Security

SecurityTrendMicro

Security In A DevOps World

Credit to Author: Mark Nunnikhoven (Vice President, Cloud Research)| Date: Wed, 13 Jun 2018 16:44:37 +0000

Security-focused Definition of DevOps

[Originally presented at the Gartner Security & Risk Management Summit 2018, “Security In A DevOps World” examines the challenges and benefits of integrating security technology and thinking into the development process at the early stages. The slides are designed to assist in the presentation of the material but they also might come in handy as…

The post Security In A DevOps World appeared first on .

Read More
SecurityTrendMicro

Extending Trend Micro’s Container Protection with Deep Security Smart Check

Credit to Author: David Clement| Date: Wed, 13 Jun 2018 13:42:51 +0000

While DevOps is not a single person or business unit, it is a development philosophy that exists within many organizations.  DevOps teams are prime to build new applications for business growth, and help facilitate the extension of critical monolithic applications into modern architectures. A key tenant of this philosophy is microservices which is an application…

The post Extending Trend Micro’s Container Protection with Deep Security Smart Check appeared first on .

Read More
SecurityTrendMicro

Securing Containers at Scale: Amazon EKS, Amazon ECS and Deep Security Smart Check

Credit to Author: Wendy Moore| Date: Wed, 13 Jun 2018 12:00:30 +0000

Containers present a new opportunity for teams. An opportunity to deploy faster, more consistently, and with a simplicity rarely seen. But in order to make that happen a lot of infrastructure needs to be setup ahead of time. A cluster of hosts for the container runtime, an orchestration layer, and—of course—security throughout. To simplify this…

The post Securing Containers at Scale: Amazon EKS, Amazon ECS and Deep Security Smart Check appeared first on .

Read More
ComputerWorldIndependent

Apple bans cryptocurrency mining apps on iOS to protect mobile users

Credit to Author: Lucas Mearian| Date: Tue, 12 Jun 2018 12:36:00 -0700

Using an iPad or iPhone to mine bitcoin or other cryptocurrencies would be hard to do, as the CPU power available to complete the task would be a drop in the bucket compared to what’s needed.

But using a portion of the CPU power from thousands of iPads or iPhones to mine cryptocurrency makes more sense – and that’s exactly what some malware has been doing.

Apple is now moving to stop the practice.

[ Further reading: The way blockchain-based cryptocurrencies are governed could soon change ]

To read this article in full, please click here

Read More