The Department of Homeland Security has announced that federal agencies are now required to use the Domain-based Message Authentication, Reporting & Conformance email protocol and Hypertext Transfer Protocol Secure for websites to bolster security. The email protocol must be implemented within 90 days, while HTTPS must be employed within 120 days.
The US Supreme Court will consider a privacy case in which US Department of Justice prosecutors seek access to emails stored on Microsoft's Dublin, Ireland, servers. The court said it will review the White House's appeal of a 2016 lower court ruling in the drug trafficking case that prohibited such access to the data stored overseas, a decision hailed by pro-privacy tech companies.
Three specific solutions may help agencies successfully implement the federal Executive Order on Strengthening the Cybersecurity of Federal Networks and Critical Infrastructure, writes Shawn Campbell, director of product management for SafeNet Assured Technologies. Campbell outlines cross-domain security, cryptographic key management and encryption apps, and high assurance authentication.
The cybersecurity space has proved lucrative for Chess, which this year purchased Foursys, and the company plans a similar acquisition, Chess Director Richard Btesh said. Although he did not disclose the cybersecurity firm's name, Btesh did say Chess wouldn't be buying a competitor.
The Government Accountability Office has announced that it will be launching an investigation into an attack that took down the Federal Communications Commission's public comments system. The investigation has been queued but likely will not begin for several months, said Managing Director Charles Young.
The US Computer Emergency Readiness Team has warned users of the vulnerability of modern Wi-Fi networks, which generally use an encryption system that provides an exploitable opening to hackers. The flaw allows potential hackers to access and listen to devices at wireless access points.
IBM's new Cloud Migration Services and Cloud Deployment Services aim to support enterprises moving their current data and apps to the cloud in a cheaper, quicker fashion and with less service provisioning time, Chief Technology Officer Bridget Karlin says.
Critical cybersecurity best practices must be followed by enterprises, governments and individual users separately and in tandem to protect the cybersecurity space, advises Wlodzimierz Nowak, T-Mobile Poland's chief security officer, who calls for worldwide and national regulations and industry-specific agreements, among other suggestions.
Consistent employee training is essential to cybersecurity in the health care industry as threats become more evolved. Employees must be trained on security policies and procedures under the HIPAA Privacy Rule, while training must remain ongoing and evolve as new threats emerge.
The emergence of new technology has ushered in an era of "external intelligence" in which algorithms and machines are responsible for many tasks that were once handled by human workers. Some companies may apply this technology to current products and services, while others may create entirely new business models.
- Page 1