Operations | Monitoring | ITSM | DevOps | Cloud

Security

The latest News and Information on CyberSecurity for Applications, Services and Infrastructure, and related technologies.

How RapidSpike Cookie Monitoring Can Support Managing GDPR

When the General Data Protection Regulations (GDPR) and ePrivacy Directive (EPD) updated we saw a proliferation of “cookie consent” banners crop up on websites as a direct result. The key parts of the GDPR relating to this change are from Recital 30: Natural persons may be associated with online identifiers provided by their devices, applications, tools and protocols, such as internet protocol addresses, cookie identifiers or other identifiers such as radio frequency identification tags.

DevSecOps in Practice with VMware Tanzu - A Discussion with the Authors - Tanzu Talk

What is VMware Tanzu? I get asked this question a lot and, you know, I try to explain it. If you want a really good explanation, you should check out a new book on the topic, _DevSecOps in Practice with VMware Tanzu_. It's expansive and in-depth, not only on the parts of Tanzu, but also the theory, ideas, and ways of working that Tanzu embodies.

What is Patch Management?

In today’s digital world, software vulnerabilities have become a widespread concern. Cybercriminals are always looking for ways to exploit these vulnerabilities, resulting in devastating security breaches. That’s where patch management comes in. In this article, we’ll discuss what patch management is, its importance, and best practices to implement it.

Securing Your Network Against Attacks: Prevent, Detect, and Mitigate Cyberthreats

As networks become distributed and virtualized, the points at which they can be made vulnerable, or their threat surface, expands dramatically. Learn best practices for preventing, detecting, and mitigating the impact of cyberthreats. As networks become distributed and virtualized, the points at which they can be made vulnerable, or their threat surface, expands dramatically.

How Hackers Can Hack Your Phone & How To Prevent It

Smartphones have become almost a necessity in this digital era we live in. You can use your phone for banking, online shopping, entertainment, or communicating with your loved ones. Unfortunately, the convenience they provide us also creates a huge disadvantage. Like a treasure chest, our phones hold lots of valuable data and information about us. You will receive a massive blow if someone manages to hack your phone. Therefore, you must learn how to protect your phone from hackers.