Covering Scientific & Technical AI | Thursday, December 26, 2024

Palo Alto Networks Acquires Cloud Securer RedLock

As more enterprise workloads migrate to the cloud, companies are looking for better ways to secure mission-critical data and applications as part of their hybrid cloud strategies. With that ...Full Article

Kubernetes Update Boosts Security, Cloud Scaling

Security and stability were the watchwords with the most recent release of Kubernetes, the third version of the production container orchestrator so far this year. The accelerating release cycle ...Full Article

Man + Machine Cybersecurity: Machine Learning is Essential to Fighting Attacks

Something is materially broken with web application security and, as a result, critical attacks are being missed. According to a new report from Kaspersky Lab, 73 percent of corporate ...Full Article

In Challenge to Intel, AMD Eyes Server Upgrades

AMD is zeroing in on datacenter overhauls as a means of chipping away at rival Intel Corp.’s x86 dominance of the enterprise IT infrastructure market. Some market analysts are ...Full Article

Startup Focuses on Updating IoT Devices

As consumer angst grows over Internet of Things security and performance, IoT startups are surfacing with schemes for safeguarding IoT devices from evolving attacks while fixing a rash of ...Full Article

Spectre, Meltdown Redux: Intel Chips Found Vulnerable to More Malware

A published report states that Intel chips are vulnerable to three new malware attacks with the ability to steal passwords, personal information, financial data and encryption keys. Intel has ...Full Article

‘Zero Trust’ Vendor Gains U.S. Cloud Approval

As mobile workers access more corporate data stored in the cloud, a secure network architecture called “Zero Trust” is emerging as a way of maintaining control of sensitive data ...Full Article

Oracle Automates Database Service

Oracle Corp. extended its cloud automation push this week with the release of a “self-driving” cloud database service aimed at autonomous online transaction processing while supporting data warehousing. The ...Full Article

How to Contain Cryptojackers Attacking Enterprise Networks

As the value of cryptocurrencies increased, cybercriminals quickly seized on it as a new opportunity for profit – and mischief. Ever adaptable, they adjusted their technique for generating payoffs, ...Full Article

Data Security In the News: The Weight of GDPR, Widespread Retail Breaches, Cloud Worries, More Venture Investment

News on the data security front has intensified of late, including new survey results indicating prevalent security breaches in the vulnerable retail industry, escalating cloud-based security fears, significant contract ...Full Article
Page 18 of 34« First...10...1617181920...30...Last »
AIwire