Topic: security

Kubernetes suffers from security flaw

Yesterday, a critical security flaw impacting Kubernetes 1.10 and higher was discovered. The flaw, CVE-2018-1002105, was publicly disclosed by the Kubernetes community and reported through the Kubernetes vulnerability reporting process. According to Red Hat, the flaw could allow malicious actors or unapproved users to escalate privileges on Kubernetes installations, including the company’s own container solution … continue reading

Aqua Security 3.5 comes with serverless functions and container encryption protection

Aqua Security has announced version 3.5 of its cloud-native security platform with new risk assessment controls for a range of cloud-native technologies. According to the company, this release addresses the need for runtime visibility and multi-application, multi-team policy management. A key feature of 3.5 is the ability to deploy end-to-end security for containers, serverless containers … continue reading

Cloud security company Threat Stack acquires Bluefyre for its targeted application security

Cloud security and compliance company Threat Stack wants to bolster its cloud capabilities with the acquisition of Bluefyre. According to the company, Bluefyre will help deliver greater visibility into security as well as help developers build secure, cloud-native apps. Bluefyre provides targeted application security for Kubernetes, Mesosphere and OpenShift applications, and according to Threat Stack … continue reading

Google Kubernetes Engine gets enterprise-level security features

Google Cloud has announced new networking features to enhance security and privacy within container infrastructures. The new Google Kubernetes Engine (GKE) features are focused specifically on private clusters, master authorized networks, and shared Virtual Private Cloud (VPC). “These new features enable you to limit access to your Kubernetes clusters from the public internet, confining them … continue reading

premium Is security killing your digital transformation?

Hackers love traditional security. So do your competitors. Want to ruin their day? Forget what you know about how faster development increases risk. If your approach to security is slowing you down, it’s only a question of which you’ll lose faster—your data or your customers. To begin, let’s agree on one fundamental principle: In the … continue reading

Logz.io brings AI to security analytics with the release of its Security Analytics App

More and more, software developers are being handed more responsibilities, the largest of which is security. To help them out, log management company Logz.io has announced its Security Analytics App, providing a unified platform for security and operations that combines analytics with AI to provide better threat detection and remediation. “We believe engineers should have … continue reading

premium Taking a cloud-native approach to security

We all know that infrastructures at most organizations are now oriented around the cloud, and that the cloud has introduced major changes to the way applications are designed, built, deployed and monitored. But what security experts may not realize is how significantly the cloud changes the security game. While you surely recognize that the cloud … continue reading

PureSec serverless security platform announces free tier, new funding

Serverless security company PureSec announced a successful round of series A funding totalling $7 million led by Square Peg Capital today alongside the release of a free service tier for the company’s serverless security runtime. “We’re on a mission to protect each and every serverless application out there,” Shaked Zin, co-founder and CEO of PureSec, … continue reading

Ansiblefest 2018: Red Hat previews new security automation and launches certification for Ansible plugins

Red Hat previewed new security automation integrations coming to its Ansible Automation platform early next year and launched the Red Hat Ansible Automation Certification Program for thorough vetting of internally and partner-developed modules and plugins for the platform at the Red Hat Ansiblefest 2018 in Austin this week. According to the company, the new security … continue reading

Progeny Systems deploys Xamarin-based mobile device management project on the high seas

Department of Defense contractors live by a different set of rules than the private sector when it comes to developing projects that are charged with the nation’s safety. At this year’s Mobile World Congress Americas, the Department of Homeland Security (DHS) partnered with several contractors who are developing new defense and security solutions built on … continue reading

DHS, United Technologies use machine learning and AI to develop API-based security solutions

Application security threats continue to increase in sophistication and number as the technologies that enable them do. There’s been a 12 percent increase in banking trojans. A 23 percent increase in spyware. A 22 percent increase in botnets and other crypto mining malicious apps. While there are tools and technologies available to developers and IT … continue reading

Microsoft Ignite themes: Security, AI and data, IoT and edge computing

Microsoft kicked off its Ignite conference this morning with a boatload of announcement primarily around three themes: IT security, AI and data, and IoT and edge computing. With cyberattacks continuing to harm organizations around the world, Microsoft announced Secure Score, a report card to assess their current state of security as well as make recommendations … continue reading

DMCA.com Protection Status

Get access to this and other exclusive articles for FREE!

There's no charge and it only takes a few seconds.

Sign up now!