BT
Cloud Follow 280 Followers

Azure Virtual WAN and Azure Firewall Now in Public Preview

by Steef-Jan Wiggers Follow 7 Followers on  Jul 20, 2018

With Azure Virtual WAN and Azure Firewall, Microsoft will provide two new services to help customers modernise their network. The Azure Virtual WAN service will simplify large-scale branch connectivity, while with the Azure Firewall enterprises can enforce their security policies in the cloud. Both services are currently in public preview.

Development Follow 606 Followers

Spectre 1.1 and 1.2 Vulnerabilities Disclosed

by Sergio De Simone Follow 14 Followers on  Jul 15, 2018

Two new vulnerabilities exploiting flaws in CPUs speculative execution have been recently disclosed. Dubbed Spectre 1.1 and 1.2, both are variants of the original Spectre (Spectre-v1) vulnerability and leverage speculative stores to create speculative buffer overflows which can escape Spectre-v1 mitigations.

Development Follow 606 Followers

OpenID Loses Major Proponent, StackOverflow

by Jonathan Allen Follow 576 Followers on  Jul 11, 2018 3

OpenID has lost one of its largest proponents. Stack Exchange, the company behind StackOverflow and other Q&A websites, will be completely eliminating support for OpenID on July 25, 2018. This continues a long running trend of websites eliminating OpenID from their offerings.

Cloud Follow 280 Followers

AWS Config Gains Cross-Account, Cross-Region Data Aggregation

by Steffen Opel Follow 3 Followers on  Jun 30, 2018

Amazon Web Services (AWS) recently added the capability to aggregate compliance data produced by AWS Config rules across multiple accounts and/or regions to enable centralized auditing and governance of AWS resources. A new aggregated dashboard view displays non-compliant rules across the organization. Users can then drill down to view details about resources that are violating any rules.

Development Follow 606 Followers

TLBleed Can Leak Cryptographic Keys from CPUs Snooping on TLBs

by Sergio De Simone Follow 14 Followers on  Jun 26, 2018

A new side-channel vulnerability affecting Intel processors, known as TLBleed, can leak information by snooping on Translation Look-aside Buffers (TLBs), writes VUsec security researcher Ben Gras.

Development Follow 606 Followers

Lazy FP State Restore Vulnerability Affects Most Intel Core CPUs

by Sergio De Simone Follow 14 Followers on  Jun 18, 2018

Intel has disclosed a new vulnerability affecting most of its Core processors and making them targets for side-channel attacks similar to Spectre and Meltdown. The vulnerability, dubbed Lazy FP state restore (CVE–2018–3665), allows a process to infer the contents of FPU/MMX/SSE/AVX registers belonging to other processes.

Cloud Follow 280 Followers

Amazon Launches a New Cloud Security Service: AWS Firewall Manager

by Steef-Jan Wiggers Follow 7 Followers on  Apr 27, 2018

Amazon has launched a new service called AWS Firewall Manager, providing AWS customers a way to configure AWS Web Application Firewall rules across multiple accounts centrally. The AWS Firewall Manager is a part of Amazon’s recent launch of several services for security and compliance.

Development Follow 606 Followers

Intel Starts to Use GPUs for Malware Scanning

by Sergio De Simone Follow 14 Followers on  Apr 20, 2018

Intel has announced its new Thread Detection Technology (TDT), a set of silicon-based capabilities which use the processor GPU to scan memory for malware. This will free the CPU from that task and help mitigate the impact of defending against Spectre and Meltdown.

Cloud Follow 280 Followers

Amazon Launches AWS Secrets Manager to Securely Store, Distribute, and Rotate Credentials

by Steef-Jan Wiggers Follow 7 Followers on  Apr 20, 2018

Amazon announced the launch of the AWS Secrets Manager, which makes it easy for customers to store and retrieve secrets using an API or the AWS Command Line Interface (CLI). Furthermore, customers can rotate their credentials with built-in or custom Lambda functions. The AWS Secrets Manager enables users to centralize the management of secrets of distributed services and applications.

DevOps Follow 818 Followers

Chef Enhances Cloud Security Automation in InSpec 2.0

by Helen Beal Follow 6 Followers on  Feb 27, 2018

Continuous automation vendor, Chef, has announced the availability of InSpec 2.0, a new version of Chef’s free open source tool that enables DevOps and cross-functional application, infrastructure and security teams to express security and compliance rules as code and assess and remediate compliance issues through the entire software delivery life cycle.

Development Follow 606 Followers

Intel Joins the Race for Quantum Supremacy with a 49-Qubit Chip

by Sergio De Simone Follow 14 Followers on  Jan 12, 2018 1

At CES 2018, Intel CEO Brian Krzanich announced Intel successfully built a 49-qubit chip, which aims to allow researchers to improve error correction techniques and simulate computational problems.

Development Follow 606 Followers

Intel Found That Spectre and Meltdown Fix Has a Performance Hit of 0-21%

by Abel Avram Follow 9 Followers on  Jan 12, 2018

Microsoft, Red Hat and Intel have published their performance evaluation of the impact Meltdown and Spectre mitigation has on various systems.

DevOps Follow 818 Followers

Xen Hypervisor 4.10 Focuses on Security and Better ARM Support

by Hrishikesh Barua Follow 14 Followers on  Jan 01, 2018

The Xen Project released version 4.10 of their hypervisor with an improved architecture for x86, better support for ARM processor hardware updates, and changes to schedulers and the user interface.

DevOps Follow 818 Followers

Chef Extends OpsWorks Capabilities in AWS

by Helen Beal Follow 6 Followers on  Dec 06, 2017

Chef has announced new capabilities to address application lifecycle control concerns in containers in AWS. New functionality includes Chef Automate with integrated compliance and builds on AWS OpsWorks for Chef Automate announced in 2016. OpsWorks for Chef Automate provides a managed Chef server and suite of automation tools.

DevOps Follow 818 Followers

NIST Publishes Guidelines on Application Container Security

by Hrishikesh Barua Follow 14 Followers on  Dec 04, 2017

The National Institute of Standards and Technology (NIST) published a bulletin on application container technology and its most notable security challenges. The report is a summary of two previous bulletins outlining vulnerability areas including image, registry, orchestrator, container, host OS, and hardware, and their countermeasures.

Login to InfoQ to interact with what matters most to you.


Recover your password...

Follow

Follow your favorite topics and editors

Quick overview of most important highlights in the industry and on the site.

Like

More signal, less noise

Build your own feed by choosing topics you want to read about and editors you want to hear from.

Notifications

Stay up-to-date

Set up your notifications and don't miss out on content that matters to you

BT