Operations | Monitoring | ITSM | DevOps | Cloud

Security

The latest News and Information on CyberSecurity for Applications, Services and Infrastructure, and related technologies.

Tigera named as one of Forbes America's Best Startup Employers in 2023

We are proud to announce that we have been named one of America’s Best Startup Employers 2023 by Forbes! The Forbes list of America’s Best Startup Employers 2023 was compiled by evaluating 2,600 companies with at least 50 employees in the United States. All of the companies considered were founded between 2013 and 2020, from the ground up, and were not spin-offs of existing businesses. Just like other Forbes lists, businesses cannot pay to be considered.

What is SOC Compliance? Basic Overview for Businesses

IBM reports that the global average total cost of a data breach in 2022 was $4.35 million. Data breaches are rising each year, with an ever-increasing cost, so it’s absolutely essential to be prepared and proactive in your data protection strategy. When clients provide personal or business data to an MSP, they expect the provider to have proper policies and procedures in place to protect that data.

The Importance of HIPAA Compliance in Business App Development

In today's digital age, businesses rely heavily on technology to store and share sensitive information. However, the risk of data breaches and privacy violations comes with the increasing use of technology. This risk is particularly high in the healthcare industry as patients' sensitive personal and medical information is at stake. To address these risks, the Health Insurance Portability and Accountability Act (HIPAA) was introduced in 1996 to set standards for protecting personal health information.

What is the difference between SSL vs. TLS? Which Gives Your Website the Best Protection?

One of the most important considerations if you're seeking maximum security for your website is using encryption protocols. You have two choices: SSL (secure sockets layer) and TLS (transport layer security). These commonly used protocols encrypt internet communications and protect sensitive website data from malicious attacks. Let's cover the key differences between SSL and TLS and point you in the right direction for choosing the best protocol for your website.

If You're Always Delivering Valuable Packages To Customers, This Is How To Secure Your Business

Package security is always a big concern when delivering valuable items to customers. With the ever-increasing competition among businesses, it's important to make sure you're providing the best security features for your packages. Here are some tips on how to secure your business when delivering valuable items. Let's get started!

Industry Experts Discuss Cybersecurity Trends and a New Fund to Shape the Future

In this live stream discussion, angel investor Ross Haleliuk joins Cribl’s Ed Bailey to make a big announcement about his new fund to shape the future of the cybersecurity industry. Ross is a big believer in focusing on the security practitioner to provide practical solutions to common issues by making early investments in companies that will promote these values.

Role-based credential management with OIDC

In our article on managing static credentials, we discussed the necessity of secrets — the passwords, tokens, and API keys that connect digital services together — and the importance of keeping them secure so that your infrastructure and data are kept safe from intrusion and misuse. For organizations delivering software at scale, managing credentials across multiple teams and projects can quickly become tedious and error-prone, creating bottlenecks and unnecessary risk.