Operations | Monitoring | ITSM | DevOps | Cloud

Security

The latest News and Information on CyberSecurity for Applications, Services and Infrastructure, and related technologies.

The GDPR: It's been a year, did it make a difference?

Businesses are comprised of different departments and professionals, with data flowing across the organization. When there’s a data breach, it’s usually the data protection officers (DPOs), CIOs, and CISOs who take the brunt of the blame; however, since the introduction of the General Data Protection Regulation (GDPR), all staff are more responsible for data handling.

Top 5 Cloud Security Trends Revealed

Cloud security is becoming one of the most pressing issues for many modern organizations as they move to the cloud. According to Cloudneeti’s 2019 Cloud Security Trends and Predictions report, by 2020, 41% of overall workloads will run in public clouds. Defending against unauthorized data exposure and securing data, applications, and infrastructures across the cloud environment is a must. It is the responsibility of every organization and should be taken seriously.

Do you really know what a network is? Learn all about it and improve its security

Today, we live in a world in which, the use of new technology is greatly enhancing the ability to communicate with each other. The Internet has been globalized very fast and relationships are continuously changing and evolving in all areas.

CFEngine 3.12.2 LTS Released

We are happy to release the 2nd update to the CFEngine 3.12 LTS series. This update comes with many important stability and performance improvements and is thus well worth the upgrade from an older version of 3.12 LTS. CFEngine 3.12 LTS brings a lot of innovation, new features and improved performance to CFEngine, and allows you to make the most efficient use of your time. We are looking forward to your feedback on this release.

Getting Started with Free Elasticsearch Security Features

Elasticsearch Security: learn how to easily add new users, create roles, and set privileges using the Elastic Stack (6.8/7.1+). You'll create a 2 node Elasticsearch cluster, configure TLS communication between the nodes, and have a Kibana instance talking to the cluster to analyze the data.

Intel's latest security vulnerability - our steps and yours

This week Intel released a statement regarding Microarchitectural Data Sampling (MDS), another vulnerability in the "speculative execution" feature of modern processors. This is for HyperThreading and is the feature that allows the CPU to work out what commands will be run next, if they would affect the current running command and if not, run it on the same core.

Firefox add-on outage: Yet another reminder for companies to enforce PKI life cycle automation

More often than we’d like to admit, we tend to underestimate the impact of every moving part within an organization—especially those that seem small or insignificant. And usually, it’s not until we’re facing the fallout of neglecting that seemingly insignificant factor when we realize what a mistake we’ve made.