The latest News and Information on CyberSecurity for Applications, Services and Infrastructure, and related technologies.
Cisco AppDynamics is making big strides in enabling both application performance and security monitoring for OpenTelemetry. Learn what we’ve done so far. When DevOps began taking hold around 2007, it was meant as a mechanism to remove silos between IT teams and accelerate software development.
The OpenTelemetry Collector is a core part of telemetry pipelines, which makes it one of the parts of your infrastructure that must be as secure as possible. The general advice from the OpenTelemetry teams is to build a custom Collector executable instead of using the supplied ones when you’re using it in a production scenario. However, that isn’t an easy task, and that prompted me to build something.
As subtle as they are dangerous, Trojan horses (or just “Trojans”) masquerade as benign software only to unleash havoc once inside your computer. Despite their stealthy nature, there are specific strategies you can employ to safeguard your digital assets from these threats. Below, we’ll discuss how to recognize the signs of a Trojan infection, steps for removing Trojan viruses from your devices, and how to reduce the risk of future infiltrations.
Recently, I stumbled upon an eye-opening NPR podcast that delved into the lingering use of pagers in healthcare—a seemingly outdated technology that continues to drive communication in hospitals. As I listened through the debate around its persistence, discussing challenges and unexpected benefits, it prompted reflections on facilitating a seamless shift to secure phone-app-based texting, acknowledging the considerable advantages it brings.
Orange España, Spain’s second largest mobile operator, suffered a major outage on January 3, 2024. The outage was unprecedented due to the use of RPKI, a mechanism designed to protect internet routing security, as a tool for denial of service. In this post, we dig into the outage and the unique manipulation of RPKI.
There’s a rising and intensifying pressure on financial services institutions that aligns with the demand for modernization, down to the core. It comes from laws like those of the Service Organization Control Type 2 (SOC 2) and the General Data Protection Regulation (GDRP), which enforce the need to build and hold down cybersecurity policies.