Operations | Monitoring | ITSM | DevOps | Cloud

Security

The latest News and Information on CyberSecurity for Applications, Services and Infrastructure, and related technologies.

What is an Endpoint Device? Overview for IT Professionals

Endpoints can be found in a variety of industries and settings, but we’ll be focusing on endpoint devices within IT environments. In this article, we provide a general overview about what endpoint devices are, the purpose they serve, as well as how you can better manage and protect these devices within your organization.

Maximizing Security and Compliance with Outsourced Back-End Development

Outsourcing backend development can make it very easy for any business to save time and resources. And that's where backend development outsourcing shines. Outsourcing can be the ideal way to save time and effort, while making sure every resource gets allocated in the best possible spot.

How IT Device Discovery Can Identify Your Network's Assets and Vulnerabilities

The security of your organization’s network is paramount to its success. With the ever-changing landscape of cyber threats, it's important to take the necessary steps to ensure that your network is secure and compliant with industry regulations. Ensuring compliance requires you to know what’s on your network. But how can that be done when only 48% of leaders and security professionals say they run their asset discovery program at least once per week?

Cybersecurity Made Easy: Simplifying Account Protection

Keeping your online accounts secure has become crucial in today's digital environment. But what's this? It's not as difficult as it first appears. You can safeguard your accounts from terrible online attacks by following a few easy actions. Let me give you a few quick ideas to make account protection simpler.

Introduction to SBOMs - What is it and do I need one? - Cloudsmith's Unpacked Conference 2023

Software Bill of Materials (SBOM) are new and exciting, but what do they actually do and do you REALLY need one? If you read any security news lately, it seems like everyone is talking about how an SBOM can solve whatever problem they have, and they are years into their SBOM journey. But many of us don’t even know what they are.

Real World Strategies for Securing the Software Supply Chain - Cloudsmith's Unpacked Conference 2023

While "secure software supply chain" can feel like a buzzword, the past 18 months have shown companies, open-source communities, and vendors making significant progress toward making it a reality. In this panel discussion, real-world practitioners will share their insights and experiences in securing the software supply chain. The panelists will cover a range of topics, from best practices in vulnerability management, risk assessment of open-source dependencies, and generating authenticated provenance, to the challenges of integrating security into the DevOps workflow. They will provide actionable strategies for improving security while maintaining development speed, and share real-world examples of how their organizations have successfully secured their software supply chains.

Fleet: Multi-Cluster Deployment with the Help of External Secrets

Fleet, also known as “Continuous Delivery” in Rancher, deploys application workloads across multiple clusters. However, most applications need configuration and credentials. In Kubernetes, we store confidential information in secrets. For Fleet’s deployments to work on downstream clusters, we need to create these secrets on the downstream clusters themselves.

Cloud Native Security for the Rest of Us

Your mission is to secure the vast tracts of land of the cloud native security landscape. Where do you even start?!? It would be preposterous to cover that whole topic in a single session, but we can at least map it out. Our plan is to break it down into three key areas and review each in turn. You’ll leave this session with a stronger understanding of the breadth and depth of cloud native security and resources to further develop your knowledge.

Why Scammers Want Your Information and How to Protect Yourself Online

In the digital age, where our lives are interlinked with technology, protecting ourselves from online threats has become the prime concern. Scammers are constantly evolving their tactics to exploit unsuspecting individuals for their personal information, which can lead to identity theft, financial loss, and other detrimental consequences. Understanding why scammers want your information and adopting effective protective measures to combat it can help safeguard your online presence. This article explores the motives behind scammers' actions and provides practical tips to enhance your online security.