Operations | Monitoring | ITSM | DevOps | Cloud

The latest News and Information on CyberSecurity for Applications, Services and Infrastructure, and related technologies.

Unifying Security and Data Recovery for More Seamless and Robust Cyber Defenses

Cybercriminals are constantly looking for ways to bypass defenses. You need to plan for when attackers will breach your defenses. When attackers exploit a vulnerability, you need a solution that quickly detects activities, mitigates attacks, expels attackers and enables recovery from any damage caused. It’s becoming increasingly clear that having a unified approach to data security is essential.

Benefits of agent-based configuration management

Within the configuration management space, people often distinguish between agent-based and agent-less approaches. In short, an agent-based solution means that you install a software agent to run in the background / periodically on the system. That software agent then makes changes to the system as desired, and also commonly communicates over the network to send and receive updates, policy, commands, scripts, data, etc.

Mastering Firewall Management: A Guide For Secure Networks

Firewalls protect networks from intrusions and cyber attacks. They work tirelessly behind the scenes, filtering traffic and ensuring only the right data passes through. But like any technology, firewalls need management to function optimally. This is where firewall management comes in, a crucial task for any business looking to maintain network security. Firewall management It involves not only setting up and maintaining firewalls but also regularly updating rules and ensuring everything runs smoothly.

Avoiding HIPAA Violations: Takeaways from the Providence Medical Institute Case

Do health organizations take the required measures to escape the costly fines for violation of HIPAA and leakages of patients' information? Recently a case was posted about a fine against Providence Medical Institute: the organization had to pay $240,000 as a result of a ransomware attack that caused a breach of 85,000 individuals' ePHI. The National Institute of Standards pointed out that insufficient security and the missing key safeguards were the leading causes of the breach.

The Importance of Application Control

In today's digital age, organizations face a constant barrage of cyber threats, with unauthorized applications posing a significant risk to their security and operations. Traditional security measures are no longer sufficient to protect against the sophisticated attacks that target vulnerabilities within applications and endpoints.

What's new in .NET 9: Cryptography improvements

.NET 9 is releasing in mid-November 2024. Like every.NET version, this introduces several important features and enhancements aligning developers with an ever-changing development ecosystem. In this blog series, I will explore critical updates in different areas of.NET. For today's post, I'll present some improvements to Cryptography.

Open source cybersecurity: Zero trust and confidential computing

What is the Zero Trust model in Cybersecurity? Watch the video as Ijlal Loutfi, Product Manager at Canonical, explains what Zero Trust is and why confidential computing is essential to safeguard systems against cyber attacks and vulnerabilities. Ijlal also discusses the technology that allows AI workloads to run in a confidential way. Stay tuned to our social media pages as we share educational materials to help your organizations stay secure this Month.

Pen Testing Tools: What They Are And How to Choose the Best One

Cybersecurity threats continue to grow more sophisticated, making penetration testing an essential part of any organization’s security strategy. Penetration testing tools, or "pen testing" tools, help identify and exploit vulnerabilities in your systems, networks, and applications. They are a proactive way to address weaknesses before malicious actors can take advantage. However, selecting the right one can be overwhelming with so many available tools.

Using Kosli attest in Github Actions Workflows - Some Do's and Don'ts

The heart of Kosli’s functionality lies in its attest command. Think of it as a digital notary for your CI process. Every time you complete a significant step in your pipeline (e.g., a security scan, a build, a deployment, etc) you use kosli attest to create an immutable record of that event. However, integrating Kosli into your existing CI workflow isn’t always straightforward. You might find yourself grappling with questions like.

Enhancing Healthcare Workforce Readiness Against Cybersecurity Risks

With increased digitization in healthcare organizations, there is an added risk of cybersecurity threats that may jeopardize patients' data and overall operations. The World Economic Forum has rated healthcare among the top three sectors most vulnerable in terms of cyberattacks, demanding urgent attention in approaches toward cybersecurity strategies.