ITOps Times Open-Source Project of the Week: Open vSwitch

Open vSwitch is a virtual switch designed to allow for massive network automation. It can support distribution across multiple physical servers.  According to the team, the project can operate as a soft switch that runs within the hypervisor and the control stack for switching silicon.  Currently a Linux Foundation project, Open vSwitch is used in …

Report: 1 in 7 organizations suffer from lateral phishing attacks

Email phishing is nothing new, but lateral email phishing is continuing to grow and evolve. Lateral phishing occurs when an attacker is able to compromise an internal email address and send phishing attacks. Because it looks like the email is coming from a trusted source, it can be hard for organizations to defend against it.  …

DNSSEC diagram

ITOps Times news digest: NS1 and Salesforce’s DNSSEC implementation, StackRox Kubernetes Security Platform now on GCP Marketplace, and Ipswitch WhatsUp Gold 2019.1

NS1 and Salesforce have announced that they have collaborated on the first implementation of multi-signer DNSSEC. This enables the cryptographic signing of DNS records across zones with multiple DNS platforms. According to NS1, DNSSEC prevents DNS spoofing and cache-poisoning attacks. They believe that this implementation is well-timed because cybercriminals have been increasingly targeting DNS lately. …

Nondescript hacker sitting in front of a laptop in a dark room

Protect Against Cyberattacks with a Digital Stoplight

Crime no longer is confined to seedy back alleys or only takes place during the dead of night; the internet has become a playground for cybercriminals who don’t have the constraints of time or location. Cybercrime has seen a significant increase in recent years, and along with that has come growing damage recovery costs. The …

Latest News

Cloudflare’s Magic Transit aims to make networks smarter and more secure

Cloudflare has announced a new tool meant to simplify IT operations. Magic Transit is a new networking solution that brings the benefits of Cloudflare’s network to its customers’ on-premise and data center networks.  Specific benefits of Magic Transit include Layer 3 DDos mitigation, improved performance, and lower total cost of ownership.  Deployed in front of …

ITOps Times news digest: Barracuda acquires InfiSecure, Kontena Lens generally available, and ManageEngine adds two-factor authentication for macOS logins

Security company Barracuda has announced its acquisition of InfiSecure. With this acquisition, Barracuda will now be able to expand its bot protection capabilities. Barracuda plans on combining this new technology with data points from its Global Threat Intelligence Infrastructure. Together, the two technologies will be able to identify and block advanced bots, Barracuda explained. “This …

Hybrid AI in the Future of Work

Due to ongoing improvements in artificial intelligence and machine learning technologies, we are on the cusp of an entirely new era in automation. Not only are software robots adept at performing routine, repetitive tasks on behalf of humans, but they are now capable of carrying out activities that rely on cognitive abilities, such as those …

ITOps Times Open-Source Project of the Week: Secreter

A new open-source project has been launched to make it easier to encrypt Kubernetes secrets. To enable this the project Secreter consists of two components. The first is a CLI tool that encrypts secrets and stores them outside of the Kubernetes cluster. The second is a Kubernetes operator for both creating and decrypting Kubernetes secrets. …

Avoiding Downtime in the Hybrid Environment

We all know that downtime caused by IT outages can be costly. As much as $300,000 per hour according to Gartner. But, the additional costs of downtime are not always reported. And they can be nothing short of significant. Take the 2017 British Airways outage as an example. It stranded 75,000 passengers and, as a …

Google Cloud IAP now enables context-aware access to VMs via SSH and RDP

Google wants to make it easier to gain context-aware access to VMs with a new feature. Earlier this year, the company introduced context-aware access capabilities in Cloud Identity-Aware Proxy (IAP). Cloud IAP is used to provide controls over cloud applications and VMs running on Google Cloud. The new capability allows administrators to gain access to …

ITOps Times news digest: Sysdig Secure 2.4, Red Hat Enterprise Linux 7.7, Tenable’s asset discovery capabilities

Sysdig Secure 2.4 is now available. This new update adds runtime profiling and new interfaces. According to the company, these new features are designed to improve the experience of creating security policies. “Sysdig Secure 2.4 expands on its previous runtime security and vulnerability management capabilities with the addition of runtime profiling and the new policy …

How Coexistence Offers a New Strategy for Seamless Cloud-to-Cloud Migrations

The advantages of cloud computing have proven themselves in business practices. What organization wouldn’t want to lower capital expenditures and realize greater elasticity to grow its business? The benefits are many and companies have adopted accordingly. The RightScale 2019 State of the Cloud report from Flexera showed 94 percent of respondents rely on the cloud, …

ITOps Times news digest: Cloud Security Scanner in GKE and Compute Engine, ManageEngine’s Log360 update, and ITSM Academy’s new course

Google has announced the general availability of its Cloud Security Scanner in GKE and Compute Engine. The new service will provide insights into app vulnerabilities and allow organizations to take action before those vulnerabilities can be exploited. Potential use cases include notifying organizations of common external vulnerabilities in their application, alerting them of accessible GIT …

Planning is half the battle when preparing for anticipated traffic spikes

It’s not always possible to predict massive traffic spikes, but some organizations are fortunate enough to have some idea of when their traffic will be increased. Those that do have that foresight can take steps to ensure that when the time comes, they are ready. For example, ahead of the 2018 midterm elections, the New …

Learning Center

  • White Papers

    Pay the price to mitigate ransomware attacks

    Ransomware attacks against organizations are on the rise, and one study puts the cost of downtime at $8 billion! But your applications and data don’t have to be held hostage. When an attack is discovered, the goal is to minimize further infection and restore to a safe state as quickly as possible (low RTO). Read this …

  • Webinars

    Breakthroughs and Best Practices in Disaster Recovery

    Wednesday, August 21,2019 at 1:00 pm E.T. Disaster Recovery (DR) has never been more important. Natural disasters such as hurricanes, wildfires, and floods are on the rise. According to the U.S. National Oceanic and Atmospheric Administration the total cost of last year’s natural disasters was approximately $91 billion. FEMA has stated, “the need for forward-leaning …

  • White Papers

    Monitoring your network with time-series data

    Today’s applications are architectured to work on hybrid, componentized, containerized, distributed, mobile/sensor environments, and so do the networks that sustain all these applications together. Complexity, traffic volume, intolerance to performance degradation and inefficiency will only increase, demanding real-time and holistic monitoring. …

  • White Papers

    Container Security: More moving parts mean more complexity

    Securing containerized applications is quite a bit more challenging than securing traditional monolithic applications. The use of open-source components in code, the microservices within containers, and the containers themselves, all need to be secure to ensure vulnerabilities do not make their way into the deployed application. This guide to container security looks at the issue …

  • White Papers

    Application Performance Management: A Guide for Buyers

    Changes in software architecture and transition to the cloud have forced the way organizations monitor their applications to change as well. Because of increased complexity of applications — code written in-house, couple with services brought in via APIs, scaling in the cloud, much more data being processed — APM has become more important than ever. …

ITOps Times Newswire

Get access to this and other exclusive articles for FREE!

There's no charge and it only takes a few seconds.

Sign up now!