Operations | Monitoring | ITSM | DevOps | Cloud

The latest News and Information on CyberSecurity for Applications, Services and Infrastructure, and related technologies.

Compliance And The Cloud

Having achieved almost consumer-grade accessibility, public cloud adoption is increasingly driven by individual business functions. Enterprise teams no longer need to understand how the technology works, or even where the service operates from. To buy a cloud product they just need a web browser and a credit card. But this level of simplicity raises challenges of its own when it comes to regulatory concerns.

Looming 2022 (and Beyond) Network Security Threats

Every year hackers grow in numbers, aggressiveness, organization, and sophistication. And every year there are new attack types and new areas of IT infrastructure that cybercriminals target. 2022 is no different. We are about a third of the way in already and IT pros and security specialists already have their hands full with new attacks and new issues.

5 Ways To Prevent Unauthorized Access to Your Company Data

Data security is a huge concern for businesses these days. With so much information being stored on computers and in the cloud, it's more important than ever to make sure that your data is protected from unauthorized access. In this blog post, we will discuss five ways to prevent unauthorized access to your company data. Implementing these strategies will help keep your data safe and secure!

Phishing and Identity Fraud Protection for Remote Teams

Did you know that remote teams are more vulnerable to phishing and identity fraud schemes? In this blog post, we will discuss the dangers of phishing and how you can protect your team from falling victim to scams. We will also provide tips for preventing data loss and protecting your company's confidential information.

Protect the Business with Cribl Packs: Webinar Recap

The second in our Feature Highlights webinar series, Protect the Business with Cribl Packs, highlights Packs and security use cases. Packs enable you to share complex Stream/Edge configurations across multiple Worker Groups/Fleets, between Stream/Edge deployments or with the Cribl Community. Packs roll up best practices to ensure Site Reliability Engineering (SRE) teams have the required data to protect the business.

Open Source Hacktivism, Open Source Gains Traction in the Enterprise, and More: Open Source Matters

Welcome to the 8th edition of Open Source Matters: our regular publication about the latest happenings in open source! Dive into OSS news and projects to watch with Mattermost's Ben Lloyd Pearson.

SIEM: Introduction to SIEM and 4 Top SIEM Tools

Security Information and Event Management (SIEM) technology has become a fundamental part of identifying and guarding against cyber attacks. It is one of the essential technologies powering the modern security operations center (SOC). SIEM is an umbrella term that includes multiple technologies, including log management, security log aggregation, event management, event correlation, behavioral analytics, and security automation.

Best Enterprise Password Managers According to IT Specialists

Even with advances in security practices and technologies, passwords continue to remain a weak point in an organization’s cyber security strategy. Strong passwords are still an essential part of security strategy for most organizations, and poor password hygiene can make their IT network vulnerable. According to the 2021 Verizon data breach investigation report, shared credentials and poor access management practices were among the top reasons for data breaches all over the globe.