Operations | Monitoring | ITSM | DevOps | Cloud

Latest News

Cisco introduces full-stack observability enhancement: Business Risk Observability

NOW AVAILABLE through Cisco Secure Application, on the Cisco AppDynamics SaaS platform, new security capabilities combine attack mapping and a business risk score for business transactions to help organizations prioritize responses based on likely impact on the business and users.

How Parallel Loop Empowers Torq Users to Rapidly Automate Bulk Data Processing Up to 10x

Torq is proud to introduce Parallel Loop, a new capability that enables users to process bulk data from myriad security tools with unprecedented ease. It also provides the power of orchestration like no other automation tool in the security automation industry with true parallelism. That means multiple tasks can be run simultaneously, and optionally, on multiple elastically-scaled compute resources, shortening the time workflow automations take to complete by 10x or more.

Using SOC-as-a-Service to Bridge the Cybersecurity Talent Gap

As the cyberthreat landscape is getting more sophisticated, the need for skilled cybersecurity professionals is also rising. The recent 2022 (ISC)2 Cybersecurity Workforce Study revealed that, in the past year, the cybersecurity workforce gap (the difference between the number of security professionals required and the number of suitably qualified people in the marketplace) has grown more than twice as much as the number of actual cybersecurity workforce hired, with a 26.2% year-on-year increase.

SAST vs. DAST

Neglecting security is a rookie mistake. However, DevOps teams struggle to make it a priority in the quest to be continuously faster. Protecting your app from the ground up is challenging, so you need the right tools to improve your debugging process in development and production. To enhance security testing, developers can use SAST tools, which analyze program source code to identify security vulnerabilities, and DAST tools, which come up in later development phases in a running application.

IT Security Checklist to Protect Your Business

During the COVID-19 Pandemic, it was reported that cybercrime increased by 600%. As the world has become more reliant on technology, whether for personal life or for business, cyberattacks have risen with it. Unfortunately, there are a lot of cybersecurity misconceptions that prevent businesses from adequately preparing for and responding to these attacks. More time and resources need to be spent protecting this critical information.

New CircleCI features for secure secrets management

When security incidents happen, it’s crucial for software providers and users alike to take swift and effective action. In response to our recent security incident, we witnessed firsthand how an open and collaborative effort between our customers, technology partners, and engineering teams helped to contain the threat and mitigate risk of unauthorized access to customer systems.

High throughput Kubernetes cluster networking with the Calico/VPP dataplane and accelerated memif

This blog will cover what the Calico/VPP dataplane is and demonstrate the performance and flexibility advantages of using the VPP dataplane through a benchmarking setup. By the end of this blog post, you will have a clear understanding of how Calico/VPP dataplane, with the help of DPDK and accelerated memif interfaces, can provide high throughput and low-latency Kubernetes cluster networking for your environment.

Secure Remote Access Software: Everything You Need to Know

Remote desktop software, also known as remote access applications or remote access software, allows you to remotely access and work on any computer from a remote location. Remote access applications are very useful in many situations, such as executing codes, troubleshooting computer problems, and managing your office network remotely from home. Basically, it requires software to be installed on the computer you want to connect to (commonly called the host).

Use Cases for Black Screen Mode: When Privacy Matters

The advent of the modern MDM has given organizations unprecedented agility when it comes to their remote support. Instead of deploying engineers to fix hardware devices on-site as they did before, they can now troubleshoot and fix them entirely remotely. While this kind of remote support provides exponential value to organizations and their employees and customers, it also presents another major challenge: privacy.

Integrate CircleCI with HashiCorp Vault using OIDC

Well-designed secrets management is a delicate balancing act between security and usability. Secrets must be easily accessible to the right users when building and deploying, but they must also at the same time be well-secured and easy to rotate. This article will cover how to thread this needle by integrating CircleCI with HashiCorp Vault and retrieving secrets using short-lived OpenID Connect (OIDC) authentication tokens.