Microsoft adds Confidential Compute to Azure cloud platform


Microsoft has revealed a major new addition to its Azure cloud platform, aimed at keeping user data safe.
The feature, called Confidential Compute, will make sure the data is being encrypted even when it’s being computed on in-memory. So far, it’s been encrypted while stored or while in transit on a network.
Facebook's new AI research lab opens in Montreal

Get fit from anywhere using this free GFIB-7 app


People prefer to workout in different environments. There are those who prefer to push themselves in a competitive situation, with a group of individuals. With this in mind, attending a class or going to the gym with a workout partner will fulfill your goals.
On the flipside, there are plenty of individuals who would like to get fit but are put off by the thought of walking into the gym, feel too unfit to be competitive or do not feel the desire to get fit in front of other people. Either way, there are ways of improving your fitness, on your own, from just about any location, guided by professional trainers.
Two strategies in leveraging a decentralized workforce


It’s no secret that the world has quickly moved toward distributed everything. From workplaces to transportation services to financial transactions, there are efficiency gains when the workload is no longer centralized. Take for example co-working spaces, which have reduced the burden of administrative overhead for organizations. Or, take for instance ride sharing services, which have reduced the cost of car ownership and maintenance. How about blockchains and cryptocurrencies, which are decentralizing consensus and authentication?
Even computational resources have moved away from the centralized approach. According to a survey by Rightscale in January 2017, 85 percent of businesses have multi-cloud strategies (up from 83 percent in the previous year), with an increased preference for public clouds, compared with private and hybrid cloud deployments.
11 exercises to ensure your enterprise is 'cloud fit'


A cloud environment is like the human body. It can be viewed in different "states"and is a continuously evolving and adapting entity that requires constant vigilance in order to ensure it’s operating at its optimal state. That optimal state can be achieved through fitness, and when it comes to the cloud, getting fit is one of the best ways to eliminate vulnerabilities and threats that could cause damage. We're not necessarily talking about the equivalent of benching 500 pounds or running a marathon. Rather, there are some basic, but critical, steps that an enterprise can and should take in order to be fit and prepared to keep data safe from bad actors.
It's impossible to know where the next attack on your cloud will originate, but you should have a solid awareness of the different components of your cloud stack and how to manage them. In the context of the structure of your cloud, it helps to break them down according to the parts of the cloud that, by design, allow access, process data, and/or perform any type of collaboration, communication, and transaction.
Public cloud security is a concern for most IT pros in UK


An overwhelming majority of the UK’s IT professionals (90 percent) have their worries when it comes to securing the public cloud, according to a new study.
Research by Bitdefender found that 90 per cent of British professionals had concerns around the security of public cloud. A fifth (20 per cent) also said that their business doesn’t have security measures set up for sensitive data outside the company infrastructure.
How to tackle ICOs to avoid regulatory issues


In an alarming but long-feared move, Chinese authorities announced on September 4, 2017, that from then on fundraising Initial Coin Offerings (ICOs) will not be allowed to take place on the domestic market. ICO technology can be used as a tool to collect funds from backers to launch new blockchain projects.
The Chinese regulators instructed companies that have already completed their fundraising ICOs to refund the payments to their backers, and the public and financial institutions are asked to report to the authorities all suspicious fundraising activities involving ICOs and cryptocurrencies. Naturally, this development threw the Chinese blockchain community into disarray.
VMware announces AppDefense security solution


VMware has revealed how it wants to help businesses across the world keep their data secure.
At the company’s VMworld Europe 2017 event in Barcelona earlier this week, CEO Pat Gelsinger outlined the company’s new security strategy, including how its new AppDefense tool can help enterprises of all sizes stay safe online.
Peering into the future of enterprise security


How many desktops do you have out there that are still not on Microsoft Windows 10? Given the security vulnerabilities associated with earlier versions of Windows, the simple answer for most executives is too many. With new attacks like WannaCry and NotPetya appearing far too frequently, your IT teams are probably hard at work on a migration plan to move your older desktop systems to the more secure Windows 10 OS. In my company’s recent survey of nearly 500 IT professionals, nearly 80 percent of the respondents indicated that the enhanced security features of Windows 10 were the primary reason they were eager to migrate.
Still, migration takes time, and though it is comforting to know that more and more systems may be migrated over to Windows 10 each day, the lingering awareness of how many systems have yet to be migrated is reason for concern. It’s hard to be fully comfortable when you know how much of your organization is missing out on the security improvements of the new OS.
New York State’s new financial services cybersecurity policy relies on encryption


As of August 28, certain financial services companies based in New York now have to comply with the state’s new cybersecurity requirements, known by the (very long) acronym 23 NYCRR 500. On the line for affected banks and insurers are both penalties for non-compliance and potential business loss if they continue to expose their businesses to cyber threats.
The regulations took effect March 1, but included a three-month grace period for companies to get organized before needing to meet the first wave of mandates. Companies will have ongoing deadlines over the next two years as further layers of compliance continue to take effect. Notably, affected financial services companies will need to have an encryption strategy in place by September 2018.
Autonomous cars: A delicate balancing act of tech innovation, safety and security


Two big things happened on Wednesday, September 13. First, the House Energy and Commerce Committee unanimously passed the SELF Drive Act. Second, executives from BlackBerry, Cisco Jasper and AIMOTIVE took the stage at Mobile World Congress Americas to discuss autonomous cars and vehicles as a service.
In the Mobile World Congress Americas session, Barbara Peng, VP of Research for BI Intelligence, started off by asking each of the panelists for their predictions when autonomous cars would be on the road. Not one of the panelists gave an estimate, much to Barbara Peng’s frustration. But this just shows that even the people working to make driverless cars a reality knows there is too much work left to be done before they can estimate when they’ll be on the road.
Building the US cyber workforce: How Greater Washington is closing the gap


The cyber-attacks against US nuclear facilities are just the latest reminders of the crucial and persistent challenge of securing our nation’s important assets. Clearly, cyber threats are growing in number, complexity, and sophistication, underscoring the need for public and private sector entities to raise the bar on cybersecurity throughout their enterprises.
These rising threats are causing organizations and their current IT workforces to sound the alarm: not enough talent is available to properly address the myriad of cyber threats facing our nation. In fact, it is predicted that by 2022, there will be a shortfall of 1.8 million cybersecurity professionals in the US.
It will be easy for businesses to comply with GDPR, UK's digital minister says


UK's new Data Protection Bill, aimed to "encourage innovation while protecting privacy," was published this week. Digital minister Matthew Hancock took the opportunity to call all businesses to become compliant with GDPR before the deadline of May 25, 2018.
In an opinion piece published on City AM, Hancock said the new laws are built on the existing ones and it shouldn’t be too hard for businesses to get used to them.
VMware wants the support of open-source developers


VMware has called for greater links between itself and developers in a major show of support for open source software.
Speaking at the company’s VMworld Europe 2017 event in Barcelona, CTO Ray O’Farrell highlighted the "powerful" world of open source software.
Google Chrome will stop trusting older Symantec certificates


Chrome will stop trusting any security certificates issued by Symantec, Google has confirmed.
In a blog post, Chrome Security's Devon O’Brien, Ryan Sleevi and Andrew Whalley say that certificates from the security firm will be "distrusted," starting with version Chrome 66. This affects all certificates issued before June 1, 2016.
© 1998-2025 BetaNews, Inc. All Rights Reserved. About Us - Privacy Policy - Cookie Policy - Sitemap.