Link: Serverless Architectures: A Paradigm Shift in …

“One of the biggest security upsides to developing on serverless architectures is that organizations don’t have to deal with the daunting task of having to constantly apply security patches for the underlying operating system. These tasks are now in the domain of the serverless architecture provider.”

The rest – the application code – still needs to be secure. Of course.
Original source: Serverless Architectures: A Paradigm Shift in …

Link: Merrill Corporation alongside Leading Technology Companies, Launch New Category for M&A Professionals

“Merrill uses MongoDB technology to build horizontal applications on top of four key pillars: a secure repository, document collaboration, data and machine learning as well as analytics. Pivotal Cloud Foundry is used across all engineering stages – development, testing and production – with a focus on maximizing the microservices infrastructure that arranges the application into a suite of independently deployable, modular services. For security, identity and storage components Merrill DatasiteOne uses Microsoft Azure Key Vault, Azure Active Directory and Azure Storage.”
Original source: Merrill Corporation alongside Leading Technology Companies, Launch New Category for M&A Professionals

Link: “Do They Have AI?” or That Rant on AI in Security

‘It turns out that our AI analysts often use the phrase “AI” to mean “top techniques from the field of Artificial Intelligence” which today means “deep neural networks” (DNNs, shorthanded to “deep learning” by some), natural language processing, image recognition, etc (the latter probably use DNNs anyway).’
Original source: “Do They Have AI?” or That Rant on AI in Security

Link: Worldwide Spending on Security Solutions Forecast to Reach $91 Billion in 2018, According to a New IDC Spending Guide

“Worldwide spending on security-related hardware, software, and services is forecast to reach $91.4 billion in 2018, an increase of 10.2% over the amount spent in 2017.” Also, a breakdown of spending per industry and type of security product.
Original source: Worldwide Spending on Security Solutions Forecast to Reach $91 Billion in 2018, According to a New IDC Spending Guide

Link: Using VMware’s Harbor with PKS (and Why Kubernetes Needs a Container Registry)

“A container registry is the repository for all your container images. Since your core business applications are packaged into containers (built out of container images), you must protect these images just as you would any other important enterprise IT system. That’s where the image registry comes into play.”
Original source: Using VMware’s Harbor with PKS (and Why Kubernetes Needs a Container Registry)

Link: Aqua Extends Container Security Platform to Kubernetes, Cloud Services

“With Aqua 3.0, users can create fine-grained user access control roles and policies. Access to kubectl commands can be specified to particular users, and governed by Aqua’s scalable labeling format. The Kubernetes controls also provides the ability to block unapproved images from running across entire cluster, as well as the ability to control network traffic based on Kubernetes namespaces, clusters or deployments.”

Plus, some policy drift report making. Done with a sidecar.
Original source: Aqua Extends Container Security Platform to Kubernetes, Cloud Services

Link: Meltdown and Spectre underscore the ongoing need for infrastructure automation

“In the Cloud Foundry scenario, these are embodied by BOSH to automate the infrastructure resource, namely VMs, container clusters, virtual storage and networks, configuration and deployment and Concourse for the development pipeline. Together, these enable organizations to rapidly and consistently patch all applications using the PaaS environment. Together, these enable organizations to rapidly and consistently patch all applications using the PaaS environment.”
Original source: Meltdown and Spectre underscore the ongoing need for infrastructure automation