Operations | Monitoring | ITSM | DevOps | Cloud

Security

The latest News and Information on CyberSecurity for Applications, Services and Infrastructure, and related technologies.

What is UAC Virtualization? Benefits and Pitfalls

UAC stands for “User Account Control”. This is a field of software management that isolates the operating system’s core components from potentially damaging changes. It refers to the level of access that in Unix-like systems is called “root” and in Windows systems is known as Administrator privileges. User Account Control was initially rolled out as part of Windows Vista to allow only admin accounts to give and take away these permissions.

4 Key Steps of a Vulnerability Management Process

Vulnerabilities within an IT environment pose a big security risk and are a threat to digital data within an organization. These vulnerabilities can be exploited by others, or a lack of necessary precautions can result in damaged or lost organizational data. Therefore, it is essential to have a vulnerability management process in place for these reasons.

Top 3 Ways Remote Working Has Unknowingly Increased Your Security Risk

Users across the globe have left their office buildings along with the safety and security of the workplace. This has left companies at their most vulnerable because the full scope of their security exposure is unknown. Attackers are wise to the gaps and vulnerabilities that come from remote working. Not only has the attack surface increased in recent months, but the volume of COVID-19 spam, phishing attacks and malware has also skyrocketed.

Riverbed Webinar Demo - Security Workflows

Managing aging infrastructure that’s geographically dispersed brings unique challenges to the Oil & Gas industry because obsolete technologies and automation make it particularly vulnerable to cyberattacks. To combat these attacks, leveraging integrated and full-fidelity data can help you to identify the unknown, avoid business disruptions, and help you save time by: This technical overview of Riverbed’s NetProfiler Flow Monitoring solution demonstrates those security workflows, and introduces a helpful thread feed that includes SUNBURST Backdoor.

Securing SD-WAN in a Cloudy World

Today’s cloud-first enterprise must securely connect their workers to their applications, no matter where their applications may live. Only by transforming both the WAN edge and security architectures can the full promise of the cloud be fully realized. SD-WAN is your opportunity to re-architect, design and build a network that’s secure and fit for the future. Teneo Inc. and Silver Peak can help to make this a clear reality in our cloudy world.

How Zero Trust Enables Work from Anywhere and Builds Toward a SASE Vision

With the global pandemic greatly accelerating many organizations digital transformation, IT and security leaders are coming to terms with the new realities of employees permanently working from anywhere and how that dramatically changes the security risk and the security architecture required. In this session, a panel of expert speakers discuss how Zero Trust security is a key requirement for this new way of working, and the vital role of secure access service edge (SASE) in implementing this approach going forward.

What's New in Calico v3.23

Hey everyone. We’re excited to announce the release of Calico v3.23! Thanks to everyone in the community who contributed to the release. We could not have fitted this many improvements in without you. To view the detailed release notes, please visit us here. While we have many improvements in this release, here’s a brief overview of some of the larger features to be aware of.

The Top 10 Best DevSecOps Tools for 2022

Over the last decade or so, we have seen organizations competing to rapidly launch products and new updates. This also often meant that information security lagged behind, as evinced by the fact that we have seen many companies facing major breaches and attacks over the last couple of years. The DevOps approach which focused on rapid development proved ineffective for robust security. This is where DevSecOps emerged. In this article, we explore the concept of DevSecOps and the top ten DevSecOps tools.