We all know that infrastructures at most organizations are now oriented around the cloud, and that the cloud has introduced major changes to the way applications are designed, built, deployed and monitored. But what security experts may not realize is how significantly the cloud changes the security game. While you surely recognize that the cloud … continue reading
Serverless security company PureSec announced a successful round of series A funding totalling $7 million led by Square Peg Capital today alongside the release of a free service tier for the company’s serverless security runtime. “We’re on a mission to protect each and every serverless application out there,” Shaked Zin, co-founder and CEO of PureSec, … continue reading
Red Hat previewed new security automation integrations coming to its Ansible Automation platform early next year and launched the Red Hat Ansible Automation Certification Program for thorough vetting of internally and partner-developed modules and plugins for the platform at the Red Hat Ansiblefest 2018 in Austin this week. According to the company, the new security … continue reading
Department of Defense contractors live by a different set of rules than the private sector when it comes to developing projects that are charged with the nation’s safety. At this year’s Mobile World Congress Americas, the Department of Homeland Security (DHS) partnered with several contractors who are developing new defense and security solutions built on … continue reading
Application security threats continue to increase in sophistication and number as the technologies that enable them do. There’s been a 12 percent increase in banking trojans. A 23 percent increase in spyware. A 22 percent increase in botnets and other crypto mining malicious apps. While there are tools and technologies available to developers and IT … continue reading
Microsoft kicked off its Ignite conference this morning with a boatload of announcement primarily around three themes: IT security, AI and data, and IoT and edge computing. With cyberattacks continuing to harm organizations around the world, Microsoft announced Secure Score, a report card to assess their current state of security as well as make recommendations … continue reading
Open-source container security, monitoring and forensics provider Sysdig is dedicating its newly announced $68.5 million of funding to providing improved operations and security technologies for companies running containerized infrastructure and cloud-native apps. Backed, by Insight Venture Partners, the new round of series D funding brings Sysdig’s total funding to $121.5 million. “Enterprises are adopting cloud-native … continue reading
Even though the value of cryptocurrency has been decreasing, there was a significant increase in cryptocurrency mining in the first half of 2018, according to Trend Micro’s “Unseen Threats, Imminent Losses” report. The amount of cryptocurrency mining activity detected in the first half of 2018 was more than double that of the second half of … continue reading
While containers gain in popularity for software deployments, one company is still betting on virtual machines — or more specifically, tiny virtual machines. NanoVMs is a unikernel platform designed to remove the operating system and prevent other programs from running on them — unlike containers that need to be placed on top of generic operating … continue reading
One of the prevailing trends in IT today is distributed architectures. More likely than not, your file systems, virtual server instances, and applications are spread across a variety of host nodes or environments. From a scalability and reliability standpoint, this is a great thing. Distributed architectures help to meet fluctuating demand for services, while also … continue reading
Aqua Security is probing for Kubernetes cluster security issues with the release of kube-hunter. The newly announced solution is an open-source tool designed to increase security awareness and provide visibility into security within Kubernetes environments. According to the company, the solution performs automated penetration testing and is intended to test only your own deployments, not … continue reading