Startup Puts Container Security in a Container
Among the emerging solutions for securing application containers in production is an application layer security tool that is itself a container. Startup NeuVector, which announced early stage venture funding ...Full Article
Node.js Popular With DevOps, But Security Lags
Developers are painfully aware of the risks inherent in deploying applications on the open Internet, but few are using tools designed to secure code and mitigate risks. A survey ...Full Article
ARM Launches IoT Security Framework
ARM is launching a "secure core" approach to bulletproofing the Internet of Things that addresses network security at the microcontroller level. The approach introduced at a company event this ...Full Article
DoD Looks to Break Cloud Security ‘Bottleneck’
The Pentagon is looking for ways to recast is its cloud security guidelines as a way to accelerate the department's slow migration to cloud computing. Meanwhile, key cloud providers ...Full Article
Survey: Equifax Hack Highlights Open Source Insecurity
With open source software accounting for more than half of some products, process gaps are emerging for managing security. Vendors pushing approaches for monitoring software supply chains point to ...Full Article
AWS Cloud Hacked by Bitcoin Miners
Bitcoin mining is among the latest threats to public cloud security as hackers breach enterprise computing resources to hunt for the digital currency. Cloud security vendor RedLock reported earlier ...Full Article
Google Upgrades Cloud Access Controls
Public cloud vendors continue to roll out tweaks and other new features designed to differentiate their services. Among them are tools designed to give enterprise users greater control over ...Full Article
Blockchain Advances With First Real Estate Deal
The blockchain ecosystem continues to evolve as competing industry alliances seek to push the transaction database technology deeper into enterprises, including the first international real estate transaction. Blockchain serves ...Full Article
A Wary Look at AI from an IT Implementation Veteran
If the AI hype cycle were a dial setting on a washing machine, it would now be in the spin cycle phase. It’s intense. The talk and hopes for ...Full Article
Cloud Confusion: Who Handles Data Security?
As enterprise adoption of public cloud services accelerates, confusion persists among cloud providers and customers over responsibility for data and application security. A vendor survey of 300 IT decision ...Full Article