Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Analytics

10/31/2018
03:36 PM
50%
50%

Qualys Snaps Up Container Firm

Plans to use Layered Insight's technology to add runtime capabilities and automated enforcement to its container security tool.

Security firm Qualys has agreed to acquire Layered Insight in a move intended to build on the capabilities of its current container security tool, the companies confirmed today.

Layered Insight, founded in 2015 and based in Pleasanton, Calif., aims to bring together DevOps and SecOps by providing visibility across containerized applications. Qualys plans to use its technology to add more visibility and runtime app protection to its Container Security platform.

More specifically, Layered Insight can map runtime behavior to provide a deeper understanding of containerized applications. Its system can also detect and prevent breaches during runtime and gives admins the option to set alerts for anomalies and automate enforcement. Qualys anticipates Layered Insight will be integrated into its cloud platform by the second half of 2019.

Co-founders Asif Awan and John Kinsella will be joining Qualys as CTO of container security and vice president of engineering, container security, respectively.

This is the latest purchase in Qualys' startup shopping spree. It most recently announced its intent to buy Second Front Systems in June 2018; in April, it acquired the software assets of 1Mobility. In Nov. 2017 it purchased NetWatcher assets for cloud-based threat intelligence, a few months after it bought assets of Nevis Networks to improve on network traffic analysis.

Read more details here.

 

Black Hat Europe returns to London Dec 3-6 2018  with hands-on technical Trainings, cutting-edge Briefings, Arsenal open-source tool demonstrations, top-tier security solutions and service providers in the Business Hall. Click for information on the conference and to register.

Dark Reading's Quick Hits delivers a brief synopsis and summary of the significance of breaking news events. For more information from the original source of the news item, please follow the link provided in this article. View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Why Cyber-Risk Is a C-Suite Issue
Marc Wilczek, Digital Strategist & CIO Advisor,  11/12/2019
Black Hat Q&A: Hacking a '90s Sports Car
Black Hat Staff, ,  11/7/2019
The Cold Truth about Cyber Insurance
Chris Kennedy, CISO & VP Customer Success, AttackIQ,  11/7/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
7 Threats & Disruptive Forces Changing the Face of Cybersecurity
This Dark Reading Tech Digest gives an in-depth look at the biggest emerging threats and disruptive forces that are changing the face of cybersecurity today.
Flash Poll
Rethinking Enterprise Data Defense
Rethinking Enterprise Data Defense
Frustrated with recurring intrusions and breaches, cybersecurity professionals are questioning some of the industrys conventional wisdom. Heres a look at what theyre thinking about.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-18923
PUBLISHED: 2019-11-13
Insufficient content type validation of proxied resources in go-camo before 2.1.1 allows a remote attacker to serve arbitrary content from go-camo's origin.
CVE-2010-4664
PUBLISHED: 2019-11-13
In ConsoleKit before 0.4.2, an intended security policy restriction bypass was found. This flaw allows an authenticated system user to escalate their privileges by initiating a remote VNC session.
CVE-2010-4817
PUBLISHED: 2019-11-13
pithos before 0.3.5 allows overwrite of arbitrary files via symlinks.
CVE-2013-3097
PUBLISHED: 2019-11-13
Unspecified Cross-site scripting (XSS) vulnerability in the Verizon FIOS Actiontec MI424WR-GEN3I router.
CVE-2013-3366
PUBLISHED: 2019-11-13
Undocumented TELNET service in TRENDnet TEW-812DRU when a web page named backdoor contains an HTML parameter of password and a value of j78G�DFdg_24Mhw3.