Security News
PacketFabric announced it has launched Cloud Router, a multi-cloud connectivity solution. Cloud Router will super-serve the enterprise as well as small business who are seeking a future-proofed way to connect multiple cloud providers.
Cisco has released security updates to address pre-auth remote code execution vulnerabilities affecting multiple SD-WAN products and the Cisco Smart Software Manager software. Unauthenticated attackers can remotely exploit buffer overflow and command injection bugs to execute arbitrary code or to run arbitrary commands on the underlying operating system of devices running vulnerable releases of SD-WAN and Cisco Smart Software Manager Satellite software.
Security in cloud environments is a far cry from securing on-premises infrastructure. To utilize Cloud Foundry effectively, DevOps, security, and R&D all have to understand the multi-tenant identity management service UAA, the Cloud Controller for directing the deployment of applications via REST API endpoints, and also the rules and best practices around service deployment.
The partnership will see both companies develop innovative smart container solutions for domestic and international freight markets powered by uCloudlink's core patented Cloud SIM technology which accelerates the development of the global container transportation industry. Under the Agreement, uCloudlink will provide CVITC customers with technological platforms such as container sharing operation, transport capacity e-commerce, and truck drop and haul e-operation platforms for domestic and cross-border transportation.
The report identifies common security, compliance and governance challenges impacting organizations undergoing cloud transformation. Part one of the study found most survey respondents plan to take a hybridised approach to their cloud infrastructure, with 59% of respondents saying they will reduce their on-premises infrastructure to some degree and increase public cloud deployments within the next 18-24 months.
So how do we solve this problem? It begins with a better vulnerability management system, a refocused commitment to cloud application security best practices and a realignment of our current security posture with the specific requirements of the cloud. Vulnerability assessments are conducted periodically to evaluate the existing security posture and help inform any necessary changes to the vulnerability management action plan.
Vendor revenue from sales of IT infrastructure products for cloud environments, including public and private cloud, increased 9.4% year over year in the third quarter of 2020, according to IDC. Investments in traditional, non-cloud, IT infrastructure declined -8.3% year over year in 3Q20. These growth rates show the market response to major adjustments in business, educational, and societal activities caused by the COVID-19 pandemic and the role IT infrastructure plays in these adjustments. Spending on public cloud IT infrastructure increased 13.1% year over year in 3Q20, reaching $13.3 billion.
How next-gen cloud SIEM tools can give critical visibility to companies for effective threat hunting
When the move to the cloud was dramatically exacerbated by companies rapidly shifting to remote work, these tools fell short of supplying clear visibility into multiple environments and technology layers. The need to quickly adapt and scale to the new reality provided the perfect opportunity to accelerate the push to cloud, but outdated traditional security information and event management tools are not able to efficiently collect and process the high volume of telemetry generated by the multiple cloud services adopted as part of this push.
Juniper Networks and Türk Telekom have announced completion of a groundbreaking new technology and commercial partnership to accelerate innovation in support of the Open RAN 5G ecosystem. An exclusive global licensing agreement with Netsia, a subsidiary of Türk Telekom Group company Argela in the USA, to transfer its leading-edge Radio Intelligent Controller technology to Juniper, including related source code and patents plus exclusive rights to develop and sell products and solutions that integrate with RIC. Permanent transfer of technical domain experts from Netsia to Juniper in support of RIC's integration into Juniper's product portfolio, further strengthening Juniper's Open RAN and 5G expertise.
Such attacks often occur when employees work remotely and use a mixture of personal and business devices to access cloud services. Organizations with remote workers who use cloud-based services are being warned of several recent successful cyberattacks against those services.