Results for Policy

Elastic Acquires Build.Security To Enhance Cloud-Native, Kubernetes Security

Elastic Security has its eye on cloud-native security enforcement, with the acquisition of Isreali startup build.security.  Once integrated, the offering will all the ability to enforce security actions on hosts, virtual machines, and containers orchestrated by Kubernetes.

Full Story >

IaC: Enabling Security in DevOps Workflows

Many DevOps projects now leverage Infrastructure as Code for efficient, accurate and repeatable outcomes. But, IaC can also present risks. Accurics’ Om Moolchandani shares the ways to use IaC for secure DevOps workflow - and how to avoid risk. 

Full Story >

Morpheus Data Updates Multi-Cloud Management Platform for Continuous Delivery

Morpheus Data’s latest platform can tackle various types of multi-cloud management to unify complex environments and automate workflows. The goal is to enable continuous delivery for developers using Kubernetes, VMware and Terraform.

Full Story >

Okta FastPass Brings Passwordless Logins to Reality

This year, the vision for passwordless authentication gets real as Okta rolls out FastPass context-driven login technology. IDN explores how it works with Okta’s Joe Diamond.

Full Story >

Tufin SecureCloud Automates Security, Policy Compliance for Cloud, Hybrid Environments

Tufin has rolled out a security policy automation solution to automate security and compliance for hybrid and cloud-native projects. The SecureCloud security policy automation service is for enterprises that need more visibility and control over cloud-native and hybrid cloud environments

Full Story >

2020 Set To Usher in a Rapid Pace of Cloud Compliance

Emil Sayegh, Ntirety President and CEO, says in the 2020s enterprises are at the convergence of two forces: The need to govern and protect data and the compelling cases for using the cloud. He shares with IDN how AI, ML and automation can improve cloud's ability to provide governance, security, and resilience.

Full Story >

Venafi Survey Finds Management, Auditing for Keys and Certificates Lags Usernames and Passwords

A recent survey by Venafi has shown that organizations are failing to protect keys and certificates as effectively as they do with usernames and passwords.  While 85% of security professionals have policies to govern password length for human identities, just over half govern keys for machine identities.

Full Story >

Splunk Continues To Expand Its Adaptive Response Initiative To Detect, Battle CyberThreats Faster

As cyber threats become more sophisticated, headline-grabbing security point solutions just can’t handle the speed and complexity of diagnosing and fighting off the attacks.  In response, Splunk continues to recruit vendor partners and domain experts to its Adaptive Response Initiative. IDN looks at the latest additions.

Full Story >

<< Start < Previous 1 Next > End >>
Showing 1 - 8 of 8

Videos

Addressing Investment Decisions for SOA, IT, and the Business



  • Robert Laird - Enterprise Architect SOA Governance and Policy