Operations | Monitoring | ITSM | DevOps | Cloud

The latest News and Information on CyberSecurity for Applications, Services and Infrastructure, and related technologies.

How to observe and troubleshoot microservices connectivity in Amazon EKS

In the complex landscape of microservices within Amazon Elastic Kubernetes Service (EKS), maintaining seamless connectivity within microservices is paramount for ensuring optimal performance and reliability. As organizations increasingly embrace microservices architecture, understanding how to observe and troubleshoot microservices connectivity issues in Amazon EKS becomes a critical skill set.

MDR Fireside Chat: How MDR keeps MSPs protected

Join our N-able MDR services fireside chat with N-able general manager of security products, Troels Rasmussen, and Dave MacKinnon, N-able vice president and chief security officer, as they break down how MDR can aid MSPs in their security and business operations. This resource is provided for informational purposes only. Information and views expressed in this video may change and/or may not be applicable to you. N-able makes no warranty, express or implied, or assumes any legal liability or responsibility for the accuracy, completeness, or usefulness of any information contained herein.

3D Secure: Essential Insights for Businesses and Cardholders

In the ever-evolving landscape of digital transactions, security remains a paramount concern for both businesses and cardholders. Amidst the rising tide of online fraud, 3D Secure emerges as a critical bulwark, designed to add an extra layer of verification and thus, protection, during online purchases. This technology, while not new, continues to evolve, making it imperative for both merchants and consumers to stay abreast of its mechanisms, benefits, and implications. Here, we delve into the must-know aspects of 3D Secure, shedding light on its importance for secure digital transactions.

What is the Benefit of Including Security with Your Observability Strategy?

Observability strategies are needed to ensure stable and performant applications, especially when complex distributed environments back them. Large volumes of observability data are collected to support automatic insights into these areas of applications. Logs, metrics, and traces are the three pillars of observability that feed these insights. Security data is often isolated instead of combined with data collected by existing observability tools.

[Demo] Intel TDX 1.0 technology preview available on Ubuntu 23.10

Securing data at run-time has long been an open security challenge. Whether it is malicious insiders exploiting elevated privileges or attackers exploiting vulnerabilities within the platform’s privileged system software, your data’s confidentiality and integrity was at risk.

The Cybersecurity Threat Landscape in 2024

Over the last few years, the number and severity of cyberattacks against organizations have significantly increased. These attacks come in various forms, including ransomware, distributed denial-of-service (DDoS), data breaches, insider threats and many more. Despite the best efforts of many cybersecurity professionals to minimize these threats, it appears there will be no decrease in the threat level in 2024.