Advanced Computing in the Age of AI|Sunday, July 12, 2020
  • Subscribe to EnterpriseAI Weekly Updates:  Subscribe by email

Network Security

Oracle Extends Cloud Automation to Comms Security

Among the growing number of cloud infrastructure vulnerabilities are the legacy enterprise and contact center communication links that cloud security vendors insist are susceptible to Zero-Day and other network ...Full Article

Zscaler Acquires Network Security Startup

Zscaler Inc. is doubling down in its drive to dominate the market for “zero trust” security frameworks with its second acquisition in about six weeks. The cloud security specialist ...Full Article

Startup Applies Deep Learning to Secure Unstructured Data

The millions of documents in the form of product roadmaps, contracts and other components of corporate strategies also represent unstructured—and it turns out—vulnerable data stored in-house or in the ...Full Article

Oracle Acquires SD-WAN Specialist Talari

Oracle has moved to add bandwidth and security to its cloud portfolio with the acquisition of Talari Networks, a software-defined networking specialist. Terms of the acquisition announced on Thursday ...Full Article

IoT Developers Look to Blockchain for Security

Securing the Internet of Things appears to have advanced well beyond default factory settings to include data and network security features baked into IoT components as well as comprehensive ...Full Article

Startup Puts Container Security in a Container

Among the emerging solutions for securing application containers in production is an application layer security tool that is itself a container. Startup NeuVector, which announced early stage venture funding ...Full Article

Wanted: IoT Interoperability, Security Specs

Yet another survey, this one by an Internet of Things standards group, emphasizes the need for interoperability and security standards as more devices are connected. Moreover, the survey of ...Full Article

Security Survey: The Botnets are Coming!

A new infrastructure vulnerability study confirms what became apparent late last year: botnets are exploiting inherent security weaknesses in Internet of Things (IoT) devices. The infrastructure security report released ...Full Article

IBM Moves Pipeline Operation to the Cloud

IBM will supply cloud and other IT services to a new gas pipeline company spun off earlier this month from a large energy infrastructure supplier. IBM said Thursday (July ...Full Article

NIST Looks to Secure the IoT

Among the most vulnerable points in networks ranging from home offices to the proposed Internet of Everything are radio frequency, or RF, links that will be used to tie ...Full Article
Page 1 of 212
Do NOT follow this link or you will be banned from the site!