Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

DevOps

Zero Trust Security: Supporting a CARTA approach with Anomaly Detection

Learn how Anomaly Detection supports, what Gartner has termed, a continuous adaptive risk and trust assessment (CARTA) when building a CaaS platform using Kubernetes. Anomaly Detection expands the zero trust network security model and continuously assess the application and network risk that enables adaptive policy adjustments.

Calcom Server Hardening Solution

CalCom Hardening Solution (CHS) is a server hardening automation solution (for Windown & Linux servers) designed to reduce operational costs and increase the server's security and compliance posture. CHS eliminates outages and reduces hardening costs by indicating the impact of a security hardening change on the production services. It ensures a resilient, constantly hardened and monitored server environment.

Machine data processing and 5G, IoT, and AI at Mobile World Congress 2019

One thing that’s become evident to me after years attending Mobile World Congress is that, in fact, there are several events running in parallel, with a few common denominators: network technology providers, device manufacturers, telecom operators, and services companies all come to Barcelona to present and demonstrate the latest and greatest of the year’s dominating trends.

Shifting Left Is a Lie... Sort of

It would be hard to be involved in technology in any way and not see the dramatic upward trend in DevOps adoption. In their January 2019 publication “Five Key Trends To Benchmark DevOps Progress,” Forrester research found that 56 percent of firms were ‘implementing, implemented or expanding’ DevOps. Further, 51 percent of adopters have embraced DevOps for either all new or all applications. Clearly, DevOps adoption is here and growing.

Five Easy Steps to Keep on Your Organization's DevOps Security Checklist

The discovery of a significant container-based (runc) exploit sent shudders across the Internet. Exploitation of CVE-2019-5736 can be achieved with “minimal user interaction”; it subsequently allows attackers to gain root-level code execution on the host. Scary, to be sure. Scarier, however, is that the minimal user interaction was made easier by failure to follow a single, simple rule: lock the door.