The cybersecurity plank of the Republican Party's platform states that the US must avert a "cyber Pearl Harbor" by going on the offense when it comes to cyberstrategy and foreign policy, which has many security and policy experts concerned. This rhetoric, if acted on, "may prove detrimental to global stability in the long run," one expert said.
Cybercriminals are bundling banking Trojans with legitimate downloads, which often succeed in tricking administrators into bypassing warnings from security software. "There is no problem with detecting the malware," said Vasily Berdnikov, a security expert at Kaspersky. "The problem is that, in this case, the malware came packed with legitimate software.
More than 30 schools in New Zealand are recovering from a massive hacking of their servers, which an official blamed on connected devices with weak passwords. Access to the servers was placed for sale online by a Russian hacking group, officials said.
More than $1 trillion of total IT spending will be able to be traced back to cloud in four years, Gartner predicts. This year, value of what Gartner calls the "cloud shift" will hit $111 billion and is on pace to reach $216 billion by 2020.
Salesforce has purchased Coolan, a startup that makes software for data analysis. "[T]he Coolan team will help Salesforce optimize its infrastructure as it scales to support customer growth around the world," Coolan's Amir Michael wrote in a blog post.
Skycure has received $16.5 million in Series B funding, bringing its total backing to $27.5 million, to boost its enterprise-grade cybersecurity platform for mobile devices. "Mobile is the biggest challenge to enterprise security today and it requires vastly different considerations than desktop, network, or even cloud security," said CEO Adi Sharabani.
William Yasnoff, a managing partner at NHII Advisors, said hospital chief information officers and chief information security officers can use for free a personal grid approach he created to help them prevent data breaches. The personal grid tactic is a methodology used to organize data within a traditional relational database management system; it stores each record of information in a separate file, which is individually encrypted with its own encryption key, Yasnoff said.
The increased connectivity of passenger airlines makes them vulnerable to potential safety issues that had not even been conceived of when the Federal Aviation Administration began overseeing the industry. FAA Administrator Michael Huerta says the agency is in the process of reassessing standard practices, including air traffic control and communications, to identify weaknesses that could open back doors to hackers.
ARM, Symantec and other companies have come up with the Open Trust Protocol, an industry standard for cybersecurity in internet of things devices. "In an internet-connected world, it is imperative to establish trust between all devices and service providers," said Marc Canel of ARM.
The Bunker is revamping its partners' mission with the hope to bring on 12 new partners to provide assistance with sales and technical training, marketing support and lead generation. "We see the channel as a critical part of our go-to-market strategy, and we need the right partners in place to reach specific sectors and verticals that require specialist knowledge and skills," The Bunker's Adrian Williams said.
- Page 1