Infrastructure automation and delivery provider Puppet is giving IT teams the ability to find, prioritize and remediate mission-critical vulnerabilities with the announcement of Puppet Remediate. The new vulnerability remediation solution aims to reduce the time it takes to detect vulnerabilities, and enable immediate action without agent technology on the vulnerable systems. According to Forrester, 58 … continue reading
Crime no longer is confined to seedy back alleys or only takes place during the dead of night; the internet has become a playground for cybercriminals who don’t have the constraints of time or location. Cybercrime has seen a significant increase in recent years, and along with that has come growing damage recovery costs. The … continue reading
The Industrial Internet Consortium (IIC) is releasing new recommendations and advice for the trustworthiness of the Industrial Internet of Things (IIoT). The organization details the importance of trustworthiness as well as how to measure, analyze and assess it in a new white paper, Managing and Assessing Trustworthiness for IIoT in Practice. RELATED CONTENT: IIC: Collaboration between … continue reading
Google Cloud has announced that it is acquiring Chronicle, a security company also created by Alphabet. Google Cloud believes that this partnership will enable it to provide a comprehensive security portfolio that will benefit its customers. Chronicle offers several solutions that will be beneficial to Google Cloud, such as VirusTotal malware intelligence and Backstory investigation … continue reading
Aqua Security has announced the release of version 4.2 of its platform. This release introduces Vulnerability Shield, which is an automated vulnerability and component analysis tool. Vulnerability Shield can generate policies that will detect and block access to vulnerable components. Aqua 4.2 also includes advanced protection for serverless functions, container image scanning by layer, a … continue reading
Signal Sciences has announced a new integration with Cisco Threat Response in order to better help its customers defend against web app attacks. The integration will give customers instant visibility into their web application attack data, enabling security teams to respond to threats quickly. “In today’s evolving business landscape, we are seeing a dramatic shift … continue reading
Sophisticated cyberattacks are proliferating globally. Today, with the expansion of the Internet of Things (IoT) and device connectivity, cyberattack targets extend beyond defense and IT to critical infrastructure, aerospace, automotive, healthcare, heavy industry, transportation, and communications—virtually any segment in which there is digital information to steal or misuse, or where there is potential for operational … continue reading
The ITOps Times Container Security Buyers Guide features: Moving parts mean more complexity Containing App Vulnerabilities “Doomsday” flaw found in RunC underscores potential for critical container vulnerabilities 9 security best practices for Kubernetes you should be following A guide to container security tools … continue reading
While Docker images may be valuable to application container technology, they come at a security cost. A new report reveals the top 10 most popular Docker images each contain at least 30 vulnerabilities. According to the 2019 State of Open-Source Security report by Snyk, an open-source security platform provider, “Docker images almost always bring known … continue reading
Companies running applications that use untrusted code can experience “container escape,” a vulnerability tracked as CVE-2019-5736, that can hijack the shared host operating system and wreak havoc from there. According to the Information Technology Library, runc used in Docker before 18.09.2 and other products, allows attackers to overwrite the host runc binary within a new … continue reading
Security company Alcide has announced the release of Alcide Advisor, which is designed to scan Kubernetes and Istio for compliance, security, and government risks and vulnerabilities. According to Alcide, the solution empowers engineering teams to identify security risks before they can be introduced to the production environment. Alcide Advisor also scans throughout various stages of … continue reading
Security is near the top of almost every company’s agenda. So much so, that 46 percent of organizations that store customer personally identifiable information (PII) in the cloud are considering moving back to on-premises due to security concerns, according to this year’s Netwrix report on cloud data security. “The report revealed that organizations are misled … continue reading