We'll respond shortly.
Data breaches and regulatory concerns have increased the need for companies to protect sensitive data, and this applies to big data as well. For large data warehouses and data science platforms, like Pivotal Greenplum, the same security concerns apply. In this post, Pivotal Greenplum experts Scott Kahler and Ian Redzic explain how Protegrity’s encryption works in the context of Pivotal Greenplum.
How up-to-date are your application environments? When's the last time you updated the operating system or loaded the latest Java runtime? If your team is like most, the answer is "not often enough." The Pivotal Web Services (PWS) team has come up with a new, built-in service for PWS users that uses Concourse continuous integration pipelining and buildpacks to automatically update known environments as quickly as the patches are made available, helping to curtail vulnerability for security breaches in your apps.
Often the needs of developers clash with the fiscal responsibilities of budget owners. Developers want to move quickly, acquiring their resources as fast as possible and moving onto addressing the software needs for the business. Meanwhile, those with fiscal responsibility are looking to safeguard spend and want to ensure those resources are used efficiently. How do we best handle that tension? What capabilities exist within Pivotal Cloud Foundry® (PCF) to help with this? In this episode, host Simon Elisha explores these concepts and recommends best practices for handling it effectively.
In this post, Pivotal’s Cloud Native expert, Michael Coté, recaps a recent post he wrote in FierceDevOps. While compliance, security, and audits are very annoying processes for many development teams, there are good reasons these controls are put in place. The good news is, cloud application platforms can actually help make these processes better for everyone.
In this series of blog posts, Pivotal’s Jin Yu and Anirudh Kondaveeti discuss how data science techniques can be used to detect network security threats. This post introduces the use of graph mining techniques to discover suspicious domain interaction structures, which may not necessarily be captured in sequential patterns. Specifically, we are interested in detecting highly connected domain social networks to flag potential coordinated attacks such as watering hole attacks and also small isolated networks that resemble a botnet-like structure.
One of the great things about Pivotal Cloud Foundry® (PCF) is how easy it is for 3rd parties to add in new capabilities. In particular, by using the Operations Manager to easily import, install and expose new services to users of the platform. In this episode, host Simon Elisha look at some of the new services available including products for source control, artifact repositories, log management and more.
We are pleased to announce the general availability of the Pivotal Single Sign-On service for Pivotal Cloud Foundry. This service allows applications running on Pivotal Cloud Foundry to integrate with enterprise identity providers for authentication and SSO with extraordinary simplicity.
As malware techniques continue to evolve, it becomes increasingly challenging to detect network security threats, especially Advanced Persistent Threats (APTs) that are orchestrated by sophisticated adversaries. An increasingly common strategy adopted by APT actors to carry out targeted attacks is the watering hole technique. Watering hole attacks target a group of users in an organization by infesting the websites that are most often visited by these users. In this blog post, Anirudh Kondaveeti and Jin Yu discuss the application of sequential pattern mining to detect coordinated network attacks such as watering hole attacks.
A platform is only useful to developers if it is kept up to date. This week, host Simon Elisha updates us on the new features and capabilities in the PCF 1.4 release. Goodies include logging changes, security updates, AutoScaling and many more.