Shadow IT doesn’t have to be as dark as it sounds

It’s no secret that IT teams are overwhelmed. Sometimes they don’t have the time or resources required to get everything that needs to be done done. And when employees have to wait long periods of time for IT to approve something, sometimes they decide to take IT matters into their own hands.  Shadow IT is … continue reading

ITOps Times Open-Source Project of the Week: Open vSwitch

Open vSwitch is a virtual switch designed to allow for massive network automation. It can support distribution across multiple physical servers.  According to the team, the project can operate as a soft switch that runs within the hypervisor and the control stack for switching silicon.  Currently a Linux Foundation project, Open vSwitch is used in … continue reading

Report: 1 in 7 organizations suffer from lateral phishing attacks

Email phishing is nothing new, but lateral email phishing is continuing to grow and evolve. Lateral phishing occurs when an attacker is able to compromise an internal email address and send phishing attacks. Because it looks like the email is coming from a trusted source, it can be hard for organizations to defend against it.  … continue reading

DNSSEC diagram

ITOps Times news digest: NS1 and Salesforce’s DNSSEC implementation, StackRox Kubernetes Security Platform now on GCP Marketplace, and Ipswitch WhatsUp Gold 2019.1

NS1 and Salesforce have announced that they have collaborated on the first implementation of multi-signer DNSSEC. This enables the cryptographic signing of DNS records across zones with multiple DNS platforms. According to NS1, DNSSEC prevents DNS spoofing and cache-poisoning attacks. They believe that this implementation is well-timed because cybercriminals have been increasingly targeting DNS lately. … continue reading

Nondescript hacker sitting in front of a laptop in a dark room

Protect Against Cyberattacks with a Digital Stoplight

Crime no longer is confined to seedy back alleys or only takes place during the dead of night; the internet has become a playground for cybercriminals who don’t have the constraints of time or location. Cybercrime has seen a significant increase in recent years, and along with that has come growing damage recovery costs. The … continue reading

Cloudflare’s Magic Transit aims to make networks smarter and more secure

Cloudflare has announced a new tool meant to simplify IT operations. Magic Transit is a new networking solution that brings the benefits of Cloudflare’s network to its customers’ on-premise and data center networks.  Specific benefits of Magic Transit include Layer 3 DDos mitigation, improved performance, and lower total cost of ownership.  Deployed in front of … continue reading

Barracuda logo

ITOps Times news digest: Barracuda acquires InfiSecure, Kontena Lens generally available, and ManageEngine adds two-factor authentication for macOS logins

Security company Barracuda has announced its acquisition of InfiSecure. With this acquisition, Barracuda will now be able to expand its bot protection capabilities. Barracuda plans on combining this new technology with data points from its Global Threat Intelligence Infrastructure. Together, the two technologies will be able to identify and block advanced bots, Barracuda explained. “This … continue reading

Hybrid AI in the Future of Work

Due to ongoing improvements in artificial intelligence and machine learning technologies, we are on the cusp of an entirely new era in automation. Not only are software robots adept at performing routine, repetitive tasks on behalf of humans, but they are now capable of carrying out activities that rely on cognitive abilities, such as those … continue reading

The Log Management Buyers Guide

The ITOps Times Log Management Buyers Guide features: Connecting the data dots through log management How does Graylog help companies with log management efforts? Report: SOCs wasting 25% of time chasing false positives Index-free logging is the way forward Log analysis and the challenge of processing Big Data A guide to log management tools … continue reading

ITOps Times Open-Source Project of the Week: Secreter

A new open-source project has been launched to make it easier to encrypt Kubernetes secrets. To enable this the project Secreter consists of two components. The first is a CLI tool that encrypts secrets and stores them outside of the Kubernetes cluster. The second is a Kubernetes operator for both creating and decrypting Kubernetes secrets. … continue reading

clock

Avoiding Downtime in the Hybrid Environment

We all know that downtime caused by IT outages can be costly. As much as $300,000 per hour according to Gartner. But, the additional costs of downtime are not always reported. And they can be nothing short of significant. Take the 2017 British Airways outage as an example. It stranded 75,000 passengers and, as a … continue reading

Cloud IAP dashboard

Google Cloud IAP now enables context-aware access to VMs via SSH and RDP

Google wants to make it easier to gain context-aware access to VMs with a new feature. Earlier this year, the company introduced context-aware access capabilities in Cloud Identity-Aware Proxy (IAP). Cloud IAP is used to provide controls over cloud applications and VMs running on Google Cloud. The new capability allows administrators to gain access to … continue reading

Sysdig Secure 2.4 Image Profiles

ITOps Times news digest: Sysdig Secure 2.4, Red Hat Enterprise Linux 7.7, Tenable’s asset discovery capabilities

Sysdig Secure 2.4 is now available. This new update adds runtime profiling and new interfaces. According to the company, these new features are designed to improve the experience of creating security policies. “Sysdig Secure 2.4 expands on its previous runtime security and vulnerability management capabilities with the addition of runtime profiling and the new policy … continue reading

How Coexistence Offers a New Strategy for Seamless Cloud-to-Cloud Migrations

The advantages of cloud computing have proven themselves in business practices. What organization wouldn’t want to lower capital expenditures and realize greater elasticity to grow its business? The benefits are many and companies have adopted accordingly. The RightScale 2019 State of the Cloud report from Flexera showed 94 percent of respondents rely on the cloud, … continue reading

« Previous PageNext Page »
DMCA.com Protection Status

Get access to this and other exclusive articles for FREE!

There's no charge and it only takes a few seconds.

Sign up now!