The Ultimate Guide to Container Security: Tips and Tricks for Success

The Ultimate Guide to Container Security: Tips and Tricks for Success

As containers solidify their role in modern cloud-native IT development, the need for robust security measures is more crucial than ever. Containers’ popularity is growing due to their lightweight flexibility and speed, ...

Accelerating Cloud-Native Data Security Deployments at Scale with Imperva’s eDSF Kit

Today’s evolving digital landscape and the rapid expansion of cloud technologies have necessitated a shift in the approach of deploying and managing data security across multiple platforms. Traditional methods of manual deployment ...
IBM Gootloader ransomware

IBM to Bring AI to Cloud-Native SIEM Platform

IBM will add watsonx generative AI capabilities to its security information event management (SIEM) platform early next year ...
Security Boulevard
cloud security, cloud, cloud environment, data privacy, data protection, cloud security teams, security, cloud-native, Palo Alto Dell zero trust Network Security multi-cloud zero-trustQualys multi-cloud Wi-Fi 6 access point zero-trust cloud security remote data protection

Cloud-Native Security: A Tipping Point for Security Teams’ Productivity

cloud-native application development has caused a veritable maelstrom for security teams ...
Security Boulevard
Androxgh0st macOS malware cracked software trojan

New P2P Worm Puts Windows and Linux Redis Servers in its Sights

A new peer-to-peer (P2P) worm, P2PInfect, is spreading across instances of the Redis open source database software in the cloud ...
Security Boulevard
Lacework cloud security fortinet Juniper strategy IAM Datadog CSA cloud security SMBs cloud

Lacework Adds Custom Risk Scoring Capability to CNAPP

Lacework today announced it has added a risk vulnerability scoring capability to its cloud-native application protection platform (CNAPP) that can be customized to a specific cloud computing environment. Lacework also announced it ...
Security Boulevard
Lazarus Andariel Log4j flaw RAT malware

Sysdig Details Proxyjacking Attack Leveraging Log4j Vulnerability

Sysdig today published a report that described how cybercriminals are exploiting the Log4j vulnerability to gain access to IP addresses that are then sold to entities that resell them. Dubbed proxyjacking, the ...
Security Boulevard
Devnexus 2023 logo

5 Tips for Devnexus 2023

Here are four tips for making the most of Devnexus 2023, based on my first-hand experience and conversations with other attendees. The post 5 Tips for Devnexus 2023 appeared first on Azul ...
CSPM, cloud-based, Wiz multi-cloud, security, CNAPP cloud computing cybersecurity Orca Kubernetes TDIR cloud and container security

Should You Choose Agentless or Agent-Based for CNAPP?

It’s the current great debate among DevOps teams: Which cloud-native application protection platform (CNAPP) approach is best-suited to protect your cloud environments? Is an agent-based or agentless approach the ideal strategy? Cloud ...
Security Boulevard
identity cyberattacks ransomware

How Credential Misuse Threatens Cloud Operations

Cloud-native security is a rapidly evolving section of the industry reacting to the increasing threats unique to organizations that are exclusively or primarily operating on cloud applications and platforms. In a report ...
Security Boulevard