Connect with us

Crypto

Biden Signs First 17 Executive Actions Starting With Masks, Halting Border Wall, Ditching Travel Ban

Biden Signs First 17 Executive Actions Starting With Masks, Halting Border Wall, Ditching Travel Ban

Update (1810ET): Biden has finished signing his first 15 executive orders and 2 executive agency directives, according to a White House pool.

Published

on

Biden Signs First 17 Executive Actions Starting With Masks, Halting Border Wall, Ditching Travel Ban

Update (1810ET): Biden has finished signing his first 15 executive orders and 2 executive agency directives, according to a White House pool reporter with the Washington Post.

* * *

Update (1745ET): Biden officially kicked off his one-day blitz of executive orders and executive actions, as expected, by signing them in front of an eager crowd of media, which has been following him around all day on his first day in office.

Biden kicked off the flurry of what are expected to be 17 or more individual executive action items by requiring masks on all federal grounds, while asking agencies to extend moratoriums on evictions and on federal student loan payments. He also signed an order overturning Trump's travel ban order.

Another order asks Americans to don face coverings for 100 days while reviving a global health unit in the National Security Council that was allowed to go dormant during the Trump administration to oversee America's pandemic preparedness and response. Biden will also begin to reverse steps taken by former President Trump to withdraw from the WHO by sending Dr. Fauci to speak at the international group’s executive board meeting on Thursday.

"As you’ve heard [Biden] say, the pandemic will continue to get worse before it gets better,” Jeff Zients, the incoming White House coronavirus czar, told reporters on a call previewing the administration’s actions. "This is clearly a national emergency and we will treat it as such."

Biden also signed an EO to stop construction of border wall-work ordered under President Trump, even as Fox News reported that the contract with the construction company was already paid out.

Here's a video from Sky News showing Biden as he starts the flurry of orders, with signings expected to continue until the first White House press briefing to be held at 1900ET.

Here's the schedule for the rest of the day after that:

1900ET: News briefing to be held by new press secretary Jen Psaki
2030ET:  'Celebrate America Primetime Special' begins on US TV to replace traditional inaugural ball
2050ET: Joe Biden to speak
2115ET: Kamala Harris to speak
2155ET: President and First Lady to appear on Blue Room Balcony on South Lawn to watch fireworks

 


 

 

 

 

 

With just hours to go before his swearing-in, Joe Biden and his team have already started Wednesday with a blitz of announcements for Executive Orders that will be issued immediately.

Following at least a week's worth of media leaks teasing all the Biden "Day One" action items (Rejoin the Paris Accords, Keystone Pipeline, Halt the departure from the WTO, But mostly the massive immigration package that could create paths to citizenship for millions of illegal migrants), Biden is moving ahead with no fewer than 17 executive actions targeting Trump's various policies.

CNN reports there will be a total of 17 executive actions, at least 15 of those will be executive orders targeting a range of issues, while Biden pushes his immigration package and a raft of immigration legislation. Of these 17 actions, 9 will involve reversals of Trump-era policies.

His very first action will an executive order mandating masks be worn by all on federal property.

And after holding a COVID victim's memorial event on Tuesday evening, timed to maximally undermine Trump, who was at a private farewell ceremony at Joint Base Andrews

The FT reports that the barrage of orders also includes a "100-day masking challenge" to promote the wearing of face masks across the US, with a guest appearance by Dr. Anthony Fauci, who will (shocker of the century) serve as the media face of the challenge.

As expected, Biden will also roll back the Trump travel ban on citizens of certain Muslim -majority countries introduced at the very beginning of the Trump Administration, which survived a bitter court battle that infamously occupied plenty of headline space during the first half of 2017. It also sent protesters rushing to airports around the country as some travelers were caught up in the chaos.

"It was rooted in xenophobia and religious animus and president-elect Biden has been clear that we will not turn our back on our values with discriminatory bans on entry to the United States," Jake Sullivan, Biden's pick for national security adviser, said of the Muslim ban recently during a briefing.

Biden will sign the EOs and other memoranda in the Oval Office on Wednesday afternoon, his incoming press secretary Jen Psaki told reporters.

Psaki confirmed that, as we have previously reported, Biden plans to accompany his slate of EOs with a comprehensive immigration package that will be sent to Congress straightaway, where it will need to be passed by the (Democrat-controlled) House and Senate.

We have also noted previously that the day one orders will be part of a "10-day blitz" of orders, upon which we have previously reported, they will target the "four overlapping and compounding crises": COVID-19, the economy, climate change and racial inequality.

"In his first 10 days in office, President-elect Biden will take decisive action to address these four crises, prevent other urgent and irreversible harms, and restore America’s place in the world," Klain wrote at the time.

Other '10-day blitz' items include presidential directives on safely reopening schools and businesses, after Democrats spent much of last year insisting they remain closed.

Tyler Durden Wed, 01/20/2021 - 18:09

Read More

Continue Reading

Spread & Containment

What does good cybersecurity look like in 2022?

The pharma industry is becoming an increasingly hot commodity for cybercriminals. In recent years, digital adoption has accelerated
The post What does…

Published

on

The pharma industry is becoming an increasingly hot commodity for cybercriminals. In recent years, digital adoption has accelerated at a rapid pace, with companies racing to integrate cloud-based platforms and telehealth services to expand the delivery of modern healthcare. Combined with the sudden arrival of COVID-19, this perfect storm of events handed cybercriminals an opportunity to exploit weaknesses in fledging systems and processes.

Pharma companies hold masses of vital data sets, from classified intellectual property to proprietary information about drugs and clinical trial developments. The value of such data is not lost on cybercriminals. This was illustrated in 2021, amid growing awareness of the pharma industries’ efforts to develop and distribute COVID-19 vaccines. According to cybersecurity firm Critical Insights, the number of cybersecurity breaches in healthcare reached an all-time high in 2021, exposing an unprecedented amount of protected health information.

Cyber attacks can be highly damaging, both financially and to a company’s reputation. Therefore, it is essential that necessary steps are taken, both at a company and individual level, to understand and prevent the risk of cyber threats. But what does good cybersecurity actually look like? To help navigate the complex world of digital crime, Adarma’s threat consultant Mike Varley, KnowBe4 lead security awareness advocate Javvad Malik, CEO and founder of CyberSmart Jamie Akhtar, and senior engineer at Trend Micro Simon Walsh offer their insights into key trends and best practises for pharma companies.

Why is the healthcare industry a particular target for cyberattacks?

Javvad Malik (JM): Historically cybercriminals were after money, so they often ignored healthcare providers. However, with increasing sophistication within the criminal economies and the ability to monetise data through ransomware, other means of extortion, or resale, healthcare providers have become an almost ideal target for criminals.

Simon Walsh (SW): Despite statements from would-be attackers to the contrary, the healthcare and pharma industries became prime targets during the COVID pandemic, particularly for ransomware operators, as we saw during the breach of the Irish Healthcare Service Executive in May 2021.

There are several reasons for this: they’re seen as easy targets because of their relative lack of security maturity; the COVID pandemic-induced strain they’re already under makes them more likely to pay the ransom; and the fact that the data they hold – patient records – is extremely valuable and opens additional paths to extortion.

Jamie Akhtar (JA): Many healthcare providers have weak or limited defences. These range from poor staff awareness of threats to creaking, outdated operating systems and tech, but whatever the reason, cybercriminals are aware that many healthcare providers make for easy pickings.

Mike Varley (MV): We can expect to see a rising number of ransomware attacks on the healthcare sector. Healthcare is recognised as national critical infrastructure, which makes it an attractive target to malicious foreign entities looking to create chaos and harm. Similarly, when human life is put at risk by an attack, organisations are more likely to pay up, so attackers often view these structures as a quick pay-day.

Where do you see the most mistakes being made in healthcare when it comes to addressing cyber threats?

JM: Perhaps the biggest mistakes or challenges healthcare faces when addressing cyber threats are having outdated or unpatched software running, being too quick to purchase or adopt internet-connected devices without demanding rigorous security testing, and, finally, the lack of security awareness and training amongst IT staff.

SW: Security maturity and the ability to successfully detect and withstand attacks comes from understanding cyber risk and building and developing a cyber security strategy around that understanding. This of course needs to be adopted and driven by the board and C-level executives and too often this is not the case, with a lack of understanding and investment resulting in a weakened security posture.

Over-reliance on security technology without adequate human oversight further weakens this posture. The Irish hospitals who successfully prevented the attack in May 2021 were those who not just detected stages of the attack but also understood what those detections meant and acted as a result.

Developing a human oversight function – for example a Security Operations Centre – in house is costly, difficult, and takes time. So, for many in the healthcare/pharma industry, the quickest route to success on this front is working with the correct partner who will provide that function.

JA: There are two areas in which most organisations, not just healthcare providers, could be doing better. Many aren’t doing the simple things that can thwart most cyber-attacks. For example, regularly updating software and operating systems, using strong passwords and MFA, developing clear policies for staff to follow, and ensuring security tools are configured properly.

On top of this, employee awareness of cyber threats just isn’t widespread enough. An organisation can have the best cybersecurity software around but, if an employee doesn’t know what a phishing email looks like and clicks a malicious link, it’ll be hacked just the same. The way to counter this is basic cybersecurity training. It doesn’t have to be comprehensive, just enough to help your people make informed choices.

“Perhaps the biggest mistakes or challenges healthcare faces when addressing cyber threats are having outdated or unpatched software running, being too quick to purchase or adopt internet-connected devices without demanding rigorous security testing, and, finally, the lack of security awareness and training amongst IT staff.”

 

What trends are you seeing in cybersecurity at the moment?

JA: The most worrying trend is the rise in supply chain attacks. Cybercriminals have worked out that the best way to target large enterprises with solid defences, is to attack a smaller, less well-defended supplier who can give them a backdoor in. As a result, we’re seeing more major attacks originate in this way.

Alongside this, phishing continues to be the single most common form of attack. Due to the general lack of awareness in the working population, many organisations are still struggling to contain the threat.

MV: Increasingly I think we will see healthcare sector organisations turning to managed security service providers who have the expertise, capability, and technology to deal with an increasingly complex and harmful cyber landscape.

The healthcare sector is expected to provide an elevated level of cyber protection and with a shortage of cyber talent and the prohibitive cost of establishing a Security Operations Centre internally, organisations will need a trusted security partner that can provide that level of proactive protection.

What advice would you give to companies looking to improve their cybersecurity policies, both on a company-wide scale and individual basis?

JA: Above all, make them clear and easy to follow. Avoid technical jargon, where possible, as this will only disengage people. And, explain why the company has adopted the policies it has; your staff will find it much easier to follow them if they know why. Also, store them somewhere that’s easy to access from anywhere. There’s little use in a policy if it’s buried deep in a shared drive where nobody reads it.

MV: Cybersecurity policies should be informed by a threat-led approach. Regular threat modelling will highlight what threats you are facing and how adversaries are likely to target your organisation. With this information on areas of commonality, your security teams can focus on implementing layered security and monitoring.

Your policy should consider asset awareness. As basic as it sounds, it can be easy for a small handful of assets to fall under the radar within vast enterprises, which leads to out-of-date operating systems and software.

JM: Organisations should look to take a data-driven approach. That means, that in addition to following what is occurring externally in terms of attacks, they should look through a year or two worth of internal security logs to see what was the root cause of the incidents during this time period.

Once the root causes have been identified, they should be prioritised, and then controls be put in place to address those specific root causes. Those should inform the cybersecurity policies and tailor them to the specific risks the organisation is facing.

SW: For companies, start at the top and ensure that the board and C-level executives are capable of understanding and assessing risk. This will drive investment in cyber strategy and improve your chances of mitigating that risk. Human oversight of security-related activity in the organisation is also fundamental.

For individuals, heightened awareness and ongoing education are key. We all have a role to play in cyber-security as 100% reliance on technology is unfortunately never enough.

The post What does good cybersecurity look like in 2022? appeared first on .

Read More

Continue Reading

Crypto

WEF 2022, May 24: Latest updates from the Cointelegraph Davos team

The third day of WEF 2022 will see the OECD secretary-general share his thoughts on a reimagined global tax system and industry experts discussing DeFi…

Published

on

The third day of WEF 2022 will see the OECD secretary-general share his thoughts on a reimagined global tax system and industry experts discussing DeFi as the future of decentralized governance.

Disclaimer: This article is being updated all day long. All timestamps are in the UTC time zone, with updates in reverse order (the latest update is placed at the top).

WEF 2022, the first in-person World Economic Forum event since the pandemic started, continues to bridge traditional finance with the future of money on its third day.

The Cointelegraph ground team, including editor-in-chief Kristina L. Corner, head of video Jackson DuMont and news reporter Joseph Hall, is deployed in Davos, where the event is held, to get the most recent developments from WEF 2022.

Check out all the important details from May 23 in one easy-to-read page!

The third day of WEF 2022 will see the OECD secretary-general Mathias Cormann share his thoughts on a reimagined global tax system and industry experts discussing decentralized finance (DeFi) as the future of decentralized governance.

Crypto’s Carbon Footprint, one of the most anticipated sessions of the event, will see chief executives from FTX, Stellar Development Foundation, SkyBridge Capital, DataKing and Cambridge Centre for Alternative Finance talk about the environmental sustainability goals of crypto mining operations.

Don’t forget to check this article regularly to get notified about the most recent announcements from the event.

  • 08.30 am UTC

The ‘Strategic Outlook on the Digital Economy’ panel discussed building socially inclusive and environmentally sustainable economic growth. The panel included the likes of Nicholas Thompson, publisher and CEO of The Atlantic, Arvind Krishna, chairman and CEO of IBM Corporation, and Julie Sweet, CEO of Accenture.

The primary discussion revolved around the evolution of metaverse and its potential at the industrial level. Accenture CEO talked about numerous use cases of the virtual reality world and their future plans of integrating employees into the Accenture metaverse.

“Metaverse has a ton of potential and it could prove to be beneficial in many domains. 100,000 Accenture employees would be integrated into the Accenture metaverse over time.”

She went on to cite the example of the pandemic and how metaverse helped them connect and complete meetings in three dimensions.

IBM CEO Arvind Krishna talked about the role of artificial intelligence and augmented reality (metaverse) in handling tasks that are dangerous for the humans, citing the example of nuclear powerplants, which could be inaccessible in case of a tragedy, and this is where metaverse and AI could be of great help.

Read More

Continue Reading

Stocks

Bitcoin Back Below $30,000 After A Record 8 Weeks In The Red

Bitcoin decoupled from equity markets to the downside on Monday after ending last week as the eighth consecutive weekly loss.

Published

on

By

Bitcoin decoupled from equity markets to the downside on Monday after ending last week as the eighth consecutive weekly loss.

Bitcoin has failed to hold the $30,000 level on Monday after scoring its eighth consecutive week in the red for the first time ever.

During these eight weeks, which began in late March and ended on Sunday, bitcoin has lost over 35% of its U.S. dollar value according to TradingView data. Before the beginning of the losing streak, BTC was trading at around $46,800.

Bitcoin has scored losses for eight consecutive weeks for the first time in its history and it is starting the ninth with yet another red candle. Image source: TradingView.

Bitcoin is changing hands slightly below $30,000 at the time of writing. The peer-to-peer currency climbed as high as $30,600 earlier on Monday to trade at around $29,400 as the trading in equity markets nears its end in New York.

While bitcoin turns south, major U.S. stock indices have been in the green. The Nasdaq, which is said to be highly correlated with bitcoin, decoupled from the digital money along with the S&P 500 to denote modest gains near market close on Monday, per TradingView data.

While bitcoin, Nasdaq and S&P 500 were trading in tandem for some time on Monday, the P2P currency saw a sharp sell-off decouple it from the two indices and take it to a more than 3% loss for the day. Image source: TradingView.

A Tough Year For Bitcoin

Despite making two new all-time highs in 2021, bitcoin already erased nearly all of those gains in 2022.

Bitcoin’s choppy trading year so far can be partly attributed to a broader sentiment of economic uncertainty as the Federal Reserve tightens the U.S. economy, withdrawing liquidity from the market after almost two years of quantitative easing.

The central bank has already raised its basic interest rates two times this year, the last of which was double the magnitude of the previous one and represented the largest hike in two decades: While the Fed increased interest rates by 0.25% in March, it raised them by 0.50% earlier this month.

Image source: Federal Reserve Economic Data (FRED).

When the Fed raises or lowers interest rates through its Federal Open Markets Committee (FOMC), what it is actually doing is setting a target range. The graph above depicts the lower and upper bounds of that target range in red and blue, respectively.

While the U.S. central bank system sets the target, it cannot mandate that commercial banks use it — rather, it serves as a recommendation. Therefore, what banks end up using for lending and borrowing excess cash between them overnight is called the effective rate. This is shown by the green line in the graph above.

The Fed previously hiked interest rates consistently from 2016 to 2019, until plunging it near zero in the aftermath of the COVID-19 pandemic outbreak, as noted in the graph.

Bitcoin’s higher sensitivity to liquidity and therefore interest rates can be explained by a greater participation of institutional investors in the market, whose allocations are based on the availability of capital and broader economic conditions, Morgan Stanley reportedly said.

Therefore, while Bitcoin was able to sustain a bull market in the midst of the Fed increasing interest rates in 2017, raising nearly 2,000% from January to December that year, the odds aren’t on the side of the bulls this year.

For two weeks, bitcoin has now closed below a level of weekly support it formed over a year ago and had respected since, indicating it might be turning into a zone of resistance. Image source: TradingView.

Read More

Continue Reading

Trending