Can AI Be the Answer to Data Protection and Private Security ?

| March 15, 2019

article image
The beauty of AI lies in its ability to learn from previous data. And it uses that previous data to make recommendations and predictions. Financial enterprises and insurance companies are already using AI to make decisions about the risk levels of potential borrowers and customers, and they do so by churning accumulated data from past consumer behavior.

Spotlight

CYBONET

We have secured networks throughout the world since 2002. CYBONET, formerly PineApp, began focused on email security. In view of today's evolving cyber threats, it is no longer enough simply to protect email. CYBONET is committed to empowering organizations of all sizes with the tools and capabilities to detect and engage cybersecurity threats, enhancing their critical information infrastructure and network resilience.

OTHER ARTICLES

Cartesi creates Linux infrastructure for blockchain DApps

Article | April 20, 2020

DApps (sometimes called Dapps) are from the blockchain universe and so, logically, the apps part stands for application (obviously) and the D part stands for decentralised (only obvious once you know that we’re talking distributed immutable language here). According to the guides section at blockgeeks, DApps are open source in terms of code base, incentivised (in terms of who validates it) and essentially decentralised so that all records of the application’s operation must be stored on a public and decentralised blockchain to avoid pitfalls of centralisation. So then, Cartesi is a DApp infrastructure that runs an operating system (OS) on top of blockchains. The company has now launched a more complete ‘platform-level’ offering, which is described as a layer-2 solution

Read More

Infrastructure as code vs. platform as code

Article | April 15, 2020

With infrastructure as code (IaC), you write declarative instructions about compute, storage and network requirements for the infra and execute it. How does this compare to platform as code (PaC) and what did these two concepts develop in response to? In its simplest form, the tech stack of any application has three layers — the infra layer containing bare metal instances, virtual machines, networking, firewall, security etc.; the platform layer with the OS, runtime environment, development tools etc.; and the application layer which, of course, contains your application code and data. A typical operations team works on the provisioning, monitoring and management of the infra and platform layers, in addition to enabling the deployment of code.

Read More

How to Rapidly Scale IT Infrastructure For Remote Workers

Article | April 13, 2020

Rapid IT infrastructure scaling is always challenging. In March 2020, the coronavirus caused a surge in remote workers as organizations switched overwhelmingly to work-from-home policies. Scaling IT infrastructure to support this sudden shift proved to be a struggle for IT teams, resulting in a migration to cloud-based applications and solutions, a rush on hardware that can support a remote environment, and challenges scaling VPNs to support remote worker security. Here are some of the insights and lessons learned from IT professionals.

Read More

As Edge Applications Multiply, OpenInfra Community Delivers StarlingX 5.0, Offering Cloud Infrastructure Stack for 5G, IoT

Article | June 2, 2021

StarlingX—the open source edge computing and IoT cloud platform optimized for low-latency and high-performance applications—is available in its 5.0 release today. StarlingX combines Ceph, OpenStack, Kubernetes and more to create a full-featured cloud software stack that provides everything carriers and enterprises need to deploy an edge cloud on a few servers or hundreds of them.

Read More

Spotlight

CYBONET

We have secured networks throughout the world since 2002. CYBONET, formerly PineApp, began focused on email security. In view of today's evolving cyber threats, it is no longer enough simply to protect email. CYBONET is committed to empowering organizations of all sizes with the tools and capabilities to detect and engage cybersecurity threats, enhancing their critical information infrastructure and network resilience.

Events