Operations | Monitoring | ITSM | DevOps | Cloud

Security

The latest News and Information on CyberSecurity for Applications, Services and Infrastructure, and related technologies.

Enhancing WordPress Security in the Era of Evolving Cyber Threats

Today, website security is more important than ever because these are often targets for hackers who want to steal data, spread malware, or disrupt services. A secure website not only protects your information but also builds trust with your visitors. If people feel safe on your site, they're more likely to stay longer and come back again.

Network observability in Kubernetes clusters for better security and faster troubleshooting

For DevOps and platform teams working with containers and Kubernetes, reducing downtime and improving security posture is crucial. A clear understanding of network topology, service interactions, and workload dependencies is required in cloud-native applications. This is essential for securing and optimizing the Kubernetes deployment and minimizing response time in the event of failure.

UEM and Security Are Converging: Now What? #goivanti #webinar

Paul Troisi and Dan Lutter delve into the challenges and trends in the modern workplace, emphasizing the necessity for IT and security operations to unite against increasing cybersecurity threats. They underscore the importance of effective communication, collaboration, and education for a robust security posture, and the role of asset management in maintaining visibility and control over devices and data. The discussion concludes with a look at future trends, including the influence of AI and the need for continuous adaptation to new threats.
Sponsored Post

EventSentry 5.1.1.104: Security, Security, Security!

Everybody wants to have a more secure network – and everybody has various tools at their disposal to at least improve the security of their network. But which tool is the best for the job, and where do you start? The answer to this question is somewhat easier (and more structured) for organizations that have to adhere to compliance frameworks (ISO, CMMC, PCI, SOC, …), but a little harder for business that have no such requirements.

What's in a name? Data residency vs Data Sovereignty vs Local Legal Mandates

Even the largest global companies have challenges operating across multiple countries, moving and storing data and navigating multiple jurisdictions. In the globalised digital economy, data can flow across borders in milliseconds. But the legal frameworks governing this data vary widely from one jurisdiction to another. If the UK, Europe and the US are characterised by robust data protection laws, so are many other countries, including the Nordics, Australia, India and China, to name a few.
Sponsored Post

Top Security Data Types: Exploring the OCSF Framework

In cybersecurity, it's a big challenge to handle diverse data formats across various platforms. The Open Cybersecurity Schema Framework (OCSF) aims to address this by standardizing data security formats and simplifying the process of threat hunting. Major players like IBM, AWS and others are working together to standardize data with this open-source project, emphasizing its importance.

Securing Your Open Source Dependency Chain

Discover the two simple steps you can take to secure your open source dependency chain. Open-source software (OSS) has become the backbone of modern software development, empowering developers with a vast ecosystem of freely available libraries, frameworks and tools. However, as the old saying goes, ‘there's no such thing as a free lunch’, and the over reliance on OS components introduces significant security risks that can compromise the entire software supply chain.

Platform Engineering Best Practices: Data Security and Privacy

Security is and will always be a huge concern, and Platform Engineering is here to stay: so, what are some Platform Engineering best practices that can support your data security and privacy efforts? You’d be surprised where they overlap, and what you can learn about putting security and productivity together — we’ll explain.