Cyberattack Pushback: NanoVMs Designing Defensively to Counter Threats
In 2021, relying on outdated technology to handle new and often extreme cybersecurity threats in a shifting landscape isn’t a comprehensive or viable strategy. With relentless and mounting cyberattacks part of daily reality, cutting-edge protection against them has never been needed more to maintain infrastructure safety, privacy, and maintain functioning supply chains.
In this episode of The View With Vizard, NanoVM CEO Ian Eyberg explains why the time to employ unikernels to make IT more secure has arrived. The video is below, followed by a transcript of the conversation.
Malware Focused on Container Technology and What Healthcare Should Know About Containers
In case you missed it, some of the latest malware is targeting container technology including the very popular Kubernetes. Considering the large number of healthcare vendors, this is an important topic to learn more about.
The Department of the Air Force has selected eight additional companies to compete for the
opportunity to develop, test and integrate new capabilities for the Advanced Battle
Management Systems (ABMS).
DevOps tooling seems to be in a never-ending state of self-transformation. The continuing
evolution of infrastructure and the tools that go with it are forever creating new
ecosystems. On the infrastructure side, we saw VMWare, Citrix and other companies bring to
market massive virtualization in the late ’90s and early ’00s.
Containers vs. Unikernels: An Apples-to-Oranges Comparison
I was asked recently to write a containers-versus-unikernels article, and I said, "Sure, but
it won’t be the article you think it is because I share Per Buer’s sentiment that unikernels
are not simply containers 2.0."
NanoVMs Announces First Plug and Play Unikernel Tool
NanoVMs, the industry leader in unikernel technology development and deployment, announces
the first unikernel tool for developers that loads any Linux application as a unikernel. The
tool, called "Ops" is simple to use, requires no complex coding or configuration and only
requires a simple command to execute.
Edge compute is springing up in the industrial and manufacturing sector at a fast clip -
after all what
company doesn’t want to increase its business efficiency or quicken its agility? Everything
from managing control over process in real-time to doing quality inspections with AI-based
systems, also in real-time, need to compute at the edge - not in the cloud.
As details emerged about the latest "massive data breach" — this time at the Marriott
International hotel chain — database experts and security technology executives speculated
on how it could have been avoided and reflected on what needs to change to prevent similar
data security lapses.
Whether it’s adopting cook and hold ovens that reduce energy costs or adopting food safety
management systems like Navitas, newer technology is being introduced to help restaurants
run more efficiently and of course produce more revenue.
As if e-commerce companies didn't have enough problems with transacting securely and
defending against things like fraud, another avalanche of security problems -- like
cryptojacking, the act of illegally mining cryptocurrency on your end servers -- has begun.
You'll Never Believe the Disruptive Innovation at VMworld
The days of massive, vendor-independent enterprise technology conferences like Comdex are
long gone. Today, all the action is at the big vendor shows, like Dell Technologies World,
IBM Think, CA World, and last week’s VMworld, to name a few.
When you apply for life insurance, you have to disclose whether or not you smoke and have
dangerous hobbies like skydiving. If you do, you’re at higher risk for premature death.
(But, please, by all means, enjoy!) However, if you want to live longer, you’re better off
avoiding high risk activities.
If you had trouble last fall checking your elected officials’ claims on Politifact or
streaming Homeland on Showtime Anytime, blame the cryptocurrency bubble. Hackers are
suddenly breaking into companies’ systems and websites to steal their computing power and
“mine” virtual currencies – slowing down all those computers’ day jobs.
Cryptojacking is becoming all the rage in the cybercrime world recently. Unlike ransomware,
criminals do not need to wait to get paid. As soon as their code hits your servers they
start generating cash. That cold hard cash made up of 1s and 0s.
New Breach Shows Hospitality Industry Susceptible to Cyberattacks
FastBooking, a Paris-based company that sells hotel booking software, was robbed of
customers’ personal information and credit card data. The company sent out emails last week
warning those affected among its 4,000 customers in 100 countries.
Data breaches are unfortunately becoming more and more common as the never-ending march
toward digital transformation carries on while picking up pace. No other sector is as
directly impacted by breaches than health care as medical records are considered an order of
magnitude more valuable than even credit cards.
DeferPanic secures $1.5M seed round to popularize unikernel concept.
We’ve all probably heard of containers and virtual machines by now. Virtualization enabled IT
to break down a single server into multiple machines. Containers allowed you take that
concept and make it even smaller. DeferPanic wants to take another step with a technology
called Unikernels. Today, the company announced its $1.5 million seed round.
Unikernel vs Containers - See the lightweight championship fight
The drive to minimize app hosting resources yielded unikernels and containers, the IT
equivalent of a tiny house and apartment. Containing only the barest essentials, unikernels
pose unique benefits and challenges.
GC On-demand - UNIKERNELS: The What, why and when. Chat with Ian Eyberg
What's the deal with unikernels?! We had Ian Eyberg of Defer Panic join us to talk about what
a unikernel is, why it's an important part of the overall IT strategy, and when you should
or should not use them. A great end-to-end discussion that will also open your eyes to new
ways of doing some interesting things!
There can be no doubt that the golden age of unikernels is fast approaching. Initially,
developers thought that using unikernels in production was something that was still five
years away, but companies are already beginning to use them in production today.