Covering Scientific & Technical AI | Monday, February 10, 2025

Security

Bracket Puts Security Controls in Enterprise Hands

To further promote corporate adoption of public cloud, Bracket Computing this week added to its software-based Bracket Computing cells architecture a security suite whose controls never leave enterprise customers' hands. Public ...Full Article

Container Push Refocuses on Trusted Platforms

Red Hat, among the most vigorous proponents of delivering applications via Linux containers, acknowledges that enterprise adoption of container technology hinges on trusting the platform. Only then would true ...Full Article

Hybrid Cloud Shift Fuels Automated Security

Cloud infrastructure providers are increasingly looking for ways to automate cloud security as more customers migrate to hybrid cloud configurations in which enterprises maintain an on-premise infrastructure for sensitive ...Full Article

Wikileaks Posts Hacked Sony Files in Searchable Database

In a corporate nightmare turned reality, Wikileaks on Thursday posted a searchable database of all the Sony information hackers stole from the movie studio last year. "The Wikileaks Sony ...Full Article

Startup TruStar Platform Lets Enterprises Anonymously Share Security Breaches

Security startup TruStar Technology has launched a global platform for participating enterprises to anonymously share cybersecurity incidents. By collaborating without attribution, worry over legal issues, or concerns about damaging ...Full Article

IT Help Wanted, Especially Security Experts

They say security breaches are like heart attacks: You don't start exercising until you've had one. It appears that a lengthening series of high-profile security breaches using increasingly sophisticated ...Full Article

Juniper Networks Doubles SRX5800 Firewall Speed

Juniper Networks today unveiled new hardware for its SRX5800 Services Gateway that doubles the device's available Internet Mix (IMIX) firewall throughput to 2 terabits per second (Tbps) and addresses ...Full Article

Secure Cloud Transitions Start with Infrastructure Reviews

There's a temptation to view the many flavors of cloud as the solution to all an enterprise's network, storage, and infrastructure challenges. But simply transitioning existing processes to the ...Full Article

Cloud Security: Separating Fact from Fiction

Information security is a perennial concern for the enterprise. Long before cloud computing came on the scene, maintaining the integrity of data and IT infrastructure was critical to success ...Full Article

New Windows Vulnerability at Large, Security Vendor Says

Security developer Cylance recently uncovered a new technique for stealing log-in credentials from any Windows PC, tablet, or server – including those running previews of the not-yet-released Windows 10. ...Full Article
Page 9 of 10« First...678910
AIwire