Enterprise IT
Top stories summarized by our editors
8/16/2019

Strategy executive Michael Ferris, a 19-year veteran at Red Hat, says his company's culture has not changed since IBM's $34 billion buyout. Despite much industry speculation about culture clash once the deal closed, "It's about finding out what this means, the ways we can work together," he said, adding, "Our intent is to keep things as separate as possible when it makes sense."

More Summaries:
Red Hat, IBM
8/16/2019

Foldable phones and 5G technology will drive the future of the tech device industry, says Jessica Dolcourt, a CNET senior producer. And in the case of 5G, the applications will go far beyond fast smartphone downloads, with uses including remote surgery, smart city connections and autonomous-car safety.

Full Story:
TechRepublic
8/16/2019

Cryptocurrency thefts totaled $4.26 billion in the first six months of 2019, compared with $1.7 billion for all of 2018, according to CipherTrace. The cryptocurrency intelligence firm said hackers often employ multiple tactics -- including SIM swapping, phishing and URL hijacking -- to seize user and administrator accounts.

Full Story:
Forbes
8/16/2019

US Cyber Command has released a malware sample linked to North Korean hackers, uploading it to a security research database and offering a glimpse into the cybertactics of the APT38 financial-crime hacking group. A leaked UN report says North Korea is funding its weapons programs with the help of more than $2 billion stolen in cyberattacks.

Full Story:
TechCrunch
8/16/2019

The Hong Kong Science Park is home to 350 tech companies, including specialists in building information modeling and other technology for smart cities. Simon Wong, chief project development officer at the park's parent company, says the goal is to "collect valuable data to enable future innovation" on a smart campus through the use of artificial intelligence, big data and the internet of things.

Full Story:
BIM Today (UK)
8/15/2019

The cybersecurity landscape changes daily with new means of attack, so cybersecurity professionals have to stay on top of their game, writes security specialist Roger Grimes. He outlines 12 broad categories of expertise that cybersecurity professionals need, including basic common defenses, cryptography, authentication and an understanding of cybercriminals' motives.

More Summaries:
Roger Grimes
8/15/2019

Microsoft has alerted Windows 10 users that they must update their operating systems because of two critical vulnerabilities. Those who manually update can access the tool by searching for "Windows Update," while those with automatic updates enabled are protected.

Full Story:
CNN
More Summaries:
Microsoft
8/15/2019

The Seattle woman charged with the Capital One data breach is suspected in dozens of other attacks, federal prosecutors say. Investigators found stolen data from more than 30 unidentified organizations, including schools and businesses, but unlike the Capital One breach, which exposed the data of more than 100 million people, the other breaches do not all involve personal information.

Full Story:
The Associated Press
8/15/2019

Hackers at the DEF CON conference in Las Vegas were given rare access to the F-15 fighter jet's systems, and they uncovered numerous vulnerabilities that could be exploited to disrupt the aircraft in flight. Will Roper, the Air Force's top acquisition official, said the flaws were the result of years of cybersecurity neglect during product development, a problem the Air Force is working to fix.

More Summaries:
Air Force, Will Roper
8/15/2019

Managed security service providers and channel partners must work to better secure biometric data after the discovery that the Suprema BioStar 2 database breach exposed millions of records, writes Pam Baker. She notes the importance of third-party vendor access security and diligence in checking consumer transactions, and she warns against reliance on biometrics and artificial intelligence.

Full Story:
Channel Futures
More Summaries:
Pam Baker