News

Latest news about B2B cyber security >>> PR agencies: add us to your mailing list - see contact! >>> Book an exclusive PartnerChannel for your news!

Container security also offers attack surfaces
Container security also offers attack surfaces

Risk awareness, classic cyber security principles and specific countermeasures increase the security of data and processes. IT managers use their own container security or those provided by cloud service providers in order to set up agile and flexible applications and operate processes. Ultimately, however, containers are also executable applications and can be dangerous. Container host servers and registries extend the attack surface. Classic principles of IT security and an increased sensitivity to threats help to close emerging gaps. Containers in the cloud or on-premise containers - whether kept privately or provided via a cloud provider - offer hackers ...

Read more

Hackers: Best Practices for Security Orchestration
Hackers: Best Practices for Security Orchestration

Security Symphony Against Hackers: Best Practices for Security Orchestration. All security solutions should be integrated into one system to simplify administration. A comment from Tim Bandos, Chief Information Security Officer, Digital Guardian. There was a time when IT teams viewed it as bad practice to have two separate antivirus programs running on the same device. Most IT teams today use multiple security tools and solutions at the same time. However, there is a need for a technology that can combine the protection and security functions of these tools. This is where the security orchestration comes in ...

Read more