Operations | Monitoring | ITSM | DevOps | Cloud

Security

The latest News and Information on CyberSecurity for Applications, Services and Infrastructure, and related technologies.

21 basic computer security tips

The Internet is a tool that, without a doubt, offers a great amount of positive aspects in the daily life of our society, like instant communication, easy access to information… among many other benefits. But also it has negative aspects, and one of the big ones is cyberattacks. That is why we give you today 21 computer security tips for beginners!

Featured Post

Maintaining Internet Privacy for Your Business

Every time you use the internet, online service providers collect some data about you and your business. Internet privacy isn't just a concern of large corporations. According to statistics, up to 43% of cyber-attacks target small businesses. Furthermore, only 14% of these vulnerable organizations have effective mitigation measures in place. As digital data grows, cybersecurity should become your highest priority.

Node.js Security and Observability using Lightrun & Snyk

As developers, we spend a lot of time in our IDEs writing new code, refactoring code, adding tests, fixing bugs and more. And in recent years, IDEs have become powerful tools, helping us developers with anything from interacting with HTTP requests to generally boosting our productivity. So you have to ask — what if we could also prevent security issues in our code before we ship it?

A Year of Supply Chain Attacks: How to Protect Your SDLC

One of the most worrisome trends in cybersecurity today is the skyrocketing incidence of supply chain attacks, such as the ones that hit SolarWinds last year and Kaseya more recently. Because they focus on compromising software development and delivery, supply chain attacks have forced developers and DevOps teams to scramble for solutions. Unfortunately, supply chain attacks are particularly challenging to prevent, detect and remediate, and, because of their stealthy nature, are often devastating.

How to detect security threats in your systems' Linux processes

Almost all tasks within a Linux system, whether it’s an application, system daemon, or certain types of user activity, are executed by one or more processes . This means that monitoring processes is key to detecting potentially malicious activity in your systems, such as the creation of unexpected web shells or other utilities.

kOps adds support for Calico's eBPF data plane

Kubernetes operations (kOps) is one of the official Kubernetes (K8s) projects. The kOps project allows for rapid deployment of production-grade K8s clusters in multiple cloud platforms. By leveraging yaml manifests, kOps delivers a familiar experience to users who have worked with kubectl. Similar to K8s clusters in popular cloud platforms, kOps helps set up self-managed clusters to easily deliver high availability.

Resilient Infrastructure for a Secure Future

Each year, SolarWinds® surveys IT professionals around the world to gauge what’s most pressing on their minds, but also to understand their organization’s challenges and how they intend to overcome them. In 2021, we wanted to know what organizations think of the increasing risks they face from both the reality of supporting the hybrid workplace and the expanding cyberthreat landscape—and how they’ve prepared to address them.