Search results for: cloud


3 key elements to protect a Kubernetes cluster

Kubernetes changed how we structure, deploy, and run our applications and became a de-facto standard for running infrastructure at scale. With the rapid adoption of container-based technologies, organizations are increasingly concerned about the security of their Kubernetes clusters. And they should be! While cloud and enterprise distributions provide solid security capabilities, they require tuning according to match organizational security needs. In this article, I’ll go over three fundamental areas you need to consider to protect … More

Security has become more difficult, IT leaders say

Workspot announced a survey report conducted by Dimensional Research, which reveals that in the past year, due to remote work, 83% of IT leaders expanded or accelerated their cloud strategies, while still facing increasing challenges with security (71%), and concerns about employee compliance to new controls (60%). With that in mind, budgets are expected to increase throughout the year to improve remote work technologies. Hybrid work has impacted technology, solutions, and strategies IT leaders relied … More

week in review

Week in review: VMware critical fixes, Bluetooth LE flaw unlocks cars, Kali Linux 2022.2

Here’s an overview of some of last week’s most interesting news, articles and interviews: Kali Linux 2022.2 released: Desktop enhancements, tweaks for the terminal, new tools, and more! Offensive Security has released Kali Linux 2022.2, the latest version of its popular penetration testing and digital forensics platform. VMware issues critical fixes, CISA orders federal agencies to act immediately (CVE-2022-22972) VMware has released patches for a privately reported critical vulnerability (CVE-2022-22972) in VMware’s Workspace ONE Access, … More


Workato expands leadership team with new appointments

Workato announced the appointments of Carle Quinn as Chief People Officer; Kerry Moore as its first Vice President of Talent & Diversity; and Keith Tyndall as Vice President of Corporate and Brand Marketing. Quinn, Moore and Tyndall join Workato during a phase of hyper-growth for the company as the platform continues to experience rapid adoption across key industry verticals, requiring support from a diverse portfolio of talent within leadership. After a year of record momentum, … More

company report

CyberSheath launches partner program to help DIB companies achieve CMMC compliance

Security, compliance, and IT roadblocks slow down federal contractors working to achieve compliance with Cybersecurity Maturity Model Certification (CMMC). The Defense Industrial Base (DIB) includes more than 220,000 companies, many of which have existing vendor relationships across the security, compliance, and IT CMMC requirements, but no single vendor solves every compliance challenge. CyberSheath has launched a partner program designed to empower vendors to expand their core capabilities and achieve CMMC compliance faster. The CyberSheath Partner … More


Amit Serper joins Sternum as Director of Security Research

Sternum welcomes Amit Serper, an international cybersecurity expert, as its new Director of Security Research. As a veteran cybersecurity professional with a record of excellence in the field, Amit bolsters Sternum’s vast research capabilities with his decades of expertise in reverse engineering, vulnerability exploitation, and ethical hacking. The global total of cyberattacks is surging year on year as hackers exploit the ever-growing trend toward digitalization. An uptick in international tensions is further exacerbating the trend … More

New infosec products of the week: May 20, 2022

Here’s a look at the most interesting products from the past week, featuring releases from Deepfence, Kasten by Veeam, Qualys, Skybox Security, and Trusona. Qualys Custom Assessment and Remediation empowers security teams to counter threats like zero-day attacks Qualys Custom Assessment and Remediation opens the Qualys Platform for security architects allowing the creation of custom scripts in popular scripting languages, user-defined controls and automation, all seamlessly integrated within existing programs to quickly assess, respond and … More

smart home

How to ensure that the smart home doesn’t jeopardize data privacy?

The smart home has been much hyped for what feels a very long-time, but I think it is fair to say that the smart home era is now truly upon us. This status has been almost entirely driven by the rise of the smart speaker – the first truly mass-market smart home device. Data from IMARC Group puts the value of the smart speaker market at $5.08bn last year, and it is expected to hit … More


Email is the riskiest channel for data security

A research from Tessian and the Ponemon Institute reveals that nearly 60% of organizations experienced data loss or exfiltration caused by an employee mistake on email in the last 12 months. Email was revealed as the riskiest channel for data loss in organizations, as stated by 65% of IT security practitioners. This was closely followed by cloud file-sharing services (62%) and instant messaging platforms (57%). The research surveyed 614 IT security practitioners across the globe … More

security platform

QuProtect offers protection against current and future quantum computing threats

QuSecure introduced its quantum orchestration platform, QuProtect, an end-to-end PQC software-based solution designed to protect encrypted communications and data with quantum-resilience using quantum secure channels. With QuProtect, for the first time organizations can leverage quantum resilient technology to help prevent today’s cyberattacks, while future-proofing networks and preparing for post-quantum cyberthreats. Leading experts, including Arthur Herman, senior fellow and director of the Quantum Alliance Initiative at The Hudson Institute, believe that a Cryptographically Relevant Quantum Computer … More

security platform

Calix updates its Intelligent Access EDGE platform to secure subscriber-facing network

Calix launched updates to the Intelligent Access EDGE platform that make the entire subscriber-facing network more secure. Broadband service providers (BSPs) must ensure that their networks protect subscribers from current and emerging threats. A secure broadband access network is the cornerstone for enabling value-added security services that protect subscribers and keep their data secure. The advanced routing module (ARm) software in Intelligent Access EDGE now identifies, isolates, and blocks unauthorized traffic across residential gateways so … More


Red Hat boosts performance for cloud-native application development with new portfolio updates

Red Hat unveiled updates across its portfolio of developer tools designed to help organizations build and deliver applications faster and more consistently across Kubernetes-based hybrid and multicloud environments. Industry analyst firm IDC predicts that the percentage of large organizations that deploy code to production daily will increase from 5% in 2021 to 70% in 2025 as a result of widespread implementation of mature DevOps practices. Furthermore, as traditional DevOps automation and processes are disrupted by … More