Operations | Monitoring | ITSM | DevOps | Cloud

Security

The latest News and Information on CyberSecurity for Applications, Services and Infrastructure, and related technologies.

5 API Security Best Practices to Protect Sensitive Data

API is short for Application Programming Interface. The software-to-software interface provides a secure and standardized way for systems to work with each other. API security means implementing practices that protect APIs from malicious attacks and data theft. Thanks to APIs, applications can deliver the information or functionality requested without user intervention. This means our everyday digital experiences remain virtually effortless.

Gain visibility into manufacturing OT assets to reduce cyber risk

As manufacturing operational technology (OT) ecosystems grow more connected and complex, they become vulnerable to cyberattacks. In fact, the manufacturing sector was the most attacked industry in the world in 2021, according to IBM’s X-Force Threat Intelligence Index 2022. Manufacturing surpassed finance and insurance in the number of cyberattacks for the first time in five years. A large part of the industry’s vulnerability is due to a lack of visibility.

CEO explains how Cove Data Protection exceeded his expectations

When Glen Buhler, CEO of Oxygen Technologies received the business case for Cove Data Protection, he could hardly believe it. He was even more shocked when his team implemented it, and exceeded his expectations. List to Glen explain how Cove Data Protection as a choice for backup is saving his company up to $250,000 a year and lots, and lots of time.

Interlink Software Achieves Cyber Essentials Certification

Cyber Essentials is a UK government backed scheme, developed by the National Cyber Security Centre. Since its inception the scheme has become the benchmark for IT security, helping organizations to deploy technical controls to guard against the common types of cyber-attacks and improve data security.

Getting started with EKS and Calico

Cloud-native applications offer a lot of flexibility and scalability, but to leverage these advantages, we must create and deploy a suitable environment that will enable cloud-native applications to work their magic. Managed services, self-managed services, and bare metal are three primary categories of Kubernetes deployment in a cloud environment.

Cloud-Based Email Security - Managing Your Email Security from Anywhere

There's a lot of talk about cloud-based email security. Many companies are using it, and many people are interested in it. But not many understand how it works or why they should consider switching from their current solution. That's why it's necessary to know why you should consider cloud-based email security for your business and how it works.

Confidential computing in public clouds: isolation and remote attestation explained

In the first part of this blog series, we discussed the run-time (in)security challenge, which can leave your code and data vulnerable to attacks by both the privileged system software of the public cloud infrastructure, as well as its administrators. We also introduced the concept of trusted execution environments and confidential computing, (CC), as a paradigm to address this challenge.

How To Protect Your Business In Case Of Accidents?

One of the biggest concerns for any business is what would happen if something went wrong, whether it be an accident, natural disaster, or theft. Accidents can happen at any time, and they often result in costly damages. No business owner wants to think about these things happening, but it's important to be prepared in case they do. So if you want to protect your business from potential accidents, here are six tips to follow.