Security News
Cloudalize announces a strategic partnership with Boston Limited to provide an in-house private cloud offering: Private GPU Cloud. This partnership brings together the expertise of Boston Limited in delivering data centre hardware solutions with the NVIDIA-powered Cloudalize Cloud Platform to provide a real alternative to traditional Virtual Desktop Infrastructure solutions, specifically for graphics visualisation use cases in architecture, engineering and construction, manufacturing and educational organizations.
Gigamon announced a partnership with Riverbed in support of the recent Gigamon Hawk launch. Hawk is the industry's elastic visibility and analytics fabric for all data-in-motion across the hybrid cloud.
"Yet as high-profile breaches like SolarWinds illustrate, the complexity of cloud environments makes rapid investigation and response extremely difficult since security analysts typically are not trained as cloud experts." "Cado Security solves for this with an elegant solution that automates time-consuming tasks like capturing forensically sound cloud data so security teams can move faster and more efficiently. The opportunity to help Cado Security scale rapidly is a terrific one for Blossom Capital."
The BazarLoader malware is leveraging worker trust in collaboration tools like Slack and BaseCamp, in email messages with links to malware payloads, researchers said. It's been recently seen being used as a staging malware for ransomware, particularly Ryuk.
Cado Security, provider of a cloud-native digital forensics platform, has secured $10 million in Series A funding, which brings the total amount raised by the company to date to $11.5 million. Founded in April 2020, the London, United Kingdom-based security firm helps enterprises investigate and respond to cyber-incidents in cloud environments.
Grid.ai announced the general availability of Grid, a new platform that enables researchers and data scientists to train AI models on the cloud at scale, from a laptop with zero code changes. The availability of Grid enables AI researchers, machine learning engineers, and data scientists to do development and training at scale without requiring advanced skills in machine learning engineering or MLOps engineering.
OpenText announced the release of OpenText Cloud Editions 21.2. OpenText Cloud Editions empower customers with choice, enabling them to run their software anywhere - off-cloud, in the private cloud, in the public cloud platform of choice, or through cloud API services.
Cybersecurity firm Securonix has announced a new level to its collaboration with AWS that will allow AWS customers to use Securonix security information and event management software without ever leaving their current AWS hosting solutions. Securonix describes the new collaborative product as a "Bring your own cloud" program "Providing customers with deployment options that are aligned with their cloud strategies, data retention requirements and overall business needs."
Aruba, a Hewlett Packard Enterprise company announced an expansive set of cross-portfolio edge-to-cloud security integrations for Aruba ESP. The new advancements include the integration of the ClearPass Policy Manager secure network access control platform with the Aruba EdgeConnect SD-WAN edge platform, formerly Silver Peak, the integration of Aruba Threat Defense with the EdgeConnect platform, and the expansion of the Aruba ESP multivendor security partner ecosystem, providing enterprise customers with the freedom to deploy, cloud-delivered secure access service edge security components of their choice. Since IoT devices are agentless, IT departments cannot install security clients or redirect device traffic to cloud security services; therefore, zero trust security must be applied at the WAN edge.
Threat Stack supports AWS Graviton2-based instances through the Threat Stack Cloud Security Platform
Threat Stack announced its ability to support AWS Graviton2-based instances through the Threat Stack Cloud Security Platform. The rapid adoption of AWS Graviton2 workloads presents a challenge for security leaders as many of today's legacy tools do not support it.