Fairwinds new SaaS platform is launching a free public beta program. Fairwinds Insight is an open-source project for DevOps teams managing multiple Kubernetes clusters. The project is designed to give teams insight into any potential problems. According to the company, it can reduce the time it takes to research, learn and deploy Kubernetes auditing tools; … continue reading
Sysdig announced version 3.0 of Sysdig Secure, its tool that provides enterprises with threat prevention at runtime using Kubernetes-native pod security policies (PSPs). The new release introduces three new key features: Kubernetes Policy Advisor: which auto-generates PSPs to decrease the time spent configuring security, enabling teams to adjust misconfigurations before shifting to production. Falco … continue reading
Network security company Untangle announced that it is extending the network to the edge with the release of the Untangle SD-WAN Router and new eSeries appliances. The new Untangle SD-WAN Router allows users to to branch office networking to meet the needs of small offices with budget restrictions, the company explained. “Businesses are now commonly … continue reading
Organizations face increasingly sophisticated attacks, whether that’s supply chain attacks, highly targeted campaigns or hands-on keyboard attacks. To address the issue, Microsoft launched Threat Experts within Microsoft Defender Advanced Threat Protection (ATP) to send targeted attack notifications and experts on demand. Defender ATP customers can now directly engage with Microsoft security analysts to understand how … continue reading
Elastic has released a new SIEM and endpoint security solution: Elastic Endpoint Security. The new solution is based on the company’s recent acquisition of Endgame, an endpoint threat prevention, detection and response provider. The solution will feature raw endpoint security data, event data, and alerts, in addition to the Elastic Stack’s existing logging, security, APM … continue reading
VMware has officially acquired Carbon Black for $2.1 billion. The company first announced plans to take on the cloud-native endpoint protection provider at the end of August. “Carbon Black brings us an industry-leading endpoint and workload security platform, with a cloud-native architecture, an AI-powered data lake and a smart, lightweight agent,” said Sanjay Poonen, chief … continue reading
Cloud content management provider Box announced a new partnership to build integration between the “data-to-everything” platform provider Splunk and its security platform Box Shield. Box Shield is Box’s set of content security controls and advanced threat detection capabilities that is generally available this month. The controls are built natively into Box and designed to help … continue reading
Although cloud vendors like Microsoft are generally responsible for protecting their infrastructures against attacks and even offer additional security services (e.g., the Microsoft 365 Security Center) to help customers with data protection, companies need their own controls as well. Why? Many different types of cloud users put corporate data at risk, including IT teams, managers … continue reading
Cybersecurity company Trend Micro is trying to help companies better fight against identity fraud. Today, it released the latest version of its flagship security product, which includes a new AI-powered Fraud Buster feature that protects inboxes from scams and phishing attacks. According to Trend Micro, about 90 percent of the security threats it blocked in … continue reading
Infrastructure automation and delivery provider Puppet is giving IT teams the ability to find, prioritize and remediate mission-critical vulnerabilities with the announcement of Puppet Remediate. The new vulnerability remediation solution aims to reduce the time it takes to detect vulnerabilities, and enable immediate action without agent technology on the vulnerable systems. According to Forrester, 58 … continue reading
Crime no longer is confined to seedy back alleys or only takes place during the dead of night; the internet has become a playground for cybercriminals who don’t have the constraints of time or location. Cybercrime has seen a significant increase in recent years, and along with that has come growing damage recovery costs. The … continue reading
The Industrial Internet Consortium (IIC) is releasing new recommendations and advice for the trustworthiness of the Industrial Internet of Things (IIoT). The organization details the importance of trustworthiness as well as how to measure, analyze and assess it in a new white paper, Managing and Assessing Trustworthiness for IIoT in Practice. RELATED CONTENT: IIC: Collaboration between … continue reading