Security News
A Zerto survey reveals a major disconnect in data protection strategies across enterprises with 75% believing container-based applications can be backed up the same way as individual applications are backed up. "The research findings underline the need for organizations to adopt container-native data protection technologies that are integrated into the application deployment lifecycle from the inception, so applications are born protected and remain that way. This equates to less work for developers and consistency in protection of containerized applications, which will need to adhere to business requirements."
VMware and NVIDIA announced a broad partnership to deliver both an end-to-end enterprise platform for AI and a new architecture for data center, cloud and edge that uses NVIDIA DPUs to support existing and next-generation applications. Through this collaboration, the rich set of AI software available on the NVIDIA NGC hub will be integrated into VMware vSphere, VMware Cloud Foundation and VMware Tanzu.
Oracle announced that Rescale's cloud HPC simulation platform is now available on Oracle Cloud Infrastructure. The Rescale cloud HPC platform, built on a powerful high-performance computing infrastructure, seamlessly matches software applications with the best cloud or on-premises architecture to run complex data processing and simulations.
Success in the digital economy requires organizations to move beyond a traditional, cost-sensitive view of infrastructure and adopt a broader recognition that a responsive, scalable, and resilient cloud-centric infrastructure will help drive revenue while aligning technology adoption and IT operational governance with positive business outcomes. The transition to a cloud-centric digital infrastructure, which is already underway within many organizations, depends upon commitment to a digital strategy accompanied by a new set of key performance indicators focused on resource optimization, consistent resilience, and continual enhancement.
Workers - and the tech and security teams that support them - had to "Improvise" just to keep organisations operating at all, meaning security was, for some perhaps, an afterthought. Our friends at cloud native security experts ExtraHop have identified ten key threats any security pro should be aware of, and the techniques to tackle them, and they'd love to share them with you.
The GAIA-X Initiative announced that it is one step closer to its goal of a trustworthy, sovereign digital infrastructure for Europe, with the official signing of incorporation papers for GAIA-X AISBL, a non-profit association that will take the project to the next level. "We are deeply motivated to meet the challenges of the European digital economy," said Servane Augier, COO at 3DS OUTSCALE. "Through GAIA-X, we are building, all together, a sovereign and reliable digital infrastructure and an ecosystem for innovation in Europe. In this way, we will strengthen the digital sovereignty of businesses, research and education, governments and society as a whole."
A team at Temple University in Philadelphia has been tracking worldwide ransomware attacks on critical infrastructure, and anyone can request access to the data. An analysis of the data currently shows that government facilities were the most targeted type of critical infrastructure - followed at a distance by education and healthcare - and Maze was the most common ransomware strain.
Kublr and cloudtamer.io integrate their platforms to offer budget tracking across any infrastructure
As the COVID pandemic drives large enterprises to lean heavily on cloud computing solutions to enable their global workforce, Kublr and cloudtamer.io jointly announced an integration between their respective platforms to help customers better manage their cloud-native and container-based IT infrastructure. Cloudtamer.io provides a multi-cloud governance solution to make cloud account management, budget enforcement, and continuous compliance simpler for public and private sector organizations of all sizes.
Accurics unveiled a major upgrade to Terrascan, the open source static code analyzer that enables developers to build secure infrastructure as code. The new Terrascan architecture leverages the Open Policy Agent engine from CNCF, which dramatically simplifies policy definition for developers that want to create custom policies as well as provides over 500 out-of-the-box policies for the CIS Benchmark.
Red Hat OpenShift 4.5, which includes the general availability of OpenShift Virtualization, is designed to help organizations break down application barriers between traditional and cloud-native infrastructure and extend control over distributed resources. Red Hat OpenShift now includes OpenShift Virtualization, a new platform feature that enables IT organizations to bring standard VM-based workloads to Kubernetes, helping eliminate the workflow and development silos that typically exist between traditional and cloud-native application stacks.