Network Security
U.S. Looks to Smart Radio to Secure Data Networks
U.S. military and intelligence agencies are looking for ways to boost data security when communicating “in the wild.” Among the proposed approaches are emerging smart radio platforms that can ...Full Article
Oracle Extends Cloud Automation to Comms Security
Among the growing number of cloud infrastructure vulnerabilities are the legacy enterprise and contact center communication links that cloud security vendors insist are susceptible to Zero-Day and other network ...Full Article
Zscaler Acquires Network Security Startup
Zscaler Inc. is doubling down in its drive to dominate the market for “zero trust” security frameworks with its second acquisition in about six weeks. The cloud security specialist ...Full Article
Startup Applies Deep Learning to Secure Unstructured Data
The millions of documents in the form of product roadmaps, contracts and other components of corporate strategies also represent unstructured—and it turns out—vulnerable data stored in-house or in the ...Full Article
Oracle Acquires SD-WAN Specialist Talari
Oracle has moved to add bandwidth and security to its cloud portfolio with the acquisition of Talari Networks, a software-defined networking specialist. Terms of the acquisition announced on Thursday ...Full Article
IoT Developers Look to Blockchain for Security
Securing the Internet of Things appears to have advanced well beyond default factory settings to include data and network security features baked into IoT components as well as comprehensive ...Full Article
Startup Puts Container Security in a Container
Among the emerging solutions for securing application containers in production is an application layer security tool that is itself a container. Startup NeuVector, which announced early stage venture funding ...Full Article
Wanted: IoT Interoperability, Security Specs
Yet another survey, this one by an Internet of Things standards group, emphasizes the need for interoperability and security standards as more devices are connected. Moreover, the survey of ...Full Article
Security Survey: The Botnets are Coming!
A new infrastructure vulnerability study confirms what became apparent late last year: botnets are exploiting inherent security weaknesses in Internet of Things (IoT) devices. The infrastructure security report released ...Full Article
IBM Moves Pipeline Operation to the Cloud
IBM will supply cloud and other IT services to a new gas pipeline company spun off earlier this month from a large energy infrastructure supplier. IBM said Thursday (July ...Full Article