Advanced Computing in the Age of AI | Friday, April 26, 2024

Security

Bring Shadow IT Out of the Dark, Gartner Tells Tech

Mention shadow IT to many technology professionals and they'll shudder before trading war stories. But to empower their organizations to innovate, grow, and succeed, IT departments must embrace and manage this ...Full Article

To Improve Cybersecurity, Fire Some CEOs

Despite the amazing number of cybersecurity breaches, so far the Target CEO appears to have been the only one to pay the price. While we hear some calls for ...Full Article

RAND Corp: Manage Security Like a Business

Organizations must figure out a better way to manage cybersecurity like a business, using metrics to determine the relative return on investment (RROI), and constantly evaluating the lifecycle and ...Full Article

How to Avoid Being a Hacker Victim

Following in the wake of the recently publicized attacks on government databases and systems, all CIOs and chief security officers should assume their own organizations could be next and ...Full Article

Average Data Breach Costs $3.8 Million, Ponemon Finds

When an organization's records are breached, it costs an average of $3.8 million to overcome the attack, according to the newly released Ponemon Institute's "Cost of Data Breach Study: ...Full Article

Intel Looks to Secure Containers

The world's largest chipmaker is entering the application container fray this week with the introduction of Intel Clear Containers, an outgrowth of its lightweight Linux operating system development effort ...Full Article

Social Engineering Targets Weakest Security Link: Employees

Without ongoing employee training, an enterprise's expensive security infrastructure investment means little. But very few corporations protect themselves from the growing threat of social engineering. Today only 7 percent ...Full Article

Bracket Puts Security Controls in Enterprise Hands

To further promote corporate adoption of public cloud, Bracket Computing this week added to its software-based Bracket Computing cells architecture a security suite whose controls never leave enterprise customers' hands. Public ...Full Article

Container Push Refocuses on Trusted Platforms

Red Hat, among the most vigorous proponents of delivering applications via Linux containers, acknowledges that enterprise adoption of container technology hinges on trusting the platform. Only then would true ...Full Article

Hybrid Cloud Shift Fuels Automated Security

Cloud infrastructure providers are increasingly looking for ways to automate cloud security as more customers migrate to hybrid cloud configurations in which enterprises maintain an on-premise infrastructure for sensitive ...Full Article
Page 8 of 10« First...678910
EnterpriseAI