A monthly overview of things you need to know as an architect or aspiring architect. Unlock the full InfoQ experience by logging in! Stay updated with your favorite authors and topics, engage with ...
You probably get a few of these things each week in the mail. And some of them actually do a good job of obscuring the contents inside, even if you hold the envelope up to the light. But have you ever ...
BOSTON—RED HAT SUMMIT--(BUSINESS WIRE)--Red Hat, Inc., the world's leading provider of open source solutions, today announced new security innovations and capabilities across its portfolio of open ...
Red Hat introduced a series of new security capabilities this week during its annual summit to advance security across open hybrid cloud environments. The vendor announced a software supply chain ...
The simplest and most common approach to security for service-oriented architecture (SOA) is to route service requests over a virtual private network (VPN). This provides adequate security for simple, ...
Unlock the full InfoQ experience by logging in! Stay updated with your favorite authors and topics, engage with content, and download exclusive resources. Traditional caching fails to stop "thundering ...
A clever feature of smartphones running Google's Android operating system is the gesture unlocking method, in which users choose a custom security pattern by selecting dots from a three-by-three grid ...
As AI tools become essential business assistants, they introduce a new data exfiltration path that organizations need to take ...
BOULDER, Colo., Feb. 8, 2011 - LogRhythm, the company that makes log data useful, today announced the LogRhythm Advanced Intelligence (AI) Engine for its integrated SIEM 2.0 (security information & ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results