Operations | Monitoring | ITSM | DevOps | Cloud

The latest News and Information on CyberSecurity for Applications, Services and Infrastructure, and related technologies.

If You're Always Delivering Valuable Packages To Customers, This Is How To Secure Your Business

Package security is always a big concern when delivering valuable items to customers. With the ever-increasing competition among businesses, it's important to make sure you're providing the best security features for your packages. Here are some tips on how to secure your business when delivering valuable items. Let's get started!

Industry Experts Discuss Cybersecurity Trends and a New Fund to Shape the Future

In this live stream discussion, angel investor Ross Haleliuk joins Cribl’s Ed Bailey to make a big announcement about his new fund to shape the future of the cybersecurity industry. Ross is a big believer in focusing on the security practitioner to provide practical solutions to common issues by making early investments in companies that will promote these values.

Role-based credential management with OIDC

In our article on managing static credentials, we discussed the necessity of secrets — the passwords, tokens, and API keys that connect digital services together — and the importance of keeping them secure so that your infrastructure and data are kept safe from intrusion and misuse. For organizations delivering software at scale, managing credentials across multiple teams and projects can quickly become tedious and error-prone, creating bottlenecks and unnecessary risk.

ISO 27001 and Asset Management: What Does Annex A.8.1 Say?

ISO 27001 is the gold standard to follow for effective Information Security Management, and it is deeply related to IT Asset Management. In particular, the annex A.8.1 provides all the necessary information to manage your information assets properly. So, understanding the full scope of it is crucial to create an all-round ITAM strategy that will ensure all your assets are always fully protected.

Endpoint Monitoring Explained with Example

Today, people and businesses use endpoints to accomplish everything from day-to-day tasks to large projects. Endpoints include the physical devices that connect to and communicate with a central network. They are used to manipulate data or exchange information. The number of endpoint devices that average businesses and enterprises manage is 135,000, and that number continues to grow.

Sponsored Post

Cloud Transformation Strategy & Solutions

Cloud transformation is real. And it's spectacular. According to global business management and consulting firm McKinsey & Co., cloud transformation is the engine driving $1 trillion in economic activity for Fortune 500 companies alone. Innovations enabled by the cloud touch nearly every aspect of running a successful business, including the development of new products and services, access to new customers and markets, frictionless transactions, streamlined communication and collaboration, and access to talent without concern for traditional geographic barriers.

How Password Managers Help Meet Cybersecurity Requirements

The first Thursday in May is World Password Day. This is a good opportunity to look at your cybersecurity practices and privileged access strategies. As cyberattacks increase, more organizations are choosing to get some peace of mind by acquiring cyber insurance to mitigate liability and losses in case of an attack. However, getting cyber insurance may not be an easy exercise.

Introducing the Grafana Labs Bug Bounty Program

At Grafana Labs, we value the open source community and recognize the power of crowdsourcing. This is why we have decided to launch our very own bug bounty program, managed in-house by our own team, to encourage ethical hackers from around the world to help us find and responsibly report security vulnerabilities in Grafana Labs software.

Monitoring Kubernetes clusters activity with Azure Managed Grafana and Calico

Cloud computing revolutionized how a business can establish its digital presence. Nowadays, by leveraging cloud features such as scalability, elasticity, and convenience, businesses can deploy, grow, or test an environment in every corner of the world without worrying about building the required infrastructure.