Qualys recently found not one, not two, not three but literally five vulnerabilities inside of a tool that is installed on every single ubuntu server by default that leads to direct privilege escalation.
Applications have been tied to the operating system for as long as we can remember. And why shouldn't they be? The operating system is after all the way applications can interface with the underlying harware. Something has to talk to the disk and the network card. The end user has to interact with the end application via the keyboard or the monitor right?
On July 1st NanoVMs announced it had been selected to work on the Phase II of a DARPA (Defense Advanced Research Projects Agency) program related to unikernels.
Zero trust is the concept that external or internal to a given network you simply can't trust anything anymore. This is for good reason when you see statistics claiming that insider threats account for nearly 75 percent of all data breaches.
NanoVMs, the industry leader in unikernel technology development and deployment, announces the first unikernel tool for developers that loads any Linux application as a unikernel.
Public cloud services -- Amazon AWS, Google Cloud, IBM Cloud, Microsoft Azure, offer the simplicity and convenience of CapEx-less buy-as-you-go/as-you-need compute and storage. However, in return, you have to accept some limitations, notably, sacrificing some degrees of control.
What a crazy few weeks it has been. Marriott started it off with the announcement that over 500M records had been stolen from its database and worse - they know the attackers were in their systems for up to 4 years which was during an acquisition and even after the prior year when they found a RAT (remote access trojan).
Supporting your organization's computing requirements "at the edge" -- away from the corporate office or data center -- has always faced challenges. "Big data" generated by IoT devices and other sources can often overwhelm even broadband connections to distant cloud centers -- and many "edge sites" have little or no connectivity.
Are unikernels unfit for production? Are unikernels completely undebuggable? There are so many unsubstantiated claims being made about ‘debugging unikernels’ that I feel I need to address some of them.
Many people have heard of the security advantages of unikernels. These commonly get boiled down to "it’s a smaller attack surface." Unfortunately, that does little justice to the true security implications of running your software as unikernels. So let’s revisit what the unikernel four point security model actually is.
Security does not have to be the nightmare it is. You've got better things to do than dealing with VM sprawl. Show everyone how you were responsible for halving the infrastructure budget. Be the winner!
Schedule a Demo