Auth0 announced that it launched its Auth0 Identity Platform on Microsoft Azure to unlock a secure cloud deployment option for organizations seeking strategic fit with their technology stack. Auth0’s identity platform provides organizations with tools to support security, compliance, and data residency that apply to them. Organizations requiring data residency options can take advantage of … continue reading
A majority of organizations understand the importance of modern security in cloud native deployments, but few seem to be following through on that. According to a new survey from the Cloud Native Computing Foundation (CNCF), 85% of respondents consider modern security to be of the utmost importance. However, only 9% of those surveyed had a … continue reading
Dell announced added capabilities to ProSupport Suite for PCs to make IT support easier and more customizable through the use of AI and new endpoint security offerings. The enhancements include greater IT visibility, remote remediation, actionable recommendations, and automated custom update catalog management and deployment capabilities. “If your PCs aren’t productive, your employees aren’t either,” … continue reading
The application traffic intelligence and automation provider NS1 announced DDoS Overage Protection, which prevents unexpected cost increases in the event of usage spikes due to distributed denial-of-service (DDoS) attacks against NS1’s Managed DNS. The number of DDoS attacks has jumped by 200% since last year and attack intensity grew by 300%. “Business resilience is synonymous … continue reading
Commvault announced new ransomware services that help businesses prepare for, protect against, and respond to a growing number of cyber threats. The new Commvault Ransomware Protection and Response Services offering provides the resources and expertise that is needed to protect customers’ Commvault solutions from an attack, review the state of their data protection solution over … continue reading
IBM expanded its zero trust strategy with new Secure Access Service Edge (SASE) services to help modernize network security. SASE is a new architecture model designed to address the requirements of organizations that are digitally transforming, adopting cloud and SaaS applications, and providing services to a hybrid workforce and customer base. The new service leverages … continue reading
DH2i announced the launch of developer editions of its DxEnterprise and DxOdyssey software, which offer free licenses for non-production use and trials. DxEnterprise enables users to manage and ensure high availability (HA) for a variety of workloads such as SQL Server at the instance level and also SQL Server availability groups inside or outside containers. … continue reading
The Cloud Security Alliance (CSA) has released a new Cloud Threat Modeling guide to help provide guidance on threat modeling for cloud applications, their services, and related security decisions. The guide was written by the CSA Top Threats Working Group. The group hopes that the Cloud Threat Modeling guide will provide organizations with an up-to-date … continue reading
Microsoft announced that it acquired the cloud Cloud Infrastructure Entitlement Management (CIEM) provider CloudKnox Security to offer unified privileged access and cloud entitlement management. “The company’s solution helps organizations right-size permissions and consistently enforce least-privilege principles to reduce risk, and it employs continuous analytics to help prevent security breaches and ensure compliance. This strengthens our … continue reading
MicroK8s allows for low-ops, minimal production Kubernetes for devs, cloud, clusters, workstations, edge and IoT. It is a Cloud Native Computing Foundation (CNCF) certified upstream Kubernetes deployment that runs entirely on your workstation or edge device. The project automatically chooses the best nodes for the Kubernetes datastore, and when a cluster database is lost, another … continue reading
IBM announced that it is bringing advanced data protection capabilities to the IBM FlashSystem family of all flash arrays to help companies plan for and recover quickly from ransomware and cyberattacks. IBM Safeguarded Copy, which automatically creates data copies in “immutable snapshots,” will now be integrated into the IBM FlashSystem family. In the event of … continue reading
A lot of focus is made on hardening systems from outside attacks, but threats from within the company shouldn’t be ignored. Results from Egress’ Insider Data Breach Survey 2021 showed that 94% of organizations have fallen victim to insider data breaches in the last year alone. The survey was conducted by Arlington Research on behalf … continue reading