Operations | Monitoring | ITSM | DevOps | Cloud

Security

The latest News and Information on CyberSecurity for Applications, Services and Infrastructure, and related technologies.

Deploying Mattermost with Zarf for highly secure air-gapped collaboration

Mission-focused teams that operate in contingency environments – think military branches, the intelligence community, NASA – increasingly depend on collaboration software. They need to share information quickly, nimbly, and securely. And they want to carry that out in contextual channels that enable them to see the right content at the right time to make informed, accurate decisions.

Why Automation is Critical for Improving an Enterprise Security Posture

Cybersecurity threats are coming in hot and have quickly become an urgent concern for organizations of all sizes. In response, security teams are shifting away from homegrown security solutions and towards automation using commercially available tools. As organizations seek to improve their security resilience, they find themselves also needing to scale their security teams more efficiently as they address continuous staffing shortages.

Zero Trust Network Access

With a global workforce rapidly shifting to remote work, organizations have had to adopt new solutions that can ensure secure access to their corporate resources. One such solution is Zero Trust Remote Access (ZTRA) – an increasingly popular security strategy designed to safeguard employee activity and protect confidential data from malicious actors. In this blog post, we’ll provide a deep dive into what ZTRA is, how it works, and the key types of protocols used in its implementation.

SSL Certificate Monitoring: A Vital Component of Website Security

Are you concerned about the security of your website or online business? Do you want to ensure that your customers can trust your site and transact with you safely? If so, then you need to know about SSL certificate monitoring! SSL certificate monitoring is the process of continuously monitoring SSL certificates for potential vulnerabilities or incidents, such as certificate revocation or expiration, and other security issues.

Unlocking the Value of Your Data with Cribl Search: A Journey with Darmar the Security Analyst

Those of you in the know, have already met Darmar, our Security Analyst at the Cribl University campus. (If you aren’t in the know, check out our newly rolled-out CCOE Stream Admin training to meet our beloved – & fictitious – goat). Hang with me, while I recount Darmar’s journey to unlocking the full value of their data.

Checkly Completes SOC 2 Type 2 Audit

In August 2022, Checkly's security team successfully implemented and documented all necessary security controls to be SOC 2 compliant for the first time. To get our SOC 2 Type 1 report we had to prove that our engineering, HR, operational, and IT security processes met the high level of information security SOC 2 compliance demands to an accredited auditing firm.

Built on ServiceNow Q&A: Samsung SDS Zero Touch Mobility

Business leaders continue to face new pressures and challenges—from ongoing global uncertainty and increased geopolitical instability to tightening budgets and having to do more with less. To thrive, enterprises must invest for the future while simultaneously finding ways to operate more efficiently. At ServiceNow, we believe partnerships are the answer.

The Future of Software Supply Chain Security With SolarWinds

The pandemic undoubtedly accelerated the growth of digital transformation and the rising use of open source, containers, and APIs. Along with this comes an even more pressing need to focus on software supply chain security. The exponential growth of applications and digital commerce has met with unprecedented security breaches.