Operations | Monitoring | ITSM | DevOps | Cloud

The latest News and Information on CyberSecurity for Applications, Services and Infrastructure, and related technologies.

Solve employee security friction through automation, Srinivas Mukkamala, CPO, Ivanti

Get expert advice on balancing security and employee experience in Ivanti’s research report: “Securing the Digital Employee Experience.” Ivanti CPO, Dr. Srinivas Mukkamala explains why cybersecurity leaders often overlook user experience, and how cybersecurity is evolving from being reactive to proactive and resilient.

Implementing a Bring Your Own Device Policy (BYOD) in Your Organization

Bring your own device (BYOD) policies are more important than ever since smartphones became pervasive. I’d argue that even if you don’t want to allow personal user devices to access corporate data or applications, you still need BYOD policy best practices if only to acknowledge the fact that users are already bringing their personal devices into your organization.

What the Cyber Resilience Act (CRA) means for IoT manufacturers

The EU Cyber Resilience Act is coming. I’ve talked about this piece of upcoming regulation in some depth before, having covered its background and stipulations in previous pieces on our website and for the Forbes Technology Council, and explored what it means for the businesses who consume open source in later articles (you can also read a version of this blog on Forbes).

Essential Kafka Security Best Practices for 2024

Ah, Kafka—the powerhouse behind real-time data streaming in today’s world. It’s efficient, scalable, and handles vast amounts of data with ease. But with great power comes great responsibility, right? And in 2024, with cyber threats more sophisticated than ever, securing your Kafka environment is no longer just a good idea—it’s non-negotiable.

How Penetration Testing Services Can Strengthen Your Security Position

In the era of technology, online security concerns have become increasingly important for businesses of all sizes. Safeguarding information and computer networks is crucial. A key strategy to strengthen security measures is to utilize penetration testing services. This process involves mimicking cyber breaches to pinpoint weaknesses ahead of attacks. Grasping the advantages and approach of penetration testing can greatly enhance an organization's security readiness.

Feature Friday #29: Variable class expressions

Did you know you can use variables in class expressions? If you are reading this, you probably are already familiar with the ability to use class expressions to restrict the context of multiple promises. For example, here we have three reports type promises, all guarded by the class expression linux::.

Infrastructure Security: Best Practices for Protecting Your Business

Technology drives business operations, and infrastructure security is there to safeguard the foundational systems that power your business. It also helps ensure smooth operations and protects sensitive data from cyber threats. But what exactly does infrastructure security involve? And how can businesses put in place measures that are both effective and scalable?

Mobile Threat Defense: How to protect mobile devices against new emerging cyberthreat trends

Ivanti's Alex Mercer explains all the many use cases for Ivanti's Mobile Threat Defense solutions, equipping you with proactive strategies, detection mechanisms, and response protocols to ensure robust defense against phishing threats.