Advanced Computing in the Age of AI | Friday, April 19, 2024

Security

Before Patched, Kubernetes Security Flaw Spread to OpenShift

A security flaw discovered in the de facto standard Kubernetes cloud container orchestrator allowed unauthorized users access to Kubernetes clusters and the data they contain. The “privilege escalation vulnerability” ...Full Article

Kubernetes Update Boosts Security, Cloud Scaling

Security and stability were the watchwords with the most recent release of Kubernetes, the third version of the production container orchestrator so far this year. The accelerating release cycle ...Full Article

Network Automation Remains Elusive, Survey Finds

Enterprise networks, the plumbing of the vaunted digital transformation, are beginning to catch up with the rest the IT operation as network managers look seriously at automation tools while ...Full Article

Early Container Deployments at Risk, Survey Finds

The enterprise embrace of application containers brings with it agility, scaling, rapid response to continuous change and new requirements for securing production workloads in public clouds. As with most ...Full Article

Serverless Security Risks Surface

Emerging serverless frameworks that dispense with server management to run cloud-native workloads continue to gain traction in the enterprise while at the same time drawing scrutiny from security specialists ...Full Article

Aqua Security Hardens Kubernetes

Seeking to bullet-proof container infrastructure from application development through runtime protection for production workloads, a security vendor has rolled out the latest version of its platform targeting Kubernetes-native application ...Full Article

IoT Gets a Security Upgrade

Processor specialist Arm is extending its push into the Internet of Things security market with a device authentication effort based on the cellular technology mainstay, the SIM card. Meanwhile, ...Full Article

Survey: Equifax Hack Highlights Open Source Insecurity

With open source software accounting for more than half of some products, process gaps are emerging for managing security. Vendors pushing approaches for monitoring software supply chains point to ...Full Article

Google, IBM Partner to Tighten Container Security

Among the ways proposed to secure application containers and micro-services as they proliferate in datacenters is more rigorous oversight of the software supply chain. With those security considerations in ...Full Article

Where Security Meets High Performance Computing
Sponsored Content by Dell EMC

As its power increases and its cost declines, High Performance Computing (HPC) is making an impact on the security field. The ability to use parallel processing to run at ...Full Article
Page 3 of 1012345...10...Last »
EnterpriseAI