Operations | Monitoring | ITSM | DevOps | Cloud

Security

The latest News and Information on CyberSecurity for Applications, Services and Infrastructure, and related technologies.

Mattermost maintains effective security controls according to recent SOC 2 Type 1 Report

We recently underwent a System and Organization Controls SOC 2 Type 1 examination resulting in a CPA’s report stating that Mattermost has developed effective controls over the security, availability, and confidentiality of the Mattermost Cloud platform.

Testing your Okta visibility and detection with Dorothy and Elastic Security

When approached by stakeholders in their organization, few security teams can confidently demonstrate that logging and alerting capabilities are working as expected. Organizations have become more distributed and reliant on cloud offerings for use cases such as identity and access management, user productivity, and file storage. Meanwhile, adversaries have extended their operational capabilities in cloud environments.

How Digital Transformation Is Changing the Role of the Government CIO

Under the leadership of innovative CIOs—Chief Information Officers—the public sector is blazing new trails and focusing on things like digital transformation to provide constituents with the best services available in the most efficient way possible. While digital transformation will impact the way federal and state agencies look at and adopt new technologies, it will also affect the role of the CIO.

How to remove malware from your Android

For a long time, we've only been worried about viruses on our computers. Rarely do you hear someone complaining that their android is infected with malware - but it does happen. And so, if your android falls victim to a malware attack, you need to be prepared with what to do. Here are a few steps to help you remove the malware quickly.

Adopting a BYOD policy amid the COVID-19 era

In the midst of the COVID-19 pandemic, even companies that had said no to BYOD have come to terms with it, as a fair share of remote work would not even be possible without such a policy. Pandemic or no pandemic, on-the-go data access has always enabled employees to get work done quickly and efficiently. It guarantees better communication with colleagues, improves customer service, and device familiarity brings employee satisfaction and increased productivity.

Your team is running containers, but are they secure?

Organizations are modernizing IT infrastructure, restructuring teams, and accelerating application delivery with containers and Kubernetes. As with any technology, organizations are at various places within their journey. However, according to Gartner, more than 75% of global organizations will be running containerized apps in production by 2022. Chances are your team is using containers for some applications.

Introducing CFEngine Custom Promise Types

In CFEngine 3.17, custom promise types were introduced. This allows you to extend policy language, managing resources which don’t have built in promise types. The implementation of custom promise types is open source, and available in both CFEngine Enterprise and CFEngine Community. To implement a new custom promise type, you need a promise module.

Deploying Calico in Your On-prem Kubernetes Cluster: Networking and Security Considerations

If you are deploying Kubernetes on-premises in your datacenter, this is a talk and demo you won’t want to miss. Networking and security might not be the first things that come to mind, but without some understanding of the networking and security decisions you’ll need to make, and the right options for your environment, you’re likely to get stuck or make the wrong assumptions. These may limit your ability to scale or integrate with the rest of the datacenter network.