The new reality of remote working is driving businesses to re-examine their network security posture. Let’s face it: these networks were originally architected to support a dramatically different work environment. IT now must secure the network by bringing into the fold a myriad of remote, mobile and digital workspace devices, some of which were previously … continue reading
Cohesity is on a mission to simplify data management with the announcement of its new SaaS offerings. The general availability of Cohesity DataProtect and SiteContinuity as a service tackles backup and disaster recovery by making sure on-premises and cloud-based data is safe and secure. According to a recent survey from the company, 94% of respondents … continue reading
With hybrid clouds now often the starting point for organizations in their cloud journey, management, access control, data use, and service contracts become more difficult with multi-cloud convergence, according to the Cloud Security Alliance in a whitepaper. “Although the hybrid cloud environment seamlessly integrates private and public cloud, bringing onboard new IT capabilities to the … continue reading
SPIFFE stands for the Secure Production Identity Framework For Everyone. The project aims to define a framework and standards for identifying and securing communications between app services. According to its GitHub page, SPIFFE includes SPIFFE IDs implemented as Uniform Resource Identifiers. This defines how services services identify themselves to one another SPIFFE Verifiable Identity Document … continue reading
Security continues to be a concern for container strategies. A recent report by the container security company StackRox found that 44% of respondents delayed rolling out applications into production because of security concerns and that security incidents among respondents remain high at 90%. “Rolling out an application that hasn’t passed a security assessment puts the business … continue reading
In an effort to help secure cloud computing environments, the Cloud Security Alliance (CSA) has released the Top Threats to Cloud Computing: Egregious 11 Deep Dive report. The report takes a deep look at the challenges of cloud computing as well as looks into nine recent cybersecurity attacks and breaches. “These anecdotes will let cybersecurity … continue reading
FireMon’s new agile network security policy management platform offers security capabilities to enable cloud and digital transformation initiatives. “Our customers have told us that traditional approaches to managing network security policy are too cumbersome for their dynamic cloud and hybrid environments,” said Satin H. Mirchandani, the president and CEO of FireMon. “Our agile approach to … continue reading
SentinelOne has released a new automated application control engine that is designed to secure cloud and containerized workloads without human intervention. The automated engine eliminates the need to manually maintain allow-lists, which preserves cloud and container workload’s immutable states while also defending against malware, cryptojacking, and zero-day threats. “It is critical to defend cloud and … continue reading
Oracle has announced its VMware solution is now available. The Oracle Cloud VMware solution is a cloud-native VMware-based environment that enables users to move VMware workloads to Oracle Cloud Infrastructure. “Building new digital services. Scaling business-critical apps. Enabling a remote workforce. Applications sit at the core of addressing these challenges, and hybrid cloud opens the … continue reading
Endpoint management and security provider Tanium and Google Cloud are expanding their partnership to support distributed business operations. According to the companies, as more employees transition to remote work and organizations become more distributed, IT and security teams are having to defend against an increasing number of cyberattacks while maintaining availability and security. “According to … continue reading
The company is extending its observability solution to the Amazon Elastic Container Service compute engine. The new capabilities will enable users to monitor AWS Fargate aspects such as processes, network activity, and running code. “Our ‘Leveraging DevSecOps to Secure Cloud-native Applications’ report shows the top container security challenge is aligning the architectural implementation of a … continue reading
Updating systems on a regular basis is one of the best lines of defense against cyberattacks, but many companies are still struggling to effectively do patch management. According to a study conducted by ServiceNow and the Ponemon Institute, of the nearly half of respondents who had a data breach in the past two years, 60% … continue reading