And today her model tells her the Democrats are a near lock for the presidency in 2020, and are likely to gain House seats and have a decent shot at retaking the Senate. If she’s right, we are now in a post-economy, post-incumbency, post record-while-in-office era of politics. Her analysis, as Bitecofer puts it with characteristic immodesty, amounts to nothing less than “flipping giant paradigms of electoral theory upside down.”
...
Bitecofer has already released her 2020 model, and is alone among election forecasters in giving the Democrats—who, of course, do not yet have a nominee—the 270 electoral votes required to claim the presidency without a single toss-up state flipping their way. She sees anyone in the top tier, or even the second tier of candidates, as strong enough to win back most of the Trump states in the industrial Midwest, stealing a march in the South in places like North Carolina and Florida, and even competing in traditional red states like Georgia, Texas and Arizona. The Democrats are likely to pick up seats again in the House, she says, pegging the total at nine pickups in Texas alone, and have a decent chance of taking back the Senate.I guess we will have to revisit this on November 4th. I read the article and her theory doesn't sound that revolutionary and her results don't sound all that accurate.
CNN - Former ATF agent at center of legal dispute over AR-15 -
As O'Kelly sees it, the ATF has been deliberately misinterpreting a key gun control regulation for decades because officials fear that following the letter of the law would allow criminals to build AR-15s and other firearms piece by piece with unregulated parts.TechCrunch - CCPA won't be enough to fix tech's data entitlement problem -
Tech companies are losing the trust of customers, partners and governments around the world. In fact, Americans’ perception of tech companies has steadily dropped since 2015. More must be done to win it back.
...
If I operate according to the Principle of Least Privilege, the following data access rules would apply:
- I would only have access to that specific customer’s account information;
- I would only have access to the specific part of their account where the problem is happening;
- I would only have access until the problem is solved.
Sounds intuitive, right? Yet, many companies — particularly those operating without the Principle of Least Privilege in place — discovered through the GDPR and CCPA compliance process that their data access controls did not work this way. This is how major breaches happen. An employee downloads an entire database — much more data than they need to perform a specific task — their laptop is compromised, and suddenly hackers can access the entire database.CSO - Infrastructure-as-code templates are the source of many cloud infrastructure weaknesses -
A new analysis by researchers from Palo Alto Networks of IaC templates collected from GitHub repositories and other places identified almost 200,000 such files that contained insecure configuration options. Using those templates can lead to serious vulnerabilities that put IaC-deployed cloud infrastructure and the data it holds at risk.
...
The types of IaC template misconfigurations and their prevalence -- the absence of database encryption and logging or publicly exposed services -- is in line with the type of issues detected by Palo Alto Networks in real-world cloud infrastructure deployments in and covered in past reports:
- 76% of organizations allow public access to port 22 (SSH)
- 69% of organizations allow public access to port 3389 (RDP)
- 64% fail to enable logging for their data storage
- 62% do not enable encryption for the data storage
This suggests that the use of IaC templates in automated infrastructure deployment processes without first checking them for insecure configurations or other vulnerabilities is a big contributing factor to the cloud weaknesses observed in the wild.
- 47% of organizations do not use tracing functionality for serverless functions
No comments:
Post a Comment