Operations | Monitoring | ITSM | DevOps | Cloud

Latest News

4 Types of IT Security Issues Companies Are Facing in a Tech-Enriched Environment

The world around us is changing, and it's changing fast. We're in an era of technology-fueled innovation, where the lines between our personal and professional lives are blurring and being redrawn every day. And we're not just talking about the way we communicate with each other; we're also talking about the way we work. For businesses, this means that they have to be able to connect to customers on their terms: online, on mobile devices, and through social media platforms. But this also means that companies need to step up their game when it comes to security.

Building Cyber Resilient Ecosystems

At SolarWinds, we focus on helping our customers accelerate their business transformation through solutions designed to be simple, powerful, and secure. Over the past couple of years, we’ve made significant investments in our security and software build process with the goal of leading the industry in cyber resiliency. Recently, I spoke at the VentureBeat Intelligent Security Summit on the topic of Becoming Secure by Design with CrowdStrike Vice President of Intelligence Adam Meyers.

CFEngine 3.21 LTS released - Unification

Today, we are pleased to announce the release of CFEngine 3.21.0! The focus of this new version has been unification. Across our websites and UI, you should see that it’s a much more modern and unified experience, whether you’re reading this blog post on cfengine.com, browsing the new documentation site, looking for modules on the CFEngine Build website, or adding input to modules within Build in Mission Portal.

How detection engineering keeps ServiceNow safe

“Security defense is exciting, because you’re always trying to stay ahead of the bad guys,” says Tracy T., senior staff detection engineer at ServiceNow. Who are these bad guys? They could be malware or hackers who try to threaten the security of employee data or the company network—or anything in between. Detection engineering plays a major role in keeping a company safe, especially amid changing tool capabilities and detection methods.

How to build a service mesh with Istio and Calico

Microservices are loosely coupled software that provides flexibility and scalability to a cloud environment. However, securing this open architecture from vulnerabilities and malicious actors can be challenging without a service mesh. This blog post will demonstrate how you can create an Istio and Calico integration to establish a service mesh that will manipulate HTTP traffic in the application layer.

The Critical Role of Intrusion Prevention Systems in Network Security

An Intrusion Prevention System (IPS) is a network security and threat prevention tool. Its goal is to create a proactive approach to cybersecurity, making it possible to identify potential threats and respond quickly. IPS can inspect network traffic, detect malware and prevent exploits. IPS is used to identify malicious activity, log detected threats, report detected threats, and take precautions to prevent threats from harming users.

How Important Is The Infrastructure For Online Trading Services?

In online trading, everything is done by computers and software. It's a huge financial system that heavily relies on well-established underlying technologies. These technologies include fast, secured and reliable internet connection in conjunction with fast hosting provided and reliable data centers. Well-written software, too, plays a big role in this regard.

Enterprise and Edge Scale Security with NeuVector Container Security 5.1

I’m excited to announce the general availability of the SUSE NeuVector container security platform version 5.1. With the 5.1 release, customers will benefit from more efficient and powerful vulnerability scanning and admission controls across multiple clusters through centralized enterprise scanning, auto-scaling scanners and support for the new Kubernetes (1.25+) pod security admission (PSA) standard. The release also supports the Cilium network plug-in.

Jason Chan on How Torq Overcomes Cybersecurity's Biggest Challenges

Jason Chan is one of the world’s foremost cybersecurity authorities and we’re extremely proud to have him as a member of the Torq Advisory Board. He’s a pivotal figure in driving adoption of security automation best practices at many companies, including Netflix, where he led the information security organization.