Tumgik
#Cloud Data encryption
techy-trends · 1 year
Text
Elеvating Cloud Data Encryption: Exploring Nеxt-Gеnеration Tеchniquеs
In an еra whеrе data brеachеs and cybеr thrеats havе bеcomе morе sophisticatеd than еvеr,  thе nееd for robust data protеction mеasurеs has intеnsifiеd. Cloud computing, which offers immеnsе flеxibility and scalability, also introducеs sеcurity concerns duе to thе dеcеntralizеd naturе of data storagе.  This is whеrе data еncryption еmеrgеs as a powerful solution, and as technology еvolvеs,  so do thе tеchniquеs for safеguarding sеnsitivе information in thе cloud. 
Related Post: The Importance of Cloud Security in Business
Tumblr media
Thе Crucial Rolе of Cloud Data Encryption:
Cloud data encryption involves transforming data into an unrеadablе format using cryptographic algorithms. This еncryptеd data can only bе dеciphered with a specific kеy, which is hеld by authorizеd usеrs. Thе importancе of еncryption liеs in its ability to thwart unauthorizеd accеss,  еvеn if an attackеr manages to brеach thе sеcurity pеrimеtеr.  It еnsurеs that еvеn if data is intеrcеptеd, it rеmains indеciphеrablе and thus usеlеss to malicious actors. 
Thе Evolution of Encryption Tеchniques:
As cyber thrеats grow more sophisticatеd,  еncryption tеchniquеs must also еvolvе to kееp pacе.  Lеt's dеlvе into somе of thе nеxt-gеnеration еncryption mеthods that arе еnhancing cloud data sеcurity:
Homomorphic Encryption: This groundbrеaking tеchnique allows computations to bе pеrformеd on еncryptеd data without dеcrypting it first.  It еnsures that sеnsitivе data rеmains еncryptеd throughout procеssing,  minimizing thе risk of еxposurе. 
Quantum Encryption: With thе advent of quantum computеrs,  traditional еncryption mеthods could bе compromisеd.  Quantum еncryption lеvеragеs thе principlеs of quantum mеchanics to crеatе еncryption kеys that arе virtually impossiblе to intеrcеpt or rеplicatе. 
Post-Quantum Encryption: This involvеs dеvеloping еncryption algorithms that arе resistant to attacks from both classical and quantum computеrs. As quantum computing power grows,  post-quantum еncryption will play a crucial role in maintaining data sеcurity. 
Multi-Party Computation (MPC): MPC еnablеs multiplе partiеs to jointly computе a function ovеr thеir individual inputs whilе kееping thosе inputs privatе. This tеchniquе adds an еxtra layеr of sеcurity by distributing data and computations across different еntitiеs. 
Attributе-Basеd Encryption (ABE): ABE allows data access based on attributеs rather than specific kеys. It's particularly useful in cloud еnvironmеnts whеrе multiplе usеrs with varying lеvеls of accеss might nееd to intеract with еncryptеd data. 
Tokеnization: Tokеnization involvеs rеplacing sеnsitivе data with tokеns that havе no inhеrеnt mеaning. Thеsе tokеns can bе usеd for procеssing and analysis without еxposing thе actual sеnsitivе information. 
Implementing Nеxt-Gеnеration Encryption Tеchniquеs
Whilе next-genеration еncryption tеchniquеs offеr еnhancеd sеcurity, thеy also bring challеngеs in tеrms of implеmеntation and managеmеnt:
Kеy Managеmеnt: Robust еncryption rеliеs on еffеctivе key management.  With new tеchniquеs,  key gеnеration,  storage,  and rotation bеcomе morе complеx and rеquirе mеticulous attеntion. 
Pеrformancе Overhead: Somе advancеd еncryption mеthods can introduce computational ovеrhеad, potentially affеcting thе pеrformancе of applications and systеms. Striking a balancе bеtwееn sеcurity and pеrformancе is crucial. 
Intеgration with Existing Systеms: Intеgrating nеxt-gеnеration еncryption into еxisting cloud еnvironmеnts and applications can bе intricatе. It oftеn rеquirеs carеful planning and adaptation of currеnt architеcturе. 
Usеr Expеriеncе: Encryption should not hindеr usеr еxpеriеncе.  Accessing еncryptеd data should bе sеamlеss for authorizеd usеrs whilе maintaining stringеnt sеcurity mеasurеs. 
Bеst Practicеs for Nеxt-Gеnеration Cloud Data Encryption
Assess Your Nееds: Undеrstand your data,  its sеnsitivity,  and rеgulatory requirеmеnts to detеrminе which еncryption tеchniquеs arе most suitablе. 
End-to-End Encryption: Implemеnt encryption throughout thе data lifеcyclе – at rest,  in transit,  and during procеssing. 
Thorough Kеy Managеmеnt: Dеvotе significant attеntion to kеy managеmеnt,  including gеnеration,  storagе,  rotation,  and accеss control. 
Rеgular Audits and Updates: Encryption is not an onе-timе task. Rеgular audits and updatеs еnsure that your еncryption practicеs stay еffеctive against evolving threats. 
Training and Awareness: Educatе your tеam about еncryption bеst practices to prеvеnt inadvеrtеnt data еxposure. 
Vendor Evaluation: If you are using a cloud sеrvicе providеr, еvaluatе thеir еncryption practicеs and ensurе they align with your security requiremеnts. 
Thе Path Forward
Nеxt-genеration еncryption tеchniquеs arе shaping thе futurе of cloud data sеcurity.  As data brеachеs bеcomе more sophisticatеd,  thе need for strongеr еncryption grows.  Whilе thеsе tеchniquеs offеr еnhancеd protеction,  they also rеquirе a comprеhеnsivе undеrstanding of thеir intricacies and challengеs.  Implеmеnting thеm еffеctivеly dеmands collaboration bеtwееn sеcurity еxpеrts, cloud architеcts, and IT professionals. 
Conclusion
In conclusion, as technology еvolvеs, so do thе thrеats to our data.  Nеxt-genеration encryption tеchniquеs hold thе kеy to safеguarding sеnsitivе information in thе cloud. By еmbracing thеsе advancеd mеthods and adhеring to best practicеs, organizations can navigatе thе intricatе landscapе of cloud data sеcurity with confidеncе, еnsuring that thеir data rеmains shiеldеd from thе еvеr-еvolving rеalm of cybеr thrеats.  
1 note · View note
Text
17 Essential Steps to Fortify Your AI Application
Master AI security with these 17 essential steps! #AISecurity #DataProtection #CyberSecurity
In today’s digital landscape, securing AI applications is crucial for maintaining trust and ensuring data integrity. Here’s a comprehensive guide to the 17 essential steps for fortifying your AI application. 1. Encrypt Data Ensure that all data, both in transit and at rest, is encrypted. Use industry-standard encryption protocols like AES (Advanced Encryption Standard) for data at rest and TLS…
Tumblr media
View On WordPress
3 notes · View notes
vastedge330 · 5 days
Text
Implementing a robust cloud disaster recovery plan is essential for ensuring business continuity. Key strategies include assessing business needs, selecting an appropriate DR model, automating recovery processes, ensuring data security, and conducting regular testing. These steps help organizations minimize downtime and data loss during unexpected disasters.
0 notes
filehulk · 7 days
Text
Cryptomator
Cryptomator is a free, open-source tool providing multi-platform, transparent client-side encryption for your cloud files. Compatible with nearly any cloud storage service, it integrates seamlessly into your workflow, allowing you to work with files as usual. It uses robust 256-bit AES encryption for security. Additionally, it is user-friendly and requires no separate accounts, key management,…
0 notes
fortanix · 8 days
Text
Understanding Credit Card Tokenization
Tumblr media
"Protect your data with credit card tokenization! Learn how Fortanix DSM ensures security, compliance, and easy card management. Try our Explorer pack for free!
0 notes
jcmarchi · 12 days
Text
Jim Boswell, President & CEO of OnPoint Healthcare – Interview Series
New Post has been published on https://thedigitalinsider.com/jim-boswell-president-ceo-of-onpoint-healthcare-interview-series/
Jim Boswell, President & CEO of OnPoint Healthcare – Interview Series
Jim Boswell is the President & CEO of OnPoint Healthcare, Jim is a strategic thinker who has devoted his 28-year career to building, optimizing, and leading large, multi-specialty group practices within a large health system and private practice group, Jim is passionate about driving alignment, growth, performance improvement, and transformation.
OnPoint Healthcare Partners was established in response to various unmet needs in the healthcare industry, including the demand for innovative clinical support services, effective physician and staff engagement strategies, and operational change management.
You founded OnPoint Healthcare Partners in 2019 after a long career in the healthcare industry. What inspired you to start this company, and how did your previous experiences shape your vision for OnPoint?
I founded OnPoint Healthcare Partners after spending many years on the “buy side” of healthcare, working closely with physicians, nurses, and other healthcare professionals. Throughout my career, I saw firsthand the immense administrative burdens that were taking valuable time away from patient care. This experience inspired me to create a company that could leverage technology to eliminate inefficiencies and allow healthcare providers to focus on what truly matters—caring for their patients.
Can you elaborate on the early challenges you faced in bringing this vision to life, especially in a highly regulated and complex industry like healthcare?
Starting OnPoint in such a highly regulated industry like healthcare came with significant challenges, particularly around data privacy and HIPAA compliance. From the beginning, we knew that safeguarding patient information had to be our top priority. We built our system on Microsoft Azure, ensuring it was high-trust and SOC 2 certified, which allowed us to provide a secure, cloud-based solution that met all necessary regulatory standards. Our deep understanding of healthcare regulations, gained from our years working within the system, was crucial in overcoming these initial hurdles.
Iris, your AI-driven system, boasts a 98% clinical accuracy rate and significantly reduces the time healthcare providers spend on documentation. Could you explain the technology behind Iris and what sets it apart from other AI solutions in the market?
Iris is truly a groundbreaking solution because it combines advanced AI with human oversight. The AI engine is supported by a continuous learning loop, which has accumulated over a million notes that improve the system’s accuracy every day. What sets Iris apart is our proprietary workflow where AI handles up to 80% of the work, and then our W2-employed clinicians step in to complete the last, most critical mile. This approach allows us to achieve near-perfect accuracy and provides our clients with the flexibility to tailor the solution to their specific needs.
AI in healthcare is often met with both excitement and skepticism, particularly around the topics of data security and the risk of “hallucinations” in AI outputs. How does Iris address these concerns, and what measures are in place to ensure patient safety and data privacy?
We take data security very seriously at OnPoint. Our systems are fully encrypted and cloud-based, with no human access to encryption keys and no storage of protected health information (PHI) within our system.
When it comes to preventing AI hallucinations, we rely on a combination of advanced technology and human oversight. Our clinicians play a key role in reviewing and validating AI-generated outputs, which ensures the highest level of patient safety and data accuracy. We’ve designed our platform with a “safety first” approach, prioritizing patient safety above all else.
One of Iris’s key features is its continuous learning loop that improves over time using real-world data. How do you manage the balance between automated processes and the need for human oversight in ensuring the highest accuracy and reliability in clinical documentation?
At OnPoint, we believe in deploying the appropriate level of technology based on the complexity of each patient encounter. For more straightforward cases, AI handles most of the documentation, but for more complex scenarios, our clinicians step in to ensure that the documentation is both accurate and reliable. This balance allows us to maintain high levels of efficiency without compromising on the quality of care.
Iris can save healthcare providers 3-4 hours per day, which is a significant impact on their workload. Can you share some feedback you’ve received from physicians and healthcare staff about how Iris has changed their day-to-day operations?
The feedback we’ve received from healthcare providers using Iris has been incredibly positive. Many have shared stories about how Iris has given them back precious time, allowing them to have dinner with their families or leave work on time for the first time in years. One doctor even told me that our obsession with accuracy has improved his livelihood because he no longer has to worry about documentation errors. These are the kinds of impacts that motivate us to keep pushing for excellence in everything we do.
With the reduction in documentation time, healthcare providers can focus more on patient care. How does OnPoint ensure that this reclaimed time is being used effectively, and what are the broader implications for patient outcomes and satisfaction?
While it’s not OnPoint’s role to dictate how providers use the time they save with Iris, we do provide robust dashboards and analytics that offer visibility into their operations. This data empowers healthcare providers to make informed decisions about how to best use their time, whether that’s seeing more patients, focusing on wellness, or improving their work-life balance.
The integration of AI in healthcare is still in its early stages. Looking ahead, how do you see AI evolving in this space, and what role do you envision OnPoint playing in the future of healthcare technology?
AI is still in its early stages in healthcare, but its potential is enormous. At OnPoint, we’re constantly exploring new ways to integrate AI into our services to create more efficient and connected healthcare systems. We’re also committed to the responsible use of AI, which is why we’re involved with organizations like CHI that focus on ethical AI practices. Looking ahead, I see OnPoint playing a significant role in advancing AI technologies that improve patient care and operational efficiency.
OnPoint recently received a growth investment from Peloton Equity. How will this new funding be utilized to accelerate OnPoint’s mission, and what strategic priorities are you focusing on in the near term?
The recent investment from Peloton Equity is being utilized to advance our AI technology and develop new products that provide a more comprehensive offering across the care continuum. We’re also investing in universal integration capabilities, which will make it even easier for healthcare providers to implement our solutions regardless of their existing EHR platform.
You’ve led large healthcare organizations before starting OnPoint. How does your leadership approach differ in a tech-driven startup compared to traditional healthcare organizations, and what lessons have you brought from your past roles into OnPoint?
Leading OnPoint is different from my previous roles in larger healthcare organizations because it requires a more agile and innovative approach. However, the lessons I’ve learned from those experiences—particularly the importance of understanding the needs of healthcare providers—have been invaluable in shaping our strategy at OnPoint. My goal is to create a company that not only drives technological innovation but also makes a real difference in the lives of healthcare professionals and their patients.
Thank you for the great interview, readers who wish to learn more should visit OnPoint Healthcare Partners.
0 notes
techdriveplay · 16 days
Text
What Should You Look for in a NAS?
In today’s digital world, data storage and security are essential, both for personal and business use. Whether you have a growing library of family photos, critical work documents, or media collections, a reliable storage solution is paramount. Network-Attached Storage (NAS) systems offer an efficient way to store, back up, and access data across devices from anywhere. But with so many NAS…
0 notes
sanjanabia · 3 months
Text
Cloud Security: Is Your Data Truly in the Cloud... or Up for Grabs?
Tumblr media
The convenience of cloud storage is undeniable. Accessing your data from anywhere, anytime, with scalability and cost-effectiveness – it's a dream come true for businesses of all sizes. But with this convenience comes a crucial question: Is your data truly secure in the cloud?
The reality is, the cloud isn't a mythical realm beyond the reach of cybercriminals. Data breaches in cloud environments happen with alarming frequency. Hackers are constantly innovating, exploiting vulnerabilities in cloud security to steal sensitive information.
This blog delves into the world of cloud security, exploring common threats, best practices, and the importance of a skilled workforce. We'll also highlight how reputable cyber security institutes in Mumbai can equip professionals with the knowledge and expertise to safeguard your valuable data in the cloud.
Beyond Convenience: The Dark Side of Cloud Security
While cloud providers offer a range of security features, the ultimate responsibility for data security lies with the organization using the cloud service. Common cloud security threats include:
Misconfigurations: Improper configuration of cloud storage buckets or access controls can leave data exposed and vulnerable.
Data Breaches: Hackers can exploit vulnerabilities in cloud platforms or gain access through compromised user credentials, leading to data breaches.
Insider Threats: Malicious insiders with authorized access can steal or leak sensitive data stored in the cloud.
Denial-of-Service (DoS) Attacks: These attacks can disrupt access to cloud resources, impacting business operations.
Securing Your Cloud: Best Practices for Data Protection
Here are some key steps to ensure the security of your data in the cloud:
Implement Strong Access Controls: Enforce robust access controls, including the principle of least privilege, to restrict access to data based on user roles and needs.
Encrypt Your Data: Encrypting data at rest and in transit adds an extra layer of security, making it unreadable even if intercepted by hackers.
Regular Security Audits: Conduct regular penetration testing and vulnerability assessments to identify and address weaknesses in your cloud security posture.
Employee Training: Cyber security institutes in Mumbai offer comprehensive training programs that equip employees with the knowledge to recognize and avoid phishing attacks, social engineering tactics, and other threats to cloud security.
Investing in Skills: Why Mumbai's Cyber Security Institutes Matter
In today's digital landscape, skilled cybersecurity professionals are in high demand. Cyber security institutes in Mumbai offer a multitude of training programs and certifications that empower individuals to safeguard data in the cloud:
Cloud Security Fundamentals: These courses equip learners with a foundational understanding of cloud security concepts, threats, and best practices.
Cloud Security Architecture: Advanced programs delve into designing and implementing secure cloud architectures, ensuring data is protected throughout its lifecycle.
Cloud Penetration Testing: Cyber security institutes in Mumbai offer training in cloud penetration testing, allowing individuals to identify and exploit vulnerabilities in cloud environments before malicious actors can.
Beyond the Cloud: Building a Secure Digital Future
Cloud security is a continuous journey, not a destination. By implementing best practices, fostering a culture of security awareness, and investing in skilled cybersecurity professionals trained by cyber security institutes in Mumbai, businesses can confidently leverage the cloud's potential while minimizing data security risks. This collaborative effort ensures a more secure digital environment for organizations of all sizes.
0 notes
legalfirmindia · 5 months
Text
Data Protection: Legal Safeguards for Your Business
In today’s digital age, data is the lifeblood of most businesses. Customer information, financial records, and intellectual property – all this valuable data resides within your systems. However, with this digital wealth comes a significant responsibility: protecting it from unauthorized access, misuse, or loss. Data breaches can have devastating consequences, damaging your reputation, incurring…
Tumblr media
View On WordPress
#affordable data protection insurance options for small businesses#AI-powered tools for data breach detection and prevention#Are there any data protection exemptions for specific industries#Are there any government grants available to help businesses with data security compliance?#benefits of outsourcing data security compliance for startups#Can I be fined for non-compliance with data protection regulations#Can I outsource data security compliance tasks for my business#Can I use a cloud-based service for storing customer data securely#CCPA compliance for businesses offering loyalty programs with rewards#CCPA compliance for California businesses#cloud storage solutions with strong data residency guarantees#consumer data consent management for businesses#cost comparison of data encryption solutions for businesses#customer data consent management platform for e-commerce businesses#data anonymization techniques for businesses#data anonymization techniques for customer purchase history data#data breach compliance for businesses#data breach notification requirements for businesses#data encryption solutions for businesses#data protection impact assessment (DPIA) for businesses#data protection insurance for businesses#data residency requirements for businesses#data security best practices for businesses#Do I need a data privacy lawyer for my business#Do I need to train employees on data privacy practices#Does my California business need to comply with CCPA regulations#employee data privacy training for businesses#free data breach compliance checklist for small businesses#GDPR compliance for businesses processing employee data from the EU#GDPR compliance for international businesses
0 notes
cyber-techs · 6 months
Text
Data Safety in the Cloud Era: Effective Backup Strategies for Multi and Hybrid Environments
Tumblr media
In the evolving digital landscape, data safety has become a paramount concern, especially with the widespread adoption of cloud computing. Organizations are increasingly relying on multi-cloud and hybrid environments to store, process, and manage their data. This shift necessitates a robust strategy for backing up data to ensure its safety and availability in the face of cyber threats, technical failures, or natural disasters. This article delves into effective backup strategies for multi and hybrid environments, emphasizing the importance of securing data across diverse platforms and networks.
Understanding Multi and Hybrid Environments
Before diving into backup strategies, it's essential to understand the nuances of multi-cloud and hybrid environments. A multi-cloud environment uses services from multiple cloud providers, such as Amazon Web Services (AWS), Microsoft Azure, and Google Cloud Platform (GCP), to leverage the unique benefits of each. A hybrid environment, on the other hand, combines cloud computing with on-premises infrastructure, allowing for more flexible data deployment and operational strategies.
The Significance of Data Safety
Data is the lifeblood of modern organizations, driving decision-making, operational efficiency, and innovation. The loss or compromise of data can lead to significant financial losses, reputational damage, and regulatory penalties. As such, data safety in multi and hybrid environments is not just a technical requirement but a strategic imperative.
Key Strategies for Effective Data Backup
1. Comprehensive Risk Assessment
The first step in creating an effective backup strategy is to conduct a comprehensive risk assessment. This involves identifying critical data assets, potential threats, and the impact of data loss. Understanding these factors helps in designing a backup solution that addresses the specific needs and vulnerabilities of an organization.
2. Implementing a 3-2-1 Backup Rule
A widely recommended practice is the 3-2-1 backup rule, which suggests having at least three copies of your data, stored on two different media, with one copy located offsite. In the context of multi and hybrid environments, this could mean having backups on a physical server, a cloud service, and another cloud or offsite facility.
3. Leveraging Cloud-native Backup Solutions
Many cloud providers offer native backup solutions that are designed to seamlessly integrate with their services. These solutions often provide automated backups, easy recovery options, and robust security features. Utilizing cloud-native backups can simplify the backup process and ensure data is protected across all cloud services used by an organization.
4. Ensuring Data Sovereignty and Compliance
When implementing backup strategies in multi-cloud and hybrid environments, it's crucial to consider data sovereignty and compliance with regulatory requirements. This includes understanding where data is stored, who can access it, and how it is protected. Compliance frameworks such as GDPR, HIPAA, and CCPA may dictate specific requirements for data backup and recovery processes.
5. Regular Testing and Monitoring
An effective backup strategy is not a set-it-and-forget-it solution. Regular testing and monitoring are essential to ensure backups are complete, up to date, and recoverable. This includes conducting regular drills to restore data from backups and monitoring backup processes for failures or irregularities.
Conclusion
As organizations navigate the complexities of multi-cloud and hybrid environments, the importance of data safety cannot be overstated. Implementing effective backup strategies is crucial for protecting against data loss and ensuring business continuity. By assessing risks, adhering to best practices like the 3-2-1 backup rule, leveraging cloud-native solutions, maintaining compliance, and conducting regular tests, organizations can safeguard their most valuable asset—data—in the cloud era.
0 notes
artisticdivasworld · 7 months
Text
How to Protect Your Business From Cyber Threats
Cybersecurity is a major topic every business owner should be discussing. Here is some info from FRC that we hope helps.
Imagine we’re sitting down over a cup of coffee, and you’ve just asked me how to shield your trucking business from the ever-looming shadow of cyber threats. It’s a digital age dilemma, but I’m here to walk you through some straightforward strategies to bolster your defenses. First off, let’s talk about the elephant in the room: cyber threats. They’re not just a problem for the tech industry;…
Tumblr media
View On WordPress
0 notes
dipnots · 8 months
Text
How to Choose the Right Antivirus Software: A Comprehensive Guide
In today’s digital age, where our lives are intricately intertwined with technology, safeguarding our digital assets has become paramount. With the proliferation of cyber threats, antivirus software stands as a crucial line of defense against malware, viruses, ransomware, and other malicious entities lurking online. However, the abundance of antivirus options can be overwhelming, making it…
Tumblr media
View On WordPress
0 notes
fullhalalalchemist · 1 year
Text
URGENT: 🚨🚨EARN IT ACT IS BACK IN THE SENATE 🚨🚨 TUMBLR’S NSFW BAN HITTING THE ENTIRE INTERNET THIS SUMMER 2023
April 28, 2023
I’m so sorry for the long post but please please please pay attention and spread this
What is the EARN IT Act?
The EARN IT Act (s. 1207) has been roundly condemned by nearly every major LGBTQ+ advocacy and human rights organization in the country.
This is the third time the Senate has been trying to force this through, and I talked about it last year. It is a bill that claims "protects children and victims against CSAM" by creating an unelected and politically appointed national commission of law enforcement specialists to dictate "best practices" that websites all across the nation will be forced to follow. (Keep in mind, most websites in the world are created in the US, so this has global ramifications). These "best practices" would include killing encryption so that any law enforcement can scan and see every single message, dm, photo, cloud storage, data, and any website you have every so much as glanced at. Contrary to popular belief, no they actually can't already do that. These "best practices" also create new laws for "removing CSAM" online, leading to mass censorship of non-CSAM content like what happened to tumblr. Keep in mind that groups like NCOSE, an anti-LGBT hate group, will be allowed on this commission. If websites don't follow these best practices, they lose their Section 230 protections, leading to mass censorship either way.
Section 230 is foundational to modern online communications. It's the entire reason social media exists. It grants legal protection to users and websites, and says that websites aren't responsible for what users upload online unless it's criminal. Without Section 230, websites are at the mercy of whatever bullshit regulatory laws any and every US state passes. Imagine if Texas and Florida were allowed to say what you can and can't publish and access online. That is what will happen if EARN IT passes. (For context, Trump wanted to get rid of Section 230 because he knew it would lead to mass govt surveillance and censorship of minorities online.)
This is really not a drill. Anyone who makes or consume anything “adult” and LGBT online has to be prepared to fight Sen. Blumenthal’s EARN IT Act, brought back from the grave by a bipartisan consensus to destroy Section 230. If this bill passes, we’re going to see most, if not all, adult content and accounts removed from mainstream platforms. This will include anything related to LGBT content, including SFW fanfiction, for example. Youtube, Twitter, Reddit, Tiktok, Tumblr, all of them will be completely gutted of anything related to LGBT content, abortion healthcare, resources for victims of any type of abuse, etc. It is a right-wing fascists wet dream, which is why NCOSE is behind this bill and why another name for this bill is named in reference to NCOSE.
NCOSE used to be named Morality in Media, and has rebranded into an "anti-trafficking" organization. They are a hate group that has made millions off of being "against trafficking" while helping almost no victims and pushing for homophobic laws globally. They have successfully pushing the idea that any form of sexual expression, including talking about HEALTH, leads to sex trafficking. That's how SESTA passed. Their goal is to eliminate all sex, anything gay, and everything that goes against their idea of ‘God’ from the internet and hyper disney-fy and sanitize it. This is a highly coordinated attack on multiple fronts.
The EARN IT Act will lead to mass online censorship and surveillance. Platforms will be forced to scan their users’ communications and censor all sex-related content, including sex education, literally anything lgbt, transgender or non-binary education and support systems, aything related to abortion, and sex worker communication according to the ACLU. All this in the name of “protecting kids” and “fighting CSAM”, both of which the bill does nothing of the sort. In fact it makes fighting CSEM even harder.
EARN IT will open the way for politicians to define the category of “pornography" as they — or the lobbies that fund them — please. The same way that right-wing groups have successfully banned books about race and LGBT, are banning trans people from existing, all under the guise of protecting children from "grooming and exploitation", is how they will successfully censor the internet.
As long as state legislatures can tie in "fighting CSAM" to their bullshit laws, they can use EARN IT to censor and surveill whatever they want.
This is already a nightmare enough. But the bill also DESTROYS ENCRYPTION, you know, the thing protecting literally anyone or any govt entity from going into your private messages and emails and anything on your devices and spying on you.
This bill is going to finish what FOSTA/SESTA started. And that should terrify you.
Senator Blumenthal (Same guy who said ‘Facebook should ban finsta’) pushed this bill all of 2020, literally every activist (There were more than half a million signatures on this site opposing this act!) pushed hard to stop this bill. Now he brings it back, doesn’t show the text of the bill until hours later, and it’s WORSE. Instead of fixing literally anything in the bill that might actually protect kids online, Bluemnthal is hoping to fast track this and shove it through, hoping to get little media attention other than propaganda of “protecting kids” to support this shitty legislation that will harm kids. Blumental doesn't care about protecting anyone, and only wants his name in headlines.
It will make CSAM much much worse.
One of the many reasons this bill is so dangerous: It totally misunderstands how Section 230 works, and in doing so (as with FOSTA) it is likely to make the very real problem of CSAM worse, not better. Section 230 gives companies the flexibility to try different approaches to dealing with various content moderation challenges. It allows for greater and greater experimentation and adjustments as they learn what works – without fear of liability for any “failure.” Removing Section 230 protections does the opposite. It says if you do anything, you may face crippling legal liability. This actually makes companies less willing to do anything that involves trying to seek out, take down, and report CSAM because of the greatly increased liability that comes with admitting that there is CSAM on your platform to search for and deal with. This liability would allow anyone for any reason to sue any platform they want, suing smaller ones out of existence. Look at what is happening right now with book bans across the nation with far right groups. This is going to happen to the internet if this bill passes.
(Remember, the state department released a report in December 2021 recommending that the government crack down on “obscenity” as hard the Reagan Administration did. If this bill passes, it could easily go way beyond shit red states are currently trying. It is a goldmine for the fascist right that is currently in the middle of banning every book that talks about race and sexuality across the US.)
The reason these bills keep showing up is because there is this false lie spread by organizations like NCOSE that platforms do nothing about CSEM online. However, platforms are already liable for child sexual exploitation under federal law. Tech companies sent more than 45 million+ instances of CSAM to the DOJ in 2019 alone, most of which they declined to investigate. This shows that platforms are actually doing everything in their power already to stop CSEM by following already existing laws. The Earn It Act includes zero resources for proven investigation or prevention programs. If Senator Bluementhal actually cared about protecting youth, why wouldn’t he include anything to actually protect them in his shitty horrible bill? EARN IT is actually likely to make prosecuting child molesters more difficult since evidence collected this way likely violates the Fourth Amendment and would be inadmissible in court.
I don’t know why so many Senators are eager to cosponsor the “make child pornography worse” bill, but here we are.
HOW TO FIGHT BACK
EARN IT Act was introduced just two weeks ago and is already being fast-tracked. It will be marked up the week of May 1st and head to the Senate floor immediately after. If there is no loud and consistent opposition, it will be law by JUNE! Most bills never go to markup, so this means they are putting pressure to move this through. There are already 20 co-sponsors, a fifth of the entire Senate. This is an uphill battle and it is very much all hands on deck.
CALL YOUR REPRESENTATIVES.
This website takes you to your Senator / House members contact info. EMAIL, MESSAGE, SEND LETTERS, CALL CALL CALL CALL CALL. Calling is the BEST way to get a message through. Get your family and friends to send calls too. This is literally the end of free speech online.
(202) 224-3121 connects you to the congressional hotline. Here is a call script if you don't know what to say. Call them every day. Even on the weekends, leaving voicemails are fine.
2. Sign these petitions!
Link to Petition 1
Link to Petition 2
3. SPREAD THE WORD ONLINE
If you have any social media, spread this online. One of the best ways we fought back against this last year was MASSIVE spread online. Tiktok, reddit, twitter, discord, whatever means you have at least mention it. We could see most social media die out by this fall if we don't fight back.
Here is a linktree with more information on this bill including a masterpost of articles, the links to petitions, and the call script.
DISCORD LINK IF YOU WANT TO HELP FIGHT IT
TLDR: The EARN IT Act will lead to online censorship of any and all adult & lgbt content across the entire internet, open the floodgates to mass surveillance the likes which we haven’t seen before, lead to much more CSEM being distributed online, and destroy encryption. Call 202-224-3121 to connect to your house and senate representative and tell them to VOTE NO on this bill that does not protect anyone and harms everyone.
43K notes · View notes
Text
Ensuring Cloud Security: Best Practices for Secure Software Development
This article will explore the different security measures that can be put in place to ensure the safety and security of data and applications in the cloud.
Cloud computing has become an increasingly popular technology in recent years. It provides an efficient and cost-effective way for individuals and businesses to store and access their data and applications. However, security concerns have always been a major issue in cloud computing. This article will explore the different security measures that can be put in place to ensure the safety and…
Tumblr media
View On WordPress
1 note · View note
akgvgassociates · 1 year
Text
Don’t let flaws compromise the integrity of the app!
Tumblr media
In the modern digital era, where cyberattacks are getting more complex and frequent, application security is essential. App vulnerabilities can compromise the integrity of your app and put your users’ sensitive information at risk. Therefore, ensuring your application is secure and protected from potential cyber threats is essential. This blog will discuss how application security protects your apps by attaining, fixing, and strengthening the security once we deploy them. Read More: Don’t let flaws compromise the integrity of the app!
0 notes
fortanix · 1 month
Text
As AI transforms industries across Europe, from finance to manufacturing, the need for robust data security and compliance has never been greater. With the introduction of the EU AI Act, ensuring the safe and ethical use of AI is now a top priority.
Fortanix is here to help your organization secure sensitive data across its full lifecycle—at rest, in transit, and in use. Our advanced data protection solutions, including tokenization and unified key management, provide the security and control needed to stay compliant with the EU AI Act and GDPR.
Stay ahead in the AI era with Fortanix. Secure your data, ensure compliance, and prepare for the future of AI with confidence. 💼🔐
0 notes