Operations | Monitoring | ITSM | DevOps | Cloud

Latest News

Top title alert! Ivanti recognized by Frost & Sullivan's 2021 Best Practices Award as Asia-Pacific Secure Remote Access Company of the Year

We’re thrilled to announce that Frost & Sullivan has awarded the 2021 Asia-Pacific Company of the Year Award for secure remote access to Pulse Secure (acquired by Ivanti). In determining awards, Frost & Sullivan “applies a rigorous analytical process” that includes “detailed evaluation of best practices criteria.”

Visualizing IoT security metrics with Grafana at Network to Code

As the number of connected gadgets in our homes, offices, and industrial networks continues to grow exponentially, keeping IoT devices secure has become a vital part of our everyday lives. However, our webcams, printers, and smart plugs often lack security features due to their fast time to market, making them particularly vulnerable to attack. And because security metrics themselves can be tricky to assess, tracking IoT device security is increasingly a challenge.

Turbocharging AKS networking with Calico eBPF

A single Kubernetes cluster expends a small percentage of its total available assigned resources on delivering in-cluster networking. We don’t have to be satisfied with this, though—achieving the lowest possible overhead can provide significant cost savings and performance improvements if you are running network-intensive workloads.

U.S. Government Issues Advisory Against Common Cyber Threats During the Holidays

In advance of this week’s Thanksgiving holiday in the U.S., the U.S. Cybersecurity & Infrastructure Agency (CISA) and the Federal Bureau of Investigation (FBI) issued a reminder for critical infrastructure to stay vigilant against cyber threats during holidays and weekends. This advisory is a reminder the holidays present a noted challenge for businesses and an opportunity for cyber adversaries.

Better Protect your Corporate Data While Ensuring Optimal Service Delivery for your Business Lines

Within an organization, the Network Operations Center (NOC) and Security Operations Center (SOC) teams need to work together to maintain optimal network performance in addition to ensuring both overall security and the availability of IT services for business lines. In the past, these two teams were focused on two separate objectives, using different tools to do so and often running specific processes.

Mail Assure achieves top result in Virus Bulletin testing

We’re pleased to announce that N-able™ Mail Assure has received a top result in an independent test conducted by the Virus Bulletin, an industry-renowned test laboratory and an important reference for specialists and businesses concerned with computer security. So, what exactly is this test and how did Mail Assure achieve such a great score?

You've Achieved GDPR Compliance-Now What?

General Data Protection Regulation (GDPR). Most of us remember the months and weeks leading up to the deadline. We did whatever needed to be done to achieve compliance. Now it seems like a distant memory. And the pressure is mostly off. But in other ways, it was just the beginning. As you continue creating your day-to-day compliance strategy, you might find that the tactics that got you to the finish line were more short-term solutions that won’t necessarily stand long-term.

Interview with Cybersecurity Specialist Babak Pasdar, CTO of Acreto

For our latest expert interview on our blog, we’ve welcomed Babak Pasdar to share his thoughts on the topic of cybersecurity and his journey as the CTO of Acreto. Babak Pasdar is a globally recognized innovator, cybersecurity expert, author, and entrepreneur best known for his multiple innovations in the area of cloud security.

How to streamline Windows monitoring for better security

If you’re responsible for a significant number of Windows servers, you already understand the importance of being aware of the health and security of your environment. Unfortunately, you’re probably also aware of the tremendous amount of effort and resources required to monitor your Windows environment. Let’s take a look into why and how you should be closely monitoring your Windows server environments from a security perspective.

History of Open Source Identity Management (part 2)

This is the second blog post (part 1 available here) where we look at the history of open source identity management. This post focuses on Oauth and OpenID, the protocols currently used in modern applications and services. This post does not cover the technical details of the open source identity management standards, which are explained very well in this Okta blog post. Rather, it explains the origins of Oauth and OpenID, and provides insights on the context that led to their creation.