Operations | Monitoring | ITSM | DevOps | Cloud

Security

The latest News and Information on CyberSecurity for Applications, Services and Infrastructure, and related technologies.

Data Loss Prevention and Security Basics You Need to Know

Cyberattacks are the “buzz word” that you hear when a company’s data has been breached. Sometimes the breach results in data being released on the internet. Other times, the hacker holds the data ransom in exchange for a large monetary payout. Data loss prevention and protection should be at the top of your list. Your data, after all, should be considered one of your most valuable business assets.

How to build a security team without becoming the enemy

Unsurprisingly, a lot of people say they don’t like working with security teams. Security teams often have ridiculous requirements, and it can be painful for everyone when releases get delayed. I’ve been guilty of thinking the same thing, so when I was approached at my job at Doximity to build a security team (without prior experience doing so), I knew I wanted to take a different approach.

Enterprise Security Controls for Kubernetes

In this talk, we will explore how to meet common enterprise security control needs when running Kubernetes. Specifically, we will look at a range of common enterprise security needs and how you can meet these with standard Kubernetes primitives and open source projects such as Calico, or take it a step further with the additional features of Calico Enterprise.

Monitoring and Securing Cloud-Based Databases Is the Developer's Responsibility

Modern application development requires more work to ensure the development path and the data it produces are fully in sync, secure, optimized, and error-free. This responsibility has increasingly fallen upon application developers. They’re being asked to double as database administrators to maintain fluidity in the process and support an agency’s rapid release cycle.

Ivanti Integrates Ivanti Neurons Platform with Splunk Security Operations Suite

We have unveiled several exciting announcements recently, from the launch of Ivanti Neurons to all of our strategic partnerships and integrations (see the details on Intel and Qualys). In fact, we have had so much content to announce that we've needed to create a whole new blog category! But this train is not slowing down any time soon.

Implementing a Bring Your Own Device Policy In Your Organization

Bring your own device (BYOD) policies are more important than ever since smartphones became pervasive. I’d argue that even if you don’t want to allow personal user devices to access corporate data or applications, you still need a BYOD policy if only to acknowledge the fact that users are already bringing their personal devices into your place of business.

Data Security and Privacy at Home

With one of the largest threats to a company’s security and privacy being its own employees, having employees work remotely only adds to the risk. While this year’s Verizon Data Breach Investigations Report chalks it up to internal errors rather than intentional malice, the threat remains. Many corporations have sent employees to work from the confines of their homes, creating a greater need for protection against data and security breaches.