Operations | Monitoring | ITSM | DevOps | Cloud

Security

The latest News and Information on CyberSecurity for Applications, Services and Infrastructure, and related technologies.

4 Tools to Help Protect Against Online Identity Theft

Online identity theft has become a significant concern for everyone, especially as we rely more on the internet for various activities such as shopping, banking, and socializing. Identity theft occurs when someone steals personal information, such as name, address, social security number, or credit card details, to commit fraudulent activities. The consequences of identity theft can be severe: $15.1 billion in monetary loss in a given year alone!

The FireEye/SolarWinds Cyber Attack | Security Insights Podcast: Ep. 1

Ivanti Senior Director of Product Management, Chris Goettl, and former Chief Security Officer, Phil Richards, join host Adrian Vernon to discuss the recent cyber attack that affected many dozens of organizations around the world, including multiple U.S. government agencies. This is one of the largest-scale cyberattacks in recent history.

Deploying Mattermost with Zarf for highly secure air-gapped collaboration

Mission-focused teams that operate in contingency environments – think military branches, the intelligence community, NASA – increasingly depend on collaboration software. They need to share information quickly, nimbly, and securely. And they want to carry that out in contextual channels that enable them to see the right content at the right time to make informed, accurate decisions.

Why Automation is Critical for Improving an Enterprise Security Posture

Cybersecurity threats are coming in hot and have quickly become an urgent concern for organizations of all sizes. In response, security teams are shifting away from homegrown security solutions and towards automation using commercially available tools. As organizations seek to improve their security resilience, they find themselves also needing to scale their security teams more efficiently as they address continuous staffing shortages.

Zero Trust Network Access

With a global workforce rapidly shifting to remote work, organizations have had to adopt new solutions that can ensure secure access to their corporate resources. One such solution is Zero Trust Remote Access (ZTRA) – an increasingly popular security strategy designed to safeguard employee activity and protect confidential data from malicious actors. In this blog post, we’ll provide a deep dive into what ZTRA is, how it works, and the key types of protocols used in its implementation.

SSL Certificate Monitoring: A Vital Component of Website Security

Are you concerned about the security of your website or online business? Do you want to ensure that your customers can trust your site and transact with you safely? If so, then you need to know about SSL certificate monitoring! SSL certificate monitoring is the process of continuously monitoring SSL certificates for potential vulnerabilities or incidents, such as certificate revocation or expiration, and other security issues.

Checkly Completes SOC 2 Type 2 Audit

In August 2022, Checkly's security team successfully implemented and documented all necessary security controls to be SOC 2 compliant for the first time. To get our SOC 2 Type 1 report we had to prove that our engineering, HR, operational, and IT security processes met the high level of information security SOC 2 compliance demands to an accredited auditing firm.