• ARCHEYES.COM
    Maison Louis Carré by Alvar Aalto: Architecture as a Living Landscape
    Maison Louis Carré by Alvar Aalto | © Michelle Courteau Maison Louis Carré, completed in 1959, is the sole architectural work in France by Finnish architect Alvar Aalto. Commissioned by the influential French art dealer Louis Carré, the residence is in the rural commune of Bazoches-sur-Guyonne, roughly 40 kilometers west of Paris. At once intimate and monumental, the house exemplifies Aalto’s ability to bridge national traditions, material sensibilities, and human-centered design. Maison Louis Carré Technical Information Architects1-8: Alvar Aalto Collaborating Architect: Elissa Aalto Location: Bazoches-sur-Guyonne, Yvelines, Île-de-France, France Built Area: 400 m² | 4,300 sq ft Project Year: 1956 – 1959 Photographs: Flickr Users, See Caption Details Architecture must have charm; it is a factor of beauty in society. But real charm is not in shapes; it is in the infinite variety of the connections that exist between function and form. – Alvar Aalto 9 Maison Louis Carré Photographs Exterior View | © Michelle Courteau Side View | © Jonathan Rieke, Flickr User Front View | © Risto Raittila Side View | © Samuel Ludwig © Jonathan Rieke, Flickr User © Jonathan Rieke, Flickr User © Briac Robert, Flickr User © Darren Bradley, Flickr User © Darren Bradley, Flickr User Context and Commission The commission emerged from Carré’s desire to create a home that accommodates his personal life and substantial modern art collection. This dual programmatic requirement set the stage for an architectural response that blurred the boundaries between domesticity and exhibition. Carré’s choice to work with Aalto—an architect with no previous projects in France—was a decisive gesture toward the Nordic humanism Aalto embodied, a counterpoint to the more abstract modernism then dominant in France. Aalto approached the commission with characteristic sensitivity to context. The site, a gently sloping parcel of land with views toward the wooded landscape, became a defining element of the design. Rather than imposing geometry upon the terrain, Aalto allowed the house to unfold organically, with its plan responding to contours, vegetation, and light. Architecture does not dominate; instead, it inhabits the land. Spatial Composition and Formal Strategies The spatial organization of Maison Louis Carré reveals a deliberate zoning of public and private realms. The plan is anchored by a central axis, from which the different functions radiate in a sequence that feels both rational and intuitive. The entrance sets a subdued tone, opening onto a vestibule that transitions into the main gallery. From there, spaces progress with a rhythm that reflects both the daily life of its inhabitants and the choreography of art viewing. Aalto modulated ceiling heights, introduced changes in floor levels, and utilized natural light to distinguish spatial hierarchies. The gallery space, with its long skylight and controlled wall surfaces, becomes a contemplative void for art, while the living and dining rooms open outward, embracing the garden and horizon through expansive glazing. The result is a sequence of spaces where enclosure and openness are in constant dialogue. Circulation within the house is nuanced and layered. Subtle shifts in material, light, and alignment gently guide movement. The transitions between rooms avoid abrupt boundaries, favoring gradual thresholds that echo Aalto’s broader architectural philosophy of experiential continuity. There is a spatial narrative here, a sense that architecture unfolds in time as much as in plan. Maison Louis Carré Materiality and Detail Material selection in Maison Louis Carré reflects Aalto’s Nordic roots while embracing the local French context. Brick, oak, copper, and white plaster are deployed with restraint and care, their textures and tones harmonizing with the surrounding landscape. The craftsmanship in every joint, handle, and frame speaks to a level of attention that resists standardization. The interiors were designed as an extension of the architecture. Aalto, working closely with his wife Elissa, created much of the furniture, lighting, and textiles specifically for the house. These elements are not decorative additions but integral components of the spatial experience. Built-in furnishings emphasize horizontality, drawing the eye outward and reinforcing the relationship with the landscape. As always in Aalto’s work, light is treated as a material in its own right. Daylight enters through clerestories, skylights, and carefully oriented windows, subtly shifting over the day and animating surfaces. Indirect lighting strategies enhance this dynamic, creating spaces that feel both grounded and ethereal. The architecture invites a sensory engagement that goes beyond visual aesthetics. Maison Louis Carré occupies a distinctive place within Aalto’s oeuvre. While it shares thematic parallels with earlier residential projects such as Villa Mairea, its French setting and dual function as home and gallery give it a unique identity. The project synthesizes Aalto’s core principles—humanism, material sensitivity, spatial richness—into a composition that is at once site-specific and timeless. Maison Louis Carré Plans Floor Plan | © Alvar Aalto Foundation Elevation | © Alvar Aalto Foundation Elevation | © Alvar Aalto Foundation Elevation | © Alvar Aalto Foundation Sketch | © Alvar Aalto Foundation Maison Louis Carré Image Gallery About Alvar Aalto Alvar Aalto (1898–1976) was a Finnish architect, designer, and pioneer of modern architecture whose work seamlessly blended functionalism with a deep sensitivity to human experience, nature, and materials. Renowned for his holistic approach, Aalto designed buildings, furniture, lighting, and textiles as integrated systems, always prioritizing user comfort and spatial harmony. His architecture—ranging from civic buildings to private homes—reflects a distinctive humanist modernism that continues to influence contemporary practice worldwide. Credits and Additional Notes Structural Engineers: Bureau d’Études Techniques L. Mercier (France) Design Team: Alvar Aalto, Elissa Aalto, Studio Aalto (Helsinki), French local consultants (unnamed in most records) Client: Louis Carré (art dealer and collector) Site Area: Approximately 3 hectares (7.4 acres) Architectural Style: Organic Modernism / Humanist Modernism Building Type: Private Residence with Art Gallery Current Use: Museum and cultural site (open to the public under the Fondation Alvar Aalto) Heritage Status: Listed as a historic monument by the French Ministry of Culture in 1996 Weston, Richard. Alvar Aalto. Phaidon Press, 1997 Göran Schildt. Alvar Aalto: The Mature Years. Rizzoli, 1991
    0 Comments 0 Shares 32 Views
  • WWW.ARCHPAPER.COM
    Studio ST Architects and Maggie Rosenblatt Design empathetically modernize a client’s childhood home for the next generation
    Old Comfort Studio ST Architects and Maggie Rosenblatt Design empathetically modernize a client’s childhood home for the next generation By Paige Davidson • April 14, 2025 • East, Interiors (Alan Tansey) SHARE On New York’s Upper West Side, an apartment located within the 1931 Majestic building has been home to a family for generations. The client grew up in the residence located at 115 Central Park West, which was also home to her great grandmother, grandmother, and two aunts and an uncle. After her parents passed away, the client purchased the residence to make it a new home for her own family. Local architecture firm Studio ST Architects, along with interior decorator Maggie Rosenblatt Design, transformed the client’s childhood home to better suit the family, without losing the traces of its history. There are 4 beds and 4.5 baths inside the 3,500-square-foot apartment. The architects opened up the layout to allow a more free-flowing floorplan. Maggie Rosenblatt shared with AN Interior, “During our first walkthrough together, it became very apparent the client was emotionally attached to this space and its belongings, although she had no particular fondness to any specific thing in the apartment.” She continued, “She said, ‘I want white.’ I think this was her way of making something that was always her mothers into her own home.” Read more on aninteriormag.com. ApartmentsRenovation
    0 Comments 0 Shares 29 Views
  • WWW.FOXNEWS.COM
    What is quantum internet? Why it could change the internet forever
    Tech What is quantum internet? Why it could change the internet forever A new kind of internet that’s faster, safer, impossible to hack. Here’s what you need to know Published April 14, 2025 10:00am EDT close 'CyberGuy' says AI users' privacy could be at risk Tech expert Kurt Knutsson discusses tips on how to protect your data amid AI privacy concerns and Ford filing a patent to bring the stick shift to electric vehicles. Imagine an internet where your data can’t be stolen, your messages are completely private and online security is unbreakable. That’s the promise of quantum internet: a futuristic technology that could completely change how we connect online.Here’s a look at what quantum internet is, how it works and why it might be the future of online security.STAY PROTECTED & INFORMED! GET SECURITY ALERTS & EXPERT TECH TIPS – SIGN UP FOR KURT’S ‘THE CYBERGUY REPORT’ NOW Illustration of future tech (Kurt "CyberGuy" Knutsson)What is quantum internet?Quantum internet is a next-generation network that uses the power of physics to send data in a way that’s ultra-secure and computationally infeasible to hack. Quantum internet, quantum networks and quantum communication are all connected but have different roles. Quantum internet refers to the entire system that allows ultra-secure communication. Quantum networks are the infrastructure that connect quantum devices. Quantum communication is the actual exchange of information over these networks. Unlike today’s internet, which sends data as either a 0 or a 1, quantum internet relies on quantum bits, or qubits, which can exist as both 0 and 1 at the same time.This results in an encryption method that is nearly impossible to break, making it one of the most secure ways to communicate. What makes quantum internet even safer is a phenomenon called entanglement. When qubits become entangled, they stay connected no matter how far apart they are. If one qubit is changed, the other changes instantly. Any attempt to disrupt the entanglement, such as hacking, would immediately alert both people communicating. Man surfing the internet on his laptop (Kurt "CyberGuy" Knutsson)How quantum internet promises ultra-secure communicationOne of the biggest breakthroughs of quantum internet is its potential to eliminate hacking and data breaches. Here’s how.Quantum key distribution: This technology allows two users to share encryption keys in a way that physically prevents third-party interference. If a hacker tries to intercept the data, the system detects it immediately and blocks unauthorized access.Unhackable networks: Traditional encryption relies on complex math problems that could eventually be cracked by powerful computers. Quantum internet uses the laws of physics to secure data, making it resistant to even the most advanced cyberattacks.True end-to-end security: Normally, data travels through multiple servers, making it more vulnerable to attacks. Quantum communication, however, creates a direct link between sender and receiver, eliminating interception risks.What quantum internet could mean for online privacy and securityQuantum internet could completely redefine online privacy, making it harder for hackers, corporations or even governments to access personal data. Here’s how it could transform your online experience.Unbreakable encryption for everyday users: Imagine sending an email or making an online purchase without worrying about hackers getting to your data. Quantum encryption is so advanced that it’s practically impossible to crack, keeping your passwords, banking details and personal files safer than ever.A new standard for digital privacy: Today, encrypted messages, unfortunately, can sometimes be accessed by service providers. Quantum internet removes that risk by ensuring only the sender and receiver can read a message, so not even the hosting platform can access it.Staying ahead of cyber threats: Hackers are constantly finding new ways to crack traditional encryption. Quantum internet is designed to be resistant to these threats, making data breaches nearly impossible. Tablet showing a username and password screen (Kurt "CyberGuy" Knutsson)Challenges and the road aheadWhile the potential of quantum internet is exciting, there are still hurdles to overcome. The technology is still in early development, with most experiments confined to research labs. Unlike the traditional internet, quantum networks need specialized equipment to keep signals strong across cities or even countries. Developing this technology requires massive investments and breakthroughs before quantum internet can become widely available. Another key challenge is the transition from today’s internet to quantum internet. Since most existing technology is built for current networks, the shift won’t happen overnight. Instead, hybrid systems that combine elements of both traditional and quantum communication can serve as a bridge, helping businesses, governments and everyday users to adapt without disrupting the current digital infrastructure. Despite these challenges, progress is happening. Major countries, including the U.S., are investing heavily in quantum research, and scientists have successfully demonstrated that the technology works. While it may take years before quantum internet reaches everyday users, these breakthroughs are laying the foundation for a safer, more private digital future.Ways to stay safe while surfing the internetWhile quantum internet is a ways away, it's important to stay safe on the internet we use today. Until that new technology arrives, here are a few ways to protect yourself online.1) Have strong antivirus software: Until a more secure internet becomes available, it's important to use tools that help protect against everyday threats like unsafe links and malware. The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe. Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices.2) Be careful when using public Wi-Fi: Public Wi-Fi remains one of the easiest ways for hackers to access your data. The temptations and risks of free Wi-Fi make it important to think twice before connecting to an unsecured network. Avoid logging into sensitive accounts or entering personal details unless you're using a VPN or other form of encryption.3) Use a VPN: Consider using a VPN to protect against hackers snooping on your device as well. VPNs will protect you from those who want to track and identify your potential location and the websites that you visit. A reliable VPN is essential for protecting your online privacy and ensuring a secure, high-speed connection. 4) Invest in personal data removal services: While no service promises to remove all your data from the internet, having a removal service is great if you want to constantly monitor and automate the process of removing your information from hundreds of sites continuously over a longer period of time. Check out my top picks for data removal services here.5) Enable two-factor authentication (2FA): Until more advanced security becomes mainstream, 2FA is a simple way to protect your accounts. It adds an extra layer of security by requiring a second step to log in, like a code sent to your phone. For even stronger protection, consider using a security key that plugs into your device.Kurt’s key takeawaysQuantum internet represents a large shift in how we think about communication, privacy and security. By harnessing the power of physics, it promises to create a network that’s faster, more secure and more private than anything we’ve seen before. While the technology is still emerging, it has the potential to change the internet forever.What are your initial reactions to the concept of quantum internet? Are you excited, skeptical or concerned, and why? Let us know by writing us atCyberguy.com/Contact.For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter.Follow Kurt on his social channels:Answers to the most-asked CyberGuy questions:New from Kurt:Copyright 2025 CyberGuy.com. All rights reserved. Kurt "CyberGuy" Knutsson is an award-winning tech journalist who has a deep love of technology, gear and gadgets that make life better with his contributions for Fox News & FOX Business beginning mornings on "FOX & Friends." Got a tech question? Get Kurt’s free CyberGuy Newsletter, share your voice, a story idea or comment at CyberGuy.com.
    0 Comments 0 Shares 23 Views
  • WWW.COMPUTERWEEKLY.COM
    Government faces claims of serious security and data protection problems in One Login digital ID
    The Government Digital Service (GDS) was warned by the Cabinet Office and the National Cyber Security Centre (NCSC) that its One Login digital identity system had “serious data protection failings” and “significant shortcomings” in information security that could increase the risk of data breaches and identity theft. Problems were subsequently confirmed by an internal investigation led by GDS’s chief information security officer. But when, soon after, an MP wrote to the Cabinet Office to enquire about potential issues around the information security of One Login, GDS did not mention any of the warnings in its response. According to claims by a whistleblower, many of the security problems that were reported have yet to be resolved. One Login is the government’s flagship system for securely accessing online public services, and underpins the Gov.uk digital wallet and the digital driving licence launched by technology secretary Peter Kyle in January this year as part of his new government digital strategy. The whistleblower – who Computer Weekly has agreed not to name, but who has many years of cyber security experience and worked in a senior information security management role at GDS – first warned GDS leaders of serious cyber security problems with One Login in July 2022. He says his warnings were not heeded, forcing him 18 months later to write to his MP to highlight the issues, citing the 1998 Public Interest Disclosure Act, which protects civil servants who whistleblow about situations they believe to be in the public interest. He was subsequently informed by GDS that he would face disciplinary action. As a result of his initial warnings, then GDS chief executive Tom Read found out that development work on One Login had been offshored to Romania, without his knowledge or approval and without first seeking advice from the NCSC. The whistleblower claims that some of the security failings he identified have still not been addressed, and as a result, the information security of the three million users of One Login remains at risk. He cites over two-and-a-half years of reluctance from the GDS digital identity team to fully address his concerns. A spokesperson for the Department for Science, Innovation and Technology, of which GDS is a part, said: “We are fully compliant with UK data protection and privacy laws – including UK GDPR and the Data Protection Act 2018 – adhere to National Cyber Security Centre advice and operate a three lines of defence process. This ensures data is protected, fraud is deterred and detected, and threats are monitored and responded to.” In July 2022, the month after One Login went live, the whistleblower advised GDS senior leaders of a number of serious cyber security problems in the system – as was his responsibility in the job he was performing at that time. His concerns included: The digital identity team had insufficient security and assurance personnel to provide effective cyber security governance and management; No risk or threat assessment for One Login had been conducted; There were no records to show that security obligations and requirements had been identified; No information security management system had been put in place; Insufficient security monitoring, including areas of concern such as indicators of compromise and the number of people with privileged access to the live production system. The whistleblower also reported that system administration was being performed through non-compliant devices with a risk of transmitting security vulnerabilities, such as malware or phishing attacks, that could compromise the live system. The NCSC recommends that system administration for key government services should be conducted from a dedicated device used only for that purpose, known as a privileged access workstation (PAW), or alternatively to use only “browse down” devices, where the security level of the device is always the same or greater than the system being managed. The whistleblower warned that a lack of PAWs and use of browse-up administration were significant risks. As part of his proposals to address these issues, the whistleblower further claimed that the business case for One Login, which was used to approve over £330m of spending on the project, included misleading statements about the security approach taken for the system, and that cyber security risks were not adequately assessed. He recommended to GDS leaders that the National Audit Office (NAO) or the Infrastructure and Projects Authority (IPA) – the final arbiters of information assurance in the civil service – should be informed. His suggestion was rejected. According to civil service guidelines, every IT system should have three levels of information assurance – first, by the team developing the system; second, through independent assurance from civil service experts outside the team; and third, from the NAO or IPA. In an email to GDS leaders in August 2022, director of digital identity Natalie Jones – the senior responsible owner for One Login – admitted that the whistleblower’s report about information assurance issues on One Login contained “a number of helpful observations and recommendations”, and also acknowledged the need for the three levels of structured assurance. However, in reply to Jones’ email, then GDS chief executive Tom Read questioned the role of the GDS information assurance (IA) team that provided the second-level independent review function, saying that “the days of having a separate ‘judging, assessing and blocking’ IA team should be long gone, and integrated engineering/security (dev/sec/ops) has been best practice for some years”. Fourteen months later, following the appointment in October 2023 of a new chief information security officer (CISO) at GDS, the internal IA team was disbanded and moved into a new Information Security team. Another aspect of the whistleblower’s July 2022 advice to GDS leaders raised questions over the use of offshore software development for One Login, provided as part of a contract with Deloitte. In the same email from Read, the CEO said he was “uncomfortable that this is how I find out we’ve decided to offshore dev work. I would expect this to come to me for advice or a decision, along with advice from NCSC”. In November 2022, GDS was told by the Cabinet Office data protection officer (DPO) that One Login had “serious data protection failings” and that the live service should be suspended pending resolution. In a report to Jones, the DPO made 11 recommendations to address the risks he identified with the One Login service at that time. He said the initial draft of the mandatory data protection impact assessment (DPIA) for One Login “failed to adequately identify and provide mitigations for key risks before the live service and app were launched. These risks include the lawful basis relied on for biometric data, the legal prohibition of automated processing - and in particular the prohibition on automated processing based on special category data, such as biometric data, without explicit consent - and the failure to disclose the processing of special category data”. The DPO also questioned whether the One Login team had sufficient discussions with the Information Commissioner’s Office (ICO) over the risks identified. “These risks remained high post the mitigation measures identified in the DPIA, and this should therefore have triggered the legal obligation to conduct a statutory prior engagement with the Information Commissioner before the service went live. While I understand that there has been some engagement with the ICO, this would not be sufficient to discharge this obligation,” he said, in his report to Jones. At the time, about 300,000 user accounts had been created in One Login – today there are more than three million. According to the whistleblower, GDS paid for an external lawyer to make a counterargument that the service was compliant in order to prevent its suspension. A mandatory DPIA has still not been published, despite the system being live for more than three years. In September 2023, the NCSC wrote to Jones, saying that One Login had “severe shortcomings” in its cyber security, identifying “top-level risks” including “bulk personal data breach” and “risk of impersonation leading to mass fraud”. The NCSC concluded that “the current design and operating procedures of the system leave significant risks”. The following month, the whistleblower wrote to the then GDS chief operating officer (COO) to further highlight his concerns, stating that the security issues he had identified the previous year had not been resolved. He provided the COO with further data that showed over half a million vulnerabilities relating to security and resiliency within the live One Login service, of which over 10,000 were considered “critical” and over 7,000 as “high”. The bulk of the vulnerabilities – over 475,000 – were classed as “medium”. He raised additional issues around information assurance. Assurance for One Login was done by an external consultancy, 6point6 – now a subsidiary of Accenture - which he said represented a conflict of interest because the company is also one of the main suppliers for developing One Login. Furthermore, he said the 6point6 team was refusing to share critical information with GDS’s second-line assurance function. To this day, the whistleblower claims that the only risk assessments for One Login have been conducted by 6point6, and no independent risk assessment has been completed, which goes against civil service guidance. Subsequently, in November 2023, the newly-appointed CISO, Breandan Security clearance of personnel. According to previous claims by the whistleblower, staff without sufficient security clearance had accessed the live production environment – containing data and code - over 6,000 times in a single month, including Deloitte employees based in Romania, which he described as “indicative of an unstable and poorly secured service”. He further claimed that 39% of production administrators did not have the appropriate “security check” (SC) level of security clearance, despite being responsible for handling “millions of citizens’ sensitive personal data”. Software engineering teams based abroad – described by Knowlton as “irregular” for a government service, acknowledging that even the “quite small” number of offshore developers “still represents a risk”. Direct production system access, with Knowlton “troubling”, and indicated “a failure of automated sociotechnical security controls and tooling” Alerting – acknowledging that “automated tooling can identify a firehose of potential vulnerabilities” which Knowlton believed the digital identity team had “a handle on”, but added, “the current risk is likely to remain high”. Security culture – with Knowlton saying that “security is currently taken seriously,” but adding that “the extreme delivery pressure may be putting pressure on the programme to overreport current security readiness”. Knowlton reported that “remediation plans [are] in place to address security and technical debt,” but concluded that, “If upon review by the DI [digital identity] team the majority of these concerns are evidenced and remain unaddressed, the security posture of the DI service could be deemed to fall outside of acceptable GDS and DI thresholds”. Timeline of warnings about One Login security July 2022 - GDS leaders sent warnings from internal security expert about a variety of serious security failings in One Login. August 2022 – Director of digital identity Natalie Jones emails GDS leaders acknowledging the “helpful observations and recommendations” provided. August 2022 – GDS CEO Tom Read questions the role of the GDS information assurance function, and raises concerns as to why he had not been told development work on One Login was being offshored. November 2022 – Cabinet Office data protection officer (DPO) warns that One Login had “serious data protection failings” and that the live service should be suspended pending resolution. September 2023 – National Cyber Security Centre warns that One Login had “severe shortcomings” in its cyber security. October 2023 -Whistleblower who raised original concerns warns GDS chief operating officer that security problems in One Login have not been fully addressed. November 2023 – GDS CISO reports that One Login was “indeed carrying a high level of risk”. January 2024 – Whistleblower writes to his MP with warnings about cyber security problems in One Login. The MP subsequently writes to the Cabinet Office with his concerns. 5 February 2024 – GDS commences disciplinary action against whistleblower. 8 February 2024 – GDS writes to Cabinet Office minister with a suggested response top the MP’s letter. The GDS response does not mention the earlier warnings from the DPO, the NCSC, or the GDS CISO. April 2025 – Whistleblower maintains that the cyber security problems in One Login have yet to be fully addressed.  In January 2024, frustrated by what he saw as inaction from GDS, the whistleblower wrote to his MP, James Sunderland, about his security concerns, citing whistleblower protection laws, and his MP wrote to Cabinet Office minister John Glen requesting a response. On 5 February 2024, GDS initiated disciplinary action against the whistleblower. On 8 February, Jones wrote to minister Glen in response to the allegations raised by the whistleblower in his letter to his MP. She included background information about the whistleblower and his recent history in GDS. “This civil servant made very similar claims internally in 2023, which were thoroughly investigated and actioned at the time. His restated assertions do not appear to reflect the additional security measures implemented by One Login during the intervening period, as part of the programme’s commitment to continuous improvement,” Jones wrote. “The wider issues associated with the employee who has raised the issue sharing sensitive information externally are being investigated through the Civil Service’s personnel and security channels.” Her responses to the claims over security concerns said that “cyber security, resilience and information assurance have been amongst the programme’s highest priorities since its inception”. She explained the programme’s “robust approach” to security and refuted the specific points that had been raised: Jones’ response to Glen about the specific points raised by Sunderland were: Sunderland: How many individuals without national security vetting to SC had privileged access to the live service within the production environment, enabling them to make changes or access data at will? Jones: “Over the last six months, we have strengthened One Login’s processes for onboarding new recruits and for granting access to the production environment (ie. to the live system’s code and critical software tooling). All One Login staff, irrespective of nationality, are required to undergo a minimum of [the government’s] Baseline Personnel Security Standard (BPSS) or equivalent checks before starting work. No ‘unchecked’ foreign nationals have been, or are, employed on the programme. “Roles that need production access require Security Check (SC) vetting. An audit in December 2023 identified 172 people with production access; we are continually seeking to reduce this cohort to its smallest viable size while still maintaining the resilience of the system. Named individuals may also be granted limited access, on a case-by-case basis and if approved by a senior civil servant, if they hold BPSS and are undergoing the SC process. 22 people are currently in this category, but it is important to note that their work must be approved by an SC-cleared member of the team before it becomes part of the One Login technical solution. “A wide range of controls are in place, even for SC-cleared personnel. For instance, code changes are subject to automated testing and two-person checks. Databases containing account details are encrypted. Access to sensitive data stores is restricted and protected by automatic monitoring, with any alerts sent to both the One Login security team and the Cabinet Office’s cyber monitoring function.” Sunderland: How many security vulnerabilities have been detected in the live service by manual and automated security assessments, including those needing further investigation? Jones: “The One Login team continually tests and checks the system to minimise vulnerabilities… All identified vulnerabilities are investigated, prioritised and remediated. As part of this approach, in August 2023 the programme assessed One Login against 32 security and operational best practice guidelines, ranging from high-level principles to granular standards in areas such as governance, cyber security, monitoring and resilience. This exercise identified a range of findings that were repeated across multiple production accounts, leading to an artificially large number of potential Sunderland: The number of occasions per month when systems underpinning the live service were directly accessed by staff and contractors? Jones: “It is necessary and important for named staff to be able to access One Login’s live system, to ensure its smooth and robust operation. This is controlled, logged and monitored, with automated alerting in the event of unauthorised, out of hours and/or unusually frequent access. In January 2024, individuals accessed the production environment a total of 6,222 times. This is consistent with expected levels for a system of One Login’s complexity. Any unapproved access to the system would be fully investigated. The One Login security team regularly carries out threat modelling and red teaming exercises to map out how a ‘bad actor’, whether internal or external, could try to infiltrate or attack the system. The findings are then used to strengthen further the system’s design and protections, including so that the impact of any compromise would be limited and ineffective.” According to the whistleblower, the number of times cited for the production environment being accessed was unusually high – by comparison, he quotes figures for another GDS service, Gov.uk Notify, which processes one billion messages per year but in an average month he says Notify sees full-privilege interactive access just 10 to 12 times. Sunderland: From a cyber security perspective, what was the IPA made aware of in their review, when and by who? Jones: “We have a very constructive relationship with the IPA which, in keeping with One Login’ s status as a government major project, has undertaken three independent reviews of the programme. The most recent was in November 2023. We shared with the IPA all of the extensive documentation it requested, and the review team held candid interviews with personnel from across the programme - including One Login’s senior team and the head of security - and in other government departments. The IPA’s report made a number of recommendations, which we are currently reviewing, but commended the programme on its openness, delivery progress and the growing maturity of its live operations.” Jones drafted a response to Sunderland that further summarised some elements of the information she provided to Glen. In neither letter did Jones mention the earlier warnings from the Cabinet Office DPO, the NCSC, or the GDS CISO. GDS maintains that it follows civil service and NCSC guidance on security and data protection. The One Login programme employs a team of security experts, with additional scrutiny and assurance provided by GDS’s CISO, the Cabinet Office’s central cyber teams and the NCSC. A Threat Intelligence and Counter Fraud team in GDS aims to ensure product features are counter-fraud by design and proactively monitored to investigate and intercept fraudulent activity. GDS is assured against industry best practice guidance and says it regularly engages with the Information Commissioner’s Office, as well as conducting regular risk assessments and security testing. GDS follows the GovAssure process and says it completed a Cyber Assessment Framework security exercise in 2024, with continued work and collaboration with NCSC on future mitigations. However, the whistleblower claims that the GDS digital identity team is the exception in having nobody from GDS’s internal security team to advise on information assurance – he says every other GDS service follows this principle. He says GDS has “removed independent assurance of cyber security” from One Login, despite civil service rules mandating that such assurance should be provided from outside the development team. He claims that GDS has suppressed the NCSC’s warnings and that there is no evidence that all the security problems he identified have been fully addressed. Computer Weekly asked GDS if all the One Login security and information assurance issues that were raised – along with the DPO and NCSC concerns – as well as the risks subsequently confirmed by the GDS CISO, have been fully addressed and resolved, but GDS did not provide a response to that specific question. We also asked what risks remain to the data protection and information security of the three million-plus users of One Login, but GDS did not answer that specific question either.
    0 Comments 0 Shares 32 Views
  • WWW.ZDNET.COM
    I tested the $13 multitool that everyone is talking about. Here's my verdict
    The Amazon Basics 15-in-1 multitool has thousands of positive reviews and can do it all: from cutting down branches, acting as a screwdriver, or opening a wine bottle.
    0 Comments 0 Shares 32 Views
  • WWW.FORBES.COM
    PlayStation 5 Price Increase: A Sign Of Things To Come?
    With inflation biting and tariffs looming, Sony is reshaping its pricing strategy — offering a potential glimpse into Big Tech’s new economic reality.
    0 Comments 0 Shares 30 Views
  • WWW.TECHSPOT.COM
    Apple iPadOS 19 update could make iPads feel more like Macs
    Something to look forward to: Even though iPadOS is considered a great operating system for the tablet form factor, it still falls short in several areas compared to a full desktop OS. But that could change with the launch of iPadOS 19, which will reportedly see the slate's software more closely aligned with macOS. According to Bloomberg's expert on all things Apple-related, Mark Gurman, a key theme of Apple's upcoming Worldwide Developers Conference (WWDC) is likely to be iPad software. Writing in his Power On newsletter, Gurman says that this year's iPadOS release will focus on productivity, multitasking, and window management. Many users have been calling for Apple to introduce new software that makes the iPad more powerful, especially in light of the new M3 iPad Air and M4 iPad Pro that are now available. While power users have asked for Apple to simply put macOS on the iPad, that isn't going to happen. However, the changes that will arrive in iPadOS 19 are expected to make the tablet's operating system much more like its Mac sibling's OS. Gurman says that the changes will likely go far enough to make advocates for macOS-on-iPad happy, at least for the time being. // Related Stories In March, Gurman said that the latest iPad Pro featuring Apple's M5 chip is set to land this year. Apple released the 2018 and 2022 iPad Pro models in October of those years, but the current OLED-sporting iPad Pros were launched in May 2024. WWDC is scheduled to take place from June 9 to June 13. Gurman said iPadOS 19 is coming about the same time that the M5 iPad Pros will be ready, so the upgraded OS could take full advantage of the power in Apple's next-gen silicon. It was reported last month that Apple wants to revamp the user interface across iPhone, iPad, and Mac devices later this year. Cupertino wants to transform the look and feel of its iDevices, creating more consistency across all products. Everything from applications and icons to window styles could look the same on macOS, iOS, iPadOS, and even visionOS.
    0 Comments 0 Shares 29 Views
  • WWW.DIGITALTRENDS.COM
    Eddington trailer: Ari Aster crafts a social media nightmare
    Ari Aster takes audiences back to 2020 in the official trailer for Eddington. “Of course, they keep looking at that lab in China. If you look at that lab in Wuhan,” the voiceover states at the beginning of the trailer. “When that was established, it was 1956, of course. That was the year Tom Hanks was born, the first celebrity with the virus.” Set during the pandemic, the Eddington trailer is framed through the phone of Sheriff Joe Cross (Joaquin Phoenix), who scrolls his Instagram feed while lying in bed. In one video, Cross holds a press conference and says, “If you value your life, you should think twice because the people at Eddington like guns.” Cross is later seen assaulting a protester in a “town rocked by murders.” However, Cross pleads with the camera, calling the event an accident as he tries to explain the situation. Related Other videos include an advertisement for Mayor Ted Garcia’s (Pedro Pascal) reelection, a fiery speech from Austin Butler’s character, and an apology from Louise Cross (Emma Stone), who denies her husband’s announcement. A24 Eddington also stars Luke Grimes, Deirdre O’Connell, Micheal Ward, Clifton Collins Jr., William Belleau, Cameron Mann, Matt Gomez Hidaka, and Amélie Hoeferle. Aster is the writer, producer, and director of Eddington. It marks Aster’s fourth feature film, behind 2018’s Hereditary, 2019’s Midsommar, and 2023’s Beau Is Afraid. Lars Knudsen is also a producer. Eddington will premiere at the 2025 Cannes Film Festival next month. Aster’s Western will compete for the Palme d’Or. A24 will release Eddington in theaters on July 18. Editors’ Recommendations
    0 Comments 0 Shares 24 Views
  • WWW.WSJ.COM
    Nvidia to Make AI Supercomputers Entirely in U.S.
    Nvidia said it would start producing AI supercomputers that will be manufactured entirely in the U.S.
    0 Comments 0 Shares 34 Views
  • WWW.WSJ.COM
    My Dad Is a Top Hollywood Agent. But He Started at the Bottom.
    Matthew Specktor tells the story of his super-agent father, Fred Specktor’s, rise through the agency ranks in ‘The Golden Hour.’
    0 Comments 0 Shares 32 Views