Operations | Monitoring | ITSM | DevOps | Cloud

Security

The latest News and Information on CyberSecurity for Applications, Services and Infrastructure, and related technologies.

A Guide to Practicing Good Email Hygiene to Prevent Spam Traps

More than 300 billion emails are sent every day, a staggering number. If you focus more on business-related emails, the average office worker sends 40 emails per day, and the average person receives 121 business-related emails every day. With so many emails being sent and received, is it any surprise that a lot end up in the spam folder? Email hygiene should be a primary focus if you're an email marketer or if you send regular emails as part of your job.

Drowning in Your SIEM's Archive? Save on Costs and Get Quick Access to Data With Cribl Lake

We hear it often—data volumes are growing at a 28% compound annual growth rate (CAGR) year over year, and organizations struggle to manage it all. With no additional money in their budgets, they can’t afford to store more and more data in their SIEM, which in most cases means being uncompliant or, worse, not having older data readily available in the case of a recently discovered breach. I’ve repeatedly heard that the data they have archived is practically inaccessible.

EU's Cyber Resilience Act Repercussions in Open Source

The European Parliament (EP) adopted a provisional version of the final text of the EU Cyber Resilience Act (CRA) on March 12, 2024, with the final version expected to be signed and published in October. The EU's CyberResilienceAct (CRA) proposes stringent cybersecurity requirements for digital products, aiming to bolster security against cyberattacks. While it promises safer hardware and software, it also raises questions for Open Source contributors and organizations.

Building Resilient Businesses: The Critical Growth Areas of Security for MSPs

In this episode of the Beyond the Horizons Podcast, Pete Roythorne speaks with Troels Rasmussen, GM of Security at N-able, about the increasing demand for cybersecurity solutions among MSPs. They discuss the evolution of security technologies such as EDR, XDR, and MDR, and the importance of 24/7 coverage in today's threat landscape if MSPs are to be able to help their customers build resilient businesses. Troels emphasizes the need for MSPs to change their mindset when selling security to customers, highlighting the role of compliance and the cost of cybersecurity as a business necessity.

What Are the Leading Regions for Outsourcing Java Development Services and Why: A Global Perspective

Outsourcing Java development services has become a strategic choice for businesses aiming to improve their software capabilities. Asia, with countries like India and the Philippines, stands out as a leading region for outsourcing due to its large pool of skilled developers and cost-effective solutions. These countries offer not only technical expertise but also flexibility and scalability that businesses need to meet dynamic market demands.

It's Okay to Walk Away from Customers Over Cybersecurity

In this video, Stefanie Hammond, N-able Head Nerd in Sales and Marketing, tackles a common question from MSPs: "Should I get my clients to sign a liability waiver if they won’t join my advanced cybersecurity program?" Stefanie explains why signing a waiver isn’t the solution and shares why it’s crucial to walk away from clients who don’t prioritize security. Watch now to learn how enforcing cybersecurity standards can protect your MSP from reputational and financial risks.

A Next-Gen Partnership with CrowdStrike's Falcon Next-Gen SIEM

In an increasingly digital world, organizations face complex challenges in managing their security data that’s growing at a relentless pace. With the rapid growth of cyber assets and the ever-present threat of sophisticated attacks, legacy security tools often struggle to keep up.