Advanced Computing in the Age of AI | Saturday, April 20, 2024

Security

AMD, Google Encrypt Data on Confidential VMs

AMD and Google Cloud are collaborating on a “confidential VM” security effort that uses encrypted virtualization to secure data “in use”. The confidential cloud computing effort is based on ...Full Article

Massive IoT Initiative: Securing the Smart City

According to Microsoft, one particular type of project accounts for close to one quarter of all global IoT initiatives: smart-city projects. In a 451 Research report from February 2020, ...Full Article

DARPA Moves to Secure Chip Designs

The U.S. military is ramping up efforts to secure semiconductors and its electronics supply chain by embedding defenses during the chip design phase. The automation effort also addresses the ...Full Article

Zscaler Reconfigures with Cloudneeti Deal

Zscaler Inc., the cloud security specialist, has expanded its capabilities to fix infrastructure and other platform misconfigurations via its acquisition of Cloudneeti, a move that allows the buyer to ...Full Article

Open Source Push Highlights Security Flaws

As enterprise adoption of open source software soars, so too do the number of vulnerabilities inevitably exposed as deployments scale and security awareness grows in response to high-profile data ...Full Article

SoftIron Co-Founder, Mark Chen, Returns to Lead Company’s Secure Provenance Strategy as CSO

London – February 26, 2020 – SoftIron Ltd., maker of purpose-built and performance-optimized data center appliances, announces the appointment of Mark Chen to the role of Chief Security Officer. ...Full Article

‘Community-based’ Open Source on the Rise

As more enterprises embrace open source software for applications ranging from security and cloud management to databases and analytics, the steady shift away from proprietary software is coalescing around ...Full Article

Another Week, Another Kubernetes Security Flaw

The latest security vulnerability discovered within the Kubernetes cluster orchestrator could allow intruders to access, modify or delete computing and storage resources configured across a cluster. The flaw in ...Full Article

Docker Tightens its Embrace of Kubernetes

The rise of application containers has touched off a debate about whether containers will eventually replace virtual machines. For a number of reasons, most notably security, probably not. At ...Full Article

Reemerging Container Security Ills Addressed

Concerns about the security of application containers have reemerged as the micro-services technology spreads across the enterprise. Those worries are fueled by recent reports of a “breakout” vulnerability in the ...Full Article
Page 2 of 1012345...10...Last »
EnterpriseAI