Inside Advanced Scale Challenges|Thursday, April 26, 2018
  • Subscribe to EnterpriseTech Weekly Updates: Subscribe by email

Cryptojacking: Cryptocurrency Mining Meets Malicious Intentions

Cryptojacking: Cryptocurrency Mining Meets Malicious Intentions

 With data center technology evolving relentlessly, IT professionals must grapple with a dynamic security landscape, as malicious ...

Google, Atos Partner on Cloud Machine Learning

Google, Atos Partner on Cloud Machine Learning

Google continues to add regional cloud partners as it seeks to differentiate its public cloud offerings while ...

Hacker Survey: Simple Attacks Breach Systems in a Day

Hacker Survey: Simple Attacks Breach Systems in a Day

A security vendor survey of professional hackers finds that many are able to easily defeat “perimeter defenses” ...

Serverless Security Risks Surface

Serverless Security Risks Surface

Emerging serverless frameworks that dispense with server management to run cloud-native workloads continue to gain traction in ...

Security

April 25, 2018(0)
 With data center technology evolving relentlessly, IT professionals must grapple with a dynamic security landscape, as malicious actors leverage new capabilities to launch even more sophisticated cyberattacks, particularly in the ransomware genre. One such example is the recent intersection of cryptocurrencies, data storage and cyberattacks. While ransomware has been a longstanding data theft strategy, a newer, more lucrative opportunity ... Full article
April 25, 2018(0)
Google continues to add regional cloud partners as it seeks to differentiate its public cloud offerings while distributing its machine learning building blocks. Atos, the French big data platform and server vendor, announced a partnership with Google Cloud this week addressing secure hybrid cloud, data analytics and machine learning along with “digital workplace” initiatives. The partnership makes Google an ... Full article
April 17, 2018(0)
VMware this week takes the wraps off the latest versions of its server virtualization and software-defined storage platforms with an emphasis on hybrid cloud deployments, broader application support and—in the case of its vSphere platform—a three-fold reduction in memory usage and resulting performance gains via the introduction of a persistent memory feature. The latest versions of VMware’s (NYSE: VMW) ... Full article
April 11, 2018(0)
A security vendor survey of professional hackers finds that many are able to easily defeat “perimeter defenses” like firewalls, then pinpoint and steal critical data in less than a day. The findings also support the conclusion that high-profile security breaches result from routine security lapses like failing to apply security patches rather than increasingly sophisticated attacks. The survey of ... Full article
April 6, 2018(0)
Emerging serverless frameworks that dispense with server management to run cloud-native workloads continue to gain traction in the enterprise while at the same time drawing scrutiny from security specialists who report a growing number of vulnerabilities as serverless applications are rolled out. An audit released this week by an Israeli security company found that roughly one in five serverless ... Full article
April 5, 2018(0)
In Intel’s latest (and possibly final) update to its Meltdown and Spectre mitigation guide, published April 3, the company revealed that a number of its older CPU models will not receive microcode updates intended to protect against one of the now notorious security vulnerabilities that came to light in early January and found to afflict most modern chips. Said Intel: ... Full article
April 5, 2018(0)
The tech community has been discussing European Union’s General Data Protection Regulation (GDPR) as if it were a natural disaster, rather than a law. “Are you ready for GDPR?” say all emails from vendors hoping to milk the confusion. More than enough articles have attempted to decipher the rules, predict winners and losers or pour gasoline on our collective ... Full article
April 4, 2018(0)
The breakneck pace of machine intelligence development is prompting welcome assessments of the ethical implications of a technology that will have a profound effect on workers, consumers and most every other segment of society. With that sobering reality in mind, a new risk assessment released by federal contractor Booz Allen Hamilton seeks to move beyond the often-heated rhetoric associated ... Full article
April 3, 2018(0)
Securing the Internet of Things appears to have advanced well beyond default factory settings to include data and network security features baked into IoT components as well as comprehensive approaches such as blockchain cryptography. The latest study by an IoT industry group found that data security along with network connectivity were key challenges as the technology moves from the ... Full article
March 28, 2018(0)
The logistical and transactional advantages of blockchain technology could create more enterprise use cases based on the trusted sharing of data that eliminates third-party threats along with moves to develop industry standards that would fuel deployments, according to a new study that seeks to separate the distributed ledger technology’s promise from hype generated by early applications such as bitcoin ... Full article
March 20, 2018(0)
A batch of new open source efforts will among other things seek to unlock and define a firmware stack that would operate across enterprise infrastructure, cloud datacenters on up to HPC implementations. The Linux Foundation said this week its firmware initiative called OpenBMC (baseboard management controller) seeks to shed light on “often secretive” hardware design to expand access and ... Full article
March 15, 2018(0)
The accelerating pace of AI development continues to attract the attention of policy wonks who simultaneously view the technology as a strategic asset while worrying about unforeseen consequences of using the technology in war. The Washington-based Center for a New American Security is the latest think tank to weigh in on the nettlesome questions of how, where and in ... Full article
March 15, 2018(0)
There’s a data dilemma in the world today. To provide the best and most personalized services to clients and to get the best analytic insights, companies need more data than ever before. Yet to comply with ever-increasing privacy regulations, they need to shed excess data and limit its use. Take the financial services industry. From SEC 17a-4 to FINRA, ... Full article
March 13, 2018(0)
The seemingly inevitable consolidation of the global semiconductor industry, plagued as it is by overcapacity and an unending search for new markets, was slowed at least temporarily by a Republican administration that invoked national security as a reason for intervening in technology markets. Previously, economic conservatives would have called the Trump administration move a case of “picking winners and ... Full article
March 8, 2018(0)
Seeking to bullet-proof container infrastructure from application development through runtime protection for production workloads, a security vendor has rolled out the latest version of its platform targeting Kubernetes-native application delivery. Boston-based Aqua Security said this week the 3.0 version of its container security platform adds more than 100 security features, including a proprietary security architecture designed for container runtime ... Full article
March 8, 2018(0)
We often hear that technology is changing rapidly. We’ve heard this phrase for years – but in 2018, it really is. Today, almost everyone has a handheld tablet or mobile device (or two). In fact, two-thirds of Americans own one, according to a Pew Report. On top of that, organizations across the globe are living in a “future of ... Full article
March 1, 2018(0)
The rise of machine intelligence has prompted policy wonks to weigh in with a list of caveats along with recommendations for preserving the American technology lead in AI and machine learning while initiating the process of managing future risks. The respected Center for Strategic and International Studies (CSIS) released a report on Thursday (March 1) calling for a national ... Full article
February 21, 2018(0)
Processor specialist Arm is extending its push into the Internet of Things security market with a device authentication effort based on the cellular technology mainstay, the SIM card. Meanwhile, a batch of IoT device certification and network gateways also surfaced this week as IoT vendors shift their focus to securing the emerging device network. The U.K. chip intellectual property ... Full article
February 16, 2018(0)
The crypto-currency mining craze has now extended from hijacking supercomputers and public computing resources to include application containers, according to a security vendor. Researchers at Aqua Security said this week they followed up on what was described as widespread accounts of attempted—and sometimes successful—crypto-currency mining attacks on container infrastructure. The reports are emerging as containers enter high-volume production for ... Full article
January 29, 2018(0)
The promise of quantum computing comes with a major downside: "Cryptographically useful" quantum machines will threaten public key encryption used to secure data in the cloud, a new report warns. The Cloud Security Alliance also found in a report released last week that companies are aware of the growing security risk associated with quantum computing but have so far ... Full article

More articles

Share This