Operations | Monitoring | ITSM | DevOps | Cloud

Latest News

The importance of Calico's pluggable data plane

This post will highlight and explain the importance of a pluggable data plane. But in order to do so, we first need an analogy. It’s time to talk about a brick garden wall! Imagine you have been asked to repair a brick garden wall, because one brick has cracked through in the summer sun. You have the equipment you need, so the size of the job will depend to a great extent on how easily the brick can be removed from the wall without interfering with all the ones around it. Good luck.

Privacy Management: How to proactively manage risk and sustain compliance

“How can I manage privacy and risk of exposure of personal data from malicious attackers, or my own employees, while keeping pace with global evolving regulations?” For many organizations, this is a constant struggle made more daunting by the fact that data is siloed and processes are manual. Both remote workers and evolving infrastructure can represent opportunities for attackers. Because personal data is so precious, it’s most likely to be stolen or exposed during an attack.

Interview with Cybersecurity Specialist Charles Denyer

For our latest specialist interview in our series speaking to technology leaders from around the world, we’ve welcomed Charles Denyer. Charles is an Austin-based cybersecurity and national security expert who has worked with hundreds of US and international organizations. He is a founding member and senior partner in two consulting and compliance firms.

Security Hygiene - Why Is It Important?

“What happened?” If you’ve never uttered those words, this blog isn’t for you. For those of us in cybersecurity, this pint-sized phrase triggers memories of unforeseen security incidents and long email threads with the CISO. What happened to those security patches? Why didn’t we prevent that intrusion? Organizations tend to lean towards protecting their borders and less towards understanding the importance of overall security hygiene.

How to better prioritize vulnerability remediation through automated penetration testing

As most MSPs know, small- and medium-sized businesses are the most likely targets for cyberattacks. They lack many of the resources and infrastructure of their larger counterparts and a single cyberattack can be devastating. Analyzing and remediating vulnerabilities is an essential part of any security program. But current vulnerability management processes spit out long lists of instances that may or may not need remediation.

PagerDuty and Teleport: System access and role escalation when you need it

You may know that PagerDuty has over 600 integrations that add a wide variety of functionality to the core platform and workflows. Some integrations provide upstream data sources like metrics and monitoring. Some are for downstream capabilities like reporting. And some interesting integrations help you in the moment when you are responding to an incident. Teleport provides secure access to applications, cloud infrastructure, databases, and Kubernetes environments without getting in your way.

Ivanti Derived Credentials: A Zero Sign-On Solution for Smart Card-Enabled Organizations

Government agencies and some regulated industries have adopted standards (such as NIST SP 800-157) for issuing smart cards, based on the user’s validated and confirmed identity. The smart cards have digital certificates such as an authentication certification, a signing certificate, and an encryption private key (certificate). Often the smart cards also act as human recognizable identity validation cards and contain the user’s picture (for a guard to validate at a door or gate).