The integration allows users to add self-service platform-as-a-service capabilities to CMS. They can also tap more quickly into IBM analytics, data, middleware, and its Watson artificial intelligence (AI) platform.
The lawmakers claim Google is “more willing to support the Chinese Communist Party than the U.S. military.”
The Silver Peak security alliance ecosystem enables customer to choose from eight different security offerings.
The company's board of directors named CFO Robert Swan as interim CEO while it searches for a successor.
A vast majority of the nodes were hosted inside of Amazon Web Services with 55 percent hosted in an AWS U.S. Region. Some of the other clouds hosting open nodes included Alibaba, Microsoft Azure, and Digital Ocean.
The Internet Society is raising awareness around the issues and challenges with Internet of Things (IoT) devices, and the OTA IoT Trust Framework is promoting best practices in protection of user security and privacy. The importance of this was brought home with the keynote talk at the recent TNC18 Conference, which was given by Marie Moe (SINTEF) who related her experiences with her network-connected heart pacemaker.
Marie is a security researcher (who also formerly worked for NorCERT, the Norwegian National Cybersecurity Centre) who has an implanted pacemaker to monitor and control her heart, and has used the opportunity to investigate the firmware and security issues that have had detrimental and potentially fatal consequences. Quite aside from uncovering misconfigurations that required tweaking (e.g. the maximum heartbeat setting turned out to be set too low for a younger person), and an adverse event that required a firmware upgrade, she was even more concerned to discover that little consideration had gone into the authentication and access aspects that might allow an attacker to take control of the device.
These devices allow their recipients to lead normal lives, and of course being network-connectable has many practical advantages in terms of monitoring and Continue reading
Cylance touts its predictive advantage technology that allows a company to protect endpoints from threats that may not exist for years to come.
The new edge offering bundles SD-WAN, wired, and wireless networking technologies, along with unified security and policy enforcement.
A recent Gartner report found that more than 20 percent of global enterprises will have deployed serverless technologies by 2020, compared with less than 5 percent today.
Facebook developed the osquery security framework to monitor its own infrastructure before open sourcing it in 2014.
AI to get X-ray vision: Researchers at MIT’s Computer Science and Artificial Intelligence Laboratory are getting close to creating AI that can see through walls, Geek.com reported. The research team is using AI to analyze radio signals bouncing off human bodies. The result is a neural network-generated stick figure that moves like the targeted person does.
Dr. AI will see you now: Perhaps more useful that looking through walls, some AI technologies are now being used to identify tuberculosis, pneumonia, upper respiratory infection, and bronchitis based on how a cough sounds, said AdWeek. Several companies are exploring other ways to use AI in healthcare settings.
Encryption wars, part 207: Apple has moved to close a security hole that law enforcement agencies used to defeat encryption on iPhones, according to many news reports, including one in the New York Times. The Apple move set off a new round of debate about encrypted devices and law enforcement access, the Washington Post noted.
It appears that at least one company that builds iPhone cracking tools already has a workaround, however, Motherboard reported.
Similar to the earlier Spectre and Meltdown bugs the new security flaw could allow access to sensitive data through a side channel. Intel ranks it as a “moderate” vulnerability.
Today at DockerCon, we demonstrated new application management capabilities for Docker Enterprise Edition that will allow organizations to federate applications across Docker Enterprise Edition environments deployed on-premises and in the cloud as well as across cloud-hosted Kubernetes. This includes Azure Kubernetes Service (AKS), AWS Elastic Container Service for Kubernetes (EKS), and Google Kubernetes Engine (GKE).
Most enterprise organizations have a hybrid or multi-cloud strategy and the rise of containers has helped to make applications more portable. However, when organizations start to adopt containers as their default application format, they start to run into the challenges of managing multiple container environments, especially when each of them has a different set of access controls, governance policies, content repositories and operational models. For common hybrid and multi-cloud use cases like bursting applications to the cloud for additional capacity or migrating them from one site to another for availability or compliance reasons, organizations start to realize the need for a singular control plane for all containerized applications – no matter where it will be deployed.
Docker Enterprise Edition is the only enterprise-ready container platform that can deliver federated application management with a secure supply chain. Not only Continue reading
The new programmable silicon includes a packet forwarding engine that delivers a 50 percent power efficiency gain over the existing Junos Trio chipset, the company claims.
Serverless, IoT security, and the crack house were all hot topics at VMware’s annual research and development conference.
Cisco executives tout their API-driven approach as the company's DevNet membership now tops 500,000 registered developers.
By adding centralized orchestration and network automation to its Unity EdgeConnect SD-WAN, Silver Peak customers can segment their users and applications to improve security.
This week is TNC18, the largest European research and education networking conference, which is being held at the Lerkendal Stadium in Trondheim, Norway – the home of current Norwegian Football Champions Rosenborg BK. Of course we’re actually in a conference centre underneath one of the grandstands and not on the pitch, but this is still a premier event that brings together managers, network engineers, and researchers from R&E networks in Europe and the rest of the world.
The Internet Society is not only one of the conference sponsors, but has a significant role in the programme as well. Our colleague Karen O’Donoghue on Monday spoke about NRENs and IoT Security in the ‘What’s Coming Next In Privacy Innovation‘ session, where she’s discussing the security and privacy challenges of burgeoning numbers of IoT devices and how these will impact R&E communities. ISOC is encouraging the development of best practices through the Online Trust Alliance’s IoT Security & Privacy Trust Framework, and this is a good opportunity to discuss how the NREN community can take the lead in adopting good operational practice.
Newly discovered capabilities mean hackers can snoop on web traffic and execute man-in-the-middle attacks before killing the device.