Topic: security

Cloud security company Threat Stack acquires Bluefyre for its targeted application security

Cloud security and compliance company Threat Stack wants to bolster its cloud capabilities with the acquisition of Bluefyre. According to the company, Bluefyre will help deliver greater visibility into security as well as help developers build secure, cloud-native apps. Bluefyre provides targeted application security for Kubernetes, Mesosphere and OpenShift applications, and according to Threat Stack … continue reading

Google Kubernetes Engine gets enterprise-level security features

Google Cloud has announced new networking features to enhance security and privacy within container infrastructures. The new Google Kubernetes Engine (GKE) features are focused specifically on private clusters, master authorized networks, and shared Virtual Private Cloud (VPC). “These new features enable you to limit access to your Kubernetes clusters from the public internet, confining them … continue reading

premium Is security killing your digital transformation?

Hackers love traditional security. So do your competitors. Want to ruin their day? Forget what you know about how faster development increases risk. If your approach to security is slowing you down, it’s only a question of which you’ll lose faster—your data or your customers. To begin, let’s agree on one fundamental principle: In the … continue reading

Logz.io brings AI to security analytics with the release of its Security Analytics App

More and more, software developers are being handed more responsibilities, the largest of which is security. To help them out, log management company Logz.io has announced its Security Analytics App, providing a unified platform for security and operations that combines analytics with AI to provide better threat detection and remediation. “We believe engineers should have … continue reading

premium Taking a cloud-native approach to security

We all know that infrastructures at most organizations are now oriented around the cloud, and that the cloud has introduced major changes to the way applications are designed, built, deployed and monitored. But what security experts may not realize is how significantly the cloud changes the security game. While you surely recognize that the cloud … continue reading

PureSec serverless security platform announces free tier, new funding

Serverless security company PureSec announced a successful round of series A funding totalling $7 million led by Square Peg Capital today alongside the release of a free service tier for the company’s serverless security runtime. “We’re on a mission to protect each and every serverless application out there,” Shaked Zin, co-founder and CEO of PureSec, … continue reading

Ansiblefest 2018: Red Hat previews new security automation and launches certification for Ansible plugins

Red Hat previewed new security automation integrations coming to its Ansible Automation platform early next year and launched the Red Hat Ansible Automation Certification Program for thorough vetting of internally and partner-developed modules and plugins for the platform at the Red Hat Ansiblefest 2018 in Austin this week. According to the company, the new security … continue reading

Progeny Systems deploys Xamarin-based mobile device management project on the high seas

Department of Defense contractors live by a different set of rules than the private sector when it comes to developing projects that are charged with the nation’s safety. At this year’s Mobile World Congress Americas, the Department of Homeland Security (DHS) partnered with several contractors who are developing new defense and security solutions built on … continue reading

DHS, United Technologies use machine learning and AI to develop API-based security solutions

Application security threats continue to increase in sophistication and number as the technologies that enable them do. There’s been a 12 percent increase in banking trojans. A 23 percent increase in spyware. A 22 percent increase in botnets and other crypto mining malicious apps. While there are tools and technologies available to developers and IT … continue reading

Microsoft Ignite themes: Security, AI and data, IoT and edge computing

Microsoft kicked off its Ignite conference this morning with a boatload of announcement primarily around three themes: IT security, AI and data, and IoT and edge computing. With cyberattacks continuing to harm organizations around the world, Microsoft announced Secure Score, a report card to assess their current state of security as well as make recommendations … continue reading

Sysdig aims new funding at expansion and leadership

Open-source container security, monitoring and forensics provider Sysdig is dedicating its newly announced $68.5 million of funding to providing improved operations and security technologies for companies running containerized infrastructure and cloud-native apps. Backed, by Insight Venture Partners, the new round of series D funding brings Sysdig’s total funding to $121.5 million. “Enterprises are adopting cloud-native … continue reading

Report: Cryptocurrency mining ramps up even as the value decreases

Even though the value of cryptocurrency has been decreasing, there was a significant increase in cryptocurrency mining in the first half of 2018, according to Trend Micro’s “Unseen Threats, Imminent Losses” report. The amount of cryptocurrency mining activity detected in the first half of 2018 was more than double that of the second half of … continue reading

DMCA.com Protection Status

Get access to this and other exclusive articles for FREE!

There's no charge and it only takes a few seconds.

Sign up now!