Inside Advanced Scale Challenges|Thursday, November 23, 2017
  • Subscribe to EnterpriseTech Weekly Updates: Subscribe by email

Cybersecurity: Defending the Defenseless OS

Cybersecurity: Defending the Defenseless OS

In what could be a significant data security advance, Bracket Computing has launched a new capability  designed ...

Startup Puts Container Security in a Container

Startup Puts Container Security in a Container

Among the emerging solutions for securing application containers in production is an application layer security tool that ...

Node.js Popular With DevOps, But Security Lags

Node.js Popular With DevOps, But Security Lags

Developers are painfully aware of the risks inherent in deploying applications on the open Internet, but few ...

DoD Looks to Break Cloud Security ‘Bottleneck’

DoD Looks to Break Cloud Security ‘Bottleneck’

The Pentagon is looking for ways to recast is its cloud security guidelines as a way to ...

Security

November 21, 2017(0)
Public cloud giant Amazon Web Services announced a new "secret region" this week designed to complete its portfolio of data classifications for U.S. government workloads. AWS said Monday (Nov. 20) that 17 U.S. intelligence agencies and government contractors with "secret-level" network access could run analytics and other workloads in the CIA cloud. AWS won a $600 million Commercial Cloud ... Full article
November 8, 2017(0)
Among the emerging solutions for securing application containers in production is an application layer security tool that is itself a container. Startup NeuVector, which announced early stage venture funding this week, is pitching a cloud-native container firewall that seeks to secure application containers and their host networks at their most vulnerable points: during runtime. San Jose-based NeuVector launched its ... Full article
November 3, 2017(0)
Developers are painfully aware of the risks inherent in deploying applications on the open Internet, but few are using tools designed to secure code and mitigate risks. A survey released by Node.js JavaScript runtime vendor NodeSource and software security startup Sqreen found that more than one-third of the Node.js developers and executives it polled expect to be hacked. Indeed, ... Full article
October 23, 2017(0)
ARM is launching a "secure core" approach to bulletproofing the Internet of Things that addresses network security at the microcontroller level. The approach introduced at a company event this week seeks to provide a common security framework for embedding security into the next wave of connected IoT devices that must be "born secure," the chip specialist asserted. The U.K. ... Full article
October 20, 2017(0)
The Pentagon is looking for ways to recast is its cloud security guidelines as a way to accelerate the department's slow migration to cloud computing. Meanwhile, key cloud providers to the U.S. military are extending their capabilities via acquisitions while expanding their capabilities to handle classified workloads. The Defense Department's chief information officer for cyber-security confirmed this week that ... Full article
October 17, 2017(0)
With open source software accounting for more than half of some products, process gaps are emerging for managing security. Vendors pushing approaches for monitoring software supply chains point to the recent Equifax breach affecting about 143 million consumers as a case in point: hackers exploited and Apache Struts vulnerability after the company ignored a security patch released six months ... Full article
October 9, 2017(0)
Bitcoin mining is among the latest threats to public cloud security as hackers breach enterprise computing resources to hunt for the digital currency. Cloud security vendor RedLock reported earlier this month that hackers were using Amazon Web Services (NASDAQ: AMZN) cloud computing resources to mine for bitcoins. The process involves collecting all transactions made during a set period into ... Full article
October 3, 2017(0)
Public cloud vendors continue to roll out tweaks and other new features designed to differentiate their services. Among them are tools designed to give enterprise users greater control over cloud services as more applications and data are moved there. With that in mind, Google is unveiling new identity and access management (IAM) features for handling customers' public permissions on ... Full article
September 26, 2017(0)
The blockchain ecosystem continues to evolve as competing industry alliances seek to push the transaction database technology deeper into enterprises, including the first international real estate transaction. Blockchain serves as a distributed ledger framework that posts transactions in real-time as cryptographically unique “blocks,” visible to authorized users. These blocks cannot be reversed or changed, with new additions to the ... Full article
September 26, 2017(0)
If the AI hype cycle were a dial setting on a washing machine, it would now be in the spin cycle phase. It’s intense. The talk and hopes for AI are so exciting, there’s so much potential, we wait breathlessly for an incredible new age of smart systems that will revolutionize not just IT but, like, the whole world, ... Full article
September 19, 2017(0)
As enterprise adoption of public cloud services accelerates, confusion persists among cloud providers and customers over responsibility for data and application security. A vendor survey of 300 IT decision makers released this week confirms that public cloud adoption is growing at a rapid rate as a range of industries look beyond on-premise datacenters to scale storage and computing. The ... Full article
September 15, 2017(0)
In the aftermath of the second massive security breach at Equifax Inc. in four years, the Apache Foundation confirmed this week the data breach stemmed from the consumer credit reporting agency's failure to install patches to Apache Struts, an open source framework used to build Java web applications. In a statement released Thursday (Sept. 14), the foundation said a ... Full article
September 7, 2017(0)
Investment continues to flow into artificial intelligence research, especially in key areas such as AI algorithms that promise to move the technology from specialized tasks to broader applications that leverage big data and exploit machine and "continuous" learning capabilities. With those and other goals in mind—including the societal implications of AI—IBM and the Massachusetts Institute of Technology announced an ... Full article
August 28, 2017(0)
The booming GPU market propelled by new implementations ranging from "GPU clouds" for deep learning to HPC applications is getting an additional lift from growing demand for "add-in" graphics boards used in servers and, more recently, "mining" Ethereum virtual currency. Among other things, Ethereum is designed to make it easier to create blockchain applications. Mining, which involves participating in ... Full article
August 25, 2017(0)
A well connected IT services provider formed through the merger of established government contractors is steadily extending its reach from providing cloud services the U.S. military to training the next wave of cyber security specialists. CSRA Inc., Falls Church, Va., was spun off from long-time federal contractor CSC (formerly Computer Science Corp.) in 2015 and began trading on the ... Full article
August 21, 2017(0)
Reflecting growing cyber security threats, global spending on information security products is expected to rise by 7 percent this year, according to a new forecast. Gartner Inc. pegs the global market for information security products and services at $86.4 billion this year, predicting it will rise in parallel with cyber threats to an estimated $93 billion in 2018. Among ... Full article
August 8, 2017(1)
In order to secure enterprise networks and their far-flung components, everyone needs to be on the same page. That's at least part of the thinking behind a renewed U.S. cyber initiative designed to bring embattled security teams up to speed as threats continue to evolve. The National Institute of Standards and Technology (NIST), which helps develop a range of ... Full article
August 7, 2017(0)
Responding to a rash of malware attacks on early and vulnerable Internet of Things devices, lawmakers have stepped forward with a proposal to improve weak IoT cyber-security. While attempts at legislating technical specs don't always pan out, four U.S. senators are nevertheless proposing legislation that would attempt to shore up standards for IoT, starting with devices used by government ... Full article
July 24, 2017(0)
The U.S. military long ago ceded dominance in electronics innovation to Silicon Valley, the DoD-backed powerhouse that has driven microelectronic generation for decades. With Moore's Law clearly running out of steam, the Defense Advanced Research Projects Agency (DARPA) is attempting to reinvigorate and leverage a vibrant domestic chip sector with a $200 million initiative designed among other things to ... Full article
July 21, 2017(0)
As network bottlenecks mount in datacenters—a hurdle that will only get worse with the deployment of business analytics using machine learning—there is a growing need for networking solutions that can scale to tens of thousands of connections without breaking the bank. As things stand now, only hyper-scale cloud service providers can achieve the economies of scale that make smart ... Full article

More articles

Share This