Operations | Monitoring | ITSM | DevOps | Cloud

Latest News

Airline Data Breaches

Travel websites, in particular airlines are key targets for cyberattacks, the reward for compromised data is high in this industry due to the sensitivity of the data involved. Over the years, there have been a number of airline data breaches, with some companies suffering multiple attacks. By analysing some of the major airline and travel attacks over the years and being aware of tactics used by hackers, security procedures can be put in place to prevent attacks.

Secure Supply Chain: Verifying Image Signatures in Kubewarden

After these last releases Kubewarden now has support for verifying the integrity and authenticity of artifacts within Kubewarden using the Sigstore project. In this post, we shall focus on verifying container image signatures using the new verify-image-signatures policy. To learn more about how Sigstore works, take a look at our previous post

5 improvements coming to the CFEngine Docs

This year, we are improving CFEngine’s ease of use, so it should come as no surprise that we need to rethink our documentation site. For software like CFEngine, great documentation is not just “nice to have”, but a must for our users, both beginners and experienced. CFEngine has helped DevOps teams to automate their day-to-day tasks and make better decisions by providing a holistic overview of their systems.

The Crucial Difference Between IT Security and IT Compliance

Over the last couple of years, organizations across the globe have been facing an increasing number of cyberattacks. The rapid shift to remote work left many organizations vulnerable and bad actors took advantage of this situation. And the global average cost of breaches has seen a sharp increase in 2021 compared to the previous year; from 3.86 million USD in 2021 to 4.24 million USD in 2022.

What is SaaS Cloud Security and What Are SaaS Security Best Practices?

Software-as-a-service or SaaS has taken the business world by storm. With enormous benefits and features, it is no surprise that the SaaS industry has increased by 500% over the past seven years only. However, like any other technology, it carries a significant risk of data breaches. Do you know that encryption worries are the biggest SaaS-related security concerns for businesses?

Uptrends launches new solution for SMS-based 2FA transaction monitoring

As web applications and other digital solutions become more prevalent in everyday life, securing access to these apps against cyber threats becomes more an integral part of their design rather than a separate line of thought. Global cybercrime costs are expected to grow by 15% per year over the next five years, reaching $10.5 trillion annually by 2025.

Latest Features Enhance Workflow Creation, Add Modern Controls

The consensus on the state of cybersecurity professionals tends to fall somewhere between “burdened by high volumes of responsibility” and “dangerously understaffed and suffering from unhealthy levels of stress,” depending on how optimistic your source is.

New 2022 Report: Alarming Ransomware Trend Shows No Sign of Reversing

It’s no secret that ransomware threats skyrocketed – in both volume and boldness – during the pandemic. Threat actors capitalized on the sudden transition to remote work and the resulting lapses in security. Now that the working world is beginning to settle into a permanent Everywhere Workplace, you might think the ransomware trend would begin to reverse. Not so, according to a new report from Ivanti. The report details ransomware trends from Q1 2022, and the findings are bleak.

4 Key Steps of a Vulnerability Management Process

Vulnerabilities within an IT environment pose a big security risk and are a threat to digital data within an organization. These vulnerabilities can be exploited by others, or a lack of necessary precautions can result in damaged or lost organizational data. Therefore, it is essential to have a vulnerability management process in place for these reasons.

What is UAC Virtualization? Benefits and Pitfalls

UAC stands for “User Account Control”. This is a field of software management that isolates the operating system’s core components from potentially damaging changes. It refers to the level of access that in Unix-like systems is called “root” and in Windows systems is known as Administrator privileges. User Account Control was initially rolled out as part of Windows Vista to allow only admin accounts to give and take away these permissions.