Operations | Monitoring | ITSM | DevOps | Cloud

Security

The latest News and Information on CyberSecurity for Applications, Services and Infrastructure, and related technologies.

Network visibility makes all the difference! The key to Managed Service Providers to protecting your customer data

In a world where technology is ubiquitous, network security is of paramount importance. Every day that goes by, cybercrime evolves and becomes more sophisticated. They improve the materials of their balaclavas and spend more on incognito sunglasses. In 2015, the damage caused by cybercrime already cost the world 3 trillion dollars, since then the figure has only multiplied. No wonder companies are looking for ways to protect themselves against cyberattacks, don’t you think?

The Power Duo: Authentication and AML Strategies for Tech Companies

As technology becomes increasingly integrated into our daily lives, it is crucial for tech companies to prioritize strong security measures. One of the key challenges they face is safeguarding user data, ensuring secure transactions, and complying with anti-money laundering (AML) regulations.

Phishing 2.0: How to Stop Cyberattacks Even Pros Can't Catch

According to Ivanti's 2023 Press Reset cybersecurity report, over 50% of surveyed security professionals said their organizations hadn’t experienced a phishing attack – despite virtually every organization getting phished last year! Today’s phishing campaigns use sophisticated social engineering techniques and the latest AI advances with devastating effectiveness, tricking your most valuable users out of sensitive information, network access and personal credentials.

What Is Reasonable Suspicion And Why Is It Important

When it comes to maintaining a safe and productive workplace, ensuring compliance with state and federal labor laws is essential. But what happens when an employer suspects that an employee may be engaged in activities or behaviors that are in violation of the law? For many organizations, this means turning to reasonable suspicion-a legal concept that can help employers proactively protect their interests while also respecting the privacy of employees.

Cyberattack Prevention with AI

Cyberattack prevention involves proactive steps organizations take to protect their digital assets, networks, and systems from potential cyber threats. Preventive measures, such as a combination of best practices, policies, and technologies, are employed to identify and mitigate security breaches before they can cause significant damage.

Enforcing Policy as Code with Cloudify, Terraform, and Open Policy Agent

In my previous article, I provided an example of using Cloudify’s native REST plugin to send a policy evaluation request to an Open Policy Agent (OPA) service. While dispatching requests to an upstream OPA endpoint is a great way to integrate policy enforcement throughout an environment blueprint, Cloudify has also been working toward native integration of OPA throughout our ecosystem.

Streamlining Data Management for Enterprise Security | SpyCloud

In this customer story, Ryan Sanders, lead security engineer at SpyCloud, shares his experience using Cribl to centralize and store data for account takeover protection and online fraud prevention. Ryan discusses the challenges he faced in managing data across multiple platforms and the solutions Cribl provided. Cribl acts as the Swiss Army knife for observability engineers, empowering them to collect data from various sources and perform custom integrations.

Enforce fine-grained policy control across your data infrastructure

In this video, Dewan and Peter help Rapu, a fictional crab, to be successful in his first few weeks as a junior DevOps engineer. They cover how open policy agent (OPA) can be used together with Terraform to enforce fine-grained policy control across a data infrastructure.