How to eliminate the weak link in public cloud-based multi-party computation

Secure multi-party computation (MPC) has seen steady evolution to tackle many scientific challenges. These include enabling the creation and tuning of AI or machine learning algorithms, as well as developing open-source software and games. Now, digital… Continue reading How to eliminate the weak link in public cloud-based multi-party computation

Malicious actors targeting the cloud for cryptocurrency-mining activities

Trend Micro announced a report revealing a fierce, hour-by-hour battle for resources among malicious cryptocurrency mining groups. “Just a few hours of compromise could result in profits for the perpetrators. That’s why we’re seeing a… Continue reading Malicious actors targeting the cloud for cryptocurrency-mining activities