Operations | Monitoring | ITSM | DevOps | Cloud

Security

The latest News and Information on CyberSecurity for Applications, Services and Infrastructure, and related technologies.

15 Essential Kali Linux Commands Ethical Hackers Need to Know

As ethical hacking continues to grow in importance, professionals require a reliable operating system to assist them in their tasks. A Debian-based distribution, Kali Linux is the go-to OS for ethical hackers and penetration testers. But why has it become the industry standard? This post will explore what makes Kali Linux essential and dive into the key commands every ethical hacker should know.

How Does Granular Recovery Technology Work?

Data loss can be a nightmare for businesses, especially when critical information is at risk. But there's good news—granular recovery technology is here to help! This advanced recovery method allows you to retrieve specific files, emails, or database entries without restoring the entire system. It’s a game-changer, especially in IT Service Management (ITSM) environments where precision and efficiency matter.

Launching Your Ubuntu Confidential VM with Intel TDX on Google Cloud: A Guide to Enhanced Security

In the world of cloud computing, we rely on abstraction layers to manage complex systems. While this simplifies development, it also creates vulnerabilities for sensitive data. Traditionally, privileged software within the cloud has access to your data, and could pose a significant security risk, if not managed properly. But there’s a new way to protect your data: confidential computing.

Outages, privacy, and cybersecurity worries: Insights from our K12 technology survey

Ever wondered what keeps K12 IT professionals up at night? Outages, technology changes, and device management are just the beginning. Our survey reveals the real struggles of K-12 IT staff. With responses from 51 experts, we dive into their biggest concerns and emerging trends. Discover what keeps them busy and how they’re adapting in a rapidly evolving tech landscape.

Solve employee security friction through automation, Srinivas Mukkamala, CPO, Ivanti

Get expert advice on balancing security and employee experience in Ivanti’s research report: “Securing the Digital Employee Experience.” Ivanti CPO, Dr. Srinivas Mukkamala explains why cybersecurity leaders often overlook user experience, and how cybersecurity is evolving from being reactive to proactive and resilient.

Essential Kafka Security Best Practices for 2024

Ah, Kafka—the powerhouse behind real-time data streaming in today’s world. It’s efficient, scalable, and handles vast amounts of data with ease. But with great power comes great responsibility, right? And in 2024, with cyber threats more sophisticated than ever, securing your Kafka environment is no longer just a good idea—it’s non-negotiable.

Implementing a Bring Your Own Device Policy (BYOD) in Your Organization

Bring your own device (BYOD) policies are more important than ever since smartphones became pervasive. I’d argue that even if you don’t want to allow personal user devices to access corporate data or applications, you still need BYOD policy best practices if only to acknowledge the fact that users are already bringing their personal devices into your organization.

What the Cyber Resilience Act (CRA) means for IoT manufacturers

The EU Cyber Resilience Act is coming. I’ve talked about this piece of upcoming regulation in some depth before, having covered its background and stipulations in previous pieces on our website and for the Forbes Technology Council, and explored what it means for the businesses who consume open source in later articles (you can also read a version of this blog on Forbes).

How Penetration Testing Services Can Strengthen Your Security Position

In the era of technology, online security concerns have become increasingly important for businesses of all sizes. Safeguarding information and computer networks is crucial. A key strategy to strengthen security measures is to utilize penetration testing services. This process involves mimicking cyber breaches to pinpoint weaknesses ahead of attacks. Grasping the advantages and approach of penetration testing can greatly enhance an organization's security readiness.