Operations | Monitoring | ITSM | DevOps | Cloud

Latest News

The GDPR: It's been a year, did it make a difference?

Businesses are comprised of different departments and professionals, with data flowing across the organization. When there’s a data breach, it’s usually the data protection officers (DPOs), CIOs, and CISOs who take the brunt of the blame; however, since the introduction of the General Data Protection Regulation (GDPR), all staff are more responsible for data handling.

Top 5 Cloud Security Trends Revealed

Cloud security is becoming one of the most pressing issues for many modern organizations as they move to the cloud. According to Cloudneeti’s 2019 Cloud Security Trends and Predictions report, by 2020, 41% of overall workloads will run in public clouds. Defending against unauthorized data exposure and securing data, applications, and infrastructures across the cloud environment is a must. It is the responsibility of every organization and should be taken seriously.

Do you really know what a network is? Learn all about it and improve its security

Today, we live in a world in which, the use of new technology is greatly enhancing the ability to communicate with each other. The Internet has been globalized very fast and relationships are continuously changing and evolving in all areas.

CFEngine 3.12.2 LTS Released

We are happy to release the 2nd update to the CFEngine 3.12 LTS series. This update comes with many important stability and performance improvements and is thus well worth the upgrade from an older version of 3.12 LTS. CFEngine 3.12 LTS brings a lot of innovation, new features and improved performance to CFEngine, and allows you to make the most efficient use of your time. We are looking forward to your feedback on this release.

Intel's latest security vulnerability - our steps and yours

This week Intel released a statement regarding Microarchitectural Data Sampling (MDS), another vulnerability in the "speculative execution" feature of modern processors. This is for HyperThreading and is the feature that allows the CPU to work out what commands will be run next, if they would affect the current running command and if not, run it on the same core.

Firefox add-on outage: Yet another reminder for companies to enforce PKI life cycle automation

More often than we’d like to admit, we tend to underestimate the impact of every moving part within an organization—especially those that seem small or insignificant. And usually, it’s not until we’re facing the fallout of neglecting that seemingly insignificant factor when we realize what a mistake we’ve made.

What Your Website is Going to Lose if it is Not Secured

The very foundation of exchange between web & client-server protocol started with HTTP, where HTML form was the source of fetching resources - from documents to images. This extensible protocol was designed in the early '90s and has evolved over time. Cache or authentication is the main feature handled by HTTP which has never been compromised. Still, there are dangerous sites that are keen on corrupting the digital world.