The massive hack’s scope keeps growing. Unlike the SolarWinds exploit, this one can be automated. | | In an interview on The Data Center Podcast, Ed Ansett, of i3 Solutions, says business drivers alone won’t be enough. | | To help Linux maintainers stay ahead of the black hats, Google has funded two full-time Linux security developers. | | Its platform includes secure components, such as code and open source libraries, to develop so-called cloud-native applications. | | |
|
|