As organizations make their move toward a more efficient and innovative future in the cloud, hybrid cloud environments pose several problems that can make or break their overall strategies.
Advancements in technology continue to grow — and so do the techniques of cyberthreats. Learn how organizations can keep their evolving environments protected through dynamic and advanced security solutions.
Another company has disclosed that that they were hit by a ransomware attack, this time involving the encryption of the customer data of SmarterASP.net, a popular hosting service provider for ASP.NET.
CVE-2019-16928, a vulnerability involving the message transfer agent Exim, could result in threat actors being able to launch denial-of-service (DoS) or remote code execution (RCE) attacks.
The complexity of container infrastructure, if not properly accounted for, can pose serious security risks. To minimize risks when building in containers, we came up with six steps that developers can follow.
In a survey commissioned by Trend Micro, majority of the respondents shared their concern for the risks in implementing DevOps. Learn why consulting IT security teams in the initiatives can help bridge gaps between production and security.
Threat actors are targeting Linux servers with vulnerable software, namely the project management tool Jira and the message transfer agent Exim, using a variant of the Watchbog trojan, which drops a Monero miner to expand their botnet.
Two vulnerabilities, assigned CVE-2019-9629 and CVE-2019-9630, were uncovered in Sonatype’s Nexus Repository Manager (NXRM) — an open-source governance platform used by DevOps professionals.