Topic: security

Tenable announces new insights into risks across IT/OT environments

Cyber exposure company Tenable has announced a new integrated Cyber Exposure solution, which combines Tenable Industrial Security and Tenable.sc. According to the company, the solution offers a unified view of cyber risk across IT and operational technology (OT) networks. The integration will enable security professionals to measure, manage, and reduce cyber risk from a single … continue reading

NeuVector to offer service mesh protection

Container network security provider NeuVector is giving users a new layer of security for service meshes. The company announced integration for the service meshes Istio and Linkerd, designed to expand security capabilities to production Kubernetes deployments. The new integration was developed in collaboration with IBM Cloud and the Istio open-source development team. According to the … continue reading

premium The top 5 tips to prevent cyberattacks in 2019

Cyberattacks have become an anticipated part of the IT world, regularly striking businesses both large and small. These attacks consistently infiltrate networks and expose an organization’s valuable data, and cause brand embarrassment and irate customers. Yet, the one way cybercriminals are inconsistent is the most damaging; their attack methods evolve each year in new and … continue reading

Red Hat brings workflow enhancements to Ansible Tower

Red Hat today rolled out its Ansible Tower 3.4 with workflow enhancements designed to improve IT operations automation in the areas of infrastructure, cloud, networks and security. With the company’s IT management portfolio — which includes Ansible Tower, Red Hat Satellite (for Linux management) and Red Hat Cloud Forms (for bare metal, virtual machines and … continue reading

HashiCorp Vault reaches 1.0

After years of development, HashiCorp is finally ready to release HashiCorp Vault 1.0 to the public. According to the company, Vault was developed as a tool for managing secrets and protecting sensitive data within an application and/or infrastructure. The 1.0 release includes batch tokens, open-source cloud auto unseal, OpenAPI support, and an updated UI. “Vault … continue reading

Kubernetes suffers from security flaw

Yesterday, a critical security flaw impacting Kubernetes 1.10 and higher was discovered. The flaw, CVE-2018-1002105, was publicly disclosed by the Kubernetes community and reported through the Kubernetes vulnerability reporting process. According to Red Hat, the flaw could allow malicious actors or unapproved users to escalate privileges on Kubernetes installations, including the company’s own container solution … continue reading

Aqua Security 3.5 comes with serverless functions and container encryption protection

Aqua Security has announced version 3.5 of its cloud-native security platform with new risk assessment controls for a range of cloud-native technologies. According to the company, this release addresses the need for runtime visibility and multi-application, multi-team policy management. A key feature of 3.5 is the ability to deploy end-to-end security for containers, serverless containers … continue reading

Cloud security company Threat Stack acquires Bluefyre for its targeted application security

Cloud security and compliance company Threat Stack wants to bolster its cloud capabilities with the acquisition of Bluefyre. According to the company, Bluefyre will help deliver greater visibility into security as well as help developers build secure, cloud-native apps. Bluefyre provides targeted application security for Kubernetes, Mesosphere and OpenShift applications, and according to Threat Stack … continue reading

Google Kubernetes Engine gets enterprise-level security features

Google Cloud has announced new networking features to enhance security and privacy within container infrastructures. The new Google Kubernetes Engine (GKE) features are focused specifically on private clusters, master authorized networks, and shared Virtual Private Cloud (VPC). “These new features enable you to limit access to your Kubernetes clusters from the public internet, confining them … continue reading

premium Is security killing your digital transformation?

Hackers love traditional security. So do your competitors. Want to ruin their day? Forget what you know about how faster development increases risk. If your approach to security is slowing you down, it’s only a question of which you’ll lose faster—your data or your customers. To begin, let’s agree on one fundamental principle: In the … continue reading

Logz.io brings AI to security analytics with the release of its Security Analytics App

More and more, software developers are being handed more responsibilities, the largest of which is security. To help them out, log management company Logz.io has announced its Security Analytics App, providing a unified platform for security and operations that combines analytics with AI to provide better threat detection and remediation. “We believe engineers should have … continue reading

premium Taking a cloud-native approach to security

We all know that infrastructures at most organizations are now oriented around the cloud, and that the cloud has introduced major changes to the way applications are designed, built, deployed and monitored. But what security experts may not realize is how significantly the cloud changes the security game. While you surely recognize that the cloud … continue reading

DMCA.com Protection Status

Get access to this and other exclusive articles for FREE!

There's no charge and it only takes a few seconds.

Sign up now!