Security News

VMware and NVIDIA announced a broad partnership to deliver both an end-to-end enterprise platform for AI and a new architecture for data center, cloud and edge that uses NVIDIA DPUs to support existing and next-generation applications. Through this collaboration, the rich set of AI software available on the NVIDIA NGC hub will be integrated into VMware vSphere, VMware Cloud Foundation and VMware Tanzu.

Oracle announced that Rescale's cloud HPC simulation platform is now available on Oracle Cloud Infrastructure. The Rescale cloud HPC platform, built on a powerful high-performance computing infrastructure, seamlessly matches software applications with the best cloud or on-premises architecture to run complex data processing and simulations.

Success in the digital economy requires organizations to move beyond a traditional, cost-sensitive view of infrastructure and adopt a broader recognition that a responsive, scalable, and resilient cloud-centric infrastructure will help drive revenue while aligning technology adoption and IT operational governance with positive business outcomes. The transition to a cloud-centric digital infrastructure, which is already underway within many organizations, depends upon commitment to a digital strategy accompanied by a new set of key performance indicators focused on resource optimization, consistent resilience, and continual enhancement.

Workers - and the tech and security teams that support them - had to "Improvise" just to keep organisations operating at all, meaning security was, for some perhaps, an afterthought. Our friends at cloud native security experts ExtraHop have identified ten key threats any security pro should be aware of, and the techniques to tackle them, and they'd love to share them with you.

The GAIA-X Initiative announced that it is one step closer to its goal of a trustworthy, sovereign digital infrastructure for Europe, with the official signing of incorporation papers for GAIA-X AISBL, a non-profit association that will take the project to the next level. "We are deeply motivated to meet the challenges of the European digital economy," said Servane Augier, COO at 3DS OUTSCALE. "Through GAIA-X, we are building, all together, a sovereign and reliable digital infrastructure and an ecosystem for innovation in Europe. In this way, we will strengthen the digital sovereignty of businesses, research and education, governments and society as a whole."

A team at Temple University in Philadelphia has been tracking worldwide ransomware attacks on critical infrastructure, and anyone can request access to the data. An analysis of the data currently shows that government facilities were the most targeted type of critical infrastructure - followed at a distance by education and healthcare - and Maze was the most common ransomware strain.

Kublr and cloudtamer.io integrate their platforms to offer budget tracking across any infrastructure
As the COVID pandemic drives large enterprises to lean heavily on cloud computing solutions to enable their global workforce, Kublr and cloudtamer.io jointly announced an integration between their respective platforms to help customers better manage their cloud-native and container-based IT infrastructure. Cloudtamer.io provides a multi-cloud governance solution to make cloud account management, budget enforcement, and continuous compliance simpler for public and private sector organizations of all sizes.

Accurics unveiled a major upgrade to Terrascan, the open source static code analyzer that enables developers to build secure infrastructure as code. The new Terrascan architecture leverages the Open Policy Agent engine from CNCF, which dramatically simplifies policy definition for developers that want to create custom policies as well as provides over 500 out-of-the-box policies for the CIS Benchmark.

Red Hat OpenShift 4.5, which includes the general availability of OpenShift Virtualization, is designed to help organizations break down application barriers between traditional and cloud-native infrastructure and extend control over distributed resources. Red Hat OpenShift now includes OpenShift Virtualization, a new platform feature that enables IT organizations to bring standard VM-based workloads to Kubernetes, helping eliminate the workflow and development silos that typically exist between traditional and cloud-native application stacks.

Cybersecurity researchers have discovered critical vulnerabilities in industrial VPN implementations primarily used to provide remote access to operational technology networks that could allow hackers to overwrite data, execute malicious code, and compromise industrial control systems. A new report published by industrial cybersecurity company Claroty demonstrates multiple severe vulnerabilities in enterprise-grade VPN installations, including Secomea GateManager M2M Server, Moxa EDR-G902, and EDR-G903, and HMS Networks eWon's eCatcher VPN client.