Italy unveils plans for cybersecurity agency to aid its cloud strategy

Source:-https://cloudcomputing-news.net/ Italy plans to set up a national agency tasked with combating cyber attacks as it continues work on its unified cloud infrastructure. The country is one of many European nations attempting to enhance their cybersecurity capabilities. Many aspects of Italy’s digital security, which are dispersed among various Ministers and state bodies, are to be brought together under the authority of the Prime Minister. The general director and his deputy will be appointed for four years, according to a draft

Read more

What Biden’s Cybersecurity EO Means for DevOps Teams

Source:-https://devops.com/ On May 12, 2021 President Biden issued Executive Order 14028, also known as the Executive Order on Improving the Nation’s Cybersecurity. This EO covers a lot of ground, and like all executive orders, it instructs agencies of the U.S. Federal Government to perform specific actions. What it doesn’t do is appropriate funding or create industry mandates. That’ll come later, once some of the plenary stages of the EO are complete. Despite this, I’m confident that EO 14028 could be

Read more

All About Cloud Computing, Tricks Of The Trade From A Cloud Infrastructure Leader

Source:-https://www.cio.co.ke/ Despite all the talk of cybersecurity capabilities being built in versus bolted on, security remains an afterthought for a vast majority of digital transformation activities such as mobility, cloud services and customer experience programs. Too often, security is seen as slowing down a project rather than enabling its success, and with time pressure to get a project up and running, the lack of sound security considerations is a problem for organisations striving for true business resilience. Ensuring that cyber

Read more

Cybersecurity 2021: Are You Really Prepared for a Cyberattack?

Source:-https://devops.com/ As the majority of businesses are increasingly moving to the online world, employees keep working remotely and more cyberattacks keep happening all over the globe, there is no doubt that embracing DevSecOps should be the new normal for every company. Organizations need to be able to adopt DevSecOps practices and adapt to new and evolving threats in order to protect their data and systems from malicious attacks. At Cybersecurity 2021: The New Normal Virtual Summit, taking place March 4

Read more

IT Insight: Come together with cloud computing by Microsoft Azure

Source:-https://www.seacoastonline.com The biggest challenge we face, is the lack of our ability to come together. Because of this, the technology industry has seen a major shift toward cloud computing. Defined as a web-based computing model, cloud computing allows users to share information with other devices and computers instantly. This can allow multiple people to access the same files and data with minimal effort and can also give users the option to easily store large amounts of data. The way the

Read more

Trend Micro Cloud One – File Storage Security: Designed to mitigate threats across the cloud

Source:-https://www.helpnetsecurity.com Trend Micro announced the world’s first cloud-native, fully serverless file storage security tool for organizations building applications in the cloud. Trend Micro Cloud One – File Storage Security is designed to mitigate threats across the cloud environment and support strict compliance requirements. The explosion of cloud-based file and object storage presents a new attack vector for threat actors to target with malicious files. Cloud One – File Storage Security provides automated anti-malware scanning to keep information safe and ease

Read more

Kovair Advances Secure Coding Practices with Veracode Integration to Combat Cybersecurity Attacks within DevOps

Source:-https://www.einnews.com SAN RAMON, CALIFORNIA, USA, December 15, 2020 — Kovair Software, one of the leaders in software tools integrations and a leading provider of value stream management platform (VSMP) solutions for enterprise IT, has improved its security posture by enforcing secure coding practices by working with Veracode, the largest global provider of application security testing (AST) solutions. Kovair integrates Veracode in its industry-leading Kovair DevOps platform to allow it to launch security vulnerability assessments continuously in software lifecycle, with the

Read more

The Essential Cloud Security Books for Cybersecurity Professionals

Source:-solutionsreview Solutions Review compiles the most essential books on cloud security that any cybersecurity professional or IT administrator needs to add to their reading list. Is your business running applications and workflows in the cloud? Knowing how to keep your cloud environment secure is critical. Books, whether hardcover or digital, are an excellent source for people looking to learn about a specific field of technology, and cloud security is no exception. We’ve listed the top cloud security books that you

Read more

MuseDev Offers DevOps-Optimized Security Code Analyzer

Source:-devops.com MuseDev today announced it has made available on GitHub under an early access program a code analysis tool dubbed Muse that is designed to surface cybersecurity issues as pull requests are made from the repository. Company CEO Stephen Magill said rather than waiting to discover cybersecurity issues after an application is deployed, Muse makes it easier for IT teams to consistently employ best DevSecOps practices. There’s general agreement DevOps teams should assume more responsibility for application security as part

Read more

Bennett University offers BCA in Data Sciences and Cloud Computing

Source:-news.careers360.com NEW DELHI: As the world is becoming more prone towards technology, preparing students for the future of technical work and fulfilling their passion to excel in developing cutting edge computer applications becomes the need of the hour. Bennett University launches the Bachelors in Computer Application (BCA) programme with specializations in the most sought after fields – BCA (Data Science) and BCA (Cloud Computing & Cyber Security), from the academic year 2020-21. Students will be doing three certifications out of Cloud

Read more

Increasing election security monitoring in cloud computing

Source:-blogs.microsoft.com Today, we have an exciting announcement we believe will help increase election security while enabling election officials to take advantage of the advanced capabilities of cloud computing. For years, the Department of Homeland Security’s Cybersecurity and Infrastructure Security Agency and state and local governments throughout the United States have worked with the non-profit Center for Internet Security, Inc. (CIS) to monitor the security of election-related data. This is enabled by Albert Network Monitoring, which examines internet traffic and connection

Read more

Azure-hosted AI for finding code defects emitted – but does it work?

Source:-theregister.co.uk How many defects has it found? Never mind that, check out the architecture flow chart Altran – in association with Microsoft – has pushed out an open source project to find code defects via AI whenever you commit code. It is easy to see why Microsoft is keen. This is a self-managed service where you download the code and purchase Azure resources on which to host it. The project from Altran – a consulting and software engineering firm that’s

Read more

Why machines protecting themselves is the future of cybersecurity

Source:-cloudcomputing-news.net Bottom Line: Existing approaches to securing IT infrastructure are proving unreliable as social engineering and breach attempts succeed in misdirecting human responses to cyber threats, accentuating the need for machines to protect themselves. Any nation’s digital infrastructure and the businesses it supports are its most vital technology resources, as the COVID-19 pandemic makes clear. Cybercriminal and advanced persistent threat (APT) groups are attempting to capitalise on the disruption that COVID-19 is creating to engage in malicious cyber activity. It’s

Read more

Survey: Teams supported by mature DevOps practices more likely to integrate automated security

Source:-techrepublic.com Adding security into DevOps hasn’t been as easy as automating all the things. Sonatype’s survey shows the state of the industry—and what you might want to work on next. Teams are deploying software from DevOps teams at an accelerated rate, according to Sonatype, providers of the Nexus platform for application security, which recently released the 2020 DevSecOps Community Survey. The survey also showed that teams with mature DevOps support were happier in their jobs. SEE: Cybersecurity: Let’s get tactical

Read more

Trend Micro Publishes Guide to Kubernetes Security

Source:-containerjournal.com Trend Micro has created a guide to Kubernetes threats that categorizes the threats into three broad categories: external attacks, misconfiguration issues and vulnerable applications. Mark Nunnikhoven, vice president of cloud research at Trend Micro, says adoption of Kubernetes is exacerbating an existing shortage of cybersecurity expertise by introducing into enterprise IT environments a platform that is as complex as it is powerful. As a result, the opportunities for cybersecurity mistakes to be made are considerable, he notes. Most external

Read more

Latest Parasoft Software Testing Suite Release Strengthens DevOps Team Collaboration

Source:-wfmz.com Parasoft Showcases New Product Capabilities for DevOps and Remote Work Team Initiatives at STAREAST Virtual Conference 2020 MONROVIA, Calif., May 5, 2020 /PRNewswire/ — Parasoft, a global leader in automated software testing for over 30 years, today announced the 2020.1 releases of Parasoft’s enterprise solutions: SOAtest, Virtualize, and Continuous Testing Platform (CTP). The new features in the product suite strengthen DevOps team collaboration, making it simple for customers to manage virtual services more effectively as part of the test

Read more

Alcide Advances DevSecOps in Kubernetes Environments

Source:-containerjournal.co Alcide is moving to advance the adoption of best DevSecOps practices among developers of containerized applications running on Kubernetes platforms by making its container security platform available via a command-line interface (CLI). Company CTO Gadi Naor says Alcide sKan makes it easier for developers to scan source code for vulnerabilities within the context of existing DevOps processes. That approach is critical because it means developers can invoke a cybersecurity tool without having to substantially alter their existing workflow processes, he says.

Read more

World Backup Day brings free Azure data protection offering from HYCU

Source:-siliconangle.com With ransomware threats on the rise and greater risk for a large user community now transacting business from home, World Backup Day on March 31 was a timely reminder that it’s better to be safe than sorry. HYCU Inc., the multicloud provider of backup and disaster recovery services, announced on March 31 that it would make its Azure data protection functionality free for the following three months in support of global efforts to protect critical data during the coronavirus

Read more

Filling the Skills Gap for Effective DevSecOps

Source:-devops.com With the rise of DevSecOps comes a whole new need for training and upskilling. It isn’t a secret that the cybersecurity skills gap will only continue to grow. The security skills gap combined with the rise of DevSecOps has introduced hidden challenges organizations must address. The Rise of DevSecOps While DevOps accelerates agility and scalability of organizations, it may also expand risks of threats—particularly if security is an afterthought in an organization’s cloud strategy. In a recent survey, 52%

Read more

Tackling 5G-based mobile computing and cloud computing security concerns head-on

Source:-techxplore.com In a June 2019 report, telecommunications equipment provider Ericsson predicted that there will be 8.3 billion mobile broadband subscriptions by the end of 2024, which translates to 95 percent of all subscriptions by then. Total mobile data traffic will reach 131 exabytes per month (1 exabyte = 1 billion gigabytes), with 35 percent carried by 5G networks. While mobile phones will consume the bulk of the data, the sheer number and wide variety of devices that will be connected

Read more
1 2 3