App Tracing Startup Emerges from Stealth
As enterprise software architectures evolve beyond monolithic applications to delivering micro-services, debugging tools like distributed tracing are emerging to detect cyberattacks against one of the foundations of cloud-native deployments: ...Full Article
Cyber Security is Recovery Focus as 5G Enthusiasm Wanes
The urgency of 5G wireless rollouts has diminished among executives in a monthly survey of global business conditions as enterprises shift their pandemic recovery focus to more pressing matters ...Full Article
Massive IoT Initiative: Securing the Smart City
According to Microsoft, one particular type of project accounts for close to one quarter of all global IoT initiatives: smart-city projects. In a 451 Research report from February 2020, ...Full Article
Here’s Why Enterprise AI Is Being Drafted to Fight Stimulus Fraud
Without an enterprise AI approach, prosecutors who see fraud in the federal government’s Paycheck Protection Program admit there are too many scams to count, let alone stop. Organized crime ...Full Article
Nvidia Goes Deep With Mellanox Datacenter Net Security
When Nvidia announced its acquisition of Mellanox, the GPU leader noted that datacenters would eventually be built like high performance computers. Hence, it’s not surprising the first fruits of ...Full Article
AWS Plows Snow Family to the Edge
Amazon Web Services added to its Snow family of data migration and edge devices this week with the introduction of a secure edge computing and data transfer device dubbed ...Full Article
Oracle Extends Cloud Automation to Comms Security
Among the growing number of cloud infrastructure vulnerabilities are the legacy enterprise and contact center communication links that cloud security vendors insist are susceptible to Zero-Day and other network ...Full Article
Crypto-Jackers Target Exposed Kubernetes Workloads
As the Kubernetes cluster orchestrator moves deeper into enterprise infrastructure, cyber criminals continue to probe for weaknesses, frequently targeting application container image repositories. The latest onslaught involves misconfigured Kubeflow ...Full Article
IBM Halts Facial Recognition Sales
In a nod to the national discussion on racial equality and law enforcement, IBM CEO Arvind Krishna this week said the company will no longer sell facial recognition technology. ...Full Article
DARPA Stress Tests its Hardware-Centric Security Approach
The Defense Advanced Research Projects Agency launched a cyber security effort several years back designed to replace commonly used security patches for software applications with the ability to spot ...Full Article