The US State Department has improved its cybersecurity in the past few years, but it still falls short of federal standards, the department's watchdog said. Among other things, the watchdog found that the department's chief information officer didn't have the power needed to implement security measures.
Protecting enterprise networks is no longer the streamlined task of IT administrators who have a handful of reliable tools at their disposal, says Microsoft's Satya Nadella. Instead, he says the process of cybersecurity now requires an ecosystem of resources aligned to a single goal. "When it comes to detection, it's no longer, for example, waiting to detect a signature and then coming up with a response and then deploying the remediation," he says. "We now have moved to much more of a behavioral approach, where we can detect based on the behavior of the attack vector."
Dell says some recently shipped laptops have a security flaw that may let hackers read encrypted messages and reroute browser traffic. The flaw is related to a support certificate installed on some Dell laptops since August, a spokeswoman said. The company will provide instructions to fix the vulnerability.
Disney has launched its own on-demand streaming service in the UK. It features Disney and Pixar movies, TV shows, audio and e-books, and a 5,000-song library. Dubbed "DisneyLife," the service is not available yet in the US due to Disney agreements with other streaming services, such as Netflix, but it will be expanding to other European markets soon.
Microsoft's recent merger and acquisition deals with several Israeli cybersecurity companies have boosted it as a leader in the $77 billion cybersecurity market, which is expected to rise to $170 billion by 2020, Steve Morgan writes. "We recently predicted there's going to be knock-down, drag-out brawls between security contenders IBM, Dell, Cisco and others in 2016. Count Microsoft in," Morgan writes.
Health care executives are confronting significant challenges in their ability to secure patient data, and they need to begin implementing end-to-end security standards, among other fixes, to bring their IT infrastructure up to speed. That was the assessment at a recent CIO summit hosted by the Scottsdale Institute, which also identified critical weaknesses in third-party vendor systems.
Nearly 400 representatives from 33 countries participated in NATO's five-day cyberdrill in Estonia, which focused on identifying malware and debugging mobile devices. "The idea is to replicate dynamics and threats that are real," said Lt. Col. Christian Braccini.
Deutsche Bank has joined the list of companies seeking alternate forms of identifying customers with a plan to trial an advanced biometric system designed by Callsign. The solution harnesses a collection of fail-safes to authenticate users, including technology that reads the unique way each individual handles their phone.
Analysts say hackers are modifying their attack strategies against enterprises, relying less on advanced and persistent threats, or APTs, and instead increasing adoption of simpler brute force malware and breaches designed to generate financial returns through ransom. "Rather than investing in bootkits, rootkits, and custom malware that gets burned by research teams, we expect an increase in the repurposing of off-the-shelf malware," write analysts from Kaspersky Lab in a newly released bulletin.
- Page 1