Operations | Monitoring | ITSM | DevOps | Cloud

Security

The latest News and Information on CyberSecurity for Applications, Services and Infrastructure, and related technologies.

From Alarms to Action: Enhancing Business Security Response Protocols

There's nothing harder than starting and running a successful business in today's modern and competitive society. As a business owner, you have lots to think and worry about, aside from profit margins and customer satisfaction. If you want to keep your business afloat, you also have to think about security and safety and make sure everything is up to par.

GitKraken Client and HIPAA: The Ultimate Guide for Software Developers in Healthcare

In the rapidly evolving world of healthcare technology, the Health Insurance Portability and Accountability Act (HIPAA) stands as a beacon of data privacy and security. For software developers operating in this domain, understanding and adhering to HIPAA isn’t just a regulatory mandate—it’s a commitment to patient trust and safety. With the increasing reliance on version control systems in software development, choosing the right Git client becomes paramount.

Phishing 2.0: How to How Stop Cyberattacks Even Pros Can't Catch

The information gap is broadening. According to Ivanti’s 2023 Press Reset cybersecurity report, over 50% of surveyed security professionals said their organizations hadn’t experienced a phishing incident in the last 24-months – despite virtually every organization getting phished in 2022!

The Fatal Unconnectedness of Incumbents from Customers: The Tale of a Race Against the Clock

This tale is based on an actual event that happened to one of our Cribl Search customers. It highlights a massive gap between the urgent needs of modern businesses and the outdated, draconian terms dictated by traditional SIEM vendors. While the events are real, a touch of dramatization was added for the fun of it. Why not?

How to Track and Enforce Snyk Scans Across Your Production Environments

If you’re delivering software in a regulated environment, or deploying to a critical application or device, ensuring the security of your software code and dependencies is essential. One of the most popular tools for achieving this is Snyk, which gives developers the ability to find and fix vulnerabilities as part of their development workflow.

How to Securely Wipe a Windows Hard Drive with PowerShell

In today's era of data security, the proper disposal of data on hard drives is crucial. For IT professionals and Managed Service Providers (MSPs), having reliable tools for these tasks is essential. In this blog post, we're diving into the details of a versatile PowerShell script designed for secure and efficient disk wiping. We'll also provide essential tips to ensure its successful execution and data removal.

How to Reduce IT Security Risk With IT Asset Management

The connected world we live in has both transformed our workplaces and raised the cybersecurity challenges. On top of this, remote work and the growing reliance on cloud services and SaaS apps can also make it more difficult for cybersecurity teams to keep track of all the potential threats. This is why, today more than ever, learning how to reduce IT security risk with IT Asset Management (ITAM) can be a game changer to keep your workplace protected.