Operations | Monitoring | ITSM | DevOps | Cloud

Security

The latest News and Information on CyberSecurity for Applications, Services and Infrastructure, and related technologies.

How to Grow Your Own Cybersecurity Talent

The cyberthreat landscape has expanded in recent years, accelerated by enterprises promoting remote work and more reliance on cloud computing. These are a business necessity, and yet, facing down cybersecurity threats often doesn’t come with an expansion of resources to address them. In a future post, I’ll discuss more about the Security Poverty Line, and how organizations deal with its harsh trade-offs and compromises in an uncompromising landscape.

5 Common Cybersecurity Mistakes You Can Easily Prevent

A comprehensive organizational strategy and robust company security policy are crucial for effective cybersecurity. A company needs to make a concerted effort to design, execute, and follow through with a plan to deal with cyber-risk management from top to bottom. There is no one-size-fits-all strategy for the needs of enterprises in managing cyber risk. But in order to maintain strong system security in the face of constant threats, there are some core principles that every company should follow.

How to launch Confidential VMs on Azure

Canonical is happy to announce the general availability of Ubuntu Confidential VMs (CVMs) on Microsoft Azure. Ubuntu 20.04 is the first and only Linux distribution to support Confidential VMs on Azure! Ubuntu CVMs use the latest security extensions of the third generation of AMD CPUs, Secure Encrypted Virtualization-Secure Nested Paging (SEV-SNP). As such, they bring about a fundamental shift in the traditional threat model of public clouds. They are part of the Microsoft Azure DCasv5/ECasv5 series, and only take a few clicks to enable and use!
Sponsored Post

An Introduction to Automation Basics

Automation is a powerful tool. With some foresight and a little elbow grease, you can save hours, days, or even months of work by strategically automating repetitive tasks. What makes automation particularly beneficial is that it eliminates manual interaction with multiple systems. Rather than manually uploading data to an event response system or notifying key support personnel of an incident, tying these tasks together through automation can reduce critical time and help resolve problems faster and more efficiently. But, before we can fill in the gaps between all of the platforms we are responsible for, we first need to understand how data moves around on the web and how we can use that process to our advantage.

Featured Post

9 Tips to Safeguard your Personal Information on Social Media

Social networking is a fantastic way to share thoughts, follow the news, stay connected with loved ones, and consume the happenings all around the globe in real-time. But one thing users must be aware of is that the content and information you publish or share on social media platforms may become the feeding ground for hackers, scammers, marketers, and digital third-party services. They can exploit the information to fulfill their objectives that might not be in the user's best interest.

PCI DSS - Requirements and Levels of Compliance

The security of payments is underlined in multiple visuals we confront each day while visiting numerous websites and apps. Can businesses and customers benefit from that? Any company handling cardholder data, whether a startup or an enterprise, must adhere to the Payment Card Industry Data Security Standard (PCI DSS). You must validate your compliance annually in order to remain compliant.

Three Ways a Proactive Defense Strategy Can Prevent Cyberattacks

Schools and local municipalities have always been vulnerable to cyberattacks, but in recent years, especially since the pandemic's beginning, they have been increasingly more prone to threats. According to a statement by DHS, ransomware attacks " crippled state and local agencies in 2020," calling for a State and Local Cybersecurity Improvement Act to set a baseline for new changes with cybersecurity efforts at the state and local level.

Cloud certifications for the security of your data

More and more companies around the world are using cloud solutions to run their applications, software or to store their data. But what about cloud compliance? The democratisation of the cloud is not surprising as it provides access to virtual data storage where companies no longer need to buy or maintain their own IT infrastructure. However, with cloud solutions, the security of user data should not be overlooked. There are cloud certifications and regulations that can help you in your choice.

Making Sure the Future of Federal Work Is Secure and Enjoyable - Why We're Partnering with NIST on Its Zero Trust Project

Last year, we announced our partnership with the National Cybersecurity Center of Excellence (NCCoE) at the National Institute of Standards and Technology (NIST) to work on the Implementing a Zero Trust Architecture project. After a year of collaboration with its industry partners, including Ivanti, NIST recently released its preliminary draft, NIST Cybersecurity Practice Guide SP 1800-35 Vol B, for public comment.

Code signing: securing against supply chain vulnerabilities

When creating an application, developers often rely on many different tools, programs, and people. This collection of agents and actors involved in the software development lifecycle (SDLC) is called the software supply chain. The software supply chain refers to anything that touches or influences applications during development, production, and deployment — including developers, dependencies, network interfaces, and DevOps practices.