Operations | Monitoring | ITSM | DevOps | Cloud

The latest News and Information on CyberSecurity for Applications, Services and Infrastructure, and related technologies.

What is Application Security Posture Management

Application security posture management (ASPM) is a key component in ensuring the security of applications in today's digital landscape. As organizations increasingly rely on processes to operate efficiently, the importance of securing these applications cannot be overstated. ASPM helps companies understand the security state of their applications by providing a comprehensive overview of potential vulnerabilities, threats, and areas that need improvement. In this article, we will explore what ASPM is, why it is needed, the features of ASPM solutions, leading vendors, how to implement ASPM, and emerging trends in the field.

Announcing Authd: OIDC authentication for Ubuntu Desktop and Server

Today we are announcing the general availability of Authd, a new authentication daemon for Ubuntu that allows direct integration with cloud-based identity providers for both Ubuntu Desktop and Server. Authd is available free of charge on Ubuntu 24.04 LTS. At launch, Authd supports Microsoft Entra ID (formerly Azure Active Directory) identity provider, with additional providers, including a white label OIDC provider, to be introduced in the future.

Patch Management: A Guide to Protect Systems from Cyberattacks

Code, deploy, repeat. As a developer, your days are a whirlwind of Git commits, pull requests, and CI/CD pipelines. In the rush to ship new features and hit those sprint goals, it's easy to overlook the less glamorous aspects of software maintenance. But one often-neglected practice could be the difference between a stable, secure system and a compromised system. Enter patch management, a key DevOps tool in your arsenal to safeguard your systems.

Azure Integration and Security: Challenges and Best Practices

The video features an interview with Mattias Logdberg, a specialist in Azure integration and security, at the INTEGRATE summit. Mattias discusses his session on the challenges of iPaaS solutions in the context of Azure integration and implementation. He shares his experiences and insights on the importance of understanding networking and security in cloud computing, particularly in the context of Logic Apps and API Management.

I Have SD-WAN, Do I Just Need SSE Security for the Branch?

As businesses increasingly adopt Software-Defined Wide Area Network (SD-WAN) solutions to enhance connectivity and performance across their branch offices, a common question arises: “Do I just need Security Service Edge (SSE) security for the branch?” The answer is a resounding “no”. While SSE provides essential security features, it is not sufficient on its own.

What Is FileVault Disk Encryption & How Does it Work?

FileVault disk encryption is the macOS feature that encrypts data on Mac computers. Encrypting the data on your devices means that your password is required to read it, so if the device is lost or stolen, it is protected. This is vital for protecting the privacy of individuals and the operational data of businesses and organizations. This article explains FileVault, the importance of disk encryption for individuals and organizations, and how to enable FileVault.

Feature Friday #27: Multiple outcomes

When promises are actuated, a class can be defined based on its result. For example, if a promise modifies a file’s content, you could define a class that indicates it has been repaired. However, did you know that promises can have multiple outcomes concurrently? That’s right! Native promises (but not custom promises) can have multiple outcomes. For example, a promise can be both kept and repaired at the same time. Let’s take a look.

Security by Default: The Crucial Complement to Secure by Design

Legacy cybersecurity systems – many designed over a decade ago – fail to account for the new breed of attacker capabilities and vulnerabilities – nor for the reliance on human configuration that is the Achilles heel of so much software. This new reality is being answered with the software development concept called security by default, a necessary complement to the principles of Secure by Design set forth by the U.S. Cybersecurity & Infrastructure Security Agency (CISA).

True Stories of Devastating Data Loss (And Tips for Improving Your Own Backup Strategy)

Data loss can come from any number of sources, whether it’s a hurricane that causes major flooding in a server room or a bad actor threatening the safety of critical data by demanding a ransom for its safe return. If an organization only has a single copy of data on that waterlogged hard drive or in the hands of a cybercriminal, the odds of recovery are slim to none.