Operations | Monitoring | ITSM | DevOps | Cloud

Security

The latest News and Information on CyberSecurity for Applications, Services and Infrastructure, and related technologies.

Not All Hacks Are the Same, Plan Your Network Defenses Accordingly

The news is filled with stories about horrible attacks against corporate and government networks. It’s almost enough to make administrators for small and mid-sized networks give up. But it’s important to note not all of these attacks are the same. There’s a vast difference, for example, between the incredibly sophisticated long-term attacks against high-profile companies and government agencies, and the mere smash-and-grab attacks.

DevSecOps and Log Analysis: Improving Application Security

As time goes on, more and more organizations are abandoning the outdated waterfall development methodology for more practical and efficient Agile development practices. As this movement has occurred, development teams are moving faster than ever by employing Continuous Integration (CI) and Continuous Deployment (CD) practices that are serving to shorten development cycles and get new features into production with increasing speed.

Five worthy reads: Revolutionizing IT with artificial intelligence

Netflix recommends Stranger Things to you because it knows you like watching sci-fi thrillers. Tinder lets you swipe right into your next date because it’s learned your interests and partner preferences. Amazon keeps showing you Fitbit because you’ve spent a considerable amount of time browsing through the fitness and wellness category.

Penetration Testing from RapidSpike

The founders of RapidSpike built, managed, and successfully exited from a leading UK Security Company called RandomStorm before launching RapidSpike. One of the main areas that RandomStorm excelled in was Penetration Testing and the founders of RapidSpike have recently launched Pentest People to once again provide Penetration Testing services to the worldwide market.

CloudSploit Compliance Scanning Scans AWS Infrastructure for Compliance with Privacy Standards

One of the most common business requirements data handlers face is the numerous data privacy standards present as industry standards. Each industry has their own variation, each with their own specific requirements — but regardless of the standard or the applied dataset, compliance is extremely important.

How to Secure That Small Business WLAN

Too often, small business equals small budget when it comes to doing wireless, but sometimes just knowing what can be done goes further than more money. There are many ways to approach wireless security, and businesses of any size have options. Let’s talk about how I approach my own small- and mid-sized business (SMB) settings when it comes to security and Wi-Fi.

The SIEM Buyer's Guide

A security information event management (SIEM) solution is like a radar system that pilots and air traffic controllers use. Without one, enterprise IT is flying blind. Although security appliances and system software are good at catching and logging isolated attacks and anomalous behavior, today's most serious threats are distributed, acting in concert across multiple systems and using advanced evasion techniques to avoid detection.