Zscaler announced newly advanced AI/ML innovations for better user protection and digital experience monitoring in Zscaler’s Zero Trust Exchange security platform. This comes as organizations are facing a 314% increase in cyberattacks on encrypted internet traffic and an 80% increase in ransomware with nearly a 120% increase in double extortion attacks, the company found in … continue reading
Cloudflare announced several new capabilities for Cloudflare One, its Zero Trust SASE platform, including email security protection, data loss prevention tools, cloud access security broker (CASB), and private network discovery. “When I sit with customers, they share that one of the most daunting aspects of Zero Trust security is simply where to begin. Making matters … continue reading
JFrog today announced Connect, a solution designed to help developers update, manage, monitor, and secure remote Linux and IoT devices at scale that is a fully integrated part of the JFrog Platform. Organizations can fully automate DevSecOps activities across hundreds of thousands of devices using a consistent operational model and intuitive user interface across cloud, … continue reading
Security and compliance company Qualys has announced the launch of Qualys Custom Assessment and Remediation. This solution allows security teams to orchestrate workflows, secure applications, and take action to remediate threats. According to the company, traditionally when threats arise, typical responses include creating new processes and custom scripts that then need to be rolled out … continue reading
The Cloud Security Alliance (CSA) issued best practices for healthcare organizations to mitigate supply chain cyber risks in the Healthcare Supply Chain Cybersecurity Risk Management paper. “The move to the cloud and edge computing has expanded HDOs’ electronic perimeters, not only making it harder for them to secure their infrastructure but also making them more … continue reading
This week’s ITOps Times open-source project of the week is Starbase, a tool that collects assets and relationships from services and systems including cloud infrastructure, SaaS applications, security controls, and more into an intuitive graph view backed by Neo4j. The tool enables users to integrate Neo4j with JupiterOne open-source data ingestion plugins to manage their … continue reading
Given the increase in remote work and shadow IT usage, perhaps it shouldn’t be surprising that the cloud access security broker (CASB) market is exploding. Valued at $8.74 billion in 2020, the CASB market is projected to reach $32.9 billion by 2028—a projected compound annual growth rate of roughly 18% from 2021 to 2028. What … continue reading
IT infrastructure provider Kyndryl announced an expansion of its global alliance with Dell Technologies that focuses on helping customers use data optimization, infrastructure management services, and a cyber resilience solution to protect their critical business assets. Kyndryl provides Cyber Incident Recovery with Dell Technologies to accelerate cyber resilience for customers using Dell’s high-performance storage, servers, … continue reading
The newly released Citrix Secure Private Access is a cloud-delivered, zero-trust network access offering that allows companies to provide employees access to apps and data that they need, from a variety of device types. “The IT pendulum has been swinging toward flexible work models for years, and the pandemic has accelerated the velocity,” said John … continue reading
An average employee of a small business with less than 100 employees will receive 350% more social engineering attacks than an employee of a larger enterprise. The most commonly impersonated brand is Microsoft, used by cybercriminals in 57% of phishing attacks – the most prevalent social engineering attack of 2021. These findings are from the … continue reading
Community Security Analytics (CSA) is a set of open-sourced queries and rules designed by Google for self-service security analytics that are designed to help detect common cloud-based threats. Security Operations teams can use CSA to analyze Google Cloud logs to audit recent behavior and help detect threats to workloads. The queries are mapped to the … continue reading
The new Red Hat OpenShift 4.10 release is based on Kubernetes 1.23 with the CRI-O 1.23 runtime and offers new enhancements and features for both developers and administrators. Among the 45 enhancements are the ability to change static network configurations after cluster deployment with enhanced networking metrics and debuggability. OpenShift also provides a way to … continue reading