Operations | Monitoring | ITSM | DevOps | Cloud

Security

The latest News and Information on CyberSecurity for Applications, Services and Infrastructure, and related technologies.

Innovation Disruption and Data Privacy: A Panel Discussion

Ivanti CPO Srinivas Mukkamala joins an expert panel discussion on data privacy, addressing challenges in personal device compliance, cloud security, and the use of AI for service delivery. Ivanti finds, heals, and protects every device, everywhere – automatically. Whether your team is down the hall or spread around the globe, Ivanti makes it easy and secure for them to do what they do best. Ivanti is IT for the way we work now. Integrated solutions for everything IT touches. So, employees can work better, anywhere, and everywhere.

How to Achieve Zero Trust Adoption in U.S. Government

Zero Trust adoption is critical, especially for U.S. government agencies. With changing policies and requirements, it can be tough to stay ahead of everything you need to know. We’ll provide a high-level overview of Zero Trust adoption + share how automation can help you achieve compliance.

What is Application Security Posture Management

Application security posture management (ASPM) is a key component in ensuring the security of applications in today's digital landscape. As organizations increasingly rely on processes to operate efficiently, the importance of securing these applications cannot be overstated. ASPM helps companies understand the security state of their applications by providing a comprehensive overview of potential vulnerabilities, threats, and areas that need improvement. In this article, we will explore what ASPM is, why it is needed, the features of ASPM solutions, leading vendors, how to implement ASPM, and emerging trends in the field.

Announcing Authd: OIDC authentication for Ubuntu Desktop and Server

Today we are announcing the general availability of Authd, a new authentication daemon for Ubuntu that allows direct integration with cloud-based identity providers for both Ubuntu Desktop and Server. Authd is available free of charge on Ubuntu 24.04 LTS. At launch, Authd supports Microsoft Entra ID (formerly Azure Active Directory) identity provider, with additional providers, including a white label OIDC provider, to be introduced in the future.

Patch Management: A Guide to Protect Systems from Cyberattacks

Code, deploy, repeat. As a developer, your days are a whirlwind of Git commits, pull requests, and CI/CD pipelines. In the rush to ship new features and hit those sprint goals, it's easy to overlook the less glamorous aspects of software maintenance. But one often-neglected practice could be the difference between a stable, secure system and a compromised system. Enter patch management, a key DevOps tool in your arsenal to safeguard your systems.

Azure Integration and Security: Challenges and Best Practices

The video features an interview with Mattias Logdberg, a specialist in Azure integration and security, at the INTEGRATE summit. Mattias discusses his session on the challenges of iPaaS solutions in the context of Azure integration and implementation. He shares his experiences and insights on the importance of understanding networking and security in cloud computing, particularly in the context of Logic Apps and API Management.

I Have SD-WAN, Do I Just Need SSE Security for the Branch?

As businesses increasingly adopt Software-Defined Wide Area Network (SD-WAN) solutions to enhance connectivity and performance across their branch offices, a common question arises: “Do I just need Security Service Edge (SSE) security for the branch?” The answer is a resounding “no”. While SSE provides essential security features, it is not sufficient on its own.

What Is FileVault Disk Encryption & How Does it Work?

FileVault disk encryption is the macOS feature that encrypts data on Mac computers. Encrypting the data on your devices means that your password is required to read it, so if the device is lost or stolen, it is protected. This is vital for protecting the privacy of individuals and the operational data of businesses and organizations. This article explains FileVault, the importance of disk encryption for individuals and organizations, and how to enable FileVault.

Feature Friday #27: Multiple outcomes

When promises are actuated, a class can be defined based on its result. For example, if a promise modifies a file’s content, you could define a class that indicates it has been repaired. However, did you know that promises can have multiple outcomes concurrently? That’s right! Native promises (but not custom promises) can have multiple outcomes. For example, a promise can be both kept and repaired at the same time. Let’s take a look.