Operations | Monitoring | ITSM | DevOps | Cloud

Security

The latest News and Information on CyberSecurity for Applications, Services and Infrastructure, and related technologies.

Automated Zero Trust: The Only Thing to Put Your Trust in

There’s no question that centralized identity and access management (IAM) helps companies reduce risk and prevent attacks. But, as this week’s Okta attack shows, centralized IAM doesn’t eliminate all risks. Attackers with access to IAM data can use this information to easily access downstream systems or modify permissions to grant elevated access to malicious parties.

Centralized Log Management and NIST Cybersecurity Framework

It was just another day in paradise. Well, it was as close to paradise as working in IT can be. Then, your boss read about another data breach and started asking questions about how well you’re managing security. Unfortunately, while you know you’re doing the day-to-day work, your documentation has fallen by the wayside. As much as people are loathed to admit it, this is where compliance can help.

IT Heroes Podcast - EPS 06 SMB's response to a cyberattack

In this episode, Edgar hosts Andy Ellwood, VP of Product Marketing, Pulseway, and Giridhara Raam, Cybersecurity Evangelist, Pulseway to discuss why the cyber response is important for SMBs and how should SMB's react to a cyber incident - communication norms, response protocols, and tips to up their game on the reactive approach.

3 Benefits of Having Managed Cyber Security Services

Businesses are increasingly reliant on technology, and as a result, they are becoming more vulnerable to cyber-attacks. So, If you're not sure your business is protected against cyber threats, it's time to consider managed cyber security services. These can make a tremendous difference in the level of protection for your organization, and they will allow you time to focus on other important aspects. In this blog post, we will discuss the three main benefits of having a managed cyber security service in place for your business.

SOARs vs. No-Code Security Automation: The Case for Both

Just a few years ago, security orchestration, automation and response (SOAR) was the new buzzword associated with security modernization. Today, however, SOAR platforms are increasingly assuming a legacy look and feel. Although SOARs still have their place in a modern SecOps strategy, the key to driving SecOps forward today is no-code security automation.

What Are the Benefits of Investing in Cloud Storage Security?

As more and more businesses and individuals choose to store their data online, ensuring the safety of information is becoming exceptionally crucial. According to recent statistics from the Hosting Tribunal, over 95% of IT professionals use cloud storage. This number is expected to grow steadily.