Cyber Saturday—Would You Buy Cybersecurity From a Witch Doctor?

Cyber Saturday—Would You Buy Cybersecurity From a Witch Doctor?

Happy weekend, Cyber Saturday readers. It has been busy here at HQ between a Fortune 500 issue close and New York City’s “blockchain week,” so I’m passing my weekend column duties onto a pinch hitter. Today’s essay comes to you courtesy of Oren Falkowitz, a cybersecurity entrepreneur, NSA alum, and regular reader of this newsletter. His contribution is timely, you’ll discover as you read on, given that it was the 100th birthday of the late scientist Richard Feynman last week….

Read More Read More

Digital-keen customers put airport cyber security at risk

Digital-keen customers put airport cyber security at risk

Air passengers’ growing desire for a seamless digital experience is putting airports at greater risk of cyber attack, a new study has found. The report from PA Consulting, Overcome the Silent Threat, said that a “hyper-connected model” where passengers in airports wanted fast internet and digital engagement with airlines and retailers brought “a larger attack surface for cyber criminals to exploit”. There were 1,000 cyber attacks each month on aviation systems in 2016, according to the European Aviation Safety Agency….

Read More Read More

VMware Unveils Virtual Cloud Network

VMware Unveils Virtual Cloud Network

Last week at Dell Technologies World 2018, VMware Inc. announced what it is referring to, and hopes to be, the future of networking the Virtual Cloud Network. The Virtual Cloud Network takes VMware’s NSX networking and security portfolio and expands it to encompass all ends of the software-defined network across a business’ fabric. The digital transformation that most companies are undergoing take the lines of where their data centers end and begin and blurs them heavily. With heavy cloud usage…

Read More Read More

Amazon Echo made to eavesdrop without exploit or manipulation

Amazon Echo made to eavesdrop without exploit or manipulation

Checkmarx security researchers developed a proof of concept attack that would allow enable an Amazon Echo to continue recording a user long after a request is made. The exploit doesn’t require any tweaks to Alexa’s software and doesn’t require any vulnerabilities but instead uses a functioning calculator application that records and transcribes activity for an extended period of time, according to Wired. The hackers only used existing features that were at the time, made available to every developer making applets for the…

Read More Read More

Will Dell eat VMware? Or will Carl Icahn snack on Dell? And where does Uber fit in? Yes, Uber!

Will Dell eat VMware? Or will Carl Icahn snack on Dell? And where does Uber fit in? Yes, Uber!

The “what will Dell do to/with/for/about VMware” rumour mill has started spinning again. The force giving the mill the biggest push is a hint that activist investor Carl Icahn has acquired a chunk of VMware. Icahn’s shares are said to be enough to give him influence, but have not triggered thresholds requiring regulatory filings to identify him as a shareholder. If the rumours of Icahn’s involvement are correct, it could signal a rematch of the stoush he fought with Michael…

Read More Read More

Singtel, VMware to set up hybrid cloud sandbox

Singtel, VMware to set up hybrid cloud sandbox

Singtel and VMware are setting up a sandbox environment for enterprises to test their workloads in a hybrid cloud environment, underscoring the growing ties between Southeast Asia’s biggest telco and the virtualisation bigwig. Both companies said the sandbox – or what they call a foundry – would help to drive digital transformation efforts, such as implementing cloud-enabled workplaces to lower costs, as well as improve operations and productivity. The sandbox, which is also expected to be available in Australia and…

Read More Read More

Facebook halts medical data sharing plan

Facebook halts medical data sharing plan

Facebook has halted plans to collect patient data from hospitals and match it up with its users’ information. The social network confirmed the idea had been discussed but had been “paused” while the company dealt with its privacy crisis. Facebook has faced scrutiny after the data of millions of people was improperly shared with the political consultancy Cambridge Analytica. The company said it had not yet received any health records. The hospital data sharing proposal was discovered by CNBC reporter…

Read More Read More

Automation and gamification key to cyber security

Automation and gamification key to cyber security

The use of automation and gamification are key to winning the fight against cyber criminals in the face of the skills’ shortage, a study investigating challenges facing IT security teams reveals. Concerted efforts to increase job satisfaction, automation in the security operations centre (SOC) and gamification in the workplace are key to beating cyber criminals, a survey by security firm McAfee shows. This is because in addition to the increased number and complexity of cyber threats, IT security teams are…

Read More Read More

Cybersecurity needs women

Cybersecurity needs women

Computer hacking is becoming more widespread and damaging. Headlines highlight attacks on government agencies, political campaign offices, financial institutions and big corporations. But citizens and consumers are paying a heavy price. In 2016, 2 billion people had their personal details stolen, including the medical records of more than 100 million Americans. Hacks of US retail outlets such as Target and global credit companies such as Equifax compromised the private data of hundreds of millions of customers. In the past 6…

Read More Read More

Why manufacturers must rise to the cyber-security challenge

Why manufacturers must rise to the cyber-security challenge

The defence secretary’s recent warnings of increased cyber-warfare from nation states and other actors, determined to threaten the UK’s infrastructure, must be a wake-up call to the engineering profession. As we rightly reap the benefits of advanced technological interconnectivity and the rise of Industry 4.0, we must also be vigilant to the dangers that we face now and in the future. Cybersecurity can no longer be an optional extra for engineers; it must be a core competence of the profession….

Read More Read More