News & Insights for the AI Journey|Sunday, May 26, 2019
  • Subscribe to EnterpriseAI Weekly Updates:  Subscribe by email

Machine Learning and Supercomputing Ferret out Phishing

Machine Learning and Supercomputing Ferret out Phishing

The relentless ingenuity driving cyber hacking is a global engine that knows no rest. Anyone with a ...

Tech Sector Frets Over U.S. Export Controls

Tech Sector Frets Over U.S. Export Controls

As regulators prepare to tighten U.S. export controls with an eye toward restricting technology transfers to China, ...

RHEL 8 Aimed at Hybrid Cloud Deployments

RHEL 8 Aimed at Hybrid Cloud Deployments

The Linux operating system continues to evolve as more enterprise users shift their IT operations to hybrid ...

Docker Tightens its Embrace of Kubernetes

Docker Tightens its Embrace of Kubernetes

The rise of application containers has touched off a debate about whether containers will eventually replace virtual ...

Happening Now
Friday, May 24 Thursday, May 23 Wednesday, May 22 Tuesday, May 21 Monday, May 20 Friday, May 17 Thursday, May 16 More Happening Now

Security

May 23, 2019
The relentless ingenuity driving cyber hacking is a global engine that knows no rest. Anyone with a laptop, some programming skills and a mother’s basement can buy or rent a phishing kit and start attacking – or it can be done by professionals with increasingly devious techniques. For cyber-crooks, it’s a numbers game: the one in 10,000 user fooled ... Full article
May 20, 2019
As regulators prepare to tighten U.S. export controls with an eye toward restricting technology transfers to China, industry groups are pushing back, arguing that overly restrictive rules would cost U.S. industry hundreds of billions in export sales. Trade groups are meanwhile seeking to ensure that export control issues are not swept up in the current trade tensions between the ... Full article
May 7, 2019
The Linux operating system continues to evolve as more enterprise users shift their IT operations to hybrid and multiple cloud deployments while seeking a single OS capable of handling a variety of workloads. That’s the pitch made by Red Hat (NYSE: RHT), which this week announced general availability of the eighth edition of its flagship enterprise Linux OS distribution. ... Full article
May 1, 2019
The rise of application containers has touched off a debate about whether containers will eventually replace virtual machines. For a number of reasons, most notably security, probably not. At least not anytime soon. What’s striking is how similar the container and VM camps sound in promoting their latest platforms. This week, Docker unveiled the latest enterprise version of its ... Full article
April 29, 2019
Dell Technologies unveiled what amounts to a one-stop shop for cloud datacenter services built upon a VMware cloud running on hyperconverged Dell EMC infrastructure and aimed at edge computing as well as datacenters. The company (NYSE: DELL) also this week announced an expansion of its partnership with Microsoft (NASDAQ: MSFT) to supply VMware infrastructure on the Microsoft Azure cloud. ... Full article
April 24, 2019
AI and machine learning workloads along with Internet of Things and edge computing initiatives are prompting companies to add workload processing capacity. Still, according to a new survey, that new capacity is offset by the fact that new servers and other IT infrastructure often remain idle for long stretches. The survey of workload processing demand released this week by platform ... Full article
April 19, 2019
There’s been much fretting among open-source developers over the past year as software giants like IBM and Microsoft have snapped up key pieces of that vibrant community. Widely seen as operating from the premise of enlightened self-interest while tapping sources of steady innovation, Microsoft acquired GitHub last summer for $7.5 billion. IBM’s blockbuster $34 billion deal for Red Hat underscored the ... Full article
April 18, 2019
Just in time to take on cloud rival Amazon Web Services for a huge Pentagon cloud contract, Microsoft announced new Azure cloud regions and expanded DoD certifications that would allow it to handle government data classified as secret. Microsoft and AWS are the last two bidders standing for a $10 billion winner-take-all JEDI cloud contract. DoD announced in early ... Full article
April 8, 2019
Enterprises are data-rich and insight-poor as it relates to security for multi-cloud, hybrid infrastructure. Machine learning approaches are relatively well-established for email security, data loss prevention and malware detection. But for infrastructure security, ML is largely untapped, yet it can unlock the data jam and delight SecOps users, if applied correctly. The 4 Ps In our analysis, most successful ... Full article
March 22, 2019
Concerns about the security of application containers have reemerged as the micro-services technology spreads across the enterprise. Those worries are fueled by recent reports of a “breakout” vulnerability in the container runtime known as runC. In response, providers of container data services used by DevOps teams are again stressing security features such as isolation of individual containers as more companies ... Full article
March 19, 2019
Tabor Communications, publisher of high performance technology publications HPCwire, Datanami and EnterpriseTech, has announced that EnterpriseTech has been re-branded as EnterpriseAI. The new name reflects the publication’s increased focus on AI in recent years and increased interest in AI, machine learning, deep learning, robotics and other AI-related technologies among enterprise IT strategists. “EnterpriseTech, focused since its founding on enterprise ... Full article
March 12, 2019
The sheer breath of distributed enterprise networks increasingly running in the cloud are outpacing the ability of the latest commercial security tools needed to identify and counter cyber threats. That reality has prompted the Pentagon’s top research agency to launch an effort aimed at developing automation tools to detect, describe and blunt increasingly sophisticated attacks. The Defense Advanced Research ... Full article
March 1, 2019
Malware is evolving, appearing in many forms as malicious code infiltrates computing platforms under many guises. Security experts refer to this chameleon-like malware as “polymorphic code,” and one researcher using a cloud-based, machine-learning platform to identify security threats found that the vast majority of malware is polymorphic. In an annual threat assessment. released this week, cybersecurity specialist Webroot reported ... Full article
February 26, 2019
The added layer of operational complexity associated with hybrid cloud deployments is only making it harder for security teams to ward off attacks—assuming cloud users have created those teams that would ideally be working with developers and IT managers, a cloud security study concludes. Meanwhile, security researchers have uncovered an emerging threat to bare metal cloud services. A hybrid ... Full article
January 25, 2019
An AI advisory body established by the U.S. Congress will examine how the technology can be applied on the battlefield. The National Security Commission on Artificial Intelligence was established by lawmakers in the most recent version of the Defense Department’s budget authorization bill. The Pentagon spending bill earmarked $10 million to fund the commission, which will assess how the U.S. ... Full article
January 24, 2019
Microsoft Azure is benefitting most from the growing adoption of multiple cloud vendors, according to recent surveys of enterprise cloud managers. Perhaps the most revealing is an Amazon Web Services (NASDAQ: AMZN) user report released this week that found 35 percent of those surveyed said their organization “actively uses” the Microsoft (NASDAQ: MSFT) cloud along with AWS. Twenty-four percent ... Full article
January 23, 2019
  Google got whacked again this week by European regulators for failing to comply with provisions of the EU’s General Data Protection Regulation covering data collection used for targeted advertising. The French data regulator CNIL fined the search giant a record $56.8 million (€50 million) for failing to sufficiently inform consumers about collecting data used in online ads, citing ... Full article
December 5, 2018
A security flaw discovered in the de facto standard Kubernetes cloud container orchestrator allowed unauthorized users access to Kubernetes clusters and the data they contain. The “privilege escalation vulnerability” announced Monday (Dec. 3) by developers affects versions 1.0 and higher of the Kubernetes orchestrator along with Red Hat OpenShift container platform. Red Hat rated the vulnerability as “critical,” denoting ... Full article
November 29, 2018
IBM and log data management startup LogDNA are collaborating on a new cloud service designed to help developers spot faults and debug code in data stored in the IBM cloud. Among the goals is reducing downtime and the resulting revenue loss. The partners said Thursday (Nov. 29) the collaboration would combine IBM’s (NYSE: IBM) log analysis tool with LogDNA features ... Full article
November 19, 2018
Applications containers and other microservices are handling production workloads at an increasing rate, but several studies emphasize that container security lags. The latest concludes that risks around runtime attacks and misconfigurations highlight the reality that container security strategies remain “woefully low in maturity,” warns a survey released by container and Kubernetes security specialist StackRox. Half of container adopters said ... Full article

More articles

Do NOT follow this link or you will be banned from the site!
Share This