There were twice as many security breaches in the US financial industry in 2015 as in 2014, with more than 25% of attacks traced back to lost or stolen devices, a Bitglass report states. Five of the 20 largest US financial institutions and 32 other banks reported security leaks in the first half of this year, with JPMorgan experiencing repeated breaches for almost a decade.
The intelligence community is focusing on integration and data sharing, with the main focus behind Intelligence Community IT Enterprise being sharing data within the community, not just the agency that compiles it. "This is really a revolutionary idea," IC executive Jennifer Kron said, adding that before, agencies didn't have standardized security procedures.
EMC has released a Native Hybrid Cloud on VCE VxRail 200 and 200F appliances that could make the development of cloud-native apps faster. The platform can "be tailored to specific needs while providing the benefits of a converged solution," said an IT analyst, and will offer many software options.
CrowdStrike is among a group of cybersecurity firms that have agreed to share their own information and integrate with VirusTotal, an Alphabet-controlled database on malicious software. The move comes after VirusTotal told companies they would be cut off from receiving information from the database if they do not contribute something of their own.
The recent leak of National Security Agency files by Shadow Brokers calls into question the security of virtual private networks, particularly in the case of weaknesses associated with Cisco's PIX product, which was discontinued in 2009, Thomas Fox-Brewster writes.
Public comments are due this week on a petition before the Federal Communications Commission calling on regulators to create a framework for ensuring the cybersecurity of connected automobiles. The FCC began taking comments in June at the behest of lawmakers and advocacy groups that say the auto sector needs cybersecurity and privacy standards.
CryptoTrap is TrapX Security's newly released deception technology that helps prevent cyberattacks and protect an organization's valuable data by having ransomware encrypt decoy data. The tool allows health care organizations to detect and manage threats before they affect data and networks.
Courts may not uphold the coverage of phishing incidents under companies' existing cyberrisk policies, writes Peri Mahaley. "Frequently, insurers assert that there is no coverage because the loss did not proximately result from the fraudulent hack, but rather from the intervening actions of duped individuals," Mahaley writes.
VMware has established alliances with Dell, PTC, Deloitte Digital, Bayshore Networks, Intwine Connect and V5 Systems in an effort to bridge the gap between developers and IT. "Our work with these companies will be important in helping businesses meet their strategic needs for IoT applications, analytics, hardware and services, ultimately extending their reach from the data center and cloud to the edge," says VMware's Bask Iyer.
- Page 1