Operations | Monitoring | ITSM | DevOps | Cloud

The latest News and Information on CyberSecurity for Applications, Services and Infrastructure, and related technologies.

The Top 10 Problems with Vulnerability Management | Security Insights, Ep. 48

The Top 10 Problems with Vulnerability Management | Security Insights, Ep. 48 Vulnerability management is not for the faint of heart. The pitfalls are many, and odds are you probably have at least one of these issues. Ivanti's Chris Goettl and Robert Waters run down the list of what can get in the way of vulnerability management done well -- from attack surface visibility to data overload and resource constraints -- all with an eye on how those problems can be addressed. (Which we'll have more on next time. We promise.)

Google Authd broker: authenticate to Ubuntu Desktop/Server with your Google account

Today we are announcing the introduction of Authd support for Google IAM, allowing all Ubuntu users to use their Google account to authenticate to their desktop and servers. The Google broker snap for Authd is available for free on Ubuntu Desktop and Server 24.04 and it works with both personal and Workspace Google accounts.

Proactive Protection Beyond the Endpoint

The IT landscape for delivering applications and other services to end users has shifted to a hybrid deployment model, and this change is here to stay. While it provides myriad benefits for IT teams and their organizations, it also complicates the cybersecurity landscape, which needs protecting. Attackers continuously find new techniques to bypass traditional security measures.

Secure Your Sign-Ins with AppSignal's Single Sign-On

Managing team access to your organization's AppSignal account just got easier. We're excited to introduce our new Security Assertion Markup Language (SAML) Single Sign-On (SSO) Business Add-On — a secure solution designed to integrate effortlessly with your existing identity provider. This powerful feature streamlines login processes and enhances secure access management across your organization, making single sign-on a breeze.

Improving Cybersecurity with Threat Intelligence Feeds for Better Risk Management

Cybersecurity is a critical priority for businesses of all sizes, especially as cyber threats continue to evolve in complexity and frequency. With growing dependence on digital infrastructure, companies are more vulnerable than ever to data breaches, ransomware, and other malicious attacks. One of the most effective ways to enhance cybersecurity and manage these risks is through the integration of threat intelligence feeds. These feeds provide valuable insights into potential threats and vulnerabilities, enabling organizations to stay ahead of attackers and safeguard their networks.

Master CMMC 2.0 Compliance and Stay Ahead in Your Industry

The landscape of cybersecurity is constantly evolving, and businesses must adapt to stay ahead of potential threats. One of the most critical standards organizations can comply with is the Cybersecurity Maturity Model Certification (CMMC) 2.0. This compliance framework helps businesses safeguard sensitive information, especially within the Department of Defense (DoD) and other federal agencies. The updated version, CMMC 2.0, streamlines the process while maintaining a robust level of security.
Featured Post

Personal resilience boosts operational resilience

Winter is a grinding time. The temperature, the darkness and the rain all take a toll on people. As a business, it's worth remembering that the human element of IT operations needs looking after just as much as the technology they maintain. Business leaders can't have one without the other.

Ransomware as a Service- Beyond the Horizon

RaaS vs. DRaaS: The Evil Twin of Cybersecurity Ransomware-as-a-Service (RaaS) is the evil twin of Disaster Recovery-as-a-Service (DRaaS). Both are efficient, scalable, and profitable—just on opposite sides of the cybersecurity battlefield. Threat actors aren’t just hackers in dark basements; they’re running RaaS like a SaaS business, making sure their ‘clients’ get the best ROI possible—at the expense of their victims.