Skip to main content

Introducing Real-Time CWPP for Amazon ECS Fargate

Containers are popular because they are easy to build, test, and operate across a wide variety of infrastructure. Increasingly, serverless infrastructure services like AWS Fargate are preferred for containerized workload operations, because they allow organizations to focus their resources on innovation, while outsourcing the infrastructure management to their cloud service provider.

In this blog post, learn about SentinelOne’s Singularity Cloud Workload Security (CWS) for Serverless Containers, a real-time cloud workload protection platform (CWPP) for containerized workloads, running on AWS Fargate for Amazon ECS and Amazon EKS. Powered by AI, CWS detects runtime threats like ransomware, zero-days, and fileless exploits in real-time, and streamlines machine-speed response actions.

The Challenge | Maintaining Cloud Workload Availability

Organizations of all sizes increasingly deploy containerized cloud workloads to serverless infrastructure services such as AWS Fargate. Whether running on Amazon ECS (Elastic Container Service) or Amazon EKS (Elastic Kubernetes Service), these ephemeral workloads, although short-lived, still represent a vulnerable attack surface. Automated runtime attacks can exploit vulnerabilities and spread in seconds. Simply examining configurations is insufficient when machine-speed attacks threaten to disrupt cloud operations in seconds. Therefore, they require real-time threat detection and response, to stop the spread and maintain the integrity and availability of cloud workloads.

Moreover, short-lived workloads can challenge incident response (IR) procedures unless there is a forensic data record of workload telemetry for IR specialists to follow. Here again, agentless inspection falls short. Only an agent can serve as the flight data recorder of workload telemetry. These are two of the primary value propositions of a CWPP agent: real-time threat detection and response, and a forensic record of workload telemetry.

However, serverless infrastructure services restrict or prohibit access to the underlying infrastructure. This constraint necessitates an agent architecture tailored to the specific use case of containerized workloads running on serverless infrastructure.

Continue reading

Data center construction challenges can be avoided

Data center project success relies on continuous collaboration between the MEP contractors, general contractors, engineers, and owners.

Microsoft data center coming to northwest Indiana

Microsoft, headquartered in Redmond, Washington, will construct a new 245,000-square-foot data center on 489 acres at the Radius Industrial Park in La Porte.

Apple expands developer support and resources

Apple continues to expand its support for developers through a myriad of online and in-person programs.

Original author: Apple Newsroom

AI is driving the need for data center transformation

The journey to AI-driven data centers is complex, but with strategic planning and proactive steps, organizations can navigate this transformative shift with confidence and readiness.

Rolls-Royce secures emergency backup power for colocation data center in Colorado

Colorado Springs Novva Data Centers location to be pilot for possible future expansion.

Apple announces winners of the 2024 Apple Design Awards

Today, Apple unveiled the winners of its annual Apple Design Awards, honoring 14 best-in-class apps and games.

Original author: Apple Newsroom

KVM over IP switches — Eaton

The Eaton NetDirector KVM over IP switches are now available.

Vandana Singh | A 2024 Top 25 Women In Technology Winner

Mission Critical is excited to introduce you to the 2024 Top 25 Women in Technology. Meet Vandana Singh.


Original author: This email address is being protected from spambots. You need JavaScript enabled to view it. (Amy Al-Katib, CDCDP)

Rebecca Robbennolt | A 2024 Top 25 Women In Technology Winner

Mission Critical is excited to introduce you to the 2024 Top 25 Women in Technology. Meet Rebecca Robbennolt.



Original author: This email address is being protected from spambots. You need JavaScript enabled to view it. (Amy Al-Katib, CDCDP)

Lillian Rivera | A 2024 Top 25 Women In Technology Winner

Mission Critical is excited to introduce you to the 2024 Top 25 Women in Technology. Meet Lillian Rivera.


Original author: This email address is being protected from spambots. You need JavaScript enabled to view it. (Amy Al-Katib, CDCDP)

Ghada Richani | A 2024 Top 25 Women In Technology Winner

Mission Critical is excited to introduce you to the 2024 Top 25 Women in Technology. Meet Ghada Richani.



Original author: This email address is being protected from spambots. You need JavaScript enabled to view it. (Amy Al-Katib, CDCDP)

Are hyperscale data centers running out of power?

Figuring out how to power data centers to meet the soaring demands of AI, marks the beginning of a new era in technological innovation.
 

Mary O’Brien | A 2024 Top 25 Women In Technology Winner

Mission Critical is excited to introduce you to the 2024 Top 25 Women in Technology. Meet Mary O’Brien.


Original author: This email address is being protected from spambots. You need JavaScript enabled to view it. (Amy Al-Katib, CDCDP)

Vantage Data Centers starts construction on their first data center in Japan

Strategically located in the north of Osaka, the 485,000 square foot (45,000 square meters) campus will be comprised of two data centers with seismic base-isolation structures. 


Apple Music reveals top 10 albums of all time on 100 Best list

Apple Music’s 100 Best Albums list culminates today with the reveal of the top 10 albums and “The Miseducation of Lauryn Hill” crowned No. 1.

Original author: Apple Newsroom

Gravity Water prepares the next generation of water stewards in Vietnam

Gravity Water is preparing the next generation of water stewards in Vietnam with its innovative rainwater harvesting and filtration technology.

Original author: Apple Newsroom

Apple and Île-de-France Mobilités introduce Navigo for iPhone and Apple Watch

Apple and Île-de-France Mobilités today introduced an easy way for customers to add a Navigo card to Apple Wallet to ride transit in the Paris region.

Original author: Apple Newsroom

Ikaruz Red Team | Hacktivist Group Leverages Ransomware for Attention Not Profit

Politically-motivated hacktivist groups are increasingly utilizing ransomware payloads both to disrupt targets and draw attention to their political causes. Notable among these hacktivist groups is Ikaruz Red Team, a threat actor that is currently leveraging leaked ransomware builders.

In attacks occurring over recent months, we have observed Ikaruz Red Team and aligned groups such as Turk Hack Team and Anka Underground (aka Anka Red Team) conduct attacks against Philippine targets and hijack branding and imagery belonging to the government’s Computer Emergency Response Program (CERT-PH).

In this post, we profile this hacktivist group and its recent actions, highlighting the threat actor’s methodology, social media activity and relevance within the wider geopolitical context.

Geopolitical Context & Affiliations

Ikaruz Red Team (IRT), under various identities, has targeted entities in the Philippines through defacements, small-scale DDoS attacks and now ransomware attacks. This behavior, between 2023 and present day (2024), is part of the larger wave of hacktivist groups targeting the region, as documented by Resecurity in April 2024. Resecurity ties these more recent observations to the greater geopolitical landscape, in the context of rising tensions with China, noting that the Philippines’ strategic significance in the Indo-Pacific makes it an attractive target for actors bent on civil disruption.

Over the last year or so, the Philippines has experienced an increase in scattered hacktivist attack campaigns. Previously identified hacktivist groups such as Robin Cyber Hood, Philippine Exodus (aka PHEDS), Cyber Operations Alliance, and Philippine Hacking University have been claiming credit for a variety of ransomware attacks, misinformation campaigns and espionage. On April 8th, the Philippine’s National Privacy Commission (NPC) launched an investigation into a breach of critical government infrastructure through an attack on the Department of Science & Technology by a previously unknown hacktivist identifying itself as #opEDSA.

Continue reading

Paola Morales | A 2024 Top 25 Women In Technology Winner

Mission Critical is excited to introduce you to the 2024 Top 25 Women in Technology. Meet Paola Morales.



Original author: This email address is being protected from spambots. You need JavaScript enabled to view it. (Amy Al-Katib, CDCDP)