Operations | Monitoring | ITSM | DevOps | Cloud

Security

The latest News and Information on CyberSecurity for Applications, Services and Infrastructure, and related technologies.

How Wiz and Torq Combine to Mitigate Existential Cloud Security Threats

A single cloud security incident can stop an enterprise in its tracks, sometimes resulting in irreparable damage to its operation, reputation, and customer loyalty. One key strategy for preventing such incidents is combining complementary cybersecurity tools to defeat threats at scale. A coherent Cyber Security Incident Response Planning (CSIRP) approach requires enterprises to select and integrate the right tools before a security incident occurs.

Take Network Monitoring to the Extreme with WhatsUp Gold/Flowmon Duo

Network monitoring is the key to efficient, reliable operation, as well as performance and security. The deeper and more broadly you can monitor (yes, you want to do both), the better your network operates. What if you could combine a superstar in network infrastructure monitoring with the champion of network flow monitoring? You can. Progress, owner of WhatsUp Gold, recently acquired Kemp and their market-leading Flowmon solution.

How a telecom company elevated integrated risk management and security

Managing risk and compliance in telecommunications is no easy feat. When a telecom company operates in underserved remote and rural communities—including hurricane-prone island markets and mountainous regions in the southwestern US—it can be even trickier. That’s where communications services company ATN International, based in Massachusetts, found itself. The company wanted a platform to elevate its integrated risk management (IRM) program.

A NetOps Guide to DDoS Defense

Join Kentik and Cloudflare as we discuss and analyze the latest in DDoS attack trends. (We’re seeing some really interesting patterns in our data!) Back by popular demand: Doug Madory, Kentik’s Director of Internet Research, will walk through how BGP monitoring can determine if DDoS mitigations are actually effective. What you’ll learn.

What is CyberArk?

Cyber security has continued to gain importance worldwide as hacking and malware threats are rising. Global losses associated with hacking and cybercrime reached $1 trillion in 2020, which has inspired the expansion of the information security industry, with revenue projected to hit more than $170 billion in 2022. As a publicly traded data security firm, CyberArk offers identity management services to protect your company.

Is Your Mac Spying On You? Maybe It Should be

What would you call software installed on your Mac, that’s hidden from sight, difficult to remove, and that silently monitors everything that happens on the system? You might call it spyware, or a RAT (Remote Access Trojan), and start thinking about how best to get rid of it. However, that same description can also be applied to the software that’s used to keep your machine safe from such threats.