Topic: security

Shadow IT: Cracks in the company armor

If IT were a superhero, shadow IT would be its underestimated nemesis. That’s because today’s shadow IT — accounts that employees create without a business’s authorization or awareness — appears at first glance to be harmless. That makes the havoc it can wreak even more of a threat. In the daily course of their work, … continue reading

ITOps Times Open-Source Project of the Week: Kubei

Portshift has announced the release of Kubei, an open-source Kubernetes runtime vulnerabilities scanner tool.  According to the company, while there are a lot of options already out there, not all scanners are the same and differ by the number of feeds they consume, updates they product and information they provide.  ‘All tools, however, require some … continue reading

Report: Emerging threats are the biggest weakness for enterprise security

Technology advancement is giving organizations and individuals the ability to innovate faster, but it is also enabling hackers to evolve their efforts as well. According to a recent report, 45% of enterprises believe emerging threats are one of the biggest issues when it comes to their security infrastructure, followed by staffing and limited resources. The 6-12 … continue reading

COVID-19: Surviving remote work

For years, the view towards remote work has been shifting, especially in the tech industry where remote work is achievable.  There are a number of concrete benefits to remote work, according to a 2019 survey from OpenVPN, including higher productivity, less time spent on commuting, improved employee retention, fewer overhead costs, and access to a … continue reading

How businesses can adapt to support remote work for COVID-19 and beyond

COVID-19 is not only quickly spreading across the globe, but it is infiltrating businesses, causing them to clear out their buildings and bring workers online. Unfortunately, most of these businesses are not prepared to handle remote work and the risks that come along with it.  While businesses should have disaster recovery and business continuity plans … continue reading

SolarWinds N-central 12.3 now available

SolarWinds N-central 12.3 is now available and it integrates SolarWinds Endpoint Detection and Response capabilities to defend endpoints against nearly every type of attack.  If an attack succeeds and a breach occurs, automated quarantine and rollback help ensure recovery is fast and customer downtime is minimal.  “Security threats multiply and morph daily, and once a … continue reading

ITOps Times news digest: HashiCorp raises $175 million, Axis Security, and Nutanix Objects 2.0

Multi-cloud infrastructure automation software provider HashiCorp announced a $175 million series E round of funding, bringing the company’s valuation to $5.1 billion.  According to the company, the new funding will help it provide multi-cloud infrastructure automation to organizations around the cloud and expand research and development efforts. In addition, it will expand its field, support … continue reading

vSphere 7 brings essential services for the modern hybrid cloud

VMware launched vSphere 7 to provide essential services for the modern hybrid cloud. It is the biggest release of vSphere in over a decade, according to VMware. It delivers the rearchitecting of vSphere with native Kubernetes that the company introduced at VMworld 2019 as Project Pacific. “Using vSphere 7 and VMware Cloud Foundation, you can … continue reading

Report: IT security is becoming too complex to manage

Enterprises are struggling to maintain and manage the security of their hybrid environments. A recent report found that complexity of internal environments is one of the most significant obstacles for organizational IT security.  “When it comes to security complexity, the fact that the attack surface has continued to grow (with cloud, on-prem, and more SaaS … continue reading

ManageEngine releases Access Manager Plus for managing privileged sessions

ManageEngine released a new privileged management solution called Access Manager Plus that provides secure connections to remote systems, monitors privileged sessions, and tightens overall access governance. “Despite being inflexible and presenting huge privacy and security risks, traditional tools like VPNs are still used by most organizations. A solution that streamlines corporate remote access, while also … continue reading

Report: Container and Kubernetes security concerns are inhibiting business innovation

The latest edition of the State of Container and Kubernetes Security Report finds that 44% of respondents have delayed deploying cloud-native applications because of security concerns, delaying the deployment of cloud-native applications into production. StackRox surveyed more than 540 IT professionals for this third version of its industry-first report. Roughly 25 percent of respondents serve … continue reading

Locating the Microsoft Azure Backup Explorer

ITOps Times news digest: Microsoft Azure Backup Explorer, Elastic Stack 7.6, and Tufin SecureCloud

Microsoft has announced Backup Explorer for Azure is now available as a preview. According to the company, Backup Explorer is a built-in Azure Monitor Workbook that enables users to see real-time monitoring metrics across their entire backup estate.  “Up until now, you could use a Recovery Services vault to get a bird’s eye view of … continue reading

Get access to this and other exclusive articles for FREE!

There's no charge and it only takes a few seconds.

Sign up now!