Fugue open sources Regula to evaluate Terraform for security misconfigurations and compliance violations

Fugue has open sourced Regula, a tool that evaluates Terraform infrastructure-as-code for security misconfigurations and compliance violations prior to deployment. Regula rules are written in Rego, the open source policy language employed by the Open Policy Agent project and can be integrated into CI/CD pipelines to prevent cloud infrastructure deployments that may violate security and compliance best practices. “Developers design, build, and modify their own cloud infrastructure environments, and they increasingly own the security and … More

Elastic Cloud on Kubernetes 1.0 is now available

Elastic Cloud on Kubernetes (ECK) is moving out of beta and into general availability. As Elastic announced with the alpha release of ECK back in May 2019, the vision for ECK is to provide an official way to orchestrate Elasticsearch on Kubernetes and provide a SaaS-like experience for Elastic products on Kubernetes. Kubernetes has continued to grow in popularity and has become the standard for orchestrating container workloads, and Elastic has seen a growing number … More

Tripwire introduces new line of hardware appliances and joins ISA Global Security Alliance

Tripwire, a leading global provider of security and compliance solutions for enterprises and industrial organizations, has announced the launch of the Tripwire Industrial Appliance line of hardware for securing industrial environments. In addition, Tripwire has announced that it has joined the ISA Global Cybersecurity Alliance as a founding member. As a Belden company, Tripwire continues to build on the significant growth in industrial cybersecurity achieved over the past year. Expanding industrial cybersecurity capabilities Tripwire’s Industrial … More

SS8 launches new virtualized end-to-end lawful intelligence platform for CSPs

SS8 Networks, the leader in Lawful Intercept and Monitoring Center platforms, is proud to announce the launch of its new virtualized end-to-end lawful intelligence platform to meet the demands of 5G data volumes and complex monitoring needs. SS8’s innovative cloud-based solution is designed to enhance both the speed and the reliability of network mediation capabilities. It has been tested in Law Enforcement Agency (LEA) environments and deployed in 4G/5G and Broadband networks and applications such … More

Osano​ automates data privacy for businesses

Osano​, a company building the first platform for data privacy transparency, has automated the compliance process for the California Consumer Privacy Act (CCPA). A week into activation, the CCPA is already a notoriously contentious and dense set of laws. By automating data privacy for businesses, Osano relieves the cognitive overhead on businesses and sets them up for a productive decade ahead. Activated January 1, 2020, the CCPA enables California residents to demand the sharing or … More

Cygilant updates its SecureVue Cloud Platform, enhancing security monitoring and visibility

Cygilant, leading Cybersecurity Agency and provider of Security-as-a-Service to mid-sized organizations, highlighted recent additions to its SecureVue Cloud Platform. SecureVue Cloud enables clients to quickly gain comprehensive visibility into their cloud-based operations, making it easier to identify potential problems and make needed changes. Most organizations today utilize a combination of traditional IT and cloud-based services. With a majority of data being used and stored outside of the office network perimeter, it has become more important … More

Quanta Storage adopts SecureCircle’s DASB to eliminate insider threats

SecureCircle, the world’s first Data Access Security Broker (DASB), announced an agreement to eliminate insider threats such as accidental sharing and malicious users with Quanta Storage (QSI). QSI, a worldwide leader in OEM and ODM services to the world’s leading consumer electronics brands and based in Taoyuan City, Taiwan, is adopting SecureCircle’s DASB to eliminate insider threats. SecureCircle’s data-centric access control persistently protects customer data without impacting applications, workflow, or end-user experience. “SecureCircle was selected … More

Dynatrace, Google and Microsoft collaborate to help make OpenTelemetry enterprise-grade

Software intelligence company, Dynatrace, announced it is collaborating with Google and Microsoft on the OpenTelemetry project to shape the future of open standards-based observability. To further advance the industry and extend the reach of its Software Intelligence Platform, Dynatrace is contributing transaction tracing knowhow and manpower to the project. OpenTelemetry is focused on providing standardized transaction-level observability through the generation, collection, and description of telemetry data for distributed cloud-native systems. As OpenTelemetry becomes more widely … More

Evertech replaces its IP Address Management platform with FusionLayer Infinity

FusionLayer announced that Evertech has replaced its traditional IP Address Management (IPAM) platform with FusionLayer Infinity, the software-defined IPAM solution designed to simplify network automation for cloud-native service provider platforms utilizing containers. Evertech selected the FusionLayer solution to replace its traditional IPAM platform from FusionLayer it had been running for more than five years. Before finalizing the selection Evertech evaluated alternate solutions. Based on the investigations, the company concluded that FusionLayer Infinity was the only … More

Wind River acquires Star Lab to broaden portfolio with cyber and anti-tamper security software for Linux

Wind River, a leader in delivering software for the intelligent edge, announced its acquisition of Star Lab, a leader in cybersecurity for embedded systems. The acquisition broadens the comprehensive Wind River software portfolio with a system protection and anti-tamper toolset for Linux, a secure open source–based hypervisor, and a secure boot solution. Star Lab is now a wholly owned subsidiary of Wind River. Terms of the acquisition were not disclosed. Historically, embedded devices have functioned … More

AttackIQ promotes Stacey Meyer to vice president of federal operations

AttackIQ, the leading independent vendor of breach and attack simulation solutions, announced the promotion of Stacey Meyer to vice president of federal operations. “Stacey has proven to be an invaluable member of the AttackIQ team,” said Carl Wright, chief commercial officer of AttackIQ. “She has established herself as a highly effective, results-driven leader, making her the perfect executive to spearhead AttackIQ’s federal development and strategy efforts. We believe her expertise will be an incredible asset … More

James W. Sample joins Xcel Energy as vice president, Chief Security Officer

Xcel Energy announced that James W. Sample will join the company as Vice President, Chief Security Officer. Sample will lead the company’s security risk management program, overseeing all aspects of security including cybersecurity, physical security and the safety of personnel. He will also serve as the North American Electric Reliability Corporation’s (NERC) senior manager for Critical Infrastructure Protection. “Jamey brings a wealth of experience and expertise to Xcel Energy’s security operations,” said Brett Carter, Executive … More