Taiwan Is Open for Business: A COVID-19 Tech Template
Taiwan, tech-savvy and pandemic-prepared, has emerged as the gold standard for containing the spread of the novel coronavirus. Using hard lessons learned from previous epidemics, frequent earthquakes and other ...Full Article
Zscaler Reconfigures with Cloudneeti Deal
Zscaler Inc., the cloud security specialist, has expanded its capabilities to fix infrastructure and other platform misconfigurations via its acquisition of Cloudneeti, a move that allows the buyer to ...Full Article
Report: ‘Post-Quantum Cryptography’ Needed for Retroactive Risks
A coordinated, long-term approach is needed to confront the “retroactive risk” to secure communications posed by quantum computing, warns a new report emphasizing that code-breaking applications based on quantum ...Full Article
Service Mesh Hub Backs Istio as Adoption Accelerates
The list of open source service meshes, a low-latency infrastructure layer designed to link application containers and other microservices, continues to grow as ephemeral application infrastructure scales to production. ...Full Article
Kubernetes Tools Keep Coming
The Kubernetes ecosystem continues to expand with the launch of a new open source project to develop tools for running and managing native workflows and applications on the de ...Full Article
Shift to AI Tools Doesn’t Guarantee Secure IT
AI and machine learning tools enlisted to bolster the security of enterprise infrastructure are ubiquitous. Still, a vendor survey reveals a persistent gap between deployment and working knowledge about ...Full Article
Kubernetes Gains Stability, New Features
This year’s first update of the de facto standard Kubernetes cluster orchestrator includes 38 enhancements, of which nearly half have been declared “stable” features. Kubernetes 1.18 released this week ...Full Article
Security Threats Soar Along with Data Volumes
Lost data are costing organizations on average $1 million per month as data volumes soar and protecting stored data grows harder with the emergence of edge infrastructure handling AI ...Full Article
Feds, Tech Industry Mull Use of Cell Phone Data for COVID-19 Hot Spot Analytics
Google and a host of other technology companies are in discussions with the federal government and health experts over the use of Americans’ cell phone tracking data to analyze ...Full Article
Security Scanner Targets Container Image Registries
Lingering vulnerabilities within cloud-native platforms built around Kubernetes orchestrator deployments are spawning new security tools for scanning image registries, among the most vulnerable components of application container infrastructure. Aqua ...Full Article