Security News & Reviews - Page 8
More Security News
A new vulnerability in the core runc container code could potentially enable a malicious container to get access to the host operating system. Major vendors and cloud providers are already pushing out patches, but there are other things users can do to limit risk.
eWEEK DATA POINTS: DevOps has been a popular and successful approach to handling new-gen app development. In this article, CEO Fernando Areias of Liferay Cloud discusses the five trends he sees reshaping the world of DevOps.
At its latest tech conference in Las Vegas, Check Point Software shares where the long-time security company is heading.
Blue Hexagon emerges from stealth with a cyber-security platform that makes use of deep learning techniques to infer when potential malware is active on a network.
Apple iOS and macOS users are strongly advised to update their devices as soon as possible with patches in the iOS 12.1.4 and the macOS Mojave 10.14.3 supplement updates, as Google warns of new zero-day vulnerabilities.
DAILY VIDEO: Password reuse remains a barrier to safer internet use, and Google is set to advance confidential computing with its Asylo project.
IT SECURITY ANALYSIS: Highly publicized data breaches, increasing vulnerabilities and new privacy regulations globally are pushing companies to increase spending on trusted IT security tools, staff, and hiring. But about a third of enterprises are falling behind in upgrading their systems.
Months after becoming a separate stand-alone business from Centrify, Idaptive is now launching its unified approach to helping organizations manage identity and access.
The network security startup emerges from stealth with a service that looks to provide more network packet level visibility to organizations, to detect and then block potential DDoS attacks.
Google is looking to further the development and advancement of a model for security known as confidential computing, which will help to protect the integrity of workloads, wherever they're running.