IBM wants you to encrypt everything with its new mainframe (Network World Security, Jul 17 2017)
IBM wants businesses to use its new z14 mainframe to encrypt pretty much everything — an approach to security it calls pervasive encryption….
How to handle risks of hypervisor hacking (Network World, Jul 20 2017)
Without hypervisors, digitalization, which has already irrevocably changed the way 21st Century business works, would be severely crippled. Therefore, most individuals and organizations willingly overlook the vulnerability of the hypervisor layer in modern systems because the benefits from virtualization are so overwhelming. But the vulnerabilities are real and ignoring them is foolhardy. Fortunately, the risks can be mitigated….
Integrating DevSecOps with Continuous Integration: why and what you need to know (AlgoSec Blog, Jul 06 2017)
Previously we’ve discussed how building security into DevOps processes at an early stage helps organizations maximize the speed and agility of application development, while minimizing the risks of problems and outages when the applications go live. Here, we will look at how security automation helps to speed up the practice of Continuous Integration (CI), which is a core element of DevOps….
Getting a Competitive Edge with a Microservices Based Architecture (Auth0 Blog, Jul 14 2017)
The need for application modernization is sweeping the software industry. It’s a challenge to know where to start, but Auth0 presents some quick wins that will get you on your way to modernization….
Software theft shows threat of mercenary hackers (Seattle Times, Jul 26 2017)
“They are essentially nonsanctioned espionage groups,” said Brian Wallace, the lead security data scientist for the Irvine, California-based company computer security company Cylance Inc. “The government doesn’t create them, they don’t own them….
Soon-to-launch communications network said to be ‘unhackable’ (Newser, Jul 25 2017)
In quantum cryptography, the key is sent ahead of the message, “embedded in particles of light,” per the BBC; if a hacker tries to grab those particles, they’re destroyed, and the sender and receiver will realize someone’s trying to access their info—meaning they won’t send the message….