Topic: security

COVID-19: Surviving remote work

For years, the view towards remote work has been shifting, especially in the tech industry where remote work is achievable.  There are a number of concrete benefits to remote work, according to a 2019 survey from OpenVPN, including higher productivity, less time spent on commuting, improved employee retention, fewer overhead costs, and access to a … continue reading

How businesses can adapt to support remote work for COVID-19 and beyond

COVID-19 is not only quickly spreading across the globe, but it is infiltrating businesses, causing them to clear out their buildings and bring workers online. Unfortunately, most of these businesses are not prepared to handle remote work and the risks that come along with it.  While businesses should have disaster recovery and business continuity plans … continue reading

SolarWinds N-central 12.3 now available

SolarWinds N-central 12.3 is now available and it integrates SolarWinds Endpoint Detection and Response capabilities to defend endpoints against nearly every type of attack.  If an attack succeeds and a breach occurs, automated quarantine and rollback help ensure recovery is fast and customer downtime is minimal.  “Security threats multiply and morph daily, and once a … continue reading

ITOps Times news digest: HashiCorp raises $175 million, Axis Security, and Nutanix Objects 2.0

Multi-cloud infrastructure automation software provider HashiCorp announced a $175 million series E round of funding, bringing the company’s valuation to $5.1 billion.  According to the company, the new funding will help it provide multi-cloud infrastructure automation to organizations around the cloud and expand research and development efforts. In addition, it will expand its field, support … continue reading

vSphere 7 brings essential services for the modern hybrid cloud

VMware launched vSphere 7 to provide essential services for the modern hybrid cloud. It is the biggest release of vSphere in over a decade, according to VMware. It delivers the rearchitecting of vSphere with native Kubernetes that the company introduced at VMworld 2019 as Project Pacific. “Using vSphere 7 and VMware Cloud Foundation, you can … continue reading

Report: IT security is becoming too complex to manage

Enterprises are struggling to maintain and manage the security of their hybrid environments. A recent report found that complexity of internal environments is one of the most significant obstacles for organizational IT security.  “When it comes to security complexity, the fact that the attack surface has continued to grow (with cloud, on-prem, and more SaaS … continue reading

ManageEngine releases Access Manager Plus for managing privileged sessions

ManageEngine released a new privileged management solution called Access Manager Plus that provides secure connections to remote systems, monitors privileged sessions, and tightens overall access governance. “Despite being inflexible and presenting huge privacy and security risks, traditional tools like VPNs are still used by most organizations. A solution that streamlines corporate remote access, while also … continue reading

Report: Container and Kubernetes security concerns are inhibiting business innovation

The latest edition of the State of Container and Kubernetes Security Report finds that 44% of respondents have delayed deploying cloud-native applications because of security concerns, delaying the deployment of cloud-native applications into production. StackRox surveyed more than 540 IT professionals for this third version of its industry-first report. Roughly 25 percent of respondents serve … continue reading

Locating the Microsoft Azure Backup Explorer

ITOps Times news digest: Microsoft Azure Backup Explorer, Elastic Stack 7.6, and Tufin SecureCloud

Microsoft has announced Backup Explorer for Azure is now available as a preview. According to the company, Backup Explorer is a built-in Azure Monitor Workbook that enables users to see real-time monitoring metrics across their entire backup estate.  “Up until now, you could use a Recovery Services vault to get a bird’s eye view of … continue reading

Why enterprises are running to the edge

The popularity of edge computing has greatly increased as more industries are adopting IoT devices and are increasing their demand for low-latency processing and real-time, automated decision-making solutions. Both the evolution of technologies surrounding edge computing, such as 5G, and the industry demand for its benefits, such as speed and low latency, have created a … continue reading

ITOps Times news digest: HPE acquires Scytale, Sectigo Certificate Manager adds Microsoft Azure Key Vault integration, and InfluxDB Cloud on Google Cloud

HPE is adding a new company to its portfolio in order to tackle cloud-native security and zero trust networking. Scytale is a service identity management company for the cloud native enterprise. According to HPE, the Scytale team is made up of season engineers with AWS, Duo Security, Google, Okta, PagerDuty and Splunk backgrounds. HPE hopes … continue reading

Know your risk: Make smart decisions on application security

Security breaches are constantly in the headlines, and in turn, on your board members’ minds. Cybercriminals are no longer fringe. Instead, they are forming an organized, growing industry. High-profile breaches at big-name and respected institutions and organizations are becoming more and more commonplace. The success of a security organization is not predicated on its actions … continue reading

DMCA.com Protection Status

Get access to this and other exclusive articles for FREE!

There's no charge and it only takes a few seconds.

Sign up now!