Operations | Monitoring | ITSM | DevOps | Cloud

Security

The latest News and Information on CyberSecurity for Applications, Services and Infrastructure, and related technologies.

Governance, Risk and Compliance for MSPs in 2023

RedLin Murphy, N-able’s head of Governance, Risk and Complaince, as well as Dave MacKinnon, N-able’s Chief Security Officer discuss current and upcoming regulations that do or could impact MSP’s, what you can do to prepare for these things as cyber governance continues to at both the state and federal levels.

Six Mistakes To Avoid When Mapping Your Enterprise Data Landscape

Any organization that wants to make the most of its data needs to understand its data landscape clearly. Data mapping is essential to achieving this understanding, but it can be a complex task. There are several pitfalls that organizations need to avoid. Here are the six most common mistakes to avoid when data mapping your enterprise.
Featured Post

What's in store in 2023 for the tech industry?

The tech scene is expanding rapidly across the world. In fact, in the last year alone, within the UK, a new tech unicorn was created every eleven days - more than doubling the number of UK unicorns from 2017. From AI and automation, to DevOps and data engineering, innovations are continuing to reshape and improve our everyday and working lives, critical at this time of socio economic instability. Here are thoughts from tech leaders, globally, exploring what 2023 has in store.

Security holiday calendar - Part 1

As it was well received last year, we decided to do another security-focused holiday calendar this year. The concept was roughly the same, but instead of only adding security hardening modules, we’ve also added in some other security advice and blog posts to improve the variety. Now that we’re halfway through to 24 (or 25), let’s recap the first half of the calendar.

Building a Compliance Report based on inventory modules

In CFEngine Enterprise we collect information from each system in the infrastructure as inventory. Some inventory is available by default, and more can be added using modules or writing policy. You can use inventory information to create a Compliance Report with checks that determine if the information complies with your security requirements. In this blog post, we will use some modules from CFEngine Build which provide inventory data, and build a Compliance Report on top of those.

Top 5 benefits of network backup software

One of the leading and most catastrophic causes of is misconfigurations or faulty configurations. This type of downtime may occur at any moment suddenly, even sometimes turning out to be a surprise for network admins. Whenever this type of downtime occurs, it is mandatory for network admins to find the root cause of the issue in order to troubleshoot and then bring the network back up. This is hectic as well as time-consuming, leading to a loss of precious time for the organization.

Grafana 9.3 feature: Grafana OAuth token improvements

As part of our efforts to improve the security of Grafana, we introduced a long-awaited feature in the latest Grafana 9.3 release that enhances Grafana’s OAuth 2.0 compatibility. The new Grafana OAuth token improvements, which are available in Grafana OSS, Grafana Cloud, and Grafana Enterprise, ensure that the user is not only logged into Grafana, but they’re also authorized by the OAuth identity provider.

The What, Why and How of Auto-Remediation in Cybersecurity

When you’re facing a cyberattack, waiting even just minutes to respond could be the difference between business as usual and a calamity. It may only take that long for threat actors to exfiltrate sensitive data or disrupt critical systems. That’s one reason why automating remediation is an essential ingredient in an effective cybersecurity strategy.

The Economics Behind Cloud-First Data Protection

If you’re still reliant on legacy local-first backup, you may not fully realize the financial impact of old-school image backup on your business. In today’s cloud-first world, it’s time to take a look at a modern cloud-first approach to data protection as a service. This webinar will walk you through the hidden (and not so hidden) costs of continuing to manage backup using either an image-based software product (like Veeam) or an integrated appliance (like Datto). We’ll do the math to show you a more cost-effective alternative.

Graylog 5.0 - A New Day for IT & SecOps

We are excited to announce the release of Graylog 5.0! Graylog 5.0 brings updates across our entire product line, including changes to infrastructure, Security, Operations, and our Open offerings. For more detailed information on what’s changed, visit our changelog pages for Graylog Open and Graylog Operations/Graylog Security.