Advanced Computing in the Age of AI | Saturday, April 20, 2024

Security

Wikileaks Posts Hacked Sony Files in Searchable Database

In a corporate nightmare turned reality, Wikileaks on Thursday posted a searchable database of all the Sony information hackers stole from the movie studio last year. "The Wikileaks Sony ...Full Article

Startup TruStar Platform Lets Enterprises Anonymously Share Security Breaches

Security startup TruStar Technology has launched a global platform for participating enterprises to anonymously share cybersecurity incidents. By collaborating without attribution, worry over legal issues, or concerns about damaging ...Full Article

IT Help Wanted, Especially Security Experts

They say security breaches are like heart attacks: You don't start exercising until you've had one. It appears that a lengthening series of high-profile security breaches using increasingly sophisticated ...Full Article

Juniper Networks Doubles SRX5800 Firewall Speed

Juniper Networks today unveiled new hardware for its SRX5800 Services Gateway that doubles the device's available Internet Mix (IMIX) firewall throughput to 2 terabits per second (Tbps) and addresses ...Full Article

Secure Cloud Transitions Start with Infrastructure Reviews

There's a temptation to view the many flavors of cloud as the solution to all an enterprise's network, storage, and infrastructure challenges. But simply transitioning existing processes to the ...Full Article

Cloud Security: Separating Fact from Fiction

Information security is a perennial concern for the enterprise. Long before cloud computing came on the scene, maintaining the integrity of data and IT infrastructure was critical to success ...Full Article

New Windows Vulnerability at Large, Security Vendor Says

Security developer Cylance recently uncovered a new technique for stealing log-in credentials from any Windows PC, tablet, or server – including those running previews of the not-yet-released Windows 10. ...Full Article

IoT Drives Asia-Pacific Cybersecurity to $22B by 2020

Spurred by private sector awareness, political turmoil, and cybercrime, Asia-Pacific organizations will spend $22 billion on critical infrastructure technologies by 2020, ABI Research estimates. Spending is expected to increase ...Full Article

Cisco Survey Sees Evolving Security Threats

IT infrastructure and the applications they deliver along with emerging open-source web frameworks remain the most attractive targets for hackers and cyber-criminals, according to new web security research data. ...Full Article

Public Cloud In, Virtualization Out by 2019

Enterprises are leaving behind virtualization and rapidly advancing toward internal and hosted private clouds as organizations drive toward more innovation, more efficient infrastructures, and more business-oriented IT departments. By ...Full Article
Page 9 of 10« First...678910
EnterpriseAI