GitGuardian announces new offering to help companies secure their non-human identities

GitGuardian has announced a new security solution that targets Non-Human Identities (NHI), like API keys, credentials, access tokens.  According to GitGuardian, NHIs outnumber human identities 50 to 1, and companies often end up with NHIs scattered across their codebases, CI/CD pipelines, and productivity tools. With GitGuardian NHI Governance, companies gain visibility into where these NHIs … continue reading

DefectDojo Permanently Solves Security Data Ingestion Issues with First-of-its-Kind Universal Parser

DefectDojo, the pioneer in scalable unified vulnerability management and DevSecOps, today announced the launch of its universal parser for security data ingestion on the Dojo Pro platform. With the universal parser, DefectDojo can support all security tools producing JSON or XML data, the two most common data types in ASPM, streamlining data ingestion for more … continue reading

Emotional intelligence in IT management: Impact, challenges, and cultural differences

Emotional intelligence (EI) has become one of the most sought-after soft skills in the IT industry, especially at the management level. The ability to understand and manage emotions — both one’s own and those of others — is critical in many areas of IT, from support services and user experience (UX) to cross-functional leadership and … continue reading

Linkerd 2.17 adds egress traffic visibility, rate limiting, and federated services

The latest version of the open source service mesh Linkerd is now available, with three major features being added to this 2.17 release: egress traffic visibility and control, rate limiting, and federated services.  This release is the first new version of Linkerd since the company changed the release model back in February, stating that stable … continue reading

Tenable announces new Patch Management offering to reduce vulnerability exposures

Tenable has announced the release of a new tool to help companies more quickly close vulnerability exposures.  According to a recent survey from Tenable, only 9% of respondents believe that they are effective at vulnerability remediation, and only 11% believe their process is efficient. The process of identifying, testing, and installing remediation patches is also … continue reading

Organizations are more proactive in addressing IT incidents

The number of respondents reporting they are acting proactively to address IT incidents has increased from 35% in 2020 to 68% this year, according to Atlassian’s recently released 2024 State of Incident Management report. Atlassian defines proactive organizations as those that use monitoring, alerting and communication tools; does formal incident response training; and uses AI … continue reading

New storage offerings announced at AWS re:Invent

At AWS re:Invent, Amazon announced a number of new storage capabilities, such as new Amazon EC2 instances and a new storage class for FSx in OpenZFS file systems.  Amazon EC2 I8g instances are new EC2 instances optimized for storage, powered by 3rd gen AWS Nitro SSDs and AWS Graviton processors. They offer up to 65% … continue reading

NetBox announces products to accelerate network automation and eliminate operational drift

NetBox Labs  has announced the upcoming launch of two new network observability products in the NetBox stack, NetBox Discovery and NetBox Assurance. Both products further deepen the value in the NetBox ecosystem and address critical challenges for network and infrastructure teams operating complex environments. NetBox Discovery enables operators to gather and ingest network and infrastructure information into … continue reading

Building trust in your cyber resilience strategy

Trust seems like a quality that would be inherent in any golden retriever or boy scout, but what about your cyber resilience strategy? When faced with an ever-increasing amount of cyberattacks, do you trust the people, technology and procedures in place?  Resiliency requires planning and constant testing. The notion of trust is becoming increasingly vital … continue reading

Talent in the new normal: How to manage fast-changing tech roles

The post-pandemic “new normal” radically reshaped the workplace with an emphasis on flexibility, hybrid or remote working, and digital rather than face-to-face interactions. Now the dust has settled, 2024 is arguably the first full year we’ll see the impact of this recalibration and the impact AI and automation will have on how we work. But … continue reading

SentinelOne releases new tool to thwart shadow AI, detect AI misconfigurations

The security company SentinelOne has released a new AI security posture management (AI-SPM) tool that provides greater visibility into both the known and unknown uses of AI across an organization. “The power and benefits of generative AI are undeniable. Yet, the very tools and cloud services that simplify and accelerate GenAI adoption are simultaneously opening … continue reading

Lenovo’s ThinkShield Firmware Assurance provides component level visibility to enable zero trust

Lenovo is helping make zero trust a more achievable reality by providing deep visibility and protection beyond the operating system and down to the component level with its new solution, ThinkShield Firmware Assurance. According to Gartner’s predictions, only 10% of large enterprises will have a mature and measurable zero trust program by 2026. Lenovo explained … continue reading

Report: Organizations struggling to deal with increasing network complexity

A majority of organizations are struggling to deal with increasing network complexity as more and more companies have moved to the cloud and now support a remote workforce.  According to a new study from Broadcom titled “Cloud and Internet Usage Generates Network Observability Blind Spots,” 98% of respondents are operating in the cloud, or are … continue reading

What’s new for IT professionals from Microsoft Ignite

Microsoft’s annual development and IT conference, Microsoft Ignite, kicked off this morning, with announcements ranging from the general availability of Microsoft Security Exposure Management to the Windows Resiliency Initiative.  Here is a list of some of the highlights from the event:  Microsoft Security Exposure Management  This new solution — now generally available — provides dynamic … continue reading

« Previous PageNext Page »
DMCA.com Protection Status

Get access to this and other exclusive articles for FREE!

There's no charge and it only takes a few seconds.

Sign up now!