Operations | Monitoring | ITSM | DevOps | Cloud

Security

The latest News and Information on CyberSecurity for Applications, Services and Infrastructure, and related technologies.

How secure tech can improve public service delivery in Australia

Australia’s government has big aspirations to increase public service capability and capacity. By reducing its reliance on external firms and bringing capabilities in-house, the government hopes to boost efficiency, improve spending, and become a more equitable, inclusive employer. This transition won’t necessarily be easy. Manual processes and disparate legacy systems will make it difficult for government agencies to deliver great employee experiences.

Three Ways to Prepare Your Agency for a Modernized Digital Verification System

Last year, the U.S. House of Representatives introduced legislation for states to develop highly secure, interoperable systems enabling digital identity verification. According to the Better Identity Coalition, the Improving Digital Identity Act is the first step to ensuring the U.S. is up to speed with the developed world on digital identity. Without secure, accessible, interoperable digital credentials, agencies are put at risk for security vulnerabilities, online fraud, and more.

What Are Privacy Acts? And Why Are They Important for Your Business?

Control over our privacy is something we should all be entitled to. Privacy is a human right after all and that should be the case whether we’re on or offline. Good news is many countries around the world have introduced privacy acts for both online and offline data use over the recent years. With the internet growing astronomically in such a short period of time, more concern than ever has been placed on user data and how it's gathered, stored, and used by those who acquire it.

Understanding Security Automation vs. Orchestration

“Automation” and “orchestration” are terms that frequently appear within the same sentence – which is unsurprising, because they are closely related. In fact, they’re so similar in meaning that it can be easy to confuse their meanings or assume that there is basically no real difference between security automation and orchestration. But, as with many concepts in the world of IT and security (“observability” vs.

Privacy vs Anonymity: What's the Difference and Why They Matter

With all the new online products and services coming out, you see a lot of buzzwords used to describe them—private, anonymous, secure, open-source, safe, encrypted. News flash, words have meanings, and the terms used to describe something can give you a big hint to what that thing does well. Privacy and anonymity, or "private" and "anonymous," are two words that are frequently used interchangeably to mean no one is watching you or knows what you are up to.

Active Zero Trust Security for Containers and Kubernetes

Tigera provides the industry’s only active Cloud-Native Application Protection Platform (CNAPP) with full-stack observability for containers, Kubernetes, and cloud. Calico prevents, detects, troubleshoots, and automatically mitigates exposure risks of security issues in build, deploy, and runtime stages across multi-cluster, multi-cloud, and hybrid deployments. Calico works with popular managed Kubernetes services such as AKS, EKS, and GKE, as well as self-managed Kubernetes distributions including Red Hat OpenShift, SUSE/Rancher, VMware Tanzu, and Mirantis.

14 Most Common Types of Cyber Attacks (and How to Prevent Them)

With the digital transformation in general (and the expansion of the digital workplace in particular), the world has experienced increased cyber attacks in many forms and shapes. Simply put, they consist of an intentional act of using a computer to disrupt or damage a system, network, program, or data. They can happen in many ways and can be done by anyone with an internet connection.