Connecting to LinkedIn...

W1siziisijiwmtuvmdqvmtuvmdgvntqvmzgvnzi1l01ptlrbu0hfqkxpr19vtljftkrfukvex0lnqudfx3jlc2l6zwrfyw5kx3jlbmrlcmvklmpwzyjdlfsiccisinrodw1iiiwimtkymhgxmjuwiyjdxq

Blog

SAP Asks Microsoft, Apple to Share Hacker-Fighting Intelligence

26/01/2015 by Sharon Shahzad

W1siziisijiwmtuvmdevmjyvmtqvmzuvmdivndmwl2k2vlfmymzwq0pkdy5qcgcixsxbinailcj0ahvtyiisijywmhg0mdbcdtawm2uixv0

SAP SE is trying to marshal business technology’s biggest suppliers to gather hacker-fighting intelligence following a spate of security problems with open-source software.

The biggest maker of business applications has contacted companies including Microsoft Corp and Apple Inc about sharing information on analyses of the weaknesses in open-source code, which is generally free to run and available for the user community to improve, according to Gordon Muehl, Chief Technology Officer for security at Walldorf, Germany-based SAP.

More cooperation among the business-software makers could help stanch security flaws found in the open-source programs, which increasingly touch online services and devices used by billions of people. A flaw called Heartbleed, discovered last spring, left hundreds of thousands of servers and routers vulnerable to attack. Another one, Shellshock, emerged in September.

“In the aftermath of Heartbleed, it’s clear open source isn’t totally secure,” Muehl said. “A computer program looks at the code and says, ‘This or that might be a problem’. Those computer programs only give you a ‘might be,’ so you need expert work to look into that.”

Muehl plans to address managers from International Business Machines Corp, Microsoft and about 20 other companies about his proposal in March. He spoke with Apple Chief Information Officer Niall O’Connor about it in October.

This article has been extracted from http://www.businessweek.com, please click on this link to read the article in full http://www.businessweek.com/news/2015-01-26/sap-asks-microsoft-apple-to-share-hacker-fighting-intelligence

Montash is a multi-award winning global technology recruitment business. Specialising in permanent and contract positions across mid-senior appointments across a wide range of industry sectors and IT functions, including:

ERP Recruitment, BI & Data Recruitment, Information Security Recruitment, IT Architecture & Strategy Recruitment , Energy Technology Recruitment, Demand IT and Business Engagement Recruitment, Digital and E-commerce Recruitment, Leadership Talent, Infrastructure and Service Delivery Recruitment, Project and Programme Delivery Recruitment.

Montash is headquartered in Old Street, London, in the heart of the technology hub. Montash has completed assignments in over 30 countries and has appointed technical professionals from board level to senior and mid management in permanent and contract roles.

comments powered by Disqus

Social Stream

Latest News

W1siziisijiwmtcvmdivmtuvmtyvntivmjuvnzkwl2n5ymvyigf0dgfja3muanbnil0swyjwiiwidgh1bwiilcizodb4mtawiyjdxq

UK threatened by serious cyber attacks every ...

2017-02-15 16:00:00 +0000

The security of the UK has been threatened by 188 serious cyber attacks in the last three months, a government security chief has said. National Cyber Security Centre (NCSC) Chief Executive Ciaran Martin told The Sunday Times that national security was put at risk by many of these attacks. Martin was speaking ahead of the official opening of the NCSC, which has been set up to protect critical services in the UK from such attacks and improve underlying i...

W1siziisijiwmtcvmdivmdgvmtavmzcvmzkvnjkyl0n5ymvyifnly3vyaxr5lmpwzyjdlfsiccisinrodw1iiiwimzgwedewmcmixv0

British cyber security workforce rises 163%

2017-02-08 10:00:00 +0000

Data from the UK has shown that the cyber security workforce has grown considerably over the past five years. According to a new report from cyber skills promotion network Tech Partnership, there are now 58,000 more workers in this industry – a rise of 163 per cent. It shows the growing importance of these professionals, with firms across a vast range of industries turning to cyber security specialists to safeguard their data. To collate the report, the...