Search

1 to 5 of 5
Sort by

Blog Entry
Vulnerability Scanning for Images and Running Containers on Red Hat OpenShift with Vulnerability Advisor

Top vulnerabilities for containers include Misconfigurations Securing registry images Runtime threats And Vulnerability Advisor, addresses just that, a container-based vulnerability scan, with integrations with various image registries. Read more about this here -> ...

VEERAMANI NAMBI's profile image


Blog Entry
IBM FlashSystems and Infrastructure as Code

Out in the field we are seeing more and more interest in using Automation. Automation has, of course, been around for some time. One of my first roles in IBM was working with GDPS (a family of services offerings for automation Disaster Recovery and Business Continuity in the Mainframe space,...

Ian Wright's profile image

Library Entry
BLOG ARCHIVE - Sept 2019 - GRC is everyone's business

GRC is everyone’s business September 26, 2019 | Written by: David Marmer In my May 2019 blog, “Has GRC Reached Its Tipping Point? Observations From The Front Lines” , I described a set of common patterns that are driving business initiatives in Governance, Risk &...

Laura Polak's profile image

Blog Entry
How Patch Posture Reporting Improves Security Landscapes

Vulnerability identification and remediation are critical to maintaining a secure environment. Today, most organizations are using one or multiple vulnerability scanning tools to identify vulnerabilities on endpoints such as business critical servers, laptops and desktops. They also have...

I-Lung Kao's profile image