Operations | Monitoring | ITSM | DevOps | Cloud

Security

The latest News and Information on CyberSecurity for Applications, Services and Infrastructure, and related technologies.

Security by Default: The Crucial Complement to Secure by Design

Legacy cybersecurity systems – many designed over a decade ago – fail to account for the new breed of attacker capabilities and vulnerabilities – nor for the reliance on human configuration that is the Achilles heel of so much software. This new reality is being answered with the software development concept called security by default, a necessary complement to the principles of Secure by Design set forth by the U.S. Cybersecurity & Infrastructure Security Agency (CISA).

Navigating the Convergence of IT and Security in Remote Work

Equinix CISO Mike Montoya and Grand Bank CTO Bob Hanson join a panel discussion to discuss the necessary challenges of transitioning IT & security work to a remote workplace and the single best thing organizations can do to meet those challenges: finding, engaging and retaining top talent within the fields. Ivanti finds, heals, and protects every device, everywhere – automatically. Whether your team is down the hall or spread around the globe, Ivanti makes it easy and secure for them to do what they do best.

An Introductory Guide to Cloud Security for IIoT

The state of industries has come a long way since the Industrial Revolution with new technologies such as smart devices, the internet, and the cloud. The Industrial Internet of Things (IIoT) is a network of industrial components that share and process data to gain insights. But as IIoT involves sensitive data and life-critical operations, this also comes with various IIoT cloud security challenges. Therefore, it is important to strengthen security.

Securing External Sharing in SharePoint Online

In today’s interconnected business world, external collaboration is essential. SharePoint Online provides the flexibility to share documents with external partners, clients, and vendors, but this can also expose organizations to data security risks. Securing external sharing while ensuring smooth collaboration is key to maintaining trust and protecting sensitive information. Here’s how you can achieve that balance.

True Stories of Devastating Data Loss (And Tips for Improving Your Own Backup Strategy)

Data loss can come from any number of sources, whether it’s a hurricane that causes major flooding in a server room or a bad actor threatening the safety of critical data by demanding a ransom for its safe return. If an organization only has a single copy of data on that waterlogged hard drive or in the hands of a cybercriminal, the odds of recovery are slim to none.

The Role of Physical Security in Safeguarding Sensitive Information in Data Centers

Physical security plays a vital role in safeguarding sensitive information housed within data centers. As data centers store vast amounts of confidential and mission-critical information, securing these facilities is essential to prevent unauthorized access, data breaches, and physical theft.

New Relic vs Splunk - In-depth Comparison [2024]

New Relic and Splunk are two prominent tools in the world of observability and monitoring, each serving distinct purposes. New Relic is used for Application Performance Monitoring (APM), offering a full-stack observability platform. It is important to note that New Relic is not a SIEM tool, its primary focus is performance monitoring. On the other hand, Splunk is used for log management, machine data analytics, and is widely utilized as a SIEM tool.

The Requirements for NIS2 Compliance: An Overview

The NIS2 Directive, an evolution of the original Network and Information Security Directive, aims to fortify cybersecurity across member states. Compliance with NIS2 not only helps organizations avoid regulatory penalties but also enhances their overall security posture, making them more resilient against cyber threats.

Understand how the Cyber Resilience Act will impact device manufacturers

The Cyber Resilience Act (CRA) is a European Union legislation that will enter into force in 2027. Its overall goal is to make devices safer by implementing more rigorous cybersecurity, documentation, and vulnerability reporting requirements for the IT industry. The CRA is especially relevant for device manufacturers, who will need to ensure devices are secure throughout the product lifecycle.

How will the Economic Crime and Corporate Transparency Act affect crypto investors?

While many businesses in the UK are caught up in speculating about what a new Labour government could mean for them, those in the crypto space should take care not to miss the biggest story that has arisen already this year. The Economic Crime and Corporate Transparency Act 2023 (ECCT) entered into force at the start of the year and brought with it a raft of new powers for law enforcement agencies and investigators. Among the primary aims of the legislation was to help tackle fraud and criminal financing involving cryptocurrencies and cryptoassets, but it may make it harder to protect your crypto wallet.