Operations | Monitoring | ITSM | DevOps | Cloud

Latest News

4 Most Common Website Security Threats (2023) + Solutions

For infrastructure administrators tasked with ensuring the reliable operation of their applications, the thought of a lurking cyberattack can be one to lose sleep over. An attack on your system and the services you provide could render your applications unresponsive, resulting in a security breach, or loss of data.

Why unmanaged Apple devices make your customers vulnerable

Let’s start with a simple but harsh fact: If you say you’re protecting your customers’ networks and you’re not managing their Apple devices, then you’re lying to them and yourself! Over the years hackers have targeted everything from HVAC machines (Target) to fish tank thermometers (an unnamed Las Vegas casino) and a whole host of devices in between in order to prise their way into company networks. Let’s stop for a minute to consider that fact.

Cybercrime Trends and the Economy

It’s no secret that there is a lot of money involved in cybercrime. With McAfee estimating the annual global cost of cybercrime at just under $1 trillion, the dark side of tech is big business. Clearly, those losses have an impact on the global economy. It’s also become a pressing question to see if macroeconomic/geopolitical trends impact cybercrime.

Access Bitbucket Cloud repositories more securely with resource-scoped access tokens.

We understand there is a constant tension between the need to keep source code secure, while also enabling tools to integrate with your Source Code Management solution. In line with this, Bitbucket Cloud is introducing the first step in a range of new API security capabilities, designed to give customers fine-grained control over access to their Repositories, Projects, and Workspaces.

Open source and cybersecurity: from prevention to recovery

So you have just installed the latest antivirus and turned on your shiny new firewall. Now your organisation is fully secure, right? The reality is that all the security products in the world will never be able to fully protect your data centre or your business from security threats. Because of the asymmetry between attackers and enterprises, cybersecurity is a problem that can never be solved and is never going away.

Using Calico to create a Kubernetes cluster mesh for multi-cluster environments

Kubernetes has come of age with more organizations adopting a microservices architecture at scale. But scale brings a whole slew of new challenges, especially with Kubernetes, which is designed to operate as a single cluster. However, the usage of Kubernetes, especially at leading-edge organizations operating at scale, has crossed the single-cluster threshold.

Dealing with Privacy and Security Issues in a Hybrid Workplace, Especially a BYOD Environment

The Challenges & Solutions for a Hybrid Workplace Bring Your Own Device (BYOD) is quickly becoming the new standard in hybrid workplace technology. BYOD programs allow employees to use their personal devices for work and get appropriately reimbursed. This is a great cost control option, providing more efficiency because of flexibility and convenience – particularly for companies looking for scalability.

5 Web Security Tips For Small Businesses

Small businesses often overlook the importance of web security, but it is an essential component of any successful online presence. Without proper web security measures, your website and business can be vulnerable to various cyber threats, from hackers to spammers. To protect your business and customers, here are five essential tips on improving your website's security.

Torq Announces Advisory Board Featuring Global Cybersecurity Visionaries

Torq is extremely proud to announce the formation of the Torq Advisory Board, a group of some of the world’s most respected cybersecurity professionals, including several industry-leading CISOs and heads of information security. All of our advisors have made major impacts in cybersecurity for their companies, and for the industry at large.

Torq's No-Code Security Automation Solution Now Available in AWS Marketplace

Torq is proud to announce the immediate general availability of its no-code security solution in AWS Marketplace, the curated digital catalog with thousands of software listings from independent software vendors that make it easy to find, test, buy, and deploy software that runs on Amazon Web Services (AWS).