Intel and Google Cloud to simplify deployment across on-premise data centers and the cloud
Intel and Google Cloud announced a strategic partnership aimed at helping enterprise customers seamlessly deploy applications across on-premise and cloud environments. The two …
Intel unveils portfolio of data-centric solutions
Intel unveiled a new portfolio of data-centric solutions consisting of 2nd-Generation Intel Xeon Scalable processors, Intel Optane DC memory and storage solutions, and …
What can we expect of this March Patch Tuesday?
March is here and that means it was time for RSA Conference in San Francisco. I’ve been on the expo floor all week and I can tell you the worldwide security industry is …
Fortanix launches Rust-based SDK for Intel SGX applications
Fortanix launched its Enclave Development Platform (EDP) at RSA Conference. The Fortanix EDP provides a native Rust-based SDK to write Intel Software Guard Extensions (Intel …
Intel and partner ecosystem plan to accelerate the adoption of hardware-enabled security
Intel along with customers and industry partners announced several solutions designed to scale and accelerate the adoption of hardware-enabled security across data center, …
Eclypsium and Intel offer new silicon-enabled security solutions
Eclypsium announced a collaboration with Intel to help organizations manage the entire firmware attack surface. Together with Intel, Eclypsium helps enterprise IT and cloud …
Intel releases new end-to-end solution for 5G
Intel announced the Intel FPGA Programmable Acceleration Card N3000 (Intel FPGA PAC N3000), designed for service providers to enable 5G next-generation core and virtualized …
Nutanix and Intel partner to enable systems integrators and resellers to deliver infrastructure solutions
Nutanix is partnering with Intel to enable systems integrators (SIs) and value-added resellers (VARs) to deliver Nutanix-qualified Intel Data Center Block hardware platforms …
GPU side channel attacks can enable spying on web activity, password stealing
Computer scientists at the University of California, Riverside have revealed for the first time how easily attackers can use a computer’s graphics processing unit, or …
August 2018 Patch Tuesday: Microsoft fixes two actively exploited zero-days
In the August 2018 Patch Tuesday, Microsoft has plugged over 60 vulnerabilities, two of which are being actively exploited in the wild. In addition to those, the company has …
Bluetooth vulnerability allows snooping of traffic between paired devices
Researchers Eli Biham and Lior Neumann have discovered a vulnerability in two Bluetooth features that could be exploited by attackers to gain a man-in-the-middle position and …
IoT connections to grow 140%, will reach 50 billion by 2022
New data has revealed that the total number of connected IoT sensors and devices is set to exceed 50 billion by 2022, up from an estimated 21 billion in 2018. Juniper Research …
Featured news
Sponsored
Don't miss
- US exposes scheme enabling North Korean IT workers to bypass sanctions
- The importance of access controls in incident response
- Organizations struggle to defend against ransomware
- Critical Git vulnerability allows RCE when cloning repositories with submodules (CVE-2024-32002)
- Google fixes third exploited Chrome zero-day in a week (CVE-2024-4947)