Articles

According to a 2014 study, 69 percent of businesses had at least an application or a part of their infrastructure on the cloud.

With the significant number of businesses depending on the cloud, it’s security should be given a serious amount of thought!

Source de l’article sur DZONE

As AI has taken on ever greater importance in the priority of organizations around the world, it is understandable that efforts are underway to protect the intellectual property of algorithms that have strategic importance.

A recent paper from IBM Research highlights one strategy being worked on to provide this protection. Their approach takes inspiration from the digital watermarking that helps to protect video, audio and photos.


Source de l’article sur DZONE (AI)

To secure AWS resources 24-7 from unwanted attacks, the right combination of VPC, Network Access Control Lists (NACLs), and Security Groups are a must. AWS Security Groups are cloud firewalls that help protect applications and data.

AWS Security Groups (SGs) restrict access to certain IP addresses or resources. It guards your AWS security perimeter, always, provided you configure them in the right way! Here are the five best practices you can never ignore while configuring AWS SGs.

Source de l’article sur DZONE

For ERP administrators today, security is always on their mind. But, recent warnings from the US Department of Homeland Security about ERP vulnerabilities make securing your Oracle and SAP applications even more urgent. Data breaches and unauthorized access can disrupt business-critical processes and negatively impact your customers. Staying up-to-date with security patches is the best way to make sure this doesn’t happen to your organization, but good protocol requires that you first test patches against a separate test instance of SAP to confirm that they won’t impact operations of your production instance.

So, how can you speed up testing and implement these important patches as soon as they’re available? Automating the SAP system copy process is one way to clear the path of the obstacles that keep you from better security.

Source de l’article sur DZONE


Overview

The Apache Foundation has confirmed the findings of an independent security research group that a critical remote code execution flaw exists in the popular Struts 2 open source framework. Designated CVE 2018-11776, this vulnerability is located in the core of Apache Struts 2 and impacts all supported versions of Struts 2.

Waratek Enterprise customers are protected against RCE attacks as a core feature.

Source de l’article sur DZONE

2017 became the Year of Intelligence: the advance of technological achievements has triggered exciting and unexpected trends with wider impact horizons and very promising business prospects. This year we expect drastic exponential changes in every technological direction. Machine learning and artificial intelligence will transform entire industries, making way for virtual helpers and a myriad of cases for automatization. The Internet of Things (IoT) will become more intelligent, uncovering a huge potential for smart homes and smart cities. A more efficient human-machine interaction will become established with natural language replacing specific commands.

In this article, we will focus on the modern trends that took off well on the market by the end of 2017 and discuss the major breakthroughs expected in 2018.

Source de l’article sur DZone (Agile)