Operations | Monitoring | ITSM | DevOps | Cloud

Security

The latest News and Information on CyberSecurity for Applications, Services and Infrastructure, and related technologies.

What after I install Let’s encrypt?

TL;DR you’re never done with Let’s encrypt: once your servers are secure, you must ensure they stay that way. Let’s encrypt is a no brainer: this initiative benefits us all, with free domain-validated certificates. It’s easy to setup and free. There’s probably automatic installation for your web server of choice, the community behind it can help, and tutorials are everywhere. Then you head to https://.com and you’re done… not.

How’s your SSL security doing?

It was in your TodoList: install the SSL certificate. So you’ve setup your SSL certificate on the web server. It’s quite trendy to use SSL. Google will give you a modest ranking bump, some users will feel safer, all is good. You have even tested your configuration with Qualys, got you an A+. Good job: most got a C, even banks. Now what? What will happen when your cert is about to expire? Your CA will send an email to renew your cert. But maybe someone in the accounting dept will get that email.

Continuous Operations for Competitive Advantage

06/19/2014 Webinar with CFEngine Co-Founder and CTO Mark Burgess and guest speaker Forrester Research, Inc. Vice President and Research Director Glenn O'Donnell to discuss the principles of continuous operations and service management -- and how great service design combined with automation can empower your organization to survive and thrive in what is becoming know as "The Age of the Customer."

Two Factor Authentication - What it is and How to implement it

One of the biggest pains of using the internet today is constantly being forced to create new accounts to use basic services on the internet. While many tech savvy users know to use password managers to allow them to create unique strong passwords for each website, the average internet user is much less sophisticated.