Advanced Computing in the Age of AI | Wednesday, April 24, 2024

IT Security Shifts From Reactive to Proactive

With security threats growing more sophisticated, the market for information security products is expected to boom over the next five years, led by security testing, IT outsourcing and data ...Full Article

Study: Corporate-“Shadow” IT Gap Puts Cloud-based Data in Peril

As corporate data – much of it sensitive – flies to the cloud in growing volume, a serious disconnect between corporate and “shadow” IT has developed in recent years, ...Full Article

Cray and Deloitte Join Supercomputing with Security-as-a-Service

When cyber-criminals look at your network, what do they see? Providing the adversary's perspective on computing infrastructures they're intent on attacking is a core concept of a new "cyber ...Full Article

Datacenter Security Attracts More Investors

Efforts to lock down security in datacenters continue to expand as operators seek to assure enterprise customers they can meet increasingly strict regulatory and other data governance rules even ...Full Article

SIEM Gains as Consumer Security Software Fades

Security information and event management (SIEM) software fueled a robust global security software market in 2015 even as sales of consumer security software declined sharply last year, according to ...Full Article

A User Guide For Securing Docker Containers

As important and prevalent Docker containers are today, they still pose a unique security risk for users. Containers simplify the distribution of software and allow greater sharing of resources ...Full Article

NSA Looks to IT Industry to Harden Vulnerable U.S. Nets

U.S. intelligence agencies, including the National Security Agency, are increasingly turning to commercial solutions in their efforts to head off the alarming number of cyber attacks that culminated in ...Full Article

Researchers Endorse ‘Quantum-Safe’ Cloud Security

With cyber attacks on IT infrastructure growing more sophisticated and costly by the day, researchers are looking for new ways to stay ahead of hackers by strengthening encryption. Among ...Full Article

Machine Learning Leveraged to Spot Ransomware

Everyone seemingly is complaining about the spread of ransomware, and now somebody is trying to do something about it using machine learning-based behavioral analytics techniques to track suspicious behavior ...Full Article

Protection in the ‘Data Path’ for Security across Hybrid Environments

Bracket Computing, the hot, highly funded hybrid cloud security platform company, today announced extensions to its “Computing Cell” cloud workload protection platform, a container-like “bubble” that enables “fluid” data ...Full Article
Page 24 of 31« First...10...2223242526...30...Last »
EnterpriseAI