Daily Tech Briefing: July 1, 2014

 
 
By eWEEK Staff  |  Posted 2014-07-01 Print this article Print
 
 
 
 
 
 
 

CoreOS launches managed Linux operating system as a service; Threat detection systems must ferret out the most sinister intrusions; Internet of things raises network, security concerns; and more.

 
Apple Must Pay Ebook Buyers After Losing Antitrust Case Appeal

DAILY VIDEO: Apple loses appeal of 2013 ebook price-fixing antitrust case; Microsoft extends its...

Sprint's New Mobile Phone Plan Offers Unlimited Data for $80

DAILY VIDEO: Sprint's $80 All-In mobile phone plan includes unlimited data; A look under the hood as...

Microsoft Visual Studio RTM Ready for Download July 20

DAILY VIDEO: Visual Studio 2015 RTM coming July 20; AT&T adds Motorola Moto E, ZTE Maven prepaid...

SAP Testing Apple Watch Apps for Enterprise Users

DAILY VIDEO: SAP building Apple Watch beta apps geared for enterprise users; Microsoft HoloLens is...

Microsoft Releases Office Apps for Android Mobile Devices

DAILY VIDEO: Microsoft launches Office for Android phones; Google pulls controversial audio listening...

Microsoft Office 365 Cloud Status Notifications Go Mobile

DAILY VIDEO: Office 365 service notifications go mobile; Oracle expands NFV capabilities for service...

Oracle Sets Sights on Amazon With New PaaS Cloud Offerings

DAILY VIDEO: Oracle expands cloud PaaS offerings in quest for renewed growth; NetApp brings high-end...

Loopholes Appear in Microsoft's Windows 10 Upgrade Policy

DAILY VIDEO: Windows 10 is free only for 'insiders,' but there may be a loophole; Docker rivals join...

AMD Execs Deny Reports It Plans to Split Up the Company

DAILY VIDEO: AMD denies speculation of breakup, spinoff; Apple Watch 2 will be less dependent on...

FCC Hits AT&T With $100 Million Fine for Violating 'Transparency Rule

DAILY VIDEO: FCC to fine AT&T $100 million for lying to customers about data plans; Windows 10...



Read more about the stories in today's news:

 
 
 

The CoreOS recently launched its Managed Linux operating system-as-a-service offering. This is yet another step in the move toward a services-based approach for all IT. Along with this product release, CoreOS is officially announcing its Series A round of financing, bringing in $8 million.

Alex Polvi, CEO of CoreOS, told eWEEK, that his company's offering differs from other vendors because it continuously delivers patches and updates to an enterprise's servers. He added that the operating system as a service model eliminates the life cycle issues that other Linux distributions have.

At the end of 2013, Target experienced a massive data breach that led many in the IT industry to discuss how it could have been prevented. However, what some may not have realized is that Target's intrusion detection system actually caught the breach when it was happening, but no one noticed.

This is because most intrusion detection systems produce so much in the way of information it's impossible to know which things it catches are actually threats. This is the problem that Cyphort, a company that produces an appliance-based threat management product is trying to solve. Cyphort not only flags suspected malware it also assesses which threats have the potential to cause the most damage.

According to a survey commissioned by Infoblox, 90 percent of the 400 IT professionals interviewed said they are either planning or implementing various solutions to get their networks ready for the Internet of things.

Many of these professionals said that they are optimistic that they'll have the staff and resources they need to handle what's coming. However, more than half of those surveyed said their networks are already at full capacity, and 63 percent expressed concerns that the IoT represents a security threat to their networks.

In the past few years, new information-sharing tools and networks have emerged to allow businesses to exchange attack information with other companies. For instance, Hewlett-Packard has launched a threat-intelligence sharing environment,

Now, Microsoft has launched its own threat-intelligence sharing environment, known as Interflow, which allows cyber-security specialists and analysts to create communities and exchange machine-readable threat information using a variety of open specifications.

 
 
 

Submit a Comment

Loading Comments...
 
Manage your Newsletters: Login   Register My Newsletters























 
 
 
 
 
 
 
 
 
 
 
Thanks for your registration, follow us on our social networks to keep up-to-date
Rocket Fuel