Operations | Monitoring | ITSM | DevOps | Cloud

Security

The latest News and Information on CyberSecurity for Applications, Services and Infrastructure, and related technologies.

Mind the Overspray - Password Spraying Remains a Major Threat

If you’re wondering if that classic car you’ve been scoping out on Bring a Trailer or eBay Motors is as authentic as posited by the seller – specifically re: the common claims of “original paint” or “high quality respray” – you’re going to want to take a closer look around the edges. This is because a talented painter can make a second or 30th-hand vehicle look pretty snazzy with a well-affected, if not super high-quality, repaint.

What is new in Calico v3.24

A couple of weeks ago, TIgera engineers released the new version of Calico, as part of a community effort to drive cloud security and networking even further. But before I begin diving into the details of this new release, I want to first spotlight a few of our community members who have merged their contributions to Calico Open Source for the first time.

Installation Guide: Aqua Security on DKP

In this installation guide, learn how to get Aqua Security up and running on D2iQ Kubernetes Platform. D2iQ, the leading enterprise Kubernetes provider for smart cloud-native applications, has partnered with Aqua Security, the largest pure-play cloud-native security company, to enable organizations to create a seamless DevSecOps experience that accelerates the deployment of secure smart cloud-native applications – and helps stop cloud native attacks.

A Smart Home System That Does Not Rely On a Cloud

The cloud has been discussed extensively in recent years. Some people believe that it is the future of computing, while others think that it is inherently insecure and unreliable. Whatever your opinion may be, one thing is for sure: the cloud is not right for every application. In this blog post, we will discuss a smart home system that does not rely on a cloud server. Stay tuned to learn more!

Internal Social Media Platforms and Risk Management

Whether you're in the IT, finance, or HR departments of any company, chances are high that your team is using some form of social media to collaborate on projects. While internal social media platforms may boost employee engagement, knowledge sharing, and day-to-day decision-making, they also pose a variety of hazards in compliance and litigation that are often neglected. The following are some potential dangers you should be aware of before implementing internal social media in your business, along with suggestions for coping with such dangers.

What's the Sharpest Tool in Your Security Shed?

How easy is it to work with your security tools? So easy that you’re telling all your family and friends and you singing their praises from the occasional rooftop? Well, we sure hope so. Security tools, like any other tool, should help you save time, not waste it. Nobody would have invented a drill if screwdrivers were fast enough — but it’s also up to you to make sure you are using your drill and all the other power tools available in the modern world.

How a telecom company elevated integrated risk management and security

Managing risk and compliance in telecommunications is no easy feat. When a telecom company operates in underserved remote and rural communities—including hurricane-prone island markets and mountainous regions in the southwestern US—it can be even trickier. That’s where communications services company ATN International, based in Massachusetts, found itself. The company wanted a platform to elevate its integrated risk management (IRM) program.

A NetOps Guide to DDoS Defense

Join Kentik and Cloudflare as we discuss and analyze the latest in DDoS attack trends. (We’re seeing some really interesting patterns in our data!) Back by popular demand: Doug Madory, Kentik’s Director of Internet Research, will walk through how BGP monitoring can determine if DDoS mitigations are actually effective. What you’ll learn.