Inside Advanced Scale Challenges|Wednesday, November 14, 2018
  • Subscribe to EnterpriseTech Weekly Updates: Subscribe by email

Check Point, Cloud Security Vendor, Acquires Dome9

Check Point, Cloud Security Vendor, Acquires Dome9

Dome9, the public cloud security specialist, has been acquired by another Israel-based cybersecurity vendor, Check Point Software. ...

Bloomberg: Supermicro Motherboards Bugged by Operatives in China

Bloomberg: Supermicro Motherboards Bugged by Operatives in China

Roiling the tech industry and intelligence community, a news story on the Bloomberg BusinessWeek site reports that ...

AI, Blockchain Hype Hasn’t Translated into Investments

AI, Blockchain Hype Hasn’t Translated into Investments

All the talk and hype surrounding AI, machine learning and blockchain technologies has so far failed to ...

Man + Machine Cybersecurity: Machine Learning is Essential to Fighting Attacks

Man + Machine Cybersecurity: Machine Learning is Essential to Fighting Atta...

Something is materially broken with web application security and, as a result, critical attacks are being missed. ...

Security

November 2, 2018(0)
An open source version of the Kubernetes cluster orchestrator is intended to package and deploy cloud-native applications to restricted, on-premise infrastructure such as government clouds. Gravitational, which was founded by Rackspace veterans in 2015, said its aptly named Gravity open-source Kubernetes packaging tool emphasizes secure cloud-native application deployments. It also allows users to take a snapshot of their Kubernetes ... Full article
October 31, 2018(0)
As native cloud applications expand across companies large and in between, greater attention is being paid to securing the ephemeral application containers increasingly used to deliver distributed apps. Cloud security vendors are now attempting to scale those efforts in order to protect container-native applications and other microservices. With that in mind, Qualys Inc. announced this week its acquisition of ... Full article
October 25, 2018(0)
Dome9, the public cloud security specialist, has been acquired by another Israel-based cybersecurity vendor, Check Point Software. Check Point, Tel Aviv, said Wednesday (Oct. 24) its acquisition of Dome9 would bolster its Infinity security architecture by adding multi-cloud security along with security policy tools. Terms of the acquisition were not disclosed. Dome9’s customers used its platform to secure multi-cloud ... Full article
October 24, 2018(0)
The National Science Foundation will fund a broad range of cybersecurity, data privacy and network security research projects that includes a new Center for Trustworthy Machine Learning. NSF’s Secure and Trustworthy Cyberspace initiative will support 225 cyber and network security, privacy, cryptography and AI projects totaling $78.2 million, the agency announced Wednesday (Oct. 24). Funding for the machine learning ... Full article
October 16, 2018(0)
With upwards of 85 percent of companies using more than one cloud provider, the shift to multi-cloud deployments driven by emerging open-source platforms has prompted infrastructure vendors to begin offering management tools for migrating and integrating private and public cloud applications with on-premise systems. Among them is IBM, which this week rolled out a cloud management suite based on ... Full article
October 4, 2018(0)
Roiling the tech industry and intelligence community, a news story on the Bloomberg BusinessWeek site reports that  spies in China hacked Super Micro Computer servers widely distributed throughout the U.S. technology supply chain, including servers used by Amazon and Apple. The story has been flatly denied by all three companies and by the government of China. Called “The Big ... Full article
October 4, 2018(0)
All the talk and hype surrounding AI, machine learning and blockchain technologies has so far failed to translate into actual spending on new IT initiatives, concludes a new industry “reality check.” Instead, the survey of about 250 CIOs and IT managers found continuing investments in “foundational priorities” such as security, cloud computing, big data analysis and DevOps. By contrast, ... Full article
October 3, 2018(0)
As more enterprise workloads migrate to the cloud, companies are looking for better ways to secure mission-critical data and applications as part of their hybrid cloud strategies. With that requirement undoubtedly in mind, cybersecurity specialist Palo Alto Networks Inc. announced this week it is acquiring cloud security startup RedLock for approximately $173 million in cash. The acquisition is expected ... Full article
October 1, 2018(0)
Security and stability were the watchwords with the most recent release of Kubernetes, the third version of the production container orchestrator so far this year. The accelerating release cycle for the de facto standard cluster orchestrator illustrates its growing popularity and rapid maturation, backers noted last week. Version 1.12 includes stability features along with greater security for application containers ... Full article
September 28, 2018(0)
Something is materially broken with web application security and, as a result, critical attacks are being missed. According to a new report from Kaspersky Lab, 73 percent of corporate network breaches in 2017 were achieved via vulnerable web applications. There are a variety of factors contributing to the problem: resource constraints, concerns over false positives and the sheer volume ... Full article
September 26, 2018(0)
AMD is zeroing in on datacenter overhauls as a means of chipping away at rival Intel Corp.’s x86 dominance of the enterprise IT infrastructure market. Some market analysts are bullish about the prospects for AMD’s aggressive push into a datacenter market long dominated by Intel, a strategy that hinges on the challenger’s EPYC processor family. One analyst firm quoted ... Full article
August 22, 2018(0)
As consumer angst grows over Internet of Things security and performance, IoT startups are surfacing with schemes for safeguarding IoT devices from evolving attacks while fixing a rash of software glitches. Chip makers such as Arm Ltd. are investing heavily in new architectures designed to shore up IoT security from hub to edge. This week, a startup emerged from ... Full article
August 14, 2018(0)
A published report states that Intel chips are vulnerable to three new malware attacks with the ability to steal passwords, personal information, financial data and encryption keys. Intel has confirmed the report on its Software Developer Zone site, giving the malware a “high severity” rating. According to Intel, the malware can mount “side channel” attacks of cached data triggered ... Full article
August 13, 2018(0)
As mobile workers access more corporate data stored in the cloud, a secure network architecture called “Zero Trust” is emerging as a way of maintaining control of sensitive data while providing greater visibility into how data is being used and by whom. Zero Trust is being adopted by enterprises as a way of preventing leakage and all-out data breaches. ... Full article
August 8, 2018(0)
Oracle Corp. extended its cloud automation push this week with the release of a “self-driving” cloud database service aimed at autonomous online transaction processing while supporting data warehousing. The cloud competitor is making greater use of machine learning and other automation capabilities as it upgrades its traditional databases while differentiating its cloud services from competitors like Amazon Web Services ... Full article
August 8, 2018(0)
As the value of cryptocurrencies increased, cybercriminals quickly seized on it as a new opportunity for profit – and mischief. Ever adaptable, they adjusted their technique for generating payoffs, moving from utilizing ransomware to encrypt data to pirating enterprise computing power to hit crypto-jackpots. Cybercriminals have their sights set on enterprise networks, which provide access to thousands of machines. ... Full article
July 18, 2018(0)
News on the data security front has intensified of late, including new survey results indicating prevalent security breaches in the vulnerable retail industry, escalating cloud-based security fears, significant contract wins for security technology vendors and continued venture investment in security start-ups, beginning with yesterday’s announcement from ObserveIT that the insider threat specialist has garnered $33 million in Series B ... Full article
July 12, 2018(1)
Is quantum computing 15 years away? Twenty? Is a nation state or threat actor secretly already using it? Are threat actors already capturing and storing your data, hoping some of it will still be useful when quantum computers enable them to decrypt it? We don’t fully know the answer to these questions, but we do know one thing – ... Full article
July 3, 2018(0)
Twenty-two months after completing its $67 billion megadeal to ingest EMC Corp., Dell Technologies has again gone public with the issuance of a publicly traded tracking stock and the buyout of earlier investors in the EMC deal. The complex transaction allows founder Michael Dell and financial partner Silver Lake to maintain majority control of the IT giant. Michael Dell ... Full article
June 21, 2018(0)
The International Space Station shines a little brighter in the night sky thanks to what amounts to an orbiting supercomputer lofted to the outpost last year as part of a year-long experiment to determine if high-end commercial computers can survive a trip to Mars. The NASA upgrade to the space station’s number-crunching capability also is part of a steady ... Full article

More articles

Do NOT follow this link or you will be banned from the site!
Share This