A vendor survey of early Kubernetes adopters embracing cloud-native applications finds that high-maintenance microservices and API sprawl have created a new set of security and networking issues for some ...Full Article
The faster Kubernetes deployments are scaled, the bigger a target they become for hackers probing for security vulnerabilities. With security incidents rising sharply, Kubernetes-native container security platform vendor StackRox ...Full Article
The shift toward front-end application security continues to gain momentum with DevSecOps vendors attracting investors as new security tools are integrated with enterprise application development workflows. The latest illustration ...Full Article
AMD and Google Cloud are collaborating on a “confidential VM” security effort that uses encrypted virtualization to secure data “in use”. The confidential cloud computing effort is based on ...Full Article
According to Microsoft, one particular type of project accounts for close to one quarter of all global IoT initiatives: smart-city projects. In a 451 Research report from February 2020, ...Full Article
The U.S. military is ramping up efforts to secure semiconductors and its electronics supply chain by embedding defenses during the chip design phase. The automation effort also addresses the ...Full Article
Zscaler Inc., the cloud security specialist, has expanded its capabilities to fix infrastructure and other platform misconfigurations via its acquisition of Cloudneeti, a move that allows the buyer to ...Full Article
As enterprise adoption of open source software soars, so too do the number of vulnerabilities inevitably exposed as deployments scale and security awareness grows in response to high-profile data ...Full Article
London – February 26, 2020 – SoftIron Ltd., maker of purpose-built and performance-optimized data center appliances, announces the appointment of Mark Chen to the role of Chief Security Officer. ...Full Article
As more enterprises embrace open source software for applications ranging from security and cloud management to databases and analytics, the steady shift away from proprietary software is coalescing around ...Full Article
This website uses cookies to improve your experience. We'll assume you're ok with this, but you can opt-out if you wish.AcceptRead More
Privacy & Cookies Policy
Privacy Overview
This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.