Cyber exposure company Tenable has announced a new integrated Cyber Exposure solution, which combines Tenable Industrial Security and Tenable.sc. According to the company, the solution offers a unified view of cyber risk across IT and operational technology (OT) networks. The integration will enable security professionals to measure, manage, and reduce cyber risk from a single … continue reading
Container network security provider NeuVector is giving users a new layer of security for service meshes. The company announced integration for the service meshes Istio and Linkerd, designed to expand security capabilities to production Kubernetes deployments. The new integration was developed in collaboration with IBM Cloud and the Istio open-source development team. According to the … continue reading
Cyberattacks have become an anticipated part of the IT world, regularly striking businesses both large and small. These attacks consistently infiltrate networks and expose an organization’s valuable data, and cause brand embarrassment and irate customers. Yet, the one way cybercriminals are inconsistent is the most damaging; their attack methods evolve each year in new and … continue reading
Red Hat today rolled out its Ansible Tower 3.4 with workflow enhancements designed to improve IT operations automation in the areas of infrastructure, cloud, networks and security. With the company’s IT management portfolio — which includes Ansible Tower, Red Hat Satellite (for Linux management) and Red Hat Cloud Forms (for bare metal, virtual machines and … continue reading
After years of development, HashiCorp is finally ready to release HashiCorp Vault 1.0 to the public. According to the company, Vault was developed as a tool for managing secrets and protecting sensitive data within an application and/or infrastructure. The 1.0 release includes batch tokens, open-source cloud auto unseal, OpenAPI support, and an updated UI. “Vault … continue reading
Yesterday, a critical security flaw impacting Kubernetes 1.10 and higher was discovered. The flaw, CVE-2018-1002105, was publicly disclosed by the Kubernetes community and reported through the Kubernetes vulnerability reporting process. According to Red Hat, the flaw could allow malicious actors or unapproved users to escalate privileges on Kubernetes installations, including the company’s own container solution … continue reading
Aqua Security has announced version 3.5 of its cloud-native security platform with new risk assessment controls for a range of cloud-native technologies. According to the company, this release addresses the need for runtime visibility and multi-application, multi-team policy management. A key feature of 3.5 is the ability to deploy end-to-end security for containers, serverless containers … continue reading
Cloud security and compliance company Threat Stack wants to bolster its cloud capabilities with the acquisition of Bluefyre. According to the company, Bluefyre will help deliver greater visibility into security as well as help developers build secure, cloud-native apps. Bluefyre provides targeted application security for Kubernetes, Mesosphere and OpenShift applications, and according to Threat Stack … continue reading
Google Cloud has announced new networking features to enhance security and privacy within container infrastructures. The new Google Kubernetes Engine (GKE) features are focused specifically on private clusters, master authorized networks, and shared Virtual Private Cloud (VPC). “These new features enable you to limit access to your Kubernetes clusters from the public internet, confining them … continue reading
Hackers love traditional security. So do your competitors. Want to ruin their day? Forget what you know about how faster development increases risk. If your approach to security is slowing you down, it’s only a question of which you’ll lose faster—your data or your customers. To begin, let’s agree on one fundamental principle: In the … continue reading
More and more, software developers are being handed more responsibilities, the largest of which is security. To help them out, log management company Logz.io has announced its Security Analytics App, providing a unified platform for security and operations that combines analytics with AI to provide better threat detection and remediation. “We believe engineers should have … continue reading
We all know that infrastructures at most organizations are now oriented around the cloud, and that the cloud has introduced major changes to the way applications are designed, built, deployed and monitored. But what security experts may not realize is how significantly the cloud changes the security game. While you surely recognize that the cloud … continue reading