Operations | Monitoring | ITSM | DevOps | Cloud

Security

The latest News and Information on CyberSecurity for Applications, Services and Infrastructure, and related technologies.

How to Use Nmap: Complete Guide with Examples

In the constantly changing cybersecurity landscape, staying one step ahead of malicious actors is crucial - and understanding the intricacies of your networks is an integral part of that. A tool that can help you do this has earned its reputation as a cybersecurity stalwart - Nmap. Nmap, short for Network Mapper, holds the keys to unlocking valuable insights in your network infrastructure.

Optimizing Web Security Operations for Remote Work Environments

The shift towards remote work has been one of the most significant transformations in the modern business landscape. While it offers flexibility and a broader talent pool, it also introduces unique challenges, especially in the realm of web security. As businesses adapt to this new norm, optimizing web security operations becomes paramount.

Managing Users and User Groups: A Guide to OKTA and Cloudsmith Integration

Explore Cloudsmith’s powerful OKTA integration for user and user group management. Dive into the benefits, security considerations, and best practices to optimize user access, streamline workflows, and bolster security in your software operations. User management is the backbone of secure and efficient software operations. As businesses grow and evolve, the tools they use must keep pace. Enter OKTA and Cloudsmith.

CISO's MOST WANTED: Outsmarting Cyber Criminals with Tips from a Former FBI Agent

It's not a matter of IF you’ll be hacked, it’s a matter of when. No one understands that more than FBI Special Agent, Scott Augenbaum, who spent 30 years as a Supervising Agent for the FBI’s Cyber Crimes Unit. Scott joins our panel of experts to discuss today’s cyber threats and practical security solutions to keep you one step ahead of cyber criminals.

Key Steps for a More Secure Linux Server

Linux server hardening means fortifying and securing a Linux server in order to protect it from vulnerabilities and threats. While total security will always remain a moving target in the security arms race, this article explores some important fundamental steps you can take to help keep your servers safe and secure.

Authenticating Users with Google IAP in Rails

Google Identity-Aware Proxy (IAP) is a Google Cloud service that provides authentication for web applications. This service simplifies the process of building web applications authenticated with Google, eliminating the need to handle user-related concerns within your application code. This is especially valuable for internal applications within organizations that already utilize GSuite. It is straightforward to use, particularly when operating on Google Cloud.

How to secure your database

Cybersecurity threats are increasing in volume, complexity and impact. Yet, organisations struggle to counter these growing threats. Cyber attacks often intend to steal, damage, hijack or alter value-generating data. In this article around database security, we use the NIST framework to lay out the common controls that you can implement to secure your databases. Let’s start by discussing the potential impact of unsecured databases.

Everything I Needed to Know about Securing a DevOps Platform - Civo Navigate NA 23

Join Hannah Sutor as she unravels the key aspects of securing a DevOps platform in this talk at Navigate NA 2023. She brings to light the necessity of incorporating security measures right from the coding stages to deployment, with an emphasis on continuous monitoring, automation, and the power of team collaboration. Her talk extends beyond the use of tools, focusing on the implementation of best practices for maximum security.

Identity Theft Trends in the Digital Age: New Methods and Prevention Strategies

In our interconnected world, convenience often comes with a cost: the rise of identity theft. This digital age crime is not merely an inconvenience; it can be a life-altering experience with far-reaching personal and societal consequences. This article explores the dynamics of identity theft, its impact, and how to protect yourself in the digital age.