Operations | Monitoring | ITSM | DevOps | Cloud

Security

The latest News and Information on CyberSecurity for Applications, Services and Infrastructure, and related technologies.

I Have SD-WAN, Do I Just Need SSE Security for the Branch?

As businesses increasingly adopt Software-Defined Wide Area Network (SD-WAN) solutions to enhance connectivity and performance across their branch offices, a common question arises: “Do I just need Security Service Edge (SSE) security for the branch?” The answer is a resounding “no”. While SSE provides essential security features, it is not sufficient on its own.

What Is FileVault Disk Encryption & How Does it Work?

FileVault disk encryption is the macOS feature that encrypts data on Mac computers. Encrypting the data on your devices means that your password is required to read it, so if the device is lost or stolen, it is protected. This is vital for protecting the privacy of individuals and the operational data of businesses and organizations. This article explains FileVault, the importance of disk encryption for individuals and organizations, and how to enable FileVault.

Feature Friday #27: Multiple outcomes

When promises are actuated, a class can be defined based on its result. For example, if a promise modifies a file’s content, you could define a class that indicates it has been repaired. However, did you know that promises can have multiple outcomes concurrently? That’s right! Native promises (but not custom promises) can have multiple outcomes. For example, a promise can be both kept and repaired at the same time. Let’s take a look.

Security by Default: The Crucial Complement to Secure by Design

Legacy cybersecurity systems – many designed over a decade ago – fail to account for the new breed of attacker capabilities and vulnerabilities – nor for the reliance on human configuration that is the Achilles heel of so much software. This new reality is being answered with the software development concept called security by default, a necessary complement to the principles of Secure by Design set forth by the U.S. Cybersecurity & Infrastructure Security Agency (CISA).

Navigating the Convergence of IT and Security in Remote Work

Equinix CISO Mike Montoya and Grand Bank CTO Bob Hanson join a panel discussion to discuss the necessary challenges of transitioning IT & security work to a remote workplace and the single best thing organizations can do to meet those challenges: finding, engaging and retaining top talent within the fields. Ivanti finds, heals, and protects every device, everywhere – automatically. Whether your team is down the hall or spread around the globe, Ivanti makes it easy and secure for them to do what they do best.

An Introductory Guide to Cloud Security for IIoT

The state of industries has come a long way since the Industrial Revolution with new technologies such as smart devices, the internet, and the cloud. The Industrial Internet of Things (IIoT) is a network of industrial components that share and process data to gain insights. But as IIoT involves sensitive data and life-critical operations, this also comes with various IIoT cloud security challenges. Therefore, it is important to strengthen security.

Securing External Sharing in SharePoint Online

In today’s interconnected business world, external collaboration is essential. SharePoint Online provides the flexibility to share documents with external partners, clients, and vendors, but this can also expose organizations to data security risks. Securing external sharing while ensuring smooth collaboration is key to maintaining trust and protecting sensitive information. Here’s how you can achieve that balance.

True Stories of Devastating Data Loss (And Tips for Improving Your Own Backup Strategy)

Data loss can come from any number of sources, whether it’s a hurricane that causes major flooding in a server room or a bad actor threatening the safety of critical data by demanding a ransom for its safe return. If an organization only has a single copy of data on that waterlogged hard drive or in the hands of a cybercriminal, the odds of recovery are slim to none.

The Role of Physical Security in Safeguarding Sensitive Information in Data Centers

Physical security plays a vital role in safeguarding sensitive information housed within data centers. As data centers store vast amounts of confidential and mission-critical information, securing these facilities is essential to prevent unauthorized access, data breaches, and physical theft.

New Relic vs Splunk - In-depth Comparison [2024]

New Relic and Splunk are two prominent tools in the world of observability and monitoring, each serving distinct purposes. New Relic is used for Application Performance Monitoring (APM), offering a full-stack observability platform. It is important to note that New Relic is not a SIEM tool, its primary focus is performance monitoring. On the other hand, Splunk is used for log management, machine data analytics, and is widely utilized as a SIEM tool.