Operations | Monitoring | ITSM | DevOps | Cloud

Security

The latest News and Information on CyberSecurity for Applications, Services and Infrastructure, and related technologies.

Important Situations Every Business Owner Should Be Aware Of

As a business owner, you need to stay on top of all the important situations that can impact your business. From legal questions and financial concerns to customer disputes and HR matters, there is no shortage of scenarios that require careful thought, communication, and attention - often with the help of experts in their respective fields.

Implementing Backstage 2: Using the Core Features

This article is the second installment of the “Implementing Backstage” series and focuses on how to use Backstage’s core features. Backstage has an extensible plugin architecture in active development and large community support and offers simplified tool management, workflow optimization, and time-saving features. However, to reap these benefits, you need to know how to use Backstage’s core features, including its software catalog, templates, documentation, and search.

Configure a policy to detect and block attacks and exploits

With Cisco Secure Application, you can configure run-time policies to continuously monitor vulnerabilities and automatically find and block attacks. Your speed and uptime are maximized while the risk to your business is minimized. And your teams gain time to plan and remediate your environment.

10 Essential Office Security Upgrades for the Digital Age

In today's modern office environment, businesses are continually evolving their security measures, recognizing the importance of safeguarding sensitive data and assets. With the advent of technology, traditional security methods like locked file cabinets are being complemented and, in some cases, replaced by innovative solutions such as the smart lock for a file cabinet. Here, we will explore ten crucial office security upgrades that are essential in the digital age, each contributing to the protection of the company's data.

Zenbleed vulnerability fix for Ubuntu

On 24 July 2023, security researchers from Google’s Information Security Engineering team disclosed a hardware vulnerability affecting AMD’s Zen 2 family of microprocessors. They dubbed this vulnerability “Zenbleed” (CVE-2023-20593), evoking memories of previous vulnerabilities like HeartBleed and hinting at its possible impact.

Which Gen Is Most Tech-Savvy? A Workforce Dilemma

Part one of a four-part series covering Ivanti’s latest research. Get the full series: According to new cybersecurity research by Ivanti, the employees who are the most tech-savvy aren’t necessarily the ones we’d presume, demographically speaking. Why is that? And what are the issues it creates for an enterprise?

Red Flag Reluctance: The Risk to Cybersecurity

Part two of a four-part series covering Ivanti’s latest research. Get the full series: Keeping an organization safe means getting near-real-time information about security incidents or breaches. But new research shows some employees are less inclined than others to report red flags, which puts your business at risk. Will your employees get in touch quickly if they have a security concern?

International Inconsistencies: How Cybersecurity Preparedness Varies Across Countries

Part three of a four-part series covering Ivanti’s latest research. Get the full series: An organization’s culture and training programs have a significant influence on security preparedness, but our research shows both are inconsistent at the country-to-country level. As we’ve seen in the previous posts in this series, employee demographics and their willingness to report security risks are hidden threats to your cybersecurity posture.