Advanced Computing in the Age of AI | Tuesday, October 4, 2022

Harnessing App Development With ‘Low-Code’ Platforms

One of the offshoots of the open source movement has been the gradual rise of "citizen application developers" operating on enterprise-grade "low-code" platforms. While the approach is seen as ...Full Article

U.S.: Cybersecurity Must Go Beyond Passwords

If indeed we are operating in a "digital economy," standard security measures such as passwords are no longer sufficient to shield the underlying IT infrastructure from sophisticated hackers, asserts ...Full Article

Wanted: IoT Interoperability, Security Specs

Yet another survey, this one by an Internet of Things standards group, emphasizes the need for interoperability and security standards as more devices are connected. Moreover, the survey of ...Full Article

Cyber Skills Gap Grows Along With Threats

A corporate job opening typically draws as many as 250 applicants with varying qualifications. In stark contrast, a new survey of the growing cyber security skills gap reveals that ...Full Article

Security News Ahead of RSA: Breach Worries Stop Digital Transformation

In advance of next week’s big RSA data security show in San Francisco, we’ve received a bevy of security product announcements from companies leveraging data analytics, AI, behavior analytics ...Full Article

Startup Targets Runtime Container Security

Promising stronger and faster security for application containers in production, a startup has unveiled a new continuous security approach based on adaptive behavioral learning. The approach is said to ...Full Article

Security Survey: The Botnets are Coming!

A new infrastructure vulnerability study confirms what became apparent late last year: botnets are exploiting inherent security weaknesses in Internet of Things (IoT) devices. The infrastructure security report released ...Full Article

“Why Don’t My Security Tools Work?” A Unified Cyber Defense Battle Plan

Threat actors are getting better, faster, and more efficient at compromising networks, taking only minutes or less to breach systems. Unfortunately, organizations are taking weeks, if not longer, to ...Full Article

Google Expands Cloud Encryption Options

Responding to growing concerns about cloud security and data governance across different platforms, Google is expanding its cloud security options with the release of encryption key management service. The ...Full Article

Container Encryption Targets Security, Downtime

Securing the contents of application containers based on Docker and other platforms has relied heavily on isolating individual containers from one another along with other access control approaches. Now, ...Full Article
Page 25 of 33« First...1020...2324252627...30...Last »
EnterpriseAI