Operations | Monitoring | ITSM | DevOps | Cloud

Security

The latest News and Information on CyberSecurity for Applications, Services and Infrastructure, and related technologies.

4 GRC Automation Ideas to Protect Your Organization

Keeping up with Governance, Risk, and Compliance (GRC) requirements within an organization can be challenging, as it involves a range of practices that go from meeting regulatory standards to addressing cybersecurity threats. In this context, incorporating GRC automation becomes essential to streamline overall protection and compliance.

Cisco Secure Application: Fulfilling the APM + ASM promise for OpenTelemetry

Cisco AppDynamics is making big strides in enabling both application performance and security monitoring for OpenTelemetry. Learn what we’ve done so far. When DevOps began taking hold around 2007, it was meant as a mechanism to remove silos between IT teams and accelerate software development.

Building a Secure OpenTelemetry Collector

The OpenTelemetry Collector is a core part of telemetry pipelines, which makes it one of the parts of your infrastructure that must be as secure as possible. The general advice from the OpenTelemetry teams is to build a custom Collector executable instead of using the supplied ones when you’re using it in a production scenario. However, that isn’t an easy task, and that prompted me to build something.

5 Cutting-Edge Technologies Transforming Prisons Today

The concept of prison technology might conjure images of grainy security cameras and clunky metal detectors. But the reality is far more nuanced, with a wave of innovative solutions emerging to reshape correctional facilities. These advancements prioritize heightened security and improved well-being for inmates and staff, paving the way for a more humane and effective system.

How to Remove Trojan Viruses and Prevent Them in the Future

As subtle as they are dangerous, Trojan horses (or just “Trojans”) masquerade as benign software only to unleash havoc once inside your computer. Despite their stealthy nature, there are specific strategies you can employ to safeguard your digital assets from these threats. Below, we’ll discuss how to recognize the signs of a Trojan infection, steps for removing Trojan viruses from your devices, and how to reduce the risk of future infiltrations.

Navigating the Transition to Secure Texting

Recently, I stumbled upon an eye-opening NPR podcast that delved into the lingering use of pagers in healthcare—a seemingly outdated technology that continues to drive communication in hospitals. As I listened through the debate around its persistence, discussing challenges and unexpected benefits, it prompted reflections on facilitating a seamless shift to secure phone-app-based texting, acknowledging the considerable advantages it brings.

Modernizing Financial Services with Automated, Proactive Threat Management

There’s a rising and intensifying pressure on financial services institutions that aligns with the demand for modernization, down to the core. It comes from laws like those of the Service Organization Control Type 2 (SOC 2) and the General Data Protection Regulation (GDRP), which enforce the need to build and hold down cybersecurity policies.