According to research from Atlassian, most companies are now practicing proactive incident management, meaning that they are using monitoring, alerting, and communication tools; have formal incident response training in place; and are using AI for incident trending and visibility into recent changes. When Atlassian conducted the same survey four years ago, only 35% of companies … continue reading
KTE is an open source Kubernetes testing environment for the major cloud providers’ Kubernetes services: Amazon Elastic Kubernetes Service (EKS), Google Kubernetes Engine (GKE), and Azure Kubernetes Service (AKS). It provides a safe and controlled space for discovering issues and vulnerabilities in Kubernetes configurations before they make it to production. KTE allows for the simulation … continue reading
AWS is announcing the launch of AWS Parallel Computing Service (PCS), a new managed service that sets up and manages high performance computing (HPC) clusters. HPC brings together multiple computers or resources to tackle more complex or resource-intensive workloads, like computational fluid dynamics, weather modeling, finite element analysis, electronic design automation, and reservoir simulations. With … continue reading
Companies are experiencing fewer cloud security incidents this year than in years past, yet they still have concerns related to cloud and edge. This is according to SUSE’s latest Securing the Cloud report, which surveyed 820 IT engineers, architects, developers, security managers, and directors across the US, Germany, UK, France, and the Netherlands. According to … continue reading
VMware Explore is happening this week in Las Vegas, NV, and this morning during the event, Broadcom (which now owns VMware) made several announcements regarding VMware offerings, from the latest version of VMware Cloud Foundation to updates to its software-defined edge portfolio. Here is a breakdown of what has been announced: VMware Cloud Foundation 9 … continue reading
Red Hat has announced the general availability release of Red Hat OpenStack Services on OpenShift (also referred to in the Red Hat portal as OpenStack Platform 18), a new OpenStack architecture that leverages the advantages of Kubernetes. It provides a new podified control plane that can be used to manage both existing OpenStack workloads and … continue reading
Authentik is an open-source identity provider that supports a number of authentication protocols, including OAuth2, SAML, LDAP, and SCIM. It is designed to provide site administrators, developers, and security engineers with a reliable solution that can be used in almost every environment. Authentik includes an admin console where users and groups, tokens and credentials, application … continue reading
Starting September 16th, Docker is deprecating the ability to use passwords to sign-in to services via its CLI when users have Single Sign-On (SSO) enforcement turned on. SSO enables users to authenticate once and get access to multiple different services. In this case, that includes Docker Desktop, Docker Hub, Docker Scout, and Docker Build Cloud. … continue reading
Entrust has announced a new offering to help companies better manage encryption keys. KeyControl as a Service (KCaaS) provides a cloud-based unified dashboard that provides visibility, traceability, compliance tracking, and an audit trail of keys and secrets. KCaaS also automates key storage, backup, distribution, rotation, and revocation. It features a decentralized vault architecture, which ensures … continue reading
C-suite executives are losing confidence in the ability of their IT teams to deliver basic services, leading to concerns over how advanced technologies like generative AI can be implemented successfully. According to a new survey of 2,500 C-suite executives, conducted by IBM, only 47% of respondents believe their IT teams are effective at delivering basic … continue reading
The security company Fortanix has announced File System Encryption, a new feature that is part of the Fortanix Data Security Manager. With File System Encryption, data can be encrypted at the file system level, which is useful in scenarios where different user groups need access to different parts of a database. Organizations can set up … continue reading
AMD has announced that it has signed an agreement to acquire ZT Systems, a company that provides hyperscale server solutions. AMD says this purchase is part of its overall AI strategy, as ZT Systems’ offerings will help customers deploy AMD-powered AI infrastructure at scale. Over the last year, AMD has invested over $1 billion to … continue reading