Operations | Monitoring | ITSM | DevOps | Cloud

The latest News and Information on CyberSecurity for Applications, Services and Infrastructure, and related technologies.

A Smart Home System That Does Not Rely On a Cloud

The cloud has been discussed extensively in recent years. Some people believe that it is the future of computing, while others think that it is inherently insecure and unreliable. Whatever your opinion may be, one thing is for sure: the cloud is not right for every application. In this blog post, we will discuss a smart home system that does not rely on a cloud server. Stay tuned to learn more!

Internal Social Media Platforms and Risk Management

Whether you're in the IT, finance, or HR departments of any company, chances are high that your team is using some form of social media to collaborate on projects. While internal social media platforms may boost employee engagement, knowledge sharing, and day-to-day decision-making, they also pose a variety of hazards in compliance and litigation that are often neglected. The following are some potential dangers you should be aware of before implementing internal social media in your business, along with suggestions for coping with such dangers.

What's the Sharpest Tool in Your Security Shed?

How easy is it to work with your security tools? So easy that you’re telling all your family and friends and you singing their praises from the occasional rooftop? Well, we sure hope so. Security tools, like any other tool, should help you save time, not waste it. Nobody would have invented a drill if screwdrivers were fast enough — but it’s also up to you to make sure you are using your drill and all the other power tools available in the modern world.

Take Network Monitoring to the Extreme with WhatsUp Gold/Flowmon Duo

Network monitoring is the key to efficient, reliable operation, as well as performance and security. The deeper and more broadly you can monitor (yes, you want to do both), the better your network operates. What if you could combine a superstar in network infrastructure monitoring with the champion of network flow monitoring? You can. Progress, owner of WhatsUp Gold, recently acquired Kemp and their market-leading Flowmon solution.

How a telecom company elevated integrated risk management and security

Managing risk and compliance in telecommunications is no easy feat. When a telecom company operates in underserved remote and rural communities—including hurricane-prone island markets and mountainous regions in the southwestern US—it can be even trickier. That’s where communications services company ATN International, based in Massachusetts, found itself. The company wanted a platform to elevate its integrated risk management (IRM) program.

A NetOps Guide to DDoS Defense

Join Kentik and Cloudflare as we discuss and analyze the latest in DDoS attack trends. (We’re seeing some really interesting patterns in our data!) Back by popular demand: Doug Madory, Kentik’s Director of Internet Research, will walk through how BGP monitoring can determine if DDoS mitigations are actually effective. What you’ll learn.

What is CyberArk?

Cyber security has continued to gain importance worldwide as hacking and malware threats are rising. Global losses associated with hacking and cybercrime reached $1 trillion in 2020, which has inspired the expansion of the information security industry, with revenue projected to hit more than $170 billion in 2022. As a publicly traded data security firm, CyberArk offers identity management services to protect your company.

How Wiz and Torq Combine to Mitigate Existential Cloud Security Threats

A single cloud security incident can stop an enterprise in its tracks, sometimes resulting in irreparable damage to its operation, reputation, and customer loyalty. One key strategy for preventing such incidents is combining complementary cybersecurity tools to defeat threats at scale. A coherent Cyber Security Incident Response Planning (CSIRP) approach requires enterprises to select and integrate the right tools before a security incident occurs.

Is Your Mac Spying On You? Maybe It Should be

What would you call software installed on your Mac, that’s hidden from sight, difficult to remove, and that silently monitors everything that happens on the system? You might call it spyware, or a RAT (Remote Access Trojan), and start thinking about how best to get rid of it. However, that same description can also be applied to the software that’s used to keep your machine safe from such threats.