Operations | Monitoring | ITSM | DevOps | Cloud

Cybersecurity & Compliance: What the Board needs to know and needs to ask

Vigilance and awareness are critical for compliance and cybersecurity maturity. If board members are not familiar with the key indicators of success for maintaining a resilient business and meeting compliance requirements, they are not fulfilling all their responsibilities. Board members need to understand the principles of their duties to alleviate potential exposure to cyber risk and other outage causing events that could harm the organization’s revenue, and reputation.

How We Leveraged the Honeycomb Network Agent for Kubernetes to Remediate Our IMDS Security Finding

Picture this: It’s 2 p.m. and you’re sipping on coffee, happily chugging away at your daily routine work. The security team shoots you a message saying the latest pentest or security scan found an issue that needs quick remediation. On the surface, that’s not a problem and can be considered somewhat routine, given the pace of new CVEs coming out. But what if you look at your tooling and find it lacking when you start remediating the issue?

Cloud-native infrastructure - When the future meets the present

We’ve all heard about cloud-native applications in recent years, but what about cloud-native infrastructure? Is there any reason why the infrastructure couldn’t be cloud-native, too? Or maybe it’s already cloud-native, but you’ve never had a chance to dive deep into the stack to check it out? What does the term “cloud-native infrastructure” actually even mean? The more you think about it, the more confusing it gets.

Protect Against Netscaler Vulnerability CitrixBleed

CitrixBleed, or CVE-2023-4966, is now an infamous security vulnerability affecting Citrix NetScaler that allows attackers to hijack user sessions by stealing session authentication tokens. Unfortunately, it has affected many NetScaler customers including Xfinity, which lost data for 36 million customers as a result of CitrixBleed. There is no way to protect against CitrixBleed by configuring the NetScaler WAF to detect and block it.

Data Center Liquid Cooling 101

As rack densities in data centers increase to support power-hungry applications like Artificial Intelligence and high-performance compute (HPC), data center professionals struggle with the limited cooling capacity and energy efficiency of traditional air cooling systems. In response, a potential solution has emerged in liquid cooling, a paradigm shift from traditional air-based methods that offers a more efficient and targeted approach to thermal management.

Set Resource Requests and Limits Correctly: A Kubernetes Guide

Kubernetes has revolutionized the world of container orchestration, enabling organizations to deploy and manage applications at scale with unprecedented ease and flexibility. Yet, with great power comes great responsibility, and one of the key responsibilities in the Kubernetes ecosystem is resource management. Ensuring that your applications receive the right amount of CPU and memory resources is a fundamental task that impacts the stability and performance of your entire cluster.

What Is NIS2?

To better protect its residents, organizations, and institutions, the European Union (EU) has strengthened its stance on cybersecurity with the introduction of NIS2 —the newly upgraded Network and Information Security Directive. This legislative framework is a response to the evolving cyber threats that show no sign of abating. In this article, we demystify NIS2 and share how it’s being used to establish a strong, unified cybersecurity framework across the EU.

SAML vs. SSO: What's the Difference?

The landscape of modern authentication and authorization in IT systems has evolved significantly over the years. Initially, systems relied on basic password-based mechanisms, which gradually gave way to more sophisticated methods as security demands escalated. The advent of digital certificates and biometric verification marked a significant leap, offering enhanced security.

How to Set Up a VPN: Complete Guide with Steps

As a growing number of people take note of their online privacy, the Virtual Private Network (VPN) has come to the fore as a simple, accessible way to secure one’s digital footprint. If you’re ready to use a VPN, you may be wondering how to get started. Whether you’re concerned about data breaches, online surveillance, or simply wish to access geo-restricted content, our comprehensive guide is here to demystify the process.