TikTok CEO Testifies Before Congress as App Faces Scrutiny

TikTok CEO Shou Zi Chew plans to offer broad platform safety and security promises at his hearing before the House Energy and Commerce Committee, according to testimony provided in advance of today’s event. The well-being of child users will be a point of focus, as will the Chinese-owned app’s proposed firewall to protect U.S. data from foreign access and government interference. “TikTok will remain a platform for free expression and will not be manipulated by any government,” Chew’s prepared remarks indicate, noting “there are more than 150 million Americans who love our platform.” Continue reading TikTok CEO Testifies Before Congress as App Faces Scrutiny

Cloud Platforms Combine Security, Operations for Efficiency

A new generation of cybersecurity solutions is gaining attention for merging corporate networks with security tools like malware protection into one system that can be centrally managed. Akamai, Cisco, Cloudflare, Zscaler, Palo Alto Networks and others have begun offering consolidated cybersecurity platforms that span IT, operations and security, leveraging resources and theoretically reducing costs through shared expenses. Having all eyes on traffic and workloads via a single framework may also make it possible for chief information officers and IT personnel to be more effective and focused. Continue reading Cloud Platforms Combine Security, Operations for Efficiency

Government Pursues ‘Zero Trust’ Approach to Cybersecurity

The “zero trust” policy envisioned by President Biden in May when he signed an executive order to improve cybersecurity has begun taking shape with the release last week of a draft blueprint by the White House Office of Management and Budget (OMB). While Biden’s order covers the public and private sectors “and ultimately the American people’s security and privacy,” zero trust focuses on identifying and implementing best practices for the federal government’s digital platforms and processes. Deployment will take years of investment and effort. To help jump-start the initiative, some primers have hit the news feeds. Continue reading Government Pursues ‘Zero Trust’ Approach to Cybersecurity

Slack Debuts Prototype Video Stories, Anytime Audio Tools

Slack, during its annual conference Slack Frontiers, rolled out several new features, including two prototype experiments: Video Stories, described as asynchronous video clips the user can post in a channel or DM, and Anytime Audio, an always-available audio feed that can be toggled on or off in any channel. In addition, the company introduced Slack Connect Direct Messages and Verified Organizations. Video Stories, similar to Stories on Instagram and Snapchat, are a way to quickly share a team message or status update. Continue reading Slack Debuts Prototype Video Stories, Anytime Audio Tools

AWS Previews Alexa Voice Integration For More IoT Devices

At its annual AWS re:Invent conference, Amazon previewed some new products for its cloud platform, Amazon Web Services, most of which related to the Internet of Things, a market expected to be valued at $212 billion by the end of 2019. It’s a natural fit, since, according to a 2018 survey by the Eclipse Foundation, AWS is the most popular cloud platform for IoT developers, growing from 21 percent in 2017 to 51.8 percent today. In comparison, Microsoft Azure’s share is 31.21 percent today, up from 17 percent in 2017. Continue reading AWS Previews Alexa Voice Integration For More IoT Devices

WorkLink From AWS Enables Secure Mobile Intranet Access

Amazon’s AWS cloud computing unit has announced its new WorkLink service that promises to provide workers with simple and secure mobile access to all of their companies’ intranet sites and web apps. Since most companies typically use virtual private networks or mobile device management software for such remote access, AWS wants to replace the often expensive and complex use of these approaches with simple one-click access that employees should find similar to basic Internet browsing on their various devices. Continue reading WorkLink From AWS Enables Secure Mobile Intranet Access

NAB 2017: SMPTE Future of Digital Cinema Looks at Security

At a SMPTE symposium on the Future of Digital Cinema, speakers addressed the “unknown” cyber threats to movie security. SMPTE vice president of education Richard Welsh, cofounder/vice president of Sundog Media Toolkit, identified threats beyond “the kid with a camcorder.” The audience also heard from Emile Monette, a government cybersecurity senior advisor and Ted Harrington of ISE (Independent Security Evaluators). The general consensus is that many companies fail to understand the way hackers work, leaving their content vulnerable. Continue reading NAB 2017: SMPTE Future of Digital Cinema Looks at Security

Juniper Networks Backdoor Hack Likely From Foreign Nation

Tech giant Juniper Networks just found unauthorized code — essentially a backdoor — in the operating system running some of its firewalls. The hidden backdoor, found in versions of the company’s ScreenOS software dating back to at least August 2012, enable hackers to take complete control of Juniper NetScreen firewalls as well as decrypt encrypted traffic running through the Virtual Private Networks (VPN) on the firewalls. The FBI is investigating the breach, which appears to be the work of a foreign government. Continue reading Juniper Networks Backdoor Hack Likely From Foreign Nation

Cybersecurity Focus Shifts From Blocking to Spotting Threats

Companies such as IBM and Symantec are investing in new technologies to detect viruses and hackers and make stealing customer data more difficult. The companies believe that traditional antivirus software that erect barriers to keep out threats is becoming increasingly ineffective as hackers around the world regularly create novel bugs. IBM plans to analyze behavior in computer network data to detect irregularities. Symantec is launching its own division that will help hacked businesses respond to security breaches.  Continue reading Cybersecurity Focus Shifts From Blocking to Spotting Threats