Category Archives: News

Redstor extends protection of Kubernetes in AWS, unifies container backups

Read Time:40 Second

Data management and SaaS protection company Redstor has launched a new service aimed at transforming how managed and cloud service providers (MSPs and CSPs) protect Kubernetes environments in AWS. The firm has added support for Amazon Elastic Kubernetes (Amazon EKS), a managed container service for handling applications in the cloud or on-premises, giving partners the ability to scale customer backups and removing the need to rely on disparate, ununified solutions.

Extension unifies backups for container-based applications

Traditionally, backups are not designed for modern, container-based applications, forcing service providers to deploy separate Kubernetes solutions to backup not only applications, but configurations, Redstor said. With its new extension, the company seeks to unify such processes and eliminate the need to bolt together multiple solutions.

To read this article in full, please click here

Read More

Microsoft updates security applications for multicloud environments

Read Time:35 Second

In an effort to update its security applications for CSOs that are increasingly responsible for securing multicloud environments, Microsoft is releasing new visibility and control features for software, workloads, devices, and digital identities accessing or running on hybrid computing infrastructure.   

The updates, announced Wednesday, include the extension of Microsoft Defender for Cloud to support the Google Cloud Platform (GCP); a new version of the permissions management platform acquired from CloudKnox  in July 2021; enhanced data analysis and archiving features for Microsoft’s Sentinel SIEM (system information and event management)  application; as well as new identity management, compliance and payment capabilities for Azure and Azure Active Directory (AAD).

To read this article in full, please click here

Read More

Bypassing Apple’s AirTag Security

Read Time:35 Second

A Berlin-based company has developed an AirTag clone that bypasses Apple’s anti-stalker security systems. Source code for these AirTag clones is available online.

So now we have several problems with the system. Apple’s anti-stalker security only works with iPhones. (Apple wrote an Android app that can detect AirTags, but how many people are going to download it?) And now non-AirTags can piggyback on Apple’s system without triggering the alarms.

Apple didn’t think this through nearly as well as it claims to have. I think the general problem is one that I have written about before: designers just don’t have intimate threats in mind when building these systems.

Read More

Microsoft changes default settings to improve network security

Read Time:43 Second

Microsoft changes default settings for a variety of reasons, but some recent key changes will keep us safer from attacks, specifically ransomware. This includes blocking macros by default, limiting native tools used by attackers, and activating Credential Guard by default.

Blocking Office 365 macros

The first major change in an Office 365 default blocks internet macros by default. Launching malicious macros is a common way that attackers can gain access to computer systems and launch lateral attacks. Specially, Visual Basic Application obtained from the internet will be blocked by default. Setting this as the default will mean that you’ll be better protected. If you’ve downloaded macro-based templates from websites, mark these files as trusted and remove the “mark of the web” from the files to ensure that they continue to work.

To read this article in full, please click here

Read More