433 Central Ave., 4th Floor, St. Petersburg, FL 33701 | [email protected] | Office: (813) 563-2652

Kong Enterprise 2.7 enables companies to manage APIs and microservices at scale

Kong released Kong Enterprise 2.7, a service connectivity platform that enables companies to manage APIs and microservices at scale across any underlying architecture. This latest release features faster performance, including 25% increased throughput (capacity) and improved latency (speed) over already highly performant previous versions, as benchmarked by GigaOm. With an even faster core runtime, Kong Enterprise 2.7 achieved 52,250 transactions per second (TPS) maximum throughput with a 100% success rate (up from 40,625 TPS in … More → The post Kong Enterprise 2.7 enables companies to manage APIs and microservices at scale appeared first on Help Net Security.
http://news.poseidon-us.com/SJj5CT

Black tech worker tenure shorter than peers: report

Barriers to advancement continue beyond the early career years of Black tech workers, Russell Reynolds Associates found.
http://news.poseidon-us.com/SJfptW

How cybercriminals are using malware to target Linux-based operating systems

As the most common cloud operating system, Linux is a core part of digital infrastructure and is quickly becoming an attacker’s ticket into a multi-cloud environment. Current malware countermeasures are mostly focused on addressing Windows-based threats, leaving many public and private cloud deployments vulnerable to attacks that target Linux-based workloads, VMware reveals. Key findings that detail how cybercriminals are using malware to target Linux-based operating systems include: Ransomware is evolving to target host images used … More → The post How cybercriminals are using malware to target Linux-based operating systems appeared first on Help Net Security.
http://news.poseidon-us.com/SJfhVm