Operations | Monitoring | ITSM | DevOps | Cloud

Security

The latest News and Information on CyberSecurity for Applications, Services and Infrastructure, and related technologies.

The First Principle of AI by Design: Privacy and Security

SolarWinds has launched AI by Design, a dynamic framework for integrating artificial intelligence (AI) into our IT management solutions. AI by Design consists of four fundamental principles: Privacy and Security, Accountability and Fairness, Transparency and Trust, and Simplicity and Accessibility. In the second installment in our series exploring this exciting new paradigm, we’ll examine how SolarWinds places the safety of our customers’ data at the center of our strategy for ethical AI.

DISA STIGs: Who Needs Them & How to Enforce DISA STIG Compliance

DISA STIGs are an important compliance standard. There’s a security technical implementation guide (STIG) for almost every kind of technology in an IT environment, and each STIG can include hundreds of individual settings, configurations, and recommendations for ensuring compliance and security.

Protecting User Data When Using News Database APIs

In today's era, where information is easily accessible with just a click, news database APIs have transformed how we access news content. These APIs empower developers to tap into various news articles and data from origins. Despite the influx of user data stored on these platforms, it is paramount for businesses to prioritize the protection of user privacy and data security.

Optimize Business Continuity by Leveraging Cisco Meraki Support and Server Data Recovery Services

Maintaining uninterrupted operations is crucial for organizations in today's fast-paced business environment. Business continuity refers to keeping essential functions running smoothly, even during disruptive events such as natural disasters, cyberattacks, or technical failures. Many organizations are turning to Cisco Meraki support and server data recovery services to ensure seamless business continuity. This article explores the importance of leveraging these services, their benefits, best practices for integration, and the role of technology in optimizing business continuity.

How To Prevent SQL Injection in PHP

SQL injection is a big security problem that can let attackers change database queries and get access to private data they shouldn't have. In PHP applications, SQL injection attacks happen when user input is not checked or cleaned before being used in SQL queries. This article looks at the different kinds of SQL injection attacks, shows examples of PHP code that is open to attack, and talks about the best ways to stop SQL injection problems in your applications.

Maximizing Developer Efficiency and Secure User Management: The Power of Lightrun Agent Pools

In the dynamic landscape of modern application development, managing telemetry across diverse environments and technologies can be a daunting task. Adding to that challenge is the multiple groups that are involved in the software development life cycle within an organization.

NIS2 Requirements: 10 Ideas in Which Asset Management And ITSM Can Help

NIS2 requirements range from Risk Management measures to business continuity insurance – and they must be effectively implemented by October 17, 2024, to avoid penalties. Since this is a cybersecurity framework, IT Asset Management (ITAM) can greatly help implement it.

Feature Friday #10: cf-support

Found a bug, asking for help? Use cf-support to collect info quickly. cf-support was born from interactions supporting Enterprise customers to streamline data collection and was introduced in late 2022 with the release of 3.18.31 and 3.21.02. Furthermore, it was featured on The Agent is In3 episode 21 Troubleshooting with cf-support. It gathers various details about the system and creates an archive that you can attach to your ticket.