
Security
Intel Looks to Secure Containers
The world's largest chipmaker is entering the application container fray this week with the introduction of Intel Clear Containers, an outgrowth of its lightweight Linux operating system development effort ...Full Article
Social Engineering Targets Weakest Security Link: Employees
Without ongoing employee training, an enterprise's expensive security infrastructure investment means little. But very few corporations protect themselves from the growing threat of social engineering. Today only 7 percent ...Full Article
Bracket Puts Security Controls in Enterprise Hands
To further promote corporate adoption of public cloud, Bracket Computing this week added to its software-based Bracket Computing cells architecture a security suite whose controls never leave enterprise customers' hands. Public ...Full Article
Container Push Refocuses on Trusted Platforms
Red Hat, among the most vigorous proponents of delivering applications via Linux containers, acknowledges that enterprise adoption of container technology hinges on trusting the platform. Only then would true ...Full Article
Hybrid Cloud Shift Fuels Automated Security
Cloud infrastructure providers are increasingly looking for ways to automate cloud security as more customers migrate to hybrid cloud configurations in which enterprises maintain an on-premise infrastructure for sensitive ...Full Article
Wikileaks Posts Hacked Sony Files in Searchable Database
In a corporate nightmare turned reality, Wikileaks on Thursday posted a searchable database of all the Sony information hackers stole from the movie studio last year. "The Wikileaks Sony ...Full Article
Startup TruStar Platform Lets Enterprises Anonymously Share Security Breaches
Security startup TruStar Technology has launched a global platform for participating enterprises to anonymously share cybersecurity incidents. By collaborating without attribution, worry over legal issues, or concerns about damaging ...Full Article
IT Help Wanted, Especially Security Experts
They say security breaches are like heart attacks: You don't start exercising until you've had one. It appears that a lengthening series of high-profile security breaches using increasingly sophisticated ...Full Article
Juniper Networks Doubles SRX5800 Firewall Speed
Juniper Networks today unveiled new hardware for its SRX5800 Services Gateway that doubles the device's available Internet Mix (IMIX) firewall throughput to 2 terabits per second (Tbps) and addresses ...Full Article
Secure Cloud Transitions Start with Infrastructure Reviews
There's a temptation to view the many flavors of cloud as the solution to all an enterprise's network, storage, and infrastructure challenges. But simply transitioning existing processes to the ...Full Article