Advanced Computing in the Age of AI | Friday, March 29, 2024

Network Security

U.S. Looks to Smart Radio to Secure Data Networks

U.S. military and intelligence agencies are looking for ways to boost data security when communicating “in the wild.” Among the proposed approaches are emerging smart radio platforms that can ...Full Article

Oracle Extends Cloud Automation to Comms Security

Among the growing number of cloud infrastructure vulnerabilities are the legacy enterprise and contact center communication links that cloud security vendors insist are susceptible to Zero-Day and other network ...Full Article

Zscaler Acquires Network Security Startup

Zscaler Inc. is doubling down in its drive to dominate the market for “zero trust” security frameworks with its second acquisition in about six weeks. The cloud security specialist ...Full Article

Startup Applies Deep Learning to Secure Unstructured Data

The millions of documents in the form of product roadmaps, contracts and other components of corporate strategies also represent unstructured—and it turns out—vulnerable data stored in-house or in the ...Full Article

Oracle Acquires SD-WAN Specialist Talari

Oracle has moved to add bandwidth and security to its cloud portfolio with the acquisition of Talari Networks, a software-defined networking specialist. Terms of the acquisition announced on Thursday ...Full Article

IoT Developers Look to Blockchain for Security

Securing the Internet of Things appears to have advanced well beyond default factory settings to include data and network security features baked into IoT components as well as comprehensive ...Full Article

Startup Puts Container Security in a Container

Among the emerging solutions for securing application containers in production is an application layer security tool that is itself a container. Startup NeuVector, which announced early stage venture funding ...Full Article

Wanted: IoT Interoperability, Security Specs

Yet another survey, this one by an Internet of Things standards group, emphasizes the need for interoperability and security standards as more devices are connected. Moreover, the survey of ...Full Article

Security Survey: The Botnets are Coming!

A new infrastructure vulnerability study confirms what became apparent late last year: botnets are exploiting inherent security weaknesses in Internet of Things (IoT) devices. The infrastructure security report released ...Full Article

IBM Moves Pipeline Operation to the Cloud

IBM will supply cloud and other IT services to a new gas pipeline company spun off earlier this month from a large energy infrastructure supplier. IBM said Thursday (July ...Full Article
Page 1 of 212
EnterpriseAI