News & Insights for the AI Journey|Tuesday, March 19, 2019
  • Subscribe to EnterpriseAI Weekly Updates:  Subscribe by email

Malware Goes ‘Polymorphic’

Malware Goes ‘Polymorphic’

Malware is evolving, appearing in many forms as malicious code infiltrates computing platforms under many guises. Security ...

U.S. Moves to Get AI House in Order

U.S. Moves to Get AI House in Order

An AI advisory body established by the U.S. Congress will examine how the technology can be applied ...

Azure Gains in Multi-Cloud Shift, But Complexity Grows

Azure Gains in Multi-Cloud Shift, But Complexity Grows

Microsoft Azure is benefitting most from the growing adoption of multiple cloud vendors, according to recent surveys ...

Google Hit With GDPR Fine

Google Hit With GDPR Fine

  Google got whacked again this week by European regulators for failing to comply with provisions of ...

Happening Now
Tuesday, March 19 Monday, March 18 Friday, March 15 Thursday, March 14 Wednesday, March 13 Tuesday, March 12 More Happening Now

Security

March 12, 2019(0)
The sheer breath of distributed enterprise networks increasingly running in the cloud are outpacing the ability of the latest commercial security tools needed to identify and counter cyber threats. That reality has prompted the Pentagon’s top research agency to launch an effort aimed at developing automation tools to detect, describe and blunt increasingly sophisticated attacks. The Defense Advanced Research ... Full article
March 1, 2019(0)
Malware is evolving, appearing in many forms as malicious code infiltrates computing platforms under many guises. Security experts refer to this chameleon-like malware as “polymorphic code,” and one researcher using a cloud-based, machine-learning platform to identify security threats found that the vast majority of malware is polymorphic. In an annual threat assessment. released this week, cybersecurity specialist Webroot reported ... Full article
February 26, 2019(0)
The added layer of operational complexity associated with hybrid cloud deployments is only making it harder for security teams to ward off attacks—assuming cloud users have created those teams that would ideally be working with developers and IT managers, a cloud security study concludes. Meanwhile, security researchers have uncovered an emerging threat to bare metal cloud services. A hybrid ... Full article
January 25, 2019(0)
An AI advisory body established by the U.S. Congress will examine how the technology can be applied on the battlefield. The National Security Commission on Artificial Intelligence was established by lawmakers in the most recent version of the Defense Department’s budget authorization bill. The Pentagon spending bill earmarked $10 million to fund the commission, which will assess how the U.S. ... Full article
January 24, 2019(0)
Microsoft Azure is benefitting most from the growing adoption of multiple cloud vendors, according to recent surveys of enterprise cloud managers. Perhaps the most revealing is an Amazon Web Services (NASDAQ: AMZN) user report released this week that found 35 percent of those surveyed said their organization “actively uses” the Microsoft (NASDAQ: MSFT) cloud along with AWS. Twenty-four percent ... Full article
January 23, 2019(0)
  Google got whacked again this week by European regulators for failing to comply with provisions of the EU’s General Data Protection Regulation covering data collection used for targeted advertising. The French data regulator CNIL fined the search giant a record $56.8 million (€50 million) for failing to sufficiently inform consumers about collecting data used in online ads, citing ... Full article
December 5, 2018(0)
A security flaw discovered in the de facto standard Kubernetes cloud container orchestrator allowed unauthorized users access to Kubernetes clusters and the data they contain. The “privilege escalation vulnerability” announced Monday (Dec. 3) by developers affects versions 1.0 and higher of the Kubernetes orchestrator along with Red Hat OpenShift container platform. Red Hat rated the vulnerability as “critical,” denoting ... Full article
November 29, 2018(0)
IBM and log data management startup LogDNA are collaborating on a new cloud service designed to help developers spot faults and debug code in data stored in the IBM cloud. Among the goals is reducing downtime and the resulting revenue loss. The partners said Thursday (Nov. 29) the collaboration would combine IBM’s (NYSE: IBM) log analysis tool with LogDNA features ... Full article
November 19, 2018(0)
Applications containers and other microservices are handling production workloads at an increasing rate, but several studies emphasize that container security lags. The latest concludes that risks around runtime attacks and misconfigurations highlight the reality that container security strategies remain “woefully low in maturity,” warns a survey released by container and Kubernetes security specialist StackRox. Half of container adopters said ... Full article
November 16, 2018(0)
Oracle has moved to add bandwidth and security to its cloud portfolio with the acquisition of Talari Networks, a software-defined networking specialist. Terms of the acquisition announced on Thursday (Nov. 15) were not disclosed. Oracle expects the deal to close by the end of this year. Oracle (NYSE: ORCL) said the acquisition would complement its network management infrastructure as ... Full article
November 2, 2018(0)
An open source version of the Kubernetes cluster orchestrator is intended to package and deploy cloud-native applications to restricted, on-premise infrastructure such as government clouds. Gravitational, which was founded by Rackspace veterans in 2015, said its aptly named Gravity open-source Kubernetes packaging tool emphasizes secure cloud-native application deployments. It also allows users to take a snapshot of their Kubernetes ... Full article
October 31, 2018(0)
As native cloud applications expand across companies large and in between, greater attention is being paid to securing the ephemeral application containers increasingly used to deliver distributed apps. Cloud security vendors are now attempting to scale those efforts in order to protect container-native applications and other microservices. With that in mind, Qualys Inc. announced this week its acquisition of ... Full article
October 25, 2018(0)
Dome9, the public cloud security specialist, has been acquired by another Israel-based cybersecurity vendor, Check Point Software. Check Point, Tel Aviv, said Wednesday (Oct. 24) its acquisition of Dome9 would bolster its Infinity security architecture by adding multi-cloud security along with security policy tools. Terms of the acquisition were not disclosed. Dome9’s customers used its platform to secure multi-cloud ... Full article
October 24, 2018(0)
The National Science Foundation will fund a broad range of cybersecurity, data privacy and network security research projects that includes a new Center for Trustworthy Machine Learning. NSF’s Secure and Trustworthy Cyberspace initiative will support 225 cyber and network security, privacy, cryptography and AI projects totaling $78.2 million, the agency announced Wednesday (Oct. 24). Funding for the machine learning ... Full article
October 16, 2018(0)
With upwards of 85 percent of companies using more than one cloud provider, the shift to multi-cloud deployments driven by emerging open-source platforms has prompted infrastructure vendors to begin offering management tools for migrating and integrating private and public cloud applications with on-premise systems. Among them is IBM, which this week rolled out a cloud management suite based on ... Full article
October 4, 2018(0)
Roiling the tech industry and intelligence community, a news story on the Bloomberg BusinessWeek site reports that  spies in China hacked Super Micro Computer servers widely distributed throughout the U.S. technology supply chain, including servers used by Amazon and Apple. The story has been flatly denied by all three companies and by the government of China. Called “The Big ... Full article
October 4, 2018(0)
All the talk and hype surrounding AI, machine learning and blockchain technologies has so far failed to translate into actual spending on new IT initiatives, concludes a new industry “reality check.” Instead, the survey of about 250 CIOs and IT managers found continuing investments in “foundational priorities” such as security, cloud computing, big data analysis and DevOps. By contrast, ... Full article
October 3, 2018(0)
As more enterprise workloads migrate to the cloud, companies are looking for better ways to secure mission-critical data and applications as part of their hybrid cloud strategies. With that requirement undoubtedly in mind, cybersecurity specialist Palo Alto Networks Inc. announced this week it is acquiring cloud security startup RedLock for approximately $173 million in cash. The acquisition is expected ... Full article
October 1, 2018(0)
Security and stability were the watchwords with the most recent release of Kubernetes, the third version of the production container orchestrator so far this year. The accelerating release cycle for the de facto standard cluster orchestrator illustrates its growing popularity and rapid maturation, backers noted last week. Version 1.12 includes stability features along with greater security for application containers ... Full article
September 28, 2018(0)
Something is materially broken with web application security and, as a result, critical attacks are being missed. According to a new report from Kaspersky Lab, 73 percent of corporate network breaches in 2017 were achieved via vulnerable web applications. There are a variety of factors contributing to the problem: resource constraints, concerns over false positives and the sheer volume ... Full article

More articles

Do NOT follow this link or you will be banned from the site!
Share This