Operations | Monitoring | ITSM | DevOps | Cloud

The latest News and Information on CyberSecurity for Applications, Services and Infrastructure, and related technologies.

Understanding DDoS Attacks: Motivation and Impact

DDoS attacks disrupt services and damage reputations, with motivations ranging from political to personal. These attacks can also mask more severe security breaches, so early detection and mitigation are crucial. Learn how Kentik provides a solution by analyzing enriched NetFlow data to identify and mitigate DDoS threats.

Preview Confidential AI with Ubuntu Confidential VMs and Nvidia H100 GPUs on Microsoft Azure

With Ubuntu confidential AI on Azure, businesses can undertake various tasks including ML training, inference, confidential multi-party data analytics, and federated learning with confidence. The effectiveness of AI models depends heavily on having access to large amounts of good quality data. While using publicly available datasets has its place, for tasks like medical diagnosis or financial risk assessment, we need access to private data during both training and inference.

Common Vulnerabilities and Exposures: What They Are, and Notable CVEs to Be Aware Of

As organizations and individuals rely more and more on technology for many aspects of their lives, the security of digital assets is of increasing concern. From personal data to critical infrastructure, the digital landscape is rife with potential vulnerabilities that can be exploited by malicious actors. Cybersecurity has become a mainstream imperative as breaches and cyber threats continue to escalate.

Streamlining Lead Generation: Strategies to Boost Efficiency in Digital Marketing

In digital marketing, the art of lead generation is ever-evolving, demanding a departure from conventional approaches to stand out in the crowded online landscape. This guide aims to uncover unconventional strategies that go beyond the usual playbook, injecting ingenuity into lead-generation efforts. Come along as we explore innovative ways to streamline lead generation and boost efficiency in your digital marketing endeavors.

SSL Certificate Errors: A comprehensive guide

SSL certificates create an encrypted connection between a web server and a user’s browser. This encryption ensures that any data transmitted remains private and secure, making it essential for protecting sensitive information like passwords, credit card numbers, and personal details. However, when there’s an issue with the SSL certificate, users can encounter errors that not only disrupt this secure connection but can also hint at potential security risks.

Proudly announcing Upsun's participation in the Data Privacy Framework (DPF)

As individuals become increasingly conscious of their personal data and how it is used, compliance with data protection regulations is a top priority for organizations worldwide. However, a challenge arose with cross-border transfers of personal data between the EU and the US following the Schrems II ruling by the Court of Justice of the European Union, leading to the creation of a new privacy framework.

How Machine Learning is Reshaping Your Business

Machine learning, a subset of artificial intelligence (AI), has emerged as a powerful tool for reshaping the landscape of business operations. By leveraging algorithms and statistical models, machine learning enables computers to learn from data and make predictions or decisions without explicit programming. In this blog, we'll delve into the transformative impact of machine learning on various aspects of business, from enhancing customer experience to driving innovation and ensuring data security.

After a Ransomware Infection - Enhancing Security for Your Infrastructure Against Further Intrusion

In a previous blog, we outlined the essential steps that organizations should take within the first two days after the detection of a ransomware attack. In this follow-up post, we’ll discuss what an organization should do after the initial response to reduce the risks of future attacks. We’ll also highlight how Progress Flowmon can support ongoing network monitoring, early detection of attacks and reduction of further damage. Webinar: The First 48 Hours of Ransomware Incident Response.

Greater Control Over Windows Events for Qradar: Why Windows Events Matter

Windows events provide a wealth of security-relevant information, especially when they are correlated and analyzed within a SIEM like IBM Qradar. Whether you rely on MITRE ATT&CK, NIST, or another security framework, Windows Events are likely one of your higher volumes (EPS – Events Per Second) and represent your largest-sized events (Gigs per day – Storage and Archive).

How to Implement Zero Trust for Enhanced Cybersecurity: A Practical Guide

Implementing a robust cybersecurity strategy is not optional; it’s essential. Organizations must adopt effective measures to protect their sensitive data and systems. Yet, while companies recognize the value of a comprehensive approach like zero trust security, implementing it can seem overwhelming. With a straightforward guide detailing how to implement zero trust, your organization can take action to protect your resources — before a major security incident happens.