Advanced Computing in the Age of AI | Friday, April 19, 2024

Under Attack: Malware Roundup from Security Pros

The weekend brought no respite for anxious chief security officers, CIOs, and other professionals involved in the never-ending quest to protect data, networks, and accounts from the onslaught of ...Full Article

HPC Storage Evolution Ramps Up
sponsored content by Seagate Technology

With Seagate’s announcement that it will be integrating IBM® Spectrum Scale® software with its award winning¹ ClusterStor high performance parallel storage system, the evolution of HPC and enterprise storage ...Full Article

4 Lessons from NYSE, United Airlines & WSJ

By now, I think we all know the gory details from July 8. But just to remind you, it was a rough day: The New York Stock Exchange (NYSE) ...Full Article

The Truth About Cybersecurity Insurance

As a chief financial officer, why would a company invest $3 million to hire external experts to fix known cybersecurity issues when the company has a $10 million cybersecurity ...Full Article

Are Breaches Killing Flash?

Mozilla added the Flash Player Plugin to its roster of blocked add-ons, after yet another security alert from developer Adobe and following a public call for the end of ...Full Article

How to Protect Your Data from Third-Party Breaches

The December 2013 Target data breach that compromised the credit card information of 40 million customers was the first of many wake-up calls to organizations, bringing home the damage ...Full Article

Audit Your Cloud for Security and Savings

By auditing their organizations' cloud implementations, IT departments can rein in security risks, curtail costs, improve end-user services, and enhance relationships with departments. Once IT professionals know the extent ...Full Article

Manta Beats Bots with Automated Protection

As a destination site where about 30 million small and midsize companies market themselves to each other and consumers, Manta is attractive to another form of traffic: web scrapers ...Full Article

NSA Contributes Security Tools For Puppet

IT automation specialist Puppet Labs has announced a new partner: The U.S. National Security Agency. Puppet Labs said Friday (June 19) that NSA is releasing to the open source ...Full Article

NIST Looks to Secure the IoT

Among the most vulnerable points in networks ranging from home offices to the proposed Internet of Everything are radio frequency, or RF, links that will be used to tie ...Full Article
Page 4 of 6« First...23456
EnterpriseAI