Advanced Computing in the Age of AI | Sunday, April 28, 2024

Wanted: IoT Interoperability, Security Specs

Yet another survey, this one by an Internet of Things standards group, emphasizes the need for interoperability and security standards as more devices are connected. Moreover, the survey of ...Full Article

Cyber Skills Gap Grows Along With Threats

A corporate job opening typically draws as many as 250 applicants with varying qualifications. In stark contrast, a new survey of the growing cyber security skills gap reveals that ...Full Article

Startup Targets Runtime Container Security

Promising stronger and faster security for application containers in production, a startup has unveiled a new continuous security approach based on adaptive behavioral learning. The approach is said to ...Full Article

Google Expands Cloud Encryption Options

Responding to growing concerns about cloud security and data governance across different platforms, Google is expanding its cloud security options with the release of encryption key management service. The ...Full Article

Machine Learning and Online Security in 2017

As companies increase their digital footprints, ‘identify and diagnose’ capabilities will not defend against the growing array of security threats, according to analysts at Gartner Group. Because the types ...Full Article

How Retailers Can Fend Off FlokiBot Malware

The holiday shopping season is upon us, and with increased retail activity there is a corresponding increase in security threats. While many are concerned with online shopping, in-store retail ...Full Article

Forecast: Hackers Target Software-Based Nets

Among the growing list of security threats expected to expand in the coming year are hackers probing emerging software-defined infrastructure for vulnerabilities. According to a security forecast released this ...Full Article

The New Cyber Security Minefield: A Proactive, Not Reactive, Approach

In 2016, the cyber landscape shifted dramatically – at least on the adversary side. In the last few months alone, we’ve seen hackers penetrate organizations from the DNC to ...Full Article

Another IT Security Deal Targets Docker Containers

As enterprises seek ways to nail down IT security for a growing list of open-source infrastructure distributions, the security sector is moving toward critical mass with an increasing number ...Full Article

Targeting Open-Source Security Bugs

Seeking to spot potential security vulnerabilities in systems that increasingly rely on open source software, software license optimization vendor Flexera Software has acquired a specialist in identifying potentially vulnerable ...Full Article
Page 22 of 31« First...10...2021222324...30...Last »
EnterpriseAI