Operations | Monitoring | ITSM | DevOps | Cloud

Security

The latest News and Information on CyberSecurity for Applications, Services and Infrastructure, and related technologies.

Network visibility makes all the difference! The key to Managed Service Providers to protecting your customer data

In a world where technology is ubiquitous, network security is of paramount importance. Every day that goes by, cybercrime evolves and becomes more sophisticated. They improve the materials of their balaclavas and spend more on incognito sunglasses. In 2015, the damage caused by cybercrime already cost the world 3 trillion dollars, since then the figure has only multiplied. No wonder companies are looking for ways to protect themselves against cyberattacks, don’t you think?

Strengthening Aviation Cybersecurity: Take Flight with Teneo and Akamai Guardicore

In today’s digital landscape, the aviation industry faces increasingly sophisticated cyber threats that can compromise the safety and security of critical systems. To combat these challenges, the Transportation Security Administration (TSA) has implemented new cybersecurity requirements. In this blog post, we’ll explore how Teneo, in collaboration with Akamai Guardicore, can help aviation organizations meet these requirements and strengthen their cybersecurity defenses.

Leveraging Calico flow logs for enhanced observability

In my previous blog post, I discussed how transitioning from legacy monolithic applications to microservices based applications running on Kubernetes brings a range of benefits, but that it also increases the application’s attack surface. I zoomed in on creating security policies to harden the distributed microservice application, but another key challenge this transition brings is observing and monitoring the workload communication and known and unknown security gaps.

The Power Duo: Authentication and AML Strategies for Tech Companies

As technology becomes increasingly integrated into our daily lives, it is crucial for tech companies to prioritize strong security measures. One of the key challenges they face is safeguarding user data, ensuring secure transactions, and complying with anti-money laundering (AML) regulations.

Phishing 2.0: How to Stop Cyberattacks Even Pros Can't Catch

According to Ivanti's 2023 Press Reset cybersecurity report, over 50% of surveyed security professionals said their organizations hadn’t experienced a phishing attack – despite virtually every organization getting phished last year! Today’s phishing campaigns use sophisticated social engineering techniques and the latest AI advances with devastating effectiveness, tricking your most valuable users out of sensitive information, network access and personal credentials.

What Is Reasonable Suspicion And Why Is It Important

When it comes to maintaining a safe and productive workplace, ensuring compliance with state and federal labor laws is essential. But what happens when an employer suspects that an employee may be engaged in activities or behaviors that are in violation of the law? For many organizations, this means turning to reasonable suspicion-a legal concept that can help employers proactively protect their interests while also respecting the privacy of employees.

Cyberattack Prevention with AI

Cyberattack prevention involves proactive steps organizations take to protect their digital assets, networks, and systems from potential cyber threats. Preventive measures, such as a combination of best practices, policies, and technologies, are employed to identify and mitigate security breaches before they can cause significant damage.

Streamlining Data Management for Enterprise Security | SpyCloud

In this customer story, Ryan Sanders, lead security engineer at SpyCloud, shares his experience using Cribl to centralize and store data for account takeover protection and online fraud prevention. Ryan discusses the challenges he faced in managing data across multiple platforms and the solutions Cribl provided. Cribl acts as the Swiss Army knife for observability engineers, empowering them to collect data from various sources and perform custom integrations.