Topic: security

premium Is security killing your digital transformation?

Hackers love traditional security. So do your competitors. Want to ruin their day? Forget what you know about how faster development increases risk. If your approach to security is slowing you down, it’s only a question of which you’ll lose faster—your data or your customers. To begin, let’s agree on one fundamental principle: In the … continue reading

Logz.io brings AI to security analytics with the release of its Security Analytics App

More and more, software developers are being handed more responsibilities, the largest of which is security. To help them out, log management company Logz.io has announced its Security Analytics App, providing a unified platform for security and operations that combines analytics with AI to provide better threat detection and remediation. “We believe engineers should have … continue reading

premium Taking a cloud-native approach to security

We all know that infrastructures at most organizations are now oriented around the cloud, and that the cloud has introduced major changes to the way applications are designed, built, deployed and monitored. But what security experts may not realize is how significantly the cloud changes the security game. While you surely recognize that the cloud … continue reading

PureSec serverless security platform announces free tier, new funding

Serverless security company PureSec announced a successful round of series A funding totalling $7 million led by Square Peg Capital today alongside the release of a free service tier for the company’s serverless security runtime. “We’re on a mission to protect each and every serverless application out there,” Shaked Zin, co-founder and CEO of PureSec, … continue reading

Ansiblefest 2018: Red Hat previews new security automation and launches certification for Ansible plugins

Red Hat previewed new security automation integrations coming to its Ansible Automation platform early next year and launched the Red Hat Ansible Automation Certification Program for thorough vetting of internally and partner-developed modules and plugins for the platform at the Red Hat Ansiblefest 2018 in Austin this week. According to the company, the new security … continue reading

Progeny Systems deploys Xamarin-based mobile device management project on the high seas

Department of Defense contractors live by a different set of rules than the private sector when it comes to developing projects that are charged with the nation’s safety. At this year’s Mobile World Congress Americas, the Department of Homeland Security (DHS) partnered with several contractors who are developing new defense and security solutions built on … continue reading

DHS, United Technologies use machine learning and AI to develop API-based security solutions

Application security threats continue to increase in sophistication and number as the technologies that enable them do. There’s been a 12 percent increase in banking trojans. A 23 percent increase in spyware. A 22 percent increase in botnets and other crypto mining malicious apps. While there are tools and technologies available to developers and IT … continue reading

Microsoft Ignite themes: Security, AI and data, IoT and edge computing

Microsoft kicked off its Ignite conference this morning with a boatload of announcement primarily around three themes: IT security, AI and data, and IoT and edge computing. With cyberattacks continuing to harm organizations around the world, Microsoft announced Secure Score, a report card to assess their current state of security as well as make recommendations … continue reading

Sysdig aims new funding at expansion and leadership

Open-source container security, monitoring and forensics provider Sysdig is dedicating its newly announced $68.5 million of funding to providing improved operations and security technologies for companies running containerized infrastructure and cloud-native apps. Backed, by Insight Venture Partners, the new round of series D funding brings Sysdig’s total funding to $121.5 million. “Enterprises are adopting cloud-native … continue reading

Report: Cryptocurrency mining ramps up even as the value decreases

Even though the value of cryptocurrency has been decreasing, there was a significant increase in cryptocurrency mining in the first half of 2018, according to Trend Micro’s “Unseen Threats, Imminent Losses” report. The amount of cryptocurrency mining activity detected in the first half of 2018 was more than double that of the second half of … continue reading

NanoVMs: Containers are a fad that is eventually going to run its course

While containers gain in popularity for software deployments, one company is still betting on virtual machines — or more specifically, tiny virtual machines. NanoVMs is a unikernel platform designed to remove the operating system and prevent other programs from running on them — unlike containers that need to be placed on top of generic operating … continue reading

The IT security challenges of distributed architectures

One of the prevailing trends in IT today is distributed architectures. More likely than not, your file systems, virtual server instances, and applications are spread across a variety of host nodes or environments. From a scalability and reliability standpoint, this is a great thing. Distributed architectures help to meet fluctuating demand for services, while also … continue reading

DMCA.com Protection Status

Get access to this and other exclusive articles for FREE!

There's no charge and it only takes a few seconds.

Sign up now!