Operations | Monitoring | ITSM | DevOps | Cloud

Security

The latest News and Information on CyberSecurity for Applications, Services and Infrastructure, and related technologies.

Uptrends launches new solution for SMS-based 2FA transaction monitoring

As web applications and other digital solutions become more prevalent in everyday life, securing access to these apps against cyber threats becomes more an integral part of their design rather than a separate line of thought. Global cybercrime costs are expected to grow by 15% per year over the next five years, reaching $10.5 trillion annually by 2025.

Latest Features Enhance Workflow Creation, Add Modern Controls

The consensus on the state of cybersecurity professionals tends to fall somewhere between “burdened by high volumes of responsibility” and “dangerously understaffed and suffering from unhealthy levels of stress,” depending on how optimistic your source is.

New 2022 Report: Alarming Ransomware Trend Shows No Sign of Reversing

It’s no secret that ransomware threats skyrocketed – in both volume and boldness – during the pandemic. Threat actors capitalized on the sudden transition to remote work and the resulting lapses in security. Now that the working world is beginning to settle into a permanent Everywhere Workplace, you might think the ransomware trend would begin to reverse. Not so, according to a new report from Ivanti. The report details ransomware trends from Q1 2022, and the findings are bleak.

4 Key Steps of a Vulnerability Management Process

Vulnerabilities within an IT environment pose a big security risk and are a threat to digital data within an organization. These vulnerabilities can be exploited by others, or a lack of necessary precautions can result in damaged or lost organizational data. Therefore, it is essential to have a vulnerability management process in place for these reasons.

What is UAC Virtualization? Benefits and Pitfalls

UAC stands for “User Account Control”. This is a field of software management that isolates the operating system’s core components from potentially damaging changes. It refers to the level of access that in Unix-like systems is called “root” and in Windows systems is known as Administrator privileges. User Account Control was initially rolled out as part of Windows Vista to allow only admin accounts to give and take away these permissions.

Top 3 Ways Remote Working Has Unknowingly Increased Your Security Risk

Users across the globe have left their office buildings along with the safety and security of the workplace. This has left companies at their most vulnerable because the full scope of their security exposure is unknown. Attackers are wise to the gaps and vulnerabilities that come from remote working. Not only has the attack surface increased in recent months, but the volume of COVID-19 spam, phishing attacks and malware has also skyrocketed.

Riverbed Webinar Demo - Security Workflows

Managing aging infrastructure that’s geographically dispersed brings unique challenges to the Oil & Gas industry because obsolete technologies and automation make it particularly vulnerable to cyberattacks. To combat these attacks, leveraging integrated and full-fidelity data can help you to identify the unknown, avoid business disruptions, and help you save time by: This technical overview of Riverbed’s NetProfiler Flow Monitoring solution demonstrates those security workflows, and introduces a helpful thread feed that includes SUNBURST Backdoor.

Securing SD-WAN in a Cloudy World

Today’s cloud-first enterprise must securely connect their workers to their applications, no matter where their applications may live. Only by transforming both the WAN edge and security architectures can the full promise of the cloud be fully realized. SD-WAN is your opportunity to re-architect, design and build a network that’s secure and fit for the future. Teneo Inc. and Silver Peak can help to make this a clear reality in our cloudy world.

How Zero Trust Enables Work from Anywhere and Builds Toward a SASE Vision

With the global pandemic greatly accelerating many organizations digital transformation, IT and security leaders are coming to terms with the new realities of employees permanently working from anywhere and how that dramatically changes the security risk and the security architecture required. In this session, a panel of expert speakers discuss how Zero Trust security is a key requirement for this new way of working, and the vital role of secure access service edge (SASE) in implementing this approach going forward.

What's New in Calico v3.23

Hey everyone. We’re excited to announce the release of Calico v3.23! Thanks to everyone in the community who contributed to the release. We could not have fitted this many improvements in without you. To view the detailed release notes, please visit us here. While we have many improvements in this release, here’s a brief overview of some of the larger features to be aware of.