-
Aug 14, 2024 |
securityboulevard.com | Liam Crilly
-
Aug 14, 2024 |
securityboulevard.com | Liam Crilly
-
Aug 14, 2024 |
securityboulevard.com | Liam Crilly
More and more enterprises today are turning to GitOps as a way to better control and audit technology. Initially focused on code, GitOps increasingly focuses on configurations and IT management as more security and network capabilities are shifted to application teams. Because it is based on Git versioning and enables close monitoring of changes to configurations, GitOps should make it easier to solve configuration error issues that are the root cause of so many security problems.
-
Jul 24, 2024 |
thenewstack.io | Liam Crilly |Siddarth Jain |Patrick McFadin |Alex Williams
In the old world of application security and access control, least privilege was a lovely ideal but nearly unworkable in practice. Every company of a certain size instituted role-based access controls (RBACs). As soon as a firm is large enough to talk about any major form of compliance (like SOC2) or to build out considerable technology infrastructure, a lockdown of systems would ensue.
-
Jul 2, 2024 |
thenewstack.io | Liam Crilly |Richard MacManus |Usama Jamil |Steven Vaughan-Nichols
In the most famous line from the classic mockumentary “Spinal Tap,” Nigel Tufnel, the lead guitarist, points to an amplifier and notes the additional number on the dial, saying that it “goes up to 11.”Alas, “this one goes to eight” does not have quite the same ring, but it might be time to use this phrase to describe a new layer of the traditional networking stack — the semantic layer. The addition of Layer 8 is driven by AI applications and their new exigencies.
-
Jun 24, 2024 |
thenewstack.io | Richard MacManus |Loraine Lawson |Michael Bachman |Liam Crilly
To develop the user interface of its web browser, Edge, Microsoft recently began moving away from React and other JavaScript frameworks to embrace what it called an “HTML-first” approach.
-
Jun 19, 2024 |
thenewstack.io | Liam Crilly |Ido Neeman |Susan Hall |Bruce Gain
We are in the early stages of enterprise AI adoption. Many organizations are experimenting with AI services delivered via API and running their own AI infrastructure and models. AI applications are unlike legacy applications and require a new security architecture. Old technologies such as filtering, firewalls and digital loss protection are no longer sufficient. A new architecture must take into account the new attack surface of AI infrastructure.
-
Jun 11, 2024 |
thenewstack.io | Heather Joslyn |Ben Chambers |Liam Crilly |Zachary Proser
The ‘phenomenal impact’ of working with TNS on ‘thoughtful content’Fermyon’s platform helps developers get their WebAssembly cloud native applications up and running in minutes, potentially speeding up workflows at millions of organizations. The company knew it needed to reach both cloud native developers and platform engineers, as well as technical decision makers, explains Fermyon CEO Matt Butcher.
-
Jun 5, 2024 |
thenewstack.io | Liam Crilly |Michelle Gienow |David Cassel |Vidya Shankaran
AI Gateways vs. API Gateways: What’s the Difference? sponsor-nginx,sponsored-post-contributed, Image from alphaspirit.it on ShutterstockThe new hotness in AI infrastructure is the AI gateway. These systems are emerging as the critical buffer, a security and load balancing layer between AI applications and external users as well as internal AI modeling teams. The urgency for AI gateways is clear.
-
May 7, 2024 |
thenewstack.io | Liam Crilly |Joe Fay |Mike Barborak |Usama Jamil
The gold rush of the AI era is on, but for many companies, the pickaxes are on backorder. A phenomenon known as “GPU poverty” is plaguing CIOs as demand for artificial intelligence skyrockets, outpacing the ability to build the data centers and, more importantly, the chips needed to power it all.