Operations | Monitoring | ITSM | DevOps | Cloud

Security

The latest News and Information on CyberSecurity for Applications, Services and Infrastructure, and related technologies.

New CircleCI features for secure secrets management

When security incidents happen, it’s crucial for software providers and users alike to take swift and effective action. In response to our recent security incident, we witnessed firsthand how an open and collaborative effort between our customers, technology partners, and engineering teams helped to contain the threat and mitigate risk of unauthorized access to customer systems.

High throughput Kubernetes cluster networking with the Calico/VPP dataplane and accelerated memif

This blog will cover what the Calico/VPP dataplane is and demonstrate the performance and flexibility advantages of using the VPP dataplane through a benchmarking setup. By the end of this blog post, you will have a clear understanding of how Calico/VPP dataplane, with the help of DPDK and accelerated memif interfaces, can provide high throughput and low-latency Kubernetes cluster networking for your environment.

Secure Remote Access Software: Everything You Need to Know

Remote desktop software, also known as remote access applications or remote access software, allows you to remotely access and work on any computer from a remote location. Remote access applications are very useful in many situations, such as executing codes, troubleshooting computer problems, and managing your office network remotely from home. Basically, it requires software to be installed on the computer you want to connect to (commonly called the host).

Use Cases for Black Screen Mode: When Privacy Matters

The advent of the modern MDM has given organizations unprecedented agility when it comes to their remote support. Instead of deploying engineers to fix hardware devices on-site as they did before, they can now troubleshoot and fix them entirely remotely. While this kind of remote support provides exponential value to organizations and their employees and customers, it also presents another major challenge: privacy.

Cyber Resilience: The Key to Security in an Unpredictable World

Join Ed Bailey and Jackie McGuire as they delve into the topic of cyber resilience and its growing significance in today's digital landscape. In this informative video, you will learn what cyber resilience means, why it's important, and how to manage and improve it in an increasingly unpredictable world. With cyber threats becoming more sophisticated and frequent, cyber resilience has become a critical aspect of protecting personal and business assets. This discussion is perfect for anyone looking to better understand the importance of cyber resilience and how to safeguard against potential threats.

Protect Data from Ransomware with Flowmon & Superna

With the rapid rise of ransomware in the recent years, protecting your data is now crucial than ever. Combination of Flowmon' Anomaly Detection System (Flowmon ADS) to provide early warning about upcoming attacks and Superna's capability of taking proactive snapshot of data is a powerful combo to protect your data before any exfiltration attempt.

Demo Den: Open DevOps, Security in Jira (Feb 2023)

Nupur Aggarwal, Product Designer - Open DevOps, walks through Jira Software’s latest DevSecOps capability, a new security triaging ritual to help teams better stay on top of security risks within their code. Available as part of an early access program, Open DevOps brings vulnerabilities into the context of developer sprints, allowing security and development to collaborate better together.

Integrate CircleCI with HashiCorp Vault using OIDC

Well-designed secrets management is a delicate balancing act between security and usability. Secrets must be easily accessible to the right users when building and deploying, but they must also at the same time be well-secured and easy to rotate. This article will cover how to thread this needle by integrating CircleCI with HashiCorp Vault and retrieving secrets using short-lived OpenID Connect (OIDC) authentication tokens.

How 1Password Relies on Checkly for Secure System Health Monitoring for Thousands of Business Customers

1Password uses Checkly to provide transparent, advanced synthetic monitoring to 1Password SCIM bridge customers 1Password is a leader in human-centric security and privacy, with a solution that’s built from the ground up to enable anyone—no matter the level of technical proficiency—to navigate the digital world without fear or friction when logging in.