Operations | Monitoring | ITSM | DevOps | Cloud

Security

The latest News and Information on CyberSecurity for Applications, Services and Infrastructure, and related technologies.

Dynamically rendering config templates for secrets management

It’s often necessary to inject secrets into your build or deployment process so that the deployed service can interact with other services. This can be straightforward if you’re only deploying to a single environment. When deploying to multiple environments, though, you might need to dynamically inject different secrets depending on the environment to which you’re deploying.

The Main Tech Trends Of 2021

2021 has been a year quite unlike any other. The world is attempting to return to some kind of normality, with the pandemic still a major issue, which has created huge challenges for businesses but also new opportunities. Tech has been crucial in this unique time, and it is hard to imagine how the world would have managed during COVID-19 if it had happened 10 years ago. So, what have been the major tech trends in 2021? There are a number of trends that have emerged this year and played a key role in helping people and businesses to retain some kind of normality.

Calico Cloud: What's new in October

Calico Cloud is an industry-first security and observability SaaS platform for Kubernetes, containers, and cloud. Since its launch, we have seen customers use Calico Cloud to address a range of security and observability problems for regulatory and compliance requirements in a matter of days and weeks. In addition, they only paid for the services used, instead of an upfront investment commitment, thus aligning their budgets with their business needs.

Stop the Chase: How Ivanti is Transforming Cybersecurity in the Everywhere Workplace

Threat actors have been a constant, persistent, and ever-evolving part of doing business in a digital world. For the entire history of digital business, security teams have been trying to keep pace with the threats. On a good day, they might be able to get a few steps ahead. But it’s always a chase. And it only takes falling behind one time to lose big.

Quick Demo: Android 12 Anti-Phishing Protection

This month is Cybersecurity Awareness Month and at Ivanti we want you to be #BeCyberSmart. We’re focusing on this week’s theme of phishing. In this short video, James Saturnio, Senior Lead Technical Market Advisor at Ivanti, shows the power of Ivanti’s Mobile Threat Defense (MTD) multiple-layered anti-phishing protection to block 10 random phishing URLs from the OpenPhish feed.

Australian Government Essential 8

It seems that virtually every day, another threat to cybersecurity presents itself. In response to this ongoing concern, the Australian Cyber Security Centre has developed prioritized mitigation strategies, in the form of the Strategies to Mitigate Cyber Security Incidents, to help organizations protect themselves against various cyber threats.

Event and Log Management for Optimized Security and Performance

The full stack isn't just cloud-based, microservices apps, but includes on-premises and hybrid private cloud infrastructure and packaged applications. The challenges associated with aggregating, analyzing, reporting, and alerting intelligently on logs have become more complex than ever due to the acceleration of packaged and customized application deployment in support of business transformation, alongside the growing requirements needed to ensure security and compliance. This webinar will explore multiple methods to ensure compliance, identify threats, and optimize MTTR by monitoring, analyzing, and managing logs across all types of application and infrastructure architectures.