Operations | Monitoring | ITSM | DevOps | Cloud

Security

The latest News and Information on CyberSecurity for Applications, Services and Infrastructure, and related technologies.

Securing IoMT Devices: Best Practices for Hospitals to Prevent Cyberattacks

The Internet of Medical Things (IoMT) has revolutionized the healthcare industry, connecting medical devices to the internet and allowing for greater patient care. However, with this new technology comes new security threats. Hospitals must be aware of these risks and understand how to find, fix and secure connected medical devices to protect their patients from cyberattacks.

No need for Infosec "Rock stars"

Have they somehow found unlimited budget for their every tech request? Do they have an uncanny ability to source the diamond-in-the-rough talent? Or, is it something else? As part of our inaugural State of Cybersecurity Preparedness research series, Ivanti asked 6,550+ cybersecurity professionals, leaders and end users what their cybersecurity teams will do in the next 12 months to secure their organizations.

Cloud Security - Indiana Bob's Server Closet Versus Data Centers | Ep.28 Security Insights Podcast

Welcome to Security Insights: where best-practice cybersecurity meets the real-world risks, workplaces, and roadblocks you face every day. Join Chris Goettl, head of Endpoint Security Product Management, and Ashley Stryker, your cybersecurity "rubber duck", as they review the security strategies and tactics that truly matter to the information security teams protecting organizations, agencies, and businesses like yours.

Securing Open Source Dependencies on Public Cloud

Aaron Whitehouse, Senior Director of Public Cloud Enablement at Canonical, explains why you need to be thinking about open source dependencies in your software pipelines. He covers three main areas of software dependency management: ESM is part of Canonical's Ubuntu Pro offering and gives developers access to approximately 30,000 packages that they can build on, confident in the knowledge that Canonical will patch high and critical vulnerabilities for up to 10 years while preserving API stability -- regardless of the upstream project's support lifecycle.

Building a Distributed Security Team

In this live stream, Cjapi’s James Curtis joins me to discuss the challenges of building a distributed global security team. Watch the full video or read on to learn about some hard-won examples of how to be successful with remote team building and management. Talent is hard to find, and companies are hiring from all over the world to build the best teams possible, but this trend has a price.

Everything You Need to Know About Compliance Management

Compliance Management is the practice that helps organizations comply with their legal, security, and regulatory requirements. It can support effective Risk Management and improve operational efficiency, reputation, and trust. In this article we will investigate the main activities involved in this practice, explore the implementation process and some challenges to look out for in the way. To finish off, we will see how InvGate Insight can help you streamline some key activities in this process.

InvGate Insight Adds New Software Compliance Features

We are very excited to announce that InvGate Insight has added a Software Compliance feature to enhance our users’ Software Asset Management capabilities. Ensuring compliance will allow organizations to avoid legal or financial fines and costly downtime, and at the same time, improve their software resource allocation. So, let’s see what this new module is all about and how it can level up your day-to-day IT Asset Management (ITAM) operations!

How to Authenticate Access to the JFrog Platform through Your IDE

JFrog’s IDE integrations such as IntelliJ and VS Code, allow developers to work with the JFrog Platform right from within their existing dev environment. By leveraging the advantages of JFrog’s features, developers can develop, build, and deploy applications quickly and securely. Large organizations working with the JFrog Platform, can now easily use a SSO (single-sign-on) login to authenticate access, directly from within IntelliJ IDEA and VS Code.

Must-Know Ransomware Statistics, Trends, and Facts

Although IT teams and MSPs continue to ramp up their security efforts, ransomware attacks show no signs of slowing down. Statistica’s ransomware report shows that in 2022, there were approximately 493.3 million ransomware attacks, and while this is a decrease from the 625.3 million attacks that occurred in 2021, it’s still higher than all the other years in the last decade.