The container orchestration system Kubernetes hit a major milestone on 6 June 2024, enjoying its 10th anniversary. That's 10 years of changing the face of modern software.
It's a common joke that for any new platform that arises someone will port Doom to it. Well, now you can even run Doom on Snowflake, the data cloud.
German open-source vendor SUSE has released enhancements to its enterprise offerings, with the release of Rancher Prime 2.0, an application that it acquired back in July 2020.
Cloud security firm Wiz has found two privilege escalation issues in a filesystem used by Ubuntu Linux, with affected versions being widely used in the cloud.
GUEST OPINION: IT leaders are currently facing a hybrid cloud security conundrum. While the hybrid cloud market is going through impressive growth, the multiple benefits around the agility and scalability that come with hybrid cloud infrastructure are paired with serious concerns about its security.
GUEST OPINION: With more than 60% of corporate data currently stored in the cloud, the attack surface for threat actors is now as dynamic as the cloud itself, and growing fast. In this modern cyber world – where new blind spots provide attackers with a greater window of opportunity – it is essential that security teams have the proper visibility to investigate and respond to potential cloud compromises.
The data cloud Snowflake may soon be the apps-and-data cloud, with the company announcing Snowpark Container Services and the ability to run any application on Snowflake’s compute cloud.
Community Linux distribution openSUSE has released its stable version 15.5, also known as Leap, which is based on the SUSE enterprise distribution 15 service pack 5.
GUEST INTERVIEW: A hybrid cloud strategy is now the norm among larger organisations, and that that can lead to performance and security problems – but Gigamon can help.
GUEST OPINION: IT Ops is following the same trajectory as other internal data-driven domains, as the focus shifts from data analysis to the state of the data itself.
GUEST RESEARCH: Aqua Security, the pioneer in cloud native security, today announced that its security research team, Aqua Nautilus, discovered 250 million artifacts and 65,600 container images that were exposed via thousands of misconfigured container images, Red Hat Quay registries, JFrog Artifactory and Sonatype Nexus artifact registries.
GUEST OPINION: As with all technology, new tools are iterations built on what came before, and classic network logging and metrics are no different.
COMPANY NEWS: Pure-play cloud native security provider Aqua Security has announced its ranking as an outperformer and leader in innovation in the GigaOm Radar for Container Security.
The report highlights key vendors in container security, defines criteria for evaluating solutions and validates that Aqua is the leader and innovator in cloud native security.
GigaOm analysts evaluated 11 vendors, and according to the report the Aqua Cloud Native Security Platform ranked highest in innovation. The report notes that "the depth of integration among the services, along with the breadth of container security-specific functionality, is a strength for this platform, and few competitors are as zeroed in and as comprehensive."
According to GigaOm, "The Aqua Platform's implementation is well done. Most customers will find the product zeroes in on all the right things to lock down the container environment. If it is a likely need in the average enterprise's container security or compliance strategy, Aqua supports it."
|
"Aqua is the pioneer in container security and has led the evolving cloud native security market since its inception in 2015," said Aqua senior vice president of strategy Rani Osnat.
"Container security is a key ingredient of our platform and its ability to stop attacks on cloud native applications and infrastructure. This report showcases our team's innovation in securing container-based applications from development to production and highlights the differentiated capabilities that set us apart from competitors and deliver the most value to customers."
The infrastructure surrounding containers is complex on many levels. Aqua's integrated platform offers full lifecycle container security protection and groundbreaking Kubernetes Security Posture Management (KSPM). Its hallmark capabilities reduce risk and prove compliance of containerised applications, harden Kubernetes clusters, mitigate attacks and protect containers across all platforms and formats.
GUEST OPINION: A key digital transformation goal for many organisations is to move faster. For developers, that means releasing new features or upgrades to customers quicker.
COMPANY NEWS: Gigamon, the leading deep observability company, today announced an expansive set of new capabilities to the Gigamon Hawk Deep Observability Pipeline.
GUEST RESEARCH: Venafi, the inventor and leading provider of machine identity management, today announced the findings of new research that evaluates the complexity of cloud environments and its impact on cybersecurity. The study found that 75% of organisations have experienced a cloud-related security incident over the last 12 months, with more than one in three (37%) suffering at least four incidents. The underlying issue for these security incidents is the dramatic increase in security and operational complexity connected with cloud deployments. And, since the organisations in this study currently host two fifths (39%) of their applications in the cloud but expect increase to 57% over the next 18 months, this complexity will continue to increase.
GUEST OPINION: Fileless attacks are an advanced kind of malware that rank among today's most dangerous security threats.
VMware and NetApp announced today the expansion of the two companies' longstanding global alliance, with innovative solutions and go-to-market initiatives to help customers reduce the cost, complexity, and risk of migrating and modernising enterprise-class workloads in multi-cloud environments.
At present, Veeam could be likened to a duck heading upstream on a river: there's not much sign of activity, but there's a lot going on beneath the surface.
GUEST OPINION: With large-scale cloud-native deployments becoming more prevalent, enterprises are trying to bring greater efficiency and speed to cloud-native security. To achieve this, they are moving to shift security left, implementing intelligent automation, cloud security posture management (CSPM), and cloud workload protection platforms (CWPPs).
For most developers the security/performance trade off is still the hardest one to tackle, even as the cost of processing[…]
RISC has been overhyped. While it is an interesting low-level processor architecture, what the world needs is high-level system architectures,[…]
There are two flaws that are widespread in the industry here. The first is that any platform or language should[…]
Ajai Chowdhry, one of the founders and CEO of HCL is married to a cousin of a cousin of mine.[…]
I wonder when they will implement all of this, and what the pricing plans will be.FWIW, these days the proposed[…]