Operations | Monitoring | ITSM | DevOps | Cloud

Security

The latest News and Information on CyberSecurity for Applications, Services and Infrastructure, and related technologies.

Successfully Navigating Your Business Through a Cyber Attack

In an increasingly interconnected digital world, businesses of all sizes are at risk of experiencing cyberattacks. These attacks, if not well managed, can lead to severe consequences, including loss of sensitive data, financial damage, and reputational harm. As such, it's crucial to understand how to navigate your business through a cyberattack, not only to mitigate damage but also to recover and learn from the experience.

Securing open source software with Platform One and Canonical

Our own Devin Breen and Mark Lewis discussed Securing Open Source Software with the Chairman of Iron Bank at USAF Platform One Zachary Burke at AWS Summit Washington, DC. The topic includes: Securing Open Source Software, Secure Minimal Containers, and Software Security Scanning.

Storing Secrets with Telegraf

Telegraf is an open source plugin-driven agent for collecting, processing, aggregating, and writing time series data. Telegraf relies on user-provided configuration files to define the various plugins and flow of this data. These configurations may require secrets or other sensitive data. The new secret store plugin type allows a user to store secrets and reference those secrets in their Telegraf configuration file.

Data Tampering: A Comprehensive Guide

In an increasingly interconnected and data-driven world, where information shapes decisions and fuels innovation, the integrity of data has become paramount. However, lurking beneath the surface is a silent threat that can undermine trust, compromise systems, and wreak havoc on organizations: data tampering. In this post, we delve into the realm of data tampering, exploring the vulnerabilities, the reasons behind data tampering practices, and countermeasures against them.

Digital Leap: Understanding the Transformative Impact of Software on Healthcare

As the world grows increasingly digital, it's clear that no industry remains untouched by the influence of technology, and healthcare is no exception. The integration of software solutions in healthcare, often referred to as digital health, signifies a significant leap in the industry's evolution. It revolutionizes patient care, transforms the way healthcare professionals operate, and introduces efficient mechanisms to manage vast and intricate health data. This article seeks to understand the transformative impact of software on healthcare, focusing on its applications, benefits, and potential future developments.

The ABC of Risk Management Automation

Every IT asset in your organization has the power to pose a risk to your organization. Outdated or unauthorized software can be a backdoor for a cyber attack, and expired licenses can make you lose a lot of money, just to name a few. Luckily, these can be mitigated with Risk Management automation. As you know, automating stuff can help you avoid human error, reduce your team’s workload, and be more strategic in terms of budget.

It's Official, Scout is SOC 2 Certified

Valued customers, friends, and Scout APM users: Our goal has always been to provide you with the peace of mind of knowing your systems are healthy and serving your customers as expected. While security has always been paramount to us, we’ve recently made it official. We are thrilled to share with you a recent significant achievement for our team and those who trust us with their data. After many months of hard work, we have obtained our SOC 2 certification!

What is Zero Trust Security and Why Should You Care?

Automation has become a game changer for businesses seeking efficiency and scalability in a rather unclear and volatile macroeconomic landscape. Streamlining processes, improving productivity, and reducing incidence for human error are just a few benefits that automation brings. However, as organizations embrace automation, it’s crucial to ensure modern security measures are in place to protect these new and evolving assets.

What Do Our Users Love About Cove Data Protection?

At N-able’s recent Empower partner event in Prague, we took the opportunity to ask some Cove Data Protection users what they actually think about the product. Naturally, we were pleased to hear so many positive comments, but we also found that their reasons for choosing Cove varied, as did the capabilities they value most. Here’s a little sample.