Search

1 to 4 of 4
Sort by

Blog Entry
Vulnerability Scanning for Images and Running Containers on Red Hat OpenShift with Vulnerability Advisor

Top vulnerabilities for containers include Misconfigurations Securing registry images Runtime threats And Vulnerability Advisor, addresses just that, a container-based vulnerability scan, with integrations with various image registries. Read more about this here -> ...



Blog Entry
IBM FlashSystems and Infrastructure as Code

Out in the field we are seeing more and more interest in using Automation. Automation has, of course, been around for some time. One of my first roles in IBM was working with GDPS (a family of services offerings for automation Disaster Recovery and Business Continuity in the Mainframe space,...

Ian Wright's profile image

Library Entry
BLOG ARCHIVE - Sept 2019 - GRC is everyone's business

GRC is everyone’s business September 26, 2019 | Written by: David Marmer In my May 2019 blog, “Has GRC Reached Its Tipping Point? Observations From The Front Lines” , I described a set of common patterns that are driving business initiatives in Governance, Risk &...

Laura Polak's profile image