Air Force to Poll Researchers ‘On the Cutting Edge of Science’ in Review

NATIONAL HARBOR, Md. — Air Force Secretary Heather Wilson announced a 12-month review that aims to prioritize how the service conducts research for the future.

“Today, I am announcing a 12-month effort to conduct a broad review and revision of our science and technology strategy,” Wilson told audiences during a speech at the Air Force Association’s Air, Space and Cyber Conference.

“It will define our highest research priorities, to be sure, but it will also help us strengthen new relationships between our Air Force and the science community, our universities, and our industry partners,” she said.

Related content:

Wilson didn’t detail any specific programs or research areas. The Air Force Research Laboratory, for example, studies everything from lasers to stealth technology in hopes of developing potential future defense applications.

The secretary said her goal is to simultaneously strengthen partnerships between American universities and the service on basic and applied research, especially given the U.S. finds itself “at a time when federal research funding may be uncertain.”

Making her AFA debut as service secretary — the first military secretary to be confirmed in the Trump administration — Wilson said the Air Force Research Lab at Wright-Patterson Air Force Base, Ohio, will lead the review alongside the Air Force Scientific Advisory Board and the National Academies of Science and Engineering.

“We will listen broadly and engage those who are on the cutting edge of science so we can focus on research efforts on the pathways that are vital to our future as a service,” she said.

It is time for the Air Force “to be the sponsor of choice for research scientists,” Wilson said, referencing next-generation engineering as the Pentagon begins to look at next best platforms, aircraft and weapons systems for a potential high-end fight.

The push for more research development comes as the Air Force wants to boost funding for next-generation technologies, such as a potential sixth-generation fighter.

The service’s fiscal 2018 budget request released in May included $25.4 billion for research, development, test and evaluation programs — an increase of $5 billion, or 26 percent, from the current year, according to budget documents.

Innovation has always been rooted in the Air Force’s vision, Wilson said.

She said she and an aide had made a relevant discovery this week, as she was moving items around in her office at the Pentagon.

Her military aide discovered in an old desk a memo written by Gen. Henry “Hap” Arnold, the first and only leader to hold the position General of the Air Force. The memo, dated Dec. 6, 1945, was addressed to Arnold’s successor and first Air Force Chief of Staff Gen. Carl A. Spaatz.

Wilson reminded the audience that Arnold was also an innovator.

“A large part of [his] memo had to do with research and science and innovation,” she said.

Citing Arnold’s stark reminder that the Air Force must get more out of science and research programs in order to stay ahead, Wilson said, “From time to time, it is important to refresh our science and technology strategy, to step back from the programs and problems of today, and project 10 or 20 years into the future.”


via Defensetech
Air Force to Poll Researchers ‘On the Cutting Edge of Science’ in Review

Excalibur Found? Schoolgirl Finds Sword in Dozmary Pool.

Swords are cool. Who doesn’t like swords? They are big knifey things that slash and stab and whatnot! But more people like swords than own them… especially when it comes to kids. But this little girl reportedly bucked the trend by finding a magnificent sword in Dozmary Pool — the very body of water into which King Arthur’s Excalibur was thrown, according to legend.

Seven-year-old Matilda Jones, from Norton, Doncaster, England, spotted the sword as it lay flat on the bottom of the lake, as she waded waist-deep in the pool. Her father didn’t believe her until he saw it for himself.

‘I told her not to be silly and it was probably a bit of fencing, but when I looked down I realised it was a sword. It was just there laying flat on the bottom of the lake.’

Matilda’s father had told her and her younger sister about the King Arthur legend during their drive to the lake.

excalibur02

Dozmary Pool has numerous Arthurian connections:

It is… the home of the Lady of the Lake and is where a young Arthur rowed out to claim the mighty Excalibur.

Folklore has it that Dozmary Pool is where Excalibur was thrown by Sir Bedivere after the Battle of Camlann and Arthur’s death.

According to local tradition after three attempts to relinquish the sword, Sir Bedivere finally managed to comply with King Arthur’s wish and threw it into the lake, an arm rose from the surface, caught the sword and vanished back into the water.

Theoretically, someone may have flung this sword into the lake in order to reenact Sir Bedivere’s legendary toss.

excalibur03

This is no small sword — it’s as long as its discoverer is tall!

‘The sword is 4ft long – exactly Matilda’s height,’ added Paul. ‘I don’t think it’s particularly old about 20 or 30 years old. It’s probably an old film prop.’

At the end of their six-day holiday the family brought the sword home and Matilda and Lois are enjoying telling all her family and friends about her discovery.

I have found a lot of cool stuff, but never a sword. Unless a machete counts…?

The post Excalibur Found? Schoolgirl Finds Sword in Dozmary Pool. appeared first on AllOutdoor.com.

via All Outdoor
Excalibur Found? Schoolgirl Finds Sword in Dozmary Pool.

Steve Case’s Revolution backs Resolute Innovation to connect companies with R&D

It can be hard for big companies to keep tabs on all the research and innovation in their industry. The search for the best patents can be both cumbersome and disorganized.

That’s the idea behind Resolute Innovation, a startup that aims to connect companies with big ideas. New York-based Resolute is building what they’re calling “technology scouting software,” or a searchable R&D database. From food and beverage to cosmetics to pharmaceuticals to space, the concepts span many categories.

Resolute is raising $3.3 million in Series A funding, led by Revolution Ventures, the venture firm created by Tige Savage, David Golden and AOL co-founder Steve Case.

The tech transfer process needs to be re-imagined,” said Case. He believes Resolute will “emerge as the leading platform in building this bridge between innovators with ideas and intellectual properties with businesses that can take those ideas and commercialize them and scale them.”

A lot of the research is provided by universities, including Columbia University (my alma mater), which has a partnership with Resolute. Other ideas stem from startups, hospitals, federal laboratories and research institutes.

Resolute makes money by selling subscriptions to its software. The team says it has thousands of customers and has been working with Fortune 500 companies and other large institutions.

Tige Savage said that he invested because Resolute “uses modern AI technology to make this stuff findable, searchable, indexable, organized.” He believes it fits his investment thesis of looking for “categories where billions of dollars being spent in old-fashioned ways.”

CEO Sebastian Metti says he plans to use the funding to expand their network of researchers. He also wants to continue the international expansion, targeting Asia, Europe, North America and Israel. The startup previously just had angel investors.

 

 

Featured Image: Amy/Flickr UNDER A CC BY 2.0 LICENSE

via TechCrunch
Steve Case’s Revolution backs Resolute Innovation to connect companies with R&D

DIY Dragon’s Beard Cotton Candy

DIY Dragon’s Beard Cotton Candy

Link

Today’s cotton candy is made by heating and spinning sugar using a motor. Eater host Clifford Endo is here to show you how to make it the old fashioned way, using a technique similar to noodles, hand-pulling inverted sugar to make thousands of hair-thin sugar strands.

via The Awesomer
DIY Dragon’s Beard Cotton Candy

Using Zero Trust Network Segmentation To Protect Your Business From Hackers

Cybersecurity is a major concern no matter what size or type of business you are running, but most people just aren’t doing enough. We don’t tend to think about information security until it is too late – after a breach has already occurred. And those breaches can be costly, often putting small businesses completely out of business within a few months in some instances. Many large corporations have recommended practices in place that should stave off most attacks, but unfortunately since humans are the weakest link in cybersecurity chain ultimately breaches are going to happen no matter how well prepared your company is. The new preferred model for cybersecurity is the zero trust model with network segmentation.

What Is Zero Trust?

In the old way of doing cybersecurity, gaining access to a network was as simple as putting in your username and password. Once you were in, you were in, and you pretty much had access to everything once you were inside. A username and password granted you trusted access to the network. Unfortunately this model has some pretty obvious vulnerabilities – hackers only need to gain access to login data, and that has turned out to be pretty easy to do through social engineering.

In the zero trust model, everyone is assumed to be a hacker. Login info will get you into the front door, but there are many more doors inside once you get there thanks to network segmentation. Activity logs are inspected regularly, sometimes even in real time, to detect any threats as quickly as possible. Employees only have access to what they absolutely need, which leaves fewer open doors for hackers to exploit once they do break into a network. And traffic is monitored so that suspicious activity can be detected quickly and threats eliminated before they do serious damage.

Even the Department of Homeland Security recommends zero-trust segmented networks. Among their recommendations:
Design network segments around need-to-know and zero trust principles
Ensure that sensitive information is segmented, even from other sensitive information
Layer security measures so each segment has its own requirements for access

How Much Do Data Breaches Cost, Anyway?

According to Hackerpocalypse: A Cybercrime Revelation from Cybersecurity Ventures:
“Cybersecurity Ventures predicts global annual cybercrime costs will grow from $3 trillion in 2015 to $6 trillion annually by 2021, which includes damage and destruction of data, stolen money, lost productivity, theft of intellectual property, theft of personal and financial data, embezzlement, fraud, post-attack disruption to the normal course of business, forensic investigation, restoration and deletion of hacked data and systems, and reputational harm.”

The individual cost of cleaning up breached records varies by company and by industry. Retail breaches, which are often the most publicized type of breaches because they affect vast numbers of consumers at once, cost millions of dollars per incident to clean up. They also cost the retail outlet in lost sales and reputational damage. But even small data breaches that happen to small businesses that only cost in the tens of thousands to clean up can put a company out of business. After all, how many small businesses have tens of thousands of dollars they aren’t using to put toward cleaning up a data breach?

How To Implement Zero Trust Segmented Networks

Even if you don’t have a large corporation with an information security team and a network architecture specialist there are still ways to get the needed security measures to protect your small business.
Software can automate some security needs
Next generation firewalls can provide greater security
BYOD and password hygiene policies can go a long way
Security consultants often specialize in working with small businesses to find infosec solutions
SaaS and NaaS providers can give your business the same level of security as large corporations

Don’t Let Infosec Get Away From You

Doing something about your company’s information security before it’s too late is crucial if you want to stay in business. Hackers are always looking for vulnerabilities to exploit, so the time to act to make your network safer is now. You are the weakest link and hackers know that. Don’t let them destroy your businesses by not acting to protect it. Learn more about zero trust network segmentation http://ift.tt/2uQZ1uj from this infographic!

The post Using Zero Trust Network Segmentation To Protect Your Business From Hackers appeared first on Dumb Little Man.


via Dumb Little Man – Tips for Life
Using Zero Trust Network Segmentation To Protect Your Business From Hackers

Equifax hackers stole data for 200k credit cards from transaction history


reader comments
0

It wasn’t just credit record data that someone made off with when they breached Equifax’s website starting in May of this year. The attacker also managed to grab credit card data from transactions involving more than 200,000 credit cards, and some of those transactions dated back as far as November of 2016.

Brian Krebs reports that the credit bureau revealed all this credit card data was taken as the result of a single attack that took advantage of a months-old exploit of the Apache Foundation’s Struts framework for Java-based Web applications. Visa and MasterCard both published confidential alerts to banks in their networks this week about the card exposure. Both explicitly blamed Equifax, and Visa linked to Equifax’s press release on the breach. The transactions that may have been exposed took place in a period spanning November 10, 2016 to July 6, 2017, according to the Visa notification.

According to Equifax, the breach began in mid-May and was detected on July 29. “The attacker accessed a storage table that contained historical credit card transaction related information,” an Equifax spokesperson told Krebs. The company did not respond to questions from Krebs about how the data was being stored.

The exposure suggests that Equifax was either not encrypting stored credit card data or that some component of the company’s Java-based software gave the attackers the ability to access decrypted data. Retention of that data would have been in violation of the standards of the PCI Standards Security Council, which requires all stored data to be encrypted.

For consumers, Equifax’s credit card data was likely the least damaging of the exposed information. But it does have an impact on banks, which are among Equifax’s most important customers for consumer credit data. So, ironically, mishandling of credit card data could end up having more of a negative impact on Equifax than the exposure of critical information about nearly a third of US residents.

via Ars Technica
Equifax hackers stole data for 200k credit cards from transaction history

Costanoa Ventures raises $175 million fund

Costanoa Ventures has raised a $175 million fund, the the third fund for the Palo Alto-based venture firm.

With a focus on enterprise technology, Costanoa Ventures typically invests at seed stage and Series A. The new fund brings the total capital for the five-year-old firm to $500 million under management.

Founder and managing partner Greg Sands came from Sutter Hill and before that, was known for coming up with the name Netscape, the dot-com era web browser where he worked.

Recently, the firm celebrated its exit of Intacct, the accounting software company which was acquired by Sage Group for about $850 million. They were also in Datalogix, which sold to Oracle for over $1 billion.

Sands tells TechCrunch that he’s looking for “companies that are data driven, Saas and the infrastructure that supports them.” He’s also open to opportunities that don’t fit that mold, like their investment in popular flashcard app, Quizlet. Costanoa’s team is “smart enough to recognize a really special opportunity and company when we see it.”

The group emphasizes their hands-on approach, considering themselves particularly involved for an early-stage fund. Operating partners Martina Lauchengco and Jim Wilson help incubate the startups and work with product-oriented founders to build sales and go-to-market strategies.

Antony Brydon, founder and CEO of Directly, provided us this quote. “The Costanoa team started working with us months before we were even thinking about raising a round, working on pricing in our office and introducing us to customers, candidates and collaborators that were deep in our domain. Most investors lean back until they invest; I’ve never met an investor that added so much before they had an ownership stake. They are entrepreneurs as much as investors – they’re looking first and foremost to build something great.”

Most of Costanoa’s investments have been in the United States, but they also have a few portfolio companies in Australia.

 

 

via TechCrunch
Costanoa Ventures raises $175 million fund

The Wreckage Left in Irma’s Path Across the Caribbean and Southeastern U.S. (35 photos)

Days after Hurricane Irma wreaked havoc across the Caribbean and several U.S. states, government officials and residents are beginning to assess the widespread damage, pick up the pieces, and figure out their next steps. For some Caribbean islands, like Saint Martin, the destruction is nearly total, with evacuations underway as officials try to rebuild basic infrastructure. FEMA reports that 25 percent of all homes in the Florida Keys were destroyed, while 65 percent were significantly damaged.



This photo provided on September 8, 2017, shows storm damage in the aftermath of Hurricane Irma, in Virgin Gorda’s Leverick Bay, in the British Virgin Islands.
(Caribbean Buzz Helicopters via AP)


via In Focus
The Wreckage Left in Irma’s Path Across the Caribbean and Southeastern U.S. (35 photos)