Operations | Monitoring | ITSM | DevOps | Cloud

The latest News and Information on CyberSecurity for Applications, Services and Infrastructure, and related technologies.

An Introductory Guide to Cloud Security for IIoT

The state of industries has come a long way since the Industrial Revolution with new technologies such as smart devices, the internet, and the cloud. The Industrial Internet of Things (IIoT) is a network of industrial components that share and process data to gain insights. But as IIoT involves sensitive data and life-critical operations, this also comes with various IIoT cloud security challenges. Therefore, it is important to strengthen security.

Securing External Sharing in SharePoint Online

In today’s interconnected business world, external collaboration is essential. SharePoint Online provides the flexibility to share documents with external partners, clients, and vendors, but this can also expose organizations to data security risks. Securing external sharing while ensuring smooth collaboration is key to maintaining trust and protecting sensitive information. Here’s how you can achieve that balance.

True Stories of Devastating Data Loss (And Tips for Improving Your Own Backup Strategy)

Data loss can come from any number of sources, whether it’s a hurricane that causes major flooding in a server room or a bad actor threatening the safety of critical data by demanding a ransom for its safe return. If an organization only has a single copy of data on that waterlogged hard drive or in the hands of a cybercriminal, the odds of recovery are slim to none.

The Role of Physical Security in Safeguarding Sensitive Information in Data Centers

Physical security plays a vital role in safeguarding sensitive information housed within data centers. As data centers store vast amounts of confidential and mission-critical information, securing these facilities is essential to prevent unauthorized access, data breaches, and physical theft.

The Requirements for NIS2 Compliance: An Overview

The NIS2 Directive, an evolution of the original Network and Information Security Directive, aims to fortify cybersecurity across member states. Compliance with NIS2 not only helps organizations avoid regulatory penalties but also enhances their overall security posture, making them more resilient against cyber threats.

Understand how the Cyber Resilience Act will impact device manufacturers

The Cyber Resilience Act (CRA) is a European Union legislation that will enter into force in 2027. Its overall goal is to make devices safer by implementing more rigorous cybersecurity, documentation, and vulnerability reporting requirements for the IT industry. The CRA is especially relevant for device manufacturers, who will need to ensure devices are secure throughout the product lifecycle.

How will the Economic Crime and Corporate Transparency Act affect crypto investors?

While many businesses in the UK are caught up in speculating about what a new Labour government could mean for them, those in the crypto space should take care not to miss the biggest story that has arisen already this year. The Economic Crime and Corporate Transparency Act 2023 (ECCT) entered into force at the start of the year and brought with it a raft of new powers for law enforcement agencies and investigators. Among the primary aims of the legislation was to help tackle fraud and criminal financing involving cryptocurrencies and cryptoassets, but it may make it harder to protect your crypto wallet.

6 Ways to Protect Your API Against Attacks

When configured correctly, Application Programming Interfaces (APIs) enable seamless data exchanges across platforms, assisting with cross-app integrations and making microservices possible. As APIs have become integral in modern applications, we as developers must learn how to protect them against impending threats. The State of API Security report found that 74% of respondents have experienced at least three API-related breaches since 2021, so the threat here is very real.

Introducing Kosli's Logical Environments: Gain total visibility and control over complex systems

In today’s fast-paced development landscape, environments are no longer simple or isolated. You’re managing resources that span across development stages, geographies, and technologies. And as those environments grow more complex, so does the need for a more logical and efficient way to manage them.