The Kubernetes industry is undergoing rapid change and evolution due to the growth of edge computing, the acceleration of AI, and the pressing need to modernize Kubernetes management in response to increasing technology scale and complexity, according to Spectro Cloud.…
Category: Help Net Security
Arista Networks expands zero trust networking architecture
Arista Networks announced an expanded zero trust networking architecture that uses the underlying network infrastructure to break down security silos, streamline workflows and enable an integrated zero trust program. Through a combination of Arista-developed technologies and strategic alliances with key…
Netskope Next Gen SASE Branch eliminates complicated, inefficient legacy branch infrastructure
Netskope unveiled the Next Gen SASE Branch: a major step forward in infrastructure that uses Netskope’s Borderless SD-WAN to transform how organizations manage their most critical networking and security functions and optimize enterprise branches everywhere. Information technology teams today seek…
Sandworm hackers incapacitated Ukrainian power grid amid missile strike
Russia-backed ATP group Sandworm is behind the cyberattack that caused disruption of parts of the Ukrainian power grid in late 2022, according to Mandiant. About Sandworm “Sandworm is a threat actor that has carried out cyber operations in support of…
Akamai and Deloitte partner for zero trust and incident response services
Akamai and Deloitte have announced a strategic alliance to provide zero trust microsegmentation and incident response services to Deloitte customers worldwide. This alliance will combine Deloitte’s expertise in cybersecurity, network forensics, and security with the Akamai Guardicore Segmentation solution. This…
YesWeHack unveils Attack Surface Management product that unifies offensive security testing
YesWeHack has unveiled an Attack Surface Management (ASM) product that enables clients to orchestrate their offensive security and vulnerability remediation strategy through a risk-based approach. The new product continuously maps an organisation’s internet-exposed assets, detects their possible exposure to known…
GitLab updates Duo to enhance security and efficiency throughout SDLC
GitLab has unveiled updates to GitLab Duo, the company’s suite of AI capabilities, including the beta of GitLab Duo Chat available in the GitLab 16.6 November product release, and the general availability of GitLab Duo Code Suggestions in the GitLab…
MOVEit hackers leverage new zero-day bug to breach organizations (CVE-2023-47246)
A critical zero-day vulnerability (CVE-2023-47246) in the SysAid IT support and management software solution is being exploited by Lace Tempest, a ransomware affiliate known for deploying Cl0p ransomware. Lace Tempest has previously exploited zero-day vulnerability (CVE-2023-34362) in Progress Software’s MOVEit…
NetRise Trace utilizes AI to Identify compromised software assets
NetRise has released Trace in the NetRise platform. This new solution allows users to identify and validate compromised and vulnerable third-party and proprietary software assets using AI-powered semantic search for the first time. Trace revolutionizes vulnerability detection and validation by…
ManageEngine Endpoint Central MSP Cloud automates everyday management and security tasks
ManageEngine launched Endpoint Central MSP Cloud, which brings the advantages of the cloud’s scalability, flexibility, and efficiency to the remote monitoring and management (RMM) of endpoints for MSPs. The launch also completes the first stage of the company’s vision for…