Google wants to make it easier to gain context-aware access to VMs with a new feature. Earlier this year, the company introduced context-aware access capabilities in Cloud Identity-Aware Proxy (IAP). Cloud IAP is used to provide controls over cloud applications and VMs running on Google Cloud. The new capability allows administrators to gain access to … continue reading
Sysdig Secure 2.4 is now available. This new update adds runtime profiling and new interfaces. According to the company, these new features are designed to improve the experience of creating security policies. “Sysdig Secure 2.4 expands on its previous runtime security and vulnerability management capabilities with the addition of runtime profiling and the new policy … continue reading
Google has announced the general availability of its Cloud Security Scanner in GKE and Compute Engine. The new service will provide insights into app vulnerabilities and allow organizations to take action before those vulnerabilities can be exploited. Potential use cases include notifying organizations of common external vulnerabilities in their application, alerting them of accessible GIT … continue reading
It’s not always possible to predict massive traffic spikes, but some organizations are fortunate enough to have some idea of when their traffic will be increased. Those that do have that foresight can take steps to ensure that when the time comes, they are ready. For example, ahead of the 2018 midterm elections, the New … continue reading
Microsoft has introduced a new Azure service that allows virtual machines to be run on single-tenant servers. With Azure Dedicated Host, organizations are able to more easily address compliance requirements for physical security, data integrity, and monitoring, according to the company. This new solution also aims to provide greater control over underlying hardware infrastructure, number … continue reading
It’s no surprise that attackers typically go for the “lowest-hanging fruit.” They want to spend as little time and get as much of a reward as possible. Often, this results in attackers targeting users with the most privileged level of access. AzureStealth is a new project that hopes to help IT teams gain more visibility … continue reading
Legacy tools are preventing security operations center (SOC) employees from reaching their full potential. According to a joint survey between Exabeam and the Ponemon Institute, SOCs waste 25 percent of their time on false positives because of incorrect security alerts. The companies surveyed 596 IT and IT security practitioners for the survey. The report highlights … continue reading
Google is constantly focusing on improving security for its customers and users. This week at Google Cloud Next ‘19 in Tokyo, the company continued on with that mission with improvements to enterprise security. The company introduced its Advanced Protection Program for enterprises. The program helps protect Google accounts of users who might be targeted in … continue reading
Following IBM’s acquisition of Red Hat, IBM has optimized Red Hat OpenShift on its cloud service. Using Red Hat OpenShift on IBM Cloud, users will have a fast and secure way for deploying and managing container workloads. In addition, users will be able to scale across IBM’s data centers and regions and consistently monitor, log, … continue reading
Unravel Data has announced a new cloud assessment tool that will help organizations move their workloads to the cloud. The solution is available for Azure, AWS, and Google Cloud. According to the company, this new tool offers details of the source environment and its applications, identifies suitable workloads for the cloud and determines optimal cloud … continue reading
AWS has announced new resources to help enterprise customers build out their cloud skills. Resources include a customizable Internal Communications Kit, a new white paper about branding, and an ebook about the benefits of private on-site training. In addition to these resources, the company also added a new Training and Certification for Enterprise website. Aqua … continue reading
It seems that nowadays, practically every occupation has its own holiday. While every job is important and should be recognized, one could argue that system administrators are some of the most important people in an organization. That’s why today, system administrators are celebrating SysAdmin Day, also referred to as some as “Sysmas.” System administrators are … continue reading