Operations | Monitoring | ITSM | DevOps | Cloud

Security

The latest News and Information on CyberSecurity for Applications, Services and Infrastructure, and related technologies.

Drowning in Your SIEM's Archive? Save on Costs and Get Quick Access to Data With Cribl Lake

We hear it often—data volumes are growing at a 28% compound annual growth rate (CAGR) year over year, and organizations struggle to manage it all. With no additional money in their budgets, they can’t afford to store more and more data in their SIEM, which in most cases means being uncompliant or, worse, not having older data readily available in the case of a recently discovered breach. I’ve repeatedly heard that the data they have archived is practically inaccessible.

EU's Cyber Resilience Act Repercussions in Open Source

The European Parliament (EP) adopted a provisional version of the final text of the EU Cyber Resilience Act (CRA) on March 12, 2024, with the final version expected to be signed and published in October. The EU's CyberResilienceAct (CRA) proposes stringent cybersecurity requirements for digital products, aiming to bolster security against cyberattacks. While it promises safer hardware and software, it also raises questions for Open Source contributors and organizations.

What Are the Leading Regions for Outsourcing Java Development Services and Why: A Global Perspective

Outsourcing Java development services has become a strategic choice for businesses aiming to improve their software capabilities. Asia, with countries like India and the Philippines, stands out as a leading region for outsourcing due to its large pool of skilled developers and cost-effective solutions. These countries offer not only technical expertise but also flexibility and scalability that businesses need to meet dynamic market demands.

It's Okay to Walk Away from Customers Over Cybersecurity

In this video, Stefanie Hammond, N-able Head Nerd in Sales and Marketing, tackles a common question from MSPs: "Should I get my clients to sign a liability waiver if they won’t join my advanced cybersecurity program?" Stefanie explains why signing a waiver isn’t the solution and shares why it’s crucial to walk away from clients who don’t prioritize security. Watch now to learn how enforcing cybersecurity standards can protect your MSP from reputational and financial risks.

A Next-Gen Partnership with CrowdStrike's Falcon Next-Gen SIEM

In an increasingly digital world, organizations face complex challenges in managing their security data that’s growing at a relentless pace. With the rapid growth of cyber assets and the ever-present threat of sophisticated attacks, legacy security tools often struggle to keep up.

Innovation Disruption and Data Privacy: A Panel Discussion

Ivanti CPO Srinivas Mukkamala joins an expert panel discussion on data privacy, addressing challenges in personal device compliance, cloud security, and the use of AI for service delivery. Ivanti finds, heals, and protects every device, everywhere – automatically. Whether your team is down the hall or spread around the globe, Ivanti makes it easy and secure for them to do what they do best. Ivanti is IT for the way we work now. Integrated solutions for everything IT touches. So, employees can work better, anywhere, and everywhere.

How to Achieve Zero Trust Adoption in U.S. Government

Zero Trust adoption is critical, especially for U.S. government agencies. With changing policies and requirements, it can be tough to stay ahead of everything you need to know. We’ll provide a high-level overview of Zero Trust adoption + share how automation can help you achieve compliance.

What is Application Security Posture Management

Application security posture management (ASPM) is a key component in ensuring the security of applications in today's digital landscape. As organizations increasingly rely on processes to operate efficiently, the importance of securing these applications cannot be overstated. ASPM helps companies understand the security state of their applications by providing a comprehensive overview of potential vulnerabilities, threats, and areas that need improvement. In this article, we will explore what ASPM is, why it is needed, the features of ASPM solutions, leading vendors, how to implement ASPM, and emerging trends in the field.

Announcing Authd: OIDC authentication for Ubuntu Desktop and Server

Today we are announcing the general availability of Authd, a new authentication daemon for Ubuntu that allows direct integration with cloud-based identity providers for both Ubuntu Desktop and Server. Authd is available free of charge on Ubuntu 24.04 LTS. At launch, Authd supports Microsoft Entra ID (formerly Azure Active Directory) identity provider, with additional providers, including a white label OIDC provider, to be introduced in the future.

Patch Management: A Guide to Protect Systems from Cyberattacks

Code, deploy, repeat. As a developer, your days are a whirlwind of Git commits, pull requests, and CI/CD pipelines. In the rush to ship new features and hit those sprint goals, it's easy to overlook the less glamorous aspects of software maintenance. But one often-neglected practice could be the difference between a stable, secure system and a compromised system. Enter patch management, a key DevOps tool in your arsenal to safeguard your systems.