Report: Companies underestimate the challenges of deploying an SD-WAN

Companies are struggling to fully understand the cost, complexity, and time it will take to build and maintain an SD-WAN. A new report revealed even when companies are working with an operator to get it set up there are still many challenges. Aryaka’s 2019 State of the WAN report surveyed 795 IT and network practitioners … continue reading

Shadow IT doesn’t have to be as dark as it sounds

It’s no secret that IT teams are overwhelmed. Sometimes they don’t have the time or resources required to get everything that needs to be done done. And when employees have to wait long periods of time for IT to approve something, sometimes they decide to take IT matters into their own hands.  Shadow IT is … continue reading

ITOps Times Open-Source Project of the Week: Open vSwitch

Open vSwitch is a virtual switch designed to allow for massive network automation. It can support distribution across multiple physical servers.  According to the team, the project can operate as a soft switch that runs within the hypervisor and the control stack for switching silicon.  Currently a Linux Foundation project, Open vSwitch is used in … continue reading

Report: 1 in 7 organizations suffer from lateral phishing attacks

Email phishing is nothing new, but lateral email phishing is continuing to grow and evolve. Lateral phishing occurs when an attacker is able to compromise an internal email address and send phishing attacks. Because it looks like the email is coming from a trusted source, it can be hard for organizations to defend against it.  … continue reading

DNSSEC diagram

ITOps Times news digest: NS1 and Salesforce’s DNSSEC implementation, StackRox Kubernetes Security Platform now on GCP Marketplace, and Ipswitch WhatsUp Gold 2019.1

NS1 and Salesforce have announced that they have collaborated on the first implementation of multi-signer DNSSEC. This enables the cryptographic signing of DNS records across zones with multiple DNS platforms. According to NS1, DNSSEC prevents DNS spoofing and cache-poisoning attacks. They believe that this implementation is well-timed because cybercriminals have been increasingly targeting DNS lately. … continue reading

Cloudflare’s Magic Transit aims to make networks smarter and more secure

Cloudflare has announced a new tool meant to simplify IT operations. Magic Transit is a new networking solution that brings the benefits of Cloudflare’s network to its customers’ on-premise and data center networks.  Specific benefits of Magic Transit include Layer 3 DDos mitigation, improved performance, and lower total cost of ownership.  Deployed in front of … continue reading

Barracuda logo

ITOps Times news digest: Barracuda acquires InfiSecure, Kontena Lens generally available, and ManageEngine adds two-factor authentication for macOS logins

Security company Barracuda has announced its acquisition of InfiSecure. With this acquisition, Barracuda will now be able to expand its bot protection capabilities. Barracuda plans on combining this new technology with data points from its Global Threat Intelligence Infrastructure. Together, the two technologies will be able to identify and block advanced bots, Barracuda explained. “This … continue reading

ITOps Times Open-Source Project of the Week: Secreter

A new open-source project has been launched to make it easier to encrypt Kubernetes secrets. To enable this the project Secreter consists of two components. The first is a CLI tool that encrypts secrets and stores them outside of the Kubernetes cluster. The second is a Kubernetes operator for both creating and decrypting Kubernetes secrets. … continue reading

Cloud IAP dashboard

Google Cloud IAP now enables context-aware access to VMs via SSH and RDP

Google wants to make it easier to gain context-aware access to VMs with a new feature. Earlier this year, the company introduced context-aware access capabilities in Cloud Identity-Aware Proxy (IAP). Cloud IAP is used to provide controls over cloud applications and VMs running on Google Cloud. The new capability allows administrators to gain access to … continue reading

Sysdig Secure 2.4 Image Profiles

ITOps Times news digest: Sysdig Secure 2.4, Red Hat Enterprise Linux 7.7, Tenable’s asset discovery capabilities

Sysdig Secure 2.4 is now available. This new update adds runtime profiling and new interfaces. According to the company, these new features are designed to improve the experience of creating security policies. “Sysdig Secure 2.4 expands on its previous runtime security and vulnerability management capabilities with the addition of runtime profiling and the new policy … continue reading

Cloud Security Scanner Command Center

ITOps Times news digest: Cloud Security Scanner in GKE and Compute Engine, ManageEngine’s Log360 update, and ITSM Academy’s new course

Google has announced the general availability of its Cloud Security Scanner in GKE and Compute Engine. The new service will provide insights into app vulnerabilities and allow organizations to take action before those vulnerabilities can be exploited. Potential use cases include notifying organizations of common external vulnerabilities in their application, alerting them of accessible GIT … continue reading

traffic spikes in a city

Planning is half the battle when preparing for anticipated traffic spikes

It’s not always possible to predict massive traffic spikes, but some organizations are fortunate enough to have some idea of when their traffic will be increased. Those that do have that foresight can take steps to ensure that when the time comes, they are ready. For example, ahead of the 2018 midterm elections, the New … continue reading

« Previous PageNext Page »
DMCA.com Protection Status

Get access to this and other exclusive articles for FREE!

There's no charge and it only takes a few seconds.

Sign up now!