Operations | Monitoring | ITSM | DevOps | Cloud

Security

The latest News and Information on CyberSecurity for Applications, Services and Infrastructure, and related technologies.

Comparing Encryption in Transit Options

Weigh up three popular ways to protect your data in transit—host level encryption (TLS/SSH), MACsec, and IPsec—to fortify your network security. Encryption in transit refers to protecting data while it moves from one place to another, in contrast to “encryption at rest” which is used to protect data where it is stored. In this blog we’ll look at a few common options for encryption in transit, and the pros and cons of each from a network perspective.

The Role of Technology in Protecting Office Assets

Today, protecting office assets has never been more essential. Technology has revolutionized office security systems by offering advanced solutions that protect sensitive information and assets like smart file cabinet locks - modern alternatives that offer improved protection and greater convenience than their predecessors.

The Power of Combining a Modular Security Data Lake with an XDR

The 2024 Global Digital Trust Insights survey from PwC reports that 36% of businesses have experienced a data breach that cost more than $1 million to remediate. Cyber threats are clearly on the rise and in today’s volatile threat environment, it is a matter of when - not if - a cybersecurity incident will occur. Digital adversaries are becoming more sophisticated and relying on weak links to exploit company applications and infrastructure.

How Canonical enables PCI-DSS compliance

Anyone who deals with online payments will have heard of PCI-DSS. The Payment Card Industry Data Security Standard is a comprehensive security control framework that is designed to keep payment card data safe from hackers and misuse. Merchants who accept debit or credit card payments (and service providers who process this information) will know this standard particularly well, as it’s a mandatory requirement for them to ply their trades.

Feature Friday #21: Promisees or stakeholders

Who cares about that promise? Today, I want to highlight one of the lightweight knowledge management features in CFEngine. That is, Promisees, also known as Stakeholders. Promisees are references to things that might care about a specific promise. And they can be attached to any promise. Let’s take a look at a contrived example: From the example above, we can see that the methods promise - promising to run the example_promisees bundle - has Feature Friday #21 defined as the only promisee.

In-Depth Guide to Optimizing IT Asset Management with Advanced Software Solutions

Are you overwhelmed by the challenge of tracking your IT assets and managing their usage effectively? If you're struggling with the complexity of monitoring numerous hardware devices, software licenses, and ensuring everything is in order, it might be time for a change.

Decoding the Digital Tapestry: The Imperative of Network Device Discovery

In the labyrinth of modern IT infrastructures, network device discovery emerges as a pivotal process, indispensable for maintaining oversight and control over increasingly intricate digital ecosystems. This analytical examination delves into the mechanics, significance.

Kubernetes Security: The Essential Role of Guardrails

In today’s rapidly evolving technology landscape, Kubernetes has become essential for deploying and managing containerized applications. As organizations increasingly rely on Kubernetes to scale their operations, the need for robust guardrails becomes paramount. In this context, guardrails refer to the policies and mechanisms that ensure the safe and efficient operation of Kubernetes environments.

Quantifying the Invisible: Strategies for Effective Cyber Risk Assessment

In today's digital age, businesses of all sizes face the growing threat of cyberattacks. These attacks can range from small data breaches to large-scale ransomware incidents that disrupt entire operations. Because of this, understanding and managing cyber risks is crucial. One of the most important ways to do this is through cyber risk assessment. But how do you measure something that's not always visible? This article will explore strategies for effective cyber risk assessment and help you understand how to protect your business from cyber threats.