Operations | Monitoring | ITSM | DevOps | Cloud

The latest News and Information on CyberSecurity for Applications, Services and Infrastructure, and related technologies.

The Economics Behind Cloud-First Data Protection

If you’re still reliant on legacy local-first backup, you may not fully realize the financial impact of old-school image backup on your business. In today’s cloud-first world, it’s time to take a look at a modern cloud-first approach to data protection as a service. This webinar will walk you through the hidden (and not so hidden) costs of continuing to manage backup using either an image-based software product (like Veeam) or an integrated appliance (like Datto). We’ll do the math to show you a more cost-effective alternative.

Graylog 5.0 - A New Day for IT & SecOps

We are excited to announce the release of Graylog 5.0! Graylog 5.0 brings updates across our entire product line, including changes to infrastructure, Security, Operations, and our Open offerings. For more detailed information on what’s changed, visit our changelog pages for Graylog Open and Graylog Operations/Graylog Security.

Torq Users Hit 1,000,000+ Daily Security Automations

Security automation is an increasingly critical element in optimizing enterprise cybersecurity postures. Today, Torq announced its users are executing more than 1,000,000 daily security automations using our security automation platform – a major milestone that underlines the traction and importance of unifying today’s complex security stacks.

Don't be held to ransom: Security awareness with Upsun

Ransomware is an ever-evolving type of malicious software (a.k.a malware) in which an attacker encrypts the files on a victim’s device, rendering it inaccessible and unusable. Then - you guessed it - they demand a ransom from the target before they’ll fix it. Not something any organization ever wants to deal with, and not something any organization has to deal with if they have the right measures in place to minimize the risk. Let’s talk about how!

4 API Security Best Practices To Safeguard Sensitive Data

Thanks to the increasing usage of different software solutions, API usage has become an everyday practice. As such, API security is a more prevalent issue in app development than ever before. SaaS companies have an average of 350 integrations, whereas major SaaS companies like Slack, Zoom and Shopify have 2,000+ integrations. This is great for developers and end users, as Application Programming Interfaces (API) make life easier.

Cyber, incident, downtime: Three words that chill the board, and how to tame them

There are three words that every member around a boardroom table fears when they hear them strung together: "Cyber... incident... downtime". They are never the precursor to a good meeting! Technology incidents can leave the business in the dark and bring the wheels of industry grinding to a halt. With no operational systems, a Gartner report found that companies can lose up to half a million dollars per hour from severe incidents based on losses and remediation.

Updates, upgrades, and uptime

All software of any significant size has bugs, vulnerabilities, and other weaknesses. This includes the operating system (OS), libraries, command line tools, services and graphical applications. Across your infrastructure, you should have an overview of what operating systems and software you have installed. Additionally, automated ways of upgrading the OS, as well as packages are desirable.

Reasons to Use a Virtual Private Network

A Virtual Private Network (VPN) is becoming increasingly popular in the modern age of digital connectivity and ever-advancing technology. A VPN is a secure network connection that allows users to access the internet without restrictions or censorship while keeping their data safe and secure. Here are some primary reasons you should consider using a VPN.

Your Checklist for an Application Blocklist

With the advent of remote and hybrid work, the line that separates work from personal life is increasingly hazier. This thinking applies especially to our digital lives. When work still revolved around fixed hours on-site, admins could easily determine which applications to block. For example, a worker should not be able to access the Netflix application at the office during business hours.