Operations | Monitoring | ITSM | DevOps | Cloud

The latest News and Information on CyberSecurity for Applications, Services and Infrastructure, and related technologies.

10 Steps to Create a Risk Management Plan

It’s always nice to know the theory behind the practice, but sadly that’s not enough. A Risk Management plan is what will make you truly effective at avoiding risks and keeping your organization safe. Having a set of guidelines will help you map your activities, ensure the right people are held accountable, and avoid possible disruptions or fines. Don’t know where to start? Don’t worry!

From Monitoring to Action - Get Faster Incident Response with Change Forensics

In this post you’ll learn how Kosli’s Change Forensics gives DevOps, Platform, and Site Reliability Engineers the ability to rapidly pinpoint and understand changes and events in their infrastructure and applications, and get to the cause(s) of an incident quickly.

Top 10 Security Tips for a New Real Estate Website

As the real estate industry embraces digitalisation, establishing a secure online presence has become essential for real estate websites. Protecting sensitive data, ensuring user privacy, and maintaining a trusted online reputation are crucial for the success of your real estate website. This article discusses the top 10 security tips for safeguarding your new real estate website.

Managing Compliance: Tips + Strategies for Breaking the Vicious Scan-Fix-Drift Cycle

Managing compliance can seem like a losing game. It seems like you'll never be ahead – like you'll always be fixing drift after it happens, only for your configurations to inevitably slip again. Managing compliance becomes a vicious cycle of scanning to hunt down drift, fixing it as best you can, and waiting for it to happen again.

Security Customer Fireside Chat with Dr. Joel Fulton, CEO of Lucidum

Join Ivanti's own Brad Fleeman, Vice President Americas, Security Solutions Group, and cybersecurity expert Dr. Joel Fulton as they discuss the top priorities for cybersecurity in 2023. Dr. Fulton, renowned for his work with leading organizations like Boeing, Starbucks, and Google, shares his insights on building a strong foundation and the importance of basic security practices.

10 Essential Security Tips for Safeguarding Your Cloud Services

In today’s digital era, the cloud has revolutionized the way we store, process, and transmit data, offering scalability, efficiency, and flexibility. As we continue to transition towards this cloud-first approach, the importance of robust cloud security can’t be overstated. This article will provide ten essential tips for ensuring the safety and security of your data in the cloud.

How Kentik reduces the likelihood of a full-blown cyber-attack before it happens

Organizations are under constant attack, and it’s critical to reduce the time it takes to detect attacks to minimize their cost. This first article in our new security series dives deep into how Kentik helps customers before, during, and after a cyber attack.

Managing security vulnerabilities and compliance for U.S. Government with Ubuntu Pro

Complying with US government security standards such as FIPS, FedRAMP, and DISA-STIG is essential for federal agencies and any business that deploys systems and services for U.S. government use. However, maintaining a compliant IT ecosystem is a major undertaking, as each regulation brings a host of specialised requirements. And dealing with the never-ending stream of security vulnerabilities that require patching only adds to this task.

The founding moments: Tracing the origins of confidential computing

In Ernest Hemingway’s novel “The Sun Also Rises,” there is a memorable exchange between the author and the main character, Mike. When asked how he went bankrupt, Mike responds with a concise yet profound answer: “Two ways. Gradually, then suddenly.” Innovation happens much in the same way. Gradually, then suddenly. Ideas simmer and evolve, gaining traction until they reach a tipping point.