Operations | Monitoring | ITSM | DevOps | Cloud

Security

The latest News and Information on CyberSecurity for Applications, Services and Infrastructure, and related technologies.

OAuth Authentication - xMatters Support

OAuth is an open standard system that uses tokens to grant access to systems or information without using a password. OAuth authentication authorizes requests to the xMatters Rest API by passing a token in the header of your requests. This means you don’t have to store user names or passwords in your applications, keeping your user’s information secure.

5 Important Operations Issues to Consider When Working With an International Team

In a world where remote work is becoming more and more common, international teams are the new normal. Organizations now have the opportunity to tap into a global pool of talent but working with team members in different time zones and cultures comes with challenges. From communication and collaboration to managing expectations and building trust, there are several important factors to consider when working with an international team.

Citrix NetScaler Denial-of-Service (DoS) JavaScript Triggers

Are you aware when Denial-of-Service (DoS) JavaScript triggers occur on your Citrix NetScaler devices to block DoS attacks? Do you know when exceptions are made based on 'valid' DoS cookies? MetrixInsight for NetScaler monitors for these occurrences and alarms you whenever this happens (too often).

Effective vulnerability management for your microservices

Vulnerabilities are part and parcel of the software development life cycle. If left untreated, they can expose your application to malicious attacks, which can be detrimental to its functioning and reliability. To avoid severe damage and complications that arise from having the vulnerabilities exposed, it is good practice to set up a vulnerability management system. Vulnerability management is a practice that teams should integrate into the larger development process as it helps keep the software secure.

Do VPNs Really Keep Your Browsing Data Private?

The internet is helpful, but it can also be dangerous. With cybercriminals on the hunt for your precious data and intrusive government agencies spying on the activities of everyday citizens, internet security and privacy have become a genuine concern. Your internet service provider has a front-row seat to all of your private browsing data, and they can monitor you, throttle you, and share that information at will. If this sounds like a gross invasion of privacy, you're absolutely right!

Cloud Security: Indiana Bob's Server Closet Versus Data Centers | Security Insights Podcast, Episode 28

Amanda and Chris share stories proving why your data really is more secure in the cloud than the average on-premises server closet – and what organizations should worry more about when it comes to data security.

Secure Backup Strategies for 2022

Hard drive crash. Ransomware. Equipment failure. Accidental deletion. Theft. There are plenty of reasons why end users want to have a secure and up-to-date backup of their most important files. And there are just as many approaches to backup and recovery as there are reasons to want it in place. In this article, we’ll discuss practical strategies and best practices for backing up important data, including consumer-level options and how to get the most from an enterprise-grade backup solution.