D2iQ announced a partnership with Aqua Security that will enable organizations to create seamless DevSecOps experiences that accelerate the deployment of secure smart cloud-native applications. With the partnership, organizations can run Aqua’s Cloud Native Application Protection Platform (CNAPP) on the D2iQ Kubernetes Platform (DKP) and enhance the security of containerized workloads. Aqua on DKP can … continue reading
The IT certification company CompTIA announced the worldwide release of the CompTIA Linux+ certification exam, which covers the latest foundational skills demanded by hiring managers. The new exam validates technology professionals’ skills to secure the enterprise, power the cloud, and keep tech systems running. “As organizations opt for Linux-based solutions to automate and orchestrate critical … continue reading
Zscaler announced newly advanced AI/ML innovations for better user protection and digital experience monitoring in Zscaler’s Zero Trust Exchange security platform. This comes as organizations are facing a 314% increase in cyberattacks on encrypted internet traffic and an 80% increase in ransomware with nearly a 120% increase in double extortion attacks, the company found in … continue reading
Cloudflare announced several new capabilities for Cloudflare One, its Zero Trust SASE platform, including email security protection, data loss prevention tools, cloud access security broker (CASB), and private network discovery. “When I sit with customers, they share that one of the most daunting aspects of Zero Trust security is simply where to begin. Making matters … continue reading
JFrog today announced Connect, a solution designed to help developers update, manage, monitor, and secure remote Linux and IoT devices at scale that is a fully integrated part of the JFrog Platform. Organizations can fully automate DevSecOps activities across hundreds of thousands of devices using a consistent operational model and intuitive user interface across cloud, … continue reading
Security and compliance company Qualys has announced the launch of Qualys Custom Assessment and Remediation. This solution allows security teams to orchestrate workflows, secure applications, and take action to remediate threats. According to the company, traditionally when threats arise, typical responses include creating new processes and custom scripts that then need to be rolled out … continue reading
The Cloud Security Alliance (CSA) issued best practices for healthcare organizations to mitigate supply chain cyber risks in the Healthcare Supply Chain Cybersecurity Risk Management paper. “The move to the cloud and edge computing has expanded HDOs’ electronic perimeters, not only making it harder for them to secure their infrastructure but also making them more … continue reading
This week’s ITOps Times open-source project of the week is Starbase, a tool that collects assets and relationships from services and systems including cloud infrastructure, SaaS applications, security controls, and more into an intuitive graph view backed by Neo4j. The tool enables users to integrate Neo4j with JupiterOne open-source data ingestion plugins to manage their … continue reading
Given the increase in remote work and shadow IT usage, perhaps it shouldn’t be surprising that the cloud access security broker (CASB) market is exploding. Valued at $8.74 billion in 2020, the CASB market is projected to reach $32.9 billion by 2028—a projected compound annual growth rate of roughly 18% from 2021 to 2028. What … continue reading
IT infrastructure provider Kyndryl announced an expansion of its global alliance with Dell Technologies that focuses on helping customers use data optimization, infrastructure management services, and a cyber resilience solution to protect their critical business assets. Kyndryl provides Cyber Incident Recovery with Dell Technologies to accelerate cyber resilience for customers using Dell’s high-performance storage, servers, … continue reading
The newly released Citrix Secure Private Access is a cloud-delivered, zero-trust network access offering that allows companies to provide employees access to apps and data that they need, from a variety of device types. “The IT pendulum has been swinging toward flexible work models for years, and the pandemic has accelerated the velocity,” said John … continue reading
An average employee of a small business with less than 100 employees will receive 350% more social engineering attacks than an employee of a larger enterprise. The most commonly impersonated brand is Microsoft, used by cybercriminals in 57% of phishing attacks – the most prevalent social engineering attack of 2021. These findings are from the … continue reading