Inside Advanced Scale Challenges|Tuesday, February 28, 2017
  • Subscribe to EnterpriseTech Weekly Updates: Subscribe by email

U.S.: Cybersecurity Must Go Beyond Passwords

U.S.: Cybersecurity Must Go Beyond Passwords

If indeed we are operating in a "digital economy," standard security measures such as passwords are no ...

Wanted: IoT Interoperability, Security Specs

Wanted: IoT Interoperability, Security Specs

Yet another survey, this one by an Internet of Things standards group, emphasizes the need for interoperability ...

Cyber Skills Gap Grows Along With Threats

Cyber Skills Gap Grows Along With Threats

A corporate job opening typically draws as many as 250 applicants with varying qualifications. In stark contrast, ...

Startup Targets Runtime Container Security

Startup Targets Runtime Container Security

Promising stronger and faster security for application containers in production, a startup has unveiled a new continuous ...

Security

February 23, 2017(0)
If indeed we are operating in a "digital economy," standard security measures such as passwords are no longer sufficient to shield the underlying IT infrastructure from sophisticated hackers, asserts a panel of U.S. experts and advocates of "multi-factor" authentication technologies. A report released late last year by the U.S. Commission on Enhancing National Cybersecurity warns: "For now, technological advancement ... Full article
February 22, 2017(0)
Yet another survey, this one by an Internet of Things standards group, emphasizes the need for interoperability and security standards as more devices are connected. Moreover, the survey of consumers by the Open Connectivity Foundation (OCF) uncovered growing demand for interoperable devices and communications along with security certification in the wake of several high-profile hacks involving IoT networks. OCF ... Full article
February 14, 2017(0)
A corporate job opening typically draws as many as 250 applicants with varying qualifications. In stark contrast, a new survey of the growing cyber security skills gap reveals that just over half of U.S. companies looking to fill corporate IT security positions receive five applications. Of those, fewer than one in four candidates possess the qualifications companies are seeking. ... Full article
February 10, 2017(0)
In advance of next week’s big RSA data security show in San Francisco, we’ve received a bevy of security product announcements from companies leveraging data analytics, AI, behavior analytics and machine learning to automate threat detection, many of them touting breach prevention, rather than post-breach investigation, capabilities. “While most of this is not totally new, we expect to see ... Full article
January 31, 2017(1)
Promising stronger and faster security for application containers in production, a startup has unveiled a new continuous security approach based on adaptive behavioral learning. The approach is said to secure distributed applications delivered via containers at their most vulnerable point: in production environments where deployed and scaled across hosts and datacenters. Virtualization and security veterans from Cisco Systems (NASDAQ: ... Full article
January 25, 2017(2)
A new infrastructure vulnerability study confirms what became apparent late last year: botnets are exploiting inherent security weaknesses in Internet of Things (IoT) devices. The infrastructure security report released by Arbor Networks Inc. also warns that the release of botnet source code has greatly expanded the ability of hackers to launch distributed denial-of-service (DDoS) attacks. "The massive growth in ... Full article
January 17, 2017(1)
Threat actors are getting better, faster, and more efficient at compromising networks, taking only minutes or less to breach systems. Unfortunately, organizations are taking weeks, if not longer, to discover these breaches. In fact, over the last decade the “detection deficit” – the time it takes adversaries to compromise networks vs. the time it takes those organizations to discover ... Full article
January 11, 2017(0)
Responding to growing concerns about cloud security and data governance across different platforms, Google is expanding its cloud security options with the release of encryption key management service. The Cloud Key Management Service is intended to broaden encryption options on the Google Cloud Platform as the shift to multi-tenant cloud services expands. Google (NASDAQ: GOOGL) said Wednesday (Jan. 11) ... Full article
December 9, 2016(0)
Securing the contents of application containers based on Docker and other platforms has relied heavily on isolating individual containers from one another along with other access control approaches. Now, a data security vendor is proposing an encryption scheme that, for example, extends "data-at-rest" security capabilities to Docker encryption and those access controls. Cyber and data security specialist Thales on ... Full article
December 7, 2016(1)
A flurry of industry surveys have flagged open source and unlicensed software as growing security threats. Moreover, a review released by Flexera Software also found that the very security products designed to protect IT infrastructure are themselves riddled with vulnerabilities embedded in open source software. While agreeing that malware is a growing threat, other observers counter that the culprit ... Full article
November 17, 2016(0)
The steady shift toward purchasing IT "as a service" is accelerating the decentralization of infrastructure management, fostering growing security concerns as more enterprises shift operations to the cloud, according to study commissioned by VMware Inc. The company (NYSE: VMW) pointed to growing concerns about IT fragmentation and the resulting security gaps to pitch its "cross-cloud architecture" designed to help ... Full article
October 28, 2016(0)
As enterprises seek ways to nail down IT security for a growing list of open-source infrastructure distributions, the security sector is moving toward critical mass with an increasing number of acquisitions. This week's deal between software license optimization vendor Flexera Software and security and compliance specialist Palamida Inc. was followed by the acquisition of an application container security startup ... Full article
October 27, 2016(0)
Seeking to spot potential security vulnerabilities in systems that increasingly rely on open source software, software license optimization vendor Flexera Software has acquired a specialist in identifying potentially vulnerable software components. Flexera, Itasca, Ill., said Thursday (Oct. 27) it is acquiring San Francisco-based Palamida Inc. Terms of the transaction were not disclosed. The deal represents an expansion of Flexera's ... Full article
October 12, 2016(0)
Security remains the greatest barrier to cloud adoption as more mobile applications are hosted by outside software and infrastructure service providers, according to a new survey. The vendor poll released this week also found that only 10 percent of cloud migrations have been completed as enterprises struggle with a host of security issues. The digital transformation survey released Wednesday ... Full article
October 11, 2016(0)
U.S. government agencies' slog to the cloud, a journey that has lately been complicated by a new set of security requirements designed to fend off an outbreak of "nation-state" cyber attacks, registered some modest progress this week when another cloud services provider announced it had achieved "ready status" under a federal cloud security initiative. CloudPassage Inc., a security platform ... Full article
September 28, 2016(0)
As more data, enterprise applications and other workloads move to public clouds, greater attention and investment are going into cloud security as a way to protect data while managing information and cloud services. Those services in particular are attracting investment capital. Among the latest startups to reap that windfall is cloud data protection startup Druva Inc., which on Wednesday ... Full article
September 22, 2016(0)
As more data and enterprise applications are moved to public cloud services, a surprisingly high number of enterprises responding to a new cloud security survey said they are not encrypting their data and other cloud workloads. The cloud adoption survey of more than 400 executives spanning a variety of industries who attended the recent VMworld conference found that 28 ... Full article
September 19, 2016(2)
The brick and mortar of an industrial Internet of Things is arriving with a security framework designed to balance the safety and reliability requirements of industrial operations with an attempt to define the "trustworthiness" of emerging manufacturing networks. An industrial IoT security blueprint released on Monday (Sept. 19) by a two-year-old industry consortium stresses five characteristics for bullet proofing ... Full article
September 13, 2016(0)
Despite an alarming increase in the frequency and severity of cyber attacks, enterprises large and small claim they are doing enough to mitigate the effects of a data breach. New data released this week by market analyst Juniper Research indicates that a whopping 86 percent of U.K. enterprises responding to a recent survey believe they are doing enough to ... Full article
September 9, 2016(0)
A retired Air Force General has been tapped to be the nation's first chief information security officer, the Obama administration announced this week. Retired Brig. Gen. Gregory Touhill previously served as director of command, control, communications and cyber systems at the U.S. Transportation Command. Touhill currently serves as a deputy in the Department of Homeland Security's Office of Cybersecurity ... Full article

More articles

Share This