Cloudify 6 simplifies the continuous management of large-scale deployments

Cloudify 6 launches, introducing Environment as a Service 2.0: a new hierarchical environment management capability that simplifies the continuous management of large-scale deployments. Cloudify 6 provides an “orchestrator of orchestrators”… Continue reading Cloudify 6 simplifies the continuous management of large-scale deployments

Fugue IaC platform empowers cloud teams to eliminate security gaps

Fugue announced Fugue IaC, a unified platform for securing infrastructure as code (IaC) and cloud runtime environments using a single set of policies. Powered by a Unified Policy Engine, Fugue IaC saves cloud teams significant time and ensures consiste… Continue reading Fugue IaC platform empowers cloud teams to eliminate security gaps

Styra DAS extends OPA policy-as-code guardrails to public, private and hybrid cloud configurations

Styra announced new cloud infrastructure support via Terraform, extending Styra Declarative Authorization Service (DAS) guardrails to storage, network and compute resource configuration in public clouds including AWS, GCP and Azure. With this addition,… Continue reading Styra DAS extends OPA policy-as-code guardrails to public, private and hybrid cloud configurations

Sysdig acquires Apolicy to help customers secure Infrastructure As Code and automate remediation

Sysdig announced intent to acquire Apolicy to shift security further left and expand the Sysdig offering to include Infrastructure as code (IaC) security. Sysdig customers secure the DevOps cycle from build through production. Apolicy complements these… Continue reading Sysdig acquires Apolicy to help customers secure Infrastructure As Code and automate remediation

Regula: Open source policy engine for IaC security

Fugue announced Regula 1.0, an open source policy engine for infrastructure as code (IaC) security. Available at GitHub, the tool includes support for common IaC tools such as Terraform and AWS CloudFormation, prebuilt libraries with hundreds of polici… Continue reading Regula: Open source policy engine for IaC security

Open-source tool Yor automatically tags IaC resources for traceability and auditability

Yor is an open-source tool from Palo Alto Networks that automatically tags cloud resources within infrastructure as code (IaC) frameworks such as Terraform, Cloudformation, Kubernetes, and Serverless Framework. Yor helps security teams trace a security… Continue reading Open-source tool Yor automatically tags IaC resources for traceability and auditability

Backblaze B2 Cloud Storage platform delivers enhanced security and performance upgrades

Backblaze announces the release for its B2 Cloud Storage platform. This latest Infrastructure-as-a-Service release includes a slate of security enhancements, performance upgrades, and new partnerships—expanding customers’ ability to build applications … Continue reading Backblaze B2 Cloud Storage platform delivers enhanced security and performance upgrades

Infrastructure drift: A multidimensional problem with the need for new DevSecOps tools

As modern infrastructures get more complex everyday, DevOps teams have a hard time tracking infrastructure drift. The multiplicity of factors involved when running sophisticated infrastructures turns this situation into a multidimensional headache with… Continue reading Infrastructure drift: A multidimensional problem with the need for new DevSecOps tools

Lacework expands native security support across AWS to protect cloud changes and workloads

Lacework has announced that it has extended native security support for Amazon Web Services (AWS) services including AWS Graviton2 and AWS Fargate. These additions give Lacework customers using AWS in-depth security visibility, threat detection, config… Continue reading Lacework expands native security support across AWS to protect cloud changes and workloads

1Password Secrets Automation helps businesses secure and manage secrets

1Password launched Secrets Automation, a new way to easily secure, manage and orchestrate the rapidly expanding infrastructure secrets required in a modern enterprise. Secrets such as corporate credentials, API tokens, keys and certificates can number … Continue reading 1Password Secrets Automation helps businesses secure and manage secrets