Advanced Computing in the Age of AI | Monday, May 6, 2024

How to Prevent GDPR Mistakes

Nearly everyone with a credit report is familiar with the recent Equifax data breach. And anyone in the business of moving sensitive data is familiar with how a robust ...Full Article

Chip Flaws ‘Meltdown’ and ‘Spectre’ Loom Large

The HPC and wider tech community are abuzz over the discovery of critical design flaws that impact virtually all contemporary microprocessors. The bugs leave processors vulnerable to side channel ...Full Article

Fending off AI Armageddon: Threats to Our Data, Our Safety, Our Country

Bruce Schneier is scary smart. The things he talks about – AI weaponization, remote hacking of commercial airliners and self-driving cars, malicious alteration of medical records – are scarier. ...Full Article

Blockchain Data Security and ‘BYOID’: Hacker’s Nightmare

New data breaches seem to happen every day. Consumers are frustrated by lack of control over their information once it is shared. Enterprises work tirelessly to avoid becoming the ...Full Article

Cost, Security Issues Persist Amid Cloud Boom

The billowing cloud market that is growing at an estimated 40 percent annually is being driven to new heights by the enterprise embrace of multi-cloud strategies along with a ...Full Article

Cybersecurity: Defending the Defenseless OS

In what could be a significant data security advance, Bracket Computing has launched a new capability  designed to defend against the most insidious of “persistent” attackers, those that gain ...Full Article

Startup Puts Container Security in a Container

Among the emerging solutions for securing application containers in production is an application layer security tool that is itself a container. Startup NeuVector, which announced early stage venture funding ...Full Article

Node.js Popular With DevOps, But Security Lags

Developers are painfully aware of the risks inherent in deploying applications on the open Internet, but few are using tools designed to secure code and mitigate risks. A survey ...Full Article

DoD Looks to Break Cloud Security ‘Bottleneck’

The Pentagon is looking for ways to recast is its cloud security guidelines as a way to accelerate the department's slow migration to cloud computing. Meanwhile, key cloud providers ...Full Article

Google Upgrades Cloud Access Controls

Public cloud vendors continue to roll out tweaks and other new features designed to differentiate their services. Among them are tools designed to give enterprise users greater control over ...Full Article
Page 19 of 31« First...10...1718192021...30...Last »
EnterpriseAI