Security News

Univa, a leading innovator of enterprise-grade workload management and optimization solutions, announced the general availability of Navops Launch 2.0, its flagship cloud-automation platform, designed to help enterprises simplify the migration of HPC and AI workloads to their choice of cloud. The GA release helps enterprises easily extend HPC workloads to the cloud, boosting efficiency and productivity, and dramatically improving cloud ROI while reducing cloud-related spending by 30-40 percent.

Threat Stack, the leader in cloud security and compliance for infrastructure and applications, announced a partnership with Tevora, a specialized management consultancy focused on cybersecurity, risk, and compliance services. The Threat Stack Cloud Security Platform extends security observability across the cloud management console, host, containers, and application layers to help customers understand the full picture of their cloud environment, quickly respond to incidents, and proactively reduce risk.

61% of organizations in the U.S. and Canada are committed to moving enterprise applications to the cloud as quickly as possible, but many struggle with challenges related to company culture on the way to a successful cloud strategy, NTT DATA Services reveals. "Cloud adoption is critical to create a more agile, innovative business, but leaders must address cultural challenges to successfully modernize," said Emily Lewis-Pinnell, Vice President, Cloud and Application Transformation, NTT DATA Services.

Cybersecurity researchers at Check Point today disclosed details of two recently patched potentially dangerous vulnerabilities in Microsoft Azure services that, if exploited, could have allowed hackers to target several businesses that run their web and mobile apps on Azure. According to a report researchers shared with The Hacker News, the first security vulnerability is a request spoofing issue that affected Azure Stack, a hybrid cloud computing software solution by Microsoft.

Fastly, provider of an edge cloud platform, announced Cloud Optimizer, a new offering that enables critical, high-traffic content delivery by sitting between a company's content delivery network and its central cloud. Cloud Optimizer brings customers with multi-cloud or multi-CDN architectures, especially within commerce and high tech verticals, the real-time control and visibility required to make informed business decisions as quickly as possible, without the need to re-architect network infrastructure.

Compliance is putting pressure on how organizations manage privileged access on these systems, which are storing petabytes of user and customer data. The nature of Linux makes it very hard to understand who is in your cloud at any given moment - resulting in breach detection times of over 200 days.

San Francisco-based startup AppOmni has raised $10 million in Series A funding round led by ClearSky and supported by existing investors Costanoa Ventures, Silicon Valley Data Capital, and Twilio's COO George Hu. This brings the total raised by the firm to $13 million. The problem is the sheer volume of SaaS applications used by businesses - dozens for smaller companies and hundreds for the larger enterprises - all of which have different security controls sometimes with user manuals running to a hundred or more pages.

While these companies approve an average of 41 cloud services each, up 33 percent from last year, thousands of other services are used ad-hoc without vetting. 52 percent of companies use cloud services that have had user data stolen in a breach.

A leading digital authority and consulting company, has achieved the Data Analytics Specialization in the Google Cloud Premier Partner Program. This Partner Specialization affirms that SoftServe has demonstrated success turning large amounts of data into insights using Google Cloud Platform technology.

The U.S. National Security Agency has published advice on mitigating cloud vulnerabilities. The document provides four basic sections: an overview of the basic components usually delivered by cloud service providers; an explanation of the concept of shared responsibility; an analysis of the primary cloud threat actors; and an analysis and description of the main cloud vulnerabilities and their mitigations.