Blockchain Data Security and ‘BYOID’: Hacker’s Nightmare
New data breaches seem to happen every day. Consumers are frustrated by lack of control over their information once it is shared. Enterprises work tirelessly to avoid becoming the ...Full Article
Cost, Security Issues Persist Amid Cloud Boom
The billowing cloud market that is growing at an estimated 40 percent annually is being driven to new heights by the enterprise embrace of multi-cloud strategies along with a ...Full Article
AWS Adds ‘Secret’ Region to CIA Cloud
Public cloud giant Amazon Web Services announced a new "secret region" this week designed to complete its portfolio of data classifications for U.S. government workloads. AWS said Monday (Nov. ...Full Article
Startup Puts Container Security in a Container
Among the emerging solutions for securing application containers in production is an application layer security tool that is itself a container. Startup NeuVector, which announced early stage venture funding ...Full Article
Node.js Popular With DevOps, But Security Lags
Developers are painfully aware of the risks inherent in deploying applications on the open Internet, but few are using tools designed to secure code and mitigate risks. A survey ...Full Article
ARM Launches IoT Security Framework
ARM is launching a "secure core" approach to bulletproofing the Internet of Things that addresses network security at the microcontroller level. The approach introduced at a company event this ...Full Article
DoD Looks to Break Cloud Security ‘Bottleneck’
The Pentagon is looking for ways to recast is its cloud security guidelines as a way to accelerate the department's slow migration to cloud computing. Meanwhile, key cloud providers ...Full Article
Survey: Equifax Hack Highlights Open Source Insecurity
With open source software accounting for more than half of some products, process gaps are emerging for managing security. Vendors pushing approaches for monitoring software supply chains point to ...Full Article
AWS Cloud Hacked by Bitcoin Miners
Bitcoin mining is among the latest threats to public cloud security as hackers breach enterprise computing resources to hunt for the digital currency. Cloud security vendor RedLock reported earlier ...Full Article
Google Upgrades Cloud Access Controls
Public cloud vendors continue to roll out tweaks and other new features designed to differentiate their services. Among them are tools designed to give enterprise users greater control over ...Full Article