Enterprise IT
Top stories summarized by our editors
10/18/2017

The Department of Homeland Security has announced that federal agencies are now required to use the Domain-based Message Authentication, Reporting & Conformance email protocol and Hypertext Transfer Protocol Secure for websites to bolster security. The email protocol must be implemented within 90 days, while HTTPS must be employed within 120 days.

Full Story:
TechRepublic, Reuters
10/18/2017

The US Supreme Court will consider a privacy case in which US Department of Justice prosecutors seek access to emails stored on Microsoft's Dublin, Ireland, servers. The court said it will review the White House's appeal of a 2016 lower court ruling in the drug trafficking case that prohibited such access to the data stored overseas, a decision hailed by pro-privacy tech companies.

Full Story:
Reuters
10/18/2017

Three specific solutions may help agencies successfully implement the federal Executive Order on Strengthening the Cybersecurity of Federal Networks and Critical Infrastructure, writes Shawn Campbell, director of product management for SafeNet Assured Technologies. Campbell outlines cross-domain security, cryptographic key management and encryption apps, and high assurance authentication.

Full Story:
Federal Computer Week
More Summaries:
Trump
10/18/2017

The cybersecurity space has proved lucrative for Chess, which this year purchased Foursys, and the company plans a similar acquisition, Chess Director Richard Btesh said. Although he did not disclose the cybersecurity firm's name, Btesh did say Chess wouldn't be buying a competitor.

Full Story:
CRN (UK)
More Summaries:
Chess
10/17/2017

The Government Accountability Office has announced that it will be launching an investigation into an attack that took down the Federal Communications Commission's public comments system. The investigation has been queued but likely will not begin for several months, said Managing Director Charles Young.

Full Story:
InsideSources
10/17/2017

The US Computer Emergency Readiness Team has warned users of the vulnerability of modern Wi-Fi networks, which generally use an encryption system that provides an exploitable opening to hackers. The flaw allows potential hackers to access and listen to devices at wireless access points.

10/17/2017

IBM's new Cloud Migration Services and Cloud Deployment Services aim to support enterprises moving their current data and apps to the cloud in a cheaper, quicker fashion and with less service provisioning time, Chief Technology Officer Bridget Karlin says.

Full Story:
TechCrunch
More Summaries:
IBM
10/17/2017

Critical cybersecurity best practices must be followed by enterprises, governments and individual users separately and in tandem to protect the cybersecurity space, advises Wlodzimierz Nowak, T-Mobile Poland's chief security officer, who calls for worldwide and national regulations and industry-specific agreements, among other suggestions.

Full Story:
ComputerWeekly (UK)
More Summaries:
T-Mobile
10/17/2017

Consistent employee training is essential to cybersecurity in the health care industry as threats become more evolved. Employees must be trained on security policies and procedures under the HIPAA Privacy Rule, while training must remain ongoing and evolve as new threats emerge.

Full Story:
Health IT Security
10/17/2017

The emergence of new technology has ushered in an era of "external intelligence" in which algorithms and machines are responsible for many tasks that were once handled by human workers. Some companies may apply this technology to current products and services, while others may create entirely new business models.

Full Story:
McKinsey