Operations | Monitoring | ITSM | DevOps | Cloud

Security

The latest News and Information on CyberSecurity for Applications, Services and Infrastructure, and related technologies.

Torq Introduces Parallel Execution

Parallel Execution is a significant evolution for no-code security automation that enables you to instantly create multiple branches within an automatic workflow, and handle each concurrently before seamlessly merging back into a single flow. Security teams can now execute more tasks simultaneously to quickly enrich, analyze, contain, and resolve security threats.

Using automation to deliver reliable managed security services

As a Cloud Service Provider (CSP), Managed Service Provider (MSP), or Managed Security Service Provider (MSSP) you are instrumental in delivering effective and reliable managed security services to your clients. With cybercriminals taking advantage of less secure environments and becoming more advanced with their security breaches, this is becoming increasingly complex.

IT Monitoring for Government

Today’s blog comes from Kevin Howell, CEO of UK partner – Howell Technology Group (HTG) about their work supplying secure cloud technologies and remote working solutions to government and regulated customers. HTG are a trusted industry leader in the UK, who offer virtual desktops, managed services and efficient modern workplace solutions. Their solutions are also available with the UK Government’s Digital Market place under the G-Cloud Framework.

Debunking Myths About Cyberattack Complexity in 2022

Stoking fears about the threat landscape is a popular approach, and one that I don’t particularly care for. Many will tell you that the threat landscape is constantly changing, that threats are getting more complex, and that actors are getting more sophisticated. “The whole world is getting more difficult and scarier, so buy our stuff!” There’s a ton of media sensationalism too, with the popular image of the hacker sitting at a computer, wearing a dark hoodie.

Securing the DX NetOps Development Lifecycle with DevSecOps

Recent, high-profile cybersecurity exploits, such as Sun Burst and Log4j, demonstrate that every enterprise is only a stone’s throw from a software vulnerability. This becomes especially critical when security is breached in a network monitoring component that has privileged access to core enterprise systems. In the case of Sun Burst, a well-known monitoring software provider made international headlines.

Ivanti Announces Lookout CASB/SWG Partnership for Ivanti Neurons for Zero Trust Access

Ivanti is proud to have partnered with Lookout, Inc to provide zero trust secure access across highly distributed application ecosystems while protecting their users, their data and their devices from accidental and malicious data exfiltration and threats. Today we are proud to announce the general availability of Lookout CASB and Lookout SWG as an add-on to Ivanti Neurons for Zero Trust Access (ZTA).

Cybersecurity Companies Have A Customer Profitability Problem - Here's Why

The age of growth-at-all-costs is over. Profitability matters — and it matters now. For SaaS companies who rely heavily on the public cloud, understanding what’s driving (or hurting) profitability can be tricky. Different customers have different needs and usage patterns, drive different levels of cost, and impact profitability unequally. Cybersecurity has played a central role in CloudZero from the beginning —or really, before it.

Data Protection Methods for IT & MSP Teams

The two words that IT and MSP teams never want to hear are “data loss.” According to Business Partner Magazine’s article on data backup, “94% of companies that fail to recover from a major data loss do not survive, and 43% of companies never resume their operation after a major data loss event.” To prevent these disasters from occurring, IT & MSP teams rely on data protection.