Google has announced a beta security feature for container images built using Cloud Build, automatically scanning the images for vulnerabilities. The Container Registry vulnerability scanning feature can also be integrated with Binary Authorization to ensure only trusted images are used on the Kubernetes Engine.
The Internet Corporation for Assigned Names and Numbers has voted to change the current key for the Domain Name System, creating a new cryptographic public and private key pair. The rollover will facilitate internet of things device deployment and improved cybersecurity, ICANN says.
As many as 14 million records were exposed in a breach of the GovPayNet website, security expert Brian Krebs reports. At least six years' worth of data, including addresses and the last four digits of payment cards, were leaked on the website, which manages online payments for government agencies.
Google added the Work Insights tool to G Suite, allowing users to gain insight into G suite deployments. "This insight can help executives identify opportunities to strengthen collaboration and reduce silos," says G Suite's Reena Nadkarni.
IBM created a cloud-based tool that can detect bias in artificial intelligence systems and offer explanations for decisions AI services make. The cloud tool can also recommend additional data to eliminate bias in AI decisions.
Telstra's next regional center launch of 5G service will be focused on smart cities, says Executive Director Channa Seneviratne. The company has not yet revealed where the regional center will be.
Experts have proposed several options to address the skills gap in cybersecurity, suggesting government intervention with programs such as a Cyber ROTC program or Cybersecurity Peace Corps, where students would receive cybersecurity training in exchange for work in the public sector or with nonprofits, respectively. Congress also proposed a bill called the New Collar Jobs Act that would offer student debt relief for those entering the cybersecurity industry.
The best defense for keeping your data and activity secure is a virtual private network. David Pierce offers tips for selecting the best VPN, including selecting one that works across all devices and avoiding ad-supported products.
With more than 121.6 million new malware programs discovered last year, experts are looking to artificial intelligence as a useful tool in combating cyberattacks. AI can be used to detect malware, collect data on users, assess security alerts and identify hackers.
AMD is promoting Epyc processors that feature 16 or 32 cores with a single socket, which product and segment marketing chief Glen Keels says could be cheaper than two-socket options. AMD is also working on a 64-core processor, code-named "Rome," that will be built on a 7-nanometer process.
- Page 1