Operations | Monitoring | ITSM | DevOps | Cloud

Security

The latest News and Information on CyberSecurity for Applications, Services and Infrastructure, and related technologies.

How do you measure software security maturity?

Scorecards are a Cortex feature that allow you to understand how well your services are doing on the metrics you care about. Scorecards are customizable to your needs, however several are common to most organizations. In our previous post, we shared the top three scorecards that we recommend to Cortex customers. Security maturity is one of the first scorecards we recommend organizations create.

Vendor Risk Management 101-The Imminent Threat of IoT Litter Boxes | Ep.32 Security Insights Podcast

Welcome to Security Insights: where best-practice cybersecurity meets the real-world risks, workplaces, and roadblocks you face every day. Join Chris Goettl, head of Endpoint Security Product Management, and Ashley Stryker, your cybersecurity "rubber duck", as they review the security strategies and tactics that truly matter to the information security teams protecting organizations, agencies, and businesses like yours.

SASE Monitoring: How to Monitor & Optimize A SASE Architecture

We've all heard the buzz about SASE (Secure Access Service Edge) and how it's revolutionizing the way we handle network security and connectivity. But let's face it, keeping your SASE architecture running like a well-oiled machine isn't a walk in the park. It's more like a continuous sprint, with multiple moving parts, countless devices, and the never-ending quest for optimal performance. Today, we're delving into the art and science of SASE monitoring.

How to Transform the Way Your Company Manages Its IT Infrastructure

In today's competitive business world, your company cannot afford to waste time or money when it comes to managing its IT infrastructure. Staying ahead of the curve and ensuring efficiency is key for any organization that wants to see success in the long run. If you're looking to revolutionize how your company manages its IT operations, here are some tips on transforming your tech stack and making sure every department runs like a well-oiled machine.

Security and compliance for enterprise collaboration

In today’s increasingly data-driven business landscape, security and compliance are more important for enterprise software than ever before. In an age where high-profile data breaches and regulatory violations seem to make headlines more frequently, enterprises must prioritize the protection of sensitive information while ensuring compliance with an exceedingly complicated labyrinth of legal and industry-specific requirements.

Unpacking the Hype: Navigating the Complexities of Advanced Data Analytics in Cybersecurity

The cybersecurity industry is experiencing an explosion of innovative tools designed to tackle complex security challenges. However, the hype surrounding these tools has outpaced their actual capabilities, leading many teams to struggle with complexity and extracting value from their investment. In this conversation with Optiv‘s Randy Lariar, we explore the potential and dangers of bringing advanced data analytics and artificial intelligence tools to the cybersecurity space.

Implementing Backstage: Kubernetes Plugins

This second last part of the “Implementing Backstage” series explains how to use the Kubernetes plugin in Backstage using real-world scenarios. The previous installments covered getting started, using the core features, integrating with existing tools using plugins, and security and compliance. If you’re entirely new to Backstage and want to learn more, you can read the first entry in the “Evaluating Backstage” series.

Implementing Backstage: Kubernetes Deployment

This final part of the “Implementing Backstage” series focuses on how to deploy Backstage on Kubernetes. This tutorial is a direct continuation of Using the Kubernetes Plugin in Backstage, which you should complete before tackling this one. The other installments in this series covered getting started, using the core features, integrating with existing tools using plugins, and security and compliance.