Operations | Monitoring | ITSM | DevOps | Cloud

Security

The latest News and Information on CyberSecurity for Applications, Services and Infrastructure, and related technologies.

The Employee Offboarding Checklist for IT Pros

Network hardware failures. Internet outages. DDoS attacks. These are the types of disruptions you probably spend your time preparing to handle. But there’s another potential source of trouble that most IT pros think about much less frequently, and which happens far more often: employee offboarding. Whether an employee is leaving to pursue another opportunity or an employee is being terminated, you need to make sure your company’s network and data are secure.

Best Practices for Delivering a Business-Driven Security Posture

The main focus for cybersecurity teams — moving beyond compliance — is to deliver the level of security required to manage the likelihood of a breach and the potential impact to the business. This is more effective than simply focusing on the cost of delivering security services.

Reduce Security Cost by Shifting Left

With the emergence of “Shift Left” as common practice for development, we’re seeing many opportunities to reduce costs around our development practices, but what about security? Prisma Cloud is supporting “Shift Left” by making their scanning capabilities available to Developers and CI Tooling to run scans against microservice projects. As a bonus, the Prisma Cloud product suite scanning capabilities fit perfectly within Codefresh.

4 Monitoring Alerts to Automate Service Desk Tickets and Reduce Downtime

Whether you’re a small business with fewer than 100 employees or a global enterprise with thousands, having an alert system integrated into the service desk can be invaluable. This type of cross-functional integration can trigger automatic incidents in the service desk based on certain monitoring events, particularly issues that impact a significant portion of employees, including critical applications and network infrastructure.

9 Smart Ways to Keep Customer Data Secure on Your E-Commerce Website

E-commerce has now revolutionized the way that people shop. But one of the biggest challenges a lot of e-commerce owners face today is website security. Although selling online opens doors for many opportunities, keeping your site safe from phishing, hacking, and other cyber attacks can be a nightmare for a lot of online business owners. Also, the risk is even higher because the choice of security provisions is often beyond your reach.

Getting up and running with Calico on EKS

In this session, we will go over the design considerations and available options to run Calico on EKS. After this session you’ll be able to Understand the available supported options to run Calico on EKS Understand the various design considerations of running scalable EKS clusters with Calico Learn about the value-added capabilities of Calico Enterprise on EKS

How to Prevent, Detect, and Remove Spyware

Spyware is a type of malware that hides deep inside your computer. Unlike more visible types of malware, spyware lets you go about your tasks while secretly recording information—especially passwords and other sensitive credentials. Since spyware is difficult to notice, both home users and system administrators need to prioritize its prevention and detection. Thankfully, even if you have spyware, it’s easy to get rid of with the right tools.