Operations | Monitoring | ITSM | DevOps | Cloud

Security

The latest News and Information on CyberSecurity for Applications, Services and Infrastructure, and related technologies.

Be Proactive Amid Growing Cyber Security Concerns

Over the past few weeks, we’ve all been paying very close attention to the events unfolding in eastern Europe. As an individual, it’s heartbreaking to see a war break out and the impact it’s having across the region. We know that cyberattacks are now a part of war. We also know cyberattacks can be targeted, but also have the potential for unintended consequences and increased impact as they can spread outside of the initial target.

How Privacy Organizations and NGOs Help Build a Better Society

When we think of NGOs we usually think of organizations that take action regarding children, diseases, education, or poverty, but most of the time we don't think of privacy. In fact, there are tons of non-governmental organizations working hard to protect everyone's basic right to privacy. Many people are out there right now dedicating their daily lives to safeguarding our freedom and privacy in the digital era. Supporting them is more important than you can imagine.

6 Things You Should Know Before Incorporating Data Into Your Business Plan

In order to be successful in business, it's essential to have a well-thought-out and executed business plan. But even the best plans can benefit from incorporating data into the equation. However, in order to reap the most benefits from the integration, you need to do it in the most optimal way possible. That's why it's important to know these 6 things before you incorporate data into your business plan.

Achieve End-to-End Network Visibility for SASE

Enterprise networks now extend out over the internet due to cloud migrations, SaaS applications and hybrid work approaches. To support this, organizations are adopting SASE solutions to extend their traditional secure web gateways into the cloud. Having complete network visibility from end-to-end across these distributed environments is critical in safeguarding user experience. AppNeta and DX NetOps from Broadcom Software help you achieve network visibility anywhere, assuring the security and performance users can rely on.

Using OpenID Connect identity tokens to authenticate jobs with cloud providers

Introducing OpenID Connect identity tokens in CircleCI jobs! This token enables your CircleCI jobs to authenticate with cloud providers that support OpenID Connect like AWS, Google Cloud Platform, and Vault. In this blog post, we’ll introduce you to OpenID Connect, explain its usefulness in a CI/CD system, and show how it can be used to authenticate with AWS, letting your CircleCI job securely interact with your AWS account, without any static credentials.

Data-Aware Security: How to Take a 360 View of Cloud Security

Don’t let your organization fall victim to data exposure; a well-defined strategy will cover all aspects of the cloud shared responsibility model and keep your data secure. Not long ago, security concerns were the number one reason IT executives hesitated to move workloads to the cloud. Much has changed since then. Security is now considered one of the great strengths of both cloud infrastructure and software-as-a-service (SaaS) platforms. But that doesn’t mean total security is assured.

You want to know whether a dangerous stranger has your passwords?

We already live in a post-apocalyptic future that has nothing to envy to great franchises like Mad Max or Blade Runner. Proof of this are pollution, pandemics and the fact that your most intimate secrets can be violated because your most impenetrable slogans are in a database of leaked passwords. Do you feel that pinch? It’s fear and cruel reality knocking at your door at the same time. But, well, let’s stand by. Just as Mel Gibson or Harrison Ford would do in their sci-fi plots.