Advanced Computing in the Age of AI | Monday, May 6, 2024

Conflicted Feelings: Concerns About Cloud Security Growing, But So Is Trust

Organizations are racing to the cloud at an accelerating pace – with growing anxiety. Concerns about cloud security are the core finding of a new study from Intel Security ...Full Article

Consider a ‘Genetically Diverse’ Security Strategy

Worldwide, the HPC market is booming as the industry enters the era of exascale-size data sets, and supercomputing applications expand beyond the academic and scientific world into financial services, ...Full Article

CoreOS Targets Container Image Security

Application container pioneers continue to roll out new security features as micro-services shift to primetime. The latest comes from upstart CoreOS, which introduced a new container image analyzer designed ...Full Article

IBM Bolsters Security Unit With Latest Cyber Deal

IBM moved to beef up its ability to respond to cyber attacks through the acquisition of "incident response" specialist Resilient Systems Inc. The deal underscores growing security concerns as ...Full Article

Security, New Analytics Tools Top IoT To-Do List

Bulletproof security and new data analytics head a list of emerging Internet of Things technologies seen as unlocking the promise of the construct over the next several years. In ...Full Article

Linux Vulnerability Rattles Open Source Community

A serious Linux vulnerability reverberated through the open source community this week, prompting major vendors like Cisco Systems to issue security alerts while experts attempted to determine the extent ...Full Article

Cloud Security Gets a Boost From Deep Learning

A range of new cyber security approaches is emerging that seek to shield cloud applications from attack. Some emphasize a human intelligence approach as a way of staying ahead ...Full Article

U.S. Cyber Effort Targets Open Source Software

A growing list of cyber attacks targeting U.S. government employees has prompted the Obama administration to launch a high-profile cyber security effort that among others things will target Internet ...Full Article

Detecting ‘Multi-Stage’ Cloud Cyber-Attacks from the Start

From small, hardly noticeable beginnings the biggest cloud cyber-attacks grow. Called multi-stage intrusion attacks, it’s how hackers create a virtual machine in a public cloud to penetrate the on-prem ...Full Article

Data Transfer Deal Already Under Fire

It didn't take long for dents to appear in the proposed E.U.-U.S. Privacy Shield. The trans-Atlantic data transfer agreement designed to replaced a 15-year-old Safe Harbor arrangement struck down ...Full Article
Page 25 of 31« First...1020...2324252627...30...Last »
EnterpriseAI