Palo Alto Networks Acquires Cloud Securer RedLock
As more enterprise workloads migrate to the cloud, companies are looking for better ways to secure mission-critical data and applications as part of their hybrid cloud strategies. With that ...Full Article
Kubernetes Update Boosts Security, Cloud Scaling
Security and stability were the watchwords with the most recent release of Kubernetes, the third version of the production container orchestrator so far this year. The accelerating release cycle ...Full Article
Man + Machine Cybersecurity: Machine Learning is Essential to Fighting Attacks
Something is materially broken with web application security and, as a result, critical attacks are being missed. According to a new report from Kaspersky Lab, 73 percent of corporate ...Full Article
In Challenge to Intel, AMD Eyes Server Upgrades
AMD is zeroing in on datacenter overhauls as a means of chipping away at rival Intel Corp.’s x86 dominance of the enterprise IT infrastructure market. Some market analysts are ...Full Article
Startup Focuses on Updating IoT Devices
As consumer angst grows over Internet of Things security and performance, IoT startups are surfacing with schemes for safeguarding IoT devices from evolving attacks while fixing a rash of ...Full Article
Spectre, Meltdown Redux: Intel Chips Found Vulnerable to More Malware
A published report states that Intel chips are vulnerable to three new malware attacks with the ability to steal passwords, personal information, financial data and encryption keys. Intel has ...Full Article
‘Zero Trust’ Vendor Gains U.S. Cloud Approval
As mobile workers access more corporate data stored in the cloud, a secure network architecture called “Zero Trust” is emerging as a way of maintaining control of sensitive data ...Full Article
Oracle Automates Database Service
Oracle Corp. extended its cloud automation push this week with the release of a “self-driving” cloud database service aimed at autonomous online transaction processing while supporting data warehousing. The ...Full Article
How to Contain Cryptojackers Attacking Enterprise Networks
As the value of cryptocurrencies increased, cybercriminals quickly seized on it as a new opportunity for profit – and mischief. Ever adaptable, they adjusted their technique for generating payoffs, ...Full Article
Data Security In the News: The Weight of GDPR, Widespread Retail Breaches, Cloud Worries, More Venture Investment
News on the data security front has intensified of late, including new survey results indicating prevalent security breaches in the vulnerable retail industry, escalating cloud-based security fears, significant contract ...Full Article