Operations | Monitoring | ITSM | DevOps | Cloud

Latest News

Hardening Your Windows Server in 2020

Security is vital for protecting company assets and data subjects. Evolving data protection regulations, like the General Data Protection Regulation (GDPR) and the California Consumer Privacy Act (CCPA), have thrown light on security breaches and the security architecture of those compromised. In 2019, the global average cost for a data breach was $3.9 million, not including reputational damage and hidden costs.

Cloud Adoption is No Longer an Option for Federal Agencies

In May 2019, Bloomberg Government reported that Federal agencies planned to move 272 information technology programs to the cloud in FY2020. Fast forward to April 2020 — they reported that there are more than 1,800 federal IT programs that are either migrating or considering migrating to the cloud in fiscal 2021, signifying a rapid increase in cloud adoption in the federal government. How might COVID-19 affect this explosive increase in cloud interest?

Expanding the IBM & Sysdig Relationship to Manage Cloud Security Risk

Today, we are pleased to announce the expansion of Sysdig’s relationship with IBM to extend cloud security governance with IBM Cloud Pak for Multicloud Management. Through a new OEM agreement, Sysdig Secure and the Sysdig Secure DevOps Platform are now available through IBM and IBM Business Partners. The combined IBM and Sysdig offering delivers centralized cloud visibility, governance and automation with in-depth container security intelligence for Red Hat OpenShift.

Calico Egress Gateway: Universal Firewall Integration for Kubernetes

New applications and workloads are constantly being added to Kubernetes clusters. Those same apps need to securely communicate with resources outside the cluster behind a firewall or other control point. Firewalls require a consistent IP, but routable IPs are a limited resource that can be quickly depleted if applied to every service.

NoSQL-based stacks exposed to the Internet

NoSQL technology has become more popular in recent years thanks to the development of new open-source NoSQL databases that are relatively easy to install, use and integrate with web frameworks. An example of one of those popular frameworks on the internet is known as MEAN (MongoDb, Express.js, Angular.js, Node.js). These NoSQL frameworks have become very popular for things such as content management, catalogs and big data in general.

Monitoring Applications that Require Identity Management Authentication

Identity and Access Management (IAM) systems provide core directory services, application access management, and authentication and authorization services. IAM also helps developers with a base platform to provide access control to their applications based on centralized policies and rules. IAM manages user details, authentication, and access information for an organization. The responsibility of user management and authentication creates a great dependency on IAM.

Schedule Security Scans in Rancher 2.4

Rancher 2.4, the latest release of Rancher’s Kubernetes management platform, includes a new CIS security scanning feature. The Center for Internet Security publishes more than 100 benchmarks for Kubernetes, which are considered the default standard benchmark for defining security of Kubernetes clusters. With Rancher 2.4, CIS scanning is an integrated part of the Rancher UI itself for RKE clusters. If you create or import any RKE cluster via Rancher, CIS Scan will work flawlessly.

Are speed and security mutually exclusive?

Here’s a situation that is likely familiar to you if you work in enterprise IT. The need for strong security practices is more pressing than ever, with known vulnerabilities growing exponentially, and nearly half of companies having experienced a data breach in the last two years. At the same time, organizations face demands to deploy software faster, and more frequently. IT executives consistently identify cybersecurity and speed among their top priorities.

Improving Cybersecurity Starts at the Endpoints

Careful monitoring and attention to endpoints are just two elements of a strong cybersecurity strategy for K-12 districts. Cybersecurity must be a top priority for K-12 schools. Schools need to prioritize thwarting industrious hackers who are intent on getting to the treasure trove of information and personally identifiable information (PII) schools manage.