrace has the highest percentage of 5-star ratings with a 4.8 rating on Gartner® Peer InsightsTM out of 249 reviews as of 19 th December . We feel this unwavering commitment to customer satisfaction is evident in strong renewal rates and accelerated growth in Darktrace / EMAIL over the past few years, gaining almost 5,000 customers since its launch in 2019. Darktrace / EMAIL, one of the fastest-growing email security products on the market, is built on Darktrace's unique Self-Learning AI, a multi-layered AI engine that leverages different types of AI including NLP and behavioral analysis to detect threats, instead of traditional security measures such as signatures and sandboxing. This approach enables Darktrace to detect and stop threats like business email compromise attacks and novel techniques, including some 56% of which passed through customers' other email security layers. This pioneering approach has enabled Darktrace to introduce industry-leading capabilities such as QR code analysis and automated incident investigations, alongside differentiated functionality to help teams add new depth to their email security, including: Marco Cavallo , IT Manager at Darktrace / EMAIL customer Arpa Industries comments: "During the POV, Darktrace / EMAIL showed how specific attacks were surgically blocked. We realized that other tools wouldn't have detected these threats." Darktrace / EMAIL is part of Darktrace's ActiveAI Security PlatformTM, offering network, cloud, endpoint, identity and operational technology protection from a single shared architecture, all built on Darktrace's unique AI engine – providing a strong, integrated approach to threat prevention, detection and response across an organization's entire digital footprint. Darktrace's global presence supports a diverse and varied customer base, and adapts proactively to customer pain points of all kinds. Darktrace's adaptability across all market segments, from SMBs to large enterprises, supports both first time email security buyers and mature email security stacks. It is able to meet varied security needs with lower setup requirements, includes capability for advanced depth in configuration and, particularly for mature organizations, can augment existing security providers with additional protections. Download the full Magic Quadrant for Email Security Platforms here Resources: Gartner disclaimers Gartner, Magic Quadrant for Email Security Platforms, Max Taggett , Nikul Patel , Franz Hinner , Deepak Mishra , 16 December 2024 GARTNER is a registered trademark and service mark of Gartner and Magic Quadrant and Peer Insights are a registered trademark, of Gartner, Inc. and/or its affiliates in the U.S. and internationally and are used herein with permission. All rights reserved. Gartner Peer Insights content consists of the opinions of individual end users based on their own experiences with the vendors listed on the platform, should not be construed as statements of fact, nor do they represent the views of Gartner or its affiliates. Gartner does not endorse any vendor, product or service depicted in this content nor makes any warranties, expressed or implied, with respect to this content, about its accuracy or completeness, including any warranties of merchantability or fitness for a particular purpose. Gartner does not endorse any vendor, product or service depicted in its research publications and does not advise technology users to select only those vendors with the highest ratings or other designation. Gartner research publications consist of the opinions of Gartner's research organization and should not be construed as statements of fact. Gartner disclaims all warranties, expressed or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose. About Darktrace Darktrace is a global leader in AI for cybersecurity that keeps organizations ahead of the changing threat landscape every day. Founded in 2013, Darktrace provides the essential cybersecurity platform protecting organizations from unknown threats using its proprietary AI that learns from the unique patterns of life for each customer in real-time. The Darktrace ActiveAI Security PlatformTM delivers a proactive approach to cyber resilience with pre-emptive visibility into security posture, real-time threat detection, and autonomous response – securing the business across cloud, email, identities, operational technology, endpoints, and network. Breakthrough innovations from our R&D teams in Cambridge, UK , and The Hague, Netherlands have resulted in over 200 patent applications filed. Darktrace's platform and services are supported by over 2,400 employees around the world who protect nearly 10,000 customers across all major industries globally. To learn more, visit http://www.darktrace.com . 1 Darktrace wins two Globee awards for excellent customer service [ Press Release ] View original content to download multimedia: https://www.prnewswire.com/news-releases/darktrace--email-recognized-in-first-ever-gartner-magic-quadrant-for-email-security-platforms-302336602.html SOURCE DarktraceSynthetic identities, deepfakes and other AI-driven attacks are prompting a surge in interest in custom fraud protection tools. In a recent , executives from and offer insights into how fraud is driving change in the whirlwind world of document verification. Will Charnley, COO of Liminal, says that, both inside and outside identity document verification, the last 20-plus years have seen a physical-first consumer environment to one built primarily on digital experience – a that was expedited by the Covid-19 pandemic. At present, the average online person interacts regularly with at least twenty digital accounts every year. Most importantly, people like digital interactions: Charnley says 83 percent of consumers express a preference for them exclusively. is, by necessity, changing in tandem with broader digital transformation. Charnley says its market is changing, too. “What we’re seeing is that buyers need better built solutions, depending on their pain points and use cases, to meet consumer demand when it comes to privacy, when it comes to security, when it comes to customer experience.” Many identity verification providers’ long-term focus on financial services is shifting. Charnley says the market is evolving outside of its historical roots in to service buyers beyond the banking and financial services sectors. New cases are emerging in parts of the customer journey beyond account opening; Charnley cites as a prime example, noting Australia’s recent move to restrict users under 16 from creating social media accounts. Market options, likewise, are expanding. “There are different ways to verify age and finding the right size for your use case is incredibly important.” New types of mobile digital transactions mean more entry points for fraud. Charnley says that it’s more challenging than ever to prevent rapidly accelerating fraud, losses from which are projected to crest 100 billion by 2030. Synthetic identities, Gen-AI created deepfakes and other hostile avatars make crucial across evolving use cases. “Things are clearly getting worse,” Charnley says. Financial services buyers expect AI-enabled fraud to grow substantially in the next two years. “ has made committing fraud incredibly easy and the quality has gone way up. So we have higher volumes of fraud, more sophisticated fraud attacks, and it’s more accessible to anyone.” It’s all forcing organizations to change their fraud assessment models from the ground up: 92 percent say they do not have adequate defenses against GenAI and . Albert Roux, EVP of product for Microblink, says firms probably have more fraud than they think, and that is far more complicated than simply honing in on widely-used platforms like ChatGPT. Multimodal biometric protections and effective liveness detection are needed for a layered approach to defense against fraud. Biometric authentication, in particular, is popular with buyers looking for a way to secure customer authentication and simplify account recovery. Roux discusses “device intelligence” that ties a device to an identity and can access behavioral biometrics, perform , and so on. Trust is, as always, a major concern for customers using businesses outside of banking, with 31 percent expressing concern about data privacy. But so is the often-neglected UX factor. Friction applied long enough will eventually burn: 15 percent of customers still say there is too much friction in , and 26 percent say account openings take too much time. Abandonment is common. Charnley says “now is the right time to act” on securing identity document verification using tools and other layered security measures, but that it’s key to implement tailored solutions that are optimized or designed for specific use cases. “You really need to, as a practitioner, make sure you’re buying a solution that fits your specific needs.” Find solutions with expertise outside of financial services, and the results are likely to be less tied to a compliance model and more attuned to new . Many identity verification systems are still holdovers from the compliance days. But those are over now: identity verification is not just for banks anymore, and customers across the spectrum want smooth, secure experiences they can trust. In the prism of digital identity, new facets and colors continue to emerge. | | | | | | | |Cox Names New Market VP
Illegal border crossers sponsoring illegal border crossers? Biden admin takes heat
Nexgel director Jerome Zeldis buys common stock worth $9,999Trump lawyers ask NYC judge to toss Stormy Daniels hush money caseEconomy Minister: Eliminating watchdog agencies doesn’t violate USMCA free trade deal
NoneHow to protect your communications through encryption
– Cassava Technologies, a pioneering technology company of African heritage, has successfully raised $310 million in capital to solidify its position as a global leader in digital solutions. The funding includes a $90 million equity investment from esteemed partners such as the U.S. International Development Finance Corporation, Google, and Finnfund. These new investors join a robust shareholder base, which already includes the Econet Group, British International Investment, Public Investment Corporation, Royal Bafokeng Holdings, Gateway Partners, and the Fund for Export Development in Africa (FEDA). Additionally, Liquid Intelligent Technologies, one of Cassava Technologies’ key businesses, has secured a $220 million debt refinancing package. This arrangement was supported by Standard Bank Group, Rand Merchant Bank (RMB), Nedbank, and the International Finance Corporation (IFC), further strengthening the company’s financial stability. The $310 million injection aligns with Cassava Technologies’ strategic reorganisation into an integrated digital solutions platform. The company aims to deliver innovative services, including broadband connectivity, data centre co-location, cloud services, cybersecurity, AI computing, and fintech solutions, across its target markets. “This funding is more than just numbers,” said Hardy Pemhiwa, President and CEO of Cassava Technologies. “It reflects the trust of global investors, the dedication of our teams, the loyalty of our customers, and the unwavering support of our shareholders and partners. Together, we are advancing our vision of a digitally connected future that leaves no African behind.” Cassava Technologies continues to play a transformative role in the digital landscape, ensuring Africa’s integration into the global digital economy while fostering inclusive growth and development. This latest milestone underscores the company’s commitment to innovation and its position as a trailblazer in the technology sector.Hugh Jackman may spend some of the Christmas holidays either without his two children or his rumored new girlfriend, Sutton Foster, because his ex-wife Deborra-Lee Furness isn’t ready to created a “blended,” “modern-family” dynamic with all of them celebrating together. The 56-year-old Jackman reportedly wanted to introduce Foster, 49, to his adult children, Oscar, 24, and Ava,19, but Furness is not “keen” on the idea, Woman’s Day reported. “It’s going to take more time for loved ones to adjust to the new normal and so that means Hugh and Sutton are bracing themselves for way less time together than they’d like during the holidays,” an insider told Woman’s Day. Even without saying anything publicly, Furness, 68, has reportedly made it clear that she’s not happy with how her marriage ended. A report last month said she appeared to confirm a social media post that said that Jackman’s alleged backstage affair with Foster , his co-star in the hit Broadway revival of “The Music Man,” is the reason behind their divorce after 27 years of marriage. For that reason, Furness feels like Jackman is “moving on quickly” even after she “gave so much of herself to their marriage,” the Woman’s Day source said. She definitely doesn’t want a “blended” Christmas, in which she’d presumably include Foster and even her 7-year-old daughter in their family celebrations. “Hugh and Sutton would love to get together with their kids for the holidays, but it’s still awkward, and Hugh is conscious of respecting Deb’s feelings,” the source said. Tensions are “still simmering,” according to Woman’s Day. “Deb feels like Hugh hasn’t properly acknowledged the hurt he caused by moving on so quickly,” the insider also said. Jackman and Furness shocked fans when they announced their separation in September 2023. One of a few Hollywood couples known for a long and seemingly happy marriage, they issued a statement that sounded polite and amicable, saying that their journey together was “shifting,” and they had “decided to separate to pursue our individual growth.” But then came reports in October, saying that Jackman had developed a “close relationship” with Sutton when they starred together in “The Music Man,” which ran from late 2021 to January 2023 at the Winter Garden Theatre in Manhattan. At the time, both were married to other people. The reports about a rumored affair began as soon as the Tony Award-winning Foster filed for divorce from screenwriter Ted Griffin after 10 years of marriage. A source close to Foster told Us Weekly: “Sutton and Hugh’s relationship is the reason Hugh and Deb (separated).” In October, gossip blogger Tasha Lustig also said that Furness was “blindsided” by her husband’s romance with his co-star, even after she had given her “whole life and career to him,” Us Weekly also reported. Lustig said that the Broadway stars were planning to “soft launch” their relationship publicly. But even if Furness was “blindsided” by her husband’s alleged romance, she had concerns about him working with Foster, the Daily Mail reported . A source told the Daily Mail that the relationship was “not a secret to her.” The relationship also was “not a secret” among the New York theater community. It was in fact an “open secret” in Broadway circles, multiple reports said. The romance allegedly developed while Jackman and Foster were working together on the classic musical comedy, which is set in small-town America at the turn of the 20th century. His conman and her librarian fall in love through a series of music and dance numbers. As Jackman and Foster promoted the show, they didn’t hide their regard for each other. During a 2022 interview on “Live with Kelly and Ryan,” Foster admitted that she and Jackman developed a very close bond and explained how they started a pre-performance ritual that took place when they were alone in her dressing room. “We call it carpet chat,” Foster revealed in the interview. Woman’s Day reported that Jackman and Furness’s children are handling the upheaval with “remarkable maturity.” The source said, “They just want peace and happiness for their parents. But they’re definitely aware of the tension.” Meanwhile, Jackman and Foster are “shocked by the backlash,” another insider told Woman’s Day. With a blended family Christmas off the table, the new couple are reportedly planning a romantic getaway in the New Year. “They’re determined to make it work, but for now, they’re trying to keep things as low-key as possible out of respect for everyone involved,” the source said.
By KELVIN CHAN LONDON (AP) — After a sprawling hacking campaign exposed the communications of an unknown number of Americans, U.S. cybersecurity officials are advising people to use encryption in their communications. To safeguard against the risks highlighted by the campaign, which originated in China, federal cybersecurity authorities released an extensive list of security recommendations for U.S. telecom companies — such as Verizon and AT&T — that were targeted. The advice includes one tip we can all put into practice with our phones: “Ensure that traffic is end-to-end encrypted to the maximum extent possible.” End-to-end encryption, also known as E2EE, means that messages are scrambled so that only the sender and recipient can see them. If anyone else intercepts the message, all they will see is a garble that can’t be unscrambled without the key. Law enforcement officials had until now resisted this type of encryption because it means the technology companies themselves won’t be able to look at the messages, nor respond to law enforcement requests to turn the data over. Here’s a look at various ways ordinary consumers can use end-to-end encryption: Officials said the hackers targeted the metadata of a large number of customers, including information on the dates, times and recipients of calls and texts. They also managed to see the content from texts from a much smaller number of victims. If you’re an iPhone user, information in text messages that you send to someone else who also has an iPhone will be encrypted end-to-end. Just look for the blue text bubbles, which indicate that they are encrypted iMessages. The same goes for Android users sending texts through Google Messages. There will be a lock next to the timestamp on each message to indicate the encryption is on. But there’s a weakness. When iPhone and Android users text each other, the messages are encrypted only using Rich Communication Services, an industry standard for instant messaging that replaces the older SMS and MMS standards. Apple has noted that RCS messages “aren’t end-to-end encrypted, which means they’re not protected from a third party reading them while they’re sent between devices.” Samsung, which sells Android smartphones, has also hinted at the issue in a footnote at the bottom of a press release last month on RCS, saying, “Encryption only available for Android to Android communication.” To avoid getting caught out when trading texts, experts recommend using encrypted messaging apps. Privacy advocates are big fans of Signal, which applies end-to-end encryption on all messages and voice calls. The independent nonprofit group behind the app promises never to sell, rent, or lease customer data and has made its source code publicly available so that it can be audited by anyone to examine it “for security and correctness.” Signal’s encryption protocol is so reputable that it has been integrated into rival WhatsApp , so users will enjoy the same level of security protection as Signal, which has a much smaller user base. End-to-end encryption is also the default mode for Facebook Messenger , which like WhatsApp is owned by Meta Platforms. Telegram is an app that can be used for one-on-one conversations, group chats and broadcast “channels” but contrary to popular perception, it doesn’t turn on end-to-end encryption by default. Users have to switch on the option. And it doesn’t work with group chats. Cybersecurity experts have warned people against using Telegram for private communications and pointed out that only its opt-in ‘secret chat’ feature is encrypted from end-to-end. The app also has a reputation for being a haven for scammers and criminal activity, highlighted by founder and CEO Pavel Durov’s arrest in France . Instead of using your phone to make calls through a wireless cellular network, you can make voice calls with Signal and WhatsApp. Both apps encrypt calls with the same technology that they use to encrypt messages. There are other options. If you have an iPhone you can use Facetime for calls, while Android owners can use the Google Fi service, which are both end-to-end encrypted. The only catch with all these options is that, as with using the chat services to send messages, the person on the other end will also have to have the app installed. WhatsApp and Signal users can customize their privacy preferences in the settings, including hiding IP address during calls to prevent your general location from being guessed. Is there a tech topic that you think needs explaining? Write to us at onetechtip@ap.org with your suggestions for future editions of One Tech Tip.SOLiD Awarded NTIA Grant for Open RAN Development ProjectIf you’re a ratepayer in the state of Connecticut, this piece isn’t for you. You know already, through the pain in your wallet, that Connecticut residents and businesses pay some of the highest electricity rates in the country. Righting the ship after decades of decay is tough, time-consuming work. No, this letter is to the ratings agencies – specifically S&P, and the members of the media who reprinted the with little to no independent reporting. Had they done a little digging, they might have uncovered that , ever since Eversource entered the risky, unregulated world of offshore wind, and well before the current Public Utilities Regulatory Authority chair assumed her role. They may have also discovered that S&P isn’t following its own prior warnings or guidance on funds from operations (FFO) to debt and to what rating certain metrics correspond, but perhaps that’s a little too much to ask for. A little independent reporting might have also uncovered that Eversource just posted a and has a history of (the payouts made to shareholders). There are a lot of perverse incentives at play when you are dealing in the world of regulated monopolies. Among them: ratings agencies are paid for directly by the utilities (they use the issuer-pays ), and utility executives are often their sole source of information and perspective. And until we enacted bipartisan legislation in 2023, known colloquially as , the costs of investor relations were a 100% pass-through to ratepayers like you. To suggest that these ratings agencies are independent or objective is nonsensical. The utility itself can pass through the cost of debt to its captive customers, so what does the utility care if it becomes the company that cries wolf and provokes a downgrade in pursuit of its grander strategy to warn regulators across New England not to replicate the accountability measures and imposed by its Connecticut regulators? That’s certainly the picture that the recently pieced together. Let’s face the facts: could S&P’s downgrade of the Avangrid and Eversource companies raise rates in Connecticut? That’s an overwhelming: Maybe. There’s a lot that has to align before that dire warning comes true, and if you’re interested in the facts, we’d encourage you to read . But what was also missed in the rush of the initial reporting on this topic is the other side of the story: the benefits of having a more watchful regulator will likely outweigh any speculative costs. Let’s also dispel some of those unfounded rumors that have been circulating over the past week. First, Connecticut is not an outlier. Even with last week’s S&P downgrades, Connecticut’s electric and gas monopoly affiliates of Eversource and Avangrid remain rated at or above their peers, and well above junk bond status. The monopoly utilities’ own trade association, the Edison Electric Institute, issued a stating, “[t]he industry’s average parent company credit rating in 2023 remained at BBB+ for the tenth straight year.” Additionally, and we cannot stress this enough, any suggestion that these utilities are going to pull out of Connecticut represents a fundamental misunderstanding of the facts and the law. Regulated utilities operate as monopolies – receiving a franchise agreement for exclusive operating rights in exchange for providing safe, reliable access to services at reasonable rates. These utilities are not businesses in the traditional sense – they are regulated monopolies with captive customers, who could face for failure to live up to their statutory obligations. Complying with the duly enacted laws passed by our legislature, supported by the governor, and implemented by PURA is a core tenet of the utilities’ obligations in exchange for their continuing monopoly on service. Let’s get real. The in the state of Connecticut who have to compete for customers already know this: a vigilant regulator who orders rate reductions when the record supports it, as well as one that imposes enhanced accountability and transparency in conjunction with the legislature and the governor, is a better long-term bet than the unfounded rhetoric and propaganda of investor-owned monopolies with . So the next time you read reporting by or about Eversource or United Illuminating know this: calls for teamwork in achieving our collective goals of safe and reliable service are certainly nice to hear, but actual collaboration is not a one-way street. In an actual collaborative environment, you don’t get 90% of what you’re asking for and warning that without the final 10%, the initiative will be abandoned. As the co-chairs of the state legislature’s Energy and Technology Committee, we stand ready, willing, and able to enact effective regulatory reforms that still permit the utilities to achieve a reasonable rate of return. But this propaganda must end now.