Operations | Monitoring | ITSM | DevOps | Cloud

Security

The latest News and Information on CyberSecurity for Applications, Services and Infrastructure, and related technologies.

BIG things are Happening at Graylog!

Did you hear the news? Graylog is on a mission to help make your IT environment and data more efficient and secure by making it super easy to uncover the answers stored in your machine data. At Graylog, coming up with solutions to problems faced by IT and Security professionals is what drives us. Our teams are always working on ways to add meaningful functionality that increases productivity so you can focus your resources on the innovation and core competencies that you’re known for.

Cybersecurity Measures Every Project Manager Should Know About

Online projects could be easy prey for cybercriminals due to the involvement of critical security information (emails, different platforms' login passwords, bank accounts, etc.) and multiple people. A simple phishing email requesting new login credentials or bank account details could be effective on negligent team members and could put everybody at risk. In other words, any breach of information by a project team member could lead to a disaster for the parties involved.

Introducing our brand new (and free!) Calico Azure Course

Calico Open Source is an industry standard for container security and networking that offers high-performance cloud-native scalability and supports Kubernetes workloads, non-Kubernetes workloads, and legacy workloads. Created and maintained by Tigera, Calico Open Source offers a wide range of support for your choice of data plane whether it’s Windows, eBPF, Linux, or VPP. We’re excited to announce our new certification course for Azure, Certified Calico Operator: Azure Expert!

Featured Post

The Evolution of Software Trends in 2022

Software delivery has never been more critical to the success of business in every industry. It's also never been more complex. With the growing challenges of complexity, how can engineering teams succeed? After analyzing millions of workflows from more than 50,000 organizations across the world, here are a few truths of software delivery today.

How to Automate Intune Device Reports with Torq

Whether for managing remote teams, supporting ‘bring your own device’ (BYOD) policies, or simply another layer in a data protection strategy, services like Microsoft Intune offer greater control over the devices on your network. But using the data from these services often requires tedious prep work, and this process is likely repeated multiple times a week, if not daily. Tedious, repetitive, structured: these are all signs that a process can and should be automated.

Winning Over the Skeptics: How SD-WAN Is Transforming Government Networks

Are software-defined wide area networks (SD-WANs) worth the hype? Read below as our own Brandon Shopp details the value of this fast up-and-coming technology and how it can help. Public sector wide-area networks (WANs) are undergoing a transformation. The pressing need to support remote workers and a surge in demand for video conferencing, secure remote access, and cloud applications has seen public sector IT teams shift gears away from traditional, often multi-protocol label switching (MPLS)-based WANs.

Airline Data Breaches

Travel websites, in particular airlines are key targets for cyberattacks, the reward for compromised data is high in this industry due to the sensitivity of the data involved. Over the years, there have been a number of airline data breaches, with some companies suffering multiple attacks. By analysing some of the major airline and travel attacks over the years and being aware of tactics used by hackers, security procedures can be put in place to prevent attacks.

Secure Supply Chain: Verifying Image Signatures in Kubewarden

After these last releases Kubewarden now has support for verifying the integrity and authenticity of artifacts within Kubewarden using the Sigstore project. In this post, we shall focus on verifying container image signatures using the new verify-image-signatures policy. To learn more about how Sigstore works, take a look at our previous post