Operations | Monitoring | ITSM | DevOps | Cloud

The latest News and Information on CyberSecurity for Applications, Services and Infrastructure, and related technologies.

What is Secure Access Service Edge (SASE)?

Check Point’s 2022 Workforce Security Report states that more than half of the workforce works remotely in 57% of organizations. The increase in the number of employees that work from home brings up new security implications that on-premise IT environments didn’t have to worry about. As organizations continue to undergo digital transformation, the existing network and network security architectures no longer meet the needs of the current digital era.

The Importance of CVE & CVSS Scores

As we move into the new year, organizations can expect the number of cyberattacks to increase significantly. In order to battle these upcoming threats, effective patching and patch management processes will be essential. Before patching vulnerabilities, there are two main vulnerability assessments that IT teams should focus on: CVE & CVSS scores. Below, we’ll examine the importance of CVE & CVSS scores along with some of their uses and benefits in the cybersecurity space.

Open source security: best practices for early detection & risk mitigation

What knowledge, tools, and processes do you need to keep your open-source software free from vulnerabilities and threats? Many open-source projects are well-maintained by software vendors or individuals. Yet, studies show that 80% of codebases used by enterprises contain vulnerabilities (half of which are high-risk vulnerabilities that can be exploited). Hackers scan for outdated systems that contain vulnerabilities, which they then exploit by deploying targeted malware. In this webinar, we will discuss best practices for keeping your systems up to date.

The ultimate guide to scanning Kubernetes workloads using Trivy-Operator

Testing is a vital aspect of security. Unfortunately, there are vulnerabilities that bypass the testing stage and introduce flaws in the production environment. Kubernetes vulnerabilities make more impact when exploited on running applications and production environments. These vulnerabilities can allow hackers to exploit the host machine if the container has escalated privileges.

How to Ensure SCCM Client Compliance on All Endpoints with Nexthink

SCCM is one of the most business-critical applications—a must have on all the devices. Administrators use SCCM for endpoint protection, software distribution, and patch management. Any machine where the SCCM client is not functioning will be unable to receive necessary policies or application updates, which can create a significant vulnerability for your organization because this leads to compliance and security issues.

Is open-source as secure as proprietary software?

We’re surrounded by news of data breaches and companies being compromised, and the existential threat of ransomware hangs over just about every organisation that uses computers. One of the consequences is that we are hassled by an ever-increasing number of software updates, from phones and computers to vacuum cleaners and cars; download this, restart that, install the updates.

Mitigate cyberthreats automatically with AIOps

The majority (83%) of employees across industries want their jobs to remain hybrid, Accenture reports. Yet nearly 50% of CIOs feel their cybersecurity initiatives aren’t keeping pace with their digital transformation efforts, according to research by ServiceNow and ThoughtLab. Neither are their cybersecurity budgets. Combining artificial intelligence (AI) and machine learning (ML) for IT operations (AIOps) can help.

Using SOC-as-a-Service to Bridge the Cybersecurity Talent Gap

As the cyberthreat landscape is getting more sophisticated, the need for skilled cybersecurity professionals is also rising. The recent 2022 (ISC)2 Cybersecurity Workforce Study revealed that, in the past year, the cybersecurity workforce gap (the difference between the number of security professionals required and the number of suitably qualified people in the marketplace) has grown more than twice as much as the number of actual cybersecurity workforce hired, with a 26.2% year-on-year increase.