Skip to content
Linkedin-in Envelope Map-marker-alt
×
  • Italiano
  • Inglese
SecurityIT | Consulenza Sulla Sicurezza Informatica
 
  • La società
    • Chi siamo
    • Il team
    • La cultura dei valori
    • Mission
    • Azienda Certificata Iso
  • Formazione
    • Elenco corsi
  • Cyber security
    • Penetration test
    • Consulenza ISO/IEC 27001
    • Privacy
    • Vulnerability assessment
    • PCIDSS
    • Business continuity management e disaster recovery
    • Code security review
    • Mobile protection
    • Servizi di cyber threat intelligence
    • Analisi forense e investigazione
    • Social media Security
  • SOC
  • INTEGRAZIONI SISTEMI
    • Soluzioni
  • News
  • Contatti
×
  • La società
    • Chi siamo
    • Il team
    • La cultura dei valori
    • Mission
    • Azienda Certificata Iso
  • Formazione
    • Elenco corsi
  • Cyber security
    • Penetration test
    • Consulenza ISO/IEC 27001
    • Privacy
    • Vulnerability assessment
    • PCIDSS
    • Business continuity management e disaster recovery
    • Code security review
    • Mobile protection
    • Servizi di cyber threat intelligence
    • Analisi forense e investigazione
    • Social media Security
  • SOC
  • INTEGRAZIONI SISTEMI
    • Soluzioni
  • News
  • Contatti
SecurityIT | Consulenza Sulla Sicurezza Informatica
 
  • La società
    • Chi siamo
    • Il team
    • La cultura dei valori
    • Mission
    • Azienda Certificata Iso
  • Formazione
    • Elenco corsi
  • Cyber security
    • Penetration test
    • Consulenza ISO/IEC 27001
    • Privacy
    • Vulnerability assessment
    • PCIDSS
    • Business continuity management e disaster recovery
    • Code security review
    • Mobile protection
    • Servizi di cyber threat intelligence
    • Analisi forense e investigazione
    • Social media Security
  • SOC
  • INTEGRAZIONI SISTEMI
    • Soluzioni
  • News
  • Contatti
×
  • La società
    • Chi siamo
    • Il team
    • La cultura dei valori
    • Mission
    • Azienda Certificata Iso
  • Formazione
    • Elenco corsi
  • Cyber security
    • Penetration test
    • Consulenza ISO/IEC 27001
    • Privacy
    • Vulnerability assessment
    • PCIDSS
    • Business continuity management e disaster recovery
    • Code security review
    • Mobile protection
    • Servizi di cyber threat intelligence
    • Analisi forense e investigazione
    • Social media Security
  • SOC
  • INTEGRAZIONI SISTEMI
    • Soluzioni
  • News
  • Contatti

Categoria: container

  1. Home
  2. container

Edera Banks $15M for Kubernetes Workload Isolation Tech

Seattle startup building technology to mitigate lateral movement and block “living off the land” techniques wins interest from investors.

The post Edera Banks $15M for Kubernetes Workload Isolation Tech appeared first on SecurityWeek.

Kubernetes Container Isolation Startup Edera Raises $5 Million

Edera has raised $5 million in seed funding to help organizations secure Kubernetes containers and AI workloads.

The post Kubernetes Container Isolation Startup Edera Raises $5 Million appeared first on SecurityWeek.

Chainguard Raises $140 Million, Expands Tech to Secure AI Workloads

Software supply chain security startup Chainguard raises a $140 million Series C round that values the company at $1.2 billion.

The post Chainguard Raises $140 Million, Expands Tech to Secure AI Workloads appeared first on SecurityWeek.

‘Leaky Vessels’ Container Escape Vulnerabilities Impact Docker, Others 

Snyk discloses information on Leaky Vessels, several potentially serious container escape vulnerabilities affecting Docker and others.

The post ‘Leaky Vessels’ Container Escape Vulnerabilities Impact Docker, Others  appeared first on SecurityWeek.

Aqua Security Scores $60M Series E Funding

Late-stage player in the CNAPP space secures a $60 million extended Series E funding round at a valuation north of $1 billion.

The post Aqua Security Scores $60M Series E Funding appeared first on SecurityWeek.

Researchers Discover Dangerous Exposure of Sensitive Kubernetes Secrets

researchers-discover-dangerous-exposure-of-sensitive-kubernetes-secrets

Researchers at Aqua call urgent attention to the public exposure of Kubernetes configuration secrets, warning that hundreds of organizations are vulnerable to this “ticking supply chain attack bomb.”

The post Researchers Discover Dangerous Exposure of Sensitive Kubernetes Secrets appeared first on SecurityWeek.

Supply Chain Startup Chainguard Scores $61 Million Series B

supply-chain-startup-chainguard-scores-$61-million-series-b

Washington startup Chainguard banks $61 million in new financing as investors make hefty wagers on software supply chain security companies.

The post Supply Chain Startup Chainguard Scores $61 Million Series B appeared first on SecurityWeek.

Google Releases Open Source Bazel Plugin for Container Image Security

google-releases-open-source-bazel-plugin-for-container-image-security

Google announces the general availability of ‘rules_oci’ Bazel plugin to improve the security of container images.

The post Google Releases Open Source Bazel Plugin for Container Image Security appeared first on SecurityWeek.

SecurityIT | Consulenza Sulla Sicurezza Informatica
Linkedin-in Envelope Map-marker-alt

Il gruppo

  • La società
  • Azienda Certificata Iso
  • Chi siamo
  • Il team
  • La cultura dei valori
  • Mission
×
  • La società
  • Azienda Certificata Iso
  • Chi siamo
  • Il team
  • La cultura dei valori
  • Mission

Servizi

  • Servizi di consulenza informatica
  • Social media Security
  • Analisi forense e investigazione
  • Servizi di cyber threat intelligence
  • Mobile protection
  • Code security review
  • Business continuity management e disaster recovery
  • Payment card industry data security standard
  • Consulenza vulnerability assessment
  • Consulenza informatica in ambito privacy
  • Consulenza ISO/IEC 27001
  • Penetration test
×
  • Servizi di consulenza informatica
  • Social media Security
  • Analisi forense e investigazione
  • Servizi di cyber threat intelligence
  • Mobile protection
  • Code security review
  • Business continuity management e disaster recovery
  • Payment card industry data security standard
  • Consulenza vulnerability assessment
  • Consulenza informatica in ambito privacy
  • Consulenza ISO/IEC 27001
  • Penetration test
© show.it | Tutti i diritti riservati | P.Iva 06984320017 | Privacy Policy | Cookie Policy | Realizzato da incio.it