Advanced Computing in the Age of AI | Thursday, April 25, 2024

Security

Linux Effort Targets Secure Code Development

As software bugs, vulnerabilities and other security gaps lead to a seemingly endless string of high-profile breaches, the Linux Foundation is expanding an infrastructure initiative to include a certification ...Full Article

How to Mitigate Third-Party Data Breach Risks

University of Pittsburg Medical Center (UPMC) is one of the latest healthcare organizations to have sensitive records exposed. This breach should trigger a wake-up call for healthcare organizations -- ...Full Article

MOOCs Teach IT Lessons Before Summer Ends

As full-time students' thoughts return to classrooms and lesson plans, IT professionals will find a slew of new online educational offerings designed to augment and expand their skills. An ...Full Article

Hardware: A Building Block for IoT Security

For all its promise, the Internet of Things packs a lot of fears. Most recently, of course, two hackers completely immobilized a Jeep Cherokee as a driver headed down ...Full Article

Audit Your Cloud for Security and Savings

By auditing their organizations' cloud implementations, IT departments can rein in security risks, curtail costs, improve end-user services, and enhance relationships with departments. Once IT professionals know the extent ...Full Article

Conservative Bank Treads Softly Into Cloud

As head of infrastructure at DZ BANK, Dr. Jan Vitt is cautiously leading the conservative German financial institution's investment into cloud. Germany, after all, has some of the most stringent privacy ...Full Article

Manta Beats Bots with Automated Protection

As a destination site where about 30 million small and midsize companies market themselves to each other and consumers, Manta is attractive to another form of traffic: web scrapers ...Full Article

NSA Contributes Security Tools For Puppet

IT automation specialist Puppet Labs has announced a new partner: The U.S. National Security Agency. Puppet Labs said Friday (June 19) that NSA is releasing to the open source ...Full Article

Red Hat Survey Highlights Container Certification

Production deployment of Linux application containers may not be meeting expectations, but there is no shortage of industry surveys attempting to pinpoint barriers to adoption. The latest released on ...Full Article

Slam the Door Against Insider Threats

When a banker falls behind on the mortgage, a physician gets arrested for driving under the influence, or a contractor is working on a sensitive federal construction site under ...Full Article
Page 7 of 10« First...56789...Last »
EnterpriseAI