Operations | Monitoring | ITSM | DevOps | Cloud

Security

The latest News and Information on CyberSecurity for Applications, Services and Infrastructure, and related technologies.

How to setup Azure Key Vault

Microsoft Azure Key Vault is a cloud-based service designed to help organizations securely store and manage sensitive information such as encryption keys, secrets, and certificates. As more organizations migrate to cloud services, ensuring the security of sensitive data and applications is crucial. In this comprehensive guide, we will discuss Azure Key Vault with a focus on securing Blob Storage, providing how-to guides and best practices.

Announcing: Time-Based, Revocable, Leased - Dynamic Access Credentials for InfluxDB

Today we’re excited to announce the InfluxDB add-on for Ockam Orchestrator. Through the use of the add-on, customers that are using InfluxDB Cloud can use Ockam to improve their security posture by automatically granting uniquely identifiable, least privilege, time-limited credentials for any client that needs to connect to InfluxDB Cloud.

The 5 Biggest Enterprise Threats to Your Mobile Security and How to Prevent Them

The 5 Biggest Threats: You may have found your business is relying on mobile devices more and more. The computing power of phones and tablets can now equal that of your average desktop computer, but their portability makes them far more useful in a remote working environment. With the number of online communications options available to mobile devices, making a call on a mobile phone is almost an afterthought – but with a cloud business phone system, it is an option that is supported.

How to Comply with Current EU Regulations NIS2 & RCE

Individual EU Member States are expected to transpose the NIS2 and RCE directives into national legislation. It will concern not only critical, essential and important entities, but also National Security Authorities and various accredited CSIRTs. In this webinar, we discuss important milestones, individual measures and obligations, and the capabilities of the Flowmon solution, which can help organisations comply with directives and paragraphs of Cyber Security Acts, especially in the area of risk-management measures, network security monitoring and incident reporting.

Maximizing Password Security: A Guide for IT Professionals on World Password Day

With every new device, application and website that your users and employees have to log in to, they have to create a new password. It’s no wonder then that they find this overwhelming. So, what do they do? They create a password that is easy to remember — something like “123456” or perhaps their birth date. Then, to keep it simple, they use the same password over and over again. On top of that, they opt for their browsers and devices to remember these passwords.

Endpoint Devices Explained (with Examples)

By 2030, experts predict that there will be over 40 million connected devices worldwide. These “devices” are a variety of endpoints, such as laptops, smartphones, computers, and more. Businesses and organizations around the world rely on these endpoints to complete tasks, communicate, and access information. In this overview, we’ll go over the different types of endpoint devices and how they affect an IT environment.

Build the foundation for your zero trust strategy with Ubuntu confidential computing

Why do we want to eliminate trust? Isn’t trust a good thing that we should foster and grow? And shouldn’t computing platforms trust their end-users, and vice versa? The short answer is no. And I would argue that the very goal of system security has always been to reduce trust.

Why Log Analytics is Key to Unlocking the Value of XDR for Enterprises

Cyber threats are becoming more sophisticated, and enterprise security teams are under constant pressure to improve and enhance their threat detection and response capabilities. But as security teams expand their security logging tools and capabilities, the burden of monitoring those tools and investigating alerts grows exponentially.

Why Organizations Should Invest in Endpoint Hardening and Automation

Endpoint (or device) hardening is the concept of reinforcing security at the device level. Because securing endpoints is fundamental to every other security action you take, it’s important to invest as much as you can into endpoint hardening. According to research conducted by Ponemon with Keeper Security, 81% of businesses experiencing an attack in 2020 were faced with some form of malware. Other forms of attack also included credential theft, compromised/stolen devices, and account takeover.