Microsoft Challenges Hackers To Hack Its Linux OS The new research challenge is an application-only security research challenge, offering special bounty awards and providing additional ... By Monika ChauhanMay 7, 2020 Developers
Making Linux The ‘Most Secure’ OS For Remote Working How polymorphic technologies by Polyverse protect Linux powered systems to keep remote work safe and secure? By Swapnil BhartiyaApril 28, 2020 CXOs
IBM Research Launches Container-Based Open-Source Projects When it comes to highly regulated industries, confidentiality of workloads and data is just the tip of ... By Monika ChauhanApril 27, 2020 CXOs
Asigra Recognized With 2020 Data Breakthrough Awards The Data Breakthrough Awards honor excellence and recognize the creativity, hard work and success of data-focused companies, ... By Monika ChauhanApril 13, 2020 Cloud Native Computing
Hackers Are Exploiting Covid-19 To Attack Users "We are certainly seeing with our customers a pretty dramatic increase in cybersecurity issues across the board. ... By Swapnil BhartiyaApril 13, 2020 Developers
Safe & Secure Way To Work From Home | Alex Gounares @ Polyverse In this episode of TFiR Insights, Gounares talks about the new risks companies are facing as they ... By Swapnil BhartiyaApril 13, 2020 Developers
Galeal Zino Founder & CEO, NetFoundry In this episode of Let's Talk, we sat down with Galeal Zino, Founder and CEO of Netfoundy. By Swapnil BhartiyaApril 2, 2020 Cloud Native Computing
Best Practices for Configuring SQL Server for High Availability | Dave Bermingham @ SIOS Technology Configuring a resilient infrastructure is key to configuring SQL Server for high availability (HA). By Swapnil BhartiyaMarch 16, 2020 Developers
Configuring SQL Server for High Availability Configuring a resilient infrastructure is key to configuring SQL Server for high availability (HA). By Dave BerminghamMarch 10, 2020 Cloud Native Computing
Hackers Don’t Want You To Know You Are Hacked | Pete Jarvis – Polyverse Also notable is the fact that it’s quite difficult for one to say that their systems have ... By Swapnil BhartiyaMarch 7, 2020 Developers
Why are all scammers from Nigeria? The reason why all scammers are from Nigeria is because the spam email guys are self-filtering for ... By Swapnil BhartiyaMarch 4, 2020 Developers
How To Make Linux More Secure In this clip from our interview with Pete Jarvis of Polyverse, he explains how running standard Linux ... By Swapnil BhartiyaMarch 4, 2020 Developers
Microsoft Azure Sphere Hits GA Daily News Wrap: February 24, 2020 Microsoft has announced that its Azure Sphere secure IoT service is now generally available after several years ... By Monika ChauhanFebruary 25, 2020
What If Hackers Don’t Know What Software You Are Running If I learn how to hack Windows, I'm going to take over a billion computers. We see ... By Swapnil BhartiyaFebruary 21, 2020 Developers
Census For Open Source Software Security Released The increasing importance of FOSS throughout the economy became critically apparent in 2014 when the Heartbleed security ... By Monika ChauhanFebruary 20, 2020
Polyverse: Creating Security Through Diversity | Alexander Gounares Bugs are part of software development process, there is no way around it. However, Polyverse has found ... By Swapnil BhartiyaFebruary 19, 2020 Cloud Native Computing
Making It Easier For Developers To Embrace Encryption, Privacy & Security Instead of forcing developers to learn about managing public and private keys, we give them toolkits so ... By Swapnil BhartiyaFebruary 14, 2020 Cloud Native Computing
Advent To Acquire Cybersecurity Firm Forescout For $1.9 Billion The transaction is expected to close in the second calendar quarter of 2020. By Monika ChauhanFebruary 12, 2020
Best Practices For Container Security | Hayley Denbraver – Developer Advocate – Snyk Hayley Denbraver has been involved with many open source projects, including the Helm security report to analyze ... By Swapnil BhartiyaJanuary 30, 2020 Cloud Native Computing
Building Zero Trust authentication for multi-cloud application services One of the fundamental challenges organizations have about multi-cloud and hybrid cloud environments, is how to easily ... By Swapnil BhartiyaJanuary 28, 2020 Article
Octarine Open Sources New Security Scanning Tools With KCCSS and kube-scan, Octarine wants to help ensure that configurations are made properly so organizations aren’t ... By Monika ChauhanJanuary 23, 2020 Developers
Cobwebs Technologies Enters US Market With little more than a click, Cobwebs makes it difficult for terrorists, active shooters, hackers, and other ... By Monika ChauhanJanuary 23, 2020 CXOs
Here’s How To Tackle K8’s Security Challenge… Portshift has announced five security best practices for DevOps and development professionals managing Kubernetes deployments. By Monika ChauhanJanuary 23, 2020 DevOps
Two New Open Source Projects for Kubernetes Security by Octarine Octarine has released two new open source projects aimed at improving Kubernetes security. By Swapnil BhartiyaJanuary 23, 2020 Cloud Native Computing
GitLab Celebrates $1 Million In Paid Bounties GitLab's bug bounty program just paid out its millionth dollar in bounties and has seen contributions from ... By Monika ChauhanJanuary 15, 2020 Developers
GDPR, Security & Kubernetes | A discussion with Octarine and Nuaware In this episode of Let’s Talk, we sat down with Octarine and Nuaware to discuss ... By Swapnil BhartiyaJanuary 14, 2020 Cloud Native Computing
Protecting Data In Kubernetes Clusters: David Safaii In this episode of Let's Talk, David Safaii - Chief Executive Officer - Trilio Data talks about ... By Swapnil BhartiyaJanuary 10, 2020 Cloud Native Computing
A Service Mesh Approach to Kubernetes Runtime Security One of the new approaches that’s beginning to gain traction in the industry is by infusing network ... By Haim HelmanDecember 27, 2019 Cloud Native Computing
F5 Acquires AI Firm Shape Security For $1 Billion With the acquisition, Shape’s machine learning and AI-powered capabilities are likely to extend F5’s portfolio of application ... By Monika ChauhanDecember 24, 2019 AI/ML
Asigra Launches Program To Fight Against Cyber Attacks Asigra launches a program for organizations that are faced with either relinquishing or paying a ransom owing ... By Monika ChauhanDecember 20, 2019 CXOs
The Reality Of Zero Trust Buzzword Zero Trust is less about not trusting anyone and more about policies, strong authentication, authorization, encryption and ... By Swapnil BhartiyaDecember 18, 2019 Developers
As microservices scale, so does security complexity Developers are provisioning cloud infrastructure that governs that process of provisioning network assets, and storage. This means ... By TC CurrieDecember 13, 2019 Article
Scaling Microservices Poses Serious Security Challenges As microservices scale, so does security complexity. “Just defending the perimeter is not enough anymore,” said Haim ... By Swapnil BhartiyaDecember 13, 2019 Cloud Native Computing
VPN Bug Affects “Most” Linux Distros Tracked as CVE-2019-14899, the security flaw impacts Linux, Android, macOS, as well as other Unix-based operating systems. By Monika ChauhanDecember 6, 2019 Developers
Android Security Rewards: $1.5 Million Up For Grabs For Finding Bugs In Pixel Phones Google introduced the Android Security Rewards (ASR) program way back in 2015 to reward researchers who find ... By Monika ChauhanNovember 22, 2019 Developers
IBM Launches Cloud Pak For Security IBM Cloud Pak for Security is aimed at tackling cybersecurity threats across multicloud and hybrid environments. ... By Monika ChauhanNovember 21, 2019 Cloud Native Computing
Aporeto Announces New Kubernetes Security Capabilities At the ongoing KubeCon conference in San Diego, Aporeto has announced new Kubernetes security capabilities. With this ... By Monika ChauhanNovember 21, 2019 Developers
Nubeva Cloud Tools Simplify Cloud Security And Application Monitoring In 2020, Nubeva plans to create additional templates that support Google Cloud, Azure and private clouds using ... By Monika ChauhanNovember 21, 2019 Cloud Native Computing
Discover Kubernetes Security Best Practices With Cloud-Native Security Hub Cloud-Native Security Hub creates a home for cloud-native best practices, rules, and configurations. By Monika ChauhanNovember 18, 2019 Cloud Native Computing
Flavors of Data Protection in Kubernetes As containerized applications go through an accelerated pace of adoption, Day 2 services have become a here ... By Gaurav RishiOctober 28, 2019 Cloud Native Computing