Inside Advanced Scale Challenges|Saturday, January 19, 2019
  • Subscribe to EnterpriseTech Weekly Updates: Subscribe by email

IBM, LogDNA Partner on Cloud Data Management Service

IBM, LogDNA Partner on Cloud Data Management Service

IBM and log data management startup LogDNA are collaborating on a new cloud service designed to help ...

Container Security Concerns Persist

Container Security Concerns Persist

Applications containers and other microservices are handling production workloads at an increasing rate, but several studies emphasize ...

Check Point, Cloud Security Vendor, Acquires Dome9

Check Point, Cloud Security Vendor, Acquires Dome9

Dome9, the public cloud security specialist, has been acquired by another Israel-based cybersecurity vendor, Check Point Software. ...

Bloomberg: Supermicro Motherboards Bugged by Operatives in China

Bloomberg: Supermicro Motherboards Bugged by Operatives in China

Roiling the tech industry and intelligence community, a news story on the Bloomberg BusinessWeek site reports that ...

Security

December 5, 2018(0)
A security flaw discovered in the de facto standard Kubernetes cloud container orchestrator allowed unauthorized users access to Kubernetes clusters and the data they contain. The “privilege escalation vulnerability” announced Monday (Dec. 3) by developers affects versions 1.0 and higher of the Kubernetes orchestrator along with Red Hat OpenShift container platform. Red Hat rated the vulnerability as “critical,” denoting ... Full article
November 29, 2018(0)
IBM and log data management startup LogDNA are collaborating on a new cloud service designed to help developers spot faults and debug code in data stored in the IBM cloud. Among the goals is reducing downtime and the resulting revenue loss. The partners said Thursday (Nov. 29) the collaboration would combine IBM’s (NYSE: IBM) log analysis tool with LogDNA features ... Full article
November 19, 2018(0)
Applications containers and other microservices are handling production workloads at an increasing rate, but several studies emphasize that container security lags. The latest concludes that risks around runtime attacks and misconfigurations highlight the reality that container security strategies remain “woefully low in maturity,” warns a survey released by container and Kubernetes security specialist StackRox. Half of container adopters said ... Full article
November 16, 2018(0)
Oracle has moved to add bandwidth and security to its cloud portfolio with the acquisition of Talari Networks, a software-defined networking specialist. Terms of the acquisition announced on Thursday (Nov. 15) were not disclosed. Oracle expects the deal to close by the end of this year. Oracle (NYSE: ORCL) said the acquisition would complement its network management infrastructure as ... Full article
November 2, 2018(0)
An open source version of the Kubernetes cluster orchestrator is intended to package and deploy cloud-native applications to restricted, on-premise infrastructure such as government clouds. Gravitational, which was founded by Rackspace veterans in 2015, said its aptly named Gravity open-source Kubernetes packaging tool emphasizes secure cloud-native application deployments. It also allows users to take a snapshot of their Kubernetes ... Full article
October 31, 2018(0)
As native cloud applications expand across companies large and in between, greater attention is being paid to securing the ephemeral application containers increasingly used to deliver distributed apps. Cloud security vendors are now attempting to scale those efforts in order to protect container-native applications and other microservices. With that in mind, Qualys Inc. announced this week its acquisition of ... Full article
October 25, 2018(0)
Dome9, the public cloud security specialist, has been acquired by another Israel-based cybersecurity vendor, Check Point Software. Check Point, Tel Aviv, said Wednesday (Oct. 24) its acquisition of Dome9 would bolster its Infinity security architecture by adding multi-cloud security along with security policy tools. Terms of the acquisition were not disclosed. Dome9’s customers used its platform to secure multi-cloud ... Full article
October 24, 2018(0)
The National Science Foundation will fund a broad range of cybersecurity, data privacy and network security research projects that includes a new Center for Trustworthy Machine Learning. NSF’s Secure and Trustworthy Cyberspace initiative will support 225 cyber and network security, privacy, cryptography and AI projects totaling $78.2 million, the agency announced Wednesday (Oct. 24). Funding for the machine learning ... Full article
October 16, 2018(0)
With upwards of 85 percent of companies using more than one cloud provider, the shift to multi-cloud deployments driven by emerging open-source platforms has prompted infrastructure vendors to begin offering management tools for migrating and integrating private and public cloud applications with on-premise systems. Among them is IBM, which this week rolled out a cloud management suite based on ... Full article
October 4, 2018(0)
Roiling the tech industry and intelligence community, a news story on the Bloomberg BusinessWeek site reports that  spies in China hacked Super Micro Computer servers widely distributed throughout the U.S. technology supply chain, including servers used by Amazon and Apple. The story has been flatly denied by all three companies and by the government of China. Called “The Big ... Full article
October 4, 2018(0)
All the talk and hype surrounding AI, machine learning and blockchain technologies has so far failed to translate into actual spending on new IT initiatives, concludes a new industry “reality check.” Instead, the survey of about 250 CIOs and IT managers found continuing investments in “foundational priorities” such as security, cloud computing, big data analysis and DevOps. By contrast, ... Full article
October 3, 2018(0)
As more enterprise workloads migrate to the cloud, companies are looking for better ways to secure mission-critical data and applications as part of their hybrid cloud strategies. With that requirement undoubtedly in mind, cybersecurity specialist Palo Alto Networks Inc. announced this week it is acquiring cloud security startup RedLock for approximately $173 million in cash. The acquisition is expected ... Full article
October 1, 2018(0)
Security and stability were the watchwords with the most recent release of Kubernetes, the third version of the production container orchestrator so far this year. The accelerating release cycle for the de facto standard cluster orchestrator illustrates its growing popularity and rapid maturation, backers noted last week. Version 1.12 includes stability features along with greater security for application containers ... Full article
September 28, 2018(0)
Something is materially broken with web application security and, as a result, critical attacks are being missed. According to a new report from Kaspersky Lab, 73 percent of corporate network breaches in 2017 were achieved via vulnerable web applications. There are a variety of factors contributing to the problem: resource constraints, concerns over false positives and the sheer volume ... Full article
September 26, 2018(0)
AMD is zeroing in on datacenter overhauls as a means of chipping away at rival Intel Corp.’s x86 dominance of the enterprise IT infrastructure market. Some market analysts are bullish about the prospects for AMD’s aggressive push into a datacenter market long dominated by Intel, a strategy that hinges on the challenger’s EPYC processor family. One analyst firm quoted ... Full article
August 22, 2018(0)
As consumer angst grows over Internet of Things security and performance, IoT startups are surfacing with schemes for safeguarding IoT devices from evolving attacks while fixing a rash of software glitches. Chip makers such as Arm Ltd. are investing heavily in new architectures designed to shore up IoT security from hub to edge. This week, a startup emerged from ... Full article
August 14, 2018(0)
A published report states that Intel chips are vulnerable to three new malware attacks with the ability to steal passwords, personal information, financial data and encryption keys. Intel has confirmed the report on its Software Developer Zone site, giving the malware a “high severity” rating. According to Intel, the malware can mount “side channel” attacks of cached data triggered ... Full article
August 13, 2018(0)
As mobile workers access more corporate data stored in the cloud, a secure network architecture called “Zero Trust” is emerging as a way of maintaining control of sensitive data while providing greater visibility into how data is being used and by whom. Zero Trust is being adopted by enterprises as a way of preventing leakage and all-out data breaches. ... Full article
August 8, 2018(0)
Oracle Corp. extended its cloud automation push this week with the release of a “self-driving” cloud database service aimed at autonomous online transaction processing while supporting data warehousing. The cloud competitor is making greater use of machine learning and other automation capabilities as it upgrades its traditional databases while differentiating its cloud services from competitors like Amazon Web Services ... Full article
August 8, 2018(0)
As the value of cryptocurrencies increased, cybercriminals quickly seized on it as a new opportunity for profit – and mischief. Ever adaptable, they adjusted their technique for generating payoffs, moving from utilizing ransomware to encrypt data to pirating enterprise computing power to hit crypto-jackpots. Cybercriminals have their sights set on enterprise networks, which provide access to thousands of machines. ... Full article

More articles

Do NOT follow this link or you will be banned from the site!
Share This