Operations | Monitoring | ITSM | DevOps | Cloud

The latest News and Information on CyberSecurity for Applications, Services and Infrastructure, and related technologies.

What Is a Vulnerability Assessment & Why Is It Important?

While cloud computing has ushered in a new era of connectivity and convenience, it has also exposed organizations to a myriad of vulnerabilities. Cyberattacks, data breaches, and security incidents have become all too common, leaving no room for complacency. The need for proactive cybersecurity measures has never been greater. It's in this context that vulnerability assessments play a vital role in safeguarding organizations against malicious threat actors.

Security Webinar: Navigating the Zero Trust Journey for Today's Everywhere Workplace

Ivanti finds, heals, and protects every device, everywhere – automatically. Whether your team is down the hall or spread around the globe, Ivanti makes it easy and secure for them to do what they do best. Ivanti is IT for the way we work now. Integrated solutions for everything IT touches. So, employees can work better, anywhere, and everywhere.

Git leaks, FTW

Stop committing code without automatically scanning for secrets. This tip walks you through git leaks, a useful little utility in every dev's toolbelt. Give Sleuth a try and see how we give teams actionable insights on how to improve with no-code automations to instantly ship improvements, and metrics to measure their impact — all in a way that both managers and developers love.

How does your AWS environment stand up to the MITRE ATT&CK framework?

In today’s digital age, adopting public cloud platforms like Amazon Web Services (AWS) security means reinforcing them. AWS is a complex and versatile platform. When problems or security incidents arise, it's important to have a systematic approach to investigation and analysis or it can quickly become noisy with lots of false positives. This is where the Adversarial Tactics, Techniques, and Common Knowledge (MITRE ATT&CK) framework can help.

The Unplanned Show, Episode 19: Cloud Security response with Ashley Ward

As organizations move to the cloud, where is there overlap between security and IT and engineering? In this session, Dormain will sit down with Orca Security's Principal Technical Evangelist, Ashley Ward, to learn about how working practices have to evolve with the speed of change in the cloud.

Mastering Open Source Security: Your Guide to S2C2F

Welcome to our 2nd blog in our series on how to securely consume Open Source Software (OSS). Attacks targeting OSS are on the rise, making the security of your software supply chain a top priority. The 1st blog gave an overview of some of the most common types of attacks. Today we’ll explore the Secure Supply Chain Consumption Framework (S2C2F) that can help you mitigate against these attacks.

Better Together: MDM & MTD

Ivanti finds, heals, and protects every device, everywhere – automatically. Whether your team is down the hall or spread around the globe, Ivanti makes it easy and secure for them to do what they do best. Ivanti is IT for the way we work now. Integrated solutions for everything IT touches. So, employees can work better, anywhere, and everywhere.

Why Cloud-Based Solutions Could Be the Right Move for Your Health Business

In the ever-evolving landscape of the healthcare industry, staying competitive and delivering high-quality care is paramount. With the rapid advancements in technology, health businesses are constantly seeking ways to streamline their operations, enhance patient experiences, and improve overall efficiency. Cloud-based solutions have emerged as a game-changing tool that can address these challenges effectively. In this comprehensive blog post, we will delve deep into the world of cloud-based solutions for health businesses, exploring the myriad benefits, potential drawbacks, and key considerations you should keep in mind.

Adopt a 'GDPR everywhere' strategy

Companies used to have an easier time complying with regulations, but compliance has really never been a straightforward endeavor. In the past, there was one set of rules for businesses to obey, the local rules in the place where companies do business. If the business expanded into new parts of the world, they would have to comply with new rules, but these would apply only to those new territories. The global economy means an end to this approach.