Operations | Monitoring | ITSM | DevOps | Cloud

Security

The latest News and Information on CyberSecurity for Applications, Services and Infrastructure, and related technologies.

What Is Antivirus Software?

Antivirus software refers to any program that’s specially designed to detect and remove malicious software (malware). After installation, antivirus software usually works continuously in the background to offer real-time protection against viruses and malware. A comprehensive AV solution can help you protect your device or network from various cyberthreats like malware, spyware and phishing.

Prevent XSS attacks with browser testing

Security is a never-ending battle on the web. You can have a server up in just a few minutes, and the next minute, someone is already trying to hack into it. These attacks could be automated using malicious bots or launched manually. Websites can be targeted by a malicious user trying to compromise your web presence or data. Cross-site scripting (XSS) is just one type of attack your site may be vulnerable to.

JSON Basics: Building Blocks for Workflow Automation

Automation workflows add a lot of value to an organization’s day-to-day operations. At a minimum, they streamline the execution of complex, multi-step processes, thereby allowing people to focus on higher-value tasks. On top of that, automation workflows can provide valuable insights through the metrics that they gather – including the number of requests, the date and time they were requested, the time it took to complete each request, who made the request, and much more.

Cloud security risks remain very human

Most of us picture cloud security threats as bad actors in some hostile country. More often, it’s you and your coworkers. Talk about cloud security and you’re likely to discuss provider-focused issues: not enough security, not enough auditing, not enough planning. However, the biggest cloud security risks continue to be the people who walk beside you in the hallways.

How Google Tracks You: The Personal Data Google Steals and Sells

Google is the most popular search engine on the planet. And there’s a good reason for that: their search service is extremely thorough, clean, and comprehensive. Need to know something just “Google it”. But there’s a catch—when you use Google to learn, Google is also learning about you.

Tigera has been awarded Microsoft's 2022 Partner of the Year award for OSS on Azure

We are proud to announce that we have won the 2022 Microsoft OSS on Azure Partner of the Year award! The Microsoft Partner of the Year Awards recognize Microsoft partners that have developed and delivered outstanding Microsoft-based applications, services, and devices during the past year. Awards were classified in various categories, with honorees chosen from a set of more than 3,900 submitted nominations from more than 100 countries worldwide.

What's new in Security for Ubuntu 22.04 LTS?

Canonical Ubuntu 22.04 LTS is the latest long term support release of Ubuntu, one of the world’s most popular Linux distributions. As a Long Term Support release, Ubuntu 22.04 LTS will be supported for 10 years, receiving both extended security updates and kernel livepatching via an Ubuntu Advantage subscription (which is free for personal use).

How to Detect Ransomware: 12 Monitoring & Alerting Opportunities to Automate

Ransomware threatens the loss of crucial data as well as financial loss. However, with the right knowledge and tools, you can take action to protect your business from the damaging effects of ransomware. In a 2022 Coveware Q1 ransomware report, the average ransom payment was $211,529 with an average of 26 days for downtime suffered. Ransomware obviously continues to be a huge and costly threat to industries across the board.

Become a Database Administrator - Guide to Database Security

Database security includes a variety of measures used to secure database management systems from vicious cyber-attacks and illegitimate use. Database security programs are designed to protect not only the data within the database but also the data management system itself, and every application that accesses it, from destruction, mishandling, and unauthorized access.