Operations | Monitoring | ITSM | DevOps | Cloud

Security

The latest News and Information on CyberSecurity for Applications, Services and Infrastructure, and related technologies.

Sponsored Post

4 Database Access-Control Methods to Automate

Regardless of which role a person has in an organization, they will always need access to one or more databases to be able to perform the functions of their job. Whether that person is a cashier at McDonald's or a technical account manager supporting a Fortune 500 company, data entry and retrieval is core to the services they provide.

48,285+ Vulnerabilities Beyond the NVD: An Ivanti Research Update

Organizations cannot rely on a single source of data on which to base their entire cybersecurity strategy – particularly their vulnerability management programs. Case in point: The National Vulnerability Database, or NVD. This publicly available database of known vulnerabilities covers an enormous array of all the different vulnerabilities that currently affect applications, software and hardware applications.

What Are SSH Keys? An Introduction

SSH or Secure Shell is one of the oldest protocols used in networking for secure encrypted communication between two systems and to remotely manage servers and other systems. Ever since its introduction, they have been adopted by IT teams in organizations all over the world to manage their assets. And SSH keys continue to play a significant role in granting secure access to computer systems, and with the cloud computing boom, they’re playing even more important roles. So what are SSH keys?

Mezmo Joins Industry Campaign to Close the Cybersecurity Talent Gap

The cost of cybercrime is predicted to hit $10.5 trillion by 2025, according to the latest version of the Cisco/Cybersecurity Ventures "2022 Cybersecurity Almanac." The way that people work, the tools that they use, and the mindset they must adopt to protect the enterprise has to evolve to keep up with the threat landscape.

Why Enterprises Need to Prepare for Russian Cyberattacks - and Four Ways to Do It

The invasion of Ukraine has been difficult to watch, and unimaginable to live through. While the primary global focus is, as it should be, on peace and safety, it’s also critical for enterprises to prepare for the likely inevitable Russian cyberattacks.

See How Restorepoint Helps You Remediate After a Network Breach

This is our first blog in a three-part series, where we demonstrate the many features and benefits of using Restorepoint and the ScienceLogic SL1 Platform together. Today’s demo takes you through a network breach scenario—showing how to identify and remediate following an unplanned network device change.

7 Types of Data Breaches You Must Know And How to Handle Them

Data breaches and the threat of cybercriminals are unfortunate realities of our digital lives. Research conducted by tech firm IBM put the average cost of a corporate data breach at $4.24 million in 2021. This trend continues in both frequency and severity as we become more entangled in digital spaces (think virtual reality). There really is no better time to learn about the common causes of data breaches and how to prevent them.

Trusted Device Authentication 101

Suppose you have to use your phone or other devices frequently, and you don’t want to type your password every time you wish to access an application. By implementing Trusted Device authentication, your system will recognize the device’s authentication and help you log in to the application quickly and safely. The whole process will not only save your time but will also allow you to witness an advanced authentication procedure.