Security News

In this Help Net Security podcast, Doug Dooley, Chief Operating Officer at Data Theorem, discusses serverless computing, a new area that both DevOps leaders and enterprise security leaders are...

Baffle, an advanced data protection company, announced it has released the first-to-market solution for data-centric protection of Amazon’s AWS Lambda, a pioneering serverless compute service. On...

Companies embracing DevOps and cloud to fuel digital transformation are increasingly turning to serverless computing, also known as ‘functions-as-a-service’ (FaaS), to shift resource-intensive...

Serverless computing is gaining momentum among developers. Software engineers are now able to build applications that deliver scale and business value without consideration for the complexity of...

Here’s an overview of some of last week’s most interesting news and articles: Repairnator bot finds software bugs, successfully submits patches Can a bot create valid, high-quality fixes for...

We have been accustomed to think about botnets as a network of compromised machines – personal devices, IoT devices, servers – waiting for their masters’ orders to begin their attack, but Protego...

Object Computing announced the first release candidate (RC1) for Micronaut, a new framework for building microservice and serverless applications. Micronaut was built by the same software...

Attivo Networks announced that the company has further enhanced its portfolio with deception techniques designed to detect and derail attacks targeting serverless applications in cloud and data...

Alcide announced a release of its Cloud Native Security Platform. Alcide’s platform provides granular visibility, control and security for a range of cloud-native environments, including...

A newly revealed attack could allow hackers to hijack serverless cloud computing functions to mine cryptocurrency at scale while you pay the bill.