Daily Tech Briefing: July 1, 2014

By eWEEK Staff  |  Posted 2014-07-01 Print this article Print

CoreOS launches managed Linux operating system as a service; Threat detection systems must ferret out the most sinister intrusions; Internet of things raises network, security concerns; and more.

Linux.Wifatch Is Protecting Unpatched Routers, Devices

DAILY VIDEO: How vigilante malware is protecting unpatched routers; HP launches open-source network...

Docker Pioneers Focus on Teaching Next-Gen Developers

DAILY VIDEO: Docker founder sets up school to help next-gen developers; Autonomy founder files...

Microsoft, Google Settle Long Simmering Dispute Over Patents

DAILY VIDEO: Microsoft and Google end their patent rivalry; Stagefright 2 exposes another billion...

Microsoft Unveils Azure Data Lake Services, U-SQL Query Language

DAILY VIDEO: Microsoft introduces U-SQL query language; Cisco makes move into data preparation space;...

Samsung Pay Debuts, Offers New Take on POS Payments

DAILY VIDEO: Samsung Pay puts completely new spin on POS payments; AMD unveils new GPUs for embedded...

Hilton Investigates Possible Data Breaches at the Chain

DAILY VIDEO: Hilton investigating report of breaches across the hotel chain; IBM launches cloud-based...

FTC, DOJ Investigating Complaints About Google Android, Reports Say

DAILY VIDEO: Google reportedly under FTC scrutiny again over Android; what BlackBerry's Android phone...

Dell Offers New Networking Components for Campus, Data Center

DAILY VIDEO: Dell expands networking portfolio for campus, data center; OPM says far more fingerprint...

Skype, AWS Outages Renew Worries About Cloud Reliability

DAILY VIDEO: Skype and AWS outages rekindle cloud reliability concerns; Citrix officials reportedly...

Volkswagen Acknowledges Emissions Software Scam Affects 11M Vehicles

DAILY VIDEO: Volkswagen emissions software scandal widens: 11M vehicles; Michigan sues HP for $49...

Read more about the stories in today's news:


The CoreOS recently launched its Managed Linux operating system-as-a-service offering. This is yet another step in the move toward a services-based approach for all IT. Along with this product release, CoreOS is officially announcing its Series A round of financing, bringing in $8 million.

Alex Polvi, CEO of CoreOS, told eWEEK, that his company's offering differs from other vendors because it continuously delivers patches and updates to an enterprise's servers. He added that the operating system as a service model eliminates the life cycle issues that other Linux distributions have.

At the end of 2013, Target experienced a massive data breach that led many in the IT industry to discuss how it could have been prevented. However, what some may not have realized is that Target's intrusion detection system actually caught the breach when it was happening, but no one noticed.

This is because most intrusion detection systems produce so much in the way of information it's impossible to know which things it catches are actually threats. This is the problem that Cyphort, a company that produces an appliance-based threat management product is trying to solve. Cyphort not only flags suspected malware it also assesses which threats have the potential to cause the most damage.

According to a survey commissioned by Infoblox, 90 percent of the 400 IT professionals interviewed said they are either planning or implementing various solutions to get their networks ready for the Internet of things.

Many of these professionals said that they are optimistic that they'll have the staff and resources they need to handle what's coming. However, more than half of those surveyed said their networks are already at full capacity, and 63 percent expressed concerns that the IoT represents a security threat to their networks.

In the past few years, new information-sharing tools and networks have emerged to allow businesses to exchange attack information with other companies. For instance, Hewlett-Packard has launched a threat-intelligence sharing environment,

Now, Microsoft has launched its own threat-intelligence sharing environment, known as Interflow, which allows cyber-security specialists and analysts to create communities and exchange machine-readable threat information using a variety of open specifications.


Submit a Comment

Loading Comments...
Manage your Newsletters: Login   Register My Newsletters

Thanks for your registration, follow us on our social networks to keep up-to-date
Rocket Fuel