Inside Advanced Scale Challenges|Monday, March 19, 2018
  • Subscribe to EnterpriseTech Weekly Updates: Subscribe by email

Slider: Security

GDPR and the Data Dilemma

There’s a data dilemma in the world today. To provide the best and most personalized services to clients and to get the best analytic insights, companies need more data ...Full Article

U.S. Circles Wagons on Foreign Tech Deals

The seemingly inevitable consolidation of the global semiconductor industry, plagued as it is by overcapacity and an unending search for new markets, was slowed at least temporarily by a ...Full Article

Aqua Security Hardens Kubernetes

Seeking to bullet-proof container infrastructure from application development through runtime protection for production workloads, a security vendor has rolled out the latest version of its platform targeting Kubernetes-native application ...Full Article

4 Strategies for Implementing NIST’s Biometric Guidelines

We often hear that technology is changing rapidly. We’ve heard this phrase for years – but in 2018, it really is. Today, almost everyone has a handheld tablet or ...Full Article

Report Calls for U.S. AI Strategy Based on Trust

The rise of machine intelligence has prompted policy wonks to weigh in with a list of caveats along with recommendations for preserving the American technology lead in AI and ...Full Article

Blockchain and Biometrics Could Produce Paperless Global Travel, Boost Border Security

A wonderful week in Italy is coming to an end, and now there’s the heartbreak of leaving the life of the Med. But the spirit of la dolce vita ...Full Article

100-Year-Old Unbreakable Cipher Could Transform Digital Security

What if there were a cure for cancer, but the medical profession didn’t provide it? Or a plant that solves world food shortages, but farmers wouldn’t grow it? Or ...Full Article

AI ‘Dual Use’ Poses New Security Threats

While the genie may already be out of the bottle, the rapid growth and broad availability of AI and machine learning technology along with a growing list of development ...Full Article

Crypto-Miners’ Latest Target: Containers

The crypto-currency mining craze has now extended from hijacking supercomputers and public computing resources to include application containers, according to a security vendor. Researchers at Aqua Security said this ...Full Article

Intel Debuts Xeon SoC for Edge Applications, Addresses ‘Spectre’ and ‘Meltdown’ Fears

Intel has addressed the drive for increasingly powerful processing at the edge of systems and networks with the launch this week of the Xeon D-2100 SoC, designed to support ...Full Article
Page 1 of 1412345...10...Last »