Cloud-Native Security—What is it and Why it Matters

The term “cloud native” is turning up more and more in vendor promotions and news content, as a growing number of organizations devote more resources to the cloud and make…

Cloud security firm Lacework secures $1.3 billion in new funding round

Lacework has raised $1.3 billion in a new funding round to bolster its position in the cloud security market.  Announced on Thursday, the Series D funding round was led by…

Cisco partners with JupiterOne for cloud security platform

JupiterOne and Cisco announced an expanded cloud security and security operations partnership on Monday designed to provide businesses with a range of cybersecurity services. The Cisco Cloud Security Insights with…

RHEL 8.5 delivers key container improvements

RHEL 8.5, the newest version of Red Hat Enterprise Linux (RHEL), is out. As Joe Brockmeier, Red Hat Blogs’ Editorial Director, said, “Whether you’re deploying RHEL on-prem, in the public…

Healthcare Cloud Security Explained

Years before the pandemic, the healthcare industry had already been busily digitally transforming itself. Yet, the pandemic did pull years of demand for telehealth and remote work forward into 2020.…

Vulnerable Docker Servers: Targets of TeamTNT

A new malicious campaign emerged last month having its focus on Docker servers that are not properly configured, being thus exposed to threats. Reportedly linked to TeamTNT, the cyberattacks are…

Cybersecurity Trends from the Global Pandemic

Trend Micro – Trend Micro – Although Agile deployment practices such as Agile, Scrum, Kanban, and many others have been around for years, the digital shift driven by the COVID-19…

The Future of the Container Security for SMBs

As more and more small and mid-sized businesses (SMBs) shift data and workloads to the cloud, they will likely rely on containers to play an increasingly important role in ensuring…

Group Policy Objects: Definition, Types and Examples

Group Policy Objects, also known as GPOs, are basically a collection of rules, a virtual policy settings compilation. In this article, you’ll find what group policy objects are, how many…

Google just tripled its bounty for Linux kernel bugs. Here's why

Google has kicked off a special three-month bug bounty targeting flaws in the Linux kernel with triple the rewards for security researchers. The new bounty, announced this week, looks to…