Red Hat has entered into an agreement to acquire StackRox for its container and Kubernetes-native security capabilities. According to Red Hat, bringing StackRox to its container application platform OpenShift will help users build, deploy and securely run apps across the hybrid cloud from a single platform. In addition, Red Hat plans to use StackRox to … continue reading
The new reality of remote working is driving businesses to re-examine their network security posture. Let’s face it: these networks were originally architected to support a dramatically different work environment. IT now must secure the network by bringing into the fold a myriad of remote, mobile and digital workspace devices, some of which were previously … continue reading
Cohesity is on a mission to simplify data management with the announcement of its new SaaS offerings. The general availability of Cohesity DataProtect and SiteContinuity as a service tackles backup and disaster recovery by making sure on-premises and cloud-based data is safe and secure. According to a recent survey from the company, 94% of respondents … continue reading
With hybrid clouds now often the starting point for organizations in their cloud journey, management, access control, data use, and service contracts become more difficult with multi-cloud convergence, according to the Cloud Security Alliance in a whitepaper. “Although the hybrid cloud environment seamlessly integrates private and public cloud, bringing onboard new IT capabilities to the … continue reading
SPIFFE stands for the Secure Production Identity Framework For Everyone. The project aims to define a framework and standards for identifying and securing communications between app services. According to its GitHub page, SPIFFE includes SPIFFE IDs implemented as Uniform Resource Identifiers. This defines how services services identify themselves to one another SPIFFE Verifiable Identity Document … continue reading
Security continues to be a concern for container strategies. A recent report by the container security company StackRox found that 44% of respondents delayed rolling out applications into production because of security concerns and that security incidents among respondents remain high at 90%. “Rolling out an application that hasn’t passed a security assessment puts the business … continue reading
In an effort to help secure cloud computing environments, the Cloud Security Alliance (CSA) has released the Top Threats to Cloud Computing: Egregious 11 Deep Dive report. The report takes a deep look at the challenges of cloud computing as well as looks into nine recent cybersecurity attacks and breaches. “These anecdotes will let cybersecurity … continue reading
FireMon’s new agile network security policy management platform offers security capabilities to enable cloud and digital transformation initiatives. “Our customers have told us that traditional approaches to managing network security policy are too cumbersome for their dynamic cloud and hybrid environments,” said Satin H. Mirchandani, the president and CEO of FireMon. “Our agile approach to … continue reading
SentinelOne has released a new automated application control engine that is designed to secure cloud and containerized workloads without human intervention. The automated engine eliminates the need to manually maintain allow-lists, which preserves cloud and container workload’s immutable states while also defending against malware, cryptojacking, and zero-day threats. “It is critical to defend cloud and … continue reading
Oracle has announced its VMware solution is now available. The Oracle Cloud VMware solution is a cloud-native VMware-based environment that enables users to move VMware workloads to Oracle Cloud Infrastructure. “Building new digital services. Scaling business-critical apps. Enabling a remote workforce. Applications sit at the core of addressing these challenges, and hybrid cloud opens the … continue reading
Endpoint management and security provider Tanium and Google Cloud are expanding their partnership to support distributed business operations. According to the companies, as more employees transition to remote work and organizations become more distributed, IT and security teams are having to defend against an increasing number of cyberattacks while maintaining availability and security. “According to … continue reading