Insecure Connections: Enterprises hacked after neglecting third-party risks

By GIXnews

By George V. Hulme, CSO | July 28th, 2014 It is said that an enterprise is only as secure as its weakest link. Today, that weak link often turns out to be partners, suppliers, and others with persistent network and application access. These weak links have certainly placed third-party security into the spotlight. As we’ve…

Non-IBM Power8 servers, chips to appear early next year

By GIXnews

By Agam Shah, IDG News Service | July 24th, 2014 Servers, chips and components are under development as part of third-party licensing deals. The first third-party chips and servers licensed to use IBM’s Power architecture will be on the market early next year. IBM last year started licensing the architecture so other companies could build…