Sumo Logic has launched its HELM Chart V4 feature to fully unify data collection as part of its continued commitment to OpenTelemetry (OTel). Organizations can now package, configure and deploy applications and services on Kubernetes clusters with OpenTelemetry as a…
Tag: Help Net Security
Microsoft introduces new access policies in Entra to boost MFA usage
As part of a broader initiative to strengthen security, Microsoft is rolling out Microsoft-managed Conditional Access policies in Entra ID (formerly Azure Active Directory) to increase the use of multifactor authentication (MFA) for enterprise accounts. Microsoft Entra Conditional Access policies…
Traefik Hub updates modernize API runtime operations
Traefik Labs added new capabilities to Traefik Hub, a Kubernetes native and GitOps-driven Application Programming Interface (API) management solution. This latest update modernizes API runtime operations for platform teams who frequently encounter change management and incident management challenges. “Today, APIs…
Malwarebytes ThreatDown helps organizations to overpower threats
Malwarebytes launched ThreatDown, the product family that protects IT-constrained organizations with effective, easy-to-use cybersecurity. Formerly named Malwarebytes for Business, ThreatDown solutions are purpose-built to overpower threats, while empowering IT, through easy-to-use, effective technologies like the new Security Advisor dashboard and…
ExtremeCloud Universal ZTNA strengthens network security
Extreme Networks introduced ExtremeCloud Universal Zero Trust Network Access (ZTNA). Offered as a subscription service for ExtremeCloud customers, Universal ZTNA is a network security offering to integrate network, application, and device access security within a single solution. With unified observability,…
IBM introduces cloud-native SIEM to empower today’s security teams
IBM announced a major evolution of its flagship IBM QRadar SIEM product: redesigned on a new cloud-native architecture, built specifically for hybrid cloud scale, speed and flexibility. IBM also unveiled plans for delivering generative AI capabilities within its threat detection…
Cloud Foundry Foundation updates Korifi to simplify Kubernetes developer experience
Cloud Foundry Foundation announced the latest release of Korifi, a Platform-as-a-Service (PaaS) that takes a major step forward in reducing the complexity of Kubernetes while improving the application deployment experience. The Korifi update includes support for Docker images and deploying…
VMware advances IT modernization and security
VMware announced advanced automation capabilities and expanded third-party integrations delivered through the Anywhere Workspace platform that provide organizations with the tools needed to simplify IT workflows, enhance security, and improve overall efficiencies. “Implementing automation capabilities across all aspects of IT…
Looney Tunables bug exploited for cryptojacking
Kinsing threat actors have been spotted exploiting the recently disclosed Looney Tunables (CVE-2023-4911) vulnerability to covertly install cryptomining software into cloud-native environments. Kinsing (aka Money Libra) is a threat actor group that has been active since late 2021, targeting cloud-native…
7 free cyber threat maps showing attack intensity and frequency
Cyber threat maps are one of the most visually engaging tools in the arsenal of cybersecurity professionals. These real-time visualizations provide a global perspective on digital threats, showcasing the intensity and frequency of attacks as they happen. This article lists…
How AI is transforming consumer privacy expectations
Consumers are concerned about their privacy with AI. Cisco discovered that 60% had lost trust in organizations due to their AI use. In this Help Net Security video, Robert Waitman, Director of Cisco’s Privacy Center of Excellence, discusses consumers’ perceptions…
Kubescape 3.0 elevates open-source Kubernetes security
Targeted at the DevSecOps practitioner or platform engineer, Kubescape, the open-source Kubernetes security platform has reached version 3.0. Vulnerability scan results Kubescape 3.0 features Kubescape 3.0 adds new features that make it easier for organizations to secure their Kubernetes clusters,…
Outdated cryptographic protocols put vast amounts of network traffic at risk
Cryptography is largely taken for granted – rarely evaluated or checked – a practice that could have devastating consequences for businesses as attack surfaces continue to expand, the cost of a data breach rises year-over-year, and the age of quantum…
Microsegmentation proves its worth in ransomware defense
The number of ransomware attacks (successful and unsuccessful) has doubled over the past two years, from 43 on average in 2021 to 86 in 2023, according to Akamai. Security organizations have responded to the recent rise in ransomware attacks by…
eBook: Keeping Active Directory out of hackers’ cross-hairs
Active Directory is a prime target for threat actors, and companies must act now to eliminate it as a threat vector permanently. Read the e-book to review: Active Directory (AD) and what it provides Threats and how to keep hackers…
Palo Alto Networks to acquire Talon Cyber Security
Palo Alto Networks has entered into a definitive agreement to acquire Talon Cyber Security, a pioneer of Enterprise Browser technology. Talon’s Enterprise Browser provides a solution that, combined with Prisma SASE, will enable users to securely access business applications from…
Beyond Identity launches Okta Defense Kit to identify and prevent security vulnerabilities
Beyond Identity released the Okta Defense Kit, a duo of two preventative tools to help security and identity professionals identify and prevent security vulnerabilities, including those that contributed to recent breaches of the identity management service Okta. Okta has been…
Red Hat Device Edge ensures consistency across edge and hybrid cloud deployments
Red Hat has introduced Red Hat Device Edge, which offers a consistent platform designed for resource-constrained environments that necessitate small form-factor computing at the device edge. This includes Internet of Things (IoT) gateways, industrial controllers, smart displays, point-of-sale terminals, vending…
MITRE partners with Microsoft to address generative AI security risks
MITRE and Microsoft have added a data-driven generative AI focus to MITRE ATLAS, a community knowledge base that security professionals, AI developers, and AI operators can use as they protect AI-enabled systems. This new framework update and associated new case…
Wing Simulator enables developers to build and test Kubernetes applications
Wing Cloud, the company behind the open source programming language Winglang that works across all clouds, enhances their container support with the ‘Wing Simulator’ that enables developers to build and test their containerized applications locally. The Wing Simulator enables local…