One in five serverless apps has a critical security vulnerability

Serverless computing is an emerging trend that is likely to explode in popularity this year. It takes the idea of a smaller server footprint to the next level. First, there were virtual machines, which ran a whole instance of an operating system. Then they were shrunk to containers, which only loaded the bare minimum of Read more about One in five serverless apps has a critical security vulnerability[…]

Share

Cisco broadens Tetration security delivery with cloud, virtual buying options

Cisco has added new cloud and virtual deployment options for customers looking to buy into its Tetration Analytics security system. Cisco’s Tetration system gathers information from hardware and software sensors and analyzes it using big-data analytics and machine learning to offer IT managers a deeper understanding of their data center resources. [ Don’t miss customer Read more about Cisco broadens Tetration security delivery with cloud, virtual buying options[…]

Share

IBM tweaks its z14 mainframe to make it a better physical fit for the data center

IBM is widening its mainframe range with some narrower models – ZR1 and Rockhopper II – that are skinny enough to fit in a standard 19-inch rack, which will answer criticisms of potential customers that the hulking z14 introduced in July 2017 too big to fit in their data centers (see photo above). In addition Read more about IBM tweaks its z14 mainframe to make it a better physical fit for the data center[…]

Share

Network-as-a-Service: A modern solution to today’s networking challenges

Traditional networking architectures over the past two decades or so prescribe that the hub of the network be build around a specific location, such as a data center or a company’s headquarters building. This location houses most of the equipment for compute, storage, communications, and security, and this is where enterprise applications are traditionally hosted. Read more about Network-as-a-Service: A modern solution to today’s networking challenges[…]

Share

People are really worried about IoT data privacy and security—and they should be

A new study from the Economist Intelligence Unit (EIU) shows that consumers around the world are deeply worried about in how their personal information is collected and shared by the Internet of Things (IoT). But let’s be honest, the problem isn’t that unsophisticated consumers are panicking for no reason. In fact, consumers are merely picking Read more about People are really worried about IoT data privacy and security—and they should be[…]

Share

Patches for Meltdown and Spectre aren’t that bad after all

Internal tests from a leading industry vendor have shown that fixes applied to servers running Linux or Windows Server aren’t as detrimental as initially thought, with many use cases seeing no impact at all. The Meltdown and Spectre vulnerabilities, first documented in January, seemed like a nightmare for virtualized systems, but that is overblown. There Read more about Patches for Meltdown and Spectre aren’t that bad after all[…]

Share

Penn State secures building automation, IoT traffic with microsegmentation

It was time to get a handle on BACnet traffic at Penn State. BACnet is a communications protocol for building automation and control (BAC) systems such as heating, ventilating and air conditioning (HVAC), lighting, access control and fire detection. Penn State standardized on BACnet because of its openness. [ For more on IoT see tips Read more about Penn State secures building automation, IoT traffic with microsegmentation[…]

Share

13 flaws found in AMD processors, AMD given little warning

It’s probably a good thing AMD didn’t rub Intel’s nose in the Meltdown and Spectre flaws too much because boy, would it have a doosy of a payback coming to it. A security firm in Israel has found 13 critical vulnerabilities spread across four separate classes that affect AMD’s hot new Ryzen desktop and Epyc Read more about 13 flaws found in AMD processors, AMD given little warning[…]

Share

What do ogres, onions and SD-WAN security have in common? Layers!

Remember this scene from the movie Shrek? The big ogre was explaining to Donkey that ogres are very complicated, and like onions, they have layers. Donkey, of course, didn’t like the analogy because not everyone likes onions and would have preferred cake as everyone likes cake, but he did seem to understand that ogres did indeed Read more about What do ogres, onions and SD-WAN security have in common? Layers![…]

Share

New Spectre derivative bug haunts Intel processors

Intel just can’t catch a break these days. Researchers at Ohio State University have found a way to use the Spectre design flaw to break into the SGX secure environment of an Intel CPU to steal information. SGX stands for Software Guard eXtensions. It was first introduced in 2014 and is a mechanism that allows applications Read more about New Spectre derivative bug haunts Intel processors[…]

Share

IDG Contributor Network: What to understand about health care IoT and its security

As we have seen, the Internet of Things will disrupt and change every industry and how actors within it do business. Along with new paradigms in services and products that one can offer due to the proliferation of IoT, come business risks as well as heightened security concerns – both physical and cyber. In our Read more about IDG Contributor Network: What to understand about health care IoT and its security[…]

Share
Share