Operations | Monitoring | ITSM | DevOps | Cloud

The latest News and Information on CyberSecurity for Applications, Services and Infrastructure, and related technologies.

Featured Post

Is Remote Working a Cybersecurity Risk?

The Covid-19 pandemic had a huge impact on employment. Perhaps one of the most important was the rise in remote working. Some workers chose to work remotely to protect themselves - others were asked to as a part of a plan from their company to help limit the spread of the virus among members of staff.

Introducing BGP monitoring from Kentik

Designed at the dawn of the commercial internet, the Border Gateway Protocol (BGP) is a policy-based routing protocol that has long been an established part of the internet infrastructure. Historically, BGP was primarily of interest to ISPs and hosting service providers whose revenue depends on delivering traffic.

What a more holistic approach to cloud-native security and observability looks like

The rise of cloud native and containerization, along with the automation of the CI/CD pipeline, introduced fundamental changes to existing application development, deployment, and security paradigms. Because cloud native is so different from traditional architectures, both in how workloads are developed and how they need to be secured, there is a need to rethink our approach to security in these environments.

Can Endpoint Protection Keep up With Modern Threats?

Endpoint protection is a security approach that focuses on monitoring and securing endpoints, such as desktops, mobile devices, laptops, and tablets. It involves deploying security solutions on endpoints to monitor and protect these devices against cyber threats. The goal is to establish protection regardless of the endpoint’s location, inside or outside the network.

Are Your Business Disaster Recovery Measures Sufficient?

Not too long ago, we could have summarized disastrous and unexpected events for a business as 'theft, fire, or flood' because these are the only significant risks that could bring down a business for good. Today, however, businesses are more likely to suffer digital disasters they cannot recover from.

reCAPTCHA: Easy for Humans and Hard for bots

Captchas are used on many websites to protect user accounts from bots and other automated programs, preventing them from accessing the website. According to Imperva's research, harmful bots generate 25.6% of all web traffic in 2020. They are used by spammers to send automated messages to users, and by hackers to attack websites with automated scripts that often wreak havoc on the site’s performance.

How to Encrypt S3 Buckets Automatically with Torq

S3 buckets without encryption can leave sensitive data exposed and at risk. As a best practice and to meet a number of industry and governmental regulations, it’s important to ensure that S3 server side bucket encryption has been properly applied at all times. To do this, many security teams rely on their Cloud Posture Security Management (CSPM) platform and/or AWS GuardDuty to monitor their AWS resources and provide alerts when an S3 bucket is found unencrypted.