Authentik is an open-source identity provider that supports a number of authentication protocols, including OAuth2, SAML, LDAP, and SCIM. It is designed to provide site administrators, developers, and security engineers with a reliable solution that can be used in almost every environment. Authentik includes an admin console where users and groups, tokens and credentials, application … continue reading
Starting September 16th, Docker is deprecating the ability to use passwords to sign-in to services via its CLI when users have Single Sign-On (SSO) enforcement turned on. SSO enables users to authenticate once and get access to multiple different services. In this case, that includes Docker Desktop, Docker Hub, Docker Scout, and Docker Build Cloud. … continue reading
Entrust has announced a new offering to help companies better manage encryption keys. KeyControl as a Service (KCaaS) provides a cloud-based unified dashboard that provides visibility, traceability, compliance tracking, and an audit trail of keys and secrets. KCaaS also automates key storage, backup, distribution, rotation, and revocation. It features a decentralized vault architecture, which ensures … continue reading
C-suite executives are losing confidence in the ability of their IT teams to deliver basic services, leading to concerns over how advanced technologies like generative AI can be implemented successfully. According to a new survey of 2,500 C-suite executives, conducted by IBM, only 47% of respondents believe their IT teams are effective at delivering basic … continue reading
The security company Fortanix has announced File System Encryption, a new feature that is part of the Fortanix Data Security Manager. With File System Encryption, data can be encrypted at the file system level, which is useful in scenarios where different user groups need access to different parts of a database. Organizations can set up … continue reading
AMD has announced that it has signed an agreement to acquire ZT Systems, a company that provides hyperscale server solutions. AMD says this purchase is part of its overall AI strategy, as ZT Systems’ offerings will help customers deploy AMD-powered AI infrastructure at scale. Over the last year, AMD has invested over $1 billion to … continue reading
Dapr is a collection of APIs for building microservices that takes care of security, resiliency, and observability so that developers can focus on other aspects of building their applications. Dapr provides building blocks that are based on best practices for building microservices, and those building blocks can then be incorporated into the application using whatever … continue reading
A majority of companies believe they have the necessary technologies and processes in place to deal with security events in a timely manner, but new survey data shows that in practice, this isn’t the case. Cohesity surveyed 3,1000 IT and security decision makers for its Global Cyber Resilience Report 2024, and 78% of the respondents … continue reading
Rafay Systems has announced its new Cost Optimization Suite to help users lower their cloud computing and Kubernetes costs. The platform does this by continuously analyzing resource usage and reallocating or cleaning up resources as necessary based on policy-driven controls. For instance, users can set time-to-live limits for short term needs, so that resources are … continue reading
Infisical is an open source secrets management platform that allows teams to securely store things like API keys, database credentials, and 150+ other secret types. These secrets can then be synced across teams and infrastructure. It has a web interface for managing secrets across different projects, and a custom CLI that can be used to … continue reading
SentinelOne and Google Cloud are partnering up to provide customers with better capabilities for securing their environments. SentinelOne’s AI-driven endpoint protection capabilities will be combined with Google Cloud’s threat intelligence and related services. They will jointly share telemetry data with each other, and SentinelOne will use Google Gemini 1.5 Pro and Flash to further enhance … continue reading
Sysdig has launched a new solution, Cloud Identity Insights, that will make it easier for companies to detect compromised identities so they can act faster to contain problems. The company explained that according to a report from Verizon, almost 40% of data breaches are the result of compromised accounts. Therefore, suspicious user activity is often … continue reading