Cloud IAP dashboard

Google Cloud IAP now enables context-aware access to VMs via SSH and RDP

Google wants to make it easier to gain context-aware access to VMs with a new feature. Earlier this year, the company introduced context-aware access capabilities in Cloud Identity-Aware Proxy (IAP). Cloud IAP is used to provide controls over cloud applications and VMs running on Google Cloud. The new capability allows administrators to gain access to … continue reading

Sysdig Secure 2.4 Image Profiles

ITOps Times news digest: Sysdig Secure 2.4, Red Hat Enterprise Linux 7.7, Tenable’s asset discovery capabilities

Sysdig Secure 2.4 is now available. This new update adds runtime profiling and new interfaces. According to the company, these new features are designed to improve the experience of creating security policies. “Sysdig Secure 2.4 expands on its previous runtime security and vulnerability management capabilities with the addition of runtime profiling and the new policy … continue reading

Cloud Security Scanner Command Center

ITOps Times news digest: Cloud Security Scanner in GKE and Compute Engine, ManageEngine’s Log360 update, and ITSM Academy’s new course

Google has announced the general availability of its Cloud Security Scanner in GKE and Compute Engine. The new service will provide insights into app vulnerabilities and allow organizations to take action before those vulnerabilities can be exploited. Potential use cases include notifying organizations of common external vulnerabilities in their application, alerting them of accessible GIT … continue reading

traffic spikes in a city

Planning is half the battle when preparing for anticipated traffic spikes

It’s not always possible to predict massive traffic spikes, but some organizations are fortunate enough to have some idea of when their traffic will be increased. Those that do have that foresight can take steps to ensure that when the time comes, they are ready. For example, ahead of the 2018 midterm elections, the New … continue reading

Azure Dedicate Host interface

Azure Dedicated Host now available in preview

Microsoft has introduced a new Azure service that allows virtual machines to be run on single-tenant servers. With Azure Dedicated Host, organizations are able to more easily address compliance requirements for physical security, data integrity, and monitoring, according to the company. This new solution also aims to provide greater control over underlying hardware infrastructure, number … continue reading

AzureStealth logo

ITOps Times Open-Source Project of the Week: AzureStealth

It’s no surprise that attackers typically go for the “lowest-hanging fruit.” They want to spend as little time and get as much of a reward as possible. Often, this results in attackers targeting users with the most privileged level of access. AzureStealth is a new project that hopes to help IT teams gain more visibility … continue reading

Report: SOCs wasting 25% of time chasing false positives

Legacy tools are preventing security operations center (SOC) employees from reaching their full potential. According to a joint survey between Exabeam and the Ponemon Institute, SOCs waste 25 percent of their time on false positives because of incorrect security alerts. The companies surveyed 596 IT and IT security practitioners for the survey. The report highlights … continue reading

Titan Security Keys

Google improves enterprise security for its users

Google is constantly focusing on improving security for its customers and users. This week at Google Cloud Next ‘19 in Tokyo, the company continued on with that mission with improvements to enterprise security. The company introduced its Advanced Protection Program for enterprises. The program helps protect Google accounts of users who might be targeted in … continue reading

Red Hat OpenShift on IBM Cloud screenshot

ITOps Times news digest: Red Hat OpenShift now on IBM Cloud, TimeXtender introduces support for Microsoft capabilities, and JumpCloud releases AD Sync

Following IBM’s acquisition of Red Hat, IBM has optimized Red Hat OpenShift on its cloud service. Using Red Hat OpenShift on IBM Cloud, users will have a fast and secure way for deploying and managing container workloads. In addition, users will be able to scale across IBM’s data centers and regions and consistently monitor, log, … continue reading

bird migrations

Unravel launches new cloud assessment tool for migrations

Unravel Data has announced a new cloud assessment tool that will help organizations move their workloads to the cloud. The solution is available for Azure, AWS, and Google Cloud. According to the company, this new tool offers details of the source environment and its applications, identifies suitable workloads for the cloud and determines optimal cloud … continue reading

AWS Training and Certification for Enterprise

ITOps Times news digest: AWS announces new resources for building cloud skills, Aqua Security now available for Pivotal Cloud Foundry, and Cohesity launches CyberScan solution

AWS has announced new resources to help enterprise customers build out their cloud skills. Resources include a customizable Internal Communications Kit, a new white paper about branding, and an ebook about the benefits of private on-site training. In addition to these resources, the company also added a new Training and Certification for Enterprise website. Aqua … continue reading

woman typing on a laptop

Celebrating SysAdmin Day by reflecting on the importance of system administrators

It seems that nowadays, practically every occupation has its own holiday. While every job is important and should be recognized, one could argue that system administrators are some of the most important people in an organization. That’s why today, system administrators are celebrating SysAdmin Day, also referred to as some as “Sysmas.” System administrators are … continue reading

« Previous PageNext Page »
DMCA.com Protection Status

Get access to this and other exclusive articles for FREE!

There's no charge and it only takes a few seconds.

Sign up now!