Topic: security

Know your risk: Make smart decisions on application security

Security breaches are constantly in the headlines, and in turn, on your board members’ minds. Cybercriminals are no longer fringe. Instead, they are forming an organized, growing industry. High-profile breaches at big-name and respected institutions and organizations are becoming more and more commonplace. The success of a security organization is not predicated on its actions … continue reading

OneLogin introduces Trusted Experience Platform

OneLogin brings AI to identity and access management

OneLogin has announced its new Trusted Experience Platform, a complete identity and access management (IAM) solution designed to manage digital identities for enterprises. According to the company, it leverages artificial intelligence to provide secure, scalable and smart experiences.  “The OneLogin Trusted Experience Platform provides unparalleled security and reliability to companies so leaders can focus on … continue reading

Cloudflare focuses on making the Internet faster and safer for enterprises

Cloudflare wants to help build a better Internet with the announcement of Cloudflare for Teams. The new solution is a set of services designed to secure enterprises and employees without sacrificing performance. “With the rise of SaaS, cloud, and an increasingly mobile workforce, existing security solutions don’t work for modern-day employees or their employers,” said … continue reading

Stateless: Microservice network functions are the next step for encryption everywhere

Encryption everywhere requires an increase in multi-tenancy and scalability, and according to software defined interconnect provider Stateless, the move forward is to split that complexity into microservices. “One of the main challenges with security is its complexity. The more complex the system, the more it’s prone to security issues, because it’s prone to errors and … continue reading

Google explains cloud-native security model

To address security issues as early in the development and deployment lifecycle as possible, Google implemented a new approach to cloud-native security called BeyondProd. Google released a whitepaper to show how other companies can benefit from BeyondProd as well. Cloud-native security steers away from the traditional perimeter-based security model in which all users or services … continue reading

How will augmented reality drive change in cybersecurity?

Augmented reality is a powerful technology with far-reaching implications. That said, there’s one sector in which it hasn’t yet reached its full potential: Cybersecurity.  AR technology could bring about some incredibly positive changes, up to and including solving the talent shortage.  I’d like you to imagine the following scenario.  An automated intrusion detection system flags … continue reading

ITOps news digest: AWS Security Hub and AWS Firewall Manager, TIBCO Cloud Integration on Microsoft Azure, and smart home device connectivity

Amazon has announced its AWS Security Hub will now integrate with AWS Firewall Manager. The security hub provides a comprehensive view of security alerts and compliance status while the firewall manager is a security management system for configuring and managing AWS WAF, AWS Shield Advanced and Amazon VPC Security Group. According to the company, the … continue reading

The Update Framework becomes first security project to graduate CNCF

The Update Framework (TUF) has become the first specification and first security-focused project to graduate the Cloud Native Computing Foundation (CNCF). It was accepted as a CNCF project in 2017 and has become the industry’s “de facto standard” for securing software update systems, according to the foundation. “We designed TUF so that an organization does … continue reading

ITOps 2020 predictions from around the industry

Tim Armandpour, SVP of engineering at PagerDuty Forget reliability — with the adoption of resilience engineering and the proper use of automation, operators can expect a 20% reduction in unplanned work. Today’s organizations are fixated on the reliability of their technology. But any developer can tell you that the reality is not if it will … continue reading

ITOps Times news digest: Google Cloud and Palo Alto Networks team up, SolarWinds Backup for Office 365, and Intel’s acquisition of Habana Labs

The new partnership will work to help customers stay secure with new offerings and services for cloud computing and cybersecurity. Palo Alto will leverage Google Cloud Platform for its cloud applications and to provide enterprise-scale operations.Solutions the companies plan on working on are a new security framework for multi-cloud environments with Anthos, and new integrations … continue reading

ITOps Times news digest: TeamViewer Patch Management, Certificate of Cloud Auditing Knowledge, and Ampertiy’s Sandboxes for IT

Remote connectivity solution provider TeamViewer is introducing Patch Management to its monitoring and asset management solution. Patch Management is designed to provide vulnerability detection, patch deployment, and TeamViewer integrations. Key features include Windows and third-party application updates, an intuitive interface and automation and custom policies. As part of the monitoring and asset management solution, benefits … continue reading

AWS Identity and Access Management Access Analyzer detects unintended resource access

AWS announced the Identity and Access Management (IAM) Access Analyzer at its AWS re:Invent conference in Las Vegas this week. The new solution is designed to analyze access control policies attached to resources and determines which resources can be accessed publicly or from other accounts.  It continuously monitors all policies for Amazon Simple Storage Service … continue reading

DMCA.com Protection Status

Get access to this and other exclusive articles for FREE!

There's no charge and it only takes a few seconds.

Sign up now!