Security

Capsule8 Launches Beta Release of Industry's Only Threat Prevention and Response Platform for Cloud-Native Environments

Grazed from Capsule8

Capsule8 today launched the beta version of Capsule8 Protect, the industry's first threat prevention and response platform purpose-built for cloud-native environments. Capsule8 Protect brings continuous security to an enterprise's production environment, allowing them to detect and shut down attacks in the instant they happen. The company is conducting private demonstrations of its beta product at Black Hat USA from July 22-27.

Organizations are rapidly shifting toward containerized and microservice architectures. However, this explosive growth brings significant challenges that require solutions to simplify and automate complex security requirements for this next-generation infrastructure. Existing solutions such as security appliances, which rely on IP or host names for monitoring, simply don't work in the dynamic world of containers. Meanwhile container-focused security solutions provide some vulnerability scanning and threat alerting, but cannot protect large amounts of the legacy infrastructure or actually stop attacks from happening.
 

Backup and Sync from Google: Fight Ransomware Risk with Cloud Computing

Grazed from 1RedDrop. Author: Shudeep Chandrasekhar.

Google today launched a much-anticipated desktop app called Backup and Sync. Not one to mince words, the company is encouraging users to sync whatever media they have on their local systems to a location in the cloud. Essentially, it’s going to act as a replacement for older Drive client applications, as well as for the older Photos app.

The tool will be mindful of any existing settings you have on your Mac or PC for backups, but you can basically sign into your Google account and specify which folders need to be backed up regularly to Google Cloud. Not only does Backup and Sync keep your desktop backed up at all times, but it can also access and sync data from external memory devices like USB sticks, hard drives, cameras and SD cards...

Overcoming File Sharing, Healthcare App Cloud Security Concerns

Grazed from HealthITSecurity. Author: Editorial Staff.

Potential file sharing and healthcare cloud security risks must be addressed in covered entities’ and business associates’ risk analyses, according to the latest OCR cybersecurity newsletter. These collaboration tools can greatly benefit organizations, but the possible privacy and security risks cannot be ignored.

Risk management policies and business associate agreements (BAAs) should also review any file sharing or cloud computing options to ensure PHI security, OCR maintained. “Misconfigurations of file sharing and collaboration tools, as well as cloud computing services, are common issues that can result in the disclosure of sensitive data, including ePHI,” the newsletter stated...

A10 Networks Brings "Harmony" to Management of Secure Application Services Across Multiple Clouds and Data Centers

Grazed from A10 Networks

A10 Networks introduced a new strategic solution that offers multi-cloud, multi-service management that brings to life its ongoing vision of harmonizing application delivery and security.

The new developments center on the A10 Harmony Controller, built on microservices and container technologies, offering a multi-tenant, highly scalable controller architecture that incorporates real-time analytics at a per-app level and central management and orchestration of secure application services across hybrid environments - from physical data centers to public, private and hybrid clouds.

The new A10 Harmony Controller and analytics capabilities fundamentally change the way secure application services are delivered, protected, and managed. Because the A10 Harmony application delivery and security controller uniquely spans traditional data centers and clouds, it is now the industry's only controller-based platform that can deliver analytics, configuration and orchestration across such hybrid application environments.

Is the Cloud Safe for Hosting Images?

Have you ever heard the saying "ignorance is bliss"? Well, you can correctly assume that the phrase is even more relevant whenever you are speaking about online safety. It is very important that you, as an online user, are always aware and alert. So, if you have yet to jump on the cloud computing train, you may be wondering how safe and secure it is when it comes to storing data and images for your auction templates and other online activities.

The Basics of Cloud Computing

There is a high probability that you have been using cloud computing for a while without even knowing it. The cloud powers things like webmail for Yahoo and Google, social media sites, blogs, Google Docs, online gaming, and online storage.

How Cloud Call Centers Are Taking Steps to Improve on Security

We think of the Cloud as this wonderful way to store data and information that is then accessible to us any time, and in any place. Cloud applications are able to reach across all different industries and be used in unique ways. With that said, the Cloud isn't perfect, in fact security issues have become quite the topic where the Cloud is concerned. One area where that is particularly true is with Cloud call centers. It has led people to ask what steps are being taken by these call centers to improve upon security.

Call Centers - Nothing New

Call centers themselves are nothing new. These have been used for decades in order to provide customers and clients with support when needed and assistance when needed. The ability to talk to a live operator is attractive for many people.

Key trends in cloud infrastructure: Hybrid, smart storage, security, and more

Grazed from CloudTech. Author: Aaron Shelley.

The past decade has brought much change to the IT infrastructure industry as enterprise IT companies scale up their data consumption to unprecedented levels. Today’s enterprise IT giants require far more speed, power and bandwidth to successfully run their businesses and this is only possible via enhancements to the underlying infrastructure.

Infrastructure develops so quickly that industry practices in 2020 will likely be unrecognisable from what they were 10 years ago. Infrastructure has become more powerful, faster and more secure - and we have still only just scratched the surface of what’s possible. This article will examine some of the current trends within the industry as it stands, as well a look at what the future holds for IaaS in 2017...

Read more from the source @ https://www.cloudcomputing-news.net/news/2017/apr/05/key-trends-cloud-infrastructure-hybrid-smart-storage-security-and-more/

Oracle secures ISO 27001, HIPAA and SOC certifications for its cloud portfolio

Grazed from CloudTech. Author: James Bourne.

Oracle has announced its public cloud services have achieved various security and compliance certifications, including ISO 27001, HIPAA, SOC1 and SOC2, in what the company describes as ‘continued momentum’ for its products. The Redwood giant’s platform as a service (PaaS) and infrastructure as a service (IaaS) has received Service Organisation Control (SOC) attestations across a variety of key services, while its Fusion software as a service (SaaS) is HIPAA-accredited and the ISO 27001 was awarded for ‘the proper management and security of assets such as financial information, intellectual property, employee details or information entrusted to an organisation by third parties’.

The move puts Oracle alongside its various industry competitors; for example, Microsoft’s SOC1 and SOC2 information can be found here – copies of the report are only available to customers who have signed an NDA – while ISO 27001 can be found here. The Oracle accreditations were administered by Schellman & Co...

Read more from the source @ https://www.cloudcomputing-news.net/news/2017/apr/03/oracle-secures-iso-27001-hipaa-and-soc-certification-its-cloud-portfolio/

NeuVector Launches New Approach to Continuous Docker Container Security

Grazed from NeuVector

NeuVector today announced the launch and immediate availability of a new approach to securing Docker containers. With constant behavioral learning automatically applied to security policies for containers, NeuVector secures containers where they have been most vulnerable: in production environments where they are constantly being deployed, updated, moved, and scaled across hosts and data centers. Companies with production Docker deployments (or who are evaluating container-based applications) can quickly test-drive NeuVector's answer to stronger and faster container security here.

NeuVector's solution for container security is itself a container. The application automatically learns and whitelists normal behavior to protect environments even as containers scale up and down. Through this built-in continuous application and network intelligence, NeuVector is providing application layer segmentation that completely isolates container traffic. Any abnormal connections can then be proactively and automatically detected and blocked before causing harm. NeuVector completes its solution with runtime vulnerability scanning across all running containers and hosts, and includes threat detection for attacks such as DDoS, DNS, and others.
 

Cloud Computing: Building your data castle - Protecting from ransomware and restoring data after a breach

Grazed from CloudTech. Author: David Trossell.

The data centre is the castle. You can pull up the drawbridge, fill up the moat, or pull down the portcullis. But at some point, you have to let data in and out, and this opens up the opportunity for ransomware attacks. No longer is it a matter of pride and peer recognition in the hacker community for circumnavigating and exposing the security of an organisation because it is now a fully-fledged industry in its own right with the use of ransomware.

That cybersecurity company Herjavec Group estimates to top a $1 Billon in 2016. In the past, those under siege used to flood the moats, pull up the drawbridges and drop the portcullis to protect themselves but with the modern data centre organisations life blood is the movement of data in and out of the data centre...