News & Insights for the AI Journey|Saturday, August 17, 2019
  • Subscribe to EnterpriseAI Weekly Updates:  Subscribe by email

Kubernetes Gets Security Audit

Kubernetes Gets Security Audit

An open source group is expanding its third-party security audits to include the popular but vulnerable Kubernetes ...

Another Week, Another Kubernetes Security Flaw

Another Week, Another Kubernetes Security Flaw

The latest security vulnerability discovered within the Kubernetes cluster orchestrator could allow intruders to access, modify or ...

Hacker Traffic Havoc: Stalled Autonomous Cars and City-wide Gridlock

Hacker Traffic Havoc: Stalled Autonomous Cars and City-wide Gridlock

Another potential source of skepticism about self-driving cars has cropped up, one that the auto industry may ...

Kubernetes, Container Security Woes Evolving

Kubernetes, Container Security Woes Evolving

Kubernetes security has emerged as a booming business as deployments enter production and security vendors release a ...

Happening Now
Friday, August 16 Thursday, August 15 Wednesday, August 14 Tuesday, August 13 More Happening Now

Security

August 9, 2019
An open source group is expanding its third-party security audits to include the popular but vulnerable Kubernetes cluster orchestrator. The Cloud Native Computing Foundation (CNCF) announced this week it would add Kubernetes to its pilot program of public security audits. Earlier audits of other open-source projects—CoreDNS, Envoy and Prometheus—uncovered security issues ranging from “general weaknesses to critical vulnerabilities,” the group ... Full article
August 8, 2019
The latest security vulnerability discovered within the Kubernetes cluster orchestrator could allow intruders to access, modify or delete computing and storage resources configured across a cluster. The flaw in the Kubernetes server API, designated CVE-2019-11247, allows access and deletion of those “custom resources.” Intruders could access cluster-wide resources with only standard role-based access control, or RBAC, permissions. In response, ... Full article
August 2, 2019
Another potential source of skepticism about self-driving cars has cropped up, one that the auto industry may need to quell in the public mind: a new report depicts hackers causing autonomous vehicle (AV)-driven gridlock tying up entire parts of cities. And it wouldn’t be very difficult: it’s a matter of randomly stranding a portion of internet-connected cars at strategic ... Full article
July 30, 2019
Kubernetes security has emerged as a booming business as deployments enter production and security vendors release a steady stream of user surveys pinpointing specific pain points in production container rollouts. The latest example comes from StackRox, a security vendor targeting enterprises struggling to lock down their application container and Kubernetes cluster orchestrator deployments. StackRox, which pitches a Kubernetes-native container ... Full article
July 30, 2019
A runtime security tool released this week by Aqua Security allows users of Pivotal’s Cloud Foundry platform to scan container-based and cloud native applications from development through production workloads. The partners said Tuesday (July 30) the security service can be used to automatically scan applications or container artifacts for known vulnerabilities and malware. Scans can be performed directly from ... Full article
July 25, 2019
Efforts to move NVM Express technology over fabrics into enterprise datacenters advanced this week with progress toward a new industry specification entering its final review. NVM Express Inc. announced that its NVMe-oF architecture has entered a final 45-day review as a key step toward release of a formal specification. The NVMe-0F 1.1 architecture is designed to improve storage network ... Full article
July 23, 2019
The latest enterprise version of the Docker software container platform is aimed at delivering cloud-native applications from hybrid cloud deployments out to emerging network edge devices. The container pioneer announced general availability of Docker Enterprise 3.0 on Monday (July 22). The new version also strengthens the application platform’s links to the de facto standard Kubernetes cluster orchestrator. Docker said ... Full article
June 28, 2019
Early adopters of blockchain technology, particularly financial institutions that are among the first to wring out the distributed, encrypted and immutable ledgers, are being force to analyze data offline, not “on-chain.” The primary reason is a paucity of standard query languages, data access latency and a general lack of interoperability between analytics and data visualization tools with multiple blockchain ... Full article
June 24, 2019
The second release this year of the upgraded Kubernetes cluster orchestrator includes no less than 26 enhancements, including three deemed to be “stable.” Meanwhile, another security issue has turned up in a Kubernetes interface used to run commands against Kubernetes clusters. Community leaders noted that the latest Kubernetes upgrade focuses on easing installation, configuring and upgrading the cluster orchestrator ... Full article
June 17, 2019
DDN, for two decades competing at the headwaters of high performance storage, this morning announced an enterprise-oriented end-to-end high performance storage and data management for AI, big data and HPC acceleration. In so doing, the company said it’s bringing to the burgeoning enterprise market for AI some of the transferable capabilities – with an emphasis on small file speed-ups ... Full article
June 11, 2019
Vectra, the cloud security platform vendor, has raised an additional $100 million in its latest funding round led by TCV, an early investor in technology companies ranging Facebook to Splunk. Vectra specializes in AI-based network detection and response technology embodied in its flagship Cognito cloud security platform. Since its founding in 2010, the San Jose-based company has so far ... Full article
May 23, 2019
The relentless ingenuity driving cyber hacking is a global engine that knows no rest. Anyone with a laptop, some programming skills and a mother’s basement can buy or rent a phishing kit and start attacking – or it can be done by professionals with increasingly devious techniques. For cyber-crooks, it’s a numbers game: the one in 10,000 user fooled ... Full article
May 20, 2019
As regulators prepare to tighten U.S. export controls with an eye toward restricting technology transfers to China, industry groups are pushing back, arguing that overly restrictive rules would cost U.S. industry hundreds of billions in export sales. Trade groups are meanwhile seeking to ensure that export control issues are not swept up in the current trade tensions between the ... Full article
May 7, 2019
The Linux operating system continues to evolve as more enterprise users shift their IT operations to hybrid and multiple cloud deployments while seeking a single OS capable of handling a variety of workloads. That’s the pitch made by Red Hat (NYSE: RHT), which this week announced general availability of the eighth edition of its flagship enterprise Linux OS distribution. ... Full article
May 1, 2019
The rise of application containers has touched off a debate about whether containers will eventually replace virtual machines. For a number of reasons, most notably security, probably not. At least not anytime soon. What’s striking is how similar the container and VM camps sound in promoting their latest platforms. This week, Docker unveiled the latest enterprise version of its ... Full article
April 29, 2019
Dell Technologies unveiled what amounts to a one-stop shop for cloud datacenter services built upon a VMware cloud running on hyperconverged Dell EMC infrastructure and aimed at edge computing as well as datacenters. The company (NYSE: DELL) also this week announced an expansion of its partnership with Microsoft (NASDAQ: MSFT) to supply VMware infrastructure on the Microsoft Azure cloud. ... Full article
April 24, 2019
AI and machine learning workloads along with Internet of Things and edge computing initiatives are prompting companies to add workload processing capacity. Still, according to a new survey, that new capacity is offset by the fact that new servers and other IT infrastructure often remain idle for long stretches. The survey of workload processing demand released this week by platform ... Full article
April 19, 2019
There’s been much fretting among open-source developers over the past year as software giants like IBM and Microsoft have snapped up key pieces of that vibrant community. Widely seen as operating from the premise of enlightened self-interest while tapping sources of steady innovation, Microsoft acquired GitHub last summer for $7.5 billion. IBM’s blockbuster $34 billion deal for Red Hat underscored the ... Full article
April 18, 2019
Just in time to take on cloud rival Amazon Web Services for a huge Pentagon cloud contract, Microsoft announced new Azure cloud regions and expanded DoD certifications that would allow it to handle government data classified as secret. Microsoft and AWS are the last two bidders standing for a $10 billion winner-take-all JEDI cloud contract. DoD announced in early ... Full article
April 8, 2019
Enterprises are data-rich and insight-poor as it relates to security for multi-cloud, hybrid infrastructure. Machine learning approaches are relatively well-established for email security, data loss prevention and malware detection. But for infrastructure security, ML is largely untapped, yet it can unlock the data jam and delight SecOps users, if applied correctly. The 4 Ps In our analysis, most successful ... Full article

More articles

Do NOT follow this link or you will be banned from the site!
Share This