Sean Michael Kerner is an Internet consultant, strategist, and writer for several leading IT business web sites.
There are a lot of different open-source organizations out there, but none had a bigger year in 2018 than the Cloud Native Computing Foundation (CNCF) and 2019 looks to be no different. The CNCF published its 2018 annual report on Feb. 8 providing an overview of the organization’s activities and growth over the past year. […]
Qualys announced a new patch management application on Feb. 12, providing organizations with the ability to more easily manage the often complex process of keeping infrastructure software updated. Qualys Patch Management (PM) is part of the Qualys Cloud Platform service that runs with a single agent on an endpoint to collect information and manage different […]
A new serious vulnerability in container technology was publicly reported on Feb. 11, one that could potentially enable an attacker to gain unauthorized access to the host operating system. Container technology led by the Docker engine has become increasingly popular in recent years as a way to build and deploy applications into isolated segments, on […]
The Istio service mesh project is an up-and-coming open-source effort that already has the backing of major IT vendors that include IBM, Cisco, Google and Amazon. Istio however isn’t secure by default, which is something that Twistlock is trying to help organizations configure, with a new guide to compliance checks released on Feb. 11. The […]
As attackers become increasingly sophisticated, there is a need for advanced technologies that can detect attacks that traditional tools can’t. That’s the mission for Blue Hexagon, which emerged from stealth on Feb. 5 with a deep learning platform to help automatically detect potential threats. The Blue Hexagon platform offers the promise of near real-time prevention […]
More than a week after the first reports of a critical vulnerability in Apple’s FaceTime messaging application surfaced, an official patch is now available. As it turns out, however, the FaceTime flaw was one of three different zero-day issues that attackers were actively exploiting in Apple’s iOS mobile operating system. Apple released the iOS 12.1.4 update for […]
Idaptive announced its Next-Gen Access Cloud on Feb. 7, providing organizations with a unified approach for Identity and Access Management (IAM) in the cloud and on-premises. The Next-Gen Access Cloud integrates multiple components including single sign-on (SSO), multi-factor authentication (MFA) and user behavior analytics (UBA) to help organizations with access requirements. The new release is […]
Cyber-security startup Netography emerged from stealth on Feb. 7 with a new technology approach to help organizations defend against the risk of distributed denial-of-service (DDoS) attacks. DDoS attacks typically involve large volumes of attack bandwidth that overwhelm services, rendering them unavailable. Defending against DDoS is, however, about more than simply having more bandwidth available than […]
Google is working to advance the next stage of cloud cyber-security with an approach known as confidential computing and the open-source Asylo, project which makes it easier to implement. Google is positioning confidential computing as the next step in advancing trust, control and security for the cloud. A core element of the approach is making […]
Among the conveniences offered in modern air travel is the ability to get an e-ticket, providing access to a travel reservation and seat check-in information. As it turns out, for some major airlines, that passenger convenience hasn’t been properly secured, exposing users and airlines alike to risk. Security firm Wandera reported on Feb. 6 that […]