Topic: security

IBM expands zero trust strategy

IBM expanded its zero trust strategy with new Secure Access Service Edge (SASE) services to help modernize network security.  SASE is a new architecture model designed to address the requirements of organizations that are digitally transforming, adopting cloud and SaaS applications, and providing services to a hybrid workforce and customer base.  The new service leverages … continue reading

DH2i launches free DxEnterprise & DxOdyssey Developer Editions

DH2i announced the launch of developer editions of its DxEnterprise and DxOdyssey software, which offer free licenses for non-production use and trials.  DxEnterprise enables users to manage and ensure high availability (HA) for a variety of workloads such as SQL Server at the instance level and also SQL Server availability groups inside or outside containers.  … continue reading

CSA releases Cloud Threat Modeling guide

The Cloud Security Alliance (CSA) has released a new Cloud Threat Modeling guide to help provide guidance on threat modeling for cloud applications, their services, and related security decisions.  The guide was written by the CSA Top Threats Working Group. The group hopes that the Cloud Threat Modeling guide will provide organizations with an up-to-date … continue reading

Microsoft acquires CloudKnox Security for privileged access capabilities

Microsoft announced that it acquired the cloud Cloud Infrastructure Entitlement Management (CIEM) provider CloudKnox Security to offer unified privileged access and cloud entitlement management.  “The company’s solution helps organizations right-size permissions and consistently enforce least-privilege principles to reduce risk, and it employs continuous analytics to help prevent security breaches and ensure compliance. This strengthens our … continue reading

ITOps Times Open-Source Project of the Week: MicroK8s

MicroK8s allows for low-ops, minimal production Kubernetes for devs, cloud, clusters, workstations, edge and IoT.  It is a Cloud Native Computing Foundation (CNCF) certified upstream Kubernetes deployment that runs entirely on your workstation or edge device. The project automatically chooses the best nodes for the Kubernetes datastore, and when a cluster database is lost, another … continue reading

IBM adds enhanced data protection to FlashSystem

IBM announced that it is bringing advanced data protection capabilities to the IBM FlashSystem family of all flash arrays to help companies plan for and recover quickly from ransomware and cyberattacks.  IBM Safeguarded Copy, which automatically creates data copies in “immutable snapshots,” will now be integrated into the IBM FlashSystem family. In the event of … continue reading

Report: 94% of organizations have suffered from insider data breaches

A lot of focus is made on hardening systems from outside attacks, but threats from within the company shouldn’t be ignored. Results from Egress’ Insider Data Breach Survey 2021 showed that 94% of organizations have fallen victim to insider data breaches in the last year alone.  The survey was conducted by Arlington Research on behalf … continue reading

Cloud Security Alliance releases Enterprise Architecture Reference Guide v2

The Cloud Security Alliance announced the release of the Enterprise Architecture Reference Guide v2, which provides users with a compilation of every domain and container within the CSA Enterprise Architecture v2.3.  “This reference guide is fundamentally important for risk managers in evaluating opportunities for improvement, creating road maps for technology adoption, identifying reusable security patterns, … continue reading

VMware unveils Anywhere Workspace for distributed organizations

VMware wants distributed organizations to be able to embrace work from anywhere with the release of its Anywhere Workspace. The new solution aims to manage multi-modal employee experience while providing better security at the edge and reducing costs and operational overhead.  “Organizations are facing many challenges, such as ensuring good connectivity for remote employees, monitoring … continue reading

ITOps Times Open-Source Project of the Week: Red-Shadow

Cloud security provider Lightspin developed a new open-source scanner Red-Shadow that reports when user permissions are loosely defined, which opens up an attack path for hackers.  Lightspin released the scanner after it announced the results of its research that discovered a gap between AWS Identity and Access Management (IAM) user group policies that attackers can … continue reading

Report: Fusion of security and network planning is accelerating

The fusion of security and network planning has been accelerating over the past year, according to Aryaka’s recently released 2021 Global State of the WAN report. According to the report, almost a third of companies surveyed are already deploying secure access service edge (SASE) architectures. This close integration of networks and security will become even … continue reading

Aqua Security launches Aqua Cloud Native Security Platform for containers and VMs running on Arm devices

Aqua Security launched a new container runtime security solution for Arm 64-bit environments that enables organizations to protect their high-density workloads on platforms such as AWS Graviton2 instances and more.  “Our customers will be able to continue and accelerate their cloud native journey with Aqua’s support for Arm-based architectures. Through our commitment to supporting the … continue reading

DMCA.com Protection Status

Get access to this and other exclusive articles for FREE!

There's no charge and it only takes a few seconds.

Sign up now!