Friday, June 30, 2023

Make Superb Pickles by Burying Them in Rice Bran

When white Americans refer to “pickles,” they are usually talking about vinegary, sour cucumbers, but that’s a narrow, ahistorical understanding of fermented vegetables. Pickles originated in the East as a form of food preservation. One of the prime purveyors of pickles you may not be thinking about? Japan.

An embarrassment of Japanese-style pickles
Photo: Amanda Blum

Japanese pickles cover a startlingly wide array of preservatives—shiozuke (salt), shoyuzuke (soy sauce), misozuke (miso), kasuzuke (sake lees), or shibazuke (shiso)—the variety is endless and delicious. These pickles cover a range of flavor profiles one doesn’t usually get with the typical white American pickle experience, and it’s always disappointing to me how few Japanese restaurants offer tsukemono (pickles). When you see them on a menu, always order them.

The incredibly array of some of the Japanese pickles at Uwajimaya.
Photo: Amanda Blum

Nukazuke and nukadoko (nuka beds) have a long history in Japanese culture

Out of all of the pickles I’ve mentioned, none possess the legendary flavor of nukazuke (rice bran pickles). Rice bran is a byproduct of refining rice—it’s the outer layer of the rice itself—and it’s long been thought to have some nutritional value. In Japanese culture, that rice bran is fermented and used to create nuka beds. When vegetables are placed in the bed, they are effectively pickled by the fermentation process, really quickly.

But nuka beds are far more interesting than other pickling mediums, because they are an active ferment. Like your sourdough starter, they are prized family members, and families often travel with their nuka beds so they can care for the beds and make pickles wherever they go, to be good houseguests.

How to make a nuka bed

Most Japanese groceries, including H Mart and Uwajimaya, carry rice bran. You can either buy it without any additives, or already seasoned with salt and seaweed, so all you have to do is add water. It comes in a bag, and because the rice bran is not yet fermenting, it’s shelf stable.

Assuming you start with plain rice bran, you’ll empty a bag into a glass container and add non-iodized salt. Add 13-15% of the weight of the bran. Use 13% if you’re in a cooler climate, and 15% in warmer climates. Now add three cups of filtered water for every pound of rice bran and mix with your clean hands, not a utensil. Make sure it is all incorporated. The consistency should feel like something in between a paste and wet sand.

Next, you’ll add aromatics, and possibly a fermentation starter. If you know someone with a nuka bed, they can give you a bit of it to start your own, like with sourdough starters. If your favorite restaurant offers nukazuke, ask the chef about it; they might be delighted by your interest and willing to offer you a starter.

To flavor your bed, you want to add garlic cloves, ginger peels, kombu, chilies, and apple peels. Each serves a different purpose– apples add sweetness, kombu adds umami, and chilies keep pests away. Mix these into the bed and ensure they are fully covered by the nuka.

Fermentation usually happens on its own, but you can kickstart it with beer or bread, by adding small amounts to the nuka bed. For beer, add a tablespoon or two and mix it in; for bread, simply bury some small pieces in the bed, making sure they’re covered.

Put the lid on your nuka bed, and let it sleep overnight.

How to care for your nuka bed

The key to keeping your bed happy is to turn it every day. Twice a day if it’s really muggy and hot. Remember, ideal fermentation happens between 60-80℉, so you want to keep your nuka bed somewhere dark and cool, between those temperatures.

Once a day, turn your nuka with freshly washed hands. Mix it up, make sure everything in it is covered with nuka, then pat it down. The natural and good bacteria on your hands is what helps ferment the nuka bed. Give it a sniff once a day too; if it starts to smell yeasty, you’re not turning it enough.

How to use your nuka bed

Let the aromatics and fermenters hang out in your bed for a week, then remove them and start adding vegetables. It may take a while for them to pickle at first, but that speeds up over time. The more vegetables you ferment, the better your nukazuke will taste and the faster your bed will work.

To start, take some radishes, make sure they’re clean, and push them into the bed. Cover completely with rice bran and let ferment. Taste one every day as you turn the nuka, and return the rest to the bed. Once your reach that perfectly pickled sweet spot, remove the rest of the radishes and enjoy. You can do this with carrots, cabbage, cucumbers, pea pods, and all kinds of vegetables. The thinner they are, the faster they pickle.

On the left, everything about to go into the nuka bed, and on the right, all the vegetables, now buried in the bran.
Photo: Amanda Blum

As you pull vegetables out, dust off the nuka and give them a quick cold water rinse. They should be a little limp, as some of their water was drawn out of them by the salt in the bed, but still crunchy. They should be tangy, not just salty. If they are just salty, your bed isn’t fermenting, and you should kickstart it with bread or beer. You also don’t want to leave vegetables in there too long, because they will become too salty and can ruin the bed if they ferment too much.

How to put your bed to sleep

If you’re traveling and decide you don’t want to tote your nuka along, you can remove all the vegetables, pack the nuka down in the glass container, sprinkle the top with salt, and put it in the back of the fridge. That should stop the fermentation process long enough for you to vacation. When you return, remove the salt and keep the nuka outside of the fridge. The warmer temperature should kick start the fermentation, letting you pick(le) back up where you left off.


from Lifehacker https://ift.tt/hm4Ryjw

Your S'mores Are Begging for Bacon

My relationship with s’mores is muddled. Setting them on fire tickles my pyro-bone, but I get frustrated with the cloying sweetness of the marshmallow and questionable Hershey’s chocolate. One Friday evening I was pondering salted meats and it dawned on me: S’mores need bacon.

This is not your average “everything is good with bacon” plug. The sweet-on-sweet flavor profile of s’mores is desperately seeking salt and fat to pull it all into balance. To start the Bacon S’more—S’more Bacon? Still workshopping a title—I prepared a batch of extra crispy bacon. Ensuring the bacon is crisp allows the smoky meat to break apart easily when you bite into it. Chewy bacon is tricky in this arrangement, because you might pull out the whole piece in bite number one. However, if you love the chewy stuff, I suggest ripping the strip into pieces so there’s plenty for each bite.

The final arrangement of ingredients is up to you. I prepared a graham cracker with a piece of chocolate and half a strip of bacon, torn up, on top. Then I put the hot marshmallow on top of the bacon. If you like really gooey chocolate, and want to use the hot marshmallow to help warm up the bar, you could switch the placement and save the bacon for last. Heat your marshmallow however you please, and add it to the chocolate and bacon. Add the second half of the graham cracker and give it a press.


Get the perfect summer s’more set-up

A backyard fire pit: Mainstays 28-inch Fire Pit

Reusable skewers: Extendable Smores Sticks

Great bacon: Boar’s Head Smoked Bacon


The melty chocolate and sticky marshmallow keep the bacon in place, and the classic graham cracker brings much needed textural contrast, and a mild honey flavor. And the bacon? It’s a s’more phenomenon. One that excites your palate with salty and smoky flavors. Salty bacon nuggets and dripping chocolate make for an absurd, but delicious, giddy kind of mess.

The only change I would make next time (so, in 20 minutes) is I would decrease the chocolate and increase my bacon. This isn’t too surprising, since I like a more balanced snack anyway, and I wanted to taste more salt and smoke. Maybe a double marshmallow is more your style. Experiment with different ratios to see what you like. The unspoken rule of s’mores is that you should always make more than one.

Bacon You For S’more

Ingredients:

  • 2 strips of bacon, cooked crispy
  • 4 jumbo marshmallows
  • 4-8 squares of chocolate
  • 4 graham crackers, broken in half

Arrange four graham cracker halves on a plate. Top one with a chocolate square. Rip up half a strip of bacon and lay the pieces on top of the chocolate. Heat a marshmallow and lay it on top of the chocolate and bacon. Top with another half of a graham cracker and press. Repeat this to get four s’mores.


from Lifehacker https://ift.tt/0wKsNge

Talk to Your Kids About Your Estate Plan Now (and How to Do It)

Whether or not you watched Succession (how could you not?), it’s not hard to imagine how dealing with family money can be dysfunctional at best, and downright embittered at worst. Estate planning is a necessary process to help cope with loss—but even still, the decisions involved in estate planning are a recipe for tension and miscommunication among loved ones.

I spoke with Mitch Mitchell, associate counsel at Trust & Will, to understand all the ways things can go sideways if these matters aren’t discussed while the parents are still alive. Here’s what to know about discussing family money with your siblings before it’s too late.

Have clear communication about who will be the executor

Mitchell explains it’s common for one sibling to be the executor—aka the one appointed to carry out whatever the will says—while the other siblings must go along with those wishes. This means that the parent must make a decision as to who is in charge, which demands some advanced discussion while the parent is still alive. This is not just so the executor is prepared to step into that role, but so the other siblings are prepared for their roles, too.

After spending a decade in estate planning and probate work, Mitchell shares that a lot of bad blood comes from debate about who is in charge, why they’re the one in charge, and whether or not the one in charge is being forthcoming with all the information they have.

So, how do you avoid bad blood? Mitchell says it comes from having clear, proactive communication as early as you can. Let’s take a look at how that kind of conversation should take placce.

How to talk about your estate planning

Mitchell lays out a scenario where a mother names the middle child, not the eldest, as executor of their estate. This could because that kid physically lives the closest to the parent, or the mom feels they’re the most responsible kid, and so on. It doesn’t matter what her reasoning is—what matters is that it’s her estate and her decision.

Mitchell’s tip for parents hosting this discussion is to come prepared with not just the decision, but the reasoning that went into their decision-making. Even if it’s not the same choice every individual family member would make, parents can soften the blow by having an open discussion that gives everyone time to process. And even if your family shies away from “money talk,” now is the time to tackle that taboo. To overcome your discomfort, Mitchel describes embracing a new mindset where this is your family saying, “Hey, I love you, and here’s what I want you to do with my legacy.”

The main goal is to make sure all the decisions are already made and firmly understood before the estate owner has passed. Mitchell’s number one piece of advice: “Nothing should be a surprise.” This way, when the siblings are forced to deal with the administrative side of things, there’s no in-fighting. It’s just the nitty-gritty of accessing accounts and following what the will says. And here’s a glimpse of what that nitty-gritty involves:

  • Documents: Where are your parents’ important financial documents? Are they final? Who can access them?
  • Health: What are your parents’ desires for long-term care? Who will make end-of-life decisions? Is there money set aside for their end-of-life care and funeral expenses?
  • Personal property: How will it be divided? Who gets the house? How will jointly-held assets be managed?
  • Responsibilities: Who will help settle the estate? Will one sibling take on more responsibility than another?
  • Inheritance: How will any inherited funds be distributed? Are the funds held at a bank or brokerage?
  • Debts: Do your parents carry significant debt? Will the debt be transferred to one or multiple siblings?

The bottom line

Early communication is key to avoiding lengthy and irrelevant fights down the line. “Hurt feelings are inevitable when someone is disappointed,” he says, “but it doesn’t have to turn into a full-blown dispute in a probate court.”

And most importantly: What did Mitchell and other estate lawyers think about Succession? Apparently, it was “perfectly emblematic” of all the family problems you encounter when a major patriarchal presence dies. The “it’s not fair” mentality among siblings doesn’t go away with age. You can make a tough conversation a little easier by opening it up now, before it’s too late.

For more tips on all kinds of estate planning topics, check out Trust & Will’s resources here.


from Lifehacker https://ift.tt/8dJ4ksN

You Should Replace Windows 11's File Explorer With the Files App

The File Explorer in Windows 11 has been through a rough time. The redesign displaced familiar features; the right-click menu was truncated, and so were the options in the ribbons menu. A couple of updates later, things have improved and Windows 11 finally added tab support in File Explorer. But if you’re annoyed by the lack of consistency in the Windows 11 app, there’s a free, open-source and community-supported alternative to the File Explorer simply called the Files app.

Where to download the Files app for free

You can buy the Files app from the official Microsoft Store (also available for free from their website), and you can use it as a replacement for the Files Explorer. But before you do that, we suggest you create a backup of your computer and important files to be safe, given this is an app with permissions to directly edit all files on your computer.

The Files app has some great things going for it, starting with a dark mode that works independent of your Windows 11 theme. Like we mentioned above, the app has tabbed browsing built-in, and you can enable a feature that automatically opens all folders in new tabs.

The interface, by default, looks like a more polished version of the Windows 11 File Explorer app, but there’s a lot hiding beneath. You can enable a column view that looks similar to macOS Finder, and you can have a dual-pane view as well for quick file movement. The Files app also has quick file preview (something that required a specialized third-party app) so you can preview a photo without opening it in an app.

The Files app works with OneDrive and Google Drive by default, you can see all the files stored in your cloud storage account, and it can preview and unzip files. You can add support for other services like iCloud Drive and Dropbox.

You should spend some time poking around every corner of the Preferences, where you’ll find a lot of options for customizing Files—something that’s just not possible in the File Explorer app. You can choose exactly what shows up in the sidebar (hiding extra devices and sections you don’t need), and if you’re willing to get a bit nerdy, you can define the colors for each section of the app and turn the Files app into something like the Finder in macOS (instructions here).


from Lifehacker https://ift.tt/F9CKm7y

13 Anti-Patriotic Movies If You Arent Feeling the Fourth of July

It’s America’s birthday. But if you’ve watched the news, there doesn’t seem to be much to celebrate. That is unless you think inflation, greed, and prejudice are good things.

While many commentators and politicians believe everything is fine, you need only watch the right movies to hear otherwise. Whether it’s a documentary about the perversion of the 2nd Amendment or a stylized look at what’s really going on behind the white picket fences in a seemingly idyllic small town, the through-line for the following baker’s dozen films is a hard look at the problems the Founding Fathers probably didn’t anticipate when they signed the Declaration of Independence.

If you’re avoiding the flags and fanfare this holiday, here is a list of films that will set off fireworks (metaphorically). They won’t scare the shit out of your pets, but will give you plenty of reasons to act to improve our current state of the nation.


Bowling for Columbine (2002)

Bowling for Columbine Official Trailer #1 - Michael Moore Movie (2002) HD

According to the Bill of Rights, it’s an American’s privilege to “keep and bear arms,” although the country’s violent crime rate is higher than those of other nations. In this award-winning documentary, which gets its title from what the two students responsible for the Columbine massacre were allegedly doing the morning of the event, Michael Moore interviews everyone from Matt Stone of South Park fame to former National Rifle Association president (and actor) Charlton Heston to understand what leads to mass shootings. He uncovers plenty of hard truths and no easy answers.

Where to stream: Pluto TV, Tubi


Heaven’s Gate (1980)

HEAVEN’S GATE (1980) | Official Trailer | MGM

If you have the day off on July 4, you have plenty of time to watch the nearly four-hour director’s cut of this epic Western. It feels like an allegory of what America has become. Critically maligned during its initial release, the film, which stars Kris Kristofferson, Christopher Walken, and Jeff Bridges, revolves around cattle barons in Wyoming declaring war upon their county’s immigrant population. Violence ensues.

Where to stream: Pluto TV, Tubi, Prime Video (director’s cut)


Falling Down (1993)

Falling Down - Original Theatrical Trailer

Filmed as the 1992 Los Angeles riots were underway, this action dramedy follows old white guy William Foster, played by Michael Douglas, as he journeys across the urban landscape to visit his estranged daughter. Annoyed by his perceived lack of rights wherever he goes, including a convenience store and a fast food restaurant refusing to serve him breakfast minutes after it switched to its lunch, he destroys everything around him. Controversial during its release, parts of this film feel like a right-wing fantasy.

Where to stream: Digital rental


Blue Collar (1978)

Blue Collar Official Trailer #1 - Harvey Keitel Movie (1978) HD

The poster for this drama, directed by Taxi Driver screenwriter Paul Schrader, declares that if you’re rich, you can buy the American dream, but if “you’re anything else, you gotta fight for it.” That’s what three Detroit assembly workers, played by Richard Pryor, Yaphet Kotto, and Harvey Keitel, are trying to do. But when they aren’t battling the factory’s corrupt management, they’re arguing with their union or each other as they try to get ahead.

Where to stream: Showtime, digital rental


Idiocracy (2006)

Idiocracy 2006 Trailer HD | Mike Judge | Luke Wilson | Dax Shepard

Five centuries into the future, the president is a former pro wrestler and porn star and a sports drink company owns the FDA, FCC, and USDA. The country’s only hope is Joe Bauers, an average man forgotten in a top-secret government human hibernation program. When he wakes up, he’s the most intelligent person alive. Office Space’s Mike Judge co-wrote and directed this sci-fi comedy that somehow managed to predict some of the events of the last decade, even if its unspoken theme of eugenics rings a bit, uh, problematic.

Where to stream: Hulu


There Will Be Blood (2007)

There Will Be Blood (2007) Official Trailer - Daniel Day-Lewis, Paul Dano Movie HD

In one of the finest performances of his career, Daniel Day-Lewis plays Daniel Plainview, a corrupt early 19th century oilman who will do anything to become rich, including disowning his son and corrupting a preacher. If there’s one thing you take away from watching this masterpiece (besides how to drain an oil reservoir like a “milkshake”), it’s that capitalism and religion shouldn’t mix.

Where to stream: Paramount+, Pluto TV


Born on the Fourth of July (1989)

Born On The Fourth Of July Trailer 1989

Before he jumped from moving vehicles, Tom Cruise portrayed real life anti-war activist Ron Kovic. He becomes paralyzed while fighting in Vietnam, only to return home to a nation that has abandoned him. Director Oliver Stone, a veteran of the Vietnam War, uses Kovic’s story to show the realities of combat and how it can change a country and the men who fight for it.

Where to stream: Netflix, digital rental


Glengarry Glen Ross (1992)

Glengarry Glen Ross 1992 | Classic Trailer

Masculinity and desperation clash in this drama written by David Mamet, based on his play of the same name. The film revolves around a group of real estate salesmen who endure verbal abuse by their managers, causing them to question the lengths they’ll go to get ahead and if what they do matters. This cult classic, famous for Alec Baldwin’s monologue about how “coffee is for closers,” shows how capitalism corrupts workers and manipulates and dehumanizes consumers.

Where to stream: Amazon Prime, Hulu, Peacock, Pluto TV


Us (2019)

Us - Official Trailer [HD]

A lot is going on in Jordan Peele’s wild concoction about doppelgängers attacking their counterparts. This sci-fi horror film explores issues of privilege, classism, and the duality that has plagued our country since its founding. To reveal any more would ruin the fun. (“Fun.”)

Where to stream: Digital rental


Blue Velvet (1986)

Blue Velvet Official Trailer #1 - Dennis Hopper Movie (1986) HD

In the opening scene of David Lynch’s magnum opus, the camera moves beneath the surface of a neatly manicured suburban lawn to reveal the insects crawling and cavorting below. It’s a metaphor for what’s to come: an unsettling tour of the seedy underbelly of a seemingly picture-perfect small town that’s actually filled with violence, sexual temptation, and dark desires come to life. Anchored by an unnerving performance by Dennis Hopper, this award-winning film shows what really went on (or what it felt like was going on) in the shadows of Reagan’s America.

Where to stream: Max


Easy Rider (1969)

Easy Rider (1969) Trailer #1 | Movieclips Classic Trailers

The film’s trailer describes Peter Fonda’s character as a man “looking for America,” but he can’t find it anywhere. While this landmark independent film, directed by Dennis Hopper, is perhaps better known for its classic rock soundtrack, it drew the ire of many in power, with then-Vice President Spiro T. Agnew saying it was an example of the permissiveness of the 1960s counterculture.

Where to stream: Digital rental


Dead Presidents (1995)

Dead Presidents / Trailer / 1995

As one character states in this sophomore outing from co-directors the Hughes Brothers, “That’s Uncle Sam for you.” And much like Born on the Fourth of July, this film begins showing how the government glamorized war to recruit soldiers, only to ignore them when they came home from Vietnam. But when Anthony Curtis (Larenz Tate) fails at his attempts to adjust to civilian life, he hatches a plan to rob an armored car in the Bronx.

Where to stream: Tubi


Do the Right Thing (1989)

Do the Right Thing Official Trailer #1 - Danny Aiello Movie (1989) HD

In the more than three decades since its release, Spike Lee’s film (sadly) still feels relevant. Dedicated to the families of Eleanor Bumpurs, Michael Griffith, Arthur Miller, Edmund Perry, Yvonne Smallwood, and Michael Stewart (six Black people killed, with five at the hands of police officers), the film takes place on a sweltering day in Brooklyn when racial tensions at a local pizza joint are running high. The film doesn’t choose a side for the viewer. Rather, it starts a much-needed conversation.

Where to stream: Digital rental


from Lifehacker https://ift.tt/KeTyzso

Thursday, June 29, 2023

Why You Should Install an In-Wall Air Conditioner (Instead of a Window Unit)

Photo: Chad Robertson Media (Shutterstock)

Summer is here, and once more, higher-than-average temperatures are expected pretty much everywhere, which is fun. That means a lot of people are dreaming of air conditioning in their homes—but there are some drawbacks, especially if you lack a central air conditioning system. Window units can often seem precarious, remove a source of fresh air, and block sunlight. Portable A/Cs don’t work so well and also take up window space. And mini-split systems are great but can be expensive to install.

If you’re stuck with window units (or have a windowless room you’d like to cool down), you have one more option: an in-wall air conditioner. This is exactly what it sounds like: An air conditioner unit that goes through the wall instead of a window. This solution gives you the best of both worlds: a perfectly effective air conditioner and a window you can still open and that still lets in plenty of light. And it’s easier to install an in-wall A/C than you might think.

The benefits on an in-wall air conditioning unit

Installing your air conditioner through the wall has a long list of potential benefits:

  • Window access. When you install your A/C through the wall, you can still open the windows on cooler days, and you get your due allotment of sunshine. You can also cool down rooms without windows using this method.
  • Easier maintenance. An in-wall air conditioning unit doesn’t need to be removed during the winter months. If installed properly, it will be insulated and the edges sealed to keep the cold out.
  • More flexibility. Once you remove the window from the equation, you have a lot more options for locating your air conditioner. You can place it up high on the wall to keep it out of the way, or choose a spot on the wall that opens up the maximum amount of floor space.
  • Improved security. It’s much more difficult for someone to push a through-wall A/C unit in and climb into your house.

Here are some top-rated units, according to Bob Vila:


What you need to install an in-wall air conditioner

So, the days are getting hotter and it’s time for some A/C. Here’s what you need to install an in-wall solution and keep those windows clear:

  • A/C unit. You can buy A/C units designed to go through your wall. You can also generally install any window A/C unit through a wall simply by purchasing a properly-sized sleeve. An air conditioner sleeve is just a metal box that is installed into the wall for your A/C to slide into. Keep in mind that while most window A/Cs can go through the wall, units designed for in-wall installation generally can’t be placed in a window.
  • Tools. You don’t need anything fancy. You’ll need a way to cut the drywall, a reciprocating saw, a drill, a studfinder, and a caulk gun.
  • Materials. You’ll need some framing lumber, screws, and exterior window caulk. Having some expanding foam insulation on hand is also a good idea.

How to install an in-wall air conditioner unit

Installing the A/C is pretty straightforward:

  1. First, you’ll need to choose where the A/C will be installed. Choose a spot where it’s unlikely you’ll find wiring or pipes, and where your A/C will have easy access to a power outlet. Once you know generally where you’d like the unit to go, locate the studs in your wall. You’ll want to locate the opening between two studs. Measure the unit you’re installing—keep in mind you’ll be adding some wood framing around the sleeve, so incorporate the 1-½ inch thickness of 2 x 4s into your measurements—and mark the opening on the drywall.
  2. Next, cut out the drywall to expose the studs. Remove the insulation and inspect the wall—if there’s any hidden wiring or plumbing, you might need to choose a different spot. If you’re good to go, whip out that reciprocating saw and cut out any studs that are blocking the opening. This might seem terrifying, but your house is not going to collapse, and you’ll be installing some extra framing to compensate.
  3. Since you’ll also need to cut out the opening on the exterior of the house, it’s a good idea to drill through to the outside at each corner. You can use these holes as a guide when you cut.
  4. You’ll need to install a new header to support your wall. For this project, this can just be a 2 x 4 cut to fit between the studs on either side of your opening, with two jack studs sistered in to support it. Alternatively, you can build an entire frame out of 2 x 4s and slide it into the space you’ve cut (assuming you’ve taken the width of the framing into account).
  5. Now, cut out the opening on the exterior. Clean everything up, insert the A/C sleeve according to the installation instructions, secure it to your framing, and caulk all around it on the exterior. The sleeve should fit snugly in your new opening; if it’s a bit loose, you might need to use some expanding foam insulation to fill the gaps.

That’s it! It really shouldn’t take more than an hour or two, and doesn’t require any real carpentry skills beyond the ability to measure twice, cut once, and drive a few screws. Adding some trim to the interior to make it look nicer is optional, or might be included with the A/C sleeve kit you purchased.

Now you can enjoy cool climate-controlled air any time you want while having plenty of natural light and access to fresh air.


from Lifehacker https://ift.tt/bJ1ySZO

Keepit launches backup and recovery service for Microsoft Azure DevOps

Keepit launched new backup and recovery service for Microsoft Azure DevOps.

“Azure DevOps has limited disaster recovery coverage. If a company loses its Azure DevOps data, it loses access to development operations, which means it loses the ability to track, document and deliver what software it’s building. Those losses can have a severe impact on the development team’s productivity and ability to deliver to its customers,” said Paul Robichaux, Keepit’s senior director of Product and a Microsoft Most Valuable Professional (MVP).

DevOps is a set of practices that combines software development (Dev) and IT operations (Ops) and is characterized by key principles of shared ownership, rapid and continuous deployment, workflow automation, and rapid feedback. It is a way of thinking, collaborating and driving effectiveness and efficiency in software development, with a goal of delivering software more quickly while maintaining high quality.

Azure DevOps (ADO) is Microsoft’s solution for implementing DevOps and supports a culture and set of processes that bring together developers, project managers, and individual contributors.

Tools available as part of the Azure DevOps suite include Azure Boards, a standalone service that helps teams plan, track and discuss work across the entire software development process, and Azure Pipelines, which provides build and release services to support continuous integration and delivery of applications.

With its simple, fast and flexible Azure DevOps backup and recovery service, Keepit safeguards these workloads against large-scale disasters and provides its customers with the following:

  • Immutable storage of data in Keepit’s ISO 2700-certified private cloud, providing long-term immutable archive or escrow copy of sensitive ADO data
  • Granular protection that delivers speedy recovery, including for accidental deletions or changes, to minimize disruption to mission-critical activities
  • Compliance with various data protection regulations
  • The most comprehensive protection and quickest recovery for Azure DevOps Boards and Pipelines data and metadata​
    • Protection for Azure boards – including work items, boards, backlogs, team sprints, queries, and delivery plans
    • Restoration with full metadata, including comments, custom fields and attachments
    • Rapid restoration of critical continuous integration and continuous development/deployment (CI/CD) automations and Pipelines to a known-good state​

Robichaux added, “Keepit’s fine-grained, incremental coverage protects against both ‘Oops’ scenarios and large-scale incidents. Our Azure DevOps backup and recovery service will enable businesses to protect their software development operations as an add-on to the coverage we offer for Microsoft’s cloud services. We are excited to include this in our already robust stable of offerings for our clients.”


from Help Net Security https://ift.tt/A6m7kRG

Wednesday, June 28, 2023

Astrix Security raises $25 million to further secure non-human identities

Astrix Security has secured $25 million in Series A funding led by CRV with participation from existing investors Bessemer Venture Partners and F2 Venture Capital. This new investment brings Astrix’s total funding to almost $40 million.

Fueled by the increased adoption of automation and generative AI initiatives, the enterprise’s connectivity to third-party applications is growing, resulting in an increase in cyber attacks targeting non-human app-to-app connections (via API keys, access tokens, service accounts, etc.) – as seen in high profile attacks against CircleCI, Mailchimp, GitHub, Microsoft, and Slack.

Despite financial instability within the market, Astrix is experiencing exponential year-over-year growth and momentum as a leader in securing this growing threat vector. The company recently added Figma, Priceline, Bloomreach, Rapyd and many others to its customer roster and was recognized as a finalist in the 2023 RSA Innovation Sandbox contest.

The business also doubled its headcount, and will use this funding to continue expanding the team in both the U.S. and Tel Aviv offices, including its research team who recently discovered GhostToken, a critical 0-day vulnerability in the Google Cloud Platform.

“We founded Astrix to close a significant and unaddressed security gap, by allowing security teams to extend access management and threat detection to the non-human identity layer,” said Alon Jackson, CEO at Astrix.

“It’s amazing to experience the tremendous adoption by security teams, as well as see Astrix’s capabilities become essential to their every-day security arsenal. We look forward to continuing to expand our capabilities and partnerships, allowing organizations to truly reap the benefits of third-party services, especially Gen-AI apps, without compromising security,” added Jackson.

The enterprise environment depends on a vast web of interconnected apps, supported with an average of 10,000 app-connections for every 1,000 employees. More so, with AI-powered apps being downloaded 1506% more than last year, and often connected by employees across departments without the security team’s knowledge, having visibility and governance into every third-party connection is virtually impossible.

While existing solutions focus on securing user-connections, Astrix focuses on securing app-to-app connections, allowing the enterprise to ensure their core systems are securely connected to each other and to third-party services.

“As a growing threat vector, there has been a shift in the market to focus on third-party connectivity,” said James Green, General Partner at CRV. “Astrix caught our eye for their innovative approach to extending IAM and threat detection to all non-human identities, giving unprecedented capabilities to manage the growing API-based third-party attack surface across all environments.”

“Partnering with Astrix from inception, we’ve seen the vast impact they’ve had on the industry in a short amount of time,” said Amit Karp, Partner at Bessemer Venture Partners. “From raising awareness to this growing attack surface to supporting some of the leading companies in the world, we’re excited for what’s to come as Astrix expands and continues protecting customers from the next supply chain attack.”

“The progress Astrix has made from seed funding to now is incredible,” said Jonathan Saacks, Managing Partner at F2 Venture Capital. “The company has made a mark on the industry already, and with the wealth of knowledge and experience from this team, we are confident they will continue to be the security asset every business needs and relies on in their toolbox.”


from Help Net Security https://ift.tt/wFo2sYc

How to Get Your Kid to Like What You Like

When I was a kid, my science fiction-loving dad decided we were going to watch 2001: A Space Odyssey. I did not understand this long, complex, boring movie. I certainly did not appreciate it like he did. As a result, I thereafter refused to experience some of his favorite other movies, TV shows, and music. Only in retrospect do I really how heartbreaking this probably was for him.

Now that I’m a parent, I have made it my mission to get my kids to like what I like without alienating them from my interests, and for the most part, it has worked out, but it’s definitely a tricky business. So I talked to Jessica Beachkofsky, a psychiatrist and parent coach, who helped break down the steps to properly incept your kids with your own hobbies and interests.

Start them young

This is perhaps the most critical step in the process. You have to hit the sweet spot: They’re old enough to understand or participate in whatever content or activity your promoting, but not so old that they find the idea of spending time with you embarrassing. Flexibility is key hereL “Find ways to scale the activity so that they can still find it fun and interesting even if it means that you don’t get to do it the way you normally would,” Beachkofsky advises. Be careful to judge both the material and your child’s maturity level to ensure they have the greatest chance of accepting it willingly.

Start by exposing them to small doses. If you’re showing them a favorite movie, for example, “You may have to leave at intermission or half-time if your kids would normally be napping or going to bed,” Beachkofsky says. My own daughter currently loves Stephen Sondheim, an adoration I orchestrated by taking her to Into the Woods, Jr., a short version of the acclaimed musical that ends happily. At this point, she’s not only able to sit through the three hour touring production (so good), but is begging to see Sweeney Todd.

Beachkofsky advises to think about all aspects of the day you plan to get them involved in whatever your thing is—the long walk from the car, the loud crowds, how long you’ll be spending from start to finish—and prep them beforehand so they know what to expect, which will lessen chances they’ll become bored or overwhelmed. Another strategy she recommends: Start with some chill at-home activities related your passion, such as playing dress up or pretend, to orient them beforehand, especially if you plan to take them out somewhere. These small steps are “good for brain-building no matter what the ultimate activity is,” Beachkofsky adds.

Create buy-in

Include your child in all aspects of the activity so they understand it and feel like a true participant. “Build more buy-in by getting [them] involved in the preparation, and they gain a deeper understanding of all the aspects of doing an activity,” Beachkofsky says. The behind the scenes facts will make them feel like an insider.

Then, work together to plan and execute the activity. Pick a date, buy tickets or supplies together, even coordinate your outfits. This process not only gets them more invested, it, “exposes them to skills that will help them overall in life too: planning, organizing, and other important executive brain functions,” Beachkofsky says.

Model joy

When your child sees you happy, it makes them happy. Seeing you light up when your favorite song comes on the radio or hearing you cheer for your favorite team will inspire them to find joy in the same subjects. Modeling enjoying yourself may inspire them to participate and get the same effect.

Thant means you have to make time for your own interests, even if that means time spent away from your kids. Being with your kids in their world all the time will not show your child that it’s okay to have individual passions. You taking time to experience your favorite things will set them up to find their own joy, whether it’s with what you like or what they gravitate to on their own.

When they show interest in your special thing, hit them with specific positive reinforcement. Tell them how brave they were for playing goalie, or praise their singing of your favorite song. Let them see how happy you are that they are enjoying your passion.

Make the time together special

Make it a special occasion to do the activity, whatever it is, together. If appropriate, let your kid stay up late for the special experience, or make a date of it with just the two of you, minus siblings.

Make the activity about them and their interest, not you. Then it won’t feel like they’re doing you a favor by participating. Coach their Little League team and use watching your favorite professional team’s games on TV as an opportunity to study form. My Sondheim kid has the same birthday as the late composer, so my initial hook was to call him her “birthday twin.” Then we talked about which part she’d play in Into the Woods. Later, I took her to the show for her birthday, leaving her brother behind. It made my daughter feel special to be included in a grown-up activity we’d planned for her.

Reciprocate interest in their hobbies

Getting them excited about what you like means you have to show reciprocal interest in their hobbies (even if it’s Roblox). As Beachkofsky says, “They may humor you [by exploring what you want them to], but it goes both ways. Role-model being interested and excited about doing something new to you that your kid is interested in.” Have them play the expert and explain it to you. You may actually learn something new, or even gain a genuine interest in it. Active participation in their passions will make them feel like you’re sharing yours for their benefit, not your own.

Beachkofsky adds that engaging with your kids’ interests helps them build the skills of communication, planning, and empathy, even as it strengthens your bond. “That buy-in [will be] gold the next time you feel like dragging them out on the fishing boat,” she says. They’ll remember how patient you were with their explanation of all the PokĂ©mon evolutions, and will feel better about joining you on your adventure.

“What if they still don’t like what you like?

It may be the case that despite all your hard work to get your child to like what you do, they still don’t. This may be because of personality differences—not all kids are natural fashionistas or born Trekkies. It may be that you did what my dad did and didn’t take into account the age-appropriateness of the material. It could be that you missed the sweet spot, and now your child finds everything you do cringe, especially when you say “cringe.”

Beachkofsky advises, “If they’re not enjoying it, try to find out why. Don’t force them to keep at it for too long because a meltdown won’t be far behind.” If you feel like it was close but didn’t go as you liked, she adds, “It’s also important to talk about what didn’t go as expected or how the experience could be improved next time.” Then, when everyone’s ready, try again.


from Lifehacker https://ift.tt/CREf5FI

Bitdefender acquires Horangi Cyber Security to expand its unified risk and security analytics platform

Bitdefender has agreed to acquire Horangi Cyber Security to address the growing demand for advanced, streamlined management of cybersecurity, compliance, and governance of multi-cloud environments.

As organizations continue to accelerate cloud adoption, they struggle to manage the thousands of configuration settings and permissions, identities, and entitlements presented by multiple cloud providers.

According to Gartner, “Misconfigured cloud resources continue to be a primary reason for cloud-related data breaches.” A single point of insight and control across multiple hybrid-cloud environments simplifies the application of configuration management and least privilege for organizations.

With this acquisition, Bitdefender will incorporate Horangi’s Cloud Infrastructure Entitlement Management (CIEM) and Cloud Security Posture Management (CSPM) capabilities into the Bitdefender GravityZone unified risk and security analytics platform to add critical compliance and governance capabilities to Bitdefender’s leading threat prevention, protection, detection and response capabilities.

Additionally, Horangi’s security services offerings, including proactive risk assessment, red teaming, and penetration testing, will integrate with and complement Bitdefender Managed Detection & Response (MDR) services.

“We are pleased to announce our intent to acquire Horangi Cyber Security, a strategic move that will amplify our risk analytics, threat detection and response capabilities in the cloud and complement our GravityZone platform to help business customers combat evolving cybersecurity threats as the attack surface grows,” said Florin Talpes, CEO of Bitdefender. “The addition of Horangi is a major milestone in our product strategy execution and aligns with our mission to be the most trusted cybersecurity platform worldwide.”

Horangi Cyber Security was founded in 2016. Its flagship platform, Horangi Warden, is a cloud-native solution that secures critical cloud infrastructures for hundreds of enterprise organizations across all major public cloud platforms including AWS, Azure, and Google Cloud.

“This acquisition represents a strategic partnership built on shared values, a commitment to innovation, and a vision for the future,” stated Paul Hadjy, CEO of Horangi Cyber Security. “Horangi has focused on delivering strong business outcomes for our clients with best-in-class cybersecurity consulting services and our flagship cloud security platform, Warden. By leveraging Bitdefender’s broad cybersecurity portfolio, our customers can expect an even greater level of service, accelerated innovation pace, and exceptional cybersecurity outcomes in the cloud and beyond.”

“In addition to Warden, Horangi has developed leading CREST-accredited cybersecurity consulting services that continuously keep global customers compliant and secure from advanced threats. The addition of Bitdefender MDR services is an important and valuable evolution of this service provision,” Hadjy added.

In a 2023 report, Gartner noted that “CSPM is commonly purchased as part of a cloud-native application protection platform (CNAPP) that includes broader cloud security capabilities such as cloud workload protection platform (CWPP), cloud infrastructure entitlement management (CIEM), Kubernetes security posture management (KSPM), cloud detection and response (CDR).”


from Help Net Security https://ift.tt/EpRjclW

Tuesday, June 27, 2023

Get Unlimited Access to 80 Upskillset Courses for 80% Off

If you want to learn a new skill, you have plenty of options online, but watching YouTube videos and reading tutorials doesn’t work for everyone. If you don’t do well with completely self-guided learning, you might benefit from a more traditional online class.

Upskillist is a learning platform that’s home to over 80 online courses that could help you boost your career or explore a new hobby with courses that do more than just toss you a few videos to sit and watch. Right now, you can get lifetime access to all of Upskillists courses for $80, 80% off the regular $400 rate.

Lifetime access to 80+ courses

This lifetime membership gives you access to all Upskillist courses. Course topics run the gamut from professional development to detailed hobby guides. A student enrolled with Upskillist could expect courses on photography, UX Design, Excel, cybersecurity, investing, childcare, fitness, and creative writing, among many others.

For professionals, the service provides a low-cost way to expand your skills on your own time. Some courses even give you a printable certificate to advertise your mastery over the associated subject matter.

Keep in mind that Upskillist courses run on a schedule and take place online. If you sign up for a jewelry design course, you’ll be given the times in which that class meets. Classes typically include four modules, with eight 30- to 50-minute classes per module. Some classes also have weekly assignments, and there is no penalty for rescheduling. You can view the full course catalog before enrolling.

Save on a lifetime of learning

This lifetime membership gives you access to all courses with free course materials for each lesson. There is no recurring subscription fee, but some extra resources come at an additional cost.

Right now, get a lifetime membership to Upskillist for $80 (though prices may change at any time).


from Lifehacker https://ift.tt/btTsmox

Those SmileDirectClub NDAs Are Void (So You Can Talk About Your Experience Now)

Photo: Thamyris Salgueiro (Shutterstock)

If you received a refund from SmileDirectClub in the last few years due to dissatisfaction with their invisible orthodontic aligners and agreed to keep it confidential, you no longer have to stay quiet about it. In a settlement announced last week, SmileDirectClub customers who were previously unable to discuss their negative experiences with the company were released from nondisclosure agreements. That means that around 17,000 dissatisfied consumers are now free to share their complaints publicly, including on social media.

The controversy about at-home orthodontia

At-home orthodontia is attractive due to its convenience and (much) lower cost compared with braces or aligners that require regular dental visits. SmileDirectClub sends you a DIY impression kit, and all follow-up is conducted via virtual appointment. The total cost is less than half of more traditional aligners or braces that involve in-person orthodontist or dentist appointments. However, patients report mixed results, and dental pros from the American Dental Association (ADA) and American Association of Orthodontists (AAO) have frequently criticized and even fought to restrict or ban these services.

SmileDirectClub, which offers at-home, direct-to-consumer orthodontic aligners, has received ongoing criticism from customers who are disappointed with the results of the product (at best) or required more dental work to fix problems created by the process (at worst).

Were refunds really tied to nondisclosure agreements?

The New York Times in 2020 reported that SmileDirectClub was requiring customers who requested refunds due to these concerns to sign confidentiality agreements as a condition of receiving their money back, meaning they weren’t allowed to disclose the refund and had to delete negative comments and reviews about the product. SmileDirectClub claimed it didn’t require a nondisclosure if customers requested their refund within 30 days of receiving their aligners.


from Lifehacker https://ift.tt/4ruhbgE

How to Get Free Grape Leaves (and What to Make with Them)

Consider the underestimated grape leaf. Each year, grape vines are cut back, and turn brown and woody, then emerge vivaciously fresh with green shoots in the late spring. These vines grow aggressively each year, taking over any structure they can. The grapes are the focus, but the leaves shouldn’t be overlooked. They are versatile and delicious in ways you aren’t thinking of, and are the foundation of some smashing summer treats.

How to find grape leaves for free

You can walk yourself into most grocery stores and buy grape leaves, in a jar, ready to go. A jar ranges from $4-$12, and you only get fifty or so leaves. I’ve got no complaints about the taste, but the cost usually prohibits people from using them more. If you can lay your hands on real grapevines, then an endless supply of leaves is yours for the taking, for free.

Most of us don’t grow grapevines (although, I would lobby that just one vine is a great addition for reasons I’ll outline below), but they’re not hard to locate, because: wine. That’s right, somewhere near you is a vineyard. I know this because I’ve been to some very shitty places and there’s still, somehow, a vineyard nearby. Also, people grow grapes pretty much everywhere, and often they are overwhelmed by the fruit and the vines, and are happy to find others to help. They have no use for those leaves, so they’re unlikely to object to someone taking some.

Find them the way I recommend finding most things: through local gardening groups on Facebook, Discord or Reddit. Don’t bother looking for posts about grape leaves, no one posts about them, you’ll need to post saying that you’re looking for someone who’ll let you grab some grape leaves, and that you’ll only take a few from each vine, and it doesn’t hurt the grapes at all (we’re going to leave enough to keep those grapes covered). As a note, you want to be sure these grape vines aren’t sprayed.

The pale green leaf is perfect, the dark green leaf is too mature for eating.
Photo: Amanda Blum

Once you locate some grape vines, you’re going to look for leaves using two criteria: You want them to be large enough to wrap something with, and you want them to be bright green instead of army green. The darker, thicker leaves don’t make for good eating, so we’ll stick to the bright green younger ones. Usually, this is leaves 3-5 on a vine.

To pick them, you just pluck them off, stem and all, taking care to not hurt the vine. You want to ensure any baby grapes have coverage from a leaf, so you shouldn’t overpick. Take as many as they’ll let you (they store well), throw them in a bucket and head home.

How to Preserve Grape Leaves

In particular, the sought after “pint-and-a-half” ball jars are perfect for saving grape leaves, and they’re the same size as the grape leaf jars you buy in the store. Take all your leaves, face them the same way, then put them in a bucket with water, and give them a good swish to clean them.

Set an 8-quart pot on the stove and fill it with water. Add 8 tablespoons of canning or other non-iodized salt to the water and stir to dissolve. Allow it to come to a boil, then a simmer. Divide your leaves into stacks of fifty or so leaves. Take a pair of tongs, and grasp the leaves at one end, and dip them into the water, and hold them there, with the tongs, under water for 12-15 seconds. They’ll turn dark green quickly. Bring them out of the water, shake them off, and lay them on your cutting board. Repeat this with all the leaves.

Once they’re cool enough to work with, you’re going to take your stack, fold the bottom up, then fold both sides in and tightly roll the leaves into a cigar shape. Use a piece of twine to tie the cigar so it holds its shape, then it goes into the jar. The jar should hold a few cigars worth, so stuff them in there.

Now, add ¼ teaspoon of citric acid to the jar, and ladle in the water from the stockpot, leaving a half-inch of headroom at the top. Put a clean lid on, then process it in a water bath for ten minutes. This means you get a large stock pot that will hold the jars in one level, lay a towel in the bottom of the pot, and fill the pot with hot water. Place the jars in, packed tightly but all on one level, and ensure the water covers them by a few inches, and then slowly bring the water to a boil, covered.

Once at a rolling boil, start the clock and let boil for ten minutes, then turn the stove off and let the pot come to room temperature, then remove the jars. As long as the lid has suctioned on thirty minutes after the jar has been removed, it has been safely processed and is shelf-stable. Each jar is worth at least $6-$8, and encourages you to make more with grape leaves over the year.

How to Use Grape Leaves

If you have access to raw grape leaves, they have a few uses. The tannic acid in them makes them a common addition to pickles. Like oak leaves, the tannins help keep your vegetables crispy through the pickling process. You simply add a leaf to the top or bottom of your jars and process them. It’s why it’s handy to have even a lone grape vine at your place.

You can also use fresh or brined grape leaves as a wrap around your cheeses, to add more flavor to them. Personally, once they’re brined, I love to wrap scallops with them and then grill them, or just wrap fresh mozzarella with them for a little extra oomph. They’re tender and soft, but the brininess is what really makes them magical.

Non traditional stuffed grape leaf with cooked rice, slivered almonds, pickled nasturtiums, fresh sorrel and other herbs being rolled into dolmades. These were not cooked afterwards, but served fresh, at room temperature.
Photo: Amanda Blum

But the main reason people buy grape leaves is to make dolma, or dolmades– stuffed grape leaves. These Turkish or Greek delights are the ideal for summer snacking or as lunchtime treat. They’re a phenomenal option for picnics or potlucks because they’re essentially finger food. Traditionally, you’d wrap the leaves around a rice mixture, then roll them into small cylinders, and it’s common for dolmades to come in vegetarian and meat options.

The vegetarian option, usually served cold, is a lemony rice with pine nuts and capers, served with a yogurt sauce for dipping. The less vegetarian version is lamb mixed with the rice, served hot, with a thick, tangy lemon sauce that’s similar to avgolemono. As a wrapper, the grape leaves add a sweet brininess, and if you choose the leaves right when picking them, aren’t stringy at all in texture. You bite right through them with ease.

But you can also break free of tradition and stuff them with any grain for a light, summery appetizer or snack. Roll leaves with cooked cous cous, pickled red onions, sliced almonds and feta, as pictured above, for a fresh take. This chickpea and bulgur recipe has just enough bite from the crunchy parsley to be really refreshing. The Turkish version of dolmas usually has tomatoes in it, and with the summer flush coming in, you can augment those with diced yellow squash and zucchini in the mix, and add a little extra spice from harissa.

About once a month I make more traditional lamb and beef dolmades, which I pack into the fridge for snacking on, but always end up eating obsessively for every meal until they’re gone. They make it worthwhile for me to drive once a year just outside town to visit someone I found in my gardening group, years ago, who grows a few kinds of grapes at his home, and lets me come out to pick leaves. It’s worth it for the free leaves, which make this usually expensive treat affordable, but also because it’s how I meet interesting people. Enjoy this recipe.

Amanda’s Stuffed Grape Leaves

  • 100 grape leaves you canned yourself, or two jars of grape leaves from the supermarket
  • ½ lb ground lamb
  • ½ lb ground beef, 90% lean or more
  • 1 large yellow onion
  • 1 large clove of garlic
  • 4 ounces of capers
  • ½ cup of pine nuts (optional, you can exclude if they’re out of your price range or substitute with slivered almonds)
  • 2 cups of uncooked long grain white rice
  • 6 cups of stock (because lamb stock is impossible to find, I use a rich chicken stock)
  • ¼ cup of lemon juice
  • 1 tbsp cumin
  • 1 tbsp oregano
  • 1 tbsp Salt
  • Pepper to taste

Peel the onion, quarter it and put it into your food processor with the peeled garlic and pulse it to make a paste. Add the onion, beef, lamb, rice, nuts and capers to a large bowl and combine thoroughly. Add the spices and the lemon juice and mix again.

Unpack your leaves, and lay them flat in a stack on your cutting board. Get a heavy bottomed stock pot out and put it next to you. Place a layer of grape leaves in the bottom of the pot, just enough to cover it.

The bottom of the pot layered with grape leaves, and the first layer of stuffed leaves going in.
Photo: Amanda Blum

Now, take one grape leaf, and lay it flat on a cutting board, with the stem facing you. Cut or pinch off the stem, and place a heaping tablespoon of the filling in the bottom third nearest you. Wrap the bottom of the leaf up and over the top, moving away from you. Now fold both the left and the right side of the leaf in, around the filling, and then gently roll the leaf away from you, around the filling.

Place the rolled leaf, seam side down, in the stockpot. Repeat with the other leaves, packing them in tightly, until the layer is full. Then start a new layer and continue until you run out of leaves.

Place a plate, just smaller than the pot itself, upside down on top of the dolmades. This should weigh them down. Now pour the stock over them, making sure they’re completely covered. Put the lid on the pot and slowly bring it to a boil over medium-high heat, then quickly reduce it to simmer. Simmer with the lid on for 45 minutes to an hour. You’ll know it’s done when the liquid is gone.

Transfer the dolmades one by one to a container to store in the fridge. When you’re ready to eat, you simply reheat them (they’re very microwavable) and either add a dash of salt and pepper, or make a lemon sauce.

Lemon sauce for Stuffed Grape Leaves

  • 1 tbsp cornstarch
  • 1/4 cup lemon juice
  • 1 large egg
  • 2 cups of rich chicken stock
  • A handful of fresh chopped parsley or 1 tablespoon dried parsley flakes

Add the cornstarch to ½ cup of the stock and set aside. If you let it sit for a few minutes, the cornstarch will rehydrate and be easier to mix in. Meanwhile, put the rest of the stock in a pot on the stove, and add the lemon juice. Allow the pot to come to a boil, then reduce to a simmer. Use a fork to mix the cornstarch into the stock you set aside, making sure there are no lumps, and then add this to the pot, and mix in well.

In a separate bowl, crack the egg and whisk it really well. Grab a ladle, and while you are whisking the egg, slowly drizzle in a tablespoon or two of the hot stock mixture. It should not curdle the eggs if you’re whisking constantly, but will temper them. Repeat this process until you have a cup of the hot stock in the egg mixture. Add the egg mixture to the pot, and continue whisking the sauce. Allow it to cook at a simmer for 6-8 minutes, until it has thickened enough to coat a spoon. Then pour it over your dolmades, top with the parsley, and live your best life.


from Lifehacker https://ift.tt/5W3wMar

Cequence Security strengthens API protection platform with generative AI and no-code security automation

Cequence Security announced new updates to the Unified API Protection (UAP) platform that strengthen customers’ ability to discover, manage risk and protect APIs.

With the latest capabilities, organizations can rapidly deploy API Security Testing with built-in generative AI automation, protect users from online fraud and operationalize security findings with low-code/no-code workflows.

“We are always exploring ways to further automate and improve our UAP solution and help our customers consolidate the tools required to stay ahead of the threat actors,” said Ameya Talwalkar, CEO. “The updates to our platform continue to set us apart from other point solution vendors in the API security space as we are providing our customers with the only integrated best-of-suite approach to discover, comply, test and protect their APIs.”

“Today, we are also excited to share we are the first API security vendor to take advantage of the game-changing Generative AI and no-code security automation within our UAP solution to better protect users from online fraud and simplify security findings,” continued Talwalkar.

Enhance API security testing with generative AI

With the enormous potential of generative AI tools like ChatGPT and Google Bard, Cequence is one of the first cybersecurity companies and the first API Protection company to leverage its power to protect data and users from bad actors.

Cequence has added several new capabilities to API Security Testing, including Test Plan generation using a new feature called Intelligent Mode that helps automate the generation of API Security Test Plans using plain English, extending the low-code/no-code approach to test case generation.

Cequence UAP’s Intelligent Mode automatically associates the appropriate APIs with the right test cases, given the functionality of that API. This not only drastically reduces the time needed to create a test plan to minutes, as compared to months with other solutions, it also ensures consistent experience across a customer’s entire applications and environments.

Several other enhancements include detailed insights and remediation workflows into test failures. The test catalog now has test cases for the latest OWASP API Top 10 2023. Cequence also empowers InfoSec teams to run API tests outside of CI/CD pipelines, and instead, point attack test suites directly against staging or even production servers.

New fraud prevention capabilities

To enable organizations to protect their APIs from online fraud, Cequence has introduced the Fraud Prevention module in API Spartan. The new module enables organizations to protect their end-customers from online fraud and instantly take action, including blocking transactions and generating enterprise-grade notifications to relevant teams.

Protecting applications and users against online fraud complements the existing capabilities of Cequence to detect and block business logic abuse, account takeover (ATO) attempts, common OWASP API Top 10 security risks and automated malicious traffic.

Operationalize API protection with low-code/no-code security automation

Cequence has introduced out-of-the-box integrations with over 300 third-party apps, including ServiceNow, PagerDuty, JIRA and Slack. Using off-the-shelf connections to these apps, security analysts can ensure security risks or threats are routed promptly to their business teams for remediation.

Security analysts can use a low-code/no-code approach within Cequence to implement the equivalent of an API Security Orchestration and Response (SOAR) workflow, wiring together multiple third-party connections to achieve their desired outcomes.

Using this approach, analysts can operationalize workflows that promptly remediate critical API security risks, such as the discovery of shadow APIs that have access to sensitive data and new security risks of weak authentication or non-conformance to OpenAPI specifications in newly built pre-production CI/CD pipelines.

Enhanced visibility of external facing APIs with API Spyder

New enhancements to API Spyder enable customers to easily identify APIs that are externally accessible, but not entirely protected by Cloud Security Posture Management (CSPM) infrastructure. Additionally, this approach offers a seamless complement to API Sentinel’s deep insights into runtime API inventory and compliance checking using the OWASP API Security Top 10 and other custom risk categories.

With the latest Unified API Protection platform updates, organizations can now protect their users from online fraud, operationalize security findings with low-code/no-code API SOAR-like workflows and rapidly deploy API Security Testing with built-in Generative AI automation.

These capabilities continue to set Cequence apart from other point API security, bot management, anti-fraud and WAF vendors by having the industry’s first and only Unified API Protection platform that covers the entire API lifecycle. With UAP, customers can discover with API Spyder, comply with API Sentinel and protect with API Spartan.


from Help Net Security https://ift.tt/kJQMAeR

Index Engines CyberSense 8.3 identifies malicious changes indicative of cyberattack

Index Engines announced CyberSense 8.3, which features several user experience updates highlighted by additional metrics after a ransomware attack is detected, a new setup wizard and system configuration interface.

CyberSense 8.3

CyberSense scans backup data and snapshots to validate their integrity and identify malicious changes indicative of cyberattack. When an attack occurs, CyberSense provides forensic reporting to diagnose and recover to normal business operations.

CyberSense’s user interface displays rich details on every attack, including the nature of the attack (e.g., strong encryption with known ransomware extension), suspect files (i.e., files with indications of ransomware corruption), file metadata, etc.

In release 8.3, CyberSense will expand this to report on all files – not merely suspect files – that were added, deleted and modified across all hosts within the backup sets for that alert. This enables the user to view, at a glance, the scope of the attack.

“Our customers’ primary focus is securing their data center and having a last line of defense, which is CyberSense,” said Jim McGann, VP of Index Engines. “Along with providing them unmatched confidence that they can trust their data and recover when necessary, we want to provide them with a superior, intuitive user experience. 8.3 gets us closer to that goal, but we are always raising the bar.”

CyberSense 8.3 also adds a 5-step setup wizard where new customers can easily upload their license, manage their index and customize alerts.

New and existing customers can also check various system settings on the new Configure interface which also offers the option to modify the current settings that were configured during the initial setup process. Prior to this release, configuration of these settings were located on various screens.

Also, in CyberSense 8.3:

  • Support for Hyper-V VM backups on Dell Networker
  • Support for SAP HANA on Commvault
  • New Syslog enhancements that allow integration with Splunk and other SIEM products for streamlined reporting of potential attacks

CyberSense 8.3 is available now to Index Engines OEM partners.


from Help Net Security https://ift.tt/WuHqNXV

Delinea Privilege Manager enhancements reduce phishing effectiveness

Delinea announced the latest release of Privilege Manager, its solution for providing privilege elevation controls for users and applications on workstations.

Delinea Privilege Manager enhancements

The latest enhancements significantly improve ease of use for customers by preconfiguring five of the most common privilege elevation policies through the Workstation Policy Framework to simplify implementation and accelerate time to value.

The 2023 Verizon Data Breach Investigations Report found that phishing makes up 44% of all social engineering incidents. According to the U.S. Cybersecurity & Infrastructure Security Agency, 70% of attached files or links containing malware were not blocked by network border protection services, and 84% of employees took the bait within 10 minutes of receiving a malicious email.

Using this method of attack, bad actors compromise the endpoint, elevate privileges, and move laterally within the network to find data and exfiltrate it.

Without the appropriate privileged access controls in place on workstations, organizations are susceptible to phishing, even with other security solutions in place. Privilege elevation policies must be set for users and applications to better protect against malware that could be delivered through phishing scams.

Simplified workstation privileged access policies lead to better security and less friction

Privilege Manager enforces just-enough privileges to support approved business activities while blocking or restricting privileges that malware could exploit. This approach reduces friction and enables productivity while simultaneously optimizing security.

Based on Delinea’s deep expertise and customer feedback, the new Workstation Policy Framework includes five of the most common policies to help customers quickly build a foundation for privileged access controls and create a baseline of security on Windows and Mac workstations without disrupting user productivity. Existing customers can compare their policies with the framework and introduce those that may be missing in their environments.

The five preconfigured policies included are:

Malware attack protection: This policy prevents Living Off the Land Binaries and Scripts (LOLBAS) attacks from being executed by commonly exploited parent applications. LOLBAS is a method of attack that misuses tools and executables that are already in place because they are part of the Operating System.

Allow Microsoft signed security catalog: This policy allows Microsoft-signed security catalog application installers to run. It can be combined with blocklist policies to prevent legitimate Operating System applications from being blocked.

Software development tools: This policy targets common software development solution system processes, including child processes, and minimizes delays caused by requesting privilege elevation.

Visual studio installers: This policy pre-approves and silently elevates four defined Microsoft Visual Studio installers.

Capture application elevation attempts: This policy targets non-Microsoft applications that trigger a UAC prompt and sends policy feedback to evaluate policy adjustments that can allow, elevate, or block applications.

Effective protection against malicious code impacts developers and IT administrative tools

Another major enhancement in this release provides granular control over the ability to add, modify or delete users on workstations through PowerShell, even in PowerShell sessions with fully elevated privileges. This reduces the risk of developers and IT administrators abusing PowerShell’s capabilities and can lessen the impact of malicious code and ransomware. Such granular control of add, modify, and delete operations also significantly reduces the risk of lateral movement by a bad actor.

“Security solutions are only valuable if they are usable and don’t compromise business productivity,” said Dmitriy Ayrapetov, VP of Product Management at Delinea. “Our mission is to make security seamless and with this release of Privilege Manager, which leverages customer feedback, users can enjoy easier policy management, better security, and less friction for an accelerated time to value of our solution.”

Additional updates in this release include the flexibility to allow workstation users to control firewall settings and accessibility improvements in the user interface.


from Help Net Security https://ift.tt/VJiaSkh

BeeKeeperAI raises $12.1 million to accelerate AI development on privacy protected healthcare data

BeeKeeperAI has closed $12.1 million in Series A financing. The round was led by Sante Ventures, with participation from the Icahn School of Medicine at Mount Sinai, AIX Ventures, Continuum Health Ventures, TA Group Holdings, and UCSF.

The new funding will be used to expand the features of its EscrowAI platform as well as broaden commercial operations.

“BeeKeeperAI is poised to drive the adoption of zero-trust, confidential computing capabilities by enabling secure collaboration workflows between AI developers and stewards of privacy protected information,” said Michael Blum, MD, CEO of BeeKeeperAI.

“With this funding, we will expand the capabilities of EscrowAI and capitalize on the rising demand for zero-trust computing environments that power AI development. Market forces within healthcare and other regulated data industries, powered by the growing demand for AI solutions, including large language models such as ChatGPT, have created the ideal opportunity for BeeKeeperAI to expand our leadership position in the confidential computing space. There has never been a better time to invest in further development of software-as-a-solution (SaaS) that leverages the secure capabilities of confidential computing,” added Blum.

BeeKeeperAI is addressing the challenges of data sovereignty, security, privacy, and intellectual property (IP) protection as an increasing number of organizations endeavor to build software applications that unlock the power of AI on privacy protected information.

Global cybercrime costs are expected to reach $10.5 trillion by 2025, and no data is more sought after than those from regulated or security industries, including healthcare.

Privacy regulations also continue to evolve with stringent requirements and geographical differences, creating the need for zero-trust environments to protect both privacy protected information (PPI) and IP.

“Our investment in BeeKeeperAI evolved out of a multi-year search of identifying companies that we believe could significantly accelerate the adoption of AI in healthcare. We believe their proprietary and patented EscrowAI platform solves a major problem for both healthcare data stewards and AI solution providers and can significantly streamline data partnership and collaboration timelines. We are pleased to lead this financing round and support BeeKeeperAI’s work in providing zero-trust workflow solutions to enable computing on real-world data,” said Dennis McWilliams, Partner at Sante Ventures.

“We look forward to deploying EscrowAI to further secure the privacy of Mount Sinai’s data, and our confidence in EscrowAI is evidenced by our investment in BeeKeeperAI. The deployment will streamline collaborations to positively impact health and well-being for patients and society,” said Erik Lium, PhD, Chief Commercial Innovation Officer at Mount Sinai and President of Mount Sinai Innovation Partners.

Combination of BeeKeeperAI’s SaaS workflows and Microsoft Azure confidential computing

BeeKeeperAI recently announced the general availability of EscrowAI, its patent-protected, zero-trust collaboration platform. EscrowAI seamlessly integrates Azure confidential computing capabilities, resulting in a push-button ease in deploying a zero-trust workflow to support AI development and deployment.

In healthcare, EscrowAI enables HIPAA-compliant research on real-world data without exposing the patient data, thereby dramatically reducing the time required to complete the required approvals and contracting.

“As a health tech and longevity focused venture fund, we strive to identify opportunities where AI and data can move us away from a sick care model. With BeeKeeperAI, we are very excited to back founders that understand the global complexity of regulatory (patient privacy) and the dynamic, rapidly evolving nature of medical knowledge. This solution will help to ensure that comprehensive and representative datasets will train the next generation of AI with patient safety, data integrity and clinical efficacy prioritized,” said Ricky Mehra, General Partner at Continuum Health Ventures.

As a member of Microsoft for Startups and Microsoft’s Pegasus program, BeeKeeperAI is using Azure services within EscrowAI, which is available to Microsoft customers as an option to purchase directly from Microsoft, simplifying their procurement process.

BeeKeeperAI solves data access challenges with EscrowAI platform

BeeKeeperAI’s EscrowAI is a patented collaboration workflow solution that sets a new standard in sightless computing. Within the zero-trust workflow the PPI and IP are encrypted: at rest, in transit, and in process.

The platform leverages a hardware-based secure enclave environment to bring together the encrypted data and algorithm where they unencrypt in protected memory and execute the computation. Only a predetermined output is allowed out of the enclave.


from Help Net Security https://ift.tt/Yg6WCuz

Monday, June 26, 2023

How to Talk to Your Kids About Guns

This post is part of our “Big Talks” series—a guide to helping parents navigate the most important conversations they’ll have with their kids. Read more here.

My family doesn’t own any firearms, but I live in Arizona, where I witnessed someone bring a gun into a children’s fun center just because they could. And considering my state’s laws regarding open and concealed carry, as well as its fascination with firing ranges at strip malls, the chances one of my children will play in a home with a weapon inside seems high, if not inevitable.

I know I need to introduce the concept and hazards of firearms to my children, but I’m unsure how to start the conversation. So I spoke to several experts about how to raise awareness about the dangers of guns and what to do if they ever encounter one.

Set boundaries

From James Bond’s Walther PPK, the video game Doom, and the curving bullets in the film Wanted, popular media does romanticize guns and how they’re used. Because children are unaware of the hurt these weapons can actually cause, you might want to set boundaries around what your children watch and the toys they play with.

“We have to have age-appropriate, open conversations with our children about the difference between what happens in a movie, video games, or television versus what happens in real life,” says Dr. Alison Tothy, a pediatric emergency medicine physician at the University of Chicago. “As they get older, you’ll have to frame the conversation differently.”

You have to talk to your kids about guns, even if you don’t have one

You may not have a pool, but you still teach your kids how to swim because there will be a time when they’ll need to know how. According to a 2020 Gallup report, 32% of U.S. adults stated they own a gun, and 42% reported living in a gun household. That is one in three American homes with a gun, so even though you don’t own one, the chance of your child being somewhere with one is high.

According to VeryWell Family, the conversation around firearm safety should start around preschool age to help remove the mystery around them. But even if you impress upon your child the danger of handling a weapon, they are naturally curious, so there’s a good chance of them touching one should the opportunity present itself.

If your child is visiting another home for a playdate, you should ask the other parent if there are guns in their home—and it’s a tricky question because its purpose can be misunderstood.

“The intent of the question is, ‘I want to keep my kids safe,’” Tothy says. “You want your kids to go somewhere else sometimes, but perhaps, if it’s not safe, you can invite their child to your home instead.”

For ways to educate yourself about firearm safety or start the conversation with your kids or other parents, visit The BulletPoints Project and Be Smart.

Teach kids how to be safe around guns

If there’s one thing Tothy wants to impress on the parents of families with guns in their homes regarding gun safety, it is to practice what you preach. This can include going to a shooting range and demonstrating all the ways you’re being safe, explaining why you’re not performing target practice at home, and keeping ammunition locked away separately from firearms.

“I take care of kids all the time who find a gun on the table or under the bed,” and it looks like a toy,” Tothy says. “You want to make sure they know not to touch a gun. If a friend picks up a gun, run away.”

Explain what to do if they find a gun

Dr. Kelsey Gastineau, a pediatric hospital medicine fellow and clinical instructor at Vanderbilt University Medical Center, recently heard a story from one of her colleagues about when they asked their child what they would do if they saw a firearm. The child’s response surprised both Gastineau and her colleague.

“She said, ‘If it was my friend, I would take it away from him immediately because I would never want him to be hurt,” Gastineau says. “And [my colleague] replied, ‘I love that you want to protect your friend, but that is actually not what I want you to do in that situation.’”

Gastineau shared that the colleague told the child if they or a friend encounter a weapon, they should immediately put it down and find an adult. Yet not a week goes by in your news feed where there’s a story about a child injured by a gun despite being told to do the right thing. Gastineau suggests not to overcomplicate your message.

“Keep it simple and straight to the point,” she says. “But as kids grow older, the firearm might belong to the child for hunting purposes. Parents need to explain why they can’t have access to their firearm without an adult present.”

Tothy adds that you can prepare for any situation by having an open conversation with your children in a non-threatening tone that is free of punishment.

“Have them imagine and play with any scenarios,” she says. “It can help the threat feel more realistic.”


from Lifehacker https://ift.tt/FZU7cCk