Advanced Computing in the Age of AI | Friday, April 26, 2024

Update: E.U., U.S. Reach Tentative Data Transfer Deal

European regulators announced a framework agreement on Tuesday (Feb. 2) on trans-Atlantic data transfers that would require U.S. companies importing personal data from Europe to "commit to robust obligations on ...Full Article

Cybersecurity Merger Combines Spycraft, Data

Aiming to augment its virtualized platform for cyber defense with what it calls an "intelligence-led approach" to cyber security, FireEye Inc. has completed its acquisition of privately-held iSight Partners, ...Full Article

Here’s What 6 Smart People Say Enterprise Technology Managers Should Pay Attention to in 2016

Want a prediction that’s a lock for this, and every, year?  The pace of innovation in advanced scale computing will accelerate. The spread of HPC into the commercial realm ...Full Article

DevOps Security Firewall Tracks Open-Source Software

Greater use of open-source software also is increasing security risks. According to the developer of a new DevOps firewall technology, one in 16 third-party components downloaded from public repositories ...Full Article

Survey: Security Concerns Boost Hybrid Clouds

Amid lingering concerns about cloud security, a new survey of IT professional confirms that a hybrid cloud strategy is increasingly the preferred way to exploit the advantages of cloud ...Full Article

CoreOS Bolsters Container Platform With Crypto ‘Trust’

A stumbling block to broader adoption of micro-services in general and application containers in particular has been ensuring the overall security of infrastructure while running business-critical applications housed in ...Full Article

IronNet, Founded by Ex-NSA Boss, Gains Funding

A cybersecurity startup with a wealth of insider knowledge and a plan to leverage high-performance computing along with advanced visualization techniques has attracted the attention of well-known investors. IronNet ...Full Article

Tear Down Those Security Walls

Securing the enterprise like a castle of yore is bad for business, employees, and customers, so enterprises must protect data wherever it resides -- in sensors, mobile devices, silos, ...Full Article

What Will We Do About the Cybersecurity Pearl Harbor?

When I first started to equate the massive and consequential breaches suffered during the recent past with multiple Pearl Harbors, a few people thought I was over dramatic and ...Full Article

Data Theft: It’s Not the Only Danger Hackers Wreak

By manipulating or changing data, hackers can alter medical or financial records and put enterprises -- or even lives -- in danger. Tools like threat modeling allay these concerns, ...Full Article
Page 26 of 31« First...1020...2425262728...Last »
EnterpriseAI