Another Week, Another Kubernetes Security Flaw
The latest security vulnerability discovered within the Kubernetes cluster orchestrator could allow intruders to access, modify or delete computing and storage resources configured across a cluster. The flaw in ...Full Article
Hacker Traffic Havoc: Stalled Autonomous Cars and City-wide Gridlock
Another potential source of skepticism about self-driving cars has cropped up, one that the auto industry may need to quell in the public mind: a new report depicts hackers ...Full Article
Kubernetes, Container Security Woes Evolving
Kubernetes security has emerged as a booming business as deployments enter production and security vendors release a steady stream of user surveys pinpointing specific pain points in production container ...Full Article
Cloud Foundry Gets Another Security Layer
A runtime security tool released this week by Aqua Security allows users of Pivotal’s Cloud Foundry platform to scan container-based and cloud native applications from development through production workloads. ...Full Article
NVMe over Fabric Advances
Efforts to move NVM Express technology over fabrics into enterprise datacenters advanced this week with progress toward a new industry specification entering its final review. NVM Express Inc. announced ...Full Article
Docker Tightens Embrace of Kubernetes
The latest enterprise version of the Docker software container platform is aimed at delivering cloud-native applications from hybrid cloud deployments out to emerging network edge devices. The container pioneer ...Full Article
Blockchain Interoperability Remains Elusive
Early adopters of blockchain technology, particularly financial institutions that are among the first to wring out the distributed, encrypted and immutable ledgers, are being force to analyze data offline, ...Full Article
Vulnerabilities Surface as Kubernetes is Upgraded
The second release this year of the upgraded Kubernetes cluster orchestrator includes no less than 26 enhancements, including three deemed to be “stable.” Meanwhile, another security issue has turned ...Full Article
Machine Learning and Supercomputing Ferret out Phishing
The relentless ingenuity driving cyber hacking is a global engine that knows no rest. Anyone with a laptop, some programming skills and a mother’s basement can buy or rent ...Full Article
Tech Sector Frets Over U.S. Export Controls
As regulators prepare to tighten U.S. export controls with an eye toward restricting technology transfers to China, industry groups are pushing back, arguing that overly restrictive rules would cost ...Full Article