Advanced Computing in the Age of AI|Thursday, February 27, 2020
  • Subscribe to EnterpriseAI Weekly Updates:  Subscribe by email

cyber security

SoftIron Co-Founder, Mark Chen, Returns to Lead Company’s Secure Provenance Strategy as CSO

London – February 26, 2020 – SoftIron Ltd., maker of purpose-built and performance-optimized data center appliances, announces the appointment of Mark Chen to the role of Chief Security Officer. ...Full Article

‘Shadow IoT’ Undermining Network Security

The majority of Internet of Things transactions are unsecured, adding a new enterprise security threat as industrial and retail IoT traffic begins to ramp up. An enterprise IoT survey ...Full Article

Cloud Now Seen as a Security ‘Enabler’

Cloud security remains a challenge as more enterprises shift mission critical applications and data to hybrid deployments. As cloud adopters go native with applications and services, their cloud platforms ...Full Article

Hacker Survey: Simple Attacks Breach Systems in a Day

A security vendor survey of professional hackers finds that many are able to easily defeat “perimeter defenses” like firewalls, then pinpoint and steal critical data in less than a ...Full Article

Oracle Automates the Data Warehouse

Oracle Corp. released the first of what it says will be a string of cloud platform services based on machine learning that are designed to differentiate the cloud upstart ...Full Article

Crypto-Miners’ Latest Target: Containers

The crypto-currency mining craze has now extended from hijacking supercomputers and public computing resources to include application containers, according to a security vendor. Researchers at Aqua Security said this ...Full Article

CSRA Emerges as U.S. IT Powerhouse

A well connected IT services provider formed through the merger of established government contractors is steadily extending its reach from providing cloud services the U.S. military to training the ...Full Article

U.S. Expands Cyber Training Effort

In order to secure enterprise networks and their far-flung components, everyone needs to be on the same page. That's at least part of the thinking behind a renewed U.S. ...Full Article

WannaCry Lingers, Cyber Analyst Warns

One week after a ransomware attack cut a swathe across Europe and China, a range of after-action analyses have emerged as to how the exploit unfolded and how the ...Full Article

New Malware ‘Bricks’ IoT Devices

Despite repeated assurances that Internet of Things security issues are being addressed, so-called "in-the-wild" attacks on poorly secured devices reveal that securing the IoT still has a long way ...Full Article
Page 1 of 212
Do NOT follow this link or you will be banned from the site!