Impact of GDPR on Cloud Service Providers

Cloud computing is an integral part of most businesses globally. Technology has transformed the way businesses operate and thrive in the industry. However, the cloud industry has been facing huge challenges when it comes to complying with various data … Continue reading Impact of GDPR on Cloud Service Providers

Arm launches its latest chip design for HPC, data centers and the edge

Arm today announced the launch of two new platforms, Arm Neoverse V1 and Neoverse N2, as well as a new mesh interconnect for them. As you can tell from the name, V1 is a completely new product and maybe the best example yet of Arm’s ambitions in the data center, high-performance computing and machine learning […] Continue reading Arm launches its latest chip design for HPC, data centers and the edge

Cloud Native Tools Series Part 3: Get the Right Tools

As we near the end of our journey into cloud native tools, let’s take a look at visibility. In a previous post, I discussed how business entities need to understand their end of the Amazon Web Services (AWS) shared security model to uphold their cloud defense duties. This knowledge can help them safeguard their digital […]

The post Cloud Native Tools Series Part 3: Get the Right Tools appeared first on Security Intelligence.

Continue reading Cloud Native Tools Series Part 3: Get the Right Tools

Upstack raises $50M for its platform and advisory to help businesses plan and buy for digital transformation

Digital transformation has been one of the biggest catchphrases of the past year, with many an organization forced to reckon with aging IT, a lack of digital strategy, or simply the challenges of growth after being faced with newly-remote workforces, customers doing everything online and other tech demands. Now, a startup called Upstack that has […] Continue reading Upstack raises $50M for its platform and advisory to help businesses plan and buy for digital transformation

Microsoft’s Dapr open-source project to help developers build cloud-native apps hits 1.0

Dapr, the Microsoft-incubated open-source project that aims to make it easier for developers to build event-driven, distributed cloud-native applications, hit its 1.0 milestone today, signifying the project’s readiness for production use cases. Microsoft launched the Distributed Application Runtime (that’s what “Dapr” stand for) back in October 2019. Since then, the project released 14 updates and […] Continue reading Microsoft’s Dapr open-source project to help developers build cloud-native apps hits 1.0

Cloud Native Tools Series Part 1: Go Beyond Traditional Security

Like anyone who works with their hands, cybersecurity experts need the right tools for the job. As we’ll see in this blog and the series to follow, cloud-based threats need cloud native tools to combat them. Traditional security tools don’t provide the same level of functionality in the cloud as they do on premises. According […]

The post Cloud Native Tools Series Part 1: Go Beyond Traditional Security appeared first on Security Intelligence.

Continue reading Cloud Native Tools Series Part 1: Go Beyond Traditional Security

JumpCloud Adds Conditional Access Policy Support

JumpCloud has added support for conditional access policies to its namesake directory to provide IT teams with the ability to restrict who can remotely access what services based on what device they are using or what network is employed. Company CTO G… Continue reading JumpCloud Adds Conditional Access Policy Support

AT&T Survey Surfaces Lots of 5G Security Confusion

AT&T has published a report that suggests more IT organizations are becoming conscious of 5G security issues heading into a year when these services should be employed more widely. Based on a survey of 1,000 IT, security and line of business leade… Continue reading AT&T Survey Surfaces Lots of 5G Security Confusion

Unifying Security and Applications Through Identity

Identity and security must be built into the overall enterprise IT ecosystem, not simply added on As enterprise perimeters disappear into borderless cyberspace, CISOs are struggling to protect their businesses, partners and customers. Once entirely wi… Continue reading Unifying Security and Applications Through Identity

MoleRats APT Returns with Espionage Play Using Facebook, Dropbox

The threat group is increasing its espionage activity in light of the current political climate and recent events in the Middle East, with two new backdoors. Continue reading MoleRats APT Returns with Espionage Play Using Facebook, Dropbox