![](https://www.aiwire.net/wp-content/uploads/2015/05/security-370x290.jpg)
Security
Bracket Puts Security Controls in Enterprise Hands
To further promote corporate adoption of public cloud, Bracket Computing this week added to its software-based Bracket Computing cells architecture a security suite whose controls never leave enterprise customers' hands. Public ...Full Article
Container Push Refocuses on Trusted Platforms
Red Hat, among the most vigorous proponents of delivering applications via Linux containers, acknowledges that enterprise adoption of container technology hinges on trusting the platform. Only then would true ...Full Article
Hybrid Cloud Shift Fuels Automated Security
Cloud infrastructure providers are increasingly looking for ways to automate cloud security as more customers migrate to hybrid cloud configurations in which enterprises maintain an on-premise infrastructure for sensitive ...Full Article
Wikileaks Posts Hacked Sony Files in Searchable Database
In a corporate nightmare turned reality, Wikileaks on Thursday posted a searchable database of all the Sony information hackers stole from the movie studio last year. "The Wikileaks Sony ...Full Article
Startup TruStar Platform Lets Enterprises Anonymously Share Security Breaches
Security startup TruStar Technology has launched a global platform for participating enterprises to anonymously share cybersecurity incidents. By collaborating without attribution, worry over legal issues, or concerns about damaging ...Full Article
IT Help Wanted, Especially Security Experts
They say security breaches are like heart attacks: You don't start exercising until you've had one. It appears that a lengthening series of high-profile security breaches using increasingly sophisticated ...Full Article
Juniper Networks Doubles SRX5800 Firewall Speed
Juniper Networks today unveiled new hardware for its SRX5800 Services Gateway that doubles the device's available Internet Mix (IMIX) firewall throughput to 2 terabits per second (Tbps) and addresses ...Full Article
Secure Cloud Transitions Start with Infrastructure Reviews
There's a temptation to view the many flavors of cloud as the solution to all an enterprise's network, storage, and infrastructure challenges. But simply transitioning existing processes to the ...Full Article
Cloud Security: Separating Fact from Fiction
Information security is a perennial concern for the enterprise. Long before cloud computing came on the scene, maintaining the integrity of data and IT infrastructure was critical to success ...Full Article
New Windows Vulnerability at Large, Security Vendor Says
Security developer Cylance recently uncovered a new technique for stealing log-in credentials from any Windows PC, tablet, or server – including those running previews of the not-yet-released Windows 10. ...Full Article