Advanced Computing in the Age of AI | Friday, March 31, 2023

Security

Intel Looks to Secure Containers

The world's largest chipmaker is entering the application container fray this week with the introduction of Intel Clear Containers, an outgrowth of its lightweight Linux operating system development effort ...Full Article

Social Engineering Targets Weakest Security Link: Employees

Without ongoing employee training, an enterprise's expensive security infrastructure investment means little. But very few corporations protect themselves from the growing threat of social engineering. Today only 7 percent ...Full Article

Bracket Puts Security Controls in Enterprise Hands

To further promote corporate adoption of public cloud, Bracket Computing this week added to its software-based Bracket Computing cells architecture a security suite whose controls never leave enterprise customers' hands. Public ...Full Article

Container Push Refocuses on Trusted Platforms

Red Hat, among the most vigorous proponents of delivering applications via Linux containers, acknowledges that enterprise adoption of container technology hinges on trusting the platform. Only then would true ...Full Article

Hybrid Cloud Shift Fuels Automated Security

Cloud infrastructure providers are increasingly looking for ways to automate cloud security as more customers migrate to hybrid cloud configurations in which enterprises maintain an on-premise infrastructure for sensitive ...Full Article

Wikileaks Posts Hacked Sony Files in Searchable Database

In a corporate nightmare turned reality, Wikileaks on Thursday posted a searchable database of all the Sony information hackers stole from the movie studio last year. "The Wikileaks Sony ...Full Article

Startup TruStar Platform Lets Enterprises Anonymously Share Security Breaches

Security startup TruStar Technology has launched a global platform for participating enterprises to anonymously share cybersecurity incidents. By collaborating without attribution, worry over legal issues, or concerns about damaging ...Full Article

IT Help Wanted, Especially Security Experts

They say security breaches are like heart attacks: You don't start exercising until you've had one. It appears that a lengthening series of high-profile security breaches using increasingly sophisticated ...Full Article

Juniper Networks Doubles SRX5800 Firewall Speed

Juniper Networks today unveiled new hardware for its SRX5800 Services Gateway that doubles the device's available Internet Mix (IMIX) firewall throughput to 2 terabits per second (Tbps) and addresses ...Full Article

Secure Cloud Transitions Start with Infrastructure Reviews

There's a temptation to view the many flavors of cloud as the solution to all an enterprise's network, storage, and infrastructure challenges. But simply transitioning existing processes to the ...Full Article
Page 8 of 10« First...678910
EnterpriseAI