Qualys launches new solution for remediating threats efficiently

Security and compliance company Qualys has announced the launch of Qualys Custom Assessment and Remediation. This solution allows security teams to orchestrate workflows, secure applications, and take action to remediate threats.  According to the company, traditionally when threats arise, typical responses include creating new processes and custom scripts that then need to be rolled out … continue reading

Kasten by Veeam K10 v5 helps with shifting data security further left

The new Kasten K10 V5.0 offers enhanced Kubernetes security, streamlined CI/CD pipelines, and ecosystem advances to help apply shift-left security to data protection. “Our latest release remains focused on helping enterprises minimize the financial impact caused by attacks on data and cloud applications. At the same time, we’re also supporting developer needs for backup solutions … continue reading

AWS disaster recovery strategies

Disasters are unavoidable and can cause irreparable damage to enterprises’ technical infrastructures. For organizations, this damage can turn out to be more monetary and reputational as they can lose data and clients. Thus, organizations usually have backup servers and recovery data centers as the first-response strategy. However, building resilience in this way is both costly … continue reading

ITOps Times Open-Source Project of the Week: NGINX Config

NGINX Config is a configuration generator built by DigitalOcean to make it easier to configure NGINX. NGINX is a web server that also works as a load balancer, an HTTP cache, and a reverse proxy. According to DigitalOcean, NGINX itself was started in 2002 by Igor Sysoev to help solve the C10K problem, which was … continue reading

Komodor raises $42 million Series B to build a continuous reliability platform for Kubernetes

Komodor, the continuous reliability platform dedicated to Kubernetes, today announced a $42 Million Series B funding round led by Tiger Global with participation from Felicis and existing investors Accel, NFX Capital, OldSlip Group, Pitango First, and Vine Ventures. This brings the company’s total funding to $67 Million since launching out of stealth less than a year … continue reading

CSA releases guidelines for reducing security risk in healthcare

The Cloud Security Alliance (CSA) issued best practices for healthcare organizations to mitigate supply chain cyber risks in the Healthcare Supply Chain Cybersecurity Risk Management paper.  “The move to the cloud and edge computing has expanded HDOs’ electronic perimeters, not only making it harder for them to secure their infrastructure but also making them more … continue reading

ServiceNow announces three new products

ServiceNow launched three new powerful products to advance digital business and drive innovation at scale.  The first, Service Operations Workspace, offers tech services and operations teams a single space to manage work and to have shared visibility into issues.  The second, App Engine Management Center (AEMC) provides structure and governance for low-code citizen developers. The … continue reading

Red Hat Summit: Security innovations, RHEL 9, and Cloud Services portfolio updates

Red Hat Summit 2022 began today and will continue through tomorrow. The two day, open-source event features expert speakers discussing the latest news and announcements within the community. The summit can be attended in person, virtually, and on demand and brings attendees technical presentations on the topics most relevant to their careers.  Here are some … continue reading

Red Hat and Accenture expands partnership to develop new solutions across four focus areas

Today at the Red Hat Summit, Red Hat announced an expansion to its 12 year partnership with Accenture. The companies will be working together to develop new solutions across four main areas.  These include: Open hybrid cloud application and mainframe modernization Automation Edge computing  Sovereign cloud For the first focus area, the companies will work … continue reading

ITOps Times Open-Source Project of the Week: Project Calico

Project Calico is a networking and network security solution for containers, virtual machines, and native host-based workloads. The project offers high performance with true cloud-native scalability by providing developers and cluster operators with capabilities across public cloud or on-prem, on a single node, or across a multi-thousand node cluster. It offers a choice of dataplanes … continue reading

WANDisco launches Edge to Cloud offering

Today, the IoT data activation solution, WANdisco Edge to Cloud, has been launched. This makes it possible for exabytes of edge data to be transferred for use in any cloud environment.  According to the company, this solution directly connects IoT data storage with cloud-based AI, machine learning, and analytics applications. This works to allow every … continue reading

Creating network visibility everywhere … and beyond!

NASA’s new James Webb telescope is remarkable. In the coming years, it will discover the edge of the observable universe, allowing astronomers to search for the very earliest stars and galaxies, formed more than 13 billion years ago. The telescope’s visibility surpasses that of its Hubble predecessor 100-fold, providing insights into the nearby universe too, determining … continue reading

Enhancing observability with AI in HCL Workload Automation

Organizations now are looking towards AI intelligence to help operators avoid manual operations, whether it’s due to the sheer number of alerts that they’re getting that are contributing to “alert fatigue” or the lack of observability of how the organization is working. HCL has introduced a new set of features to its HCL Workload Automation … continue reading

ITOps Times Open-Source Project of the Week: Caddy Server

Caddy Server 2 is an enterprise-ready, open-source web server with automatic HTTPS written in Go. Caddy offers greater memory safety than servers written in C because a hardened TLS stack powered by the Go standard library serves a significant portion of all Internet traffic. The project can simplify an organization’s architecture by taking care of … continue reading

« Previous PageNext Page »
DMCA.com Protection Status

Get access to this and other exclusive articles for FREE!

There's no charge and it only takes a few seconds.

Sign up now!