Author Archive for APSM

Micron Appoints Manish Bhatia as EVP of Global Operations

Micron Appoints Manish Bhatia as EVP of Global Operations

Micron Technology has announced the appointment of Manish Bhatia as executive vice president of Global Operations. He will report directly to Sanjay Mehrotra, president and CEO. Bhatia will be responsible for driving Micron’s end-to-end operations, including the company’s global manufacturing fab footprint, back-end assembly and test operations, supply chain planning and fulfillment, procurement, quality and […]

SWIFT tests shows blockchain has potential for global liquidity optimisation

SWIFT tests shows blockchain has potential for global liquidity optimisation

New paper highlights initial findings from proof of concept to improve real-time Nostro reconciliation, part of SWIFT’s gpi initiative SWIFT has published an interim report on the proof of concept (PoC) for real-time Nostro reconciliation using a SWIFT-developed distributed ledger technology (DLT) sandbox with 33 global transaction banks, as part of its SWIFT gpi service. […]

Fujitsu Receives Order for Japan's Fastest Supercomputer System for AI Applications

Fujitsu Receives Order for Japan’s Fastest Supercomputer System for AI Applications

News facts: Fujitsu’s latest x86 servers, the Fujitsu Server PRIMERGY will be included in the configuration for AI Bridging Cloud Infrastructure (ABCI) AI Bridging Cloud Infrastructure (ABCI) is set to become the fastest supercomputer system in Japan. Fujitsu gives the National Institute of Advanced Industrial Science and Technology AI processing performance of 550 petaflops Fujitsu […]

Security Assurance Requirements for Linux Application Container Deployments

Security Assurance Requirements for Linux Application Container Deployments

Author(s): Ramaswamy Chandramouli (NIST) Abstract Application Containers are slowly finding adoption in enterprise IT infrastructures. Security guidelines and countermeasures have been proposed to address security concerns associated with the deployment of application container platforms. To assess the effectiveness of the security solutions implemented based on these recommendations, it is necessary to analyze those solutions and outline […]

New CloudAI offering delivers advanced analytics that leverage artificial intelligence to automate the rapid detection of advanced threats

New CloudAI offering delivers advanced analytics that leverage artificial intelligence to automate the rapid detection of advanced threats

LogRhythm has introduced CloudAI, a technology designed to help LogRhythm customers across the globe avoid damaging cyber incidents such as high-profile data breaches. CloudAI is an advanced cloud-based security analytics offering that is available as a fully integrated, add-on subscription service for the LogRhythm Threat Lifecycle Management Platform. Initially focused on extending and enhancing LogRhythm’s existing user and […]

Security Start-Up Numbers Soar – Have the Barriers to Entry Ever Been So Low?

Security Start-Up Numbers Soar – Have the Barriers to Entry Ever Been So Low?

By Jim Dearing, senior analyst, building and security technology, IHS Markit Homeowners worldwide have more security options available to them now than ever before. If you needed to purchase a home alarm or video surveillance system 10 years ago, typically you had two options: go to a professional solution provider or do it yourself. Since […]

CyberArk integrates with Puppet to automate DevOps secrets protection

CyberArk integrates with Puppet to automate DevOps secrets protection

CyberArk Conjur and Puppet improve visibility, flexibility and security across DevOps workflows CyberArk has announced its partnership with Puppet as an Advanced Technology Partner. Together, CyberArk and Puppet are working together to create supported modules that provide automated, enterprise-grade protection of secrets and are seamlessly integrated with Puppet’s configuration automation, enabling secure, high-velocity DevOps workflows. In […]

Terrorism Insurance: Understanding the Boundaries of Coverage for a Risk Without Borders

Terrorism Insurance: Understanding the Boundaries of Coverage for a Risk Without Borders

Terrorism risk insurance, whether through traditional or stand-alone policies, is an increasingly important element of domestic corporate insurance programs, according to a new RIMS Professional Report titled, Terrorism Insurance: Understanding the Boundaries of Coverage for a Risk Without Borders. Authored for RIMS by Micah Skidmore of Haynes and Boone, LLP, the report provides corporate risk […]

Defence Exports - Briefing new Attaches

Defence Exports – Briefing new Attaches

Minister for Defence Industry, the Hon Christopher Pyne MP, has briefed over 35 Defence personnel selected for representational roles in Australian diplomatic missions overseas on his expectations for their roles. As part of the Defence Overseas Representation Seminar, a three week training course, Minister Pyne spoke to highlight their vital role in promoting the export […]

Techstars Adelaide’s CRON Systems closes AU$1.5m seed funding round

Techstars Adelaide’s CRON Systems closes AU$1.5m seed funding round

CRON systems has closed a seed funding round of AU$1.5 million to date, led by India’s premiere early stage investor, YourNest. The funds will be used to further accelerate the company’s international expansion across Middle East, Africa and Europe, increase production capabilities and strengthen R&D for the next generation of products. CRON Systems is one […]