Operations | Monitoring | ITSM | DevOps | Cloud

The latest News and Information on CyberSecurity for Applications, Services and Infrastructure, and related technologies.

Data security at scale: How IT modernization impacts cybersecurity and data access for the U.S. Department of Defense

As more and more of the public sector enact large-scale digital transformation initiatives, government organizations must find new ways to manage massive amounts of data securely while maintaining compliance. With new mandates from the Biden administration to enhance cybersecurity best practices in both the private and public sectors, organizations like the Department of Defense (DoD) face new challenges to their data management and communication practices.

The Definitive Guide to IT Risk Management

IT Risk Management ensures all IT risks are properly spotted and dealt with in an efficient and safe manner. It can protect your environment and its users from internal and external threats and help your organization meet its Governance, Risk, and Compliance (GRC) obligations. If you’re searching for reliable and proficient ways to keep your workplace protected, you’re in the right place. In this article we will explore the full scope of Risk Management and the benefits that come with it.

Top 5 cloud security risks

Cloud security is a constant concern and tends to revolve around common themes - how do you give intended users access to the data and systems their clearance allows, while maintaining a good user experience; and how do you keep unintended users or malicious bots out? In the entanglement of systems, services, and applications that make up a modern IT infrastructure, this is a lot harder to balance in practice than it is on paper.

CFEngine 3.22 released - Coordination

Today, we are pleased to announce the release of CFEngine 3.22.0! The focus of this new version has been coordination. This is a non-LTS (non-supported) release, where we introduce new features for users to test and give feedback on, allowing us to polish before the next LTS.(CFEngine 3.24 LTS is scheduled to release summer 2024).

FWaaS (Firewall as a Service): How to Monitor Your Traffic Through Cloud

Cybersecurity remains a key concern for any organization. The cost of cybercrime is expected to rise to $8 trillion in 2023 and reach $10.5 trillion by 2025. Various cybersecurity solutions are available, with Firewall as a Service (FWaaS) emerging as one of the most valuable assets when it comes to protecting your interests. We will investigate FWaaS solutions, how they work, how they're different from traditional firewalls, and what benefits they can provide for a range of organizations.

The Role of Penetration Testing in Strengthening Your Cybersecurity

In the digital age, cybersecurity is no longer a luxury but a necessity. With the advent of new technologies, the challenges to digital safety have multiplied, making it imperative for businesses and individuals to prioritize their online security. When considering ways to bolster your defenses, one aspect that invariably stands out is penetration testing.

Successfully Navigating Your Business Through a Cyber Attack

In an increasingly interconnected digital world, businesses of all sizes are at risk of experiencing cyberattacks. These attacks, if not well managed, can lead to severe consequences, including loss of sensitive data, financial damage, and reputational harm. As such, it's crucial to understand how to navigate your business through a cyberattack, not only to mitigate damage but also to recover and learn from the experience.

Securing open source software with Platform One and Canonical

Our own Devin Breen and Mark Lewis discussed Securing Open Source Software with the Chairman of Iron Bank at USAF Platform One Zachary Burke at AWS Summit Washington, DC. The topic includes: Securing Open Source Software, Secure Minimal Containers, and Software Security Scanning.