Operations | Monitoring | ITSM | DevOps | Cloud

Security

The latest News and Information on CyberSecurity for Applications, Services and Infrastructure, and related technologies.

Industry Experts Discuss Cybersecurity Trends and a New Fund to Shape the Future

Cribl's Ed Bailey and Angel Investor Ross Haleliuk discuss trends in the CyberSecurity industry and Ross will be making a big announcement about his new fund to shape the future of the cybersecurity industry. Ross is a big believer in focusing on the security practitioner to provide practical solutions to common issues by early investment in companies he thinks will promote these values. Ed and Ross will discuss trends in the industry and common struggles that both Cribl and his new fund seek to address by adding value and giving security practitioners choice and control over how they run their security program.

Why Data Backup is Critical for Every Business

Data is one of the most valuable assets to a business. Business owners and managers rely on data to enable effective and efficient business operations management. As such, companies today produce and collect large amounts of data every day. Whether it is system, employee, or customer data, losing any data is a risk you cannot afford to take. In fact, it is so bad it can even cost you your business.
Sponsored Post

Reducing Security Incidents: Implementing Docker Image Security Scanner

Are you utilizing Docker to deploy your applications? If so, you're not alone. The use of Docker has skyrocketed in popularity in recent years. While it offers numerous benefits, it also introduces new security risks that need to be addressed. But, why is reducing security incidents so important? Simple - the cost of a security breach can be devastating. From lost customer trust to financial losses, the consequences of a security incident can be severe. That's why it's crucial to take steps to prevent them from occurring in the first place. Enter Docker image security scanners.

What's new in Calico Enterprise 3.16: Egress gateway on AKS, Service Graph optimizations, and more!

We are excited to announce the early preview of Calico Enterprise 3.16. This latest release extends the active security platform’s support for egress access controls, improves the usability of network-based threat defense features, and scales visualization of Kubernetes workloads to 100s of namespaces. Let’s go through some of the highlights of this release.

Enabling TLS on a Cribl Leader Node: Step-by-Step Guide

Securing your internal systems with TLS can be a daunting task, even for experienced administrators. However, with the right tools and guidance, the process can be made more manageable. In this blog, we’ll show you how to enable TLS for your internal systems on your Cribl Leader Node. We’ll walk you through the steps, and provide a video tutorial embedded below to help you follow along.

Sponsored Post

5 Advanced DevSecOps Techniques to Try in 2023

If you're here, you know the basic DevSecOps practices like incorporating proper encryption techniques and embracing the principle of least privilege. You may be entering the realm of advanced DevSecOps maturity, where you function as a highly efficient, collaborative team, with developers embracing secure coding and automated security testing best practices.

How to choose and track your security KPIs

There's no denying that Key Performance Indicators (KPIs) can be critical for any security program, and many of us are fully aware of that. Nonetheless, in practice, confusion still remains about what security KPIs are crucial to track and how to choose the right KPIs to measure and improve the robustness of your security program. Here we'll propose a few ideas about how to select and track the right KPIs for your organization.

What do best-in-class cybersecurity organizations do differently? | CISO Panel

Have they somehow found unlimited budget for their every tech request? Do they have an uncanny ability to source the diamond-in-the-rough talent? Or is it something else? As part of our inaugural State of Cybersecurity Preparedness research series, Ivanti asked 6,550+ cybersecurity professionals, leaders, and end users what their cybersecurity teams will do in the next 12 months to secure their organizations. But we wanted to know what our cybersecurity experts truly believe set top teams apart from the pack.