Operations | Monitoring | ITSM | DevOps | Cloud

Latest News

Tigera 2023 predictions: Cloud native security and the shifting landscape in 2023

Cloud computing and the use of cloud native architectures enable unparalleled performance, flexibility, and velocity. The speed of innovation has driven significant advancements across industries, but as digitalization continues pushing applications and services to the cloud, bad actors’ intrusion techniques have also become more sophisticated.

11 Best SSL Certificate Monitoring Tools in 2023

Without an active SSL certificate, user contact with the website is no longer secured, making it possible for any malicious entity to access private user information. Users are unlikely to return to the website after viewing a security notice, though. The simplest way to monitor the expiration of your site certificates is to use an efficient, automatic SSL certificate expiry monitoring solution.

Lessons from the CircleCI Security Incident

In some respects, security and reliability are competing priorities. Security controls may reduce reliability, and responding to security incidents may require mission-critical systems to be paused or shut down until they're secure. The recent security incident involving CircleCI, however, shows that it's not always necessary to choose between prioritizing security or reliability.

Simplifying Kubernetes DevSecOps Through Platform Engineering

DevSecOps–short for development, security, and operations–is a trending practice that introduces security testing, triage, and risk mitigation as early as possible in the software development lifecycle, rather than bolting on security in the final stages. DevSecOps requires a shift (also known as “shift-left”) in culture, process, and tools across development, security, and operations teams to make security a shared responsibility.

CircleCI Breach: How to Rotate All Stored Secrets ASAP

Yesterday, CircleCI, a Continuous Integration/Continuous Delivery (CI/CD) service, notified the world it had been breached via a critical advisory from its CTO. As a major software delivery pipeline service, CircleCI users store myriad credentials for various services in CircleCI’s “Secrets Store” infrastructure.

Network Security for Banks-Preventing Breaches, Protecting Data

It is no surprise that cybercriminals are after the money, and banks have plenty lying around. They also have gobs of data, making banks irresistible to hackers who have a field day attacking complex banking IT systems flush with more connections than a movie agent. Here are a few recent facts to know.

3 Types of Access Control: IT Security Models Explained

If you watched Mission Impossible: Rogue Nation, you probably remember the infamous Gait Analysis access control system. After the agent passes the main gate, enters the elevator with fingerprint recognition, and opens three unique-combination locks, he goes through a camera-based system that recognizes how he walks, talks, and moves his face.

Cloud security: How remote work created a new problem

In 2020, remote work exploded with the start of COVID-19 as businesses scrambled to stay productive and competitive amidst health concerns and quarantines. During the pandemic, close to 70% of workers were working from home. Currently, 4.7 million people work remotely at least half the time in the US, and 62% of workers claim to work remotely at least occasionally.

Cybersecurity Should be a Priority in Any Digital Transformation

Digital technologies have emerged as the most fundamental tools for the survival of businesses in the fiercely-competitive modern marketplace. Implementation of modern technologies helps achieve the most desirable business objectives. However, the adoption of innovations to facilitate digital transformation also brings cybersecurity challenges too.