Operations | Monitoring | ITSM | DevOps | Cloud

Latest News

Security Considerations in IoT PCB Design

The Internet of Things (IoT) has revolutionized how we interact with and control the physical world. IoT devices have become integral to our daily lives, from smart thermostats to wearable fitness trackers. However, with this increased connectivity comes a significant challenge: security. IoT Printed Circuit Board (PCB) design security considerations are paramount to protecting these devices from potential threats and vulnerabilities.

Building the Future of Data for IT and Security

Today, Cribl surpassed $100 million in annual recurring revenue (ARR), becoming one of the fastest companies to ever reach this milestone in under four years––an incredible achievement on our journey to building a generational company. Reaching $100 million in ARR so quickly shows that our unique approach and steadfast focus on IT and Security continues to be validated by the market.

The Dangers Lurking in Open Source Software

Our 1st blog in our series on securely consuming OSS. Today, I'll give an overview of some of the most common types of attacks from consuming OSS. Open-source software (OSS) fuels innovation. Over 96% of commercial applications rely on at least one OSS component (Synopsys, 2023). At Cloudsmith, we champion OSS and understand its indispensable role in today's software landscape. However, the escalating threat of supply chain attacks targeting OSS demands a robust defence.

Ten modern SIEM use cases

Security Information and Event Management (SIEM) protects organizational assets in today's evolving cybersecurity landscape. As threats become more sophisticated, the importance of well-structured SIEM use cases cannot be underestimated. Dive in as we explore the modern approaches to building, organizing, and prioritizing SIEM use cases. Read on to learn the right approach to building SIEM use casesGathering the Right Data for Meaningful Insights The top ten use cases you cannot afford to miss.

Introducing enhanced webhook security

We are excited to announce webhook secrets, a powerful new feature that will provide an extra layer of security for your webhook payloads in Bitbucket Cloud. With the ability to add secrets to webhooks, you can now sign webhook payloads to ensure they are coming from Bitbucket Cloud and protect against unauthorized access.

Optimizing SharePoint Security

In today’s digital-first business landscape, collaborative platforms like Microsoft SharePoint are not merely a convenience but a necessity. They facilitate seamless interaction, information sharing, and collective project management across geographically dispersed teams. However, the enhanced connectivity and accessibility come with a set of security challenges.

Patch Management vs. Vulnerability Management: What's The Difference?

Patch Management and Vulnerability Management are two key practices that keep organizations safe. Used effectively, they can detect vulnerabilities, patch them efficiently and safely, and help organizations meet their Governance, Risk, and Compliance (GRC) requirements. Because both practices work together to build up an organization’s IT security strategy, they are often incorrectly used interchangeably.