Inside Advanced Scale Challenges|Friday, July 28, 2017
  • Subscribe to EnterpriseTech Weekly Updates: Subscribe by email

‘Neural’ Network Fabric Boosts Server Links

‘Neural’ Network Fabric Boosts Server Links

As network bottlenecks mount in datacenters—a hurdle that will only get worse with the deployment of business ...

Open Source Driving DevOps Automation

Open Source Driving DevOps Automation

Heightened awareness about the security risks associated with open source software has increased use of disciplined DevOps ...

IBM Rolls ‘Pervasive’ Encryption As Threats Grow

IBM Rolls ‘Pervasive’ Encryption As Threats Grow

As more stringent data protection rules enter into force, increasing enterprise requirements for encryption, IBM is stepping ...

AWS Stresses ‘Security by Design,’ DevOps Freedom

AWS Stresses ‘Security by Design,’ DevOps Freedom

Citing its "mind-blowing" impact on the IT industry, Amazon's CTO argued that the cloud is emerging as ...

Security

July 24, 2017(0)
The U.S. military long ago ceded dominance in electronics innovation to Silicon Valley, the DoD-backed powerhouse that has driven microelectronic generation for decades. With Moore's Law clearly running out of steam, the Defense Advanced Research Projects Agency (DARPA) is attempting to reinvigorate and leverage a vibrant domestic chip sector with a $200 million initiative designed among other things to ... Full article
July 21, 2017(0)
As network bottlenecks mount in datacenters—a hurdle that will only get worse with the deployment of business analytics using machine learning—there is a growing need for networking solutions that can scale to tens of thousands of connections without breaking the bank. As things stand now, only hyper-scale cloud service providers can achieve the economies of scale that make smart ... Full article
July 18, 2017(0)
Heightened awareness about the security risks associated with open source software has increased use of disciplined DevOps practices that have improved application quality and developer productivity, a software supply chain survey finds. With open source software making major inroads in enterprise application development, a vendor survey by DevOps tool vendor Sonatype found that downloads of building block components such ... Full article
July 17, 2017(0)
As more stringent data protection rules enter into force, increasing enterprise requirements for encryption, IBM is stepping into the breach with an encryption engine based on its Z Systems mainframe aimed at locking down data across applications, cloud platforms and databases. The "pervasive" encryption capability leverages Z Systems quality of service features like scaling and available, the company stressed. ... Full article
July 6, 2017(0)
Among the implications of the enterprise migration to the cloud is a predicted overhaul of middleware platforms over the next several years as the integration of business applications drives adoption of cloud-based alternatives. A recent IT survey on the state of middleware market notes that many of these integration platforms were rolled out more than 20 years ago. With ... Full article
July 5, 2017(0)
As more distributed applications are delivered via containers, managing them at scale has become a key requirement. That has spurred extensions of container orchestration tools such as Docker Swarm and Kubernetes. In the latter's case, those extensions include new ways to customize services while adding features like persistent container storage. With those requirements in mind, the latest version of ... Full article
June 29, 2017(0)
Citing its "mind-blowing" impact on the IT industry, Amazon's CTO argued that the cloud is emerging as the "new normal" for digital enterprises while providing developers with resources designed to get applications and services out the door faster. "Public cloud is the place you go if you want to build new IT" along with new capabilities and functionality for ... Full article
June 21, 2017(0)
A huge investment by Japanese technology conglomerate SoftBank Group in an up-and-coming cyber security startup leaves little doubt that enterprises are looking for ways to design more security features into embattled global IT networks. Cybereason announced Wednesday (June 21) that SoftBank (TOKYO: 9984) will invest $100 million in the cyber security firm that specializes in end-point threat detection and ... Full article
June 16, 2017(0)
While most mission-critical enterprise data and applications remain on-premise, these workloads are inexorably moving to the cloud. Forrester Research estimates global cloud services are growing at an annual rate of 30 percent. As the enterprise shift to the cloud gathers momentum—Forrester forecasts the global cloud services market will reach $236 billion by 2020—the cloud security market is also expanding ... Full article
June 9, 2017(0)
The downside to the vibrant open source software sector is a supply chain rife with security vulnerabilities and clogged with outdated versions of widely used software components, a new report warns. The survey released Friday (June 9) by chip design specialist Synopsys Inc. (Nasdaq: SNPS) found that widely publicized vulnerabilities such as the Heartbleed bug persist in commonly used ... Full article
May 19, 2017(0)
One week after a ransomware attack cut a swathe across Europe and China, a range of after-action analyses have emerged as to how the exploit unfolded and how the perpetrators leveraged recently hacked National Security Agency tools. The latest assessment of the so-called WannaCry ransomware outbreak comes from digital forensic specialist Secdo, which posits that hackers leveraged NSA's "EternalBlue" ... Full article
April 7, 2017(0)
Despite repeated assurances that Internet of Things security issues are being addressed, so-called "in-the-wild" attacks on poorly secured devices reveal that securing the IoT still has a long way to go. The latest threat comes from a new malware strain known as BrickerBot that, according to security experts, intentionally "bricks" IoT devices, meaning the malware renders the computer's motherboard ... Full article
March 29, 2017(1)
Cloud security remains "complex and chaotic" and the Internet of Things threatens to increase cloud security risks, warns a survey of IT security managers conducted during last month's RSA security conference. The survey of nearly 1,000 RSA attendees by security vendor AlienVault found that one third considered their cloud security monitoring to be "complex and chaotic." More worrying, 62 ... Full article
March 23, 2017(0)
As is often the case, network security tools are just now beginning to keep catch up with vulnerable Internet of Things deployments, particularly leading edge industrial IoT infrastructure. With that in mind, some security vendors are taking a platform approach to securing industrial IoT devices and industrial clouds that are among the earlier deployments. The latest comes from security ... Full article
February 28, 2017(0)
One of the offshoots of the open source movement has been the gradual rise of "citizen application developers" operating on enterprise-grade "low-code" platforms. While the approach is seen as one way to meet the growing demand for enterprise applications such as data capture and mobile data access, a survey warns that the development approach brings with it a new ... Full article
February 23, 2017(0)
If indeed we are operating in a "digital economy," standard security measures such as passwords are no longer sufficient to shield the underlying IT infrastructure from sophisticated hackers, asserts a panel of U.S. experts and advocates of "multi-factor" authentication technologies. A report released late last year by the U.S. Commission on Enhancing National Cybersecurity warns: "For now, technological advancement ... Full article
February 22, 2017(0)
Yet another survey, this one by an Internet of Things standards group, emphasizes the need for interoperability and security standards as more devices are connected. Moreover, the survey of consumers by the Open Connectivity Foundation (OCF) uncovered growing demand for interoperable devices and communications along with security certification in the wake of several high-profile hacks involving IoT networks. OCF ... Full article
February 14, 2017(0)
A corporate job opening typically draws as many as 250 applicants with varying qualifications. In stark contrast, a new survey of the growing cyber security skills gap reveals that just over half of U.S. companies looking to fill corporate IT security positions receive five applications. Of those, fewer than one in four candidates possess the qualifications companies are seeking. ... Full article
February 10, 2017(0)
In advance of next week’s big RSA data security show in San Francisco, we’ve received a bevy of security product announcements from companies leveraging data analytics, AI, behavior analytics and machine learning to automate threat detection, many of them touting breach prevention, rather than post-breach investigation, capabilities. “While most of this is not totally new, we expect to see ... Full article
January 31, 2017(1)
Promising stronger and faster security for application containers in production, a startup has unveiled a new continuous security approach based on adaptive behavioral learning. The approach is said to secure distributed applications delivered via containers at their most vulnerable point: in production environments where deployed and scaled across hosts and datacenters. Virtualization and security veterans from Cisco Systems (NASDAQ: ... Full article

More articles

Share This