ZDNet reports that version 2.8 of Pure Storage’s Portworx Enterprise storage and data management solution for Kubernetes-based applications was released, adding integration across Pure Storage’s other software products as well as with VMware Tanzu and designed to appeal to IT workers implementing hybrid cloud storage systems.
Pure Storage is touting the updated product’s new ability of dynamic storage provisioning on FlashArray and FlashBlade, which the company describes as “true storage-as-code.”
Portworx also provides users with complete access to its array of container storage management features such as security, backup and disaster recovery, even while containerized applications are being moved between on-premises and cloud deployments and allows them to view Kubernetes cluster and volume usage metrics through Pure1, the company’s storage management and support platform, which enables troubleshooting of issues with Kubernetes applications and even comes with predictive support features.
With the update, Pure Storage has begun phasing out its Pure Service Orchestrator offering, which will continue to receive support through the end of January 2022, at which time all customers will have transitioned to Portworx and PSO will be integrated into the freemium Portworx Essentials solution.
Jill Aitoro leads editorial for SC Media, and content strategy for parent company CyberRisk Alliance. She 20 years of experience editing and reporting on technology, business and policy.
Washington, D.C.'s Department of Insurance, Securities and Banking has disclosed that 800GB of data claimed to have been stolen by the LockBit ransomware operation was obtained from an attack against third-party software provider Tyler Technologies following the ransomware gang's threats to expose 1GB of the exfiltrated data to coerce the agency into providing the demanded ransom, reports The Record, a news site by cybersecurity firm Recorded Future.
Organizations could have their sensitive information compromised through a high-severity vulnerability in Google Cloud, Azure, and Amazon Web Services command line interface tools dubbed "LeakyCLI", The Hacker News reports.