Securing generative AI: What matters now

Securing generative AI: What matters now

Innovation versus security: It’s not a choice, it’s a test As organizations rush to create value from generative AI, many are speeding past a critical element: security. In a recent study of C-suite executives, the IBM Institute for Business… Article Source https://www.ibm.com/thought-leadership/institute-business-value/en-us/report/securing-generative-ai

Securing Data and Complying with Regulations in Azure: An Overview from Virtualization Review

Securing Data and Complying with Regulations in Azure: An Overview from Virtualization Review

Cloud migration and optimization are top priorities for organizations, but governance is essential for protecting data and meeting regulatory requirements. Azure Governance is vital for safeguarding resources, enforcing policies, and ensuring compliance. This white paper is designed to educate decision makers and IT professionals on how to establish a secure and compliant Azure environment. Download … Read more

Securing Azure Functions with Entra ID: A Guide by TechTarget

Securing Azure Functions with Entra ID: A Guide by TechTarget

Securing Azure Functions is crucial to maintaining data security and application resilience. Organizations can enhance security by implementing measures such as role-based access control (RBAC), encryption, and regular security assessments. Logging and monitoring features can help detect security incidents and potential threats early on. Proper authentication flow selection is key to boosting protection levels. Leveraging … Read more

Securing Large-Scale AI Applications on Microsoft Azure with Confidential Computing on NVIDIA GPUs – CIO

(CIO) at Microsoft Azure recently announced the implementation of confidential computing on NVIDIA GPUs to enhance security for large-scale AI applications. This new feature will provide increased protection for sensitive data and algorithms used in AI models running on Azure cloud platforms. Confidential computing is a technology that allows data to be processed in a … Read more

The role of device tokens in securing your payment cards in Google Wallet

The role of device tokens in securing your payment cards in Google Wallet

Device tokens play a crucial role in the security of transactions made through digital wallets like Google Pay. When a card is added to Google Wallet, a unique device token is created for that specific card. This device token is used during the payment process to keep the financial account number (FPAN) secure. During a … Read more

Securing Your Azure RBAC Infrastructure: Best Practices

Securing Your Azure RBAC Infrastructure: Best Practices

Securing your Role-Based Access Control (RBAC) infrastructure in Azure is crucial to maintaining the security of your cloud environment. RBAC allows you to control who has access to resources in Azure, making it essential to ensure that only the right people have the necessary permissions. One key step to securing your RBAC infrastructure is to … Read more

Top Priority for Amazon CEO Andy Jassy: Securing Multi-Cloud Deal with Oracle in Acceleration Economy

Top Priority for Amazon CEO Andy Jassy: Securing Multi-Cloud Deal with Oracle in Acceleration Economy

In today’s episode of Cloud Wars Minute, we discuss the to-do list for Amazon CEO Andy Jassy and what he needs to do at AWS. One key item on the list is to sign a multi-cloud partnership with Oracle, despite past conflicts with the company. Competitors such as Microsoft and Google Cloud have formed partnerships … Read more

Securing AWS infrastructure with Sonaris: A Closer Look

Securing AWS infrastructure with Sonaris: A Closer Look

AWS has developed a threat detection tool called Sonaris that is used to protect customers from billions of malicious attempts to access their resources each year. The detector has been in use for a few years and has blocked a significant number of attempts to scan customer data stored in Amazon S3 and discover vulnerabilities … Read more

Cisco Live 2024: Securing the Future with AI-Compatible Architecture

Cisco Live 2024: Securing the Future with AI-Compatible Architecture

Cisco unveiled a new set of cutting-edge security offerings at Cisco Live 2024, aimed at solidifying its position as a leader in defense capabilities driven by artificial intelligence (AI). Jeetu Patel, the company’s executive vice president and general manager of security and collaboration, emphasized that the goal is to integrate security seamlessly into the network … Read more