article thumbnail

IBM to Acquire Cloudant: Open, Cloud Database Service Helps Organizations Simplify Mobile, Web App and Big Data Development

CTOvision

The following press release announces IBM’s intent to Acquire Cloudant: ARMONK, N.Y. – 24 Feb 2014: IBM (NYSE: IBM ) today announced a definitive agreement to acquire Boston, MA-based Cloudant, Inc., Cloudant could not have found a better home than IBM.” – bg. Financial terms were not disclosed.

IBM 268
article thumbnail

Why you must extend Zero Trust to public cloud workloads

CIO Business Intelligence

However, it has also introduced new security challenges, specifically related to cloud infrastructure and connectivity between workloads as organizations have limited control over those connectivity and communications. 3 We have seen an increase of 15% in cloud security breaches as compared to last year. 8 Complexity.

Cloud 134
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Technology Short Take #56

Scott Lowe

Russell Bryant has a couple great articles on OVN— how to test OVN’s “EZ Bake” release with DevStack as well as an article on implementing OpenStack security groups using OVN ACLs (which in turn leverage the integration between Open vSwitch and the Linux kernel’s conntrack module). More on Clair from TechCrunch here.).

Vmware 60
article thumbnail

Liveblog: DockerCon 2015 Day 2 General Session

Scott Lowe

Additionally, Docker is working to improve the security of Docker Hub (this is probably a reflection of the recent study pointing out the number of images that have security flaws) through a variety of mechanisms. Decrease time for security review. On-premise registry. Networking. Directory integration. million downloads).

article thumbnail

The Hacker Mind Podcast: Bug Bounty Hunters

ForAllSecure

In this episode, Stok talks about his beginnings in enterprise security and his transition into the top tier of bug bounty hunters. Vamosi: Like a lot of us, information security wasn’t necessarily our first line of work. I started to do that, this is the mid-area between everybody running IBM stuff into the custom computer.

article thumbnail

The Hacker Mind Podcast: Bug Bounty Hunters

ForAllSecure

In this episode, Stok talks about his beginnings in enterprise security and his transition into the top tier of bug bounty hunters. Vamosi: Like a lot of us, information security wasn’t necessarily our first line of work. I started to do that, this is the mid-area between everybody running IBM stuff into the custom computer.

article thumbnail

The Hacker Mind Podcast: Bug Bounty Hunters

ForAllSecure

In this episode, Stok talks about his beginnings in enterprise security and his transition into the top tier of bug bounty hunters. Vamosi: Like a lot of us, information security wasn’t necessarily our first line of work. I started to do that, this is the mid-area between everybody running IBM stuff into the custom computer.