Operations | Monitoring | ITSM | DevOps | Cloud

Security

The latest News and Information on CyberSecurity for Applications, Services and Infrastructure, and related technologies.

CIS Control Compliance and Centralized Log Management

Your senior leadership started stressing out about data breaches. It’s not that they haven’t worried before, but they’ve also started looking at the rising tide of data breach awareness. Specifically, they’re starting to see more new security and privacy laws passed at the state and federal levels. Now, you’ve been tasked with the very unenviable job of choosing a compliance framework, and you’re looking at the Center for Internet Security (CIS) Controls.

Netreo Further Strengthens Security Posture, Earning Veracode Verified Team Recognition for Entire Product Line

Huntington Beach, Calif. – March 23, 2022 – Netreo, the award-winning provider of IT infrastructure monitoring and observability solutions and one of Inc. 5000’s fastest growing companies, today announced the company has achieved Veracode Verified Team status for Netreo’s full-stack monitoring and observability suite.

Red Team vs. Blue Team: The Role of Each in Finding Your Cybersecurity Weakness

As the modern world moves almost entirely online, so do the issues we used only to face in the physical world. In years gone by, security may have taken the form of a CCTV camera or a person hired to ensure customers don't steal from your premises. Well, as you can probably tell, neither of these solutions works when it comes to cybersecurity and keeping a business safe online.

Automated Zero Trust: The Only Thing to Put Your Trust in

There’s no question that centralized identity and access management (IAM) helps companies reduce risk and prevent attacks. But, as this week’s Okta attack shows, centralized IAM doesn’t eliminate all risks. Attackers with access to IAM data can use this information to easily access downstream systems or modify permissions to grant elevated access to malicious parties.

IT Heroes Podcast - EPS 06 SMB's response to a cyberattack

In this episode, Edgar hosts Andy Ellwood, VP of Product Marketing, Pulseway, and Giridhara Raam, Cybersecurity Evangelist, Pulseway to discuss why the cyber response is important for SMBs and how should SMB's react to a cyber incident - communication norms, response protocols, and tips to up their game on the reactive approach.

Centralized Log Management and NIST Cybersecurity Framework

It was just another day in paradise. Well, it was as close to paradise as working in IT can be. Then, your boss read about another data breach and started asking questions about how well you’re managing security. Unfortunately, while you know you’re doing the day-to-day work, your documentation has fallen by the wayside. As much as people are loathed to admit it, this is where compliance can help.

3 Benefits of Having Managed Cyber Security Services

Businesses are increasingly reliant on technology, and as a result, they are becoming more vulnerable to cyber-attacks. So, If you're not sure your business is protected against cyber threats, it's time to consider managed cyber security services. These can make a tremendous difference in the level of protection for your organization, and they will allow you time to focus on other important aspects. In this blog post, we will discuss the three main benefits of having a managed cyber security service in place for your business.