cloud security Archives - HyTrust

cloud security

HyTrust and Intel Ease Integration of Trusted Compute

Hardware-based cloud security solutions provide a higher level of protection as compared to software only security measures. Unfortunately the industry has found adopting and deploying hardware based security technologies on a broad scale challenging due to the lack of solution integration and deployment tools available. To overcome these challenges, Intel created the Intel® Security Libraries […]

Read More

Security as Code

There is a digital transformation underway in how applications are being built and released/delivered to production. This is primarily propelled by the success of the DevOps paradigm and the cloud native technologies such as Containers & Microservices. Many organizations are now able to release software more frequently and efficiently and there are many that deliver […]

Read More

Securing the Control Plane

Infrastructure Security is primarily comprised of the following: Control Plane Security Endpoint Security Network Security Control Plane Security: The focus of this blog post is around securing the management platforms used for provisioning the compute/network/storage infrastructure. The various business applications/services run on the infrastructure provisioned using management platforms. As customers adopt a multi-cloud strategy they […]

Read More

Rich Deployment Control Policies For Kubernetes

In our previous blog, we outlined the following three categories of container security: Image assurance Infrastructure security Runtime security In this article we dive deeper into the rich capabilities in our HyTrust Cloud Control (HTCC) product version 6.0 for securing the deployment of containers in a Kubernetes environment. Deployment Control is all about securing ‘what’ […]

Read More

The Three Categories of Container Security

Overview When it comes to securing containers one has to consider a holistic approach. Besides the security and integrity of the images one needs to ensure the container infrastructure i.e the container management system such as Kubernetes orchestrator and the virtual machines or hosts where the orchestrator is running are properly secured. Even though the […]

Read More

Think You Checked the Encryption Box with SEDs? Think Again!

In case you missed it, last week a team of researchers from Radboud University in the Netherlands discovered a serious flaw in self-encrypting drives (SEDs). Luckily, it only affects drives from two manufacturers, Crucial and Samsung.  They accomplished this task spending less than 100 Euros, by reverse engineering the firmware of the drives.  You can […]

Read More

Avoid Becoming the Next Data Breach Victim

In the last year, some of the biggest companies in the world were plagued by equally massive data breaches – making it clear that organizations and IT teams of all sizes are in need of security reform. Only by implementing stronger security measures and policies can organizations prevent devastating security events from continuing to take […]

Read More

Four Data Crimes You Don’t Need to Commit

Picture a crime scene after a break-in. The images in your mind might include broken windows, shattered glass and signs of a struggle. Does that vision change if you learn the break-in took place virtually, affecting the contents of a data center – instead of a home? When a data breach occurs, there’s no physical […]

Read More

It’s Virtually Impossible to Write a $100 Check

Stop and think what it takes at your company for someone to write a $100 check from the company checkbook. It doesn’t seem like a lot but there are controls in place to make sure that it is not easy to write that $100 check, controls meant to protect the company from fraud, theft and […]

Read More
We have placed cookies on your device to help make this website better. By continuing to use this website you agree to our Cookie Policy.