Operations | Monitoring | ITSM | DevOps | Cloud

The latest News and Information on CyberSecurity for Applications, Services and Infrastructure, and related technologies.

Episode 3 | Ryan Cooke on CSPM, DSPM and Data Security in the Cloud

In this episode, the hosts and guest discuss the importance of data security posture management (DSPM) and its role in protecting sensitive data. They explore the evolution of the cybersecurity and data security market over the years, highlighting the challenges and advancements in securing data in cloud environments. The conversation also touches on the vendor landscape, the complexity of selecting security tools, and the need for organizations to invest in data security. The key takeaways include the overwhelming number of security tools available, the importance of aligning security goals with business risks, and the impact of regulations on data security.

Facing the Future of SBOMs: Are You Ready to Overcome Their Biggest Challenges?

In this session at Navigate North America 24, Cortez Frazier Jr. from Fossa delves into the critical world of Software Bill of Materials (SBOMs). As regulatory demands increase and the call for software component transparency becomes louder, mastering SBOMs is essential. Cortez unpacks the complexities of creating, managing, and distributing SBOMs, offering actionable solutions to streamline the process.

Detecting, Investigating, and Responding to Threats: Best Practices

In this webinar, we will explore tips, trends and best practices for quickly and accurately detecting and responding to an always-evolving array of bad actors. Don't miss the chance to explain why your solution can help strengthen defences and give IT managers some peace of mind in an increasingly scary threat landscape.

Grafana Cloud security: Three common cloud security myths debunked

Grafana Cloud offers organizations an end-to-end observability platform, without the overhead of building and maintaining their own observability stack. We’re constantly shipping new Grafana Cloud features to ensure users get the most out of the fully managed platform, which is powered by our open source Grafana LGTM Stack (Loki for logs, Grafana for visualization, Tempo for traces, and Mimir for metrics).

Key Considerations When Choosing an MDR Provider for MSPs

Organizations face a constant fight against cyber threats. One such solution that is gaining prominence in this battle is Managed Detection and Response (MDR). In this article, we’ll take a look at what MDR is and how it helps organizations protect themselves, explore the different types of MDR solutions available, and outline some of the key considerations you should keep in mind when selecting an MDR provider.

How to secure mission-critical work

The average data breach already costs organizations $4.45 million, and it appears that damages will only become more expensive as time goes on. In fact, one report found that cybercrime will cost the world $10.5 trillion by 2025. While organizations can’t necessarily prevent hackers from targeting their systems, they can take proactive steps to strengthen cybersecurity and develop incident response plans that enable them to keep bad actors at bay and swiftly address incidents whenever they occur.

The UK Telecommunication Security Act (TSA): When Life Gives You Lemons, Make Lemonade

On October 1, 2022, the UK Telecommunications Security Act (TSA) went into effect, imposing new security requirements for public telecom companies. The purpose of the act is noble, as it wants to ensure the reliability and resilience of the UK telecommunications network that underpins virtually every aspect of the economy and modern society.

An MSP's Guide to Navigating Google and Yahoo's 2023 Email Changes

For MSPs wanting to market their businesses, understanding the shifting terrain of email deliverability is crucial. In the aftermath of Google and Yahoo’s fall 2023 updates, the effectiveness of email communication has been significantly impacted. In this blog I want to look at some actionable strategies you can implement to ensure your messages still reach their intended recipients.