Operations | Monitoring | ITSM | DevOps | Cloud

The latest News and Information on CyberSecurity for Applications, Services and Infrastructure, and related technologies.

Introducing CartShark

Ecommerce websites are more vulnerable than ever to cyberattacks. Among these threats, web-skimming attacks – also known as data exfiltration or Magecart attacks – stand as the number one threat, targeting sensitive customer data and payment information. RapidSpike is proud to introduce CartShark, a revolutionary cybersecurity platform that empowers ecommerce businesses to combat these threats swiftly and effectively.

How to Use Network Visibility in Your Cyber Security Strategy

As organizations grow in size and complexity, their internal networks often become a “black hole” in terms of visibility. To keep these networks secure, this visibility needs to be managed, but time and budget seldom allow IT and cybersecurity professionals to gain actionable insights. N‑able’s VP, Product Management, Jim Waggoner and Head of Threat Research, Kevin O'Connor demystify network visibility and provide valuable takeaways you can implement today to mature your cybersecurity posture.

Integrating Google SecOps with Bindplane February 2025

Google SecOps (formerly Chronicle) is Google Cloud’s security operations platform (SIEM) that helps you detect, investigate, and respond to cybersecurity threats. Integrating Bindplane enables an easy way of standardizing how you efficiently collect, process, and forward security-relevant data to Google SecOps. In this live workshop you’ll get a hands-on demo of how to configure log collection with the Bindplane Distro for OpenTelemetry Collector, and best practices for data standardization using open standards and OpenTelemetry.

The Role of Facial Recognition Cameras in Modern Surveillance AI Technologies

Facial recognition cameras have rapidly emerged as one of the most advanced tools in modern surveillance AI technologies, transforming security measures across industries. These intelligent systems integrate artificial intelligence with real-time data processing to identify individuals with remarkable accuracy, enhancing law enforcement, border control, and corporate security. Surveillance systems that leverage facial recognition cameras provide unmatched capabilities in monitoring and streamlining identity verification, making them an indispensable asset in today's security landscape.

NIS2 Directive and Cybersecurity: Requirements, Risk Management, and Monitoring

The days when an antivirus and common sense were enough to guarantee an organization’s cybersecurity are long gone. Especially if you work in a critical sector. That’s why the NIS2 Directive (2022/2555) of the European Union establishes cybersecurity obligations for these key activities… and the consequences of non-compliance. These consequences are significant, so let’s analyze the regulation, when it applies, and how to implement it.

Safe Storing And Secure Login For Shared Devices | Zebra

When mobile devices are essential to your staff’s daily workflows, it’s crucial to know their location and charge status at the start of each shift. Zebra’s Intelligent Cabinets and Access Manager solutions optimize device management in healthcare settings by ensuring devices are securely stored, charged, and ready for use. These solutions provide real-time visibility into device status—whether charging, in use, or missing—offering critical insights for efficient operations.

Urgent Security Updates for iPhones and iPads #shorts

Major security vulnerabilities in iPhones and iPads prompt Apple to release urgent updates. A USB vulnerability allows unauthorized access, particularly from commercial spyware. High-profile users, including executives, are at significant risk if their devices are lost or stolen, as these vulnerabilities can bypass existing security features. Staying informed about these updates is crucial for safeguarding both personal and proprietary information.

Automating Government Compliance Requirements

Government compliance regulations are becoming more complex every year. For businesses, staying compliant means balancing a growing list of laws and policies while facing tighter budgets, limited resources, and increasing scrutiny. Failing to comply isn’t just risky—it can result in hefty fines, reputational damage, and operational inefficiencies. This is where automation can be a game-changer.

What is Entra ID? .... and how Entra ID has evolved since the Azure AD rebranding

Entra ID is the new name for Azure Active Directory (Azure AD), Microsoft’s cloud-based identity and access management service. This rebranding, announced in July 2023, is part of Microsoft’s broader Entra product family, which focuses on securing access to digital resources and managing identities in a comprehensive way.