• New Zealand’s Email Security Requirements for Government Organizations: What You Need to Know

    The Secure Government EmailCommon Implementation Framework
    New Zealand’s government is introducing a comprehensive email security framework designed to protect official communications from phishing and domain spoofing. This new framework, which will be mandatory for all government agencies by October 2025, establishes clear technical standards to enhance email security and retire the outdated SEEMail service. 
    Key Takeaways

    All NZ government agencies must comply with new email security requirements by October 2025.
    The new framework strengthens trust and security in government communications by preventing spoofing and phishing.
    The framework mandates TLS 1.2+, SPF, DKIM, DMARC with p=reject, MTA-STS, and DLP controls.
    EasyDMARC simplifies compliance with our guided setup, monitoring, and automated reporting.

    Start a Free Trial

    What is the Secure Government Email Common Implementation Framework?
    The Secure Government EmailCommon Implementation Framework is a new government-led initiative in New Zealand designed to standardize email security across all government agencies. Its main goal is to secure external email communication, reduce domain spoofing in phishing attacks, and replace the legacy SEEMail service.
    Why is New Zealand Implementing New Government Email Security Standards?
    The framework was developed by New Zealand’s Department of Internal Affairsas part of its role in managing ICT Common Capabilities. It leverages modern email security controls via the Domain Name Systemto enable the retirement of the legacy SEEMail service and provide:

    Encryption for transmission security
    Digital signing for message integrity
    Basic non-repudiationDomain spoofing protection

    These improvements apply to all emails, not just those routed through SEEMail, offering broader protection across agency communications.
    What Email Security Technologies Are Required by the New NZ SGE Framework?
    The SGE Framework outlines the following key technologies that agencies must implement:

    TLS 1.2 or higher with implicit TLS enforced
    TLS-RPTSPFDKIMDMARCwith reporting
    MTA-STSData Loss Prevention controls

    These technologies work together to ensure encrypted email transmission, validate sender identity, prevent unauthorized use of domains, and reduce the risk of sensitive data leaks.

    Get in touch

    When Do NZ Government Agencies Need to Comply with this Framework?
    All New Zealand government agencies are expected to fully implement the Secure Government EmailCommon Implementation Framework by October 2025. Agencies should begin their planning and deployment now to ensure full compliance by the deadline.
    The All of Government Secure Email Common Implementation Framework v1.0
    What are the Mandated Requirements for Domains?
    Below are the exact requirements for all email-enabled domains under the new framework.
    ControlExact RequirementTLSMinimum TLS 1.2. TLS 1.1, 1.0, SSL, or clear-text not permitted.TLS-RPTAll email-sending domains must have TLS reporting enabled.SPFMust exist and end with -all.DKIMAll outbound email from every sending service must be DKIM-signed at the final hop.DMARCPolicy of p=reject on all email-enabled domains. adkim=s is recommended when not bulk-sending.MTA-STSEnabled and set to enforce.Implicit TLSMust be configured and enforced for every connection.Data Loss PreventionEnforce in line with the New Zealand Information Security Manualand Protective Security Requirements.
    Compliance Monitoring and Reporting
    The All of Government Service Deliveryteam will be monitoring compliance with the framework. Monitoring will initially cover SPF, DMARC, and MTA-STS settings and will be expanded to include DKIM. Changes to these settings will be monitored, enabling reporting on email security compliance across all government agencies. Ongoing monitoring will highlight changes to domains, ensure new domains are set up with security in place, and monitor the implementation of future email security technologies. 
    Should compliance changes occur, such as an agency’s SPF record being changed from -all to ~all, this will be captured so that the AoGSD Security Team can investigate. They will then communicate directly with the agency to determine if an issue exists or if an error has occurred, reviewing each case individually.
    Deployment Checklist for NZ Government Compliance

    Enforce TLS 1.2 minimum, implicit TLS, MTA-STS & TLS-RPT
    SPF with -all
    DKIM on all outbound email
    DMARC p=reject 
    adkim=s where suitable
    For non-email/parked domains: SPF -all, empty DKIM, DMARC reject strict
    Compliance dashboard
    Inbound DMARC evaluation enforced
    DLP aligned with NZISM

    Start a Free Trial

    How EasyDMARC Can Help Government Agencies Comply
    EasyDMARC provides a comprehensive email security solution that simplifies the deployment and ongoing management of DNS-based email security protocols like SPF, DKIM, and DMARC with reporting. Our platform offers automated checks, real-time monitoring, and a guided setup to help government organizations quickly reach compliance.
    1. TLS-RPT / MTA-STS audit
    EasyDMARC enables you to enable the Managed MTA-STS and TLS-RPT option with a single click. We provide the required DNS records and continuously monitor them for issues, delivering reports on TLS negotiation problems. This helps agencies ensure secure email transmission and quickly detect delivery or encryption failures.

    Note: In this screenshot, you can see how to deploy MTA-STS and TLS Reporting by adding just three CNAME records provided by EasyDMARC. It’s recommended to start in “testing” mode, evaluate the TLS-RPT reports, and then gradually switch your MTA-STS policy to “enforce”. The process is simple and takes just a few clicks.

    As shown above, EasyDMARC parses incoming TLS reports into a centralized dashboard, giving you clear visibility into delivery and encryption issues across all sending sources.
    2. SPF with “-all”In the EasyDARC platform, you can run the SPF Record Generator to create a compliant record. Publish your v=spf1 record with “-all” to enforce a hard fail for unauthorized senders and prevent spoofed emails from passing SPF checks. This strengthens your domain’s protection against impersonation.

    Note: It is highly recommended to start adjusting your SPF record only after you begin receiving DMARC reports and identifying your legitimate email sources. As we’ll explain in more detail below, both SPF and DKIM should be adjusted after you gain visibility through reports.
    Making changes without proper visibility can lead to false positives, misconfigurations, and potential loss of legitimate emails. That’s why the first step should always be setting DMARC to p=none, receiving reports, analyzing them, and then gradually fixing any SPF or DKIM issues.
    3. DKIM on all outbound email
    DKIM must be configured for all email sources sending emails on behalf of your domain. This is critical, as DKIM plays a bigger role than SPF when it comes to building domain reputation, surviving auto-forwarding, mailing lists, and other edge cases.
    As mentioned above, DMARC reports provide visibility into your email sources, allowing you to implement DKIM accordingly. If you’re using third-party services like Google Workspace, Microsoft 365, or Mimecast, you’ll need to retrieve the public DKIM key from your provider’s admin interface.
    EasyDMARC maintains a backend directory of over 1,400 email sources. We also give you detailed guidance on how to configure SPF and DKIM correctly for major ESPs. 
    Note: At the end of this article, you’ll find configuration links for well-known ESPs like Google Workspace, Microsoft 365, Zoho Mail, Amazon SES, and SendGrid – helping you avoid common misconfigurations and get aligned with SGE requirements.
    If you’re using a dedicated MTA, DKIM must be implemented manually. EasyDMARC’s DKIM Record Generator lets you generate both public and private keys for your server. The private key is stored on your MTA, while the public key must be published in your DNS.

    4. DMARC p=reject rollout
    As mentioned in previous points, DMARC reporting is the first and most important step on your DMARC enforcement journey. Always start with a p=none policy and configure RUA reports to be sent to EasyDMARC. Use the report insights to identify and fix SPF and DKIM alignment issues, then gradually move to p=quarantine and finally p=reject once all legitimate email sources have been authenticated. 
    This phased approach ensures full protection against domain spoofing without risking legitimate email delivery.

    5. adkim Strict Alignment Check
    This strict alignment check is not always applicable, especially if you’re using third-party bulk ESPs, such as Sendgrid, that require you to set DKIM on a subdomain level. You can set adkim=s in your DMARC TXT record, or simply enable strict mode in EasyDMARC’s Managed DMARC settings. This ensures that only emails with a DKIM signature that exactly match your domain pass alignment, adding an extra layer of protection against domain spoofing. But only do this if you are NOT a bulk sender.

    6. Securing Non-Email Enabled Domains
    The purpose of deploying email security to non-email-enabled domains, or parked domains, is to prevent messages being spoofed from that domain. This requirement remains even if the root-level domain has SP=reject set within its DMARC record.
    Under this new framework, you must bulk import and mark parked domains as “Parked.” Crucially, this requires adjusting SPF settings to an empty record, setting DMARC to p=reject, and ensuring an empty DKIM record is in place: • SPF record: “v=spf1 -all”.
    • Wildcard DKIM record with empty public key.• DMARC record: “v=DMARC1;p=reject;adkim=s;aspf=s;rua=mailto:…”.
    EasyDMARC allows you to add and label parked domains for free. This is important because it helps you monitor any activity from these domains and ensure they remain protected with a strict DMARC policy of p=reject.
    7. Compliance Dashboard
    Use EasyDMARC’s Domain Scanner to assess the security posture of each domain with a clear compliance score and risk level. The dashboard highlights configuration gaps and guides remediation steps, helping government agencies stay on track toward full compliance with the SGE Framework.

    8. Inbound DMARC Evaluation Enforced
    You don’t need to apply any changes if you’re using Google Workspace, Microsoft 365, or other major mailbox providers. Most of them already enforce DMARC evaluation on incoming emails.
    However, some legacy Microsoft 365 setups may still quarantine emails that fail DMARC checks, even when the sending domain has a p=reject policy, instead of rejecting them. This behavior can be adjusted directly from your Microsoft Defender portal. about this in our step-by-step guide on how to set up SPF, DKIM, and DMARC from Microsoft Defender.
    If you’re using a third-party mail provider that doesn’t enforce having a DMARC policy for incoming emails, which is rare, you’ll need to contact their support to request a configuration change.
    9. Data Loss Prevention Aligned with NZISM
    The New Zealand Information Security Manualis the New Zealand Government’s manual on information assurance and information systems security. It includes guidance on data loss prevention, which must be followed to be aligned with the SEG.
    Need Help Setting up SPF and DKIM for your Email Provider?
    Setting up SPF and DKIM for different ESPs often requires specific configurations. Some providers require you to publish SPF and DKIM on a subdomain, while others only require DKIM, or have different formatting rules. We’ve simplified all these steps to help you avoid misconfigurations that could delay your DMARC enforcement, or worse, block legitimate emails from reaching your recipients.
    Below you’ll find comprehensive setup guides for Google Workspace, Microsoft 365, Zoho Mail, Amazon SES, and SendGrid. You can also explore our full blog section that covers setup instructions for many other well-known ESPs.
    Remember, all this information is reflected in your DMARC aggregate reports. These reports give you live visibility into your outgoing email ecosystem, helping you analyze and fix any issues specific to a given provider.
    Here are our step-by-step guides for the most common platforms:

    Google Workspace

    Microsoft 365

    These guides will help ensure your DNS records are configured correctly as part of the Secure Government EmailFramework rollout.
    Meet New Government Email Security Standards With EasyDMARC
    New Zealand’s SEG Framework sets a clear path for government agencies to enhance their email security by October 2025. With EasyDMARC, you can meet these technical requirements efficiently and with confidence. From protocol setup to continuous monitoring and compliance tracking, EasyDMARC streamlines the entire process, ensuring strong protection against spoofing, phishing, and data loss while simplifying your transition from SEEMail.
    #new #zealands #email #security #requirements
    New Zealand’s Email Security Requirements for Government Organizations: What You Need to Know
    The Secure Government EmailCommon Implementation Framework New Zealand’s government is introducing a comprehensive email security framework designed to protect official communications from phishing and domain spoofing. This new framework, which will be mandatory for all government agencies by October 2025, establishes clear technical standards to enhance email security and retire the outdated SEEMail service.  Key Takeaways All NZ government agencies must comply with new email security requirements by October 2025. The new framework strengthens trust and security in government communications by preventing spoofing and phishing. The framework mandates TLS 1.2+, SPF, DKIM, DMARC with p=reject, MTA-STS, and DLP controls. EasyDMARC simplifies compliance with our guided setup, monitoring, and automated reporting. Start a Free Trial What is the Secure Government Email Common Implementation Framework? The Secure Government EmailCommon Implementation Framework is a new government-led initiative in New Zealand designed to standardize email security across all government agencies. Its main goal is to secure external email communication, reduce domain spoofing in phishing attacks, and replace the legacy SEEMail service. Why is New Zealand Implementing New Government Email Security Standards? The framework was developed by New Zealand’s Department of Internal Affairsas part of its role in managing ICT Common Capabilities. It leverages modern email security controls via the Domain Name Systemto enable the retirement of the legacy SEEMail service and provide: Encryption for transmission security Digital signing for message integrity Basic non-repudiationDomain spoofing protection These improvements apply to all emails, not just those routed through SEEMail, offering broader protection across agency communications. What Email Security Technologies Are Required by the New NZ SGE Framework? The SGE Framework outlines the following key technologies that agencies must implement: TLS 1.2 or higher with implicit TLS enforced TLS-RPTSPFDKIMDMARCwith reporting MTA-STSData Loss Prevention controls These technologies work together to ensure encrypted email transmission, validate sender identity, prevent unauthorized use of domains, and reduce the risk of sensitive data leaks. Get in touch When Do NZ Government Agencies Need to Comply with this Framework? All New Zealand government agencies are expected to fully implement the Secure Government EmailCommon Implementation Framework by October 2025. Agencies should begin their planning and deployment now to ensure full compliance by the deadline. The All of Government Secure Email Common Implementation Framework v1.0 What are the Mandated Requirements for Domains? Below are the exact requirements for all email-enabled domains under the new framework. ControlExact RequirementTLSMinimum TLS 1.2. TLS 1.1, 1.0, SSL, or clear-text not permitted.TLS-RPTAll email-sending domains must have TLS reporting enabled.SPFMust exist and end with -all.DKIMAll outbound email from every sending service must be DKIM-signed at the final hop.DMARCPolicy of p=reject on all email-enabled domains. adkim=s is recommended when not bulk-sending.MTA-STSEnabled and set to enforce.Implicit TLSMust be configured and enforced for every connection.Data Loss PreventionEnforce in line with the New Zealand Information Security Manualand Protective Security Requirements. Compliance Monitoring and Reporting The All of Government Service Deliveryteam will be monitoring compliance with the framework. Monitoring will initially cover SPF, DMARC, and MTA-STS settings and will be expanded to include DKIM. Changes to these settings will be monitored, enabling reporting on email security compliance across all government agencies. Ongoing monitoring will highlight changes to domains, ensure new domains are set up with security in place, and monitor the implementation of future email security technologies.  Should compliance changes occur, such as an agency’s SPF record being changed from -all to ~all, this will be captured so that the AoGSD Security Team can investigate. They will then communicate directly with the agency to determine if an issue exists or if an error has occurred, reviewing each case individually. Deployment Checklist for NZ Government Compliance Enforce TLS 1.2 minimum, implicit TLS, MTA-STS & TLS-RPT SPF with -all DKIM on all outbound email DMARC p=reject  adkim=s where suitable For non-email/parked domains: SPF -all, empty DKIM, DMARC reject strict Compliance dashboard Inbound DMARC evaluation enforced DLP aligned with NZISM Start a Free Trial How EasyDMARC Can Help Government Agencies Comply EasyDMARC provides a comprehensive email security solution that simplifies the deployment and ongoing management of DNS-based email security protocols like SPF, DKIM, and DMARC with reporting. Our platform offers automated checks, real-time monitoring, and a guided setup to help government organizations quickly reach compliance. 1. TLS-RPT / MTA-STS audit EasyDMARC enables you to enable the Managed MTA-STS and TLS-RPT option with a single click. We provide the required DNS records and continuously monitor them for issues, delivering reports on TLS negotiation problems. This helps agencies ensure secure email transmission and quickly detect delivery or encryption failures. Note: In this screenshot, you can see how to deploy MTA-STS and TLS Reporting by adding just three CNAME records provided by EasyDMARC. It’s recommended to start in “testing” mode, evaluate the TLS-RPT reports, and then gradually switch your MTA-STS policy to “enforce”. The process is simple and takes just a few clicks. As shown above, EasyDMARC parses incoming TLS reports into a centralized dashboard, giving you clear visibility into delivery and encryption issues across all sending sources. 2. SPF with “-all”In the EasyDARC platform, you can run the SPF Record Generator to create a compliant record. Publish your v=spf1 record with “-all” to enforce a hard fail for unauthorized senders and prevent spoofed emails from passing SPF checks. This strengthens your domain’s protection against impersonation. Note: It is highly recommended to start adjusting your SPF record only after you begin receiving DMARC reports and identifying your legitimate email sources. As we’ll explain in more detail below, both SPF and DKIM should be adjusted after you gain visibility through reports. Making changes without proper visibility can lead to false positives, misconfigurations, and potential loss of legitimate emails. That’s why the first step should always be setting DMARC to p=none, receiving reports, analyzing them, and then gradually fixing any SPF or DKIM issues. 3. DKIM on all outbound email DKIM must be configured for all email sources sending emails on behalf of your domain. This is critical, as DKIM plays a bigger role than SPF when it comes to building domain reputation, surviving auto-forwarding, mailing lists, and other edge cases. As mentioned above, DMARC reports provide visibility into your email sources, allowing you to implement DKIM accordingly. If you’re using third-party services like Google Workspace, Microsoft 365, or Mimecast, you’ll need to retrieve the public DKIM key from your provider’s admin interface. EasyDMARC maintains a backend directory of over 1,400 email sources. We also give you detailed guidance on how to configure SPF and DKIM correctly for major ESPs.  Note: At the end of this article, you’ll find configuration links for well-known ESPs like Google Workspace, Microsoft 365, Zoho Mail, Amazon SES, and SendGrid – helping you avoid common misconfigurations and get aligned with SGE requirements. If you’re using a dedicated MTA, DKIM must be implemented manually. EasyDMARC’s DKIM Record Generator lets you generate both public and private keys for your server. The private key is stored on your MTA, while the public key must be published in your DNS. 4. DMARC p=reject rollout As mentioned in previous points, DMARC reporting is the first and most important step on your DMARC enforcement journey. Always start with a p=none policy and configure RUA reports to be sent to EasyDMARC. Use the report insights to identify and fix SPF and DKIM alignment issues, then gradually move to p=quarantine and finally p=reject once all legitimate email sources have been authenticated.  This phased approach ensures full protection against domain spoofing without risking legitimate email delivery. 5. adkim Strict Alignment Check This strict alignment check is not always applicable, especially if you’re using third-party bulk ESPs, such as Sendgrid, that require you to set DKIM on a subdomain level. You can set adkim=s in your DMARC TXT record, or simply enable strict mode in EasyDMARC’s Managed DMARC settings. This ensures that only emails with a DKIM signature that exactly match your domain pass alignment, adding an extra layer of protection against domain spoofing. But only do this if you are NOT a bulk sender. 6. Securing Non-Email Enabled Domains The purpose of deploying email security to non-email-enabled domains, or parked domains, is to prevent messages being spoofed from that domain. This requirement remains even if the root-level domain has SP=reject set within its DMARC record. Under this new framework, you must bulk import and mark parked domains as “Parked.” Crucially, this requires adjusting SPF settings to an empty record, setting DMARC to p=reject, and ensuring an empty DKIM record is in place: • SPF record: “v=spf1 -all”. • Wildcard DKIM record with empty public key.• DMARC record: “v=DMARC1;p=reject;adkim=s;aspf=s;rua=mailto:…”. EasyDMARC allows you to add and label parked domains for free. This is important because it helps you monitor any activity from these domains and ensure they remain protected with a strict DMARC policy of p=reject. 7. Compliance Dashboard Use EasyDMARC’s Domain Scanner to assess the security posture of each domain with a clear compliance score and risk level. The dashboard highlights configuration gaps and guides remediation steps, helping government agencies stay on track toward full compliance with the SGE Framework. 8. Inbound DMARC Evaluation Enforced You don’t need to apply any changes if you’re using Google Workspace, Microsoft 365, or other major mailbox providers. Most of them already enforce DMARC evaluation on incoming emails. However, some legacy Microsoft 365 setups may still quarantine emails that fail DMARC checks, even when the sending domain has a p=reject policy, instead of rejecting them. This behavior can be adjusted directly from your Microsoft Defender portal. about this in our step-by-step guide on how to set up SPF, DKIM, and DMARC from Microsoft Defender. If you’re using a third-party mail provider that doesn’t enforce having a DMARC policy for incoming emails, which is rare, you’ll need to contact their support to request a configuration change. 9. Data Loss Prevention Aligned with NZISM The New Zealand Information Security Manualis the New Zealand Government’s manual on information assurance and information systems security. It includes guidance on data loss prevention, which must be followed to be aligned with the SEG. Need Help Setting up SPF and DKIM for your Email Provider? Setting up SPF and DKIM for different ESPs often requires specific configurations. Some providers require you to publish SPF and DKIM on a subdomain, while others only require DKIM, or have different formatting rules. We’ve simplified all these steps to help you avoid misconfigurations that could delay your DMARC enforcement, or worse, block legitimate emails from reaching your recipients. Below you’ll find comprehensive setup guides for Google Workspace, Microsoft 365, Zoho Mail, Amazon SES, and SendGrid. You can also explore our full blog section that covers setup instructions for many other well-known ESPs. Remember, all this information is reflected in your DMARC aggregate reports. These reports give you live visibility into your outgoing email ecosystem, helping you analyze and fix any issues specific to a given provider. Here are our step-by-step guides for the most common platforms: Google Workspace Microsoft 365 These guides will help ensure your DNS records are configured correctly as part of the Secure Government EmailFramework rollout. Meet New Government Email Security Standards With EasyDMARC New Zealand’s SEG Framework sets a clear path for government agencies to enhance their email security by October 2025. With EasyDMARC, you can meet these technical requirements efficiently and with confidence. From protocol setup to continuous monitoring and compliance tracking, EasyDMARC streamlines the entire process, ensuring strong protection against spoofing, phishing, and data loss while simplifying your transition from SEEMail. #new #zealands #email #security #requirements
    EASYDMARC.COM
    New Zealand’s Email Security Requirements for Government Organizations: What You Need to Know
    The Secure Government Email (SGE) Common Implementation Framework New Zealand’s government is introducing a comprehensive email security framework designed to protect official communications from phishing and domain spoofing. This new framework, which will be mandatory for all government agencies by October 2025, establishes clear technical standards to enhance email security and retire the outdated SEEMail service.  Key Takeaways All NZ government agencies must comply with new email security requirements by October 2025. The new framework strengthens trust and security in government communications by preventing spoofing and phishing. The framework mandates TLS 1.2+, SPF, DKIM, DMARC with p=reject, MTA-STS, and DLP controls. EasyDMARC simplifies compliance with our guided setup, monitoring, and automated reporting. Start a Free Trial What is the Secure Government Email Common Implementation Framework? The Secure Government Email (SGE) Common Implementation Framework is a new government-led initiative in New Zealand designed to standardize email security across all government agencies. Its main goal is to secure external email communication, reduce domain spoofing in phishing attacks, and replace the legacy SEEMail service. Why is New Zealand Implementing New Government Email Security Standards? The framework was developed by New Zealand’s Department of Internal Affairs (DIA) as part of its role in managing ICT Common Capabilities. It leverages modern email security controls via the Domain Name System (DNS) to enable the retirement of the legacy SEEMail service and provide: Encryption for transmission security Digital signing for message integrity Basic non-repudiation (by allowing only authorized senders) Domain spoofing protection These improvements apply to all emails, not just those routed through SEEMail, offering broader protection across agency communications. What Email Security Technologies Are Required by the New NZ SGE Framework? The SGE Framework outlines the following key technologies that agencies must implement: TLS 1.2 or higher with implicit TLS enforced TLS-RPT (TLS Reporting) SPF (Sender Policy Framework) DKIM (DomainKeys Identified Mail) DMARC (Domain-based Message Authentication, Reporting, and Conformance) with reporting MTA-STS (Mail Transfer Agent Strict Transport Security) Data Loss Prevention controls These technologies work together to ensure encrypted email transmission, validate sender identity, prevent unauthorized use of domains, and reduce the risk of sensitive data leaks. Get in touch When Do NZ Government Agencies Need to Comply with this Framework? All New Zealand government agencies are expected to fully implement the Secure Government Email (SGE) Common Implementation Framework by October 2025. Agencies should begin their planning and deployment now to ensure full compliance by the deadline. The All of Government Secure Email Common Implementation Framework v1.0 What are the Mandated Requirements for Domains? Below are the exact requirements for all email-enabled domains under the new framework. ControlExact RequirementTLSMinimum TLS 1.2. TLS 1.1, 1.0, SSL, or clear-text not permitted.TLS-RPTAll email-sending domains must have TLS reporting enabled.SPFMust exist and end with -all.DKIMAll outbound email from every sending service must be DKIM-signed at the final hop.DMARCPolicy of p=reject on all email-enabled domains. adkim=s is recommended when not bulk-sending.MTA-STSEnabled and set to enforce.Implicit TLSMust be configured and enforced for every connection.Data Loss PreventionEnforce in line with the New Zealand Information Security Manual (NZISM) and Protective Security Requirements (PSR). Compliance Monitoring and Reporting The All of Government Service Delivery (AoGSD) team will be monitoring compliance with the framework. Monitoring will initially cover SPF, DMARC, and MTA-STS settings and will be expanded to include DKIM. Changes to these settings will be monitored, enabling reporting on email security compliance across all government agencies. Ongoing monitoring will highlight changes to domains, ensure new domains are set up with security in place, and monitor the implementation of future email security technologies.  Should compliance changes occur, such as an agency’s SPF record being changed from -all to ~all, this will be captured so that the AoGSD Security Team can investigate. They will then communicate directly with the agency to determine if an issue exists or if an error has occurred, reviewing each case individually. Deployment Checklist for NZ Government Compliance Enforce TLS 1.2 minimum, implicit TLS, MTA-STS & TLS-RPT SPF with -all DKIM on all outbound email DMARC p=reject  adkim=s where suitable For non-email/parked domains: SPF -all, empty DKIM, DMARC reject strict Compliance dashboard Inbound DMARC evaluation enforced DLP aligned with NZISM Start a Free Trial How EasyDMARC Can Help Government Agencies Comply EasyDMARC provides a comprehensive email security solution that simplifies the deployment and ongoing management of DNS-based email security protocols like SPF, DKIM, and DMARC with reporting. Our platform offers automated checks, real-time monitoring, and a guided setup to help government organizations quickly reach compliance. 1. TLS-RPT / MTA-STS audit EasyDMARC enables you to enable the Managed MTA-STS and TLS-RPT option with a single click. We provide the required DNS records and continuously monitor them for issues, delivering reports on TLS negotiation problems. This helps agencies ensure secure email transmission and quickly detect delivery or encryption failures. Note: In this screenshot, you can see how to deploy MTA-STS and TLS Reporting by adding just three CNAME records provided by EasyDMARC. It’s recommended to start in “testing” mode, evaluate the TLS-RPT reports, and then gradually switch your MTA-STS policy to “enforce”. The process is simple and takes just a few clicks. As shown above, EasyDMARC parses incoming TLS reports into a centralized dashboard, giving you clear visibility into delivery and encryption issues across all sending sources. 2. SPF with “-all”In the EasyDARC platform, you can run the SPF Record Generator to create a compliant record. Publish your v=spf1 record with “-all” to enforce a hard fail for unauthorized senders and prevent spoofed emails from passing SPF checks. This strengthens your domain’s protection against impersonation. Note: It is highly recommended to start adjusting your SPF record only after you begin receiving DMARC reports and identifying your legitimate email sources. As we’ll explain in more detail below, both SPF and DKIM should be adjusted after you gain visibility through reports. Making changes without proper visibility can lead to false positives, misconfigurations, and potential loss of legitimate emails. That’s why the first step should always be setting DMARC to p=none, receiving reports, analyzing them, and then gradually fixing any SPF or DKIM issues. 3. DKIM on all outbound email DKIM must be configured for all email sources sending emails on behalf of your domain. This is critical, as DKIM plays a bigger role than SPF when it comes to building domain reputation, surviving auto-forwarding, mailing lists, and other edge cases. As mentioned above, DMARC reports provide visibility into your email sources, allowing you to implement DKIM accordingly (see first screenshot). If you’re using third-party services like Google Workspace, Microsoft 365, or Mimecast, you’ll need to retrieve the public DKIM key from your provider’s admin interface (see second screenshot). EasyDMARC maintains a backend directory of over 1,400 email sources. We also give you detailed guidance on how to configure SPF and DKIM correctly for major ESPs.  Note: At the end of this article, you’ll find configuration links for well-known ESPs like Google Workspace, Microsoft 365, Zoho Mail, Amazon SES, and SendGrid – helping you avoid common misconfigurations and get aligned with SGE requirements. If you’re using a dedicated MTA (e.g., Postfix), DKIM must be implemented manually. EasyDMARC’s DKIM Record Generator lets you generate both public and private keys for your server. The private key is stored on your MTA, while the public key must be published in your DNS (see third and fourth screenshots). 4. DMARC p=reject rollout As mentioned in previous points, DMARC reporting is the first and most important step on your DMARC enforcement journey. Always start with a p=none policy and configure RUA reports to be sent to EasyDMARC. Use the report insights to identify and fix SPF and DKIM alignment issues, then gradually move to p=quarantine and finally p=reject once all legitimate email sources have been authenticated.  This phased approach ensures full protection against domain spoofing without risking legitimate email delivery. 5. adkim Strict Alignment Check This strict alignment check is not always applicable, especially if you’re using third-party bulk ESPs, such as Sendgrid, that require you to set DKIM on a subdomain level. You can set adkim=s in your DMARC TXT record, or simply enable strict mode in EasyDMARC’s Managed DMARC settings. This ensures that only emails with a DKIM signature that exactly match your domain pass alignment, adding an extra layer of protection against domain spoofing. But only do this if you are NOT a bulk sender. 6. Securing Non-Email Enabled Domains The purpose of deploying email security to non-email-enabled domains, or parked domains, is to prevent messages being spoofed from that domain. This requirement remains even if the root-level domain has SP=reject set within its DMARC record. Under this new framework, you must bulk import and mark parked domains as “Parked.” Crucially, this requires adjusting SPF settings to an empty record, setting DMARC to p=reject, and ensuring an empty DKIM record is in place: • SPF record: “v=spf1 -all”. • Wildcard DKIM record with empty public key.• DMARC record: “v=DMARC1;p=reject;adkim=s;aspf=s;rua=mailto:…”. EasyDMARC allows you to add and label parked domains for free. This is important because it helps you monitor any activity from these domains and ensure they remain protected with a strict DMARC policy of p=reject. 7. Compliance Dashboard Use EasyDMARC’s Domain Scanner to assess the security posture of each domain with a clear compliance score and risk level. The dashboard highlights configuration gaps and guides remediation steps, helping government agencies stay on track toward full compliance with the SGE Framework. 8. Inbound DMARC Evaluation Enforced You don’t need to apply any changes if you’re using Google Workspace, Microsoft 365, or other major mailbox providers. Most of them already enforce DMARC evaluation on incoming emails. However, some legacy Microsoft 365 setups may still quarantine emails that fail DMARC checks, even when the sending domain has a p=reject policy, instead of rejecting them. This behavior can be adjusted directly from your Microsoft Defender portal. Read more about this in our step-by-step guide on how to set up SPF, DKIM, and DMARC from Microsoft Defender. If you’re using a third-party mail provider that doesn’t enforce having a DMARC policy for incoming emails, which is rare, you’ll need to contact their support to request a configuration change. 9. Data Loss Prevention Aligned with NZISM The New Zealand Information Security Manual (NZISM) is the New Zealand Government’s manual on information assurance and information systems security. It includes guidance on data loss prevention (DLP), which must be followed to be aligned with the SEG. Need Help Setting up SPF and DKIM for your Email Provider? Setting up SPF and DKIM for different ESPs often requires specific configurations. Some providers require you to publish SPF and DKIM on a subdomain, while others only require DKIM, or have different formatting rules. We’ve simplified all these steps to help you avoid misconfigurations that could delay your DMARC enforcement, or worse, block legitimate emails from reaching your recipients. Below you’ll find comprehensive setup guides for Google Workspace, Microsoft 365, Zoho Mail, Amazon SES, and SendGrid. You can also explore our full blog section that covers setup instructions for many other well-known ESPs. Remember, all this information is reflected in your DMARC aggregate reports. These reports give you live visibility into your outgoing email ecosystem, helping you analyze and fix any issues specific to a given provider. Here are our step-by-step guides for the most common platforms: Google Workspace Microsoft 365 These guides will help ensure your DNS records are configured correctly as part of the Secure Government Email (SGE) Framework rollout. Meet New Government Email Security Standards With EasyDMARC New Zealand’s SEG Framework sets a clear path for government agencies to enhance their email security by October 2025. With EasyDMARC, you can meet these technical requirements efficiently and with confidence. From protocol setup to continuous monitoring and compliance tracking, EasyDMARC streamlines the entire process, ensuring strong protection against spoofing, phishing, and data loss while simplifying your transition from SEEMail.
    0 Комментарии 0 Поделились
  • Tern GSD S10 Electric Cargo Bike Review: The Best Little Electric Cargo Bike

    The smallest electric cargo bike is back, and it’s safer than ever.
    #tern #gsd #s10 #electric #cargo
    Tern GSD S10 Electric Cargo Bike Review: The Best Little Electric Cargo Bike
    The smallest electric cargo bike is back, and it’s safer than ever. #tern #gsd #s10 #electric #cargo
    WWW.WIRED.COM
    Tern GSD S10 Electric Cargo Bike Review: The Best Little Electric Cargo Bike
    The smallest electric cargo bike is back, and it’s safer than ever.
    0 Комментарии 0 Поделились
  • The nine-armed octopus and the oddities of the cephalopod nervous system

    Extra-sensory perception

    The nine-armed octopus and the oddities of the cephalopod nervous system

    A mix of autonomous and top-down control manage the octopus's limbs.

    Kenna Hughes-Castleberry



    Jun 7, 2025 8:00 am

    |

    19

    Credit:

    Nikos Stavrinidis / 500px

    Credit:

    Nikos Stavrinidis / 500px

    Story text

    Size

    Small
    Standard
    Large

    Width
    *

    Standard
    Wide

    Links

    Standard
    Orange

    * Subscribers only
      Learn more

    With their quick-change camouflage and high level of intelligence, it’s not surprising that the public and scientific experts alike are fascinated by octopuses. Their abilities to recognize faces, solve puzzles, and learn behaviors from other octopuses make these animals a captivating study.
    To perform these processes and others, like crawling or exploring, octopuses rely on their complex nervous system, one that has become a focus for neuroscientists. With about 500 million neurons—around the same number as dogs—octopuses’ nervous systems are the most complex of any invertebrate. But, unlike vertebrate organisms, the octopus’s nervous system is also decentralized, with around 350 million neurons, or 66 percent of it, located in its eight arms.
    “This means each arm is capable of independently processing sensory input, initiating movement, and even executing complex behaviors—without direct instructions from the brain,” explains Galit Pelled, a professor of Mechanical Engineering, Radiology, and Neuroscience at Michigan State University who studies octopus neuroscience. “In essence, the arms have their own ‘mini-brains.’”
    A decentralized nervous system is one factor that helps octopuses adapt to changes, such as injury or predation, as seen in the case of an Octopus vulgaris, or common octopus, that was observed with nine arms by researchers at the ECOBAR lab at the Institute of Marine Research in Spain between 2021 and 2022.
    By studying outliers like this cephalopod, researchers can gain insight into how the animal’s detailed scaffolding of nerves changes and regrows over time, uncovering more about how octopuses have evolved over millennia in our oceans.
    Brains, brains, and more brains
    Because each arm of an octopus contains its own bundle of neurons, the limbs can operate semi-independently from the central brain, enabling faster responses since signals don’t always need to travel back and forth between the brain and the arms. In fact, Pelled and her team recently discovered that “neural signals recorded in the octopus arm can predict movement type within 100 milliseconds of stimulation, without central brain involvement.” She notes that “that level of localized autonomy is unprecedented in vertebrate systems.”

    Though each limb moves on its own, the movements of the octopus’s body are smooth and conducted with a coordinated elegance that allows the animal to exhibit some of the broadest range of behaviors, adapting on the fly to changes in its surroundings.
    “That means the octopus can react quickly to its environment, especially when exploring, hunting, or defending itself,” Pelled says. “For example, one arm can grab food while another is feeling around a rock, without needing permission from the brain. This setup also makes the octopus more resilient. If one arm is injured, the others still work just fine. And because so much decision-making happens at the arms, the central brain is freed up to focus on the bigger picture—like navigating or learning new tasks.”
    As if each limb weren’t already buzzing with neural activity, things get even more intricate when researchers zoom in further—to the nerves within each individual sucker, a ring of muscular tissue, which octopuses use to sense and taste their surroundings.
    “There is a sucker ganglion, or nerve center, located in the stalk of every sucker. For some species of octopuses, that’s over a thousand ganglia,” says Cassady Olson, a graduate student at the University of Chicago who works with Cliff Ragsdale, a leading expert in octopus neuroscience.
    Given that each sucker has its own nerve centers—connected by a long axial nerve cord running down the limb—and each arm has hundreds of suckers, things get complicated very quickly, as researchers have historically struggled to study this peripheral nervous system, as it’s called, within the octopus’s body.
    “The large size of the brain makes it both really exciting to study and really challenging,” says Z. Yan Wang, an assistant professor of biology and psychology at the University of Washington. “Many of the tools available for neuroscience have to be adjusted or customized specifically for octopuses and other cephalopods because of their unique body plans.”

    While each limb acts independently, signals are transmitted back to the octopus’s central nervous system. The octopus’ brain sits between its eyes at the front of its mantle, or head, couched between its two optic lobes, large bean-shaped neural organs that help octopuses see the world around them. These optic lobes are just two of the over 30 lobes experts study within the animal’s centralized brain, as each lobe helps the octopus process its environment.
    This elaborate neural architecture is critical given the octopus’s dual role in the ecosystem as both predator and prey. Without natural defenses like a hard shell, octopuses have evolved a highly adaptable nervous system that allows them to rapidly process information and adjust as needed, helping their chances of survival.

    Some similarities remain
    While the octopus’s decentralized nervous system makes it a unique evolutionary example, it does have some structures similar to or analogous to the human nervous system.
    “The octopus has a central brain mass located between its eyes, and an axial nerve cord running down each arm,” says Wang. “The octopus has many sensory systems that we are familiar with, such as vision, touch, chemosensation, and gravity sensing.”
    Neuroscientists have homed in on these similarities to understand how these structures may have evolved across the different branches in the tree of life. As the most recent common ancestor for humans and octopuses lived around 750 million years ago, experts believe that many similarities, from similar camera-like eyes to maps of neural activities, evolved separately in a process known as convergent evolution.
    While these similarities shed light on evolution's independent paths, they also offer valuable insights for fields like soft robotics and regenerative medicine.
    Occasionally, unique individuals—like an octopus with an unexpected number of limbs—can provide even deeper clues into how this remarkable nervous system functions and adapts.

    Nine arms, no problem
    In 2021, researchers from the Institute of Marine Research in Spain used an underwater camera to follow a male Octopus vulgaris, or common octopus. On its left side, three arms were intact, while the others were reduced to uneven, stumpy lengths, sharply bitten off at varying points. Although the researchers didn’t witness the injury itself, they observed that the front right arm—known as R1—was regenerating unusually, splitting into two separate limbs and giving the octopus a total of nine arms.
    “In this individual, we believe this condition was a result of abnormal regenerationafter an encounter with a predator,” explains Sam Soule, one of the researchers and the first author on the corresponding paper recently published in Animals.
    The researchers named the octopus Salvador due to its bifurcated arm coiling up on itself like the two upturned ends of Salvador Dali’s moustache. For two years, the team studied the cephalopod’s behavior and found that it used its bifurcated arm less when doing “riskier” movements such as exploring or grabbing food, which would force the animal to stretch its arm out and expose it to further injury.
    “One of the conclusions of our research is that the octopus likely retains a long-term memory of the original injury, as it tends to use the bifurcated arms for less risky tasks compared to the others,” elaborates Jorge Hernández Urcera, a lead author of the study. “This idea of lasting memory brought to mind Dalí’s famous painting The Persistence of Memory, which ultimately became the title of the paper we published on monitoring this particular octopus.”
    While the octopus acted more protective of its extra limb, its nervous system had adapted to using the extra appendage, as the octopus was observed, after some time recovering from its injuries, using its ninth arm for probing its environment.
    “That nine-armed octopus is a perfect example of just how adaptable these animals are,” Pelled adds. “Most animals would struggle with an unusual body part, but not the octopus. In this case, the octopus had a bifurcatedarm and still used it effectively, just like any other arm. That tells us the nervous system didn’t treat it as a mistake—it figured out how to make it work.”
    Kenna Hughes-Castleberry is the science communicator at JILAand a freelance science journalist. Her main writing focuses are quantum physics, quantum technology, deep technology, social media, and the diversity of people in these fields, particularly women and people from minority ethnic and racial groups. Follow her on LinkedIn or visit her website.

    19 Comments
    #ninearmed #octopus #oddities #cephalopod #nervous
    The nine-armed octopus and the oddities of the cephalopod nervous system
    Extra-sensory perception The nine-armed octopus and the oddities of the cephalopod nervous system A mix of autonomous and top-down control manage the octopus's limbs. Kenna Hughes-Castleberry – Jun 7, 2025 8:00 am | 19 Credit: Nikos Stavrinidis / 500px Credit: Nikos Stavrinidis / 500px Story text Size Small Standard Large Width * Standard Wide Links Standard Orange * Subscribers only   Learn more With their quick-change camouflage and high level of intelligence, it’s not surprising that the public and scientific experts alike are fascinated by octopuses. Their abilities to recognize faces, solve puzzles, and learn behaviors from other octopuses make these animals a captivating study. To perform these processes and others, like crawling or exploring, octopuses rely on their complex nervous system, one that has become a focus for neuroscientists. With about 500 million neurons—around the same number as dogs—octopuses’ nervous systems are the most complex of any invertebrate. But, unlike vertebrate organisms, the octopus’s nervous system is also decentralized, with around 350 million neurons, or 66 percent of it, located in its eight arms. “This means each arm is capable of independently processing sensory input, initiating movement, and even executing complex behaviors—without direct instructions from the brain,” explains Galit Pelled, a professor of Mechanical Engineering, Radiology, and Neuroscience at Michigan State University who studies octopus neuroscience. “In essence, the arms have their own ‘mini-brains.’” A decentralized nervous system is one factor that helps octopuses adapt to changes, such as injury or predation, as seen in the case of an Octopus vulgaris, or common octopus, that was observed with nine arms by researchers at the ECOBAR lab at the Institute of Marine Research in Spain between 2021 and 2022. By studying outliers like this cephalopod, researchers can gain insight into how the animal’s detailed scaffolding of nerves changes and regrows over time, uncovering more about how octopuses have evolved over millennia in our oceans. Brains, brains, and more brains Because each arm of an octopus contains its own bundle of neurons, the limbs can operate semi-independently from the central brain, enabling faster responses since signals don’t always need to travel back and forth between the brain and the arms. In fact, Pelled and her team recently discovered that “neural signals recorded in the octopus arm can predict movement type within 100 milliseconds of stimulation, without central brain involvement.” She notes that “that level of localized autonomy is unprecedented in vertebrate systems.” Though each limb moves on its own, the movements of the octopus’s body are smooth and conducted with a coordinated elegance that allows the animal to exhibit some of the broadest range of behaviors, adapting on the fly to changes in its surroundings. “That means the octopus can react quickly to its environment, especially when exploring, hunting, or defending itself,” Pelled says. “For example, one arm can grab food while another is feeling around a rock, without needing permission from the brain. This setup also makes the octopus more resilient. If one arm is injured, the others still work just fine. And because so much decision-making happens at the arms, the central brain is freed up to focus on the bigger picture—like navigating or learning new tasks.” As if each limb weren’t already buzzing with neural activity, things get even more intricate when researchers zoom in further—to the nerves within each individual sucker, a ring of muscular tissue, which octopuses use to sense and taste their surroundings. “There is a sucker ganglion, or nerve center, located in the stalk of every sucker. For some species of octopuses, that’s over a thousand ganglia,” says Cassady Olson, a graduate student at the University of Chicago who works with Cliff Ragsdale, a leading expert in octopus neuroscience. Given that each sucker has its own nerve centers—connected by a long axial nerve cord running down the limb—and each arm has hundreds of suckers, things get complicated very quickly, as researchers have historically struggled to study this peripheral nervous system, as it’s called, within the octopus’s body. “The large size of the brain makes it both really exciting to study and really challenging,” says Z. Yan Wang, an assistant professor of biology and psychology at the University of Washington. “Many of the tools available for neuroscience have to be adjusted or customized specifically for octopuses and other cephalopods because of their unique body plans.” While each limb acts independently, signals are transmitted back to the octopus’s central nervous system. The octopus’ brain sits between its eyes at the front of its mantle, or head, couched between its two optic lobes, large bean-shaped neural organs that help octopuses see the world around them. These optic lobes are just two of the over 30 lobes experts study within the animal’s centralized brain, as each lobe helps the octopus process its environment. This elaborate neural architecture is critical given the octopus’s dual role in the ecosystem as both predator and prey. Without natural defenses like a hard shell, octopuses have evolved a highly adaptable nervous system that allows them to rapidly process information and adjust as needed, helping their chances of survival. Some similarities remain While the octopus’s decentralized nervous system makes it a unique evolutionary example, it does have some structures similar to or analogous to the human nervous system. “The octopus has a central brain mass located between its eyes, and an axial nerve cord running down each arm,” says Wang. “The octopus has many sensory systems that we are familiar with, such as vision, touch, chemosensation, and gravity sensing.” Neuroscientists have homed in on these similarities to understand how these structures may have evolved across the different branches in the tree of life. As the most recent common ancestor for humans and octopuses lived around 750 million years ago, experts believe that many similarities, from similar camera-like eyes to maps of neural activities, evolved separately in a process known as convergent evolution. While these similarities shed light on evolution's independent paths, they also offer valuable insights for fields like soft robotics and regenerative medicine. Occasionally, unique individuals—like an octopus with an unexpected number of limbs—can provide even deeper clues into how this remarkable nervous system functions and adapts. Nine arms, no problem In 2021, researchers from the Institute of Marine Research in Spain used an underwater camera to follow a male Octopus vulgaris, or common octopus. On its left side, three arms were intact, while the others were reduced to uneven, stumpy lengths, sharply bitten off at varying points. Although the researchers didn’t witness the injury itself, they observed that the front right arm—known as R1—was regenerating unusually, splitting into two separate limbs and giving the octopus a total of nine arms. “In this individual, we believe this condition was a result of abnormal regenerationafter an encounter with a predator,” explains Sam Soule, one of the researchers and the first author on the corresponding paper recently published in Animals. The researchers named the octopus Salvador due to its bifurcated arm coiling up on itself like the two upturned ends of Salvador Dali’s moustache. For two years, the team studied the cephalopod’s behavior and found that it used its bifurcated arm less when doing “riskier” movements such as exploring or grabbing food, which would force the animal to stretch its arm out and expose it to further injury. “One of the conclusions of our research is that the octopus likely retains a long-term memory of the original injury, as it tends to use the bifurcated arms for less risky tasks compared to the others,” elaborates Jorge Hernández Urcera, a lead author of the study. “This idea of lasting memory brought to mind Dalí’s famous painting The Persistence of Memory, which ultimately became the title of the paper we published on monitoring this particular octopus.” While the octopus acted more protective of its extra limb, its nervous system had adapted to using the extra appendage, as the octopus was observed, after some time recovering from its injuries, using its ninth arm for probing its environment. “That nine-armed octopus is a perfect example of just how adaptable these animals are,” Pelled adds. “Most animals would struggle with an unusual body part, but not the octopus. In this case, the octopus had a bifurcatedarm and still used it effectively, just like any other arm. That tells us the nervous system didn’t treat it as a mistake—it figured out how to make it work.” Kenna Hughes-Castleberry is the science communicator at JILAand a freelance science journalist. Her main writing focuses are quantum physics, quantum technology, deep technology, social media, and the diversity of people in these fields, particularly women and people from minority ethnic and racial groups. Follow her on LinkedIn or visit her website. 19 Comments #ninearmed #octopus #oddities #cephalopod #nervous
    ARSTECHNICA.COM
    The nine-armed octopus and the oddities of the cephalopod nervous system
    Extra-sensory perception The nine-armed octopus and the oddities of the cephalopod nervous system A mix of autonomous and top-down control manage the octopus's limbs. Kenna Hughes-Castleberry – Jun 7, 2025 8:00 am | 19 Credit: Nikos Stavrinidis / 500px Credit: Nikos Stavrinidis / 500px Story text Size Small Standard Large Width * Standard Wide Links Standard Orange * Subscribers only   Learn more With their quick-change camouflage and high level of intelligence, it’s not surprising that the public and scientific experts alike are fascinated by octopuses. Their abilities to recognize faces, solve puzzles, and learn behaviors from other octopuses make these animals a captivating study. To perform these processes and others, like crawling or exploring, octopuses rely on their complex nervous system, one that has become a focus for neuroscientists. With about 500 million neurons—around the same number as dogs—octopuses’ nervous systems are the most complex of any invertebrate. But, unlike vertebrate organisms, the octopus’s nervous system is also decentralized, with around 350 million neurons, or 66 percent of it, located in its eight arms. “This means each arm is capable of independently processing sensory input, initiating movement, and even executing complex behaviors—without direct instructions from the brain,” explains Galit Pelled, a professor of Mechanical Engineering, Radiology, and Neuroscience at Michigan State University who studies octopus neuroscience. “In essence, the arms have their own ‘mini-brains.’” A decentralized nervous system is one factor that helps octopuses adapt to changes, such as injury or predation, as seen in the case of an Octopus vulgaris, or common octopus, that was observed with nine arms by researchers at the ECOBAR lab at the Institute of Marine Research in Spain between 2021 and 2022. By studying outliers like this cephalopod, researchers can gain insight into how the animal’s detailed scaffolding of nerves changes and regrows over time, uncovering more about how octopuses have evolved over millennia in our oceans. Brains, brains, and more brains Because each arm of an octopus contains its own bundle of neurons, the limbs can operate semi-independently from the central brain, enabling faster responses since signals don’t always need to travel back and forth between the brain and the arms. In fact, Pelled and her team recently discovered that “neural signals recorded in the octopus arm can predict movement type within 100 milliseconds of stimulation, without central brain involvement.” She notes that “that level of localized autonomy is unprecedented in vertebrate systems.” Though each limb moves on its own, the movements of the octopus’s body are smooth and conducted with a coordinated elegance that allows the animal to exhibit some of the broadest range of behaviors, adapting on the fly to changes in its surroundings. “That means the octopus can react quickly to its environment, especially when exploring, hunting, or defending itself,” Pelled says. “For example, one arm can grab food while another is feeling around a rock, without needing permission from the brain. This setup also makes the octopus more resilient. If one arm is injured, the others still work just fine. And because so much decision-making happens at the arms, the central brain is freed up to focus on the bigger picture—like navigating or learning new tasks.” As if each limb weren’t already buzzing with neural activity, things get even more intricate when researchers zoom in further—to the nerves within each individual sucker, a ring of muscular tissue, which octopuses use to sense and taste their surroundings. “There is a sucker ganglion, or nerve center, located in the stalk of every sucker. For some species of octopuses, that’s over a thousand ganglia,” says Cassady Olson, a graduate student at the University of Chicago who works with Cliff Ragsdale, a leading expert in octopus neuroscience. Given that each sucker has its own nerve centers—connected by a long axial nerve cord running down the limb—and each arm has hundreds of suckers, things get complicated very quickly, as researchers have historically struggled to study this peripheral nervous system, as it’s called, within the octopus’s body. “The large size of the brain makes it both really exciting to study and really challenging,” says Z. Yan Wang, an assistant professor of biology and psychology at the University of Washington. “Many of the tools available for neuroscience have to be adjusted or customized specifically for octopuses and other cephalopods because of their unique body plans.” While each limb acts independently, signals are transmitted back to the octopus’s central nervous system. The octopus’ brain sits between its eyes at the front of its mantle, or head, couched between its two optic lobes, large bean-shaped neural organs that help octopuses see the world around them. These optic lobes are just two of the over 30 lobes experts study within the animal’s centralized brain, as each lobe helps the octopus process its environment. This elaborate neural architecture is critical given the octopus’s dual role in the ecosystem as both predator and prey. Without natural defenses like a hard shell, octopuses have evolved a highly adaptable nervous system that allows them to rapidly process information and adjust as needed, helping their chances of survival. Some similarities remain While the octopus’s decentralized nervous system makes it a unique evolutionary example, it does have some structures similar to or analogous to the human nervous system. “The octopus has a central brain mass located between its eyes, and an axial nerve cord running down each arm (similar to a spinal cord),” says Wang. “The octopus has many sensory systems that we are familiar with, such as vision, touch (somatosensation), chemosensation, and gravity sensing.” Neuroscientists have homed in on these similarities to understand how these structures may have evolved across the different branches in the tree of life. As the most recent common ancestor for humans and octopuses lived around 750 million years ago, experts believe that many similarities, from similar camera-like eyes to maps of neural activities, evolved separately in a process known as convergent evolution. While these similarities shed light on evolution's independent paths, they also offer valuable insights for fields like soft robotics and regenerative medicine. Occasionally, unique individuals—like an octopus with an unexpected number of limbs—can provide even deeper clues into how this remarkable nervous system functions and adapts. Nine arms, no problem In 2021, researchers from the Institute of Marine Research in Spain used an underwater camera to follow a male Octopus vulgaris, or common octopus. On its left side, three arms were intact, while the others were reduced to uneven, stumpy lengths, sharply bitten off at varying points. Although the researchers didn’t witness the injury itself, they observed that the front right arm—known as R1—was regenerating unusually, splitting into two separate limbs and giving the octopus a total of nine arms. “In this individual, we believe this condition was a result of abnormal regeneration [a genetic mutation] after an encounter with a predator,” explains Sam Soule, one of the researchers and the first author on the corresponding paper recently published in Animals. The researchers named the octopus Salvador due to its bifurcated arm coiling up on itself like the two upturned ends of Salvador Dali’s moustache. For two years, the team studied the cephalopod’s behavior and found that it used its bifurcated arm less when doing “riskier” movements such as exploring or grabbing food, which would force the animal to stretch its arm out and expose it to further injury. “One of the conclusions of our research is that the octopus likely retains a long-term memory of the original injury, as it tends to use the bifurcated arms for less risky tasks compared to the others,” elaborates Jorge Hernández Urcera, a lead author of the study. “This idea of lasting memory brought to mind Dalí’s famous painting The Persistence of Memory, which ultimately became the title of the paper we published on monitoring this particular octopus.” While the octopus acted more protective of its extra limb, its nervous system had adapted to using the extra appendage, as the octopus was observed, after some time recovering from its injuries, using its ninth arm for probing its environment. “That nine-armed octopus is a perfect example of just how adaptable these animals are,” Pelled adds. “Most animals would struggle with an unusual body part, but not the octopus. In this case, the octopus had a bifurcated (split) arm and still used it effectively, just like any other arm. That tells us the nervous system didn’t treat it as a mistake—it figured out how to make it work.” Kenna Hughes-Castleberry is the science communicator at JILA (a joint physics research institute between the National Institute of Standards and Technology and the University of Colorado Boulder) and a freelance science journalist. Her main writing focuses are quantum physics, quantum technology, deep technology, social media, and the diversity of people in these fields, particularly women and people from minority ethnic and racial groups. Follow her on LinkedIn or visit her website. 19 Comments
    Like
    Love
    Wow
    Sad
    Angry
    542
    0 Комментарии 0 Поделились
  • RoboCop: Rogue City – Unfinished Business preview: ‘We created something bigger than we expected’

    RoboCop: Rogue City – Unfinished Business preview: ‘We created something bigger than we expected’

    Adam Starkey

    Published June 3, 2025 9:00am

    Stay out of troubleGameCentral goes hands-on with the standalone expansion of RoboCop: Rogue City, which dials up the action and gory splatter of 2023’s surprise hit.
    For a franchise that has arguably done nothing of worth since the early 90s, the future of RoboCop is looking surprisingly bright. Following Amazon’s acquisition of MGM, a new TV show is currently in the works, with rumbles of a new film as well. Whether this leads to a major rejuvenation for everyone’s favourite cyborg law enforcer remains to be seen, but the original source of any RoboCop redemption arc has to start with 2023’s RoboCop: Rogue City. 
    Developed by Polish studio Teyon, RoboCop: Rogue City was the kind of unexpected surprise you rarely get from licensed games. It recaptured the original’s wit and 80s aesthetic, but also found a way to deliver the fantasy of playing as the half-human cyborg without streamlining any of the character’s personality.
    The bloody action was built around his hulking, slow movement, dry one-liners were in abundance, and missions weren’t always reduced to mowing down thugs in corridors – you also handed people parking tickets, settled trivial civilian disputes, and, in one wonderfully mundane side mission, did the rounds in the office for a get well card. 
    The game became publisher Nacon’s ‘best ever launch’ with 435,000 players within two weeks. Now, a year and a half later, developer Teyon is back with a standalone expansion. Marketing around Unfinished Business has purposefully dodged the term *DLC*, but as explained by the studio’s communications manager, Dawid Biegun, it started out as exactly that. 
    ‘When we released RoboCop: Rogue City, we were thinking about, this story has many thingsdo in the future,’ says Biegun. ‘We had many paths we could choose. So we basically started slowly developing some new storyline. The game was planned to be DLC but it grew out of control. It was a really rare situation where we created something bigger than we expected, so it became a standalone expansion from then.’
    Unlike Rogue City, this expansion, which we’re told spans around eight hours on average, is centred around one location in the OmniTower. Like most things in the RoboCop realm created by OCP, this promised idyllic housing complex quickly goes south when a band of mercenaries assume control. To restore order, and after a creepy opening where an attack on the Detroit police station leaves several officers frozen solid, RoboCop is assigned to the case. 

    RoboCop has new moves at his disposalUnfinished Business wastes little time in throwing you into the action, and quickly amps up the chaos. For anyone who has played Rogue City, all the original tenets of the combat are here, albeit with a slight increase in difficulty.
    You’ll be looking for explosive cans to blast, illuminated panels to ricochet bullets off walls, and all the while trying not to expose yourself to too much gunfire. The combat purposefully doesn’t have the slick speed of Call Of Duty, but it is still aggressively punchy, with headshots resulting in satisfyingly bloody splatters and RoboCop’s famed Auto-9 machine pistol still having the kickback of a pocket pneumatic drill. 
    From the get-go, Unfinished Business pushes back in a way Rogue City never did. New enemies equipped with riot shields are a real nuisance if you don’t utilise the ricochet panels, while the ability to slow down time is a much bigger crutch to chip down the enemy numbers from a distance. Health pick-ups felt in shorter supply too, even on the normal difficulty, to the point where we barely scraped through several encounters. 
    While it’s unclear if this applies to the whole game, Unfinished Business feels like a gnarlier experience, when compared to the original. RoboCop has some new context sensitive finishing moves, like throwing enemy heads into concrete walls or vending machines, which is a satisfying addition to the melee arsenal. There’s greater enemy variety too, between fierce minigun heavyweights and flying drones, along with some neat action set pieces.
    In one standout, we had to operate a walkway bridge to deactivate a giant turret at the end of a room, dashing between cover as it rains down bullets and destroys the surrounding environment. Anyone who has played action games before will recognise all the mechanics at play in this scenario, but it was still well executed and effective. Another had a whiff of Star Wars, as you rush around shooting electrical panels to stop a trash compactor from crushing you via the descending ceiling.
    The action shift in Unfinished Business is best defined by a later sequence we got to play, where you take control of the franchise’s signature mech, ED-209. If the power fantasy of playing as RoboCop is tested in this expansion, ED-209’s section was pure mental catharsis, where you blast away enemy hordes with miniguns and rockets, and clean up any stragglers with a rigid, robotic stomp. The rush of piloting ED-209, with its cacophony of explosions and bullets, felt like a throwback to vehicle sections in a long lost Xbox 360 game – but in a good way. 
    While there’s a definite lean towards combat, rather than gift card signing, when compared to Rogue City, it hasn’t entirely abandoned the detective side. According to the developers, if Rogue City had a 60/40 percent split between guns and detective work, Unfinished Business ‘would be like 70/30, or 80/20’ in comparison.

    More Trending

    We saw some of this , with one memorable encounter seeing you quizzed by a RoboCop superfan who is unconvinced you’re the actual RoboCop, leading to a series of questions based on the history of the franchise. There is optional side missions too, although the time we had with our preview limited our chance to fully delve into them.
    The sales and positive reviews for RoboCop: Rogue City emboldened Teyon’s vision and scope for Unfinished Business – and that confidence shines through in what we played. Some might be disappointed by the steer towards action, and we were heading into this preview, but by the end, this felt like a welcome extension with its own unique flavour. This is RoboCop: Rogue City with its pedal to the floor, confined and concentrated into a lean, tightly focused machine. 
    As for the studio’s next steps, the success of RoboCop has only reaffirmed Teyon’s strengths and identity as a team. Between its three studios across Poland and Japan, with over 140 employees in total, Teyon wants to maintain its grip within the AA space.
    ‘We feel strong here in such games,’ Biegun said. ‘We wouldn’t want to grow like 200, 300, 400 people, because we’re going to lose our soul this way. We want to stay as we are right now.’

    ED-209 needs be wary of stairsEmail gamecentral@metro.co.uk, leave a comment below, follow us on Twitter, and sign-up to our newsletter.
    To submit Inbox letters and Reader’s Features more easily, without the need to send an email, just use our Submit Stuff page here.
    For more stories like this, check our Gaming page.
    Arrow
    MORE: How to get a Nintendo Switch 2 this week in the UK

    GameCentral
    Sign up for exclusive analysis, latest releases, and bonus community content.
    This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply. Your information will be used in line with our Privacy Policy
    #robocop #rogue #city #unfinished #business
    RoboCop: Rogue City – Unfinished Business preview: ‘We created something bigger than we expected’
    RoboCop: Rogue City – Unfinished Business preview: ‘We created something bigger than we expected’ Adam Starkey Published June 3, 2025 9:00am Stay out of troubleGameCentral goes hands-on with the standalone expansion of RoboCop: Rogue City, which dials up the action and gory splatter of 2023’s surprise hit. For a franchise that has arguably done nothing of worth since the early 90s, the future of RoboCop is looking surprisingly bright. Following Amazon’s acquisition of MGM, a new TV show is currently in the works, with rumbles of a new film as well. Whether this leads to a major rejuvenation for everyone’s favourite cyborg law enforcer remains to be seen, but the original source of any RoboCop redemption arc has to start with 2023’s RoboCop: Rogue City.  Developed by Polish studio Teyon, RoboCop: Rogue City was the kind of unexpected surprise you rarely get from licensed games. It recaptured the original’s wit and 80s aesthetic, but also found a way to deliver the fantasy of playing as the half-human cyborg without streamlining any of the character’s personality. The bloody action was built around his hulking, slow movement, dry one-liners were in abundance, and missions weren’t always reduced to mowing down thugs in corridors – you also handed people parking tickets, settled trivial civilian disputes, and, in one wonderfully mundane side mission, did the rounds in the office for a get well card.  The game became publisher Nacon’s ‘best ever launch’ with 435,000 players within two weeks. Now, a year and a half later, developer Teyon is back with a standalone expansion. Marketing around Unfinished Business has purposefully dodged the term *DLC*, but as explained by the studio’s communications manager, Dawid Biegun, it started out as exactly that.  ‘When we released RoboCop: Rogue City, we were thinking about, this story has many thingsdo in the future,’ says Biegun. ‘We had many paths we could choose. So we basically started slowly developing some new storyline. The game was planned to be DLC but it grew out of control. It was a really rare situation where we created something bigger than we expected, so it became a standalone expansion from then.’ Unlike Rogue City, this expansion, which we’re told spans around eight hours on average, is centred around one location in the OmniTower. Like most things in the RoboCop realm created by OCP, this promised idyllic housing complex quickly goes south when a band of mercenaries assume control. To restore order, and after a creepy opening where an attack on the Detroit police station leaves several officers frozen solid, RoboCop is assigned to the case.  RoboCop has new moves at his disposalUnfinished Business wastes little time in throwing you into the action, and quickly amps up the chaos. For anyone who has played Rogue City, all the original tenets of the combat are here, albeit with a slight increase in difficulty. You’ll be looking for explosive cans to blast, illuminated panels to ricochet bullets off walls, and all the while trying not to expose yourself to too much gunfire. The combat purposefully doesn’t have the slick speed of Call Of Duty, but it is still aggressively punchy, with headshots resulting in satisfyingly bloody splatters and RoboCop’s famed Auto-9 machine pistol still having the kickback of a pocket pneumatic drill.  From the get-go, Unfinished Business pushes back in a way Rogue City never did. New enemies equipped with riot shields are a real nuisance if you don’t utilise the ricochet panels, while the ability to slow down time is a much bigger crutch to chip down the enemy numbers from a distance. Health pick-ups felt in shorter supply too, even on the normal difficulty, to the point where we barely scraped through several encounters.  While it’s unclear if this applies to the whole game, Unfinished Business feels like a gnarlier experience, when compared to the original. RoboCop has some new context sensitive finishing moves, like throwing enemy heads into concrete walls or vending machines, which is a satisfying addition to the melee arsenal. There’s greater enemy variety too, between fierce minigun heavyweights and flying drones, along with some neat action set pieces. In one standout, we had to operate a walkway bridge to deactivate a giant turret at the end of a room, dashing between cover as it rains down bullets and destroys the surrounding environment. Anyone who has played action games before will recognise all the mechanics at play in this scenario, but it was still well executed and effective. Another had a whiff of Star Wars, as you rush around shooting electrical panels to stop a trash compactor from crushing you via the descending ceiling. The action shift in Unfinished Business is best defined by a later sequence we got to play, where you take control of the franchise’s signature mech, ED-209. If the power fantasy of playing as RoboCop is tested in this expansion, ED-209’s section was pure mental catharsis, where you blast away enemy hordes with miniguns and rockets, and clean up any stragglers with a rigid, robotic stomp. The rush of piloting ED-209, with its cacophony of explosions and bullets, felt like a throwback to vehicle sections in a long lost Xbox 360 game – but in a good way.  While there’s a definite lean towards combat, rather than gift card signing, when compared to Rogue City, it hasn’t entirely abandoned the detective side. According to the developers, if Rogue City had a 60/40 percent split between guns and detective work, Unfinished Business ‘would be like 70/30, or 80/20’ in comparison. More Trending We saw some of this , with one memorable encounter seeing you quizzed by a RoboCop superfan who is unconvinced you’re the actual RoboCop, leading to a series of questions based on the history of the franchise. There is optional side missions too, although the time we had with our preview limited our chance to fully delve into them. The sales and positive reviews for RoboCop: Rogue City emboldened Teyon’s vision and scope for Unfinished Business – and that confidence shines through in what we played. Some might be disappointed by the steer towards action, and we were heading into this preview, but by the end, this felt like a welcome extension with its own unique flavour. This is RoboCop: Rogue City with its pedal to the floor, confined and concentrated into a lean, tightly focused machine.  As for the studio’s next steps, the success of RoboCop has only reaffirmed Teyon’s strengths and identity as a team. Between its three studios across Poland and Japan, with over 140 employees in total, Teyon wants to maintain its grip within the AA space. ‘We feel strong here in such games,’ Biegun said. ‘We wouldn’t want to grow like 200, 300, 400 people, because we’re going to lose our soul this way. We want to stay as we are right now.’ ED-209 needs be wary of stairsEmail gamecentral@metro.co.uk, leave a comment below, follow us on Twitter, and sign-up to our newsletter. To submit Inbox letters and Reader’s Features more easily, without the need to send an email, just use our Submit Stuff page here. For more stories like this, check our Gaming page. Arrow MORE: How to get a Nintendo Switch 2 this week in the UK GameCentral Sign up for exclusive analysis, latest releases, and bonus community content. This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply. Your information will be used in line with our Privacy Policy #robocop #rogue #city #unfinished #business
    METRO.CO.UK
    RoboCop: Rogue City – Unfinished Business preview: ‘We created something bigger than we expected’
    RoboCop: Rogue City – Unfinished Business preview: ‘We created something bigger than we expected’ Adam Starkey Published June 3, 2025 9:00am Stay out of trouble (Nacon) GameCentral goes hands-on with the standalone expansion of RoboCop: Rogue City, which dials up the action and gory splatter of 2023’s surprise hit. For a franchise that has arguably done nothing of worth since the early 90s, the future of RoboCop is looking surprisingly bright. Following Amazon’s acquisition of MGM, a new TV show is currently in the works, with rumbles of a new film as well. Whether this leads to a major rejuvenation for everyone’s favourite cyborg law enforcer remains to be seen, but the original source of any RoboCop redemption arc has to start with 2023’s RoboCop: Rogue City.  Developed by Polish studio Teyon, RoboCop: Rogue City was the kind of unexpected surprise you rarely get from licensed games. It recaptured the original’s wit and 80s aesthetic, but also found a way to deliver the fantasy of playing as the half-human cyborg without streamlining any of the character’s personality. The bloody action was built around his hulking, slow movement, dry one-liners were in abundance, and missions weren’t always reduced to mowing down thugs in corridors – you also handed people parking tickets, settled trivial civilian disputes, and, in one wonderfully mundane side mission, did the rounds in the office for a get well card.  The game became publisher Nacon’s ‘best ever launch’ with 435,000 players within two weeks. Now, a year and a half later, developer Teyon is back with a standalone expansion. Marketing around Unfinished Business has purposefully dodged the term *DLC*, but as explained by the studio’s communications manager, Dawid Biegun, it started out as exactly that.  ‘When we released RoboCop: Rogue City, we were thinking about, this story has many things [we can] do in the future,’ says Biegun. ‘We had many paths we could choose. So we basically started slowly developing some new storyline. The game was planned to be DLC but it grew out of control. It was a really rare situation where we created something bigger than we expected, so it became a standalone expansion from then.’ Unlike Rogue City, this expansion, which we’re told spans around eight hours on average, is centred around one location in the OmniTower. Like most things in the RoboCop realm created by OCP, this promised idyllic housing complex quickly goes south when a band of mercenaries assume control. To restore order, and after a creepy opening where an attack on the Detroit police station leaves several officers frozen solid, RoboCop is assigned to the case.  RoboCop has new moves at his disposal (Nacon) Unfinished Business wastes little time in throwing you into the action, and quickly amps up the chaos. For anyone who has played Rogue City, all the original tenets of the combat are here, albeit with a slight increase in difficulty. You’ll be looking for explosive cans to blast, illuminated panels to ricochet bullets off walls, and all the while trying not to expose yourself to too much gunfire. The combat purposefully doesn’t have the slick speed of Call Of Duty, but it is still aggressively punchy, with headshots resulting in satisfyingly bloody splatters and RoboCop’s famed Auto-9 machine pistol still having the kickback of a pocket pneumatic drill.  From the get-go, Unfinished Business pushes back in a way Rogue City never did. New enemies equipped with riot shields are a real nuisance if you don’t utilise the ricochet panels, while the ability to slow down time is a much bigger crutch to chip down the enemy numbers from a distance. Health pick-ups felt in shorter supply too, even on the normal difficulty, to the point where we barely scraped through several encounters.  While it’s unclear if this applies to the whole game, Unfinished Business feels like a gnarlier experience, when compared to the original. RoboCop has some new context sensitive finishing moves, like throwing enemy heads into concrete walls or vending machines, which is a satisfying addition to the melee arsenal. There’s greater enemy variety too, between fierce minigun heavyweights and flying drones, along with some neat action set pieces. In one standout, we had to operate a walkway bridge to deactivate a giant turret at the end of a room, dashing between cover as it rains down bullets and destroys the surrounding environment. Anyone who has played action games before will recognise all the mechanics at play in this scenario, but it was still well executed and effective. Another had a whiff of Star Wars, as you rush around shooting electrical panels to stop a trash compactor from crushing you via the descending ceiling. The action shift in Unfinished Business is best defined by a later sequence we got to play, where you take control of the franchise’s signature mech, ED-209. If the power fantasy of playing as RoboCop is tested in this expansion, ED-209’s section was pure mental catharsis, where you blast away enemy hordes with miniguns and rockets, and clean up any stragglers with a rigid, robotic stomp. The rush of piloting ED-209, with its cacophony of explosions and bullets, felt like a throwback to vehicle sections in a long lost Xbox 360 game – but in a good way.  While there’s a definite lean towards combat, rather than gift card signing, when compared to Rogue City, it hasn’t entirely abandoned the detective side. According to the developers, if Rogue City had a 60/40 percent split between guns and detective work, Unfinished Business ‘would be like 70/30, or 80/20’ in comparison. More Trending We saw some of this , with one memorable encounter seeing you quizzed by a RoboCop superfan who is unconvinced you’re the actual RoboCop, leading to a series of questions based on the history of the franchise. There is optional side missions too, although the time we had with our preview limited our chance to fully delve into them. The sales and positive reviews for RoboCop: Rogue City emboldened Teyon’s vision and scope for Unfinished Business – and that confidence shines through in what we played. Some might be disappointed by the steer towards action, and we were heading into this preview, but by the end, this felt like a welcome extension with its own unique flavour. This is RoboCop: Rogue City with its pedal to the floor, confined and concentrated into a lean, tightly focused machine.  As for the studio’s next steps, the success of RoboCop has only reaffirmed Teyon’s strengths and identity as a team. Between its three studios across Poland and Japan, with over 140 employees in total, Teyon wants to maintain its grip within the AA space. ‘We feel strong here in such games,’ Biegun said. ‘We wouldn’t want to grow like 200, 300, 400 people, because we’re going to lose our soul this way. We want to stay as we are right now.’ ED-209 needs be wary of stairs (Nacon) Email gamecentral@metro.co.uk, leave a comment below, follow us on Twitter, and sign-up to our newsletter. To submit Inbox letters and Reader’s Features more easily, without the need to send an email, just use our Submit Stuff page here. For more stories like this, check our Gaming page. Arrow MORE: How to get a Nintendo Switch 2 this week in the UK GameCentral Sign up for exclusive analysis, latest releases, and bonus community content. This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply. Your information will be used in line with our Privacy Policy
    0 Комментарии 0 Поделились
  • Harvard GSD Dean condemns Trump’s ‘illegal action against our school’ after move targeting international students

    Harvard Graduate School of Design Dean Sarah Whiting has condemned the Trump Administration’s effort to bar international students from attending Harvard University. The move, which has been temporarily halted by a federal judge, sought to prevent Harvard from enrolling students on F- or J-visas, which would effectively force international students to switch to another institution, leave the United States, or face deportation.
    Approximately 25% of students at Harvard University are international. According to previous reporting by college database Peterson’s, 31% of students at the Harvard GSD are international.
    Harvard President Alan Garber called the Trump Administration’s move “unlawful and unwarranted,” warning that it "imperils the futures of thousands of students and scholars across Harvard and serves as a warning to countless others at colleges and universities throughout the country who have come to America to pursue their education and fulfill their dreams.”
    https://...
    #harvard #gsd #dean #condemns #trumps
    Harvard GSD Dean condemns Trump’s ‘illegal action against our school’ after move targeting international students
    Harvard Graduate School of Design Dean Sarah Whiting has condemned the Trump Administration’s effort to bar international students from attending Harvard University. The move, which has been temporarily halted by a federal judge, sought to prevent Harvard from enrolling students on F- or J-visas, which would effectively force international students to switch to another institution, leave the United States, or face deportation. Approximately 25% of students at Harvard University are international. According to previous reporting by college database Peterson’s, 31% of students at the Harvard GSD are international. Harvard President Alan Garber called the Trump Administration’s move “unlawful and unwarranted,” warning that it "imperils the futures of thousands of students and scholars across Harvard and serves as a warning to countless others at colleges and universities throughout the country who have come to America to pursue their education and fulfill their dreams.” https://... #harvard #gsd #dean #condemns #trumps
    ARCHINECT.COM
    Harvard GSD Dean condemns Trump’s ‘illegal action against our school’ after move targeting international students
    Harvard Graduate School of Design Dean Sarah Whiting has condemned the Trump Administration’s effort to bar international students from attending Harvard University. The move, which has been temporarily halted by a federal judge, sought to prevent Harvard from enrolling students on F- or J-visas, which would effectively force international students to switch to another institution, leave the United States, or face deportation. Approximately 25% of students at Harvard University are international. According to previous reporting by college database Peterson’s, 31% of students at the Harvard GSD are international. Harvard President Alan Garber called the Trump Administration’s move “unlawful and unwarranted,” warning that it "imperils the futures of thousands of students and scholars across Harvard and serves as a warning to countless others at colleges and universities throughout the country who have come to America to pursue their education and fulfill their dreams.” https://...
    0 Комментарии 0 Поделились
  • Harvard’s Graduate School of Design dean responds to Trump attacks

    Harvard University’s Graduate School of Designdean joined Alan Garber, the university’s president, in condemning the federal government earlier this week after it moved to block the university from being able to admit international students. GSD has a higher proportion of international students compared to the rest of the University’s student body, and Dean Sarah M. Whiting said international students are an integral part of the school.

    “I join President Garber in condemning the government’s illegal action against our school, and in affirming the immense value our international students bring to the GSD community,” Dean Sarah M. Whiting said in a note shared online Saturday.

    Whiting, who’s also a Josep Lluis Sert professor of architecture, said GSD is “one of the most international schools at Harvard” and that the school’s international makeup “goes back to the founding of the GSD.”

    Nearly a third of Harvard GSD students are international, which is higher than the 14% of international students who make up of the general student body at large, according to Peterson’s, an educational services company. Six of the school’s eight class of 2025 commencement marshals who represent their disciples at graduation are from outside the U.S.

    Whiting added that its international student body “is part of our DNA—our student body, our faculty, our staff, and the discipline and practice of design all thrive on this internationalism. The extraordinary breadth of experience and perspectives that the international members of our community provide is essential to who we are.”

    The school offers programs through its departments of architecture, landscape architecture, urban planning and design, design studies, and design engineering. A spokesperson from the school declined to comment for this piece.

    A federal judge blocked the Trump administration from rescinding Harvard’s ability to admit international students on Friday after the Department of Homeland Security revoked its Student and Exchange Visitor Programcertification for admitting foreign students. Now, Trump is attempting to go after the university in other ways, including calls to redirect grants from the university to trade schools and no longer scheduling student visa appointments.

    Trump said Wednesday Harvard should have a cap of about 15% on international students and accused the university of being antisemitic and a “disaster.” Garber, the university president, told NPR Wednesday that Harvard should “stand firm” to its “commitment to the good of the nation” in the face of Trump’s retaliation over the private university’s policies around admissions, DEI programs, hiring, and international students.
    #harvards #graduate #school #design #dean
    Harvard’s Graduate School of Design dean responds to Trump attacks
    Harvard University’s Graduate School of Designdean joined Alan Garber, the university’s president, in condemning the federal government earlier this week after it moved to block the university from being able to admit international students. GSD has a higher proportion of international students compared to the rest of the University’s student body, and Dean Sarah M. Whiting said international students are an integral part of the school. “I join President Garber in condemning the government’s illegal action against our school, and in affirming the immense value our international students bring to the GSD community,” Dean Sarah M. Whiting said in a note shared online Saturday. Whiting, who’s also a Josep Lluis Sert professor of architecture, said GSD is “one of the most international schools at Harvard” and that the school’s international makeup “goes back to the founding of the GSD.” Nearly a third of Harvard GSD students are international, which is higher than the 14% of international students who make up of the general student body at large, according to Peterson’s, an educational services company. Six of the school’s eight class of 2025 commencement marshals who represent their disciples at graduation are from outside the U.S. Whiting added that its international student body “is part of our DNA—our student body, our faculty, our staff, and the discipline and practice of design all thrive on this internationalism. The extraordinary breadth of experience and perspectives that the international members of our community provide is essential to who we are.” The school offers programs through its departments of architecture, landscape architecture, urban planning and design, design studies, and design engineering. A spokesperson from the school declined to comment for this piece. A federal judge blocked the Trump administration from rescinding Harvard’s ability to admit international students on Friday after the Department of Homeland Security revoked its Student and Exchange Visitor Programcertification for admitting foreign students. Now, Trump is attempting to go after the university in other ways, including calls to redirect grants from the university to trade schools and no longer scheduling student visa appointments. Trump said Wednesday Harvard should have a cap of about 15% on international students and accused the university of being antisemitic and a “disaster.” Garber, the university president, told NPR Wednesday that Harvard should “stand firm” to its “commitment to the good of the nation” in the face of Trump’s retaliation over the private university’s policies around admissions, DEI programs, hiring, and international students. #harvards #graduate #school #design #dean
    WWW.FASTCOMPANY.COM
    Harvard’s Graduate School of Design dean responds to Trump attacks
    Harvard University’s Graduate School of Design (GSD) dean joined Alan Garber, the university’s president, in condemning the federal government earlier this week after it moved to block the university from being able to admit international students. GSD has a higher proportion of international students compared to the rest of the University’s student body, and Dean Sarah M. Whiting said international students are an integral part of the school. “I join President Garber in condemning the government’s illegal action against our school, and in affirming the immense value our international students bring to the GSD community,” Dean Sarah M. Whiting said in a note shared online Saturday. Whiting, who’s also a Josep Lluis Sert professor of architecture, said GSD is “one of the most international schools at Harvard” and that the school’s international makeup “goes back to the founding of the GSD.” Nearly a third of Harvard GSD students are international, which is higher than the 14% of international students who make up of the general student body at large, according to Peterson’s, an educational services company. Six of the school’s eight class of 2025 commencement marshals who represent their disciples at graduation are from outside the U.S. Whiting added that its international student body “is part of our DNA—our student body, our faculty, our staff, and the discipline and practice of design all thrive on this internationalism. The extraordinary breadth of experience and perspectives that the international members of our community provide is essential to who we are.” The school offers programs through its departments of architecture, landscape architecture, urban planning and design, design studies, and design engineering. A spokesperson from the school declined to comment for this piece. A federal judge blocked the Trump administration from rescinding Harvard’s ability to admit international students on Friday after the Department of Homeland Security revoked its Student and Exchange Visitor Program (SEVP) certification for admitting foreign students. Now, Trump is attempting to go after the university in other ways, including calls to redirect grants from the university to trade schools and no longer scheduling student visa appointments. Trump said Wednesday Harvard should have a cap of about 15% on international students and accused the university of being antisemitic and a “disaster.” Garber, the university president, told NPR Wednesday that Harvard should “stand firm” to its “commitment to the good of the nation” in the face of Trump’s retaliation over the private university’s policies around admissions, DEI programs, hiring, and international students.
    10 Комментарии 0 Поделились
  • I replaced my Ray-Ban Meta with these Amazon smart glasses - and didn't mind it

    ZDNET's key takeaways The Amazon Echo Framesare a natural way for glasses wearers to control their smart home, and they're available now for The latest model features a lighter build, longer battery life, improved speakers, and new controls that will take some getting used to.While Alexa in your ears is no ChatGPT voice assistant, it's capable enough to answer general questions and complete most smart home tasks. View now The headline for this article could've gone many ways -- I wore Amazon's Echo Frames at an airport, and the TSA didn't stop me or These smart glasses let me take calls hands-free -- but I settled with the comparison angle because one of the easiest ways to talk about smart glasses is by comparing them to the standard. With these being the company's third generation of Echo Frames, Amazon's made mostly iterative updates -- the build is lighter, the battery lasts longer, and there's supposedly more bass -- while staying true to the glasses' original purpose: Giving you a directcommunication path with Amazon's popular voice assistant, Alexa. And right now, Amazon is discounting the Echo Frames by reducing the price of these glasses to  Naturally, you can do other things with the glasses, too, as I'll detail in my two-week account of wearing the Echo Frames below.
    details
    View at QVC In the hierarchy of smart glasses, you can think of the Echo Frames as the entry-level pair, ideal for users who want something discrete but with just enough technology to scratch that consumer itch. I've worn a few too many pairs of smart glasses over the past year, and these from Amazon may be the most normal-looking of them all. That's a good thing, as I learned during my flight to CES in early January.Also: Google's upcoming AI smart glasses may finally convince me to switch to a pair full-timeWanting to test both the Echo Frames and the Meta Ray-Ban during my trip, I went through the usual security screenings and found myself stopped twice because my camera-equipped Meta glasses looked suspicious. No one questioned the Echo Frames, which, even from up close, look like a regular pair of plastic-made prescriptions.The Meta Ray-Banhas a built-in camera and is noticeably thicker and heavier than the Amazon Echo Frames. Kerry Wan/ZDNETTrue to Amazon's word, the Echo Frames feel very light on the face. Most of the weight is distributed to the sides of the frames, where the speakers, buttons, and other minuscule components are stored. The rubberized tips on the ends of the glasses certainly help with the fit, though I've found it harder to fold the glasses after adjusting them. While the glasses are easily stored in the included carrying case, if they're not folded properly, issues arise when you need to charge them. Because, unlike the Meta Ray-Ban's USB-C carrying case, there's a new separate charging dock for the Echo Frames, and aligning the wireless charging coils with the ones on the glasses can be quite the doozy. You either have to force the glasses into the gap -- which feels like something you wouldn't want to do with glasses -- or collapse and slot them in just right. Nine times out of 10, I'm doing option one.In terms of functionality, the Echo Frames don't have multimodal AI cameras built into them like the Meta Ray-Bans or project visual overlays like XR glasses. Instead, they can stream Bluetooth audio, take calls and send text messages, read notifications, and communicate with Alexa-supported smart home devices like how your phone or smart hub normally would. Again, entry-level glasses -- and that's not a bad thing.Also: Get a free pair of Meta Ray-Bans when you sign up for Verizon 5G home internetWhile my house is not as smart as my ZDNET colleague Maria Diaz's, I enjoyed using the Echo Frames to turn on and off various smart switches, which saved me from having to walk over to my phone and use an app when it's charging in the kitchen or on my nightstand. The scale of Alexa-compatible devices is large enough that I could make commands to secure my three-year-old August entry lock, too. The same "Alexa" wake word is used for commands. Kerry Wan/ZDNETBesides the smart features, I've also enjoyed listening to podcasts and making calls during my evening walks. Perhaps it's the ability to listen to my on-device audio while staying aware of my surroundings, or the fact that the speakers on the Echo Frames favor the mid and high frequencies more than the bassy, engulfing lows. It's probably a bit of both. The takeaway is that the glasses are great for vocal-only audio tracks and passable for anything multi-layered.Also: I tried Google's XR glasses and they already beat my Meta Ray-Bans in 3 waysLastly, I wish the button navigations weren't so complicated, but since I'm mainly using voice commands to get things done, the need to press the front or back button to accept and decline thingsdidn't bother me all that much. If you're coming from an older pair of Echo Frames, you'll have to retrain your muscle memory as the touch strip and swipe gestures are no more.ZDNET's buying adviceAt a list price of the Echo Framesaren't necessarily priced to compete. The list price is just less than Meta's more capable Ray-Ban smart glasses. However, Amazon's glasses have two big things going for them: Alexa integration and design. Smart home enthusiasts will absolutely reap the benefits of having a controller that they can use at all times, and first-time smart glasses shoppers will find these much less intimidating than the ones with mini projectors and cameras built in. Plus, you'll have a smaller chance of being stopped by the TSA. This article was originally published on January 26, 2024, and was updated on May 22, 2025.Featured reviews
    #replaced #rayban #meta #with #these
    I replaced my Ray-Ban Meta with these Amazon smart glasses - and didn't mind it
    ZDNET's key takeaways The Amazon Echo Framesare a natural way for glasses wearers to control their smart home, and they're available now for The latest model features a lighter build, longer battery life, improved speakers, and new controls that will take some getting used to.While Alexa in your ears is no ChatGPT voice assistant, it's capable enough to answer general questions and complete most smart home tasks. View now The headline for this article could've gone many ways -- I wore Amazon's Echo Frames at an airport, and the TSA didn't stop me or These smart glasses let me take calls hands-free -- but I settled with the comparison angle because one of the easiest ways to talk about smart glasses is by comparing them to the standard. With these being the company's third generation of Echo Frames, Amazon's made mostly iterative updates -- the build is lighter, the battery lasts longer, and there's supposedly more bass -- while staying true to the glasses' original purpose: Giving you a directcommunication path with Amazon's popular voice assistant, Alexa. And right now, Amazon is discounting the Echo Frames by reducing the price of these glasses to  Naturally, you can do other things with the glasses, too, as I'll detail in my two-week account of wearing the Echo Frames below. details View at QVC In the hierarchy of smart glasses, you can think of the Echo Frames as the entry-level pair, ideal for users who want something discrete but with just enough technology to scratch that consumer itch. I've worn a few too many pairs of smart glasses over the past year, and these from Amazon may be the most normal-looking of them all. That's a good thing, as I learned during my flight to CES in early January.Also: Google's upcoming AI smart glasses may finally convince me to switch to a pair full-timeWanting to test both the Echo Frames and the Meta Ray-Ban during my trip, I went through the usual security screenings and found myself stopped twice because my camera-equipped Meta glasses looked suspicious. No one questioned the Echo Frames, which, even from up close, look like a regular pair of plastic-made prescriptions.The Meta Ray-Banhas a built-in camera and is noticeably thicker and heavier than the Amazon Echo Frames. Kerry Wan/ZDNETTrue to Amazon's word, the Echo Frames feel very light on the face. Most of the weight is distributed to the sides of the frames, where the speakers, buttons, and other minuscule components are stored. The rubberized tips on the ends of the glasses certainly help with the fit, though I've found it harder to fold the glasses after adjusting them. While the glasses are easily stored in the included carrying case, if they're not folded properly, issues arise when you need to charge them. Because, unlike the Meta Ray-Ban's USB-C carrying case, there's a new separate charging dock for the Echo Frames, and aligning the wireless charging coils with the ones on the glasses can be quite the doozy. You either have to force the glasses into the gap -- which feels like something you wouldn't want to do with glasses -- or collapse and slot them in just right. Nine times out of 10, I'm doing option one.In terms of functionality, the Echo Frames don't have multimodal AI cameras built into them like the Meta Ray-Bans or project visual overlays like XR glasses. Instead, they can stream Bluetooth audio, take calls and send text messages, read notifications, and communicate with Alexa-supported smart home devices like how your phone or smart hub normally would. Again, entry-level glasses -- and that's not a bad thing.Also: Get a free pair of Meta Ray-Bans when you sign up for Verizon 5G home internetWhile my house is not as smart as my ZDNET colleague Maria Diaz's, I enjoyed using the Echo Frames to turn on and off various smart switches, which saved me from having to walk over to my phone and use an app when it's charging in the kitchen or on my nightstand. The scale of Alexa-compatible devices is large enough that I could make commands to secure my three-year-old August entry lock, too. The same "Alexa" wake word is used for commands. Kerry Wan/ZDNETBesides the smart features, I've also enjoyed listening to podcasts and making calls during my evening walks. Perhaps it's the ability to listen to my on-device audio while staying aware of my surroundings, or the fact that the speakers on the Echo Frames favor the mid and high frequencies more than the bassy, engulfing lows. It's probably a bit of both. The takeaway is that the glasses are great for vocal-only audio tracks and passable for anything multi-layered.Also: I tried Google's XR glasses and they already beat my Meta Ray-Bans in 3 waysLastly, I wish the button navigations weren't so complicated, but since I'm mainly using voice commands to get things done, the need to press the front or back button to accept and decline thingsdidn't bother me all that much. If you're coming from an older pair of Echo Frames, you'll have to retrain your muscle memory as the touch strip and swipe gestures are no more.ZDNET's buying adviceAt a list price of the Echo Framesaren't necessarily priced to compete. The list price is just less than Meta's more capable Ray-Ban smart glasses. However, Amazon's glasses have two big things going for them: Alexa integration and design. Smart home enthusiasts will absolutely reap the benefits of having a controller that they can use at all times, and first-time smart glasses shoppers will find these much less intimidating than the ones with mini projectors and cameras built in. Plus, you'll have a smaller chance of being stopped by the TSA. This article was originally published on January 26, 2024, and was updated on May 22, 2025.Featured reviews #replaced #rayban #meta #with #these
    WWW.ZDNET.COM
    I replaced my Ray-Ban Meta with these Amazon smart glasses - and didn't mind it
    ZDNET's key takeaways The Amazon Echo Frames (3rd Gen) are a natural way for glasses wearers to control their smart home, and they're available now for $269.The latest model features a lighter build, longer battery life, improved speakers, and new controls that will take some getting used to.While Alexa in your ears is no ChatGPT voice assistant, it's capable enough to answer general questions and complete most smart home tasks. View now at Amazon The headline for this article could've gone many ways -- I wore Amazon's Echo Frames at an airport, and the TSA didn't stop me or These smart glasses let me take calls hands-free -- but I settled with the comparison angle because one of the easiest ways to talk about smart glasses is by comparing them to the standard. With these being the company's third generation of Echo Frames, Amazon's made mostly iterative updates -- the build is lighter, the battery lasts longer, and there's supposedly more bass -- while staying true to the glasses' original purpose: Giving you a direct (and natural) communication path with Amazon's popular voice assistant, Alexa. And right now, Amazon is discounting the Echo Frames by $90, reducing the price of these glasses to $180. Naturally, you can do other things with the glasses, too, as I'll detail in my two-week account of wearing the Echo Frames below. details View at QVC In the hierarchy of smart glasses, you can think of the Echo Frames as the entry-level pair, ideal for users who want something discrete but with just enough technology to scratch that consumer itch. I've worn a few too many pairs of smart glasses over the past year, and these from Amazon may be the most normal-looking of them all. That's a good thing, as I learned during my flight to CES in early January.Also: Google's upcoming AI smart glasses may finally convince me to switch to a pair full-timeWanting to test both the Echo Frames and the Meta Ray-Ban during my trip, I went through the usual security screenings and found myself stopped twice because my camera-equipped Meta glasses looked suspicious. No one questioned the Echo Frames, which, even from up close, look like a regular pair of plastic-made prescriptions. (Or maybe no one expected me to have two pairs of smart glasses. I'm not sure.) The Meta Ray-Ban (left) has a built-in camera and is noticeably thicker and heavier than the Amazon Echo Frames (right). Kerry Wan/ZDNETTrue to Amazon's word, the Echo Frames feel very light on the face. Most of the weight is distributed to the sides of the frames, where the speakers, buttons, and other minuscule components are stored. The rubberized tips on the ends of the glasses certainly help with the fit, though I've found it harder to fold the glasses after adjusting them. While the glasses are easily stored in the included carrying case, if they're not folded properly, issues arise when you need to charge them. Because, unlike the Meta Ray-Ban's USB-C carrying case, there's a new separate charging dock for the Echo Frames, and aligning the wireless charging coils with the ones on the glasses can be quite the doozy. You either have to force the glasses into the gap -- which feels like something you wouldn't want to do with glasses -- or collapse and slot them in just right. Nine times out of 10, I'm doing option one.In terms of functionality, the Echo Frames don't have multimodal AI cameras built into them like the Meta Ray-Bans or project visual overlays like XR glasses. Instead, they can stream Bluetooth audio, take calls and send text messages, read notifications, and communicate with Alexa-supported smart home devices like how your phone or smart hub normally would. Again, entry-level glasses -- and that's not a bad thing.Also: Get a free pair of Meta Ray-Bans when you sign up for Verizon 5G home internetWhile my house is not as smart as my ZDNET colleague Maria Diaz's, I enjoyed using the Echo Frames to turn on and off various smart switches, which saved me from having to walk over to my phone and use an app when it's charging in the kitchen or on my nightstand. The scale of Alexa-compatible devices is large enough that I could make commands to secure my three-year-old August entry lock, too. The same "Alexa" wake word is used for commands. Kerry Wan/ZDNETBesides the smart features, I've also enjoyed listening to podcasts and making calls during my evening walks. Perhaps it's the ability to listen to my on-device audio while staying aware of my surroundings, or the fact that the speakers on the Echo Frames favor the mid and high frequencies more than the bassy, engulfing lows. It's probably a bit of both. The takeaway is that the glasses are great for vocal-only audio tracks and passable for anything multi-layered.Also: I tried Google's XR glasses and they already beat my Meta Ray-Bans in 3 waysLastly, I wish the button navigations weren't so complicated, but since I'm mainly using voice commands to get things done, the need to press the front or back button to accept and decline things (or mute the microphone) didn't bother me all that much. If you're coming from an older pair of Echo Frames, you'll have to retrain your muscle memory as the touch strip and swipe gestures are no more.ZDNET's buying adviceAt a list price of $269, the Echo Frames (3rd Gen) aren't necessarily priced to compete. The list price is just $30 less than Meta's more capable Ray-Ban smart glasses. However, Amazon's glasses have two big things going for them: Alexa integration and design. Smart home enthusiasts will absolutely reap the benefits of having a controller that they can use at all times (with a battery life that can last them all day), and first-time smart glasses shoppers will find these much less intimidating than the ones with mini projectors and cameras built in. Plus, you'll have a smaller chance of being stopped by the TSA. This article was originally published on January 26, 2024, and was updated on May 22, 2025.Featured reviews
    0 Комментарии 0 Поделились
  • Mobile shopping insights: Brand marketers' cheat sheet for back-to-school 2025

    As the second largest retail event in the U.S. after the holiday season, back-to-school shopping represents a crucial opportunity for brand advertising. And this year, the path to reaching parents clearly leads to one place: their mobile devices.Between March and April 2025, Unity surveyed 1,234 parents in the U.S. with children under 18 through Qualtrics to uncover how they're using mobile apps and games during this critical shopping season*. Our research uncovers specific insights into their shopping behaviors, ad engagement patterns, and preferred retail channels that can help marketers create more effective mobile strategies. Let's take a closer look at the key data and takeaways from our survey.Mobile meets back-to-schoolParents are embracing mobile as a primary path to purchase, with the majority using apps to research and buy back-to-school items.68% of parents use mobile apps for back-to-school shopping48% download new apps specifically for the back-to-school shopping seasonDads are more app-curious with 55% downloading new apps vs. 44% of moms46% complete purchases directly through mobile appsNot only are parents using apps for shopping, generally, they are logging serious screen time:22% spend 1–2 hours/day33% spend 3–4 hours/day on their phones35% spend 5+ hours on their phones58% of parents say they’re likely or very likely to engage with rewarded ads offering back-to-school savingsDadsare slightly more responsive than momsOnly 11.9% of parents are unlikely or very unlikely to engageMost parents are deal-driven, with coupons and limited-time offers leading their purchase decisions:Coupons/deals: 32% overallLimited-time offers: 14% of parents overall, with dads more responsiveCost and variety matter while proximity, bundles/packages and customer service ranked lowestRecommendation: Prioritize in-app advertising with deal-focused creatives, combined with rewarded ad formats that highlight limited-time urgency.School’s insessionWhen looking at timelines – our survey data indicates that parents are early planners, with the majority of shopping activity kicking off in June, with dads being more likely to get an early jump on back-to-school shopping.Nearly 1 in 5 parentsare early planners, starting their shopping before June.Dads are more likely to start early — 29% shop before June vs. 16% of moms.Nearly half of parentskick off shopping in June or July, with July alone driving the biggest surge—the peak of back-to-school season.24.8% wait until August, likely driven by last-minute needs or school start dates.Recommendation: Consider launching your awareness campaigns in mid-late Q2 to engage early planners while they’re still in research mode.Spend-ready parentsParents that we surveyed indicated they are ready to spend when it comes to back-to-school shopping, with moms being the primary purchasers. Advertising also plays a large role, with the majority of parents citing it as influential in the purchase-making process.42% of parents plan to spend over on back-to-school clothing alone.Another 20% plan to spend between –showing that back-to-school is a high-intent, high-investment moment for many families.63% say advertising somewhat or significantly influences their back-to-school purchase decisions.Moms drive the majority of back to school purchases, with 86% identifying as the primary household shopper.Recommendation: Target mobile ad placements that reach moms - who likely drive the majority of purchase decisions - especially through mobile gaming where women outpace men . With 63% of parents somewhat or significantly influenced by advertising and most planning substantial budgets, mobile campaigns during this high-intent period can help you reach your target audience.What’s in their cartParents that we surveyed indicated they have distinct preferences when it comes to both what they're buying and where they're shopping for back-to-school items, with notable differences in shopping behavior between moms and dads.Classroom supplies, clothing, arts and crafts suppliesand electronicstop the shopping listParents surveyed shop, or would consider shopping, at familiar favorites for back-to-school supplies:WalmartAmazonTargetStaplesRetailers vary by parent: While both moms and dads shop at mass retailers, dads are more likely to favor tech and office supply stores than moms.Dads were 2x more likely to shop at Staplesvs. momsDads were 2.4x more likely to shop at Office Depotvs. momsDads were 3.3x more likely to shop at Best Buyvs. momsMoms were 1.6x more likely to shop at Walmartvs. dadsRecommendation: Align your messaging with top retail destinations and tailor creative and app lists by parent type.Turn these back-to-school insights into conversions: Launch awareness campaigns by mid-Q2 to capture early planners, meet parents where they spend significant time—in mobile apps and games—and craft messaging that emphasizes urgency and deals. By implementing these data-driven strategies, your brand can earn an A+ this back-to-school season while increasing your advertising ROI potential.Learn more about Unity’s Programmatic solutions.*Disclaimer: Findings are based on survey responses from groups of differing sizes. While each group was large enough to identify directional patterns, differences in sample size may affect comparability.Qualtrics. "Survey Data Collected Using Qualtrics Software." Qualtrics, March-April 2025, .
    #mobile #shopping #insights #brand #marketers039
    Mobile shopping insights: Brand marketers' cheat sheet for back-to-school 2025
    As the second largest retail event in the U.S. after the holiday season, back-to-school shopping represents a crucial opportunity for brand advertising. And this year, the path to reaching parents clearly leads to one place: their mobile devices.Between March and April 2025, Unity surveyed 1,234 parents in the U.S. with children under 18 through Qualtrics to uncover how they're using mobile apps and games during this critical shopping season*. Our research uncovers specific insights into their shopping behaviors, ad engagement patterns, and preferred retail channels that can help marketers create more effective mobile strategies. Let's take a closer look at the key data and takeaways from our survey.Mobile meets back-to-schoolParents are embracing mobile as a primary path to purchase, with the majority using apps to research and buy back-to-school items.68% of parents use mobile apps for back-to-school shopping48% download new apps specifically for the back-to-school shopping seasonDads are more app-curious with 55% downloading new apps vs. 44% of moms46% complete purchases directly through mobile appsNot only are parents using apps for shopping, generally, they are logging serious screen time:22% spend 1–2 hours/day33% spend 3–4 hours/day on their phones35% spend 5+ hours on their phones58% of parents say they’re likely or very likely to engage with rewarded ads offering back-to-school savingsDadsare slightly more responsive than momsOnly 11.9% of parents are unlikely or very unlikely to engageMost parents are deal-driven, with coupons and limited-time offers leading their purchase decisions:Coupons/deals: 32% overallLimited-time offers: 14% of parents overall, with dads more responsiveCost and variety matter while proximity, bundles/packages and customer service ranked lowestRecommendation: Prioritize in-app advertising with deal-focused creatives, combined with rewarded ad formats that highlight limited-time urgency.School’s insessionWhen looking at timelines – our survey data indicates that parents are early planners, with the majority of shopping activity kicking off in June, with dads being more likely to get an early jump on back-to-school shopping.Nearly 1 in 5 parentsare early planners, starting their shopping before June.Dads are more likely to start early — 29% shop before June vs. 16% of moms.Nearly half of parentskick off shopping in June or July, with July alone driving the biggest surge—the peak of back-to-school season.24.8% wait until August, likely driven by last-minute needs or school start dates.Recommendation: Consider launching your awareness campaigns in mid-late Q2 to engage early planners while they’re still in research mode.Spend-ready parentsParents that we surveyed indicated they are ready to spend when it comes to back-to-school shopping, with moms being the primary purchasers. Advertising also plays a large role, with the majority of parents citing it as influential in the purchase-making process.42% of parents plan to spend over on back-to-school clothing alone.Another 20% plan to spend between –showing that back-to-school is a high-intent, high-investment moment for many families.63% say advertising somewhat or significantly influences their back-to-school purchase decisions.Moms drive the majority of back to school purchases, with 86% identifying as the primary household shopper.Recommendation: Target mobile ad placements that reach moms - who likely drive the majority of purchase decisions - especially through mobile gaming where women outpace men . With 63% of parents somewhat or significantly influenced by advertising and most planning substantial budgets, mobile campaigns during this high-intent period can help you reach your target audience.What’s in their cartParents that we surveyed indicated they have distinct preferences when it comes to both what they're buying and where they're shopping for back-to-school items, with notable differences in shopping behavior between moms and dads.Classroom supplies, clothing, arts and crafts suppliesand electronicstop the shopping listParents surveyed shop, or would consider shopping, at familiar favorites for back-to-school supplies:WalmartAmazonTargetStaplesRetailers vary by parent: While both moms and dads shop at mass retailers, dads are more likely to favor tech and office supply stores than moms.Dads were 2x more likely to shop at Staplesvs. momsDads were 2.4x more likely to shop at Office Depotvs. momsDads were 3.3x more likely to shop at Best Buyvs. momsMoms were 1.6x more likely to shop at Walmartvs. dadsRecommendation: Align your messaging with top retail destinations and tailor creative and app lists by parent type.Turn these back-to-school insights into conversions: Launch awareness campaigns by mid-Q2 to capture early planners, meet parents where they spend significant time—in mobile apps and games—and craft messaging that emphasizes urgency and deals. By implementing these data-driven strategies, your brand can earn an A+ this back-to-school season while increasing your advertising ROI potential.Learn more about Unity’s Programmatic solutions.*Disclaimer: Findings are based on survey responses from groups of differing sizes. While each group was large enough to identify directional patterns, differences in sample size may affect comparability.Qualtrics. "Survey Data Collected Using Qualtrics Software." Qualtrics, March-April 2025, . #mobile #shopping #insights #brand #marketers039
    UNITY.COM
    Mobile shopping insights: Brand marketers' cheat sheet for back-to-school 2025
    As the second largest retail event in the U.S. after the holiday season, back-to-school shopping represents a crucial opportunity for brand advertising. And this year, the path to reaching parents clearly leads to one place: their mobile devices.Between March and April 2025, Unity surveyed 1,234 parents in the U.S. with children under 18 through Qualtrics to uncover how they're using mobile apps and games during this critical shopping season*. Our research uncovers specific insights into their shopping behaviors, ad engagement patterns, and preferred retail channels that can help marketers create more effective mobile strategies. Let's take a closer look at the key data and takeaways from our survey.Mobile meets back-to-schoolParents are embracing mobile as a primary path to purchase, with the majority using apps to research and buy back-to-school items.68% of parents use mobile apps for back-to-school shopping48% download new apps specifically for the back-to-school shopping seasonDads are more app-curious with 55% downloading new apps vs. 44% of moms46% complete purchases directly through mobile appsNot only are parents using apps for shopping, generally, they are logging serious screen time:22% spend 1–2 hours/day33% spend 3–4 hours/day on their phones35% spend 5+ hours on their phones58% of parents say they’re likely or very likely to engage with rewarded ads offering back-to-school savingsDads (59.6%) are slightly more responsive than moms (58.4%)Only 11.9% of parents are unlikely or very unlikely to engageMost parents are deal-driven, with coupons and limited-time offers leading their purchase decisions:Coupons/deals: 32% overall (35% of moms, 28% of dads)Limited-time offers: 14% of parents overall, with dads more responsive (17.4%)Cost and variety matter while proximity, bundles/packages and customer service ranked lowestRecommendation: Prioritize in-app advertising with deal-focused creatives, combined with rewarded ad formats that highlight limited-time urgency.School’s in (early) sessionWhen looking at timelines – our survey data indicates that parents are early planners, with the majority of shopping activity kicking off in June (or earlier!), with dads being more likely to get an early jump on back-to-school shopping.Nearly 1 in 5 parents (21%) are early planners, starting their shopping before June.Dads are more likely to start early — 29% shop before June vs. 16% of moms.Nearly half of parents (46%) kick off shopping in June or July, with July alone driving the biggest surge (29.6%)—the peak of back-to-school season.24.8% wait until August, likely driven by last-minute needs or school start dates.Recommendation: Consider launching your awareness campaigns in mid-late Q2 to engage early planners while they’re still in research mode.Spend-ready parentsParents that we surveyed indicated they are ready to spend when it comes to back-to-school shopping, with moms being the primary purchasers. Advertising also plays a large role, with the majority of parents citing it as influential in the purchase-making process.42% of parents plan to spend over $150 on back-to-school clothing alone.Another 20% plan to spend between $100–$150, showing that back-to-school is a high-intent, high-investment moment for many families.63% say advertising somewhat or significantly influences their back-to-school purchase decisions.Moms drive the majority of back to school purchases, with 86% identifying as the primary household shopper.Recommendation: Target mobile ad placements that reach moms - who likely drive the majority of purchase decisions - especially through mobile gaming where women outpace men (73% vs. 65%). With 63% of parents somewhat or significantly influenced by advertising and most planning substantial budgets, mobile campaigns during this high-intent period can help you reach your target audience.What’s in their cartParents that we surveyed indicated they have distinct preferences when it comes to both what they're buying and where they're shopping for back-to-school items, with notable differences in shopping behavior between moms and dads.Classroom supplies (33%), clothing (24%), arts and crafts supplies (9%) and electronics (8%) top the shopping listParents surveyed shop, or would consider shopping, at familiar favorites for back-to-school supplies:Walmart (39%)Amazon (17%)Target (12%)Staples (8%)Retailers vary by parent: While both moms and dads shop at mass retailers, dads are more likely to favor tech and office supply stores than moms.Dads were 2x more likely to shop at Staples (12%) vs. moms (6%)Dads were 2.4x more likely to shop at Office Depot (12%) vs. moms (5%)Dads were 3.3x more likely to shop at Best Buy (10%) vs. moms (3%)Moms were 1.6x more likely to shop at Walmart (46%) vs. dads (28%)Recommendation: Align your messaging with top retail destinations and tailor creative and app lists by parent type.Turn these back-to-school insights into conversions: Launch awareness campaigns by mid-Q2 to capture early planners, meet parents where they spend significant time—in mobile apps and games—and craft messaging that emphasizes urgency and deals. By implementing these data-driven strategies, your brand can earn an A+ this back-to-school season while increasing your advertising ROI potential.Learn more about Unity’s Programmatic solutions.*Disclaimer: Findings are based on survey responses from groups of differing sizes (755 mothers, 441 fathers, 38 not specified). While each group was large enough to identify directional patterns, differences in sample size may affect comparability.Qualtrics. "Survey Data Collected Using Qualtrics Software." Qualtrics, March-April 2025, https://www.qualtrics.com.
    0 Комментарии 0 Поделились
  • Let the AI Security War Games Begin

    In February 2024, CNN reported, “A finance worker at a multinational firm was tricked into paying out million to fraudsters using deepfake technology to pose as the company’s chief financial officer in a video conference call.” In Europe, a second firm experienced a multimillion-dollar fraud when a deepfake emulated a board member in a video allegedly approving a fraudulent transfer of funds. “Banks and financial institutions are particularly at risk,” said The Hack Academy. “A study by Deloitte found that over 50% of senior executives expect deepfake scams to target their organizations soon. These attacks can undermine trust and lead to significant financial loss.”  Hack Academy went on to say that AI-inspired security attacks weren’t confined to deepfakes. These attacks were also beginning to occur with increased regularity in the form of corporate espionage and misinformation campaigns. AI brings new, more dangerous tactics to traditional security attack methods like phishing, social engineering and the insertion of malware into systems. For CIOs, enterprise AI system developers, data scientists and IT network professionals, AI changes the rules and the tactics for security, given AI’s limitless potential for both good and bad. This is forcing a reset in how IT thinks about security against malicious actors and intruders. Related:How Bad Actors are Exploiting AI What exactly is IT up against? The AI tools that are available on the dark web and in public cyber marketplaces give security perpetrators a wide choice of AI weaponry. Also, IoT and edge networks now present much broader enterprise attack surfaces. Security threats can come in videos, phone calls, social media sites, corporate systems and networks, vendor clouds, IoT devices, network end points, and virtually any entry point into a corporate IT environment that electronic communications can penetrate. Here are some of the current AI-embellished security attacks that companies are seeing: Convincing deepfake videos of corporate executives and stakeholders that are intended to dupe companies in pursuing certain actions or transferring certain assets or funds. This deep faking also extends to voice simulations of key personnel that are left as voicemails in corporate phone systems.  Phishing and spearfishing attacks that send convincing emailsto employees, who mistakenly open them because they think the sender is their boss, the CEO or someone else they perceive as trusted. AI supercharges these attacks because it can automate and send out a large volume of emails that hit many employee email accounts. That AI continues to “learn” with the help of machine learning so it can discover new trusted sender candidates for future attacks.   Related:Adaptive messaging that uses generative AI to craft messages to users that correct grammar and that “learn” from corporate communication styles so they can more closely emulate corporate communications that make them seem legitimate. Mutating code that uses AI to change malware signatures on the fly so antivirus detection mechanisms can be evaded. Data poisoning that occurs when a corporate or cloud provider’s AI data repository is injected by malware that altersso the data produces erroneous and misleading results.  Fighting Back With Tech To combat these supercharged AI-based security threats, IT has number of tools, techniques and strategies it can consider. Fighting deepfakes. Deepfakes can come in the form of videos, voicemails and photos. Since deepfakes are unstructured data objects that can’t be parsed in their native forms like real data, there are new tools on the market that can convert these objects into graphical representations that can be analyzed to evaluate whether there is something in an object that should or shouldn’t be there. The goal is to confirm authenticity.  Related:Fighting phishing and spear phishing. A combination of policy and practice works best to combat phishing and spear phishing attacks. Both types of attacks are predicated on users being tricked into opening an email attachment that they believe is from a trusted sender, so the first line of defense is educatingusers on how to handle their email. For instance, a user should notify IT if they receive an email that seems unusual or unexpected, and they should never open it. IT should also review its current security tools. Is it still using older security monitoring software that doesn’t include more modern technologies like observability, which can check for security intrusions or malware at more atomic levels?  Is IT still using IAMsoftware to track user identities and activities at a top level in the cloud and on top and atomic levels on premises, or has it also added cloud identity entitlements management, which gives it an atomic level view of  user accesses and activities in the cloud? Better yet, has IT moved to identity governance administration, which can serve as an over-arching umbrella for IAM and CIEM plugins, plus provide detailed audit reports and automated compliance across all platforms? Fighting embedded malware code. Malware can lie dormant in systems for months, giving a bad actor the option to activate it whenever the timing is right. It’s all the more reason for IT to augment its security staff with new skillsets, such as that of the “threat hunter,” whose job is to examine networks, data and systems on a daily basis, hunting down malware that might be lurking within, and destroying it before it activates. Fighting with zero-trust networks. Internet of Thingsdevices come into companies with little or no security because IoT suppliers don’t pay much attention to it and there is a general expectation that corporate IT will configure devices to the appropriate security settings. The problem is, IT often forgets to do this. There are also times when users purchase their own IoT gear, and IT doesn’t know about it. Zero-trust networks help manage this, because they detect and report on everything that is added, subtracted or modified on the network. This gives IT visibility into new, potential security breach points. A second step is to formalize IT procedures for IoT devices so that no IoT device is deployed without the device’s security first being set to corporate standards.  Fighting AI data poisoning. AI models, systems and data should be continuously monitored for accuracy. As soon as they show lowered levels of accuracy or produce unusual conclusions, the data repository, inflows and outflows should be examined for quality and non-bias of data. If contamination is found, the system should be taken down, the data sanitized, and the sources of the contamination traced, tracked and disabled. Fighting AI with AI. Most every security tool on the market today contains AI functionality to detect anomalies, abnormal data patterns and user activities. Additionally, forensics AI can dissect a security breach that does occur, isolating how it happened, where it originated from and what caused it. Since most sites don’t have on-staff forensics experts, IT will have to train staff in forensics skills. Fighting with regular audits and vulnerability testing. Minimally, IT vulnerability testing should be performed on a quarterly basis, and full security audits on an annual basis. If sites use cloud providers, they should request each provider’s latest security audit for review. An outside auditor can also help sites prepare for future AI-driven security threats, because auditors stay on top of the industry, visit many different companies, and see many different situations. An advanced knowledge of threats that loom in the future helps sites prepare for new battles. Summary AI technology is moving faster than legal rulings and regulations. This leaves most IT departments “on their own” to develop security defenses against bad actors who use AI against them.  The good news is that IT already has insights into how bad actors intend to use AI, and there are tools on the market that can help defensive efforts. What’s been missing is a proactive and aggressive battle plan from IT. That has to start now. 
    #let #security #war #games #begin
    Let the AI Security War Games Begin
    In February 2024, CNN reported, “A finance worker at a multinational firm was tricked into paying out million to fraudsters using deepfake technology to pose as the company’s chief financial officer in a video conference call.” In Europe, a second firm experienced a multimillion-dollar fraud when a deepfake emulated a board member in a video allegedly approving a fraudulent transfer of funds. “Banks and financial institutions are particularly at risk,” said The Hack Academy. “A study by Deloitte found that over 50% of senior executives expect deepfake scams to target their organizations soon. These attacks can undermine trust and lead to significant financial loss.”  Hack Academy went on to say that AI-inspired security attacks weren’t confined to deepfakes. These attacks were also beginning to occur with increased regularity in the form of corporate espionage and misinformation campaigns. AI brings new, more dangerous tactics to traditional security attack methods like phishing, social engineering and the insertion of malware into systems. For CIOs, enterprise AI system developers, data scientists and IT network professionals, AI changes the rules and the tactics for security, given AI’s limitless potential for both good and bad. This is forcing a reset in how IT thinks about security against malicious actors and intruders. Related:How Bad Actors are Exploiting AI What exactly is IT up against? The AI tools that are available on the dark web and in public cyber marketplaces give security perpetrators a wide choice of AI weaponry. Also, IoT and edge networks now present much broader enterprise attack surfaces. Security threats can come in videos, phone calls, social media sites, corporate systems and networks, vendor clouds, IoT devices, network end points, and virtually any entry point into a corporate IT environment that electronic communications can penetrate. Here are some of the current AI-embellished security attacks that companies are seeing: Convincing deepfake videos of corporate executives and stakeholders that are intended to dupe companies in pursuing certain actions or transferring certain assets or funds. This deep faking also extends to voice simulations of key personnel that are left as voicemails in corporate phone systems.  Phishing and spearfishing attacks that send convincing emailsto employees, who mistakenly open them because they think the sender is their boss, the CEO or someone else they perceive as trusted. AI supercharges these attacks because it can automate and send out a large volume of emails that hit many employee email accounts. That AI continues to “learn” with the help of machine learning so it can discover new trusted sender candidates for future attacks.   Related:Adaptive messaging that uses generative AI to craft messages to users that correct grammar and that “learn” from corporate communication styles so they can more closely emulate corporate communications that make them seem legitimate. Mutating code that uses AI to change malware signatures on the fly so antivirus detection mechanisms can be evaded. Data poisoning that occurs when a corporate or cloud provider’s AI data repository is injected by malware that altersso the data produces erroneous and misleading results.  Fighting Back With Tech To combat these supercharged AI-based security threats, IT has number of tools, techniques and strategies it can consider. Fighting deepfakes. Deepfakes can come in the form of videos, voicemails and photos. Since deepfakes are unstructured data objects that can’t be parsed in their native forms like real data, there are new tools on the market that can convert these objects into graphical representations that can be analyzed to evaluate whether there is something in an object that should or shouldn’t be there. The goal is to confirm authenticity.  Related:Fighting phishing and spear phishing. A combination of policy and practice works best to combat phishing and spear phishing attacks. Both types of attacks are predicated on users being tricked into opening an email attachment that they believe is from a trusted sender, so the first line of defense is educatingusers on how to handle their email. For instance, a user should notify IT if they receive an email that seems unusual or unexpected, and they should never open it. IT should also review its current security tools. Is it still using older security monitoring software that doesn’t include more modern technologies like observability, which can check for security intrusions or malware at more atomic levels?  Is IT still using IAMsoftware to track user identities and activities at a top level in the cloud and on top and atomic levels on premises, or has it also added cloud identity entitlements management, which gives it an atomic level view of  user accesses and activities in the cloud? Better yet, has IT moved to identity governance administration, which can serve as an over-arching umbrella for IAM and CIEM plugins, plus provide detailed audit reports and automated compliance across all platforms? Fighting embedded malware code. Malware can lie dormant in systems for months, giving a bad actor the option to activate it whenever the timing is right. It’s all the more reason for IT to augment its security staff with new skillsets, such as that of the “threat hunter,” whose job is to examine networks, data and systems on a daily basis, hunting down malware that might be lurking within, and destroying it before it activates. Fighting with zero-trust networks. Internet of Thingsdevices come into companies with little or no security because IoT suppliers don’t pay much attention to it and there is a general expectation that corporate IT will configure devices to the appropriate security settings. The problem is, IT often forgets to do this. There are also times when users purchase their own IoT gear, and IT doesn’t know about it. Zero-trust networks help manage this, because they detect and report on everything that is added, subtracted or modified on the network. This gives IT visibility into new, potential security breach points. A second step is to formalize IT procedures for IoT devices so that no IoT device is deployed without the device’s security first being set to corporate standards.  Fighting AI data poisoning. AI models, systems and data should be continuously monitored for accuracy. As soon as they show lowered levels of accuracy or produce unusual conclusions, the data repository, inflows and outflows should be examined for quality and non-bias of data. If contamination is found, the system should be taken down, the data sanitized, and the sources of the contamination traced, tracked and disabled. Fighting AI with AI. Most every security tool on the market today contains AI functionality to detect anomalies, abnormal data patterns and user activities. Additionally, forensics AI can dissect a security breach that does occur, isolating how it happened, where it originated from and what caused it. Since most sites don’t have on-staff forensics experts, IT will have to train staff in forensics skills. Fighting with regular audits and vulnerability testing. Minimally, IT vulnerability testing should be performed on a quarterly basis, and full security audits on an annual basis. If sites use cloud providers, they should request each provider’s latest security audit for review. An outside auditor can also help sites prepare for future AI-driven security threats, because auditors stay on top of the industry, visit many different companies, and see many different situations. An advanced knowledge of threats that loom in the future helps sites prepare for new battles. Summary AI technology is moving faster than legal rulings and regulations. This leaves most IT departments “on their own” to develop security defenses against bad actors who use AI against them.  The good news is that IT already has insights into how bad actors intend to use AI, and there are tools on the market that can help defensive efforts. What’s been missing is a proactive and aggressive battle plan from IT. That has to start now.  #let #security #war #games #begin
    WWW.INFORMATIONWEEK.COM
    Let the AI Security War Games Begin
    In February 2024, CNN reported, “A finance worker at a multinational firm was tricked into paying out $25 million to fraudsters using deepfake technology to pose as the company’s chief financial officer in a video conference call.” In Europe, a second firm experienced a multimillion-dollar fraud when a deepfake emulated a board member in a video allegedly approving a fraudulent transfer of funds. “Banks and financial institutions are particularly at risk,” said The Hack Academy. “A study by Deloitte found that over 50% of senior executives expect deepfake scams to target their organizations soon. These attacks can undermine trust and lead to significant financial loss.”  Hack Academy went on to say that AI-inspired security attacks weren’t confined to deepfakes. These attacks were also beginning to occur with increased regularity in the form of corporate espionage and misinformation campaigns. AI brings new, more dangerous tactics to traditional security attack methods like phishing, social engineering and the insertion of malware into systems. For CIOs, enterprise AI system developers, data scientists and IT network professionals, AI changes the rules and the tactics for security, given AI’s limitless potential for both good and bad. This is forcing a reset in how IT thinks about security against malicious actors and intruders. Related:How Bad Actors are Exploiting AI What exactly is IT up against? The AI tools that are available on the dark web and in public cyber marketplaces give security perpetrators a wide choice of AI weaponry. Also, IoT and edge networks now present much broader enterprise attack surfaces. Security threats can come in videos, phone calls, social media sites, corporate systems and networks, vendor clouds, IoT devices, network end points, and virtually any entry point into a corporate IT environment that electronic communications can penetrate. Here are some of the current AI-embellished security attacks that companies are seeing: Convincing deepfake videos of corporate executives and stakeholders that are intended to dupe companies in pursuing certain actions or transferring certain assets or funds. This deep faking also extends to voice simulations of key personnel that are left as voicemails in corporate phone systems.  Phishing and spearfishing attacks that send convincing emails (some with malicious attachments) to employees, who mistakenly open them because they think the sender is their boss, the CEO or someone else they perceive as trusted. AI supercharges these attacks because it can automate and send out a large volume of emails that hit many employee email accounts. That AI continues to “learn” with the help of machine learning so it can discover new trusted sender candidates for future attacks.   Related:Adaptive messaging that uses generative AI to craft messages to users that correct grammar and that “learn” from corporate communication styles so they can more closely emulate corporate communications that make them seem legitimate. Mutating code that uses AI to change malware signatures on the fly so antivirus detection mechanisms can be evaded. Data poisoning that occurs when a corporate or cloud provider’s AI data repository is injected by malware that alters (“poisons”) so the data produces erroneous and misleading results.  Fighting Back With Tech To combat these supercharged AI-based security threats, IT has number of tools, techniques and strategies it can consider. Fighting deepfakes. Deepfakes can come in the form of videos, voicemails and photos. Since deepfakes are unstructured data objects that can’t be parsed in their native forms like real data, there are new tools on the market that can convert these objects into graphical representations that can be analyzed to evaluate whether there is something in an object that should or shouldn’t be there. The goal is to confirm authenticity.  Related:Fighting phishing and spear phishing. A combination of policy and practice works best to combat phishing and spear phishing attacks. Both types of attacks are predicated on users being tricked into opening an email attachment that they believe is from a trusted sender, so the first line of defense is educating (and repeat-educating) users on how to handle their email. For instance, a user should notify IT if they receive an email that seems unusual or unexpected, and they should never open it. IT should also review its current security tools. Is it still using older security monitoring software that doesn’t include more modern technologies like observability, which can check for security intrusions or malware at more atomic levels?  Is IT still using IAM (identity access management) software to track user identities and activities at a top level in the cloud and on top and atomic levels on premises, or has it also added cloud identity entitlements management (CIEM), which gives it an atomic level view of  user accesses and activities in the cloud? Better yet, has IT moved to identity governance administration (IGA), which can serve as an over-arching umbrella for IAM and CIEM plugins, plus provide detailed audit reports and automated compliance across all platforms? Fighting embedded malware code. Malware can lie dormant in systems for months, giving a bad actor the option to activate it whenever the timing is right. It’s all the more reason for IT to augment its security staff with new skillsets, such as that of the “threat hunter,” whose job is to examine networks, data and systems on a daily basis, hunting down malware that might be lurking within, and destroying it before it activates. Fighting with zero-trust networks. Internet of Things (IoT) devices come into companies with little or no security because IoT suppliers don’t pay much attention to it and there is a general expectation that corporate IT will configure devices to the appropriate security settings. The problem is, IT often forgets to do this. There are also times when users purchase their own IoT gear, and IT doesn’t know about it. Zero-trust networks help manage this, because they detect and report on everything that is added, subtracted or modified on the network. This gives IT visibility into new, potential security breach points. A second step is to formalize IT procedures for IoT devices so that no IoT device is deployed without the device’s security first being set to corporate standards.  Fighting AI data poisoning. AI models, systems and data should be continuously monitored for accuracy. As soon as they show lowered levels of accuracy or produce unusual conclusions, the data repository, inflows and outflows should be examined for quality and non-bias of data. If contamination is found, the system should be taken down, the data sanitized, and the sources of the contamination traced, tracked and disabled. Fighting AI with AI. Most every security tool on the market today contains AI functionality to detect anomalies, abnormal data patterns and user activities. Additionally, forensics AI can dissect a security breach that does occur, isolating how it happened, where it originated from and what caused it. Since most sites don’t have on-staff forensics experts, IT will have to train staff in forensics skills. Fighting with regular audits and vulnerability testing. Minimally, IT vulnerability testing should be performed on a quarterly basis, and full security audits on an annual basis. If sites use cloud providers, they should request each provider’s latest security audit for review. An outside auditor can also help sites prepare for future AI-driven security threats, because auditors stay on top of the industry, visit many different companies, and see many different situations. An advanced knowledge of threats that loom in the future helps sites prepare for new battles. Summary AI technology is moving faster than legal rulings and regulations. This leaves most IT departments “on their own” to develop security defenses against bad actors who use AI against them.  The good news is that IT already has insights into how bad actors intend to use AI, and there are tools on the market that can help defensive efforts. What’s been missing is a proactive and aggressive battle plan from IT. That has to start now. 
    0 Комментарии 0 Поделились
  • How to keep your Apple devices safe from AirPlay attacks

    Apple’s approach to building new features has always been rooted in safety and seamless convenience. Take, for example, AirPlay, a wireless standard created by the company that allows users to stream audio and video from one device to another.
    AirPlay works not just across Apple devices, but also on TVs and speakers cleared by the company to offer the wireless streaming facility. That also makes it a ripe target for attacks, and it seems there are, in fact, vulnerabilities in the wireless lanes that could allow bad actors to seed malware and infect more connected devices. 

    Recommended Videos

    Understanding the AirPlay risk
    Experts at the security research firm Oligo recently detailed Airborne, a set of flaws in Apple’s AirPlay Protocol and the AirPlay Software Development Kitthat can allow hackers to remotely execute code. These vulnerabilities can let bad actors take control of devices and use the infected machines to broaden the damage. 
    “An attacker can take over certain AirPlay-enabled devices and do things like deploy malware that spreads to devices on any local network the infected device connects,” Oligo explained. The risk is huge because there are billions of Apple devices out there that support AirPlay, and millions that are sold by other brands. 
    Simon Cohen / Digital Trends
    One of the vulnerabilities could allow hackers to compromise a device and then use it to gain access to a larger network, potentially targeting other devices, too. Depending on the target, the risks range from spying on conversations to tracking a car’s location, accessing sensitive information, ransomware attacks, and denial of service. 
    Apple has patched the vulnerabilities via macOS Sequoia 15.4, tvOS 18.4, macOS Ventura 13.7.5, iPadOS 17.7.6, macOS Sonoma 14.7.5, iOS 18.4 and iPadOS 18.4, visionOS 2.4 updates. However, there are potentially thousands of older devices that will never get patched and remain vulnerable. 
    What steps do experts suggest?
    Of course, the first line of defense to protect yourself across all vulnerable devices is to download the fix released by Apple. But that isn’t the full picture. Trevor Horwitz, CISO and founder of TrustNet, says the patch will only work if people install it after the package downloads on their device.
    “The simplest and most effective thing you can do is keep your devices updated. That sounds basic, but it’s often overlooked,” he says. On an iPhone or iPad, follow this route to install the safety update: Settings > General > Software Update. For macOS, you must walk this path: Apple menu > System. Settings > General > Software Update.
    Nadeem Sarwar / Digital Trends
    Since attack vectors like Airborne rely on Wi-Fi networks to expand their damage, you must also pay attention to them. Oleh Kulchytskyi, Senior Malware Reverse Engineer at MacPaw’s Moonlock, told DigitalTrends that a Zero-Click Remote Code Executionis the highest level of security breach. 
    It should be immediately patched by the companies involved, but as a user, one must take further network-related precautions. “To stay safe at home, ensure that your router has a strong password and there are no suspicious connections to your network,” Kulchytsky adds.  
    A safe way to AirPlay
    Matthias Frielingsdorf, a veteran iOS researcher and cofounder of iVerify, tells me that everyone should follow basic digital security protocols. Those include installing updates as soon as they are available, maintaining strong network passwords, and most importantly, reducing the surface area for such attacks. 
    Since AirPlay is the threat vector, users should take proactive steps while using it. ”Disabling this on iOS / macOS / tvOS devices that don’t need to be an AirPlay receiver would limit some of the attacks. In public spaces, disabling WiFi on the Mac and iPhone would stop those attacks as well,” says Frielingsdorf. 
    Nadeem Sarwar / Digital Trends
    AirPlay streaming is active by default, and as such, you need to disable it. To do so, follow this path on your iPhone or iPad: Settings  > General > AirPlay & Continuity > Ask. You can also set it to Never, if you don’t actively utilize this feature. There’s also an option to set a password, which I recommend that you enable, while at it.
    What about AirPlay itself? Can it be disabled? Yes, it can be turned off entirely. On your iPhone and iPad, go to the AirPlay & Continuity page and turn off the AirPlay Receiver toggle. Alternatively, you can choose to allow AirPlay only for the Current User, instead of keeping it open to everyone in the range. 
    For Mac users, this is the path you need to follow: Apple Menu > System Settings > General > AirDrop & Handoff > AirPlay Receiver. You can’t always patch older or discontinued devices, so it’s best to ensure that the machines that are currently in your hands have enabled the right protocols to minimize the risks. 
    The bottom line 
    On multiple occasions in the past, security experts have highlighted flaws in wireless transmission systems, such as Bluetooth. But a vulnerability that allows zero-click remote code execution in AirPlay is a cautionary tale. The message is clear.

    Apple’s security guardrails are solid, but not impenetrable.

    “What makes this serious is the integration. AirPlay isn’t just a standalone app. It’s a system-level service built into iOS, macOS, and tvOS. So the moment that layer is compromised, the attacker could potentially affect multiple devices at once,” TrustNet’s Horwitz told Digital Trends. 
    Nadeem Sarwar / Digital Trends
    So, where does that leave an average user who is not savvy about security measures? Well, it’s time to set aside notions and market perceptions. Chris Hill, Chief Security Strategist at BeyondTrust, says users must understand the threat landscape instead of living with the idea that a certain ecosystem is safer than the rest. 
    “Threat actors are opportunistic, looking for the easiest path of least resistance, they will find it, and they did in this case with AirPlay and AirBorne,” he warns. The bottom line is that keep your devices updated, disable features you don’t use, and be vigilant with network-related settings.
    #how #keep #your #apple #devices
    How to keep your Apple devices safe from AirPlay attacks
    Apple’s approach to building new features has always been rooted in safety and seamless convenience. Take, for example, AirPlay, a wireless standard created by the company that allows users to stream audio and video from one device to another. AirPlay works not just across Apple devices, but also on TVs and speakers cleared by the company to offer the wireless streaming facility. That also makes it a ripe target for attacks, and it seems there are, in fact, vulnerabilities in the wireless lanes that could allow bad actors to seed malware and infect more connected devices.  Recommended Videos Understanding the AirPlay risk Experts at the security research firm Oligo recently detailed Airborne, a set of flaws in Apple’s AirPlay Protocol and the AirPlay Software Development Kitthat can allow hackers to remotely execute code. These vulnerabilities can let bad actors take control of devices and use the infected machines to broaden the damage.  “An attacker can take over certain AirPlay-enabled devices and do things like deploy malware that spreads to devices on any local network the infected device connects,” Oligo explained. The risk is huge because there are billions of Apple devices out there that support AirPlay, and millions that are sold by other brands.  Simon Cohen / Digital Trends One of the vulnerabilities could allow hackers to compromise a device and then use it to gain access to a larger network, potentially targeting other devices, too. Depending on the target, the risks range from spying on conversations to tracking a car’s location, accessing sensitive information, ransomware attacks, and denial of service.  Apple has patched the vulnerabilities via macOS Sequoia 15.4, tvOS 18.4, macOS Ventura 13.7.5, iPadOS 17.7.6, macOS Sonoma 14.7.5, iOS 18.4 and iPadOS 18.4, visionOS 2.4 updates. However, there are potentially thousands of older devices that will never get patched and remain vulnerable.  What steps do experts suggest? Of course, the first line of defense to protect yourself across all vulnerable devices is to download the fix released by Apple. But that isn’t the full picture. Trevor Horwitz, CISO and founder of TrustNet, says the patch will only work if people install it after the package downloads on their device. “The simplest and most effective thing you can do is keep your devices updated. That sounds basic, but it’s often overlooked,” he says. On an iPhone or iPad, follow this route to install the safety update: Settings > General > Software Update. For macOS, you must walk this path: Apple menu > System. Settings > General > Software Update. Nadeem Sarwar / Digital Trends Since attack vectors like Airborne rely on Wi-Fi networks to expand their damage, you must also pay attention to them. Oleh Kulchytskyi, Senior Malware Reverse Engineer at MacPaw’s Moonlock, told DigitalTrends that a Zero-Click Remote Code Executionis the highest level of security breach.  It should be immediately patched by the companies involved, but as a user, one must take further network-related precautions. “To stay safe at home, ensure that your router has a strong password and there are no suspicious connections to your network,” Kulchytsky adds.   A safe way to AirPlay Matthias Frielingsdorf, a veteran iOS researcher and cofounder of iVerify, tells me that everyone should follow basic digital security protocols. Those include installing updates as soon as they are available, maintaining strong network passwords, and most importantly, reducing the surface area for such attacks.  Since AirPlay is the threat vector, users should take proactive steps while using it. ”Disabling this on iOS / macOS / tvOS devices that don’t need to be an AirPlay receiver would limit some of the attacks. In public spaces, disabling WiFi on the Mac and iPhone would stop those attacks as well,” says Frielingsdorf.  Nadeem Sarwar / Digital Trends AirPlay streaming is active by default, and as such, you need to disable it. To do so, follow this path on your iPhone or iPad: Settings  > General > AirPlay & Continuity > Ask. You can also set it to Never, if you don’t actively utilize this feature. There’s also an option to set a password, which I recommend that you enable, while at it. What about AirPlay itself? Can it be disabled? Yes, it can be turned off entirely. On your iPhone and iPad, go to the AirPlay & Continuity page and turn off the AirPlay Receiver toggle. Alternatively, you can choose to allow AirPlay only for the Current User, instead of keeping it open to everyone in the range.  For Mac users, this is the path you need to follow: Apple Menu > System Settings > General > AirDrop & Handoff > AirPlay Receiver. You can’t always patch older or discontinued devices, so it’s best to ensure that the machines that are currently in your hands have enabled the right protocols to minimize the risks.  The bottom line  On multiple occasions in the past, security experts have highlighted flaws in wireless transmission systems, such as Bluetooth. But a vulnerability that allows zero-click remote code execution in AirPlay is a cautionary tale. The message is clear. Apple’s security guardrails are solid, but not impenetrable. “What makes this serious is the integration. AirPlay isn’t just a standalone app. It’s a system-level service built into iOS, macOS, and tvOS. So the moment that layer is compromised, the attacker could potentially affect multiple devices at once,” TrustNet’s Horwitz told Digital Trends.  Nadeem Sarwar / Digital Trends So, where does that leave an average user who is not savvy about security measures? Well, it’s time to set aside notions and market perceptions. Chris Hill, Chief Security Strategist at BeyondTrust, says users must understand the threat landscape instead of living with the idea that a certain ecosystem is safer than the rest.  “Threat actors are opportunistic, looking for the easiest path of least resistance, they will find it, and they did in this case with AirPlay and AirBorne,” he warns. The bottom line is that keep your devices updated, disable features you don’t use, and be vigilant with network-related settings. #how #keep #your #apple #devices
    WWW.DIGITALTRENDS.COM
    How to keep your Apple devices safe from AirPlay attacks
    Apple’s approach to building new features has always been rooted in safety and seamless convenience. Take, for example, AirPlay, a wireless standard created by the company that allows users to stream audio and video from one device to another. AirPlay works not just across Apple devices, but also on TVs and speakers cleared by the company to offer the wireless streaming facility. That also makes it a ripe target for attacks, and it seems there are, in fact, vulnerabilities in the wireless lanes that could allow bad actors to seed malware and infect more connected devices.  Recommended Videos Understanding the AirPlay risk Experts at the security research firm Oligo recently detailed Airborne, a set of flaws in Apple’s AirPlay Protocol and the AirPlay Software Development Kit (SDK) that can allow hackers to remotely execute code. These vulnerabilities can let bad actors take control of devices and use the infected machines to broaden the damage.  “An attacker can take over certain AirPlay-enabled devices and do things like deploy malware that spreads to devices on any local network the infected device connects,” Oligo explained. The risk is huge because there are billions of Apple devices out there that support AirPlay, and millions that are sold by other brands.  Simon Cohen / Digital Trends One of the vulnerabilities could allow hackers to compromise a device and then use it to gain access to a larger network, potentially targeting other devices, too. Depending on the target, the risks range from spying on conversations to tracking a car’s location, accessing sensitive information, ransomware attacks, and denial of service.  Apple has patched the vulnerabilities via macOS Sequoia 15.4, tvOS 18.4, macOS Ventura 13.7.5, iPadOS 17.7.6, macOS Sonoma 14.7.5, iOS 18.4 and iPadOS 18.4, visionOS 2.4 updates. However, there are potentially thousands of older devices that will never get patched and remain vulnerable.  What steps do experts suggest? Of course, the first line of defense to protect yourself across all vulnerable devices is to download the fix released by Apple. But that isn’t the full picture. Trevor Horwitz, CISO and founder of TrustNet, says the patch will only work if people install it after the package downloads on their device. “The simplest and most effective thing you can do is keep your devices updated. That sounds basic, but it’s often overlooked,” he says. On an iPhone or iPad, follow this route to install the safety update: Settings > General > Software Update. For macOS, you must walk this path: Apple menu > System. Settings > General > Software Update. Nadeem Sarwar / Digital Trends Since attack vectors like Airborne rely on Wi-Fi networks to expand their damage, you must also pay attention to them. Oleh Kulchytskyi, Senior Malware Reverse Engineer at MacPaw’s Moonlock, told DigitalTrends that a Zero-Click Remote Code Execution (RCE) is the highest level of security breach.  It should be immediately patched by the companies involved, but as a user, one must take further network-related precautions. “To stay safe at home, ensure that your router has a strong password and there are no suspicious connections to your network,” Kulchytsky adds.   A safe way to AirPlay Matthias Frielingsdorf, a veteran iOS researcher and cofounder of iVerify, tells me that everyone should follow basic digital security protocols. Those include installing updates as soon as they are available, maintaining strong network passwords, and most importantly, reducing the surface area for such attacks.  Since AirPlay is the threat vector, users should take proactive steps while using it. ”Disabling this on iOS / macOS / tvOS devices that don’t need to be an AirPlay receiver would limit some of the attacks. In public spaces, disabling WiFi on the Mac and iPhone would stop those attacks as well,” says Frielingsdorf.  Nadeem Sarwar / Digital Trends AirPlay streaming is active by default, and as such, you need to disable it. To do so, follow this path on your iPhone or iPad: Settings  > General > AirPlay & Continuity > Ask. You can also set it to Never, if you don’t actively utilize this feature. There’s also an option to set a password, which I recommend that you enable, while at it. What about AirPlay itself? Can it be disabled? Yes, it can be turned off entirely. On your iPhone and iPad, go to the AirPlay & Continuity page and turn off the AirPlay Receiver toggle. Alternatively, you can choose to allow AirPlay only for the Current User, instead of keeping it open to everyone in the range.  For Mac users, this is the path you need to follow: Apple Menu > System Settings > General > AirDrop & Handoff > AirPlay Receiver. You can’t always patch older or discontinued devices, so it’s best to ensure that the machines that are currently in your hands have enabled the right protocols to minimize the risks.  The bottom line  On multiple occasions in the past, security experts have highlighted flaws in wireless transmission systems, such as Bluetooth. But a vulnerability that allows zero-click remote code execution in AirPlay is a cautionary tale. The message is clear. Apple’s security guardrails are solid, but not impenetrable. “What makes this serious is the integration. AirPlay isn’t just a standalone app. It’s a system-level service built into iOS, macOS, and tvOS. So the moment that layer is compromised, the attacker could potentially affect multiple devices at once,” TrustNet’s Horwitz told Digital Trends.  Nadeem Sarwar / Digital Trends So, where does that leave an average user who is not savvy about security measures? Well, it’s time to set aside notions and market perceptions. Chris Hill, Chief Security Strategist at BeyondTrust, says users must understand the threat landscape instead of living with the idea that a certain ecosystem is safer than the rest.  “Threat actors are opportunistic, looking for the easiest path of least resistance, they will find it, and they did in this case with AirPlay and AirBorne,” he warns. The bottom line is that keep your devices updated, disable features you don’t use, and be vigilant with network-related settings.
    0 Комментарии 0 Поделились
Расширенные страницы