The Guardian

Google, Facebook, Amazon and Apple asked to turn over internal documents

The US government’s investigations into big tech widened on Friday as lawmakers announced they were seeking internal documents from Google, Facebook, Amazon and Apple. Letters went out to the four companies on Friday from the leaders of the House judiciary committee and its subcommittee on
International Data Privacy Laws

51 companies tell Congress it’s time to tackle data privacy

Amazon, AT&T and Qualcomm are among those involved The corporate world isn't waiting around for Congress to get started on tougher data privacy laws. A group of 51 CEOs from the Business Roundtable advocacy group, including tech companies like Amazon, AT&T, IBM, Motorola and Qualcomm,

Intel, Sequretek, Eclypsium and Perception Point Advance Threat Detection Solutions

What’s New: Next week at Black Hat 2019 in Las Vegas, hardware and firmware security will be a central topic of conference trainings and briefings. Intel and a growing number of companies in the industry continue to advance technologies that improve security at the lower layers of the computing stack with Intel® Threat Detection Technology (Intel® TDT) that complement built-in capabilities of our Intel® Xeon Scalable platforms for data-center infrastructure and Intel® Core processors for client computing.

“In today’s cybersecurity landscape, the attackers consistently discover novel attack vectors, exploiting any possible vulnerabilities – in software, firmware or hardware. To support the defense in-depth approach of our customers, Intel has enhanced threat detection at the foundation of the system stack. Our Threat Detection Technology provides security companies with a toolset to augment software-only solutions with hardware-level detectors.”
–Jim Gordon, Intel general manager of Platform Security

Why It Matters: The threat landscape is constantly evolving, and the rate and pace of security research for software and hardware products continues to accelerate. According to the National Institute of Standards and Technology (NIST), there were 13% more vulnerabilities reported in 2018 than in 2017.

Security solutions need to keep pace with the latest attacks, as well as infinite variations of known attack methods. All of this needs to be done with minimal impact on the customer experience. Intel’s hardware-based security technologies deliver two powerful capabilities: accelerated memory scanning and advanced platform telemetry.

How New Intel Customers Use the Technology:

Accelerated memory scanning is an industry enabler: Sequretek * is the latest company to work with Intel to integrate accelerated memory scanning in its endpoint detection, protection and response (EDPR) solution. With plans to release this solution in September 2019, early testing indicates significant performance improvement along with integration of Intel’s accelerated memory scanning stack.

Accelerated memory scanning in Intel TDT enables memory scanning that was rarely used due to its effect on system performance and power consumption. Intel offloaded the scanning for memory-based malware from CPU to the Intel integrated graphics processor (IGP). This change allows security solutions to use memory scanning broadly without introducing latency in the customer experience. Today, Intel TDT powers various innovative security technologies allowing detection of polymorphic malware, file-less threats and crypto miners.

Hardware indicators for advanced threat detection: Eclypsium*, an Intel Capital portfolio company and developer of the industry’s first firmware protection platform, announced its plans to work with Intel to advance firmware attack detection with Intel TDT Advanced Platform Telemetry, and deliver a new layer of security that helps defend the enterprise from its computing foundation up. » More from Eclypsium

Advanced platform telemetry addresses the challenge security software faces to help ensure reliable data feeds detect anomalies or specific behavior below the operating system. Everything that runs on Intel processors generates data from the CPU that can be applied to help detect threats. Intel CPUs can arm security providers with new levels of platform telemetry across PCs and servers to feed machine learning algorithms and improve the detection of advanced threats, while reducing false positives and minimizing performance impact.

Threat detection telemetry creates a framework for continuous innovation: Intel TDT doesn’t stop with providing detection techniques. The technology offers a framework to enable security companies to collect various telemetry and indicators from the hardware and create new and differentiated detection solutions.

Perception Point* identified the opportunity to leverage part of this framework in order to dramatically increase visibility into attacks. Its unique detonation environment specifically leverages Intel® Processor Trace (Intel PT), a data source originally developed for debugging as it exposes an accurate trace of activity with filtering capabilities that isolate the trace that matters. Perception Point utilizes Intel PT to record the full execution flow and identify anomalies in the code execution. This is a significant improvement over legacy sandboxes, which lack visibility due to operating at the application level, have latency issues and are limited in scale. Accessing the platform-level data exposed by Intel PT helps enable innovative security companies to better overcome these limitations. » More from Perception Point

Source: Intel

  • Articles
Intel Contributor
Intel News
Intel (NASDAQ: INTC), a leader in the semiconductor industry, is shaping the data-centric future with computing and communications technology that is the foundation of the world’s innovations. The company’s engineering expertise is helping address the world’s greatest challenges as well as helping secure, power and connect billions of devices and the infrastructure of the smart, connected world – from the cloud to the network to the edge and everything in between. Find more information about Intel at and
CA Technologies


Daren Glenister

Countdown to GDPR: Preparing for Global Data Privacy Reform

Preparing for Global Data Privacy Reform Multinational businesses who aren’t up to speed on the regulatory requirements of the European Union’s General Data Protection Regulation ...
Bryan Doerr

Cyber-Threats and the Need for Secure Industrial Control Systems

Secure Industrial Control Systems (ICS) Industrial Control Systems (ICS) tend to be “out of sight, out of mind.” These systems are essential to life in ...
Aaron Continelli

Cloud-Based or On-Premise ERP Deployment? Find Out

ERP Deployment You know how ERP deployment can improve processes within your supply chain, and the things to keep in mind when implementing an ERP ...
Daren Glenister

What’s Next In Cloud And Data Security?

Cloud and Data Security It has been a tumultuous year in data privacy to say the least – we’ve had a huge increase in data ...

Generation AI Must Be Protected From a Dystopian Future

Millions of our youngest people, children under 10 years old, are exposed to misleading and biased uses of artificial intelligence. What will you do about it? We are a digital ...
Reuters news

Libra cryptocurrency must meet tough regulatory standards-U.S. Treasury

BERN (Reuters) - The Facebook-led Libra cryptocurrency project must meet the highest standards for combating money laundering and terrorism financing, a senior U.S. Treasury official said on Tuesday. Any cryptocurrency ...
IBM News

IBM Expands Cloud Pak for Data with New DataOps Enhancements to Help Clients Get their Data Ready for AI

NEW YORK, Sept. 10, 2019 /PRNewswire/ -- IBM (NYSE: IBM) today announced enhancements to Cloud Pak for Data that leverage the DataOps methodology to help clients get their data 'business-ready' for AI. As corporate data continues ...