Operations | Monitoring | ITSM | DevOps | Cloud

Security

The latest News and Information on CyberSecurity for Applications, Services and Infrastructure, and related technologies.

Understanding Modern Device Management and Mobile Threat Defense

The focus is on modern Device Management (MDM) and Mobile Threat Defense (MTD) processes. It delves into device provisioning using zero-touch enrollment and various methods. The role of Apple Business Manager in configuring devices, applying security profiles, and installing applications is highlighted. The importance of a secure and highly available user experience, device monitoring, notifications, and support services is emphasized. The discussion also covers end-of-life scenarios and the role of Imperium and Ivanti in securing devices.

What is platform engineering and when should you invest in it?

As application platforms grow larger, the idea of DevOps teams where developers support the software development lifecycle, but also manage infrastructure and the platform, is beginning to reach the limits of what these teams can support. Rather than taking their best application developers and making them work on infrastructure problems, more organizations are coming to the conclusion that a centralized platform team specialized in that area is a better use of their developers’ skill sets.

Securing Your Environment: A Guide to Windows Application Whitelisting

A simple and quick way to protect your data environment is by implementing Windows application whitelisting, a strategy that lets only trusted software run on your system. This not only safeguards you from malicious applications but also gives you application control, ensuring stability and security. This guide will help you understand what Windows application whitelisting is and the tools and technologies you can use to enforce whitelisting policies and best practices for whitelisted software management.

Detect and score application vulnerabilities

With AppDynamics and Cisco Secure Application, you can quickly identify where application vulnerabilities exist and gain insights as to how best to remediate them based on business risk observability. Let technology work for you by keeping up with the most recent vulnerabilities and help you prioritize what to remediate based on business risk.

Understanding What Data Masking Is and Its Critical Role in Data Security

In the fast-paced realm of modern business, data reigns supreme as the driving force behind organizational decisions, innovative breakthroughs, and competitive edge. As technology continues to advance, the sheer volume and intricacy of data generated by organizations have reached unprecedented levels. Alongside this exponential growth comes the pressing need to safeguard sensitive information from the ever-looming threats of unauthorized access and breaches. In this landscape, data masking emerges as an indispensable weapon in the arsenal of data security measures.

Proactively Protect: Automating and Strengthening Endpoint Security Measures

In an ever-evolving cybersecurity climate, safeguarding endpoints against threats has never been more paramount in today’s constantly evolving cybersecurity space. Endpoint management plays a key role in ensuring key security tools like antivirus and Endpoint Detection and Response (EDR) software are present and operational, while automating endpoint hardening that promotes a stronger security posture.

DevOps Debriefs: How The Financial Times Beat Leaks with OIDC

In our first instalment of DevOps Debriefs, join Cloudsmith and special guest Rob Godfrey, Senior Technical Architect at the Financial Times (FT) for a discussion on the crucial role of authentication and credential management in ensuring software pipeline security. We’ll discuss: Innovative strategies that empowered the Financial Times team to overcome software supply chain risks in their pipelines. How the team responded to the fallout of the CircleCI breach by using OIDC with CircleCI and Cloudsmith.

The Benefits of Using C Sharp Read XLSX Files for Business Applications

In the age of digital transformation, quick access to information is pivotal for businesses to make decisions with precision. Near the top of the list of formats for storing tabular data is the ubiquitous Excel. Leveraging the right programming language to harness this data goldmine can be a game-changer for any business. One such language is C#, which offers a robust and streamlined approach for reading XLSX files. Here's how a C sharp read XLSX file can enhance your data parsing capabilities and how it benefits your business. Read on.