Topic: security

Report: Container and Kubernetes security concerns are inhibiting business innovation

The latest edition of the State of Container and Kubernetes Security Report finds that 44% of respondents have delayed deploying cloud-native applications because of security concerns, delaying the deployment of cloud-native applications into production. StackRox surveyed more than 540 IT professionals for this third version of its industry-first report. Roughly 25 percent of respondents serve … continue reading

Locating the Microsoft Azure Backup Explorer

ITOps Times news digest: Microsoft Azure Backup Explorer, Elastic Stack 7.6, and Tufin SecureCloud

Microsoft has announced Backup Explorer for Azure is now available as a preview. According to the company, Backup Explorer is a built-in Azure Monitor Workbook that enables users to see real-time monitoring metrics across their entire backup estate.  “Up until now, you could use a Recovery Services vault to get a bird’s eye view of … continue reading

Why enterprises are running to the edge

The popularity of edge computing has greatly increased as more industries are adopting IoT devices and are increasing their demand for low-latency processing and real-time, automated decision-making solutions. Both the evolution of technologies surrounding edge computing, such as 5G, and the industry demand for its benefits, such as speed and low latency, have created a … continue reading

ITOps Times news digest: HPE acquires Scytale, Sectigo Certificate Manager adds Microsoft Azure Key Vault integration, and InfluxDB Cloud on Google Cloud

HPE is adding a new company to its portfolio in order to tackle cloud-native security and zero trust networking. Scytale is a service identity management company for the cloud native enterprise. According to HPE, the Scytale team is made up of season engineers with AWS, Duo Security, Google, Okta, PagerDuty and Splunk backgrounds. HPE hopes … continue reading

Know your risk: Make smart decisions on application security

Security breaches are constantly in the headlines, and in turn, on your board members’ minds. Cybercriminals are no longer fringe. Instead, they are forming an organized, growing industry. High-profile breaches at big-name and respected institutions and organizations are becoming more and more commonplace. The success of a security organization is not predicated on its actions … continue reading

OneLogin introduces Trusted Experience Platform

OneLogin brings AI to identity and access management

OneLogin has announced its new Trusted Experience Platform, a complete identity and access management (IAM) solution designed to manage digital identities for enterprises. According to the company, it leverages artificial intelligence to provide secure, scalable and smart experiences.  “The OneLogin Trusted Experience Platform provides unparalleled security and reliability to companies so leaders can focus on … continue reading

Cloudflare focuses on making the Internet faster and safer for enterprises

Cloudflare wants to help build a better Internet with the announcement of Cloudflare for Teams. The new solution is a set of services designed to secure enterprises and employees without sacrificing performance. “With the rise of SaaS, cloud, and an increasingly mobile workforce, existing security solutions don’t work for modern-day employees or their employers,” said … continue reading

Stateless: Microservice network functions are the next step for encryption everywhere

Encryption everywhere requires an increase in multi-tenancy and scalability, and according to software defined interconnect provider Stateless, the move forward is to split that complexity into microservices. “One of the main challenges with security is its complexity. The more complex the system, the more it’s prone to security issues, because it’s prone to errors and … continue reading

Google explains cloud-native security model

To address security issues as early in the development and deployment lifecycle as possible, Google implemented a new approach to cloud-native security called BeyondProd. Google released a whitepaper to show how other companies can benefit from BeyondProd as well. Cloud-native security steers away from the traditional perimeter-based security model in which all users or services … continue reading

How will augmented reality drive change in cybersecurity?

Augmented reality is a powerful technology with far-reaching implications. That said, there’s one sector in which it hasn’t yet reached its full potential: Cybersecurity.  AR technology could bring about some incredibly positive changes, up to and including solving the talent shortage.  I’d like you to imagine the following scenario.  An automated intrusion detection system flags … continue reading

ITOps news digest: AWS Security Hub and AWS Firewall Manager, TIBCO Cloud Integration on Microsoft Azure, and smart home device connectivity

Amazon has announced its AWS Security Hub will now integrate with AWS Firewall Manager. The security hub provides a comprehensive view of security alerts and compliance status while the firewall manager is a security management system for configuring and managing AWS WAF, AWS Shield Advanced and Amazon VPC Security Group. According to the company, the … continue reading

The Update Framework becomes first security project to graduate CNCF

The Update Framework (TUF) has become the first specification and first security-focused project to graduate the Cloud Native Computing Foundation (CNCF). It was accepted as a CNCF project in 2017 and has become the industry’s “de facto standard” for securing software update systems, according to the foundation. “We designed TUF so that an organization does … continue reading

DMCA.com Protection Status

Get access to this and other exclusive articles for FREE!

There's no charge and it only takes a few seconds.

Sign up now!