Kyndryl has announced a new collaboration with AWS to provide its customers better insights into threats in their AWS environments. Kyndryl Threat Insights Managed Service provides a central repository for security data from AWS using Amazon Security Lake. By being able to access security data from a single view, companies will be able to uncover … continue reading
Infrastructure automation provider Puppet by Perforce has added new security, compliance, and continuous integration/continuous delivery (CI/CD) capabilities to its platform offering. Infrastructure resilience, improved agility and aligning with business goals are the critical focus for infrastructure and operations (I&O) leaders. According to a recent Gartner I&O Leaders Survey, the most important services I&O leaders need … continue reading
In the past year, the number of specialized attacks, which target specific applications through means such as making malicious changes to the code, has sharply risen. According to Digital.ai’s 2024 Application Security Threat Report, the likelihood of an iOS app having maliciously modified code grew from 6% to 20% in the last year. Similarly, for … continue reading
Cybersecurity company Trend Micro this week released updates to its Trend Vision One solution designed to meet the mass adoption of new AI tools by managing the risks associated with that adoption and securing how organizations use AI. In the company announcement, co-founder and CEO Eva Chen said, “Great advancements in technology always come with … continue reading
The security learning company Secure Code Warrior is making it easier for organizations to assess the security posture of their development teams with the SCW Trust Score. The score utilizes 20 million data points from over 250,000 developers to provide a benchmark that teams can compare themselves to. Scores are given on a scale of … continue reading
Copa, short for Copacetic, is an open-source project for vulnerability management. It can automatically apply the necessary patches to a container image based on the results of vulnerability scans. This allows containers to be patched quickly without waiting on a full rebuild upstream, so that they can be redeployed as fast as possible. The maintainers … continue reading
The security company Lacework has announced the addition of new capabilities to its platform to help IT and security teams more easily secure their cloud environments. The first new addition is Lacework Explorer, which is designed to provide better visibility into potential threats. It provides a visualization of the relationships between cloud resources, which helps … continue reading
Cloudflare has announced two new security solutions designed to help protect against AI-based threats: Defensive AI, a personalized approach to securing organizations against risks caused by AI, and Firewall for AI, which scans LLM prompts for language commonly used in attacks. Defensive AI provides tailored mitigations that enable the protection of critical applications and entire … continue reading
The Cloud Native Computing Foundation (CNCF) announced the graduation of Falco. Falco is a cloud-native security tool for Linux systems and has become a commonly used engine for detecting threats within Kubernetes environments. This milestone marks a significant achievement for Falco, emphasizing its importance and effectiveness in cloud-native security, according to the CNCF. “Real time … continue reading
ManageEngine introduced a dual-layered threat detection system in its security information and event management (SIEM) solution, Log360. This feature, part of Log360’s threat detection, investigation, and response (TDIR) component called Vigil IQ, aims to enhance the accuracy and precision of threat detection for security operations center (SOC) teams. The move is in response to challenges … continue reading
The endpoint management solution provider Recast Software has announced the release of its latest software update, version 5.4. This new version, which is now available for download, marks a significant expansion of Recast Software’s third-party patching catalog. The solution now has over 2,000 applications, which provides businesses a comprehensive approach to application management and vulnerability … continue reading
A surge in cyber threats has led to a heightened interest in cybersecurity insurance. Nearly half of the organizations surveyed in a recent study conducted by Recast Software and the Ponemon Institute have noticed a significant improvement in their cybersecurity posture after purchasing insurance. However, 48% have switched insurance providers due to various reasons, including … continue reading