The basics of “zero trust” that I can’t hear anymore

The basics of “zero trust” that I can’t hear anymore


The basics of "zero trust" that I can't hear anymore

The basics of “zero trust” that I can’t hear anymore

1. What is the “zero trust” that you often hear in recent years?

In recent years, the term “zero trust” has come to be heard frequently in the security world. Currently, security vendors all claim their products as “zero trust compatible”, and media articles almost always put the keyword “zero trust” in the foreground when taking up security topics.
On the other hand, even with the spread of the word zero trust, many people still do not understand its exact meaning. Some may take it diagonally, “I wonder if it’s a new buzzword set up by the IT industry anyway.” However, zero trusts are by no means a transient buzzword, but a concept that gives very valuable suggestions when considering the ideal state of ICT in the coming “With Corona” and “New Normal” eras.
If you take the word zero trust literally, it means “no trust”, that is, “do not trust anything”. “Trust” here means “whether or not to unconditionally trust a user’s access to the system.”
The conventional information security model completely separates the internal network from the Internet that extends outside, and places security products such as firewalls and proxies on the boundary to create cyber attacks from the outside and information from the inside. It was based on the idea of ​​shutting out leaks. Such a security model is called “boundary defense” and has long been the basic idea of ​​information security.
In this perimeter defense, the corporate network protected from external threats should be basically secure, so access to the servers and PCs located there is also basically considered “reliable” and necessary. I’ve been happy with only the minimum measures.

2. Why is a zero trust needed now?

However, there are more and more cases where the conventional method of borderline defense does not work. Behind this is the rapid proliferation of cloud services and mobile devices.
Cloud services are now not limited to consumer services, but business cloud services such as Microsoft 365,, and Google Workspace have become widespread and are now used by many companies as a matter of course. This poses a major challenge to corporate systems and their security measures.
As I mentioned earlier, traditional business applications were located in a corporate network protected by perimeter defenses from threats on the Internet, so only the minimum required security measures were sufficient. However, when this becomes a cloud service, important information assets are placed on the Internet and directly exposed to external threats, which greatly increases the security risk.
In addition, smartphones and tablet terminals have become widespread, and their use in the business scene has become quite commonplace. Nowadays, when using business applications, not only PC terminals located in the internal network but also smartphones and tablet terminals from the external environment There are more and more occasions to access applications using. In some cases, you will be accessing cloud services directly from an external environment via the Internet, and this makes the perimeter defenses you have relied on completely meaningless.
Of course, even when accessing cloud services from outside the company, a certain level of security can be guaranteed by making sure to connect to the company network once with a VPN and then go out to the Internet again via perimeter defense. In fact, many companies adopt such a network configuration, but if the number of accesses to the internal network from outside the company increases rapidly, the performance of the VPN device will be insufficient, and the access speed will decrease or the connection will become unstable. Will occur.
In fact, many companies that have rushed to deploy telework to deal with the Korona-ka faced this challenge. When most of the employees moved to the telecommuting system at once and accessed the internal network from home via VPN, the processing load of the VPN device reached the limit in a blink of an eye, and the speed and stability of the network. There were a number of cases in which the number dropped significantly. In addition, as the use of VPNs has increased rapidly all over the world, cyber attacks that exploited the vulnerabilities have occurred frequently, leading to a situation in which a lot of damage actually occurs.
Once you pass the VPN connection authentication, you gain access to a wide range of resources on your corporate network. Therefore, if a cyber criminal impersonates a legitimate user and breaks into the corporate network via a VPN, it can cause great damage. Even if you are a legitimate user, you will be able to access business systems that you should not be able to use unless you have appropriate access rights, which may lead to internal crimes. Therefore, it has become necessary to manage not only external cloud services but also access rights to internal systems in a new way.

3. What do you need to achieve a zero trust?

As a result, the idea of ​​borderline defense, which divides the network into “inside and outside,” is gradually becoming less effective. Instead, what is needed is a measure that can protect the company’s information assets from the threat of cyber attacks and internal crimes in an “open and flat network” that is neither inside nor outside. The zero trust introduced at the beginning is considered to be effective in thinking about this.
Since there is no mechanism such as borderline defense between the company’s information assets placed in the cloud service and the Internet, and it is directly exposed to access from the Internet, these accesses are taken into consideration. I can’t trust it. Rather, it is necessary to not trust all access at all (zero trust), perform strict authentication to verify the validity of each access, and finely control access. As for the authentication method, sufficient security cannot be ensured only by the conventional user ID / password authentication. Therefore, a multi-factor authentication mechanism using biometric authentication, device authentication, one-time password, etc. is required.
In this way, it is necessary to strengthen authentication and access to applications, and at the same time, strengthen security measures for client terminals. Since client terminals are directly connected to the open Internet environment, the risk of being directly exposed to the threat of cyber attacks is significantly higher than in environments protected by perimeter defense. Therefore, not only conventional anti-virus measures but also strong endpoint security measures using the latest technology are required.
Also, in a telework environment, employees will be scattered in physically separated places such as homes, so IT governance will be less effective than before the introduction of telework. Therefore, it will be necessary to take measures to prevent or prevent unauthorized information from being taken out from the terminal, and to take measures against “shadow IT” that uses unauthorized IT services without permission.

4. Summary

As we have seen above, the concept of zero trust itself is extremely simple, but when it comes to implementing it concretely, in all areas of information security such as authentication, access control, encryption, endpoint security, and log management. New efforts are needed. However, even if you try to introduce them all at once, it will take a lot of time and cost, and it will be difficult to set up an operation system. Therefore, it is recommended that you first visualize the current state of your company’s security measures and the risks you are facing, prioritize them, and then take steps to achieve zero trust.
5 AI Trends Content Creators Need to Watch

5 AI Trends Content Creators Need to Watch


5 AI Trends Content Creators Need to Watch

5 AI Trends Content Creators Need to Watch

Technology provides new avenues for creative professionals and artists to overcome the stigma of “starving artists” and become digital entrepreneurs. Platforms including youtube, patreon and Shutterstock provide a viable means for creators to publish and monetize their work.
However, there are also moments of decline. The changing monetization policies of these platforms are largely seen as bad for creators, forcing some artists to quit, or at least threaten to leave, as the Verge reports.
Nonetheless, these issues should not deter enterprising creative professionals from pursuing their passions. If you’re a creative professional looking to use technology to your advantage, it pays to stay ahead of trends. These are good indicators of where the industry is headed, enabling you to take the necessary steps to stay relevant.
Here are five key technology trends that will change the creative content and content creator landscape.

1. Decentralized distribution platform

An important issue for content creators is how to easily share and distribute their work. Blockchain VCs are building decentralized platforms designed to challenge tech giants. Decentralized platforms promote openness, resist censorship and reward participants.
Projects like asTRON are building better global infrastructure for this. TRON recently partnered with peer-to-peer (p2p) network BitTorrent in an attempt to further decentralize the web and provide more distribution. The effort, called project Atlas, will incentivize users to act as “seeds,” peers who help host and distribute content. This encourages more participation and increases the capacity of the network. Users can then enjoy better uptime and faster downloads.

2. Augmented and virtual reality

Improvements in mobile computing and display technology have made augmented reality (AR) and virtual reality (VR) more affordable. Tech giants are making big bets on AR and VR as they recognize the potential of these technologies. According to VentureBeat, 2017 saw an influx of $3 billion in investment into the industry.
AR and VR have proven themselves in various use cases. In terms of entertainment, these technologies are expected to provide more immersive gaming and live entertainment experiences. They are also now used in teaching and scientific research.
For example, Ceek enables artists and content creators to securely create virtual live concerts and merchandise. These items can then be used to enhance the viewing experience of viewers during events broadcast via VR.
Once AR/VR hardware and platforms mature enough to drive device prices down at the consumer level, there will inevitably be a lot of demand for content. As a result, demand for artists working on visual and sound content, including motion graphics, 3D, sound effects and music, will also increase.

3. AI-driven discovery and curation

Publishing platforms are also investing in the use of artificial intelligence (AI) and machine learning (ML) to help them discover and curate content.
For example, Netflix relies heavily on its recommendation engine to keep subscribers interested. Wired explained that 80% of the shows watched on the platform are recommended by the engine. YouTube and Instagram are using similar techniques to drive content discovery.
Just like how writers mastered SEO a decade ago, you now have to figure out how to make these recommendation engines work to their advantage. This way, you can optimize your content and even launch ad campaigns to increase your chances of being featured on your chosen platform and get more views.

4. Machine Generated Content

Speaking of AI and ML, several projects have also been trying to teach machines to do creative work. Shelley, for example, is the AI ​​that writes horror stories, while alysia writes songs.
Some of these AIs are even good enough for mainstream purposes. The Washington Post now uses an automated storytelling engine called Heliograf to write many of its news articles. Other newspapers are also using AI to generate news updates.
As a content creator, you may see these items as a threat. But instead of being discouraged by these developments, you can consider this a source of motivation to hone your craft. Know that mediocrity is not an option when machines are quickly producing quality work.

5. The hustle and bustle of the sharing economy

The growth of the sharing and gig economy has been a boon for almost everyone. It provides professionals with ways to earn money not only part-time, but also full-time. Sharing economy revenue is expected to reach $40.2 billion in 2020, as recorded by Juniper Research.
Content creators can take advantage of the opportunity to earn additional income. You can try the more traditional route of embracing freelance gigs. Alternatively, you can rent out your equipment or computing resources during downtime.
Designers, AI developers, and filmmakers often invest in computers with high-end graphics processing units (gpus) capable of running tough tasks like image processing or video rendering. If you happen to own such a computer, you can rent out your GpU computing time to a platform like asTatau. The platform brings together GPU capabilities from tenants for companies and projects to use to run their own complex computing requirements. You get compensated for the work your computer performs, while others get cost-effective and affordable supercomputing services.
So how should you respond to these trends? Here are some ways you can make these developments work for you:
Embrace change. Progress happens whether you decide to participate or not. So why not dabble in these new channels and see what they have to offer? This way, you can check if it fits the type of content you create and the preferences of your audience.
Look for opportunities. Today’s successful content creators have the privilege of carving out their own space in the marketplace. Given the emergence of new platforms and tools, being an early adopter of these new technologies may give you the opportunity to be a pioneer and enter new and unsaturated markets. Acting on the side can even improve your skills or expand your network of contacts.
Focus on quality. One of the pitfalls of today’s content creators is the tendency to copy established creators’ formulas. While there’s nothing wrong with taking inspiration from others, avoid being a cliché of me. Find your own voice. Add some spit and polish to your creations. Good content will always find an audience.
Finally, be inspired to keep going. Remember, masterpieces are not created overnight (nor are careers).
5 Innovative uses of machine learning

5 Innovative uses of machine learning


5 Innovative uses of machine learning

5 Innovative uses of machine learning

Although its time horizon is unpredictable, artificial intelligence (AI) promises to fundamentally impact modern society, for better or worse. A subtype of artificial intelligence — machine learning — has received particular attention from experts for its potential impact on the world’s most important industry.
Due to the hype that comes with it, a lot of talent and resources are entering the space.
Machine learning model is an application of artificial intelligence in which algorithms independently predict outcomes. In other words, these models can process large datasets, extract insights and make accurate predictions without much human intervention.
The accelerated development of this technology brings many value-producing implications, and many are poised to radically simplify the business world. Here are five of the most innovative use cases for machine learning. They’ll enter your life — at least your business life — sooner than you think.

1. Widespread use of self-driving cars

The widespread adoption of autonomous vehicles represents a more efficient future of transportation. Early reports suggest that self-driving cars could reduce traffic-related deaths by as much as 90 percent.
While we may be a few years away from consumer production, at this point society’s adoption of self-driving cars is inevitable. However, the timescale for adoption of the technology depends heavily on regulatory measures, which are often outside the tech world’s control.
The software engineers developing these self-driving “fleets of the future” rely heavily on machine learning techniques to power the algorithms that enable the vehicles to operate autonomously. These models effectively integrate data points from many different sensors – lidar (a measurement method that uses laser light), radar and cameras – to operate the vehicle. Over time, these deep learning algorithms become smarter, leading to safer driving.

2. A more efficient medical network

Despite being an important part of the economy, the healthcare industry operates on top of inefficient legacy infrastructure. A major focus is finding ways to optimize the system while preserving sensitive patient details.
Fortunately, we can apply innovative machine learning algorithms (that run without humans) to process large volumes of healthcare data without violating nondisclosure contracts. Additionally, we can use these models to better analyze and understand diagnoses, risk factors, and causality coefficients.
As Dr. Ed Corbett points out: “It is clear that machine learning has dropped another arrow in the quiver of clinical decision-making.
“Machine learning in medicine has been making headlines recently,” said Corbett, a medical officer at Health Catalyst. 

3. Embedded retail management system

Over the past few years, international retail sales have consistently exceeded $20 trillion. This amazing p comes with a wealth of consumer behavioral data (demographics, trends and tastes) gathered from an infinite number of consumer shopping patterns and trend troughs.
However, many retail companies struggle to realize these valuable insights because the information often comes from disconnected data warehouses. Therefore, there is a huge opportunity to implement machine learning models that allow retailers to better understand their customers and provide a more personalized customer experience.
Using previously acquired data, machine learning models can predict everything from which product to recommend to when to give a discount. In particular, e-commerce retailers can incorporate digital behavioral patterns to optimize the entire user journey from the first point of contact to purchasing an item to follow-up.

4. Improve the content adjustment

Moderation of content is a major concern for social media platforms such as Facebook and Twitter, as they strive to provide accurate information to their audiences. As highlighted in the last election cycle, failing to properly overturn an election can have serious repercussions.
In response to a public outcry over “fake news,” Facebook recently announced that it would hire 3,000 new employees dedicated to the platform’s news feed content. However, this anxiety extends far beyond social media, as tech groups like Google are investing heavily in developing their own content monitoring teams to support their fast-growing market.
Emerging machine learning and AI platforms, such as the Orions system, are providing proprietary systems to “evolve and adapt the interaction between humans and AI” for tasks such as large-scale moderatingcontent.
Uniquely, these technologies are addressing the task of conditioning content using innovative tools and resources (for example, analyzing the context and content of each video frame) so employees can work more efficiently. This is an important advance because training machine learning to process video is notoriously difficult.

5. Advanced Cybersecurity

The cost of cybercrime damage is estimated to soar by more than $6 trillion annually in 2021. Experts predict that between 2017 and 2021, companies will spend more than $1 trillion on cybersecurity services to counteract this growing threat. Clearly, cybersecurity will continue to be a major priority for startups and large corporations alike.
Researchers are developing ingenious ways to implement machine learning models to detect fraud, prevent phishing, and defend against cyberattacks. Defense mechanisms systems are being trained using past data to quickly detect and prevent suspicious activity. Unlike humans, these algorithms can run 24/7 without running out.
As these machine learning models become more accessible to developers, they will start to gain a lot of acceptance from consumers and businesses. And, when that happens, it will be interesting to see which models.
How to Build a Career in Blockchain

How to Build a Career in Blockchain

How to Build a Career in Blockchain

How to Build a Career in Blockchain

Over the past 18 months, blockchain has leapt onto the world stage and presented itself as the next-generation solution to many of the tech industry’s most pressing problems. It has received influential endorsements from government leaders, industry giants and ambitious entrepreneurs, an unprecedented recognition of the technology’s prowess.
To be sure, they were not wrong. Originally developed to explain the popular cryptocurrency Bitcoin, blockchain is now one of the most dynamic technologies today. As The New York Times wrote in mid-January, “The Bitcoin bubble may finally distract from what blockchain really means.”
 According to global freelance exchange Upwork, in the first quarter of 2018, blockchain-related skills were the most popular skills on its platform. 
Of course, blockchain technology is a new field of work, and there is no one tried and true path to success. Children have not heard of this technology from an early age, while developing the ambition to work on this novel technology. Therefore, career paths in blockchain are as new and innovative as the technology itself.

Traditional paths may not be suitable.

For decades, high school students have had a less traveled path with a relatively simple formula: Do well enough in high school to go to college, earn a degree in a desirable field and get a well-paying job. A college degree is seen as the promise of a high-paying, stable job.
Lately, the promise has seemed more like a motto. In 2013, The Washington Post wrote: “Only 27 percent of college graduates have a job related to their major.” Meanwhile, college graduates leave school with unprecedented levels of debt. The average student college graduate has more than $37,000 in student debt. Overall, U.S. student debt is close to $1.5 trillion. In a surprising study, Citizens Financial Group found that college graduates spend a fifth of their salaries on student debt and continue to do so for nearly two decades after graduation .
Interestingly, as the labor market tightens and companies struggle to find candidates with a bachelor’s degree, there is a growing consensus that a candidate’s skills are more important than his or her formal education. Deloitte, a research and consulting firm with strong ties to the blockchain industry, backs the assessment. A 2017 study by Deloitte found that “aspiring workers should realize that a bachelor’s degree is not important to their future. A bachelor’s degree is just a piece of paper in itself. It’s more about skills and careers. When it comes to employment, That’s the real goal of education.”
In many ways, this is not a particularly shrewd observation. There are plenty of successful people who have viable, even extraordinary careers without getting a bachelor’s degree.

Blockchain Education

Clearly, those looking for a career in blockchain technology will follow a different script than the tech entrepreneurs before them. With that in mind, what is the best way to strategically build a career in blockchain technology?
What the blockchain industry needs are people who are constantly developing their skills and keeping up with the progress of the industry. Blockchain enthusiasts can take steps to start developing their careers without having to enroll in traditional college courses or attend expensive seminars.
1. Build the foundation.
Blockchain is unlike any other technology available. Understanding its unique value proposition is a key cornerstone of blockchain education. Features like decentralization, smart contracts, and Dapps aren’t just buzzwords. They are the essence of blockchain, and any successful blockchain professional will know them closely.
More technical skills also form the basis for blockchain developers. JavaScript for web development and Solidity (a popular programming language for building smart contracts) is a good place to start. These skills not only contribute to blockchain education, but also enable learners to become freelancers while learning to develop the remaining blockchain-related skills.
A level of formal education might help in this case, but that doesn’t mean aspiring blockchain developers need to go to college. Instead, online education platforms and the like offer comprehensive courses.
2. Consider cytography.
Assets are increasingly moving online, underscoring the importance of cryptography. Blockchain is known for its ability to secure and secure these assets, and it relies on cryptography to achieve this. Encryption, if used inappropriately, can have devastating consequences for companies that rely on it.
Advanced cryptography training is available online from reputable, affordable venues such as ecoursera and Udacity.
3. Understand the theory and application of distributed computing.
Distributed computing is no longer a theory. In an era where reliability and security are two of the most pressing issues facing technology proliferation, distributed computing is the solution for blockchain. However, this is far from an elegant practice. There are still many areas that need solutions. For example, issues of scalability and excessive energy consumption continue to plague its implementation. Students of blockchain technology need to study these problems so that they can later start developing solutions to the problems.
4. Maintain community management.
The blockchain and the cryptocurrencies it supports are unique to their active community, which helps encourage their growth and popularity. There are hundreds of new cryptocurrency projects that can serve as on-the-job training mechanisms for blockchain students.
Connect with reputable, verifiable blockchain startups and serve you through community outreach, which includes event organization, discussion leadership, and other engagement-oriented events. While not a perceptible skill, it is an opportunity to interact and network with people in the field, while also gaining personal insight into the industry and its community. This is a tangible way to start getting involved in a blockchain-based career.
5. Forge your own path.
The blockchain job market is booming, and those wishing to get involved can follow their own path to success. These DIY strategies can simplify the process and make it more feasible for just about anyone to try, rather than spending years in an academic institution preparing for a blockchain career. The market is booming and the opportunity is there.
Smart City Finance-A Story of Money for Creating a Comfortable City

Smart City Finance-A Story of Money for Creating a Comfortable City


Smart City Finance-A Story of Money for Creating a Comfortable City

Smart City Finance-A Story of Money for Creating a Comfortable City

One of the main reasons why various efforts related to smart cities have ended in the demonstration stage and do not lead to implementation is the inability to secure funds sustainably. In this booklet, we will explain the basic concept for implementing, maintaining and continuing the smart city project, the measures to be taken, and the financing method.

1.Where the problem is

Need for urban infrastructure renewal
Japan’s urban infrastructure is exhausted, and large-scale repairs, reinvestment and modernization are issues. Aging urban infrastructure not only jeopardizes the lives of citizens and businesses, but also affects our quality of life (QOL) and international economic competitiveness. On the other hand, for many municipalities, financing and monetization have become the most important issues in smart city projects.
In order not to end the smart city with a boom
In recent years, smart city demonstration experiments and plans / plans have been announced and promoted in various parts of Japan, showing the appearance of the second smart city boom since around 2010. In order to sustainably improve the functioning of cities, all participants, including government, private sector, and citizens, need to seriously consider how to allocate funds for which issues and who will bear them. There will be.
Why smart city projects don’t last
Today, many large companies and start-ups are trying to enter the so-called smart city business, but few have achieved great business success. We are now in a position to revisit the fundamental issue of how to establish a “sustainable =“ profitable ”business model”.

2. Categorization of smart cities and organization of participants

Arrangement of participants involved in the city and how to bear funds
In order to secure sufficient funds to promote smart city projects, it is important to obtain the benefits of improving convenience by making cities smarter and to make the cost burden transparent.
Categorization of smart cities
Depending on the area and plan, smart cities vary in location conditions (“Green Field (new development)” or “Brown Field (existing area)”), scale, and issues. In this booklet, smart cities are classified into “problem-solving type”, “function improvement type”, and “demand generation type” according to their purpose of introduction.
“Demand-creating” smart city project in Japan
We would like to introduce the Grand Front Osaka Project and the Kashiwanoha Project as typical examples of “demand-creating” smart city projects in Green Field that are underway in Japan.

3. basic way of thinking

Here are seven key points in a sustainable financial model for building, maintaining and sustaining smart cities.
(1) Maximize benefits and minimize costs from a medium- to long-term perspective
(2) Possibility of cost reduction due to cross-industry effect
(3) Examining new sources of income: revealing the benefits of a wide range of participants
(4) Utilization of the latest financial technology
(5) Future issues: Further possibilities for data utilization
(6) Tax system measures to encourage private funding
(7) Consensus and relationships of trust between participants are important

4. Sustainable smart city application model

Assuming a typical Japanese local city with various issues, we will consider an application model that can continue to solve urban issues by introducing the above-mentioned “idea” of the financial model.

5. Recommendation

In order to build a smart city, it is necessary to adopt a wider range of financing methods than ever before. Furthermore, in order to sustain the smart city, it is necessary to consider various funding sources (existing administrative cost efficiency / reduction, service income) in consideration of the supply and demand, income and expenditure of the services to be provided. It is effective, and it is essential to ensure medium- to long-term economic rationality.