Sean Michael Kerner

About

Sean Michael Kerner is an Internet consultant, strategist, and writer for several leading IT business web sites.

Password Reuse Remains a Barrier to Safer Internet Use

The internet by default is not always safe, which is why Safer Internet Day on Feb. 5 exists—it’s a day to educate and remind users about the steps that should be taken to reduce cyber-security risks. But what are the unsafe things that users are doing online? Google conducted a study along with a Harris […]

Red Hat Launches CodeReady Workspaces Kubernetes IDE

Red Hat announced the general availability of its CodeReady Workspaces integrated developer environment (IDE) on Feb. 5, providing users with a Kubernetes-native tool for building and collaborating on application development. In contrast with other IDEs, Red Hat CodeReady Workspaces runs inside of a Kubernetes cluster, providing developers with integrated capabilities for cloud-native deployments. Kubernetes is […]

Extreme Networks Looks to Protect Enterprises From IoT Security Risks

Extreme Networks announced its Defender for IoT technology on Feb. 4, providing enterprises with a network-level platform for IoT security. Defending against risks from rogue or unmanaged internet of things (IoT) devices that might be present on an enterprise network is no trivial task. The Extreme Networks Defender for IoT can plug into an existing […]

What Frameworks and Languages Are Developers Using in 2019?

Developers have a highly prized skill set, writing the code and applications that power the modern economy. The development skills that are most in demand are not static and change over time. In an effort to gauge the current state of developer trends, HackerRank surveyed 71,281 developers to understand what’s working and what’s not. The […]

Portworx Looks to Improve Cloud-Native Kubernetes Data Portability

As organizations increasingly choose to adopt cloud-native Kubernetes technologies, there is a corresponding need to make it easier to deploy and manage storage. Helping enterprises manage storage in Kubernetes is the mission that Goutham Rao has been on since he helped to start Portworx in December 2014. Portworx is an enterprise-grade cloud-native storage vendor and […]

Why Amazon’s AWS Cloud Business Will Continue to Grow

For a company that started off with the simple business of selling books online, Amazon has sure come a long way. While consumer goods, including books, are at the core of Amazon’s business, it is the Amazon Web Services (AWS) cloud division that generated most of company’s operating income in 2018. Amazon reported its full fiscal […]

Symantec Boosts Endpoint Security With Improved Detection

Symantec is enhancing its endpoint security capabilities with a series of updates across its product portfolio that add new features and services. Included among the updates is Symantec Endpoint Application Control, which only enables known good applications to run in an effort to help reduce an organization’s attack surface. Symantec’s updated Endpoint Cloud Connect Defense […]

IBM Warns of Apple Siri Shortcut Scareware Risk

Apple’s Siri voice assistant is intended to help users, but according to new research published by IBM on Jan. 31, attackers could potentially abuse the Siri Shortcuts feature. Apple introduced Siri Shortcuts with iOS 12, enabling users and developers to use Siri to automate a series of tasks. IBM’s X-Force security division discovered that it […]

Mozilla Improves Privacy Controls in Firefox 65

Mozilla released its first web browser update for 2019 on Jan. 29, with the debut of Firefox 65. The open-source Firefox 65 web browser improves a number of different features and has a strong focus on helping to advance user privacy. Mozilla is integrating redesigned controls in the updated browser release to enable users to […]

Salt Security Launches API Protection Platform

Startup Salt Security announced its API Protection Platform on Jan. 29, providing organizations with advanced capabilities to help discover, prevent and then remediate API attacks. Application programming interfaces (APIs) are commonly used in modern infrastructure, enabling a way to extend and interact with different aspects of an application or service. In recent years, attackers have […]