Daily Tech Briefing: July 1, 2014

 
 
By eWEEK Staff  |  Posted 2014-07-01 Print this article Print
 
 
 
 
 
 
 

CoreOS launches managed Linux operating system as a service; Threat detection systems must ferret out the most sinister intrusions; Internet of things raises network, security concerns; and more.

 
NIST Declares Two-Factor Authentication Using SMS Texts Insecure

DAILY VIDEO: NIST says SMS-based two-factor authentication isn't secure; the UK approves Amazon's...

Microsoft Unveils Service for Helping Enterprises Move to Windows 10
IT Insiders Optimistic About Verizon-Yahoo's Future

DAILY VIDEO: IT insiders project the future of Verizon-Yahoo; FCC's Wheeler urges...

Apple Planning Larger iPhone 7, Market Chatter Suggests

DAILY VIDEO: Latest iPhone 7 rumor suggests a new, larger model is possible; Samsung confirms fix for...

French Regulators Says Microsoft Collects Too Much User Data

DAILY VIDEO: French regulators accuse Microsoft of improper data use; Samsung denies Galaxy S7 Active...

Oracle Distributes Largest-Ever List of Software Security Patches

DAILY VIDEO: Oracle issues its largest patch update ever; Why BlackBerry CEO Chen doesn't worry about...

Government Requests for Google User Data Continue to Rise

DAILY VIDEO: Google sees government requests for user data growing; Google tries to charm European...

Softbank to Acquire Chip Designer ARM in $32.2 Billion All-Cash Deal

DAILY VIDEO: Softbank deal to buy ARM aimed at bolstering its IoT reach; the hacking of Ubuntu Linux...

Microsoft Releases Azure SQL Data Warehouse for the Cloud

DAILY VIDEO: Microsoft's Azure SQL data warehouse opens its doors to big data; IBM delivers secure...

Court Overturns Ruling Ordering Microsoft to Give DOJ Access to Email

DAILY VIDEO: Microsoft wins appeal in Ireland email case; EU lobs new set of antitrust charges at...



Read more about the stories in today's news:

 
 
 

The CoreOS recently launched its Managed Linux operating system-as-a-service offering. This is yet another step in the move toward a services-based approach for all IT. Along with this product release, CoreOS is officially announcing its Series A round of financing, bringing in $8 million.

Alex Polvi, CEO of CoreOS, told eWEEK, that his company's offering differs from other vendors because it continuously delivers patches and updates to an enterprise's servers. He added that the operating system as a service model eliminates the life cycle issues that other Linux distributions have.

At the end of 2013, Target experienced a massive data breach that led many in the IT industry to discuss how it could have been prevented. However, what some may not have realized is that Target's intrusion detection system actually caught the breach when it was happening, but no one noticed.

This is because most intrusion detection systems produce so much in the way of information it's impossible to know which things it catches are actually threats. This is the problem that Cyphort, a company that produces an appliance-based threat management product is trying to solve. Cyphort not only flags suspected malware it also assesses which threats have the potential to cause the most damage.

According to a survey commissioned by Infoblox, 90 percent of the 400 IT professionals interviewed said they are either planning or implementing various solutions to get their networks ready for the Internet of things.

Many of these professionals said that they are optimistic that they'll have the staff and resources they need to handle what's coming. However, more than half of those surveyed said their networks are already at full capacity, and 63 percent expressed concerns that the IoT represents a security threat to their networks.

In the past few years, new information-sharing tools and networks have emerged to allow businesses to exchange attack information with other companies. For instance, Hewlett-Packard has launched a threat-intelligence sharing environment,

Now, Microsoft has launched its own threat-intelligence sharing environment, known as Interflow, which allows cyber-security specialists and analysts to create communities and exchange machine-readable threat information using a variety of open specifications.

 
 
 

Submit a Comment

Loading Comments...
 
Manage your Newsletters: Login   Register My Newsletters























 
 
 
 
 
 
 
 
 
 
 
Rocket Fuel