Operations | Monitoring | ITSM | DevOps | Cloud

Security

The latest News and Information on CyberSecurity for Applications, Services and Infrastructure, and related technologies.

Industrial cybersecurity: the journey towards IEC 62443 compliance

Industrial cybersecurity is on every CISO’s mind as manufacturers strive to integrate their IT and OT operations to drive efficiency and productivity. However, with increased connectivity comes heightened risk. This means that securing devices, networks, and systems is a critical challenge.

Detailed Guide Security Incident Response Workflow

Security incident response is all about how organizations handle and mitigate the effects of a security breach. It's a structured process that helps identify, contain, and recover from incidents, ensuring minimal damage and business continuity. This process involves several stages: preparation, detection, containment, eradication, recovery, and post-incident analysis. Each stage is crucial for tackling security threats and boosting an organization’s resilience against future incidents.

GenAI security with confidential computing

Watch to explore how to ensure data security and privacy in AI applications that employ Large Language Models (LLMs). As generative AI becomes increasingly vital for enterprises – especially in applications such as chatbots utilizing Retrieval-Augmented Generation (RAG) systems – ensuring the security and confidentiality of data within these frameworks is essential. During this webinar: We will introduce confidential computing as a method for safeguarding data, with a specific focus on its application within RAG systems for securing data during usage or processing;

Feature Friday #38: Developing modules that take input

CFEngine build modules are great for quickly integrating 3rd party policy into your policy set. Module input (not to be confused with inputs in body common control or body file control which are the list of policy files to load) allows you to define values that apply for a particular module as it’s integrated into your policy set. Let’s take a look at a case of extending a module to support input.

Navigating the NIS2 Directive and How SolarWinds Can Help

In 2016, the European Union (EU) established the Network and Information Security (NIS) directive as its first comprehensive cybersecurity directive. Now, the EU is updating the directive in response to evolving cybersecurity challenges. Let’s break down NIS2 and discuss how SolarWinds solutions can help your organization improve its security incident-handling capabilities.

The Top 8 Dark Web Monitoring Tools

The dark web is an unindexed and often misunderstood section of the internet. It operates beneath the surface of the traditional web, accessible only through specialized browsers like Tor or I2P. While the dark web has legitimate uses-such as supporting privacy and freedom of expression in oppressive regimes-it also harbors illicit activities, such as selling stolen data, distributing malware, and organizing cyberattacks. For organizations and individuals alike, dark web monitoring is essential in proactively addressing potential threats before they escalate.

C3PAO And The Importance of Data Protection: A Cybersecurity Perspective

People frequently use the terms cybersecurity and data protection interchangeably. It's akin to talking about a square and a rectangle, both of which have four sides but are different forms, even if they share commonalities and frequently overlap. On the federal level, your cybersecurity posture can have an immense impact on your compliance. The Cybersecurity Maturity Model Certification (CMMC), a uniform set of federal security policies, ensures that companies in the Defense Industrial Base (DIB) can adequately secure sensitive data, including CUI, CTI, FCI, ITAR data, and more.

Entra ID authentication on Ubuntu at scale with Landscape

In September we introduced Authd, a new authentication daemon for Ubuntu that allows direct integration with cloud-based identity providers for both Ubuntu Desktop and Server. At launch, Authd supports Microsoft Entra ID (formerly Azure Active Directory), making it a useful tool to centralize authentication for both the application and the infrastructure layer. In large enterprises system administrators often need to deploy and manage applications and their configuration at scale.