Operations | Monitoring | ITSM | DevOps | Cloud

The latest News and Information on CyberSecurity for Applications, Services and Infrastructure, and related technologies.

AZcopy and GDPR compliance

In today’s data-driven world, managing information is more crucial than ever. With the constant flow of data, both individuals and organizations are increasingly concerned about privacy and security. The General Data Protection Regulation (GDPR) has emerged as a key legislative framework in the European Union to protect citizens’ personal data. But how does this relate to the tools we use to manage and transfer data, like Microsoft’s AzCopy?

Why should every organization invest in cybersecurity software?

In today’s digital age, organizations across industries are increasingly reliant on technology for their operations, communication, and data management. While this technological advancement is no doubt beneficial, it also brings with it a heightened risk of cyber threats and attacks. From data breaches and ransomware attacks to intellectual property theft and financial fraud, the consequences of a cybersecurity breach can be devastating for any organization.

Optimizing Web Security Operations for Remote Work Environments

The shift towards remote work has been one of the most significant transformations in the modern business landscape. While it offers flexibility and a broader talent pool, it also introduces unique challenges, especially in the realm of web security. As businesses adapt to this new norm, optimizing web security operations becomes paramount.

Managing Users and User Groups: A Guide to OKTA and Cloudsmith Integration

Explore Cloudsmith’s powerful OKTA integration for user and user group management. Dive into the benefits, security considerations, and best practices to optimize user access, streamline workflows, and bolster security in your software operations. User management is the backbone of secure and efficient software operations. As businesses grow and evolve, the tools they use must keep pace. Enter OKTA and Cloudsmith.

CISO's MOST WANTED: Outsmarting Cyber Criminals with Tips from a Former FBI Agent

It's not a matter of IF you’ll be hacked, it’s a matter of when. No one understands that more than FBI Special Agent, Scott Augenbaum, who spent 30 years as a Supervising Agent for the FBI’s Cyber Crimes Unit. Scott joins our panel of experts to discuss today’s cyber threats and practical security solutions to keep you one step ahead of cyber criminals.

Key Steps for a More Secure Linux Server

Linux server hardening means fortifying and securing a Linux server in order to protect it from vulnerabilities and threats. While total security will always remain a moving target in the security arms race, this article explores some important fundamental steps you can take to help keep your servers safe and secure.

Authenticating Users with Google IAP in Rails

Google Identity-Aware Proxy (IAP) is a Google Cloud service that provides authentication for web applications. This service simplifies the process of building web applications authenticated with Google, eliminating the need to handle user-related concerns within your application code. This is especially valuable for internal applications within organizations that already utilize GSuite. It is straightforward to use, particularly when operating on Google Cloud.

How to secure your database

Cybersecurity threats are increasing in volume, complexity and impact. Yet, organisations struggle to counter these growing threats. Cyber attacks often intend to steal, damage, hijack or alter value-generating data. In this article around database security, we use the NIST framework to lay out the common controls that you can implement to secure your databases. Let’s start by discussing the potential impact of unsecured databases.

Everything I Needed to Know about Securing a DevOps Platform - Civo Navigate NA 23

Join Hannah Sutor as she unravels the key aspects of securing a DevOps platform in this talk at Navigate NA 2023. She brings to light the necessity of incorporating security measures right from the coding stages to deployment, with an emphasis on continuous monitoring, automation, and the power of team collaboration. Her talk extends beyond the use of tools, focusing on the implementation of best practices for maximum security.

Identity Theft Trends in the Digital Age: New Methods and Prevention Strategies

In our interconnected world, convenience often comes with a cost: the rise of identity theft. This digital age crime is not merely an inconvenience; it can be a life-altering experience with far-reaching personal and societal consequences. This article explores the dynamics of identity theft, its impact, and how to protect yourself in the digital age.