
Nebulon Red Hat Ansible Collection accelerates automation efforts for IT organizations
Nebulon announced it has developed a Red Hat Ansible collection for smartInfrastructure, which includes a set of modules that customers can use to integrate Nebulon …

Samba bug may allow code execution as root on Linux machines, NAS devices (CVE-2021-44142)
A critical vulnerability (CVE-2021-44142) in Samba, a widely used open source implementation of the Server Message Block (SMB) networking protocol, could allow attackers to …

PolKit vulnerability can give attackers root on many Linux distros (CVE-2021-4034)
A memory corruption vulnerability (CVE-2021-4034) in PolKit, a component used in major Linux distributions and some Unix-like operating systems, can be easily exploited by …

Red Hat OpenShift Data Science enables companies to solve critical business challenges
Red Hat released Red Hat OpenShift Data Science as a field trial, as well as an expanded partner ecosystem focused on this new cloud service offering. As leading artificial …

SynSaber appoints Mark Weatherford and Ali Golshan to its Advisory Board
SynSaber announced the appointment of distinguished cybersecurity leaders Mark Weatherford and Ali Golshan to its advisory board. With more than two decades of experience each …

Veritas InfoScale 8 provides storage optimization for stateful Kubernetes critical workloads
Veritas Technologies announced the next evolution of Veritas InfoScale that will enable customers to deploy InfoScale as containers in native Kubernetes platforms, including …

Aqua Security launches CNDR capabilities to detect patterns and respond with granular runtime controls
Aqua Security adds a new detection and response capability (CNDR) to its Cloud Native Application Protection Platform (CNAPP), using real-time behavioral indicators to …

Red Hat OpenStack Platform 16.2 helps organizations increase resilience at the edge
Red Hat launched Red Hat OpenStack Platform 16.2, the latest version of its agile cloud Infrastructure-as-a-Service (IaaS) platform. Designed to help organizations succeed in …
Veeam updates support for cloud adoption and data protection
Veeam Software announced the new update to its flagship product, Veeam Backup & Replication, as well as multiple updates to its product portfolio that deliver enhanced …
Tigera now supports Calico Open Source on Amazon EKS Anywhere
Tigera announced support for Calico Open Source, an open-source technology for container networking and security, on Amazon EKS Anywhere, giving users more freedom of choice. …
Stratasys ProtectAM helps safeguard sensitive information across DoD networked 3D printers
Stratasys introduced a new data security solution to enhance the cybersecurity of additive manufacturing as its role in government and defense applications grows larger and …
JFrog receives CNA certification to help security researchers verify and triage their vulnerabilities
JFrog announced it has been designated by the CVE Program as a CVE Numbering Authority (CNA). With this certification, JFrog joins an elite group of public and private sector …
Featured news
Resources
Don't miss
- Mastering the cybersecurity tightrope of protection, detection, and response
- PRevent: Open-source tool to detect malicious code in pull requests
- Darcula allows tech-illiterate crooks to create, deploy DIY phishing kits targeting any brand
- Hackers pose as employers to steal crypto, login credentials
- Unknown and unsecured: The risks of poor asset visibility