Inside Advanced Scale Challenges|Monday, February 19, 2018
  • Subscribe to EnterpriseTech Weekly Updates: Subscribe by email

Crypto-Miners’ Latest Target: Containers

Crypto-Miners’ Latest Target: Containers

The crypto-currency mining craze has now extended from hijacking supercomputers and public computing resources to include application ...

Intel Debuts Xeon SoC for Edge Applications, Addresses ‘Spectre’ and ‘Meltdown’ Fears

Intel Debuts Xeon SoC for Edge Applications, Addresses ‘Spectre’...

Intel has addressed the drive for increasingly powerful processing at the edge of systems and networks with ...

Google-Backed Study Seeks Middle Ground in AI Debate

Google-Backed Study Seeks Middle Ground in AI Debate

The debate over the benefits and pitfalls of AI is evolving as alarmists and cheerleaders are joined ...

Quantum Computers Threaten Data Encryption

Quantum Computers Threaten Data Encryption

The promise of quantum computing comes with a major downside: "Cryptographically useful" quantum machines will threaten public ...

Security

February 16, 2018(0)
The crypto-currency mining craze has now extended from hijacking supercomputers and public computing resources to include application containers, according to a security vendor. Researchers at Aqua Security said this week they followed up on what was described as widespread accounts of attempted—and sometimes successful—crypto-currency mining attacks on container infrastructure. The reports are emerging as containers enter high-volume production for ... Full article
January 29, 2018(0)
The promise of quantum computing comes with a major downside: "Cryptographically useful" quantum machines will threaten public key encryption used to secure data in the cloud, a new report warns. The Cloud Security Alliance also found in a report released last week that companies are aware of the growing security risk associated with quantum computing but have so far ... Full article
January 26, 2018(0)
Early efforts to use blockchain technology for financial transactions are gathering momentum with the launch of a pilot project between a blockchain startup and a Vermont city to use the digital ledger to record real estate deals. Propy Inc., which last fall used a blockchain framework called Ethereum to purchase an apartment in Kiev, Ukraine, said last week it ... Full article
January 10, 2018(0)
Securing critical data while simultaneously making it more accessible is the challenge for enterprise IT departments, a new vendor survey finds. In a report released Wednesday (Jan. 10), big data integration specialist Syncsort said it examined what data protection and IT strategies companies are deploying to counter hackers, data breaches, service disruptions linked to natural disasters along with "escalating ... Full article
January 5, 2018(0)
We all know where we are and where we’re headed. We’re early into the AI Era, and it has an end-game aura about it. Not in an apocalyptic, “end-of-days” way, but in the sense that AI (broadly defined) is the natural culmination of everything we’ve always wanted computers to do: analyze massive data volumes in virtual real-time producing richer, ... Full article
January 5, 2018(0)
The HPC and wider tech community are abuzz over the discovery of critical design flaws that impact virtually all contemporary microprocessors. The bugs leave processors vulnerable to side channel attacks where malicious programs can steal information from applications’ memory. Worse news yet, some of the fixes for these flaws are either unclear at this point or may be associated ... Full article
December 21, 2017(0)
It’s been a fascinating year in advanced scale computing, much of that fascination focused on AI (broadly defined), now firmly established as the leitmotif of the high performance computing sector. Another big theme of 2017: expanding commercial adoption of HPC-class technologies. The editorial staffs of the three Tabor publications (EnterpriseTech, HPCwire, Datanami) have assembled what we think are some ... Full article
December 13, 2017(0)
Two thousand and eighteen is shaping up as the year of consumer pushback as strict data regulations give the generators of boundless data new rights to see and demand that companies erase personal data under pending European Union rules. The EU's General Data Protection Regulation (GDPR) takes effect in May 2018, and market trackers like Gartner (NYSE: IT) predict ... Full article
December 11, 2017(0)
New data breaches seem to happen every day. Consumers are frustrated by lack of control over their information once it is shared. Enterprises work tirelessly to avoid becoming the next victim of a breach that thrusts them into the news for all the wrong reasons, especially when many breaches occur due to the security lapses of their vendors. To ... Full article
December 1, 2017(0)
The billowing cloud market that is growing at an estimated 40 percent annually is being driven to new heights by the enterprise embrace of multi-cloud strategies along with a shift toward cloud native technologies ranging from application containers and serverless computing to analytics and machine learning. Those are among the key findings of the latest public cloud survey released ... Full article
November 21, 2017(0)
Public cloud giant Amazon Web Services announced a new "secret region" this week designed to complete its portfolio of data classifications for U.S. government workloads. AWS said Monday (Nov. 20) that 17 U.S. intelligence agencies and government contractors with "secret-level" network access could run analytics and other workloads in the CIA cloud. AWS won a $600 million Commercial Cloud ... Full article
November 8, 2017(0)
Among the emerging solutions for securing application containers in production is an application layer security tool that is itself a container. Startup NeuVector, which announced early stage venture funding this week, is pitching a cloud-native container firewall that seeks to secure application containers and their host networks at their most vulnerable points: during runtime. San Jose-based NeuVector launched its ... Full article
November 3, 2017(1)
Developers are painfully aware of the risks inherent in deploying applications on the open Internet, but few are using tools designed to secure code and mitigate risks. A survey released by Node.js JavaScript runtime vendor NodeSource and software security startup Sqreen found that more than one-third of the Node.js developers and executives it polled expect to be hacked. Indeed, ... Full article
October 23, 2017(0)
ARM is launching a "secure core" approach to bulletproofing the Internet of Things that addresses network security at the microcontroller level. The approach introduced at a company event this week seeks to provide a common security framework for embedding security into the next wave of connected IoT devices that must be "born secure," the chip specialist asserted. The U.K. ... Full article
October 20, 2017(0)
The Pentagon is looking for ways to recast is its cloud security guidelines as a way to accelerate the department's slow migration to cloud computing. Meanwhile, key cloud providers to the U.S. military are extending their capabilities via acquisitions while expanding their capabilities to handle classified workloads. The Defense Department's chief information officer for cyber-security confirmed this week that ... Full article
October 17, 2017(1)
With open source software accounting for more than half of some products, process gaps are emerging for managing security. Vendors pushing approaches for monitoring software supply chains point to the recent Equifax breach affecting about 143 million consumers as a case in point: hackers exploited and Apache Struts vulnerability after the company ignored a security patch released six months ... Full article
October 9, 2017(2)
Bitcoin mining is among the latest threats to public cloud security as hackers breach enterprise computing resources to hunt for the digital currency. Cloud security vendor RedLock reported earlier this month that hackers were using Amazon Web Services (NASDAQ: AMZN) cloud computing resources to mine for bitcoins. The process involves collecting all transactions made during a set period into ... Full article
October 3, 2017(0)
Public cloud vendors continue to roll out tweaks and other new features designed to differentiate their services. Among them are tools designed to give enterprise users greater control over cloud services as more applications and data are moved there. With that in mind, Google is unveiling new identity and access management (IAM) features for handling customers' public permissions on ... Full article
September 26, 2017(0)
The blockchain ecosystem continues to evolve as competing industry alliances seek to push the transaction database technology deeper into enterprises, including the first international real estate transaction. Blockchain serves as a distributed ledger framework that posts transactions in real-time as cryptographically unique “blocks,” visible to authorized users. These blocks cannot be reversed or changed, with new additions to the ... Full article
September 26, 2017(1)
If the AI hype cycle were a dial setting on a washing machine, it would now be in the spin cycle phase. It’s intense. The talk and hopes for AI are so exciting, there’s so much potential, we wait breathlessly for an incredible new age of smart systems that will revolutionize not just IT but, like, the whole world, ... Full article

More articles

Share This