Government Pursues ‘Zero Trust’ Approach to Cybersecurity

The “zero trust” policy envisioned by President Biden in May when he signed an executive order to improve cybersecurity has begun taking shape with the release last week of a draft blueprint by the White House Office of Management and Budget (OMB). While Biden’s order covers the public and private sectors “and ultimately the American people’s security and privacy,” zero trust focuses on identifying and implementing best practices for the federal government’s digital platforms and processes. Deployment will take years of investment and effort. To help jump-start the initiative, some primers have hit the news feeds. Continue reading Government Pursues ‘Zero Trust’ Approach to Cybersecurity

Slack Debuts Prototype Video Stories, Anytime Audio Tools

Slack, during its annual conference Slack Frontiers, rolled out several new features, including two prototype experiments: Video Stories, described as asynchronous video clips the user can post in a channel or DM, and Anytime Audio, an always-available audio feed that can be toggled on or off in any channel. In addition, the company introduced Slack Connect Direct Messages and Verified Organizations. Video Stories, similar to Stories on Instagram and Snapchat, are a way to quickly share a team message or status update. Continue reading Slack Debuts Prototype Video Stories, Anytime Audio Tools

AWS Previews Alexa Voice Integration For More IoT Devices

At its annual AWS re:Invent conference, Amazon previewed some new products for its cloud platform, Amazon Web Services, most of which related to the Internet of Things, a market expected to be valued at $212 billion by the end of 2019. It’s a natural fit, since, according to a 2018 survey by the Eclipse Foundation, AWS is the most popular cloud platform for IoT developers, growing from 21 percent in 2017 to 51.8 percent today. In comparison, Microsoft Azure’s share is 31.21 percent today, up from 17 percent in 2017. Continue reading AWS Previews Alexa Voice Integration For More IoT Devices

WorkLink From AWS Enables Secure Mobile Intranet Access

Amazon’s AWS cloud computing unit has announced its new WorkLink service that promises to provide workers with simple and secure mobile access to all of their companies’ intranet sites and web apps. Since most companies typically use virtual private networks or mobile device management software for such remote access, AWS wants to replace the often expensive and complex use of these approaches with simple one-click access that employees should find similar to basic Internet browsing on their various devices. Continue reading WorkLink From AWS Enables Secure Mobile Intranet Access

NAB 2017: SMPTE Future of Digital Cinema Looks at Security

At a SMPTE symposium on the Future of Digital Cinema, speakers addressed the “unknown” cyber threats to movie security. SMPTE vice president of education Richard Welsh, cofounder/vice president of Sundog Media Toolkit, identified threats beyond “the kid with a camcorder.” The audience also heard from Emile Monette, a government cybersecurity senior advisor and Ted Harrington of ISE (Independent Security Evaluators). The general consensus is that many companies fail to understand the way hackers work, leaving their content vulnerable. Continue reading NAB 2017: SMPTE Future of Digital Cinema Looks at Security

Juniper Networks Backdoor Hack Likely From Foreign Nation

Tech giant Juniper Networks just found unauthorized code — essentially a backdoor — in the operating system running some of its firewalls. The hidden backdoor, found in versions of the company’s ScreenOS software dating back to at least August 2012, enable hackers to take complete control of Juniper NetScreen firewalls as well as decrypt encrypted traffic running through the Virtual Private Networks (VPN) on the firewalls. The FBI is investigating the breach, which appears to be the work of a foreign government. Continue reading Juniper Networks Backdoor Hack Likely From Foreign Nation

Cybersecurity Focus Shifts From Blocking to Spotting Threats

Companies such as IBM and Symantec are investing in new technologies to detect viruses and hackers and make stealing customer data more difficult. The companies believe that traditional antivirus software that erect barriers to keep out threats is becoming increasingly ineffective as hackers around the world regularly create novel bugs. IBM plans to analyze behavior in computer network data to detect irregularities. Symantec is launching its own division that will help hacked businesses respond to security breaches.  Continue reading Cybersecurity Focus Shifts From Blocking to Spotting Threats