The latest News and Information on CyberSecurity for Applications, Services and Infrastructure, and related technologies.
Blob storage is a cloud-based service offered by various cloud providers, designed to store vast amounts of unstructured data such as images, videos, documents, and other types of files. It is highly scalable, cost-effective, and durable, making it an ideal choice for organizations that need to store and manage large data sets for applications like websites, mobile apps, and data analytics.
Businesses have a growing number of endpoints in their IT environments. Endpoints give end users tools to increase their productivity, get quick access to information they need, and connect with other fellow end users. However, there are risks that come with having these devices, such as cyberattacks and losing money due to endpoint maintenance issues.
President Joe Biden signed the Strengthening American Cybersecurity Act into law in March of 2022. The Act consists of various regulations, but it’s the security incident reporting requirements that are creating a stir in the IT community. Currently, the reporting requirements are focused on critical infrastructure, but there is a great deal of potential that entities in various industries could ultimately be subject to these requirements.
Your code base is growing more and more by the minute alongside the apps your business uses and develops. To give some context, the Linux Foundation Report estimated that “Free and Open Source Software (FOSS) constitutes 70-90% of any given piece of modern software solutions”. This means that 70-90% of your final software possibly depends on OSS.
The EO 14028 regarding supply chain security and the need to generate a Software Bill of Materials feels closer to more and more organizations. It might feel like a threat - and that’s a fair feeling. The whole topic of Billing of Materials is not new, but it is a relatively recent trend for software.
A data-driven approach to cybersecurity provides the situational awareness to see what’s happening with our infrastructure, but this approach also requires people to interact with the data. That’s how we bring meaning to the data and make those decisions that, as yet, computers can’t make for us. In this post, Phil Gervasi unpacks what it means to have a data-driven approach to cybersecurity.
Although the terms “patch management” and “vulnerability management” are often used interchangeably, they are not the same process. Patch management and vulneradbility management are two processes that go hand-in-hand towards supporting a secure, efficient, and up-to-date IT infrastructure. Compare patch management vs. vulnerability management and see why both are essential for a secure IT environment.
Hello, and welcome to the March edition of the changelog. Spring is on her way, days are now longer than nights (at least in the northern hemisphere where me and my Kosli colleagues reside) and new Kosli features are popping up like snowdrops. We have the latest release of the CLI and a bunch of other stuff to share with you, so let’s get right into it.
A quick look at headlines emanating from this year’s sold out KubeCon + CloudNativeCon Europe underlines the fact that Kubernetes security has risen to the fore among practitioners and vendors alike. As is typically the case with our favorite technologies, we’ve reached that point where people are determined to ensure security measures aren’t “tacked on after the fact” as related to the wildly-popular container orchestration system.