How to Prevent GDPR Mistakes
Nearly everyone with a credit report is familiar with the recent Equifax data breach. And anyone in the business of moving sensitive data is familiar with how a robust ...Full Article
Chip Flaws ‘Meltdown’ and ‘Spectre’ Loom Large
The HPC and wider tech community are abuzz over the discovery of critical design flaws that impact virtually all contemporary microprocessors. The bugs leave processors vulnerable to side channel ...Full Article
Fending off AI Armageddon: Threats to Our Data, Our Safety, Our Country
Bruce Schneier is scary smart. The things he talks about – AI weaponization, remote hacking of commercial airliners and self-driving cars, malicious alteration of medical records – are scarier. ...Full Article
Blockchain Data Security and ‘BYOID’: Hacker’s Nightmare
New data breaches seem to happen every day. Consumers are frustrated by lack of control over their information once it is shared. Enterprises work tirelessly to avoid becoming the ...Full Article
Cost, Security Issues Persist Amid Cloud Boom
The billowing cloud market that is growing at an estimated 40 percent annually is being driven to new heights by the enterprise embrace of multi-cloud strategies along with a ...Full Article
Cybersecurity: Defending the Defenseless OS
In what could be a significant data security advance, Bracket Computing has launched a new capability designed to defend against the most insidious of “persistent” attackers, those that gain ...Full Article
Startup Puts Container Security in a Container
Among the emerging solutions for securing application containers in production is an application layer security tool that is itself a container. Startup NeuVector, which announced early stage venture funding ...Full Article
Node.js Popular With DevOps, But Security Lags
Developers are painfully aware of the risks inherent in deploying applications on the open Internet, but few are using tools designed to secure code and mitigate risks. A survey ...Full Article
DoD Looks to Break Cloud Security ‘Bottleneck’
The Pentagon is looking for ways to recast is its cloud security guidelines as a way to accelerate the department's slow migration to cloud computing. Meanwhile, key cloud providers ...Full Article
Google Upgrades Cloud Access Controls
Public cloud vendors continue to roll out tweaks and other new features designed to differentiate their services. Among them are tools designed to give enterprise users greater control over ...Full Article