Datadog Announces Integration with Nessus

Source:-aithority.com Datadog, the monitoring and analytics platform for developers, IT operations teams, and business users in the cloud age, announced an integration with Nessus from Tenable, Inc. The integration ensures advanced vulnerability assessment capabilities from Nessus are available as part of a secure, end-to-end DevOps process. This enables DevOps teams that rely on Datadog for their critical cloud monitoring to have constant visibility into the health and status of their Nessus deployments. The Datadog integration with Nessus can detect when

Read more

VMware Cloud Foundation Gets Security Breakthrough At RSA

Source:-crn.com VMware’s popular VMware Cloud Foundation is receiving a major shot in the arm with new security capabilities from Carbon Black and NSX as the virtualization star continues its march to make security intrinsic in all its products. At RSA 2020 conference on Tuesday, VMware unveiled that VMware Cloud Foundation – which includes offers such as VMware Cloud on AWS and VMware Cloud on Dell EMC – has been injected with Carbon Black’s workload protection Real-time Workload Audit/Remediation technology as

Read more

DevSecOps: 3 Mission-Critical Trends to Follow in 2020

Source:-insights.dice.com The twin trends of digital transformation projects and a growing reliance on cloud services are constantly pushing enterprises to develop, deploy and upgrade applications much faster… the better to keep up with competition and stay ahead of nimble upstarts looking for market share. Meanwhile, concerns over security continue to gain importance with corporate boards and executives, who increasingly weigh these risks when making business decisions. The clash between the two (faster application development while keeping code secure) is a

Read more

Cloud computing: invisible, versatile and highly profitable

Source:-rfi.fr With each passing quarter, Amazon, Microsoft and Google have been setting new records, while cloud computing has become the invisible backbone supporting much of our daily lives. Its potential to become an even bigger part of people’s daily existence is sky-high. – Uses – The rising popularity of the cloud has gone hand-in-hand with that of 4G broadband technology and of smartphones: The combined power of the network and of servers makes it possible for us to listen to

Read more

Chef partners get new channel program for DevOps tools

Source:-searchitchannel.techtarget.com Chef has revamped its channel approach, rolling out a new partner program that addresses inconsistencies in the company’s previous partnering efforts; more IT channel news. Chef, a DevOps tool provider, has launched a new channel program that the company said provides a uniform structure for working with its nearly 500 Chef partners, which include systems integrators, managed service providers and resellers. Chef, based in Seattle, offers four tools covering various facets of DevOps and DevSecOps. Chef Infra automates infrastructure

Read more

Cybersecurity: What Programming Language Is Better for Your Career?

Source:-devops.com As a novice developer, you may be thinking about learning a programming language and starting a fantastic career.The thing is, programming languages represent certain philosophies of its authors and tailored to certain types of problems, i.e., there is no such thing as “the best programming language.” Source: Reddit. Every Tool Has Its Time and Place In this article, I describe major programming languages according to its popularity, usage, demand and ease of learning. There is market demand and a

Read more

Is DevOps making the same mistake as IT?

Source:-techbeacon.com I’ve been “DevSecOps-adjacent” for some time. My background is in the ops side of IT, and I have had several roles in cybersecurity. Like many who’ve been in cybersecurity for a while, I’ve become disheartened at the lack of progress—at the way the industry and its customers seem to be suffering from the same issues, not just year after year, but decade after decade. I see DevOps, and especially DevSecOps, as a way forward—a different way of working that

Read more

Look to retail for an example of DevOps success

Source:-ciodive.com While comparing DevOps adoption across sectors, retail leads in its ability to deploy on-demand, according to Puppet’s industry report card based on a survey of almost 3,000 respondents for its 2019 DevOps report. The technology sector has the most mature DevOps adoption and is the leader in integrating security into the software delivery pipeline. In retail, 57% of respondents can deploy to production on demand; 28% are doing so regularly. It’s “head and shoulders” above other industries, Alanna Brown,

Read more

Top 5 Cybersecurity Predictions for 2020

Source:-sdxcentral.com When it comes to cybersecurity, the types of attacks and threat vectors are always a moving target pitting the white hats against the black hats in an epic battle for our networks that isn’t going to be won anytime soon. (Sorry to be a downer during the holidays.) But the good news is that technology is also ever evolving, and some of the smartest people are working on new ways to secure infrastructure and endpoints while also preventing future

Read more

Meet the power players behind Microsoft’s Azure cloud

Source:-cryptodictation.com This story requires our BI Prime membership. To read the full article, simply click here to claim your deal and get access to all exclusive Business Insider PRIME content. We’ve identified 19 of the high-powered executives that Microsoft has assembled in a team to fight its rivals in the cloud wars, based on information from insiders and experts.Microsoft has long been considered the No. 2 cloud provider versus dominant Amazon Web Services, but that perception has started to change

Read more

Top 10 Container and Kubernetes Security Questions to Ask Your Team

Source:-containerjournal.com Container and Kubernetes security can be difficult. It can be daunting to try and monitor and protect a container ecosystem of hundreds or thousands of containers spread across a dynamic hybrid or multi-cloud environment. Ultimately, though getting the desired cybersecurity outcome is often a function of making sure you ask the right questions in the first place. With the right questions, you can determine where your containers or Kubernetes are exposed to risk and what your options are to

Read more

Big Tech, banking policymakers clash over cloud computing

Source:-complianceweek.com Congressional representatives at a hearing of the Task Force on Artificial Intelligence of the House Financial Services Committee on Friday expressed concern about the dramatic increase in use of cloud service providers by bankers and how that data in the cloud can best be protected. Consolidation of cloud service providers also seemed to trouble some lawmakers. Amazon Web Services controls 48 percent of the cloud computing market, noted Meredith Broussard, a computer scientist who is an associate professor at New York

Read more

Nucleus Cyber becomes a member of the Microsoft Intelligent Security Association

Sourec: helpnetsecurity.com Nucleus Cyber, the intelligent data-centric security company for the modern workplace, announced it has become a member of the Microsoft Intelligent Security Association to work together to defend customers against increasingly sophisticated, fast-moving threats. Joining The Association provides recognition of the expanded capabilities in Nucleus Cyber’s products that leverage key Microsoft security technologies to provide fine-grained, data-centric security for customer collaboration in Microsoft Office 365 applications such as Teams, OneDrive and SharePoint. As a result, customers benefit from

Read more

GitLab Research Reveals DevOps and Cybersecurity Disconnects

Source: devops.com Finger-pointing has long been the name of the game when it comes to cybersecurity failures. After all, who should be responsible when so-called bad code or bad practices are blamed for the latest incident?  A recent survey by DevOps lifecycle tool company GitLab reveals a significant disconnect between application developers and cybersecurity professionals—a disconnect that could only lead to more security woes and additional finger-pointing. GitLab surveyed more than 4,000 app development and cybersecurity professionals and brought some

Read more

GitLab Expands Scope of DevOps Ambitions

Source :- devops.com GitLab, with the release of its 12.0 update, is extending the reach of its namesake continuous integration/continuous delivery (CI/CD) platform to include both cybersecurity professionals and traditional IT operations staff. John Jeremiah, senior product marketing manager at GitLab, said the goal is to provide organizations with a single CI/CD platform that unifies the management of everything from source code to best DevSecOps processes. To address that latter requirement, GitLab 12.0 adds a dashboard designed specifically for security

Read more

Containers and Cybersecurity: Ansible, Kubernetes, More to Consider

Source:- channelfutures.com Containers are a very big deal in enterprise computing right now. If your organization isn’t already using them, then trends indicate it probably will soon. This application virtualization technology has had profound implications for some companies that have embraced DevOps, and there is plenty of potential for it to have a similar impact on security operations. To understand why, it’s good to start with an understanding of just what containers are. A modern application is a collection of

Read more

Trend Micro Advances DevSecOps via Kubernetes Integration

Source:- containerjournal.com. Trend Micro is now making it possible to employ Kubernetes to orchestrate security scans of container images conducted by Trend Micro Deep Security, its suite of tools that rely on deep packet inspection to protect applications using a combination of firewalls, intrusion protection systems and monitoring of logs and files. Mark Nunnikhoven, vice president of cloud research for Trend Micro, says these capabilities make it possible to embed container image scanning within a DevOps pipeline at scale while simultaneously inspecting

Read more

What DevOps Can Teach Us About Cybersecurity

Source- securityboulevard.com DevOps and cybersecurity are both top priorities for many enterprises, as well as areas that have experienced considerable innovation recently. And even though these are two very different sides of IT, there are lessons to be learned between the two. Both areas are in the midst of major transitions. For application development, the shift is from slow, monolithic releases too fast and responsive development cycles. For cybersecurity, the shift is from the old perimeter block/allow enforcement model to more

Read more

When DevOps Isn’t Enough

Source- cso.com.au The DevOps approach can accomplish many things, but can it help make your business more cyber secure? I don’t believe so. In fact, the notion of “DevSecOps”—making its way to an IT buzzword bingo card near you—could, in fact, jeopardise informational security across the organisational surface. The best way to boost security is to build a central team responsible for baking it into the development process from start to finish. More than just an attitude DevOps brings various strengths

Read more

Survey: Container security is a growing concern for IT professionals

Source- fiercetelecom.com It’s not surprising that 60% of the IT security professionals in a recent survey have experienced security incidents with their container usage over the past year. But it is somewhat surprising 47% of those security professionals who manage environments with containers responded that they did deploy containers with known vulnerabilities. Maybe the promise of containers is too tempting for some IT professionals to resist. And a majority of them don’t have the same IT resources as a large telco.

Read more
1 2 3