Topic: security

Zscaler announces new Zero Trust capabilities

Zscaler announced newly advanced AI/ML innovations for better user protection and digital experience monitoring in Zscaler’s Zero Trust Exchange security platform. This comes as organizations are facing a 314% increase in cyberattacks on encrypted internet traffic and an 80% increase in ransomware with nearly a 120% increase in double extortion attacks, the company found in … continue reading

Cloudflare expands zero trust platform

Cloudflare announced several new capabilities for Cloudflare One, its Zero Trust SASE platform, including email security protection, data loss prevention tools, cloud access security broker (CASB), and private network discovery. “When I sit with customers, they share that one of the most daunting aspects of Zero Trust security is simply where to begin. Making matters … continue reading

JFrog announces JFrog Connect for managing IoT devices

JFrog today announced Connect, a solution designed to help developers update, manage, monitor, and secure remote Linux and IoT devices at scale that is a fully integrated part of the JFrog Platform.  Organizations can fully automate DevSecOps activities across hundreds of thousands of devices using a consistent operational model and intuitive user interface across cloud, … continue reading

Qualys launches new solution for remediating threats efficiently

Security and compliance company Qualys has announced the launch of Qualys Custom Assessment and Remediation. This solution allows security teams to orchestrate workflows, secure applications, and take action to remediate threats.  According to the company, traditionally when threats arise, typical responses include creating new processes and custom scripts that then need to be rolled out … continue reading

CSA releases guidelines for reducing security risk in healthcare

The Cloud Security Alliance (CSA) issued best practices for healthcare organizations to mitigate supply chain cyber risks in the Healthcare Supply Chain Cybersecurity Risk Management paper.  “The move to the cloud and edge computing has expanded HDOs’ electronic perimeters, not only making it harder for them to secure their infrastructure but also making them more … continue reading

ITOps Times Open-Source Project of the Week: Starbase

This week’s ITOps Times open-source project of the week is Starbase, a tool that collects assets and relationships from services and systems including cloud infrastructure, SaaS applications, security controls, and more into an intuitive graph view backed by Neo4j. The tool enables users to integrate Neo4j with JupiterOne open-source data ingestion plugins to manage their … continue reading

Casting a light on shadow IT: Using a cloud access security broker

Given the increase in remote work and shadow IT usage, perhaps it shouldn’t be surprising that the cloud access security broker (CASB) market is exploding. Valued at $8.74 billion in 2020, the CASB market is projected to reach $32.9 billion by 2028—a projected compound annual growth rate of roughly 18% from 2021 to 2028. What … continue reading

Kyndryl expands partnership with Dell to address cyber attack threats

IT infrastructure provider Kyndryl announced an expansion of its global alliance with Dell Technologies that focuses on helping customers use data optimization, infrastructure management services, and a cyber resilience solution to protect their critical business assets. Kyndryl provides Cyber Incident Recovery with Dell Technologies to accelerate cyber resilience for customers using Dell’s high-performance storage, servers, … continue reading

Citrix Secure Private Access released to support flexible work models

The newly released Citrix Secure Private Access is a cloud-delivered, zero-trust network access offering that allows companies to provide employees access to apps and data that they need, from a variety of device types.  “The IT pendulum has been swinging toward flexible work models for years, and the pandemic has accelerated the velocity,” said John … continue reading

Report: Small businesses receive 350% more social engineering attacks than enterprises, mostly from Microsoft impersonators

An average employee of a small business with less than 100 employees will receive 350% more social engineering attacks than an employee of a larger enterprise. The most commonly impersonated brand is Microsoft, used by cybercriminals in 57% of phishing attacks – the most prevalent social engineering attack of 2021.  These findings are from the … continue reading

ITOps Times Open-Source Project of the Week: Community Security Analytics

Community Security Analytics (CSA) is a set of open-sourced queries and rules designed by Google for self-service security analytics that are designed to help detect common cloud-based threats.  Security Operations teams can use CSA to analyze Google Cloud logs to audit recent behavior and help detect threats to workloads. The queries are mapped to the … continue reading

Red Hat OpenShift 4.10 released

The new Red Hat OpenShift 4.10 release is based on Kubernetes 1.23 with the CRI-O 1.23 runtime and offers new enhancements and features for both developers and administrators.  Among the 45 enhancements are the ability to change static network configurations after cluster deployment with enhanced networking metrics and debuggability. OpenShift also provides a way to … continue reading

1 2 3 18

Get access to this and other exclusive articles for FREE!

There's no charge and it only takes a few seconds.

Sign up now!