Operations | Monitoring | ITSM | DevOps | Cloud

Latest News

What Kind Of Tech Resources Are Used To Maintain Public Safety?

Maintaining public safety is a difficult task that requires a variety of different resources. In this blog post, we will discuss some of the most common tech resources used to maintain public safety. These resources include surveillance cameras, facial recognition software, and license plate readers. Keep reading to learn more about these tools and how they are used to keep our communities safe!

MSP's Guide to Customer Data Protection

Customer data protection is important to every business that wants to protect its financial security and its reputation -- but it’s even more important for managed service providers (MSPs). When talking to your clients, you’ll probably tell them that a huge reason why protecting customer data is mission critical is because their entire business depends on it.

How Puppet is making platform engineering more secure

As platform engineering continues to rise in popularity, there is a new side effect to watch out for: the people using the internal developer platforms aren't the people who built it. They’re not necessarily familiar with the codebase, they may not know what's powering it behind the scenes – and the platform might even have to contend with malicious users. So how is Puppet evolving to contend with this new challenge?

Tips for National Cybersecurity Awareness Month You May Be Overlooking

Did you know Halloween isn’t the only event in October ready to send shivers down your spine? Each year, October is “National Cybersecurity Awareness Month” in the U.S. and “European Cybersecurity Month” in Europe. So, before we dress up as ghosts, vampires, or whatever, let’s have a quick look at some old and new cyber risks to be aware of and how to deal with them.

NIST Cybersecurity Framework: Core Functions, Implementation Tiers, and Profiles

You can take a wide range of actions to nurture a culture of cybersecurity in your organization. Some of them can be directed to your employees - and include initiatives like password management and phishing training - and others are related to strategy to adopt towards cybersecurity risk. That's where the NIST cybersecurity framework comes in (as well as other best practices such as CIS controls).

Key Lessons for Building Secure and Resilient Ecosystems From the Forbes CIO Summit

Back in May, I had the pleasure of joining Michael Daniel, president, and chief executive officer of Cyber Threat Alliance, at the Forbes CIO Summit to discuss creating resilient digital ecosystems without sacrificing agility. In the past two years, we’ve evolved our product development models with a focus on a zero-trust mindset and culture.

Security Best Practices at MetricFire

At MetricFire, we treat your data as our data, and we secure our data. Security is prioritized at every level of our infrastructure so you can have peace of mind that your data is sent and stored safely. Keeping MetricFire secure is fundamental to the nature of our business. One of our key priorities is to secure our customers’ metrics and trust. We diligently ensure that we comply with industry security standards so that our customers can trust that their metrics are safeguarded.

JFrog's Newest Board Member Shares Her Thoughts on DevOps, Security & IoT

As At JFrog, we are passionate about hiring talented people who will help us leap higher and think big, further our innovation, and win in the market – it’s written in our Codex. For this reason, we continue to grow our board of directors and advisors because having solid guidance and the right mix of talent on our board is important to help us, our community and shareholders reach the next level of success in a market that is defined by rapid transformation.

October is National Cybersecurity Awareness Month

It’s National Cybersecurity Awareness Month, and as a Cybersecurity Awareness Month Champion Organization, xMatters is proud to be actively participating. Since the National Cybersecurity Alliance started this initiative in 2004, the number of devices connected to the internet and the amount of time we spend interacting online has increased exponentially. The impact on our lives is so massive that it’s become hard to imagine what life would be like without our devices.