Operations | Monitoring | ITSM | DevOps | Cloud

The latest News and Information on CyberSecurity for Applications, Services and Infrastructure, and related technologies.

Introducing CartShark

Ecommerce websites are more vulnerable than ever to cyberattacks. Among these threats, web-skimming attacks – also known as data exfiltration or Magecart attacks – stand as the number one threat, targeting sensitive customer data and payment information. RapidSpike is proud to introduce CartShark, a revolutionary cybersecurity platform that empowers ecommerce businesses to combat these threats swiftly and effectively.

How to Use Network Visibility in Your Cyber Security Strategy

As organizations grow in size and complexity, their internal networks often become a “black hole” in terms of visibility. To keep these networks secure, this visibility needs to be managed, but time and budget seldom allow IT and cybersecurity professionals to gain actionable insights. N‑able’s VP, Product Management, Jim Waggoner and Head of Threat Research, Kevin O'Connor demystify network visibility and provide valuable takeaways you can implement today to mature your cybersecurity posture.

Integrating Google SecOps with Bindplane February 2025

Google SecOps (formerly Chronicle) is Google Cloud’s security operations platform (SIEM) that helps you detect, investigate, and respond to cybersecurity threats. Integrating Bindplane enables an easy way of standardizing how you efficiently collect, process, and forward security-relevant data to Google SecOps. In this live workshop you’ll get a hands-on demo of how to configure log collection with the Bindplane Distro for OpenTelemetry Collector, and best practices for data standardization using open standards and OpenTelemetry.

The Role of Facial Recognition Cameras in Modern Surveillance AI Technologies

Facial recognition cameras have rapidly emerged as one of the most advanced tools in modern surveillance AI technologies, transforming security measures across industries. These intelligent systems integrate artificial intelligence with real-time data processing to identify individuals with remarkable accuracy, enhancing law enforcement, border control, and corporate security. Surveillance systems that leverage facial recognition cameras provide unmatched capabilities in monitoring and streamlining identity verification, making them an indispensable asset in today's security landscape.

NIS2 Directive and Cybersecurity: Requirements, Risk Management, and Monitoring

The days when an antivirus and common sense were enough to guarantee an organization’s cybersecurity are long gone. Especially if you work in a critical sector. That’s why the NIS2 Directive (2022/2555) of the European Union establishes cybersecurity obligations for these key activities… and the consequences of non-compliance. These consequences are significant, so let’s analyze the regulation, when it applies, and how to implement it.

Automating Government Compliance Requirements

Government compliance regulations are becoming more complex every year. For businesses, staying compliant means balancing a growing list of laws and policies while facing tighter budgets, limited resources, and increasing scrutiny. Failing to comply isn’t just risky—it can result in hefty fines, reputational damage, and operational inefficiencies. This is where automation can be a game-changer.

What is Entra ID? .... and how Entra ID has evolved since the Azure AD rebranding

Entra ID is the new name for Azure Active Directory (Azure AD), Microsoft’s cloud-based identity and access management service. This rebranding, announced in July 2023, is part of Microsoft’s broader Entra product family, which focuses on securing access to digital resources and managing identities in a comprehensive way.

Valkey container image - securely designed, compliant, and long term supported (LTS)

Valkey is a new database management system that is gaining traction. Valkey is a fork of Redis, and it is available as a deb package in the Ubuntu 24.04 release. You can install it by simply running sudo apt install valkey. We also offer a Valkey container to allow you to run a secure, compliant and long-term supported Valkey on top of any Linux distribution.