Cryptojacking: Cryptocurrency Mining Meets Malicious Intentions
With data center technology evolving relentlessly, IT professionals must grapple with a dynamic security landscape, as malicious actors leverage new capabilities to launch even more sophisticated cyberattacks, particularly in ...Full Article
Google, Atos Partner on Cloud Machine Learning
Google continues to add regional cloud partners as it seeks to differentiate its public cloud offerings while distributing its machine learning building blocks. Atos, the French big data platform ...Full Article
VMware Sharpens Focus on Hybrid Cloud
VMware this week takes the wraps off the latest versions of its server virtualization and software-defined storage platforms with an emphasis on hybrid cloud deployments, broader application support and—in ...Full Article
Hacker Survey: Simple Attacks Breach Systems in a Day
A security vendor survey of professional hackers finds that many are able to easily defeat “perimeter defenses” like firewalls, then pinpoint and steal critical data in less than a ...Full Article
Serverless Security Risks Surface
Emerging serverless frameworks that dispense with server management to run cloud-native workloads continue to gain traction in the enterprise while at the same time drawing scrutiny from security specialists ...Full Article
Intel Reverses Course on Patching Older Chips for Spectre/Meltdown
In Intel’s latest (and possibly final) update to its Meltdown and Spectre mitigation guide, published April 3, the company revealed that a number of its older CPU models will ...Full Article
Got GDPR Anxiety? Here Are 3 Must-Do’s
The tech community has been discussing European Union’s General Data Protection Regulation (GDPR) as if it were a natural disaster, rather than a law. “Are you ready for GDPR?” ...Full Article
Ethics Moves Front and Center in AI Debate
The breakneck pace of machine intelligence development is prompting welcome assessments of the ethical implications of a technology that will have a profound effect on workers, consumers and most ...Full Article
IoT Developers Look to Blockchain for Security
Securing the Internet of Things appears to have advanced well beyond default factory settings to include data and network security features baked into IoT components as well as comprehensive ...Full Article
Blockchain Use Cases Grow, As Does Venture Funding
The logistical and transactional advantages of blockchain technology could create more enterprise use cases based on the trusted sharing of data that eliminates third-party threats along with moves to ...Full Article